Commit | Line | Data |
---|---|---|
0337d704 | 1 | <?php |
2 | /*************************************************************************** | |
5e1513f6 | 3 | * Copyright (C) 2003-2011 Polytechnique.org * |
0337d704 | 4 | * http://opensource.polytechnique.org/ * |
5 | * * | |
6 | * This program is free software; you can redistribute it and/or modify * | |
7 | * it under the terms of the GNU General Public License as published by * | |
8 | * the Free Software Foundation; either version 2 of the License, or * | |
9 | * (at your option) any later version. * | |
10 | * * | |
11 | * This program is distributed in the hope that it will be useful, * | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of * | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * | |
14 | * GNU General Public License for more details. * | |
15 | * * | |
16 | * You should have received a copy of the GNU General Public License * | |
17 | * along with this program; if not, write to the Free Software * | |
18 | * Foundation, Inc., * | |
19 | * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * | |
20 | ***************************************************************************/ | |
21 | ||
c0799142 | 22 | class XorgSession extends PlSession |
0337d704 | 23 | { |
45dd32db FB |
24 | const INVALID_USER = -2; |
25 | const NO_COOKIE = -1; | |
26 | const COOKIE_SUCCESS = 0; | |
27 | const INVALID_COOKIE = 1; | |
28 | ||
c0799142 FB |
29 | public function __construct() |
30 | { | |
31 | parent::__construct(); | |
abde67b1 FB |
32 | } |
33 | ||
c0799142 | 34 | public function startAvailableAuth() |
5480a216 | 35 | { |
c0799142 | 36 | if (!S::logged()) { |
45dd32db FB |
37 | switch ($this->tryCookie()) { |
38 | case self::COOKIE_SUCCESS: | |
39 | if (!$this->start(AUTH_COOKIE)) { | |
40 | return false; | |
41 | } | |
42 | break; | |
43 | ||
44 | case self::INVALID_USER: | |
45 | case self::INVALID_COOKIE: | |
c0799142 FB |
46 | return false; |
47 | } | |
5480a216 | 48 | } |
0be07aa6 | 49 | if ((check_ip('dangerous') && S::has('uid')) || check_account()) { |
9d214e8e | 50 | S::logger()->log("view_page", $_SERVER['REQUEST_URI']); |
0337d704 | 51 | } |
c0799142 | 52 | return true; |
0337d704 | 53 | } |
54 | ||
1bf36cd1 | 55 | /** Check the cookie and set the associated uid in the auth_by_cookie session variable. |
c0799142 FB |
56 | */ |
57 | private function tryCookie() | |
58 | { | |
59 | S::kill('auth_by_cookie'); | |
40565fa2 | 60 | if (Cookie::v('access') == '' || !Cookie::has('uid')) { |
45dd32db | 61 | return self::NO_COOKIE; |
c0799142 | 62 | } |
cab08090 | 63 | |
c67ba12a FB |
64 | $res = XDB::query('SELECT uid, password |
65 | FROM accounts | |
66 | WHERE uid = {?} AND state = \'active\'', | |
8cd3dccc | 67 | Cookie::i('uid')); |
c0799142 FB |
68 | if ($res->numRows() != 0) { |
69 | list($uid, $password) = $res->fetchOneRow(); | |
45dd32db | 70 | if (sha1($password) == Cookie::v('access')) { |
c0799142 | 71 | S::set('auth_by_cookie', $uid); |
45dd32db | 72 | return self::COOKIE_SUCCESS; |
c0799142 | 73 | } else { |
45dd32db | 74 | return self::INVALID_COOKIE; |
c0799142 FB |
75 | } |
76 | } | |
45dd32db | 77 | return self::INVALID_USER; |
c0799142 FB |
78 | } |
79 | ||
80 | private function checkPassword($uname, $login, $response, $login_type) | |
5480a216 | 81 | { |
675f3174 FB |
82 | if ($login_type == 'alias') { |
83 | $res = XDB::query('SELECT a.uid, a.password | |
f036c896 SJ |
84 | FROM accounts AS a |
85 | INNER JOIN email_source_account AS e ON (e.uid = a.uid) | |
86 | WHERE e.email = {?}', | |
87 | $login); | |
675f3174 FB |
88 | } else { |
89 | $res = XDB::query('SELECT uid, password | |
90 | FROM accounts | |
