X-Git-Url: http://git.polytechnique.org/?a=blobdiff_plain;f=modules%2Fauth.php;h=8f71fdac0a8f4e67cf55a62d47724254318dd6f2;hb=674333e7f1f4ad1e06626c16138eeb4b755f9f7e;hp=f535a8b4f11174d172e6eda9a276c169d5caec9c;hpb=8230e9f8eff954fb1103c8bdcf0d22557d419ae7;p=platal.git diff --git a/modules/auth.php b/modules/auth.php index f535a8b..8f71fda 100644 --- a/modules/auth.php +++ b/modules/auth.php @@ -1,6 +1,6 @@ $this->make_hook('chall', AUTH_PUBLIC), - 'groupex/export-econfiance.php' - => $this->make_hook('econf', AUTH_PUBLIC, 'user', NO_HTTPS), - - 'webservices/manageurs.php' - => $this->make_hook('manageurs', AUTH_PUBLIC, 'user', NO_HTTPS), - - 'auth-redirect.php' => $this->make_hook('redirect', AUTH_COOKIE), - 'auth-groupex.php' => $this->make_hook('groupex_old', AUTH_COOKIE), - 'auth-groupex' => $this->make_hook('groupex', AUTH_COOKIE), - 'admin/auth-groupes-x' => $this->make_hook('admin_authgroupesx', AUTH_MDP, 'admin'), + 'groupex/donne-chall.php' => $this->make_hook('chall', AUTH_PUBLIC), + 'groupex/export-econfiance.php' => $this->make_hook('econf', AUTH_PUBLIC, 'user', NO_HTTPS), + + 'webservices/manageurs.php' => $this->make_hook('manageurs', AUTH_PUBLIC, 'user', NO_HTTPS), + + 'auth-redirect.php' => $this->make_hook('redirect', AUTH_COOKIE, 'user'), + 'auth-groupex.php' => $this->make_hook('groupex_old', AUTH_COOKIE, ''), + 'auth-groupex' => $this->make_hook('groupex', AUTH_PUBLIC, ''), + 'admin/auth-groupes-x' => $this->make_hook('admin_authgroupesx', AUTH_PASSWD, 'admin'), ); } - function handler_chall(&$page) + function handler_chall($page) { $_SESSION["chall"] = uniqid(rand(), 1); echo $_SESSION["chall"] . "\n" . session_id(); exit; } - function handler_econf(&$page) + function handler_econf($page) { global $globals; $cle = $globals->core->econfiance; - if (S::v('chall') && $_GET['PASS'] == md5(S::v('chall').$cle)) { - - $res = XDB::query("SELECT password FROM auth_user_md5 WHERE user_id=10154"); - $pass = $res->fetchOneCell(); + $res = "\n\n\n\n"; - $list = new MMList(10154, $pass, "x-econfiance.polytechnique.org"); + if (S::v('chall') && Get::s('PASS') == md5(S::v('chall').$cle)) { + $list = new MMList(User::getWithUID(10154), "x-econfiance.polytechnique.org"); $members = $list->get_members('membres'); if (is_array($members)) { $membres = Array(); foreach($members[1] as $member) { - if (preg_match('/^([^.]*.[^.]*.(\d\d\d\d))@polytechnique.org$/', - $member[1], $matches)) - { - $membres[] = "a.alias='{$matches[1]}'"; + $user = User::getSilent($member[1]); + if ($user && $user->hasProfile()) { + $profile = $user->profile(); + $res .= "\n"; + $res .= "\t" . $profile->lastName() . "\n"; + $res .= "\t" . $profile->firstName() . "\n"; + $res .= "\t" . $user->forlifeEmail() . "\n"; + $res .= "\n\n"; } } } - - $where = join(' OR ',$membres); - - $all = XDB::iterRow( - "SELECT u.prenom,u.nom,a.alias - FROM auth_user_md5 AS u - INNER JOIN aliases AS a ON ( u.user_id = a.id AND a.type!='homonyme' ) - WHERE $where - ORDER BY nom"); - - $res = "\n\n\n\n"; - - while (list ($prenom1,$nom1,$email1) = $all->next()) { - $res .= "\n"; - $res .= "\t$nom1\n"; - $res .= "\t$prenom1\n"; - $res .= "\t$email1\n"; - $res .= "\n\n"; - } - $res .= "\n\n"; - header('Content-Type: text/xml; charset="UTF-8"'); + pl_content_headers("text/xml"); echo $res; } exit; } - function handler_manageurs(&$page) + function handler_manageurs($page) { global $globals; @@ -112,7 +91,7 @@ class AuthModule extends PLModule $request = @$GLOBALS['HTTP_RAW_POST_DATA']; $response = xmlrpc_server_call_method($server, $request, null); - header('Content-Type: text/xml'); + pl_content_headers("text/xml"); print $response; xmlrpc_server_destroy($server); } @@ -120,68 +99,152 @@ class AuthModule extends PLModule exit; } - function handler_redirect(&$page) + function handler_redirect($page) { http_redirect(Env::v('dest', '/')); } - function handler_groupex_old(&$page) + function handler_groupex_old($page) { return $this->handler_groupex($page, 'iso-8859-1'); } - function handler_groupex(&$page, $charset = 'utf8') + /** Handles the 'auth-groupe-x' authentication. + * Expects the following GET parameters: + * - pass: the 'password' for the authentication + * - challenge: the authentication challenge + * - url: the return URL + * - session: the remote PHP session ID + */ + function handler_groupex($page, $charset = 'utf8') { + if (!S::logged()) { + $page->assign('referer', true); + $page->setTitle('Authentification'); + $page->setDefaultSkin('group_login'); + + if (Get::has('group')) { + $res = XDB::query('SELECT nom + FROM groups + WHERE diminutif = {?}', Get::s('group')); + $page->assign('group', $res->fetchOneCell()); + } else { + $page->assign('group', null); + } + return PL_DO_AUTH; + } + + if (!S::user()->checkPerms('groups')) { + return PL_FORBIDDEN; + } + $this->load('auth.inc.php'); - $page->assign('referer', true); - $gpex_pass = $_GET["pass"]; - $gpex_url = urldecode($_GET["url"]); - if (strpos($gpex_url, '?') === false) { - $gpex_url .