Auth.pm 16.2 KB
Newer Older
1
2
3
4
# -*- indent-tabs-mode: nil; -*-
# vim:ft=perl:et:sw=4
# $Id$

salaun's avatar
salaun committed
5
# Sympa - SYsteme de Multi-Postage Automatique
6
7
8
9
10
#
# Copyright (c) 1997, 1998, 1999 Institut Pasteur & Christophe Wolfhugel
# Copyright (c) 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
# 2006, 2007, 2008, 2009, 2010, 2011 Comite Reseau des Universites
# Copyright (c) 2011, 2012, 2013, 2014 GIP RENATER
salaun's avatar
salaun committed
11
12
13
14
15
16
17
18
19
20
21
22
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
23
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
salaun's avatar
salaun committed
24
25
26

package Auth;

27
use Digest::MD5;
28
use POSIX qw();
salaun's avatar
salaun committed
29
30
31
32

use Log;
use Conf;
use List;
33
use report;
34
use SDM;
salaun's avatar
salaun committed
35

36
37
38
## return the password finger print (this proc allow futur replacement of md5 by sha1 or ....)
sub password_fingerprint{

39
    &Log::do_log('debug', 'Auth::password_fingerprint');
40
41
42
43
44
45
46
47
48

    my $pwd = shift;
    if(&Conf::get_robot_conf('*','password_case') eq 'insensitive') {
	return &tools::md5_fingerprint(lc($pwd));
    }else{
	return &tools::md5_fingerprint($pwd);
    }    
}

salaun's avatar
salaun committed
49

50
## authentication : via email or uid
salaun's avatar
salaun committed
51
 sub check_auth{
52
     my $robot = shift;
salaun's avatar
salaun committed
53
54
     my $auth = shift; ## User email or UID
     my $pwd = shift; ## Password
55
     &Log::do_log('debug', 'Auth::check_auth(%s)', $auth);
salaun's avatar
salaun committed
56
57
58
59

     my ($canonic, $user);

     if( &tools::valid_email($auth)) {
60
	 return &authentication($robot, $auth,$pwd);
salaun's avatar
salaun committed
61
62
     }else{
	 ## This is an UID
63
64
65
66
67
68
69
70
71
	 foreach my $ldap (@{$Conf{'auth_services'}{$robot}}){
	     # only ldap service are to be applied here
	     next unless ($ldap->{'auth_type'} eq 'ldap');
	     
	     $canonic = &ldap_authentication($robot, $ldap, $auth,$pwd,'uid_filter');
	     last if ($canonic); ## Stop at first match
	 }
	 if ($canonic){
	     
72
	     unless($user = Sympa::User::get_global_user($canonic)){
salaun's avatar
salaun committed
73
74
		 $user = {'email' => $canonic};
	     }
75
76
77
78
	     return {'user' => $user,
		     'auth' => 'ldap',
		     'alt_emails' => {$canonic => 'ldap'}
		 };
79
	     
salaun's avatar
salaun committed
80
	 }else{
81
	     &report::reject_report_web('user','incorrect_passwd',{}) unless ($ENV{'SYMPA_SOAP'});
82
	     &Log::do_log('err', "Incorrect Ldap password");
salaun's avatar
salaun committed
83
84
85
86
87
	     return undef;
	 }
     }
 }

88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
## This subroutine if Sympa may use its native authentication for a given user
## It might not if no user_table paragraph is found in auth.conf or if the regexp or
## negative_regexp exclude this user
## IN : robot, user email
## OUT : boolean
sub may_use_sympa_native_auth {
    my ($robot, $user_email) = @_;

    my $ok = 0;
    ## check each auth.conf paragrpah
    foreach my $auth_service (@{$Conf{'auth_services'}{$robot}}){
	next unless ($auth_service->{'auth_type'} eq 'user_table');

	next if ($auth_service->{'regexp'} && ($user_email !~ /$auth_service->{'regexp'}/i));
	next if ($auth_service->{'negative_regexp'} && ($user_email =~ /$auth_service->{'negative_regexp'}/i));
	
	$ok = 1; last;
    }
    
    return $ok;
}
salaun's avatar
salaun committed
109
110

sub authentication {
111
    my ($robot, $email,$pwd) = @_;
salaun's avatar
salaun committed
112
    my ($user,$canonic);
113
    &Log::do_log('debug', 'Auth::authentication(%s)', $email);
salaun's avatar
salaun committed
114

salaun's avatar
salaun committed
115

116
    unless ($user = Sympa::User::get_global_user($email)) {
117
	$user = {'email' => $email };
salaun's avatar
salaun committed
118
119
    }    
    unless ($user->{'password'}) {
120
	$user->{'password'} = '';
salaun's avatar
salaun committed
121
122
    }
    
