Commit | Line | Data |
---|---|---|
0337d704 | 1 | <?php |
2 | /*************************************************************************** | |
5e1513f6 | 3 | * Copyright (C) 2003-2011 Polytechnique.org * |
0337d704 | 4 | * http://opensource.polytechnique.org/ * |
5 | * * | |
6 | * This program is free software; you can redistribute it and/or modify * | |
7 | * it under the terms of the GNU General Public License as published by * | |
8 | * the Free Software Foundation; either version 2 of the License, or * | |
9 | * (at your option) any later version. * | |
10 | * * | |
11 | * This program is distributed in the hope that it will be useful, * | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of * | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * | |
14 | * GNU General Public License for more details. * | |
15 | * * | |
16 | * You should have received a copy of the GNU General Public License * | |
17 | * along with this program; if not, write to the Free Software * | |
18 | * Foundation, Inc., * | |
19 | * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * | |
20 | ***************************************************************************/ | |
21 | ||
c0799142 | 22 | class XorgSession extends PlSession |
0337d704 | 23 | { |
45dd32db FB |
24 | const INVALID_USER = -2; |
25 | const NO_COOKIE = -1; | |
26 | const COOKIE_SUCCESS = 0; | |
27 | const INVALID_COOKIE = 1; | |
28 | ||
c0799142 FB |
29 | public function __construct() |
30 | { | |
31 | parent::__construct(); | |
abde67b1 FB |
32 | } |
33 | ||
c0799142 | 34 | public function startAvailableAuth() |
5480a216 | 35 | { |
c0799142 | 36 | if (!S::logged()) { |
45dd32db FB |
37 | switch ($this->tryCookie()) { |
38 | case self::COOKIE_SUCCESS: | |
39 | if (!$this->start(AUTH_COOKIE)) { | |
40 | return false; | |
41 | } | |
42 | break; | |
43 | ||
44 | case self::INVALID_USER: | |
45 | case self::INVALID_COOKIE: | |
c0799142 FB |
46 | return false; |
47 | } | |
5480a216 | 48 | } |
0be07aa6 | 49 | if ((check_ip('dangerous') && S::has('uid')) || check_account()) { |
9d214e8e | 50 | S::logger()->log("view_page", $_SERVER['REQUEST_URI']); |
0337d704 | 51 | } |
c0799142 | 52 | return true; |
0337d704 | 53 | } |
54 | ||
1bf36cd1 | 55 | /** Check the cookie and set the associated uid in the auth_by_cookie session variable. |
c0799142 FB |
56 | */ |
57 | private function tryCookie() | |
58 | { | |
59 | S::kill('auth_by_cookie'); | |
40565fa2 | 60 | if (Cookie::v('access') == '' || !Cookie::has('uid')) { |
45dd32db | 61 | return self::NO_COOKIE; |
c0799142 | 62 | } |
cab08090 | 63 | |
c67ba12a FB |
64 | $res = XDB::query('SELECT uid, password |
65 | FROM accounts | |
66 | WHERE uid = {?} AND state = \'active\'', | |
8cd3dccc | 67 | Cookie::i('uid')); |
c0799142 FB |
68 | if ($res->numRows() != 0) { |
69 | list($uid, $password) = $res->fetchOneRow(); | |
45dd32db | 70 | if (sha1($password) == Cookie::v('access')) { |
c0799142 | 71 | S::set('auth_by_cookie', $uid); |
45dd32db | 72 | return self::COOKIE_SUCCESS; |
c0799142 | 73 | } else { |
45dd32db | 74 | return self::INVALID_COOKIE; |
c0799142 FB |
75 | } |
76 | } | |
45dd32db | 77 | return self::INVALID_USER; |
c0799142 FB |
78 | } |
79 | ||
80 | private function checkPassword($uname, $login, $response, $login_type) | |
5480a216 | 81 | { |
675f3174 FB |
82 | if ($login_type == 'alias') { |
83 | $res = XDB::query('SELECT a.uid, a.password | |
f036c896 SJ |
84 | FROM accounts AS a |
85 | INNER JOIN email_source_account AS e ON (e.uid = a.uid) | |
86 | WHERE e.email = {?}', | |
87 | $login); | |
675f3174 FB |
88 | } else { |
89 | $res = XDB::query('SELECT uid, password | |
90 | FROM accounts | |
91 | WHERE ' . $login_type . ' = {?}', | |
92 | $login); | |
93 | } | |
