Auth.pm 16 KB
Newer Older
1
# Auth.pm - This module provides web authentication functions
salaun's avatar
salaun committed
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
# RCS Identication ; $Revision$ ; $Date$ 
#
# Sympa - SYsteme de Multi-Postage Automatique
# Copyright (c) 1997, 1998, 1999, 2000, 2001 Comite Reseau des Universites
# Copyright (c) 1997,1998, 1999 Institut Pasteur & Christophe Wolfhugel
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
19
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
salaun's avatar
salaun committed
20
21
22

package Auth;

23
use Digest::MD5;
salaun's avatar
salaun committed
24

25
use Language;
salaun's avatar
salaun committed
26
27
28
use Log;
use Conf;
use List;
29
use report;
30
use SDM;
salaun's avatar
salaun committed
31

32
33
34
## return the password finger print (this proc allow futur replacement of md5 by sha1 or ....)
sub password_fingerprint{

35
    &Log::do_log('debug', 'Auth::password_fingerprint');
36
37
38
39
40
41
42
43
44

    my $pwd = shift;
    if(&Conf::get_robot_conf('*','password_case') eq 'insensitive') {
	return &tools::md5_fingerprint(lc($pwd));
    }else{
	return &tools::md5_fingerprint($pwd);
    }    
}

salaun's avatar
salaun committed
45

46
## authentication : via email or uid
salaun's avatar
salaun committed
47
 sub check_auth{
48
     my $robot = shift;
salaun's avatar
salaun committed
49
50
     my $auth = shift; ## User email or UID
     my $pwd = shift; ## Password
51
     &Log::do_log('debug', 'Auth::check_auth(%s)', $auth);
salaun's avatar
salaun committed
52
53
54
55

     my ($canonic, $user);

     if( &tools::valid_email($auth)) {
56
	 return &authentication($robot, $auth,$pwd);
salaun's avatar
salaun committed
57
58
     }else{
	 ## This is an UID
59
60
61
62
63
64
65
66
67
	 foreach my $ldap (@{$Conf{'auth_services'}{$robot}}){
	     # only ldap service are to be applied here
	     next unless ($ldap->{'auth_type'} eq 'ldap');
	     
	     $canonic = &ldap_authentication($robot, $ldap, $auth,$pwd,'uid_filter');
	     last if ($canonic); ## Stop at first match
	 }
	 if ($canonic){
	     
68
	     unless($user = &List::get_global_user($canonic)){
salaun's avatar
salaun committed
69
70
		 $user = {'email' => $canonic};
	     }
71
72
73
74
	     return {'user' => $user,
		     'auth' => 'ldap',
		     'alt_emails' => {$canonic => 'ldap'}
		 };
75
	     
salaun's avatar
salaun committed
76
	 }else{
77
	     &report::reject_report_web('user','incorrect_passwd',{}) unless ($ENV{'SYMPA_SOAP'});
78
	     &Log::do_log('err', "Incorrect Ldap password");
salaun's avatar
salaun committed
79
80
81
82
83
	     return undef;
	 }
     }
 }

84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
## This subroutine if Sympa may use its native authentication for a given user
## It might not if no user_table paragraph is found in auth.conf or if the regexp or
## negative_regexp exclude this user
## IN : robot, user email
## OUT : boolean
sub may_use_sympa_native_auth {
    my ($robot, $user_email) = @_;

    my $ok = 0;
    ## check each auth.conf paragrpah
    foreach my $auth_service (@{$Conf{'auth_services'}{$robot}}){
	next unless ($auth_service->{'auth_type'} eq 'user_table');

	next if ($auth_service->{'regexp'} && ($user_email !~ /$auth_service->{'regexp'}/i));
	next if ($auth_service->{'negative_regexp'} && ($user_email =~ /$auth_service->{'negative_regexp'}/i));
	
	$ok = 1; last;
    }
    
    return $ok;
}
salaun's avatar
salaun committed
105
106

sub authentication {
107
    my ($robot, $email,$pwd) = @_;
salaun's avatar
salaun committed
108
    my ($user,$canonic);
109
    &Log::do_log('debug', 'Auth::authentication(%s)', $email);
salaun's avatar
salaun committed
110

salaun's avatar
salaun committed
111

112
    unless ($user = &List::get_global_user($email)) {
113
	$user = {'email' => $email };
salaun's avatar
salaun committed
114
115
    }    
    unless ($user->{'password'}) {
116
	$user->{'password'} = '';
salaun's avatar
salaun committed
117
118
    }
    