123
124
    if ($user->{'wrong_login_count'} > &Conf::get_robot_conf($robot, 'max_wrong_password')){
	# too many wrong login attemp
125
	Sympa::User::update_global_user($email,{wrong_login_count => $user->{'wrong_login_count'}+1}) ;
126
	&report::reject_report_web('user','too_many_wrong_login',{}) unless ($ENV{'SYMPA_SOAP'});
127
	&Log::do_log('err','login is blocked : too many wrong password submission for %s', $email);
128
129
	return undef;
    }
130
    foreach my $auth_service (@{$Conf{'auth_services'}{$robot}}){
131
	next if ($auth_service->{'auth_type'} eq 'authentication_info_url');
salaun's avatar
salaun committed
132
133
	next if ($email !~ /$auth_service->{'regexp'}/i);
	next if (($email =~ /$auth_service->{'negative_regexp'}/i)&&($auth_service->{'negative_regexp'}));
david.verdin's avatar
david.verdin committed
134
135
136

	## Only 'user_table' and 'ldap' backends will need that Sympa collects the user passwords
	## Other backends are Single Sign-On solutions
salaun's avatar
salaun committed
137
	if ($auth_service->{'auth_type'} eq 'user_table') {
138
	    my $fingerprint = &password_fingerprint ($pwd);	    	    
139
	    
140
	    if ($fingerprint eq $user->{'password'}) {
141
		Sympa::User::update_global_user($email,{wrong_login_count => 0}) ;
142
143
144
145
		return {'user' => $user,
			'auth' => 'classic',
			'alt_emails' => {$email => 'classic'}
			};
salaun's avatar
salaun committed
146
147
	    }
	}elsif($auth_service->{'auth_type'} eq 'ldap') {
148
	    if ($canonic = &ldap_authentication($robot, $auth_service, $email,$pwd,'email_filter')){
149
		unless($user = Sympa::User::get_global_user($canonic)){
salaun's avatar
salaun committed
150
151
		    $user = {'email' => $canonic};
		}
152
		Sympa::User::update_global_user($canonic,{wrong_login_count => 0}) ;
153
154
155
156
		return {'user' => $user,
			'auth' => 'ldap',
			'alt_emails' => {$email => 'ldap'}
			};
salaun's avatar
salaun committed
157
158
159
	    }
	}
    }
salaun's avatar
salaun committed
160

161
    # increment wrong login count.
162
    Sympa::User::update_global_user($email,{wrong_login_count =>$user->{'wrong_login_count'}+1}) ;
163

164
    &report::reject_report_web('user','incorrect_passwd',{}) unless ($ENV{'SYMPA_SOAP'});
165
    &Log::do_log('err','authentication: incorrect password for user %s', $email);
salaun's avatar
salaun committed
166
167
168
169
170
171
172
173

    $param->{'init_email'} = $email;
    $param->{'escaped_init_email'} = &tools::escape_chars($email);
    return undef;
}


sub ldap_authentication {
174
175
     my ($robot, $ldap, $auth, $pwd, $whichfilter) = @_;
     my ($mesg, $host,$ldap_passwd,$ldap_anonymous);
176
177
     &Log::do_log('debug2','Auth::ldap_authentication(%s,%s,%s)', $auth,'****',$whichfilter);
     &Log::do_log('debug3','Password used: %s',$pwd);
salaun's avatar
salaun committed
178

179
     unless (tools::search_fullpath($robot, 'auth.conf')) {
salaun's avatar
salaun committed
180
181
182
183
	 return undef;
     }

     ## No LDAP entry is defined in auth.conf
184
     if ($#{$Conf{'auth_services'}{$robot}} < 0) {
185
	 &Log::do_log('notice', 'Skipping empty auth.conf');
salaun's avatar
salaun committed
186
187
188
	 return undef;
     }

189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
     # only ldap service are to be applied here
     return undef unless ($ldap->{'auth_type'} eq 'ldap');
     