c0799142 | 94 | if (list($uid, $password) = $res->fetchOneRow()) { |
c67ba12a | 95 | $expected_response = sha1("$uname:$password:" . S::v('challenge')); |
7a12b2ca | 96 | /* Deprecates len(password) > 10 conversion. */ |
c0799142 | 97 | if ($response != $expected_response) { |
86777849 FB |
98 | if (!S::logged()) { |
99 | Platal::page()->trigError('Mot de passe ou nom d\'utilisateur invalide'); | |
100 | } else { | |
101 | Platal::page()->trigError('Mot de passe invalide'); | |
102 | } | |
732e5855 | 103 | S::logger($uid)->log('auth_fail', 'bad password'); |
c0799142 FB |
104 | return null; |
105 | } | |
106 | return $uid; | |
107 | } | |
c6bad0e7 | 108 | Platal::page()->trigError('Mot de passe ou nom d\'utilisateur invalide'); |
c0799142 | 109 | return null; |
0337d704 | 110 | } |
cab08090 | 111 | |
0337d704 | 112 | |
c0799142 FB |
113 | /** Check auth. |
114 | */ | |
115 | protected function doAuth($level) | |
0337d704 | 116 | { |
e74411f7 | 117 | global $globals; |
c0799142 FB |
118 | |
119 | /* Cookie authentication | |
120 | */ | |
121 | if ($level == AUTH_COOKIE && !S::has('auth_by_cookie')) { | |
122 | $this->tryCookie(); | |
123 | } | |
124 | if ($level == AUTH_COOKIE && S::has('auth_by_cookie')) { | |
125 | if (!S::logged()) { | |
126 | S::set('auth', AUTH_COOKIE); | |
127 | } | |
19fdac5d | 128 | return User::getSilentWithUID(S::i('auth_by_cookie')); |
e74411f7 | 129 | } |
0337d704 | 130 | |
c0799142 FB |
131 | |
132 | /* We want to do auth... we must have infos from a form. | |
133 | */ | |
e64c8b61 | 134 | if (!Post::has('username') || !Post::has('response') || !S::has('challenge')) { |
c0799142 | 135 | return null; |
63528107 | 136 | } |
137 | ||
c0799142 FB |
138 | /** We come from an authentication form. |
139 | */ | |
0c02607e FB |
140 | if (S::suid()) { |
141 | $login = $uname = S::suid('uid'); | |
675f3174 | 142 | $loginType = 'uid'; |
e74411f7 | 143 | } else { |
675f3174 FB |
144 | $uname = Post::v('username'); |
145 | if (Post::s('domain') == "alias") { | |
3d3797ad | 146 | $login = XDB::fetchOneCell('SELECT uid |
08d33afc SJ |
147 | FROM email_source_account |
148 | WHERE email = {?} AND type = \'alias_aux\'', | |
149 | $uname); | |
3d3797ad | 150 | $loginType = 'uid'; |
d05cf8d4 | 151 | } else if (Post::s('domain') == 'hruid') { |
675f3174 | 152 | $login = $uname; |
675f3174 | 153 | $loginType = 'hruid'; |
8a0908db SJ |
154 | } else if ((Post::s('domain') == 'email')) { |
155 | $login = XDB::fetchOneCell('SELECT SQL_CALC_FOUND_ROWS uid | |
156 | FROM accounts | |
157 | WHERE email = {?}', | |
158 | $uname); | |
159 | if (!(XDB::fetchOneCell('SELECT FOUND_ROWS()') == 1)) { | |
160 | $login =null; | |
161 | } | |
162 | $loginType = 'uid'; | |
0337d704 | 163 | } else { |
e74411f7 | 164 | $login = $uname; |
20edd399 | 165 | $loginType = is_numeric($uname) ? 'uid' : 'alias'; |
0337d704 | 166 | } |
63528107 | 167 | } |
cab08090 | 168 | |
675f3174 | 169 | $uid = $this->checkPassword($uname, $login, Post::v('response'), $loginType); |
0c02607e FB |
170 | if (!is_null($uid) && S::suid()) { |
171 | if (S::suid('uid') == $uid) { | |
888465dd FB |
172 | $uid = S::i('uid'); |
173 | } else { | |
174 | $uid = null; | |
175 | } | |
176 | } | |
c0799142 FB |
177 | if (!is_null($uid)) { |
178 | S::set('auth', AUTH_MDP); | |
0c02607e | 179 | if (!S::suid()) { |
888465dd | 180 | if (Post::has('domain')) { |
675f3174 FB |
181 | $domain = Post::v('domain', 'login'); |
182 | if ($domain == 'alias') { | |
40565fa2 | 183 | Cookie::set('domain', 'alias', 300); |
675f3174 FB |
184 | } else if ($domain == 'ax') { |
185 | Cookie::set('domain', 'ax', 300); | |
888465dd | 186 | } else { |
40565fa2 | 187 | Cookie::kill('domain'); |
888465dd | 188 | } |
e74411f7 | 189 | } |
190 | } | |
c0799142 | 191 | S::kill('challenge'); |