119
120
    if ($user->{'wrong_login_count'} > &Conf::get_robot_conf($robot, 'max_wrong_password')){
	# too many wrong login attemp
121
	&List::update_global_user($email,{wrong_login_count => $user->{'wrong_login_count'}+1}) ;
122
	&report::reject_report_web('user','too_many_wrong_login',{}) unless ($ENV{'SYMPA_SOAP'});
123
	&Log::do_log('err','login is blocked : too many wrong password submission for %s', $email);
124
125
	return undef;
    }
126
    foreach my $auth_service (@{$Conf{'auth_services'}{$robot}}){
127
	next if ($auth_service->{'auth_type'} eq 'authentication_info_url');
salaun's avatar
salaun committed
128
129
	next if ($email !~ /$auth_service->{'regexp'}/i);
	next if (($email =~ /$auth_service->{'negative_regexp'}/i)&&($auth_service->{'negative_regexp'}));
david.verdin's avatar
david.verdin committed
130
131
132

	## Only 'user_table' and 'ldap' backends will need that Sympa collects the user passwords
	## Other backends are Single Sign-On solutions
salaun's avatar
salaun committed
133
	if ($auth_service->{'auth_type'} eq 'user_table') {
134
	    my $fingerprint = &password_fingerprint ($pwd);	    	    
135
	    
136
	    if ($fingerprint eq $user->{'password'}) {
137
		&List::update_global_user($email,{wrong_login_count => 0}) ;
138
139
140
141
		return {'user' => $user,
			'auth' => 'classic',
			'alt_emails' => {$email => 'classic'}
			};
salaun's avatar
salaun committed
142
143
	    }
	}elsif($auth_service->{'auth_type'} eq 'ldap') {
144
	    if ($canonic = &ldap_authentication($robot, $auth_service, $email,$pwd,'email_filter')){
145
		unless($user = &List::get_global_user($canonic)){
salaun's avatar
salaun committed
146
147
		    $user = {'email' => $canonic};
		}
148
		&List::update_global_user($canonic,{wrong_login_count => 0}) ;
149
150
151
152
		return {'user' => $user,
			'auth' => 'ldap',
			'alt_emails' => {$email => 'ldap'}
			};
salaun's avatar
salaun committed
153
154
155
	    }
	}
    }
salaun's avatar
salaun committed
156

157
    # increment wrong login count.
158
    &List::update_global_user($email,{wrong_login_count =>$user->{'wrong_login_count'}+1}) ;
159

160
    &report::reject_report_web('user','incorrect_passwd',{}) unless ($ENV{'SYMPA_SOAP'});
161
    &Log::do_log('err','authentication: incorrect password for user %s', $email);
salaun's avatar
salaun committed
162
163
164
165
166
167
168
169

    $param->{'init_email'} = $email;
    $param->{'escaped_init_email'} = &tools::escape_chars($email);
    return undef;
}


sub ldap_authentication {
170
171
     my ($robot, $ldap, $auth, $pwd, $whichfilter) = @_;
     my ($mesg, $host,$ldap_passwd,$ldap_anonymous);
172
173
     &Log::do_log('debug2','Auth::ldap_authentication(%s,%s,%s)', $auth,'****',$whichfilter);
     &Log::do_log('debug3','Password used: %s',$pwd);
salaun's avatar
salaun committed
174

175
     unless (&tools::get_filename('etc',{},'auth.conf', $robot)) {
salaun's avatar
salaun committed
176
177
178
179
	 return undef;
     }

     ## No LDAP entry is defined in auth.conf
180
     if ($#{$Conf{'auth_services'}{$robot}} < 0) {
181
	 &Log::do_log('notice', 'Skipping empty auth.conf');
salaun's avatar
salaun committed
182
183
184
	 return undef;
     }

185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
     # only ldap service are to be applied here
     return undef unless ($ldap->{'auth_type'} eq 'ldap');
     
     # skip ldap auth service if the an email address was provided
     # and this email address does not match the corresponding regexp 
     return undef if ($auth =~ /@/ && $auth !~ /$ldap->{'regexp'}/i);
     
     my @alternative_conf = split(/,/,$ldap->{'alternative_email_attribute'});
     my $attrs = $ldap->{'email_attribute'};
     my $filter = $ldap->{'get_dn_by_uid_filter'} if($whichfilter eq 'uid_filter');
     $filter = $ldap->{'get_dn_by_email_filter'} if($whichfilter eq 'email_filter');
     $filter =~ s/\[sender\]/$auth/ig;
     