91 | WHERE ' . $login_type . ' = {?}', | |
92 | $login); | |
93 | } | |
c0799142 | 94 | if (list($uid, $password) = $res->fetchOneRow()) { |
c67ba12a | 95 | $expected_response = sha1("$uname:$password:" . S::v('challenge')); |
7a12b2ca | 96 | /* Deprecates len(password) > 10 conversion. */ |
c0799142 | 97 | if ($response != $expected_response) { |
86777849 FB |
98 | if (!S::logged()) { |
99 | Platal::page()->trigError('Mot de passe ou nom d\'utilisateur invalide'); | |
100 | } else { | |
101 | Platal::page()->trigError('Mot de passe invalide'); | |
102 | } | |
732e5855 | 103 | S::logger($uid)->log('auth_fail', 'bad password'); |
c0799142 FB |
104 | return null; |
105 | } | |
106 | return $uid; | |
107 | } | |
c6bad0e7 | 108 | Platal::page()->trigError('Mot de passe ou nom d\'utilisateur invalide'); |
c0799142 | 109 | return null; |
0337d704 | 110 | } |
cab08090 | 111 | |
0337d704 | 112 | |
c0799142 FB |
113 | /** Check auth. |
114 | */ | |
115 | protected function doAuth($level) | |
0337d704 | 116 | { |
e74411f7 | 117 | global $globals; |
c0799142 FB |
118 | |
119 | /* Cookie authentication | |
120 | */ | |
121 | if ($level == AUTH_COOKIE && !S::has('auth_by_cookie')) { | |
122 | $this->tryCookie(); | |
123 | } | |
124 | if ($level == AUTH_COOKIE && S::has('auth_by_cookie')) { | |
125 | if (!S::logged()) { | |
126 | S::set('auth', AUTH_COOKIE); | |
127 | } | |
19fdac5d | 128 | return User::getSilentWithUID(S::i('auth_by_cookie')); |
e74411f7 | 129 | } |
0337d704 | 130 | |
c0799142 FB |
131 | |
132 | /* We want to do auth... we must have infos from a form. | |
133 | */ | |
e64c8b61 | 134 | if (!Post::has('username') || !Post::has('response') || !S::has('challenge')) { |
c0799142 | 135 | return null; |
63528107 | 136 | } |
137 | ||
c0799142 FB |
138 | /** We come from an authentication form. |
139 | */ | |
0c02607e FB |
140 | if (S::suid()) { |
141 | $login = $uname = S::suid('uid'); | |
675f3174 | 142 | $loginType = 'uid'; |
e74411f7 | 143 | } else { |
675f3174 FB |
144 | $uname = Post::v('username'); |
145 | if (Post::s('domain') == "alias") { | |
3d3797ad | 146 | $login = XDB::fetchOneCell('SELECT uid |
08d33afc SJ |
147 | FROM email_source_account |
148 | WHERE email = {?} AND type = \'alias_aux\'', | |
149 | $uname); | |
3d3797ad | 150 | $loginType = 'uid'; |
d05cf8d4 | 151 | } else if (Post::s('domain') == 'hruid') { |
675f3174 | 152 | $login = $uname; |
675f3174 | 153 | $loginType = 'hruid'; |
0337d704 | 154 | } else { |
e74411f7 | 155 | $login = $uname; |
20edd399 | 156 | $loginType = is_numeric($uname) ? 'uid' : 'alias'; |
0337d704 | 157 | } |
63528107 | 158 | } |
cab08090 | 159 | |
675f3174 | 160 | $uid = $this->checkPassword($uname, $login, Post::v('response'), $loginType); |
0c02607e FB |
161 | if (!is_null($uid) && S::suid()) { |
162 | if (S::suid('uid') == $uid) { | |
888465dd FB |
163 | $uid = S::i('uid'); |
164 | } else { | |
165 | $uid = null; | |
166 | } | |
167 | } | |
c0799142 FB |
168 | if (!is_null($uid)) { |
169 | S::set('auth', AUTH_MDP); | |
0c02607e | 170 | if (!S::suid()) { |
888465dd | 171 | if (Post::has('domain')) { |
675f3174 FB |
172 | $domain = Post::v('domain', 'login'); |
173 | if ($domain == 'alias') { | |
40565fa2 | 174 | Cookie::set('domain', 'alias', 300); |
675f3174 FB |
175 | } else if ($domain == 'ax') { |
176 | Cookie::set('domain', 'ax', 300); | |
888465dd | 177 | } else { |
40565fa2 | 178 | Cookie::kill('domain'); |
888465dd | 179 | } |
e74411f7 | 180 | } |
181 | } | |
c0799142 | 182 | S::kill('challenge'); |
732e5855 | 183 | S::logger($uid)->log('auth_ok'); |
c0799142 | 184 | } |
19fdac5d | 185 | return User::getSilentWithUID($uid); |
c0799142 | 186 | } |
cab08090 | 187 | |
