| 1 | <?php |
| 2 | /*************************************************************************** |
| 3 | * Copyright (C) 2003-2010 Polytechnique.org * |
| 4 | * http://opensource.polytechnique.org/ * |
| 5 | * * |
| 6 | * This program is free software; you can redistribute it and/or modify * |
| 7 | * it under the terms of the GNU General Public License as published by * |
| 8 | * the Free Software Foundation; either version 2 of the License, or * |
| 9 | * (at your option) any later version. * |
| 10 | * * |
| 11 | * This program is distributed in the hope that it will be useful, * |
| 12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of * |
| 13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * |
| 14 | * GNU General Public License for more details. * |
| 15 | * * |
| 16 | * You should have received a copy of the GNU General Public License * |
| 17 | * along with this program; if not, write to the Free Software * |
| 18 | * Foundation, Inc., * |
| 19 | * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * |
| 20 | ***************************************************************************/ |
| 21 | |
| 22 | class XorgSession extends PlSession |
| 23 | { |
| 24 | public function __construct() |
| 25 | { |
| 26 | parent::__construct(); |
| 27 | } |
| 28 | |
| 29 | public function startAvailableAuth() |
| 30 | { |
| 31 | if (!S::logged()) { |
| 32 | $cookie = $this->tryCookie(); |
| 33 | if ($cookie == 0) { |
| 34 | return $this->start(AUTH_COOKIE); |
| 35 | } else if ($cookie == 1 || $cookie == -2) { |
| 36 | return false; |
| 37 | } |
| 38 | } |
| 39 | if ((check_ip('dangerous') && S::has('uid')) || check_account()) { |
| 40 | S::logger()->log("view_page", $_SERVER['REQUEST_URI']); |
| 41 | } |
| 42 | return true; |
| 43 | } |
| 44 | |
| 45 | /** Check the cookie and set the associated user_id in the auth_by_cookie session variable. |
| 46 | */ |
| 47 | private function tryCookie() |
| 48 | { |
| 49 | S::kill('auth_by_cookie'); |
| 50 | if (Cookie::v('access') == '' || !Cookie::has('uid')) { |
| 51 | return -1; |
| 52 | } |
| 53 | |
| 54 | $res = XDB::query('SELECT user_id, password |
| 55 | FROM auth_user_md5 |
| 56 | WHERE user_id = {?} AND perms IN(\'admin\', \'user\')', |
| 57 | Cookie::i('uid')); |
| 58 | if ($res->numRows() != 0) { |
| 59 | list($uid, $password) = $res->fetchOneRow(); |
| 60 | require_once 'secure_hash.inc.php'; |
| 61 | $expected_value = hash_encrypt($password); |
| 62 | if ($expected_value == Cookie::v('access')) { |
| 63 | S::set('auth_by_cookie', $uid); |
| 64 | return 0; |
| 65 | } else { |
| 66 | return 1; |
| 67 | } |
| 68 | } |
| 69 | return -2; |
| 70 | } |
| 71 | |
| 72 | private function checkPassword($uname, $login, $response, $login_type) |
| 73 | { |
| 74 | $res = XDB::query('SELECT u.user_id, u.password |
| 75 | FROM auth_user_md5 AS u |
| 76 | INNER JOIN aliases AS a ON (a.id = u.user_id AND type != \'homonyme\') |
| 77 | WHERE a.' . $login_type . ' = {?} AND u.perms IN(\'admin\', \'user\')', |
| 78 | $login); |
| 79 | if (list($uid, $password) = $res->fetchOneRow()) { |
| 80 | require_once 'secure_hash.inc.php'; |
| 81 | $expected_response = hash_encrypt("$uname:$password:" . S::v('challenge')); |
| 82 | if ($response != $expected_response && Env::has('xorpass') |