     ## bind in order to have the user's DN
     my $param = &tools::dup_var($ldap);
200
     my $ds = new LDAPSource($param);
201
202
     
     unless (defined $ds && ($ldap_anonymous = $ds->connect())) {
203
       &Log::do_log('err',"Unable to connect to the LDAP server '%s'", $ldap->{'host'});
204
       return undef;
salaun's avatar
salaun committed
205
     }
206
207
208
209
210
211
212
213
     
     
     $mesg = $ldap_anonymous->search(base => $ldap->{'suffix'},
				     filter => "$filter",
				     scope => $ldap->{'scope'} ,
				     timeout => $ldap->{'timeout'});
     
     if ($mesg->count() == 0) {
214
       &Log::do_log('notice','No entry in the Ldap Directory Tree of %s for %s',$ldap->{'host'},$auth);
215
216
       $ds->disconnect();
       return undef;
salaun's avatar
salaun committed
217
     }
218
219
220
221
222
223
224
225
226
     
     my $refhash=$mesg->as_struct();
     my (@DN) = keys(%$refhash);
     $ds->disconnect();
     
     ##  bind with the DN and the pwd
     
     ## Duplicate structure first
     ## Then set the bind_dn and password according to the current user
227
     $param = &tools::dup_var($ldap);
228
229
230
     $param->{'ldap_bind_dn'} = $DN[0];
     $param->{'ldap_bind_password'} = $pwd;
     
231
     $ds = new LDAPSource($param);
232
233
     
     unless (defined $ds && ($ldap_passwd = $ds->connect())) {
234
       &Log::do_log('err',"Unable to connect to the LDAP server '%s'", $param->{'host'});
235
       return undef;
salaun's avatar
salaun committed
236
237
     }
     
238
239
240
241
242
243
244
     $mesg= $ldap_passwd->search ( base => $ldap->{'suffix'},
				   filter => "$filter",
				   scope => $ldap->{'scope'},
				   timeout => $ldap->{'timeout'}
				 );
     
     if ($mesg->count() == 0 || $mesg->code() != 0) {
245
       &Log::do_log('notice',"No entry in the Ldap Directory Tree of %s", $ldap->{'host'});
246
247
       $ds->disconnect();
       return undef;
salaun's avatar
salaun committed
248
     }
249
250
251
252
253
254
255
256
257
258
259
260
     
     ## To get the value of the canonic email and the alternative email
     my (@canonic_email, @alternative);
     
     ## Keep previous alt emails not from LDAP source
     my $previous = {};
     foreach my $alt (keys %{$param->{'alt_emails'}}) {
       $previous->{$alt} = $param->{'alt_emails'}{$alt} if ($param->{'alt_emails'}{$alt} ne 'ldap');
     }
     $param->{'alt_emails'} = {};
     
     my $entry = $mesg->entry(0);
261
     @canonic_email = $entry->get_value($attrs, 'alloptions' => 1);
262
263
264
265
266
267
     foreach my $email (@canonic_email){
       my $e = lc($email);
       $param->{'alt_emails'}{$e} = 'ldap' if ($e);
     }
     
     foreach my $attribute_value (@alternative_conf){
268
       @alternative = $entry->get_value($attribute_value, 'alloptions' => 1);
269
270
271
272
273
274
275
276
277
278
279
       foreach my $alter (@alternative){
	 my $a = lc($alter); 
	 $param->{'alt_emails'}{$a} = 'ldap' if($a) ;
       }
     }
     
     ## Restore previous emails
     foreach my $alt (keys %{$previous}) {
       $param->{'alt_emails'}{$alt} = $previous->{$alt};
     }
     
280
281
     $ds->disconnect() or &Log::do_log('notice', "unable to unbind");
     &Log::do_log('debug3',"canonic: $canonic_email[0]");
282
283
     ## If the identifier provided was a valid email, return the provided email.
     ## Otherwise, return the canonical email guessed after the login.
284
     if( &tools::valid_email($auth) && !&Conf::get_robot_conf($robot,'ldap_force_canonical_email')) {
285
286
287
288
289
	 return ($auth);
     }else{
	 return lc($canonic_email[0]);
     } 
}
salaun's avatar
salaun committed
290
291
292


