Delicious Bookmark this on Delicious Share on Facebook SlashdotSlashdot It! Digg! Digg



PHP : Function Reference : POSIX Functions : posix_getpwnam

posix_getpwnam

Return info about a user by username (PHP 4, PHP 5)
array posix_getpwnam ( string username )

Example 1878. Example use of posix_getpwnam()

<?php

$userinfo
= posix_getpwnam("tom");

print_r($userinfo);
?>

The above example will output something similar to:

Array
(
   [name]    => tom
   [passwd]  => x
   [uid]     => 10000
   [gid]     => 42
   [geocs]   => "tom,,,"
   [dir]     => "/home/tom"
   [shell]   => "/bin/bash"
)

Code Examples / Notes » posix_getpwnam

sezery

User and group functions do not work on recent Redhat systems since these functions are based on /etc/group file but new redhat does not put group members' list into this file. Instead you need to examine /etc/passwd file and find members of a group by checking group id.

30-jun-2004 01:48


perreal

To check passwords on a Unix-box, look at the mod_auth_external module for Apache, it uses external programs to do the real job. The server won't ever read the encrypted password.
One of them, pwauth, can be configured to use PAM or whatever is used on your system. Users that can run this program are configured at compile time. And this program can be called from PHP with exec(...).


rcgraves+php

Returns same array as posix_getpwuid; you just give it the name rather than number.

didar hossain

Okay, this is a DIRTY HACK that I came up with
I am not a regular coder, so please weigh the relevant security considerations
<?php
$cmdstr = 'echo ' . $_POST['user'] . ' ' . $_POST['pass'];
$cmdstr .= ' | /home/didar/pam_auth -n common-auth ';
exec($cmdstr,$read);
if (strstr($read[0],"OK")) {
     echo "Success";
} else {
     echo "Failed";
}
?>
The code above makes use of the "pam_auth" or "squid_pam_auth" helper program from Squid package. Go to the following link for more information about it -
http://devel.squid-cache.org/hno/pam_auth-2.0.txt
WARNING: This is simply a hack. Always USE SSL/TLS in the orignating submit form. Also, always do sanity checks on the user input data.


bau

Oh I forgot the following:
to change a Users password via PHP,
you can use the following (under Linux with installed Samba):
exec('echo -e "'.$oldpassword.'\n'.$newpassword.'\n'.$newpassword.'
"|smbpasswd -U'.$user.' -s')
The exec-command returns ""
if an error occured (then see the error_log of the web-server)
or a message "The password has been changed".
Good luck.
Baumgärtner


didar hossain

My original code is an example of stupid code leading to a security vulnerability. The username and password can be viewed using the *NIX command `ps'.
Here is a better approach:
<?php
$desc = array(
               0 => array("pipe","r"),
               1 => array("pipe","w"),
               2 => array("file","/tmp/error.out","a")
       );
       
       $proc = proc_open('/opt/webpanel/bin/pam_auth -o -1',$desc, $pipes);
               
       if (is_resource($proc)) {
               fwrite($pipes[0],$_POST['usr']);
               fwrite($pipes[0]," ");
               fwrite($pipes[0],$_POST['pass']);
               fwrite($pipes[0],"\n");
               fclose($pipes[0]);
               echo stream_get_contents($pipes[1]);
               fclose($pipes[1]);
       }
       $retval = proc_close($proc);
?>
Example code is mostly a verbatim copy from the proc_open() page.
http://php.net/manual/en/function.proc-open.php