732e5855 | 192 | S::logger($uid)->log('auth_ok'); |
c0799142 | 193 | } |
19fdac5d | 194 | return User::getSilentWithUID($uid); |
c0799142 | 195 | } |
cab08090 | 196 | |
e2cb093d | 197 | protected function startSessionAs($user, $level) |
c0799142 | 198 | { |
b281eb7b | 199 | if ((!is_null(S::user()) && S::user()->id() != $user->id()) |
e2cb093d | 200 | || (S::has('uid') && S::i('uid') != $user->id())) { |
c0799142 FB |
201 | return false; |
202 | } else if (S::has('uid')) { | |
203 | return true; | |
204 | } | |
888465dd FB |
205 | if ($level == AUTH_SUID) { |
206 | S::set('auth', AUTH_MDP); | |
c0799142 | 207 | } |
70232020 | 208 | |
2ab3486b | 209 | // Loads uid and hruid into the session for developement conveniance. |
81b0f4ed | 210 | $_SESSION = array_merge($_SESSION, array('uid' => $user->id(), 'hruid' => $user->hruid, 'token' => $user->token, 'user' => $user)); |
6672b29b VZ |
211 | |
212 | // Starts the session's logger, and sets up the permanent cookie. | |
0c02607e FB |
213 | if (S::suid()) { |
214 | S::logger()->log("suid_start", S::v('hruid') . ' by ' . S::suid('hruid')); | |
c0799142 | 215 | } else { |
e2cb093d FB |
216 | S::logger()->saveLastSession(); |
217 | Cookie::set('uid', $user->id(), 300); | |
a90cde48 | 218 | |
e2cb093d FB |
219 | if (S::i('auth_by_cookie') == $user->id() || Post::v('remember', 'false') == 'true') { |
220 | $this->setAccessCookie(false, S::i('auth_by_cookie') != $user->id()); | |
c0799142 | 221 | } else { |
604dfd58 | 222 | $this->killAccessCookie(); |
0337d704 | 223 | } |
63528107 | 224 | } |
b0b937fd | 225 | |
6672b29b | 226 | // Finalizes the session setup. |
2ab3486b | 227 | $this->makePerms($user->perms, $user->is_admin); |
c0799142 FB |
228 | $this->securityChecks(); |
229 | $this->setSkin(); | |
ebfdf077 | 230 | $this->updateNbNotifs(); |
c0799142 | 231 | check_redirect(); |
d0621f88 FB |
232 | |
233 | // We should not have to use this private data anymore | |
234 | S::kill('auth_by_cookie'); | |
c0799142 | 235 | return true; |
0337d704 | 236 | } |
237 | ||
c0799142 | 238 | private function securityChecks() |
0337d704 | 239 | { |
c0799142 FB |
240 | $mail_subject = array(); |
241 | if (check_account()) { | |
242 | $mail_subject[] = 'Connexion d\'un utilisateur surveillé'; | |
0337d704 | 243 | } |
c0799142 FB |
244 | if (check_ip('unsafe')) { |
245 | $mail_subject[] = 'Une IP surveillee a tente de se connecter'; | |
246 | if (check_ip('ban')) { | |
247 | send_warning_mail(implode(' - ', $mail_subject)); | |
248 | $this->destroy(); | |
249 | Platal::page()->kill('Une erreur est survenue lors de la procédure d\'authentification. ' | |
250 | . 'Merci de contacter au plus vite ' | |
251 | . '<a href="mailto:support@polytechnique.org">support@polytechnique.org</a>'); | |
252 | return false; | |
253 | } | |
0337d704 | 254 | } |
c0799142 FB |
255 | if (count($mail_subject)) { |
256 | send_warning_mail(implode(' - ', $mail_subject)); | |
0337d704 | 257 | } |
258 | } | |
259 | ||
8ebd6f86 VZ |
260 | /** |
261 | * The authentication schema is based on three query parameters: | |
262 | * ?user=<hruid>×tamp=<timestamp>&sig=<sig> | |
263 | * where: | |
264 | * - hruid is the hruid of the querying user | |
265 | * - timestamp is the current UNIX timestamp, which has to be within a | |
266 | * given distance of the server-side UNIX timestamp | |
267 | * - sig is the HMAC of "<method>#<resource>#<payload>#<timestamp>" using | |
268 | * a known secret of the user as the key. | |
269 | * | |
270 | * At the moment, the shared secret of the user is the sha1 hash of its | |
271 | * password. This is temporary, though, until better support for tokens is | |
272 | * implemented in plat/al. | |
273 | * TODO(vzanotti): Switch to dedicated secrets for authentication. | |