# fetch user email using his cas net_id and the paragrapah number in auth.conf
293
sub get_email_by_net_id {
salaun's avatar
salaun committed
294
    
295
    my $robot = shift;
salaun's avatar
salaun committed
296
    my $auth_id = shift;
297
    my $attributes = shift;
298
    
299
    &Log::do_log ('debug',"Auth::get_email_by_net_id($auth_id,$attributes->{'uid'})");
300
301
302
303
304
305
306
307
308
309
310
311
    
    if (defined $Conf{'auth_services'}{$robot}[$auth_id]{'internal_email_by_netid'}) {
	my $sso_config = @{$Conf{'auth_services'}{$robot}}[$auth_id];
	my $netid_cookie = $sso_config->{'netid_http_header'} ;
	
	$netid_cookie =~ s/(\w+)/$attributes->{$1}/ig;
	
	$email = &List::get_netidtoemail_db($robot, $netid_cookie, $Conf{'auth_services'}{$robot}[$auth_id]{'service_id'});
	
	return $email;
    }
 
312
    my $ldap = @{$Conf{'auth_services'}{$robot}}[$auth_id];
313

314
    my $param = &tools::dup_var($ldap);
315
    my $ds = new LDAPSource($param);
316
    my $ldap_anonymous;
salaun's avatar
salaun committed
317
    
318
    unless (defined $ds && ($ldap_anonymous = $ds->connect())) {
319
	&Log::do_log('err',"Unable to connect to the LDAP server '%s'", $ldap->{'ldap_host'});
salaun's avatar
salaun committed
320
321
322
323
	return undef;
    }

    my $filter = $ldap->{'ldap_get_email_by_uid_filter'} ;
324
    $filter =~ s/\[([\w-]+)\]/$attributes->{$1}/ig;
salaun's avatar
salaun committed
325
326
327
328
329
330
331
332
333
334
335
336

#	my @alternative_conf = split(/,/,$ldap->{'alternative_email_attribute'});
		
	my $emails= $ldap_anonymous->search ( base => $ldap->{'ldap_suffix'},
				      filter => $filter,
				      scope => $ldap->{'ldap_scope'},
				      timeout => $ldap->{'ldap_timeout'},
				      attrs =>  $ldap->{'ldap_email_attribute'}
				      );
	my $count = $emails->count();

	if ($emails->count() == 0) {
337
	    &Log::do_log('notice',"No entry in the Ldap Directory Tree of %s", $host);
338
339
	$ds->disconnect();
	return undef;
salaun's avatar
salaun committed
340
341
	}

342
343
344
    $ds->disconnect();
    
    ## return only the first attribute
salaun's avatar
salaun committed
345
346
347
348
349
350
351
	my @results = $emails->entries;
	foreach my $result (@results){
	    return (lc($result->get_value($ldap->{'ldap_email_attribute'})));
	}

 }

352
353
354
355
# check trusted_application_name et trusted_application_password : return 1 or undef;
sub remote_app_check_password {
    
    my ($trusted_application_name,$password,$robot) = @_;
356
    &Log::do_log('debug','Auth::remote_app_check_password (%s,%s)',$trusted_application_name,$robot);
357
    
358
    my $md5 = &tools::md5_fingerprint($password);
359
360
361
362
363
    
    my $vars;
    # seach entry for trusted_application in Conf
    my @trusted_apps ;
    
364
365
    # select trusted_apps from robot context or sympa context
    @trusted_apps = @{&Conf::get_robot_conf($robot,'trusted_applications')};
366
367
368
    
    foreach my $application (@trusted_apps){
	
369
 	if (lc($application->{'name'}) eq lc($trusted_application_name)) {
370
 	    if ($md5 eq $application->{'md5password'}) {
371
 		# &Log::do_log('debug', 'Auth::remote_app_check_password : authentication succeed for %s',$application->{'name'});
372
373
374
375
376
377
 		my %proxy_for_vars ;
 		foreach my $varname (@{$application->{'proxy_for_variables'}}) {
 		    $proxy_for_vars{$varname}=1;
 		}		
 		return (\%proxy_for_vars);
 	    }else{
378
 		&Log::do_log('info', 'Auth::remote_app_check_password: bad password from %s', $trusted_application_name);
379
380
381
382
383
 		return undef;
 	    }
 	}
    }				 
    # no matching application found
384
    &Log::do_log('info', 'Auth::remote_app-check_password: unknown application name %s', $trusted_application_name);
385
386
387
    return undef;
}
 