darryl

If you need to validate a *real* unix password on a system using shadowed passwords, the posix_getpwnam() function in PHP won't work (as mentioned, 'x', or '*', will be in the password field).
I have a need to verify a user/pass within PHP (using SSL!).  I don't know if this is the best way, but it's what I'm doing at the moment (works well!).
First, you need some help from the OS.  I wrote a tiny C utility that does the shadow look-up for me... It requires root access to read /etc/shadow.  So after you compile (gcc -O2 -s -o spasswd -lcrypt spasswd.c), you need to either use sudo to run it, or
# chown root spasswd && chmod u+s spasswd
To code that I'm using to authenticate a user/pass from PHP looks like:
function Authenticate($realm)
{
global $PHP_AUTH_USER;
global $PHP_AUTH_PW;
if(!isset($PHP_AUTH_USER))
{
 header("WWW-Authenticate: Basic realm=\"$realm\"");
 header("HTTP/1.0 401 Unauthorized");
 return false;
}
else
{
 if(($fh = popen("/usr/sbin/spasswd", "w")))
 {
  fputs($fh, "$PHP_AUTH_USER $PHP_AUTH_PW");
  $r = pclose($fh);
  if(!$r)
   return true;
 }
}
header("WWW-Authenticate: Basic realm=\"$realm\"");
header("HTTP/1.0 401 Unauthorized");
return false;
}
The C source for spasswd.c:
#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <crypt.h>
#include <shadow.h>
static char salt[12], user[128], pass[128];
void die(void)
{
memset(salt, '\0', 12);
memset(user, '\0', 128);
memset(pass, '\0', 128);
}
int main(int argc, char *argv[])
{
struct spwd *passwd;
atexit(die); die();
if(fscanf(stdin, "%127s %127s", user, pass) != 2)
 return 1;
if(!(passwd = getspnam(user)))
 return 1;
strncpy(salt, passwd->sp_pwdp, 11);
strncpy(pass, crypt(pass, salt), 127);
if(!strncmp(pass, passwd->sp_pwdp, 127))
 return 0;
return 1;
}
Hope this helps someone...


bau

If you are running a pop3-daemon, so you can do authentification on pop3 by using fsockopen :-) and checking whether it returns +OK or -ERR

vision_1967

I needed to get access to the user information to do login/validation via an SSL connection and encountered the same problem with receiving '*' in the password field.  After checking the documentation on posix_getpwnam, I saw a previous solution involving coding a C program.  This was a bit bulky for me so I came up with my own solution.
Variations on this theme can probably be done to make the solution more programmer/reader friendly, but the way I did it accomplished the task that I needed to do.
IF the information you need to get from posix_getpwnam comes from a host participating in an NIS network, you can accomplish the same thing with the following command:
$autharray = split(":",`ypmatch $USER passwd`);
(pretty long explanation for such a short solution huh?)
You'll have to get at the fields by their index number ($autharray[0], $autharray[1], ...) using this method.
To create an associative array that is plug-in compatible with the posix_getpwnam function,  you'll probably need to use the 'list' specifier to do the assignments.
I hope this helps someone.
--S


bau

Hello, I've tried another, more easier way to check passwords than checking it to a pop3-server. If you are running a samba-server or a Windows PDC, so you can try to connect with the username/password you want to check to the netlogon of this server:
if (exec('echo "exit"|smbclient //server/netlogon -U'.$user.' '.$pass)=="") { ... }
If the username/password doesn't match, then the exec-command under LINUX returns an error.
Good luck
Baumgärtner


marcus

Given a non-existent username, this function returns a boolean FALSE.

corychristison

For those of you who are writing daemons with PHP and are one for security. This function will not return any info if you have called PHP's chroot() function.
Took me a few minutes why it wouldn't find the user it was searching for.


Change Language


Follow Navioo On Twitter
posix_access
posix_ctermid
posix_get_last_error
posix_getcwd
posix_getegid
posix_geteuid
posix_getgid
posix_getgrgid
posix_getgrnam
posix_getgroups
posix_getlogin
posix_getpgid
posix_getpgrp
posix_getpid
posix_getppid
posix_getpwnam
posix_getpwuid
posix_getrlimit
posix_getsid
posix_getuid
posix_initgroups
posix_isatty
posix_kill
posix_mkfifo
posix_mknod
posix_setegid
posix_seteuid
posix_setgid
posix_setpgid
posix_setsid
posix_setuid
posix_strerror
posix_times
posix_ttyname
posix_uname
eXTReMe Tracker