| 83 | && !preg_match('/^0*$/', Env::v('xorpass'))) { |
| 84 | $new_password = hash_xor(Env::v('xorpass'), $password); |
| 85 | $expected_response = hash_encrypt("$uname:$new_password:" . S::v('challenge')); |
| 86 | if ($response == $expected_response) { |
| 87 | XDB::execute('UPDATE auth_user_md5 |
| 88 | SET password = {?} |
| 89 | WHERE user_id = {?}', |
| 90 | $new_password, $uid); |
| 91 | |
| 92 | // Update the GoogleApps password as well, if required. |
| 93 | global $globals; |
| 94 | if ($globals->mailstorage->googleapps_domain) { |
| 95 | require_once 'googleapps.inc.php'; |
| 96 | $user = User::getSilent($uid); |
| 97 | $account = new GoogleAppsAccount($user); |
| 98 | if ($account->active() && $account->sync_password) { |
| 99 | $account->set_password($new_password); |
| 100 | } |
| 101 | } |
| 102 | } |
| 103 | } |
| 104 | if ($response != $expected_response) { |
| 105 | if (!S::logged()) { |
| 106 | Platal::page()->trigError('Mot de passe ou nom d\'utilisateur invalide'); |
| 107 | } else { |
| 108 | Platal::page()->trigError('Mot de passe invalide'); |
| 109 | } |
| 110 | S::logger($uid)->log('auth_fail', 'bad password'); |
| 111 | return null; |
| 112 | } |
| 113 | return $uid; |
| 114 | } |
| 115 | Platal::page()->trigError('Mot de passe ou nom d\'utilisateur invalide'); |
| 116 | return null; |
| 117 | } |
| 118 | |
| 119 | |
| 120 | /** Check auth. |
| 121 | */ |
| 122 | protected function doAuth($level) |
| 123 | { |
| 124 | global $globals; |
| 125 | |
| 126 | /* Cookie authentication |
| 127 | */ |
| 128 | if ($level == AUTH_COOKIE && !S::has('auth_by_cookie')) { |
| 129 | $this->tryCookie(); |
| 130 | } |
| 131 | if ($level == AUTH_COOKIE && S::has('auth_by_cookie')) { |
| 132 | if (!S::logged()) { |
| 133 | S::set('auth', AUTH_COOKIE); |
| 134 | } |
| 135 | return S::i('auth_by_cookie'); |
| 136 | } |
| 137 | |
| 138 | |
| 139 | /* We want to do auth... we must have infos from a form. |
| 140 | */ |
| 141 | if (!Post::has('username') || !Post::has('response') || !S::has('challenge')) { |
| 142 | return null; |
| 143 | } |
| 144 | |
| 145 | /** We come from an authentication form. |
| 146 | */ |
| 147 | if (S::has('suid')) { |
| 148 | $suid = S::v('suid'); |
| 149 | $login = $uname = $suid['uid']; |
| 150 | $redirect = false; |
| 151 | } else { |
| 152 | $uname = Env::v('username'); |
| 153 | if (Env::v('domain') == "alias") { |
| 154 | $res = XDB::query('SELECT redirect |
| 155 | FROM virtual |
| 156 | INNER JOIN virtual_redirect USING(vid) |
| 157 | WHERE alias LIKE {?}', |
| 158 | $uname . '@' . $globals->mail->alias_dom); |
| 159 | $redirect = $res->fetchOneCell(); |
| 160 | if ($redirect) { |
| 161 | $login = substr($redirect, 0, strpos($redirect, '@')); |
| 162 | } else { |
| 163 | $login = ''; |
| 164 | } |
| 165 | } else { |
| 166 | $login = $uname; |
| 167 | $redirect = false; |
| 168 | } |
| 169 | } |
| 170 | |
| 171 | $uid = $this->checkPassword($uname, $login, Post::v('response'), (!$redirect && is_numeric($uname)) ? 'id' : 'alias'); |
| 172 | if (!is_null($uid) && S::has('suid')) { |
| 173 | $suid = S::v('suid'); |
| 174 | if ($suid['uid'] == $uid) { |
| 175 | $uid = S::i('uid'); |
| 176 | } else { |
| 177 | $uid = null; |
| 178 | } |
| 179 | } |
| 180 | if (!is_null($uid)) { |
| 181 | S::set('auth', AUTH_MDP); |