388
389
390
391
392
393
394
# create new entry in one_time_ticket table using a rand as id so later access is authenticated
#

sub create_one_time_ticket {
    my $email = shift;
    my $robot = shift;
    my $data_string = shift;
395
    my $remote_addr = shift; ## Value may be 'mail' if the IP address is not known
396
397

    my $ticket = &SympaSession::get_random();
398
    &Log::do_log('info', 'Auth::create_one_time_ticket(%s,%s,%s,%s) value = %s',$email,$robot,$data_string,$remote_addr,$ticket);
399
400
401
402

    my $date = time;
    my $sth;
    
403
    unless (&SDM::do_query("INSERT INTO one_time_ticket_table (ticket_one_time_ticket, robot_one_time_ticket, email_one_time_ticket, date_one_time_ticket, data_one_time_ticket, remote_addr_one_time_ticket, status_one_time_ticket) VALUES (%s, %s, %s, %d, %s, %s, %s)",&SDM::quote($ticket),&SDM::quote($robot),&SDM::quote($email),time,&SDM::quote($data_string),&SDM::quote($remote_addr),&SDM::quote('open'))) {
404
	&Log::do_log('err','Unable to insert new one time ticket for user %s, robot %s in the database',$email,$robot);
405
406
407
408
409
410
411
412
413
414
415
	return undef;
    }   
    return $ticket;
}

# read one_time_ticket from table and remove it
#
sub get_one_time_ticket {
    my $ticket_number = shift;
    my $addr = shift; 
    
416
    &Log::do_log('debug2', '(%s)',$ticket_number);
417
418
419
    
    my $sth;
    
420
    unless ($sth = &SDM::do_query("SELECT ticket_one_time_ticket AS ticket, robot_one_time_ticket AS robot, email_one_time_ticket AS email, date_one_time_ticket AS \"date\", data_one_time_ticket AS data, remote_addr_one_time_ticket AS remote_addr, status_one_time_ticket as status FROM one_time_ticket_table WHERE ticket_one_time_ticket = %s ", &SDM::quote($ticket_number))) {
421
	&Log::do_log('err','Unable to retrieve one time ticket %s from database',$ticket_number);
422
423
424
	return {'result'=>'error'};
    }
 
425
    my $ticket = $sth->fetchrow_hashref('NAME_lc');
426
427
    
    unless ($ticket) {	
428
	&Log::do_log('info','Auth::get_one_time_ticket: Unable to find one time ticket %s', $ticket);
429
430
431
432
433
434
435
436
	return {'result'=>'not_found'};
    }
    
    my $result;
    my $printable_date = gettext_strftime "%d %b %Y at %H:%M:%S", localtime($ticket->{'date'});

    if ($ticket->{'status'} ne 'open') {
	$result = 'closed';
437
	&Log::do_log('info','Auth::get_one_time_ticket: ticket %s from %s has been used before (%s)',$ticket_number,$ticket->{'email'},$printable_date);
438
439
    }
    elsif (time - $ticket->{'date'} > 48 * 60 * 60) {
440
	&Log::do_log('info','Auth::get_one_time_ticket: ticket %s from %s refused because expired (%s)',$ticket_number,$ticket->{'email'},$printable_date);
441
442
443
444
	$result = 'expired';
    }else{
	$result = 'success';
    }
445
    unless (&SDM::do_query("UPDATE one_time_ticket_table SET status_one_time_ticket = %s WHERE (ticket_one_time_ticket=%s)", &SDM::quote($addr), &SDM::quote($ticket_number))) {
446
    	&Log::do_log('err','Unable to set one time ticket %s status to %s',$ticket_number, $addr);
447
448
    }

449
    &Log::do_log('info', 'Auth::get_one_time_ticket(%s) : result : %s',$ticket_number,$result);
450
451
452
453
454
455
456
457
458
459
    return {'result'=>$result,
	    'date'=>$ticket->{'date'},
	    'email'=>$ticket->{'email'},
	    'remote_addr'=>$ticket->{'remote_addr'},
	    'robot'=>$ticket->{'robot'},
	    'data'=>$ticket->{'data'},
	    'status'=>$ticket->{'status'}
	};
}
    
salaun's avatar
salaun committed
460
1;