     # skip ldap auth service if the an email address was provided
     # and this email address does not match the corresponding regexp 
     return undef if ($auth =~ /@/ && $auth !~ /$ldap->{'regexp'}/i);
     
     my @alternative_conf = split(/,/,$ldap->{'alternative_email_attribute'});
     my $attrs = $ldap->{'email_attribute'};
     my $filter = $ldap->{'get_dn_by_uid_filter'} if($whichfilter eq 'uid_filter');
     $filter = $ldap->{'get_dn_by_email_filter'} if($whichfilter eq 'email_filter');
     $filter =~ s/\[sender\]/$auth/ig;
     
     ## bind in order to have the user's DN
     my $param = &tools::dup_var($ldap);
204
     my $ds = new LDAPSource($param);
205
206
     
     unless (defined $ds && ($ldap_anonymous = $ds->connect())) {
207
       &Log::do_log('err',"Unable to connect to the LDAP server '%s'", $ldap->{'host'});
208
       return undef;
salaun's avatar
salaun committed
209
     }
210
211
212
213
214
215
216
217
     
     
     $mesg = $ldap_anonymous->search(base => $ldap->{'suffix'},
				     filter => "$filter",
				     scope => $ldap->{'scope'} ,
				     timeout => $ldap->{'timeout'});
     
     if ($mesg->count() == 0) {
218
       &Log::do_log('notice','No entry in the Ldap Directory Tree of %s for %s',$ldap->{'host'},$auth);
219
220
       $ds->disconnect();
       return undef;
salaun's avatar
salaun committed
221
     }
222
223
224
225
226
227
228
229
230
     
     my $refhash=$mesg->as_struct();
     my (@DN) = keys(%$refhash);
     $ds->disconnect();
     
     ##  bind with the DN and the pwd
     
     ## Duplicate structure first
     ## Then set the bind_dn and password according to the current user
231
     $param = &tools::dup_var($ldap);
232
233
234
     $param->{'ldap_bind_dn'} = $DN[0];
     $param->{'ldap_bind_password'} = $pwd;
     
235
     $ds = new LDAPSource($param);
236
237
     
     unless (defined $ds && ($ldap_passwd = $ds->connect())) {
238
       &Log::do_log('err',"Unable to connect to the LDAP server '%s'", $param->{'host'});
239
       return undef;
salaun's avatar
salaun committed
240
241
     }
     
242
243
244
245
246
247
248
     $mesg= $ldap_passwd->search ( base => $ldap->{'suffix'},
				   filter => "$filter",
				   scope => $ldap->{'scope'},
				   timeout => $ldap->{'timeout'}
				 );
     
     if ($mesg->count() == 0 || $mesg->code() != 0) {
249
       &Log::do_log('notice',"No entry in the Ldap Directory Tree of %s", $ldap->{'host'});
250
251
       $ds->disconnect();
       return undef;
salaun's avatar
salaun committed
252
     }
253
254
255
256
257
258
259
260
261
262
263
264
     
     ## To get the value of the canonic email and the alternative email
     my (@canonic_email, @alternative);
     
     ## Keep previous alt emails not from LDAP source
     my $previous = {};
     foreach my $alt (keys %{$param->{'alt_emails'}}) {
       $previous->{$alt} = $param->{'alt_emails'}{$alt} if ($param->{'alt_emails'}{$alt} ne 'ldap');
     }
     $param->{'alt_emails'} = {};
     
     my $entry = $mesg->entry(0);
265
     @canonic_email = $entry->get_value($attrs, 'alloptions' => 1);
266
267
268
269
270
271
     foreach my $email (@canonic_email){
       my $e = lc($email);
       $param->{'alt_emails'}{$e} = 'ldap' if ($e);
     }
     
     foreach my $attribute_value (@alternative_conf){
272
       @alternative = $entry->get_value($attribute_value, 'alloptions' => 1);
273
274
275
276
277
278
279
280
281
282
283
       foreach my $alter (@alternative){
	 my $a = lc($alter); 
	 $param->{'alt_emails'}{$a} = 'ldap' if($a) ;
       }
     }
     
     ## Restore previous emails
     foreach my $alt (keys %{$previous}) {
       $param->{'alt_emails'}{$alt} = $previous->{$alt};
     }
     
284
285
     $ds->disconnect() or &Log::do_log('notice', "unable to unbind");
     &Log::do_log('debug3',"canonic: $canonic_email[0]");
286
287
     ## If the identifier provided was a valid email, return the provided email.
     ## Otherwise, return the canonical email guessed after the login.
288
     if( &tools::valid_email($auth) && !&Conf::get_robot_conf($robot,'ldap_force_canonical_email')) {
289
290
291
292
293
	 return ($auth);
     }else{
	 return lc($canonic_email[0]);
     } 
}
salaun's avatar
salaun committed
294
295
296