| 182 | if (!S::has('suid')) { |
| 183 | if (Post::has('domain')) { |
| 184 | if (($domain = Post::v('domain', 'login')) == 'alias') { |
| 185 | Cookie::set('domain', 'alias', 300); |
| 186 | } else { |
| 187 | Cookie::kill('domain'); |
| 188 | } |
| 189 | } |
| 190 | } |
| 191 | S::kill('challenge'); |
| 192 | S::logger($uid)->log('auth_ok'); |
| 193 | } |
| 194 | return $uid; |
| 195 | } |
| 196 | |
| 197 | protected function startSessionAs($uid, $level) |
| 198 | { |
| 199 | if ((!is_null(S::v('user')) && S::i('user') != $uid) || (S::has('uid') && S::i('uid') != $uid)) { |
| 200 | return false; |
| 201 | } else if (S::has('uid')) { |
| 202 | return true; |
| 203 | } |
| 204 | if ($level == AUTH_SUID) { |
| 205 | S::set('auth', AUTH_MDP); |
| 206 | } |
| 207 | |
| 208 | // Retrieves main user properties. |
| 209 | $res = XDB::query("SELECT u.user_id AS uid, u.hruid, prenom, prenom_ini, nom, nom_ini, nom_usage, perms, promo, promo_sortie, |
| 210 | matricule, password, FIND_IN_SET('femme', u.flags) AS femme, |
| 211 | q.core_mail_fmt AS mail_fmt, UNIX_TIMESTAMP(q.banana_last) AS banana_last, q.watch_last, q.core_rss_hash, |
| 212 | FIND_IN_SET('watch', u.flags) AS watch_account, q.last_version, g.g_account_name IS NOT NULL AS googleapps, |
| 213 | UNIX_TIMESTAMP(s.start) AS lastlogin, s.host |
| 214 | FROM auth_user_md5 AS u |
| 215 | INNER JOIN auth_user_quick AS q USING(user_id) |
| 216 | LEFT JOIN gapps_accounts AS g ON (u.user_id = g.l_userid AND g.g_status = 'active') |
| 217 | LEFT JOIN #logger#.last_sessions AS ls ON (ls.uid = u.user_id) |
| 218 | LEFT JOIN #logger#.sessions AS s ON(s.id = ls.id) |
| 219 | WHERE u.user_id = {?} AND u.perms IN('admin', 'user')", $uid); |
| 220 | if ($res->numRows() != 1) { |
| 221 | return false; |
| 222 | } |
| 223 | |
| 224 | $sess = $res->fetchOneAssoc(); |
| 225 | $perms = $sess['perms']; |
| 226 | unset($sess['perms']); |
| 227 | |
| 228 | // Loads the data into the real session. |
| 229 | $_SESSION = array_merge($_SESSION, $sess); |
| 230 | |
| 231 | // Starts the session's logger, and sets up the permanent cookie. |
| 232 | if (S::has('suid')) { |
| 233 | $suid = S::v('suid'); |
| 234 | $logger = S::logger($uid); |
| 235 | $logger->log("suid_start", S::v('hruid') . " by " . $suid['hruid']); |
| 236 | } else { |
| 237 | $logger = S::logger($uid); |
| 238 | $logger->saveLastSession(); |
| 239 | Cookie::set('uid', $uid, 300); |
| 240 | |
| 241 | if (S::i('auth_by_cookie') == $uid || Post::v('remember', 'false') == 'true') { |
| 242 | $this->setAccessCookie(false, S::i('auth_by_cookie') != $uid); |
| 243 | } else { |
| 244 | $this->killAccessCookie(); |
| 245 | } |
| 246 | } |
| 247 | |
| 248 | // Finalizes the session setup. |
| 249 | S::set('perms', User::makePerms($perms)); |
| 250 | $this->securityChecks(); |
| 251 | $this->setSkin(); |
| 252 | $this->updateNbNotifs(); |
| 253 | check_redirect(); |
| 254 | |
| 255 | // We should not have to use this private data anymore |
| 256 | S::kill('auth_by_cookie'); |
| 257 | return true; |
| 258 | } |
| 259 | |
| 260 | private function securityChecks() |
| 261 | { |
| 262 | $mail_subject = array(); |
| 263 | if (check_account()) { |
| 264 | $mail_subject[] = 'Connexion d\'un utilisateur surveillé'; |
| 265 | } |
| 266 | if (check_ip('unsafe')) { |
