line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
# Apache::AppSamurai - Protect your master, even if he is without honour. |
2
|
|
|
|
|
|
|
|
3
|
|
|
|
|
|
|
# $Id: AppSamurai.pm,v 1.66 2008/05/03 06:43:25 pauldoom Exp $ |
4
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
## |
6
|
|
|
|
|
|
|
# Copyright (c) 2008 Paul M. Hirsch (paul@voltagenoir.org). |
7
|
|
|
|
|
|
|
# All rights reserved. |
8
|
|
|
|
|
|
|
# |
9
|
|
|
|
|
|
|
# This program is free software; you can redistribute it and/or modify it under |
10
|
|
|
|
|
|
|
# the same terms as Perl itself. |
11
|
|
|
|
|
|
|
## |
12
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
# AppSamurai is a set of scripts and a module that tie into Apache via |
14
|
|
|
|
|
|
|
# mod_perl to provide an authenticating reverse proxy front end for |
15
|
|
|
|
|
|
|
# web applications. It allows the use of outside authentication not |
16
|
|
|
|
|
|
|
# supported by the backend app, and also adds session tracking. |
17
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
package Apache::AppSamurai; |
19
|
1
|
|
|
1
|
|
24378
|
use strict; |
|
1
|
|
|
|
|
4
|
|
|
1
|
|
|
|
|
64
|
|
20
|
1
|
|
|
1
|
|
7
|
use warnings; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
40
|
|
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
# Keep VERSION (set manually) and REVISION (set by CVS) |
23
|
1
|
|
|
1
|
|
7
|
use vars qw($VERSION $REVISION $MP); |
|
1
|
|
|
|
|
6
|
|
|
1
|
|
|
|
|
104
|
|
24
|
|
|
|
|
|
|
$VERSION = '1.01'; |
25
|
|
|
|
|
|
|
$REVISION = substr(q$Revision: 1.66 $, 10, -1); |
26
|
|
|
|
|
|
|
|
27
|
1
|
|
|
1
|
|
8
|
use Carp; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
1823
|
|
28
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
# mod_perl Includes |
30
|
|
|
|
|
|
|
BEGIN { |
31
|
1
|
50
|
|
1
|
|
4
|
if (eval{require mod_perl2;}) { |
|
1
|
|
|
|
|
1227
|
|
32
|
0
|
|
|
|
|
0
|
mod_perl2->import(qw(1.9922 StackedHandlers MethodHandlers Authen |
33
|
|
|
|
|
|
|
Authz)); |
34
|
0
|
|
|
|
|
0
|
require Apache2::Connection; |
35
|
0
|
|
|
|
|
0
|
require Apache2::RequestRec; |
36
|
0
|
|
|
|
|
0
|
require Apache2::RequestUtil; |
37
|
0
|
|
|
|
|
0
|
require Apache2::Log; |
38
|
0
|
|
|
|
|
0
|
require Apache2::Access; |
39
|
0
|
|
|
|
|
0
|
require Apache2::Response; |
40
|
0
|
|
|
|
|
0
|
require Apache2::Util; |
41
|
0
|
|
|
|
|
0
|
require Apache2::URI; |
42
|
0
|
|
|
|
|
0
|
require APR::Table; |
43
|
0
|
|
|
|
|
0
|
require APR::Pool; |
44
|
0
|
|
|
|
|
0
|
require Apache2::Const; |
45
|
0
|
|
|
|
|
0
|
Apache2::Const->import(qw(OK DECLINED REDIRECT HTTP_FORBIDDEN |
46
|
|
|
|
|
|
|
HTTP_INTERNAL_SERVER_ERROR |
47
|
|
|
|
|
|
|
HTTP_MOVED_TEMPORARILY HTTP_UNAUTHORIZED |
48
|
|
|
|
|
|
|
M_GET)); |
49
|
0
|
|
|
|
|
0
|
require Apache2::Request; |
50
|
0
|
|
|
|
|
0
|
$MP = 2; |
51
|
|
|
|
|
|
|
} else { |
52
|
1
|
|
|
|
|
19553
|
require mod_perl; |
53
|
0
|
|
|
|
|
|
mod_perl->import(qw(1.07 StackedHandlers MethodHandlers Authen Authz)); |
54
|
0
|
|
|
|
|
|
require Apache; |
55
|
0
|
|
|
|
|
|
require Apache::Log; |
56
|
0
|
|
|
|
|
|
require Apache::Util; |
57
|
0
|
|
|
|
|
|
require Apache::Constants; |
58
|
0
|
|
|
|
|
|
Apache::Constants->import(qw(OK DECLINED REDIRECT HTTP_FORBIDDEN |
59
|
|
|
|
|
|
|
HTTP_INTERNAL_SERVER_ERROR |
60
|
|
|
|
|
|
|
HTTP_MOVED_TEMPORARILY HTTP_UNAUTHORIZED |
61
|
|
|
|
|
|
|
M_GET)); |
62
|
0
|
|
|
|
|
|
require Apache::Request; |
63
|
0
|
|
|
|
|
|
$MP = 1; |
64
|
|
|
|
|
|
|
} |
65
|
|
|
|
|
|
|
} |
66
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
# Non-mod_perl includes |
68
|
|
|
|
|
|
|
use CGI::Cookie; |
69
|
|
|
|
|
|
|
use URI; |
70
|
|
|
|
|
|
|
use Time::HiRes qw(usleep); |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
use Apache::AppSamurai::Util qw(CreateSessionAuthKey CheckSidFormat |
73
|
|
|
|
|
|
|
HashPass HashAny ComputeSessionId |
74
|
|
|
|
|
|
|
CheckUrlFormat CheckHostName |
75
|
|
|
|
|
|
|
CheckHostIP XHalf); |
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
# Apache::AppSamurai::Session is a replacement for Apache::Session::Flex |
78
|
|
|
|
|
|
|
# It provides normal Apache::Session::Flex features, plus optional extras |
79
|
|
|
|
|
|
|
# like alternate session key generators/sizes and record level encryption |
80
|
|
|
|
|
|
|
use Apache::AppSamurai::Session; |
81
|
|
|
|
|
|
|
|
82
|
|
|
|
|
|
|
# Apache::AppSamurai::Tracker is a special instance of Session meant to |
83
|
|
|
|
|
|
|
# be shared between all processes serving an auth_name |
84
|
|
|
|
|
|
|
use Apache::AppSamurai::Tracker; |
85
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
### START Apache::AuthSession based methods |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
# The following lower case methods are directly based on Apache::AuthCookie, or |
89
|
|
|
|
|
|
|
# are required AuthCookie methods (like authen_cred() and authen_ses_key()) |
90
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
# Note - ($$) syntax, used in mod_perl 1 to induce calling the handler as |
92
|
|
|
|
|
|
|
# an object, has been eliminated in mod_perl 2. Each handler method called |
93
|
|
|
|
|
|
|
# directly from Apache must be wrapped to support mod_perl 1 and mod_perl 2 |
94
|
|
|
|
|
|
|
# calls. (Just explaining the mess before you have to read it.) |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
# Identify the username for