# fetch user email using his cas net_id and the paragrapah number in auth.conf
297
sub get_email_by_net_id {
salaun's avatar
salaun committed
298
    
299
    my $robot = shift;
salaun's avatar
salaun committed
300
    my $auth_id = shift;
301
    my $attributes = shift;
302
    
303
    &Log::do_log ('debug',"Auth::get_email_by_net_id($auth_id,$attributes->{'uid'})");
304
305
306
307
308
309
310
311
312
313
314
315
    
    if (defined $Conf{'auth_services'}{$robot}[$auth_id]{'internal_email_by_netid'}) {
	my $sso_config = @{$Conf{'auth_services'}{$robot}}[$auth_id];
	my $netid_cookie = $sso_config->{'netid_http_header'} ;
	
	$netid_cookie =~ s/(\w+)/$attributes->{$1}/ig;
	
	$email = &List::get_netidtoemail_db($robot, $netid_cookie, $Conf{'auth_services'}{$robot}[$auth_id]{'service_id'});
	
	return $email;
    }
 
316
    my $ldap = @{$Conf{'auth_services'}{$robot}}[$auth_id];
317

318
    my $param = &tools::dup_var($ldap);
319
    my $ds = new LDAPSource($param);
320
    my $ldap_anonymous;
salaun's avatar
salaun committed
321
    
322
    unless (defined $ds && ($ldap_anonymous = $ds->connect())) {
323
	&Log::do_log('err',"Unable to connect to the LDAP server '%s'", $ldap->{'ldap_host'});
salaun's avatar
salaun committed
324
325
326
327
	return undef;
    }

    my $filter = $ldap->{'ldap_get_email_by_uid_filter'} ;
328
    $filter =~ s/\[([\w-]+)\]/$attributes->{$1}/ig;
salaun's avatar
salaun committed
329
330
331
332
333
334
335

#	my @alternative_conf = split(/,/,$ldap->{'alternative_email_attribute'});
		
	my $emails= $ldap_anonymous->search ( base => $ldap->{'ldap_suffix'},
				      filter => $filter,
				      scope => $ldap->{'ldap_scope'},
				      timeout => $ldap->{'ldap_timeout'},
336
				      attrs =>  [$ldap->{'ldap_email_attribute'}],
salaun's avatar
salaun committed
337
338
339
340
				      );
	my $count = $emails->count();

	if ($emails->count() == 0) {
341
	    &Log::do_log('notice',"No entry in the Ldap Directory Tree of %s", $host);
342
343
	$ds->disconnect();
	return undef;
salaun's avatar
salaun committed
344
345
	}

346
347
348
    $ds->disconnect();
    
    ## return only the first attribute
salaun's avatar
salaun committed
349
350
351
352
353
354
355
	my @results = $emails->entries;
	foreach my $result (@results){
	    return (lc($result->get_value($ldap->{'ldap_email_attribute'})));
	}

 }

356
357
358
359
# check trusted_application_name et trusted_application_password : return 1 or undef;
sub remote_app_check_password {
    
    my ($trusted_application_name,$password,$robot) = @_;
360
    &Log::do_log('debug','Auth::remote_app_check_password (%s,%s)',$trusted_application_name,$robot);
361
    
362
    my $md5 = &tools::md5_fingerprint($password);
363
364
365
366
367
    
    my $vars;
    # seach entry for trusted_application in Conf
    my @trusted_apps ;
    
368
369
    # select trusted_apps from robot context or sympa context
    @trusted_apps = @{&Conf::get_robot_conf($robot,'trusted_applications')};
370
371
372
    
    foreach my $application (@trusted_apps){
	
373
 	if (lc($application->{'name'}) eq lc($trusted_application_name)) {
374
 	    if ($md5 eq $application->{'md5password'}) {
375
 		# &Log::do_log('debug', 'Auth::remote_app_check_password : authentication succeed for %s',$application->{'name'});
376
377
378
379
380
381
 		my %proxy_for_vars ;
 		foreach my $varname (@{$application->{'proxy_for_variables'}}) {
 		    $proxy_for_vars{$varname}=1;
 		}		
 		return (\%proxy_for_vars);
 	    }else{
382
 		&Log::do_log('info', 'Auth::remote_app_check_password: bad password from %s', $trusted_application_name);
383
384
385
386
387
 		return undef;
 	    }
 	}
    }				 
    # no matching application found
388
    &Log::do_log('info', 'Auth::remote_app-check_password: unknown application name %s', $trusted_application_name);
389
390
391
    return undef;
}
 