| 267 | $mail_subject[] = 'Une IP surveillee a tente de se connecter'; |
| 268 | if (check_ip('ban')) { |
| 269 | send_warning_mail(implode(' - ', $mail_subject)); |
| 270 | $this->destroy(); |
| 271 | Platal::page()->kill('Une erreur est survenue lors de la procédure d\'authentification. ' |
| 272 | . 'Merci de contacter au plus vite ' |
| 273 | . '<a href="mailto:support@polytechnique.org">support@polytechnique.org</a>'); |
| 274 | return false; |
| 275 | } |
| 276 | } |
| 277 | if (count($mail_subject)) { |
| 278 | send_warning_mail(implode(' - ', $mail_subject)); |
| 279 | } |
| 280 | } |
| 281 | |
| 282 | public function tokenAuth($login, $token) |
| 283 | { |
| 284 | $res = XDB::query('SELECT u.hruid |
| 285 | FROM aliases AS a |
| 286 | INNER JOIN auth_user_md5 AS u ON (a.id = u.user_id AND u.perms IN ("admin", "user")) |
| 287 | INNER JOIN auth_user_quick AS q ON (a.id = q.user_id AND q.core_rss_hash = {?}) |
| 288 | WHERE a.alias = {?} AND a.type != "homonyme"', $token, $login); |
| 289 | if ($res->numRows() == 1) { |
| 290 | $data = $res->fetchOneAssoc(); |
| 291 | return new User($data['hruid'], $data); |
| 292 | } |
| 293 | return null; |
| 294 | } |
| 295 | |
| 296 | protected function makePerms($perm, $is_admin) |
| 297 | { |
| 298 | $flags = new PlFlagSet(); |
| 299 | if ($perm == 'disabled' || $perm == 'ext') { |
| 300 | S::set('perms', $flags); |
| 301 | return; |
| 302 | } |
| 303 | $flags->addFlag(PERMS_USER); |
| 304 | if ($perm == 'admin') { |
| 305 | $flags->addFlag(PERMS_ADMIN); |
| 306 | } |
| 307 | S::set('perms', $flags); |
| 308 | } |
| 309 | |
| 310 | public function setSkin() |
| 311 | { |
| 312 | if (S::logged() && (!S::has('skin') || S::has('suid'))) { |
| 313 | $uid = S::v('uid'); |
| 314 | $res = XDB::query("SELECT skin_tpl |
| 315 | FROM auth_user_quick AS a |
| 316 | INNER JOIN skins AS s ON a.skin = s.id |
| 317 | WHERE user_id = {?} AND skin_tpl != ''", $uid); |
| 318 | S::set('skin', $res->fetchOneCell()); |
| 319 | } |
| 320 | } |
| 321 | |
| 322 | public function loggedLevel() |
| 323 | { |
| 324 | return AUTH_COOKIE; |
| 325 | } |
| 326 | |
| 327 | public function sureLevel() |
| 328 | { |
| 329 | return AUTH_MDP; |
| 330 | } |
| 331 | |
| 332 | |
| 333 | public function updateNbNotifs() |
| 334 | { |
| 335 | require_once 'notifs.inc.php'; |
| 336 | $n = select_notifs(false, S::i('uid'), S::v('watch_last'), false); |
| 337 | S::set('notifs', $n->numRows()); |
| 338 | } |
| 339 | |
| 340 | public function setAccessCookie($replace = false, $log = true) { |
| 341 | if (S::has('suid') || ($replace && !Cookie::blank('access'))) { |
| 342 | return; |
| 343 | } |
| 344 | require_once('secure_hash.inc.php'); |
| 345 | Cookie::set('access', hash_encrypt(S::v('password')), 300, true); |
| 346 | if ($log) { |
| 347 | S::logger()->log('cookie_on'); |
| 348 | } |
| 349 | } |
| 350 | |
| 351 | public function killAccessCookie($log = true) { |
| 352 | Cookie::kill('access'); |
| 353 | if ($log) { |
| 354 | S::logger()->log('cookie_off'); |
| 355 | } |
| 356 | } |
| 357 | |
| 358 | public function killLoginFormCookies() { |
| 359 | Cookie::kill('uid'); |
| 360 | Cookie::kill('domain'); |
| 361 | } |
| 362 | } |
| 363 | |
| 364 | // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8: |
| 365 | ?> |