e2cb093d | 188 | protected function startSessionAs($user, $level) |
c0799142 | 189 | { |
b281eb7b | 190 | if ((!is_null(S::user()) && S::user()->id() != $user->id()) |
e2cb093d | 191 | || (S::has('uid') && S::i('uid') != $user->id())) { |
c0799142 FB |
192 | return false; |
193 | } else if (S::has('uid')) { | |
194 | return true; | |
195 | } | |
888465dd FB |
196 | if ($level == AUTH_SUID) { |
197 | S::set('auth', AUTH_MDP); | |
c0799142 | 198 | } |
70232020 | 199 | |
2ab3486b | 200 | // Loads uid and hruid into the session for developement conveniance. |
81b0f4ed | 201 | $_SESSION = array_merge($_SESSION, array('uid' => $user->id(), 'hruid' => $user->hruid, 'token' => $user->token, 'user' => $user)); |
6672b29b VZ |
202 | |
203 | // Starts the session's logger, and sets up the permanent cookie. | |
0c02607e FB |
204 | if (S::suid()) { |
205 | S::logger()->log("suid_start", S::v('hruid') . ' by ' . S::suid('hruid')); | |
c0799142 | 206 | } else { |
e2cb093d FB |
207 | S::logger()->saveLastSession(); |
208 | Cookie::set('uid', $user->id(), 300); | |
a90cde48 | 209 | |
e2cb093d FB |
210 | if (S::i('auth_by_cookie') == $user->id() || Post::v('remember', 'false') == 'true') { |
211 | $this->setAccessCookie(false, S::i('auth_by_cookie') != $user->id()); | |
c0799142 | 212 | } else { |
604dfd58 | 213 | $this->killAccessCookie(); |
0337d704 | 214 | } |
63528107 | 215 | } |
b0b937fd | 216 | |
6672b29b | 217 | // Finalizes the session setup. |
2ab3486b | 218 | $this->makePerms($user->perms, $user->is_admin); |
c0799142 FB |
219 | $this->securityChecks(); |
220 | $this->setSkin(); | |
ebfdf077 | 221 | $this->updateNbNotifs(); |
c0799142 | 222 | check_redirect(); |
d0621f88 FB |
223 | |
224 | // We should not have to use this private data anymore | |
225 | S::kill('auth_by_cookie'); | |
c0799142 | 226 | return true; |
0337d704 | 227 | } |
228 | ||
c0799142 | 229 | private function securityChecks() |
0337d704 | 230 | { |
c0799142 FB |
231 | $mail_subject = array(); |
232 | if (check_account()) { | |
233 | $mail_subject[] = 'Connexion d\'un utilisateur surveillé'; | |
0337d704 | 234 | } |
c0799142 FB |
235 | if (check_ip('unsafe')) { |
236 | $mail_subject[] = 'Une IP surveillee a tente de se connecter'; | |
237 | if (check_ip('ban')) { | |
238 | send_warning_mail(implode(' - ', $mail_subject)); | |
239 | $this->destroy(); | |
240 | Platal::page()->kill('Une erreur est survenue lors de la procédure d\'authentification. ' | |
241 | . 'Merci de contacter au plus vite ' | |
242 | . '<a href="mailto:support@polytechnique.org">support@polytechnique.org</a>'); | |
243 | return false; | |
244 | } | |
0337d704 | 245 | } |
c0799142 FB |
246 | if (count($mail_subject)) { |
247 | send_warning_mail(implode(' - ', $mail_subject)); | |
0337d704 | 248 | } |
249 | } | |
250 | ||
8ebd6f86 VZ |
251 | /** |
252 | * The authentication schema is based on three query parameters: | |
253 | * ?user=<hruid>×tamp=<timestamp>&sig=<sig> | |
254 | * where: | |
255 | * - hruid is the hruid of the querying user | |
256 | * - timestamp is the current UNIX timestamp, which has to be within a | |
257 | * given distance of the server-side UNIX timestamp | |
258 | * - sig is the HMAC of "<method>#<resource>#<payload>#<timestamp>" using | |
259 | * a known secret of the user as the key. | |
260 | * | |
261 | * At the moment, the shared secret of the user is the sha1 hash of its | |
262 | * password. This is temporary, though, until better support for tokens is | |
263 | * implemented in plat/al. | |
264 | * TODO(vzanotti): Switch to dedicated secrets for authentication. | |
265 | */ | |
266 | public function apiAuth($method, $resource, $payload) | |