392
393
394
395
396
397
398
# create new entry in one_time_ticket table using a rand as id so later access is authenticated
#

sub create_one_time_ticket {
    my $email = shift;
    my $robot = shift;
    my $data_string = shift;
399
    my $remote_addr = shift; ## Value may be 'mail' if the IP address is not known
400
401

    my $ticket = &SympaSession::get_random();
402
    &Log::do_log('info', 'Auth::create_one_time_ticket(%s,%s,%s,%s) value = %s',$email,$robot,$data_string,$remote_addr,$ticket);
403
404
405
406

    my $date = time;
    my $sth;
    
407
    unless (&SDM::do_query("INSERT INTO one_time_ticket_table (ticket_one_time_ticket, robot_one_time_ticket, email_one_time_ticket, date_one_time_ticket, data_one_time_ticket, remote_addr_one_time_ticket, status_one_time_ticket) VALUES (%s, %s, %s, %d, %s, %s, %s)",&SDM::quote($ticket),&SDM::quote($robot),&SDM::quote($email),time,&SDM::quote($data_string),&SDM::quote($remote_addr),&SDM::quote('open'))) {
408
	&Log::do_log('err','Unable to insert new one time ticket for user %s, robot %s in the database',$email,$robot);
409
410
411
412
413
414
415
416
417
418
419
	return undef;
    }   
    return $ticket;
}

# read one_time_ticket from table and remove it
#
sub get_one_time_ticket {
    my $ticket_number = shift;
    my $addr = shift; 
    
420
    &Log::do_log('debug2', '(%s)',$ticket_number);
421
422
423
    
    my $sth;
    
424
    unless ($sth = &SDM::do_query("SELECT ticket_one_time_ticket AS ticket, robot_one_time_ticket AS robot, email_one_time_ticket AS email, date_one_time_ticket AS \"date\", data_one_time_ticket AS data, remote_addr_one_time_ticket AS remote_addr, status_one_time_ticket as status FROM one_time_ticket_table WHERE ticket_one_time_ticket = %s ", &SDM::quote($ticket_number))) {
425
	&Log::do_log('err','Unable to retrieve one time ticket %s from database',$ticket_number);
426
427
428
	return {'result'=>'error'};
    }
 
429
    my $ticket = $sth->fetchrow_hashref('NAME_lc');
430
431
    
    unless ($ticket) {	
432
	&Log::do_log('info','Auth::get_one_time_ticket: Unable to find one time ticket %s', $ticket);
433
434
435
436
	return {'result'=>'not_found'};
    }
    
    my $result;
437
438
439
    my $printable_date = POSIX::strftime(
	"%d %b %Y at %H:%M:%S", localtime($ticket->{'date'})
    );
440
441
442

    if ($ticket->{'status'} ne 'open') {
	$result = 'closed';
443
	&Log::do_log('info','Auth::get_one_time_ticket: ticket %s from %s has been used before (%s)',$ticket_number,$ticket->{'email'},$printable_date);
444
445
    }
    elsif (time - $ticket->{'date'} > 48 * 60 * 60) {
446
	&Log::do_log('info','Auth::get_one_time_ticket: ticket %s from %s refused because expired (%s)',$ticket_number,$ticket->{'email'},$printable_date);
447
448
449
450
	$result = 'expired';
    }else{
	$result = 'success';
    }
451
    unless (&SDM::do_query("UPDATE one_time_ticket_table SET status_one_time_ticket = %s WHERE (ticket_one_time_ticket=%s)", &SDM::quote($addr), &SDM::quote($ticket_number))) {
452
    	&Log::do_log('err','Unable to set one time ticket %s status to %s',$ticket_number, $addr);
453
454
    }

455
    &Log::do_log('info', 'Auth::get_one_time_ticket(%s) : result : %s',$ticket_number,$result);
456
457
458
459
460
461
462
463
464
465
    return {'result'=>$result,
	    'date'=>$ticket->{'date'},
	    'email'=>$ticket->{'email'},
	    'remote_addr'=>$ticket->{'remote_addr'},
	    'robot'=>$ticket->{'robot'},
	    'data'=>$ticket->{'data'},
	    'status'=>$ticket->{'status'}
	};
}
    
salaun's avatar
salaun committed
466
1;