274 | */ | |
275 | public function apiAuth($method, $resource, $payload) | |
276 | { | |
277 | // Verify that the timestamp is within acceptable bounds. | |
278 | $timestamp = Env::i('timestamp', 0); | |
279 | if (abs($timestamp - time()) > Platal::globals()->api->timestamp_tolerance) { | |
280 | return null; | |
281 | } | |
282 | ||
283 | // Retrieve the user corresponding to the forlife. Note that at the | |
284 | // moment, other aliases are also accepted. | |
285 | $user = User::getSilent(Env::s('user', '')); | |
286 | if (is_null($user) || !$user->isActive()) { | |
287 | return null; | |
288 | } | |
289 | ||
290 | // Determine the list of tokens associated with the user. At the moment, | |
291 | // this is just the sha1 of the password. | |
292 | $tokens = array($user->password()); | |
293 | ||
294 | // For each token, try to validate the signature. | |
295 | $message = implode('#', array($method, $resource, $payload, $timestamp)); | |
296 | $signature = Env::s('sig'); | |
297 | foreach ($tokens as $token) { | |
298 | $expected_signature = hash_hmac( | |
299 | Platal::globals()->api->hmac_algo, $message, $token); | |
300 | if ($signature == $expected_signature) { | |
301 | return $user; | |
302 | } | |
303 | } | |
304 | ||
305 | return null; | |
306 | } | |
307 | ||
0d44ce42 FB |
308 | public function tokenAuth($login, $token) |
309 | { | |
1bf36cd1 | 310 | $res = XDB::query('SELECT a.uid, a.hruid |
c3e97f0c FB |
311 | FROM accounts AS a |
312 | WHERE a.token = {?} AND a.hruid = {?} AND a.state = \'active\'', | |
313 | $token, $login); | |
0d44ce42 | 314 | if ($res->numRows() == 1) { |
8c12f931 | 315 | return new User(null, $res->fetchOneAssoc()); |
0d44ce42 FB |
316 | } |
317 | return null; | |
318 | } | |
319 | ||
365ba8c3 | 320 | protected function makePerms($perm, $is_admin) |
bf517daf | 321 | { |
365ba8c3 | 322 | S::set('perms', User::makePerms($perm, $is_admin)); |
bf517daf | 323 | } |
324 | ||
c0799142 FB |
325 | public function setSkin() |
326 | { | |
0c02607e | 327 | if (S::logged() && (!S::has('skin') || S::suid())) { |
c67ba12a FB |
328 | $res = XDB::query('SELECT skin_tpl |
329 | FROM accounts AS a | |
330 | INNER JOIN skins AS s on (a.skin = s.id) | |
331 | WHERE a.uid = {?} AND skin_tpl != \'\'', S::i('uid')); | |
c0799142 | 332 | S::set('skin', $res->fetchOneCell()); |
5480a216 | 333 | } |
334 | } | |
0337d704 | 335 | |
faa06583 FB |
336 | public function loggedLevel() |
337 | { | |
338 | return AUTH_COOKIE; | |
339 | } | |
340 | ||
c0799142 FB |
341 | public function sureLevel() |
342 | { | |
343 | return AUTH_MDP; | |
0337d704 | 344 | } |
ebfdf077 FB |
345 | |
346 | ||
347 | public function updateNbNotifs() | |
348 | { | |
009b8ab7 FB |
349 | require_once 'notifs.inc.php'; |
350 | $user = S::user(); | |
069ddda8 | 351 | $n = Watch::getCount($user); |
009b8ab7 | 352 | S::set('notifs', $n); |
ebfdf077 | 353 | } |
604dfd58 FB |
354 | |
355 | public function setAccessCookie($replace = false, $log = true) { | |
0c02607e | 356 | if (S::suid() || ($replace && !Cookie::blank('access'))) { |
604dfd58 FB |
357 | return; |
358 | } | |
45dd32db | 359 | Cookie::set('access', sha1(S::user()->password()), 300, true); |
604dfd58 FB |
360 | if ($log) { |
361 | S::logger()->log('cookie_on'); | |
362 | } | |
363 | } | |
364 | ||
365 | public function killAccessCookie($log = true) { | |
366 | Cookie::kill('access'); | |
367 | if ($log) { | |
368 | S::logger()->log('cookie_off'); | |
369 | } | |
370 | } | |
371 | ||
372 | public function killLoginFormCookies() { | |
373 | Cookie::kill('uid'); | |
374 | Cookie::kill('domain'); | |
375 | } | |
0337d704 | 376 | } |
377 | ||
a7de4ef7 | 378 | // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8: |
0337d704 | 379 | ?> |