267 | { | |
268 | // Verify that the timestamp is within acceptable bounds. | |
269 | $timestamp = Env::i('timestamp', 0); | |
270 | if (abs($timestamp - time()) > Platal::globals()->api->timestamp_tolerance) { | |
271 | return null; | |
272 | } | |
273 | ||
274 | // Retrieve the user corresponding to the forlife. Note that at the | |
275 | // moment, other aliases are also accepted. | |
276 | $user = User::getSilent(Env::s('user', '')); | |
277 | if (is_null($user) || !$user->isActive()) { | |
278 | return null; | |
279 | } | |
280 | ||
281 | // Determine the list of tokens associated with the user. At the moment, | |
282 | // this is just the sha1 of the password. | |
283 | $tokens = array($user->password()); | |
284 | ||
285 | // For each token, try to validate the signature. | |
286 | $message = implode('#', array($method, $resource, $payload, $timestamp)); | |
287 | $signature = Env::s('sig'); | |
288 | foreach ($tokens as $token) { | |
289 | $expected_signature = hash_hmac( | |
290 | Platal::globals()->api->hmac_algo, $message, $token); | |
291 | if ($signature == $expected_signature) { | |
292 | return $user; | |
293 | } | |
294 | } | |
295 | ||
296 | return null; | |
297 | } | |
298 | ||
0d44ce42 FB |
299 | public function tokenAuth($login, $token) |
300 | { | |
1bf36cd1 | 301 | $res = XDB::query('SELECT a.uid, a.hruid |
c3e97f0c FB |
302 | FROM accounts AS a |
303 | WHERE a.token = {?} AND a.hruid = {?} AND a.state = \'active\'', | |
304 | $token, $login); | |
0d44ce42 | 305 | if ($res->numRows() == 1) { |
8c12f931 | 306 | return new User(null, $res->fetchOneAssoc()); |
0d44ce42 FB |
307 | } |
308 | return null; | |
309 | } | |
310 | ||
365ba8c3 | 311 | protected function makePerms($perm, $is_admin) |
bf517daf | 312 | { |
365ba8c3 | 313 | S::set('perms', User::makePerms($perm, $is_admin)); |
bf517daf | 314 | } |
315 | ||
c0799142 FB |
316 | public function setSkin() |
317 | { | |
0c02607e | 318 | if (S::logged() && (!S::has('skin') || S::suid())) { |
c67ba12a FB |
319 | $res = XDB::query('SELECT skin_tpl |
320 | FROM accounts AS a | |
321 | INNER JOIN skins AS s on (a.skin = s.id) | |
322 | WHERE a.uid = {?} AND skin_tpl != \'\'', S::i('uid')); | |
c0799142 | 323 | S::set('skin', $res->fetchOneCell()); |
5480a216 | 324 | } |
325 | } | |
0337d704 | 326 | |
faa06583 FB |
327 | public function loggedLevel() |
328 | { | |
329 | return AUTH_COOKIE; | |
330 | } | |
331 | ||
c0799142 FB |
332 | public function sureLevel() |
333 | { | |
334 | return AUTH_MDP; | |
0337d704 | 335 | } |
ebfdf077 FB |
336 | |
337 | ||
338 | public function updateNbNotifs() | |
339 | { | |
009b8ab7 FB |
340 | require_once 'notifs.inc.php'; |
341 | $user = S::user(); | |
069ddda8 | 342 | $n = Watch::getCount($user); |
009b8ab7 | 343 | S::set('notifs', $n); |
ebfdf077 | 344 | } |
604dfd58 FB |
345 | |
346 | public function setAccessCookie($replace = false, $log = true) { | |
0c02607e | 347 | if (S::suid() || ($replace && !Cookie::blank('access'))) { |
604dfd58 FB |
348 | return; |
349 | } | |
45dd32db | 350 | Cookie::set('access', sha1(S::user()->password()), 300, true); |
604dfd58 FB |
351 | if ($log) { |
352 | S::logger()->log('cookie_on'); | |
353 | } | |
354 | } | |
355 | ||
356 | public function killAccessCookie($log = true) { | |
357 | Cookie::kill('access'); | |
358 | if ($log) { | |
359 | S::logger()->log('cookie_off'); | |
360 | } | |
361 | } | |
362 | ||
363 | public function killLoginFormCookies() { | |
364 | Cookie::kill('uid'); | |
365 | Cookie::kill('domain'); | |
366 | } | |
0337d704 | 367 | } |
368 | ||
a7de4ef7 | 369 | // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8: |
0337d704 | 370 | ?> |