= "?PHPSESSID=" . $_GET["session"]; - } else { - $gpex_url .= "&PHPSESSID=" . $_GET["session"]; + $gpex_pass = Get::s('pass'); + $gpex_url = urldecode(Get::s('url')); + if (Get::has('session')) { + if (strpos($gpex_url, '?') === false) { + $gpex_url .= "?PHPSESSID=" . Get::s('session'); + } else { + $gpex_url .= "&PHPSESSID=" . Get::s('session'); + } } - /* a-t-on besoin d'ajouter le http:// ? */ + // Normalize the return URL. if (!preg_match("/^(http|https):\/\/.*/",$gpex_url)) { $gpex_url = "http://$gpex_url"; } - $gpex_challenge = $_GET["challenge"]; + $gpex_challenge = Get::s('challenge'); - // mise à jour de l'heure et de la machine de dernier login sauf quand on est en suid + // Update the last login information (unless the user is in SUID). $uid = S::i('uid'); - if (!isset($_SESSION['suid'])) { + if (!S::suid()) { global $platal; - S::logger(uid)->log('connexion_auth_ext', $platal->path); + S::logger($uid)->log('connexion_auth_ext', $platal->path.' '.urldecode($_GET['url'])); } - /* on parcourt les entrees de groupes_auth */ - $res = XDB::iterRow('SELECT privkey, name, datafields, returnurls FROM groupesx_auth'); + if (Get::has('group')) { + $req_group_id = XDB::fetchOneCell('SELECT id + FROM groups + WHERE diminutif = {?}', + Get::s('group')); + } else { + $req_group_id = null; + } - while (list($privkey,$name,$datafields,$returnurls) = $res->next()) { + // Iterate over the auth token to find which one did sign the request. + $res = XDB::iterRow( + 'SELECT ga.privkey, ga.name, ga.datafields, ga.returnurls, + ga.group_id, ga.flags, g.nom + FROM group_auth AS ga + LEFT JOIN groups AS g ON (g.id = ga.group_id)'); + + while (list($privkey, $name, $datafields, $returnurls, $group_id, $group_flags, $group_name) = $res->next()) { if (md5($gpex_challenge.$privkey) == $gpex_pass) { $returnurls = trim($returnurls); + // We check that the return url matches a per-key regexp to prevent + // replay attacks (more exactly to force replay attacks to redirect + // the user to the real GroupeX website, which defeats the attack). if (empty($returnurls) || @preg_match($returnurls, $gpex_url)) { $returl = $gpex_url . gpex_make_params($gpex_challenge, $privkey, $datafields, $charset); + XDB::execute('UPDATE group_auth + SET last_used = DATE(NOW()) + WHERE name = {?}', + $name); + + // Two conditions control access to the return URL: + // - If that URL is attached to a group: + // - If the user belongs to the group, OK + // - If the user is 'xnet' and doesn't belong, NOK + // - If the user is not 'xnet' and the group is not 'strict', OK + // - If the user is not 'xnet' and the group is 'strict', NOK + // - Otherwise, all but 'xnet' accounts may access the URL. + $user_is_xnet = S::user()->type == 'xnet'; + $group_flags = new PlFlagSet($group_flags); + + // If this key is not attached to a group, but a group was + // requested (e.g query from wiki / blogs / ...), use the + // requested group_id. + if (!$group_id && $req_group_id) { + $group_id = $req_group_id; + } + + if ($group_id) { + // Check group permissions + $is_member = XDB::fetchOneCell('SELECT COUNT(*) + FROM group_members + WHERE uid = {?} AND asso_id = {?}', + S::user()->id(), $group_id); + if (!$is_member && ($user_is_xnet || $group_flags->hasFlag('group_only'))) { + $page->kill("Le site demandé est réservé aux membres du groupe $group_name."); + } + + } else if ($user_is_xnet && !$group_flags->hasFlag('allow_xnet')) { + $page->kill("Le site demandé est réservé aux polytechniciens."); + } + http_redirect($returl); + } else if (S::admin()) { + $page->kill("La requête d'authentification a échoué (url de retour invalide)."); } } } - /* si on n'a pas trouvé, on renvoit sur x.org */ - http_redirect('https://www.polytechnique.org/'); + // Otherwise (if no valid request was found, or if the return URL is not + // acceptable), the user is redirected back to our homepage. + pl_redirect('/'); } - function handler_admin_authgroupesx(&$page, $action = 'list', $id = null) + function handler_admin_authgroupesx($page, $action = 'list', $id = null) { $page->setTitle('Administration - Auth groupes X'); $page->assign('title', 'Gestion de l\'authentification centralisée'); - $table_editor = new PLTableEditor('admin/auth-groupes-x','groupesx_auth','id'); + $table_editor = new PLTableEditor('admin/auth-groupes-x','group_auth','id'); $table_editor->describe('name','nom',true); - $table_editor->describe('privkey','clé privée',false); + $table_editor->describe('privkey','clé privée',false, true); $table_editor->describe('datafields','champs renvoyés',true); $table_editor->describe('returnurls','urls de retour',true); + $table_editor->describe('last_used', 'dernière utilisation', true); $table_editor->apply($page, $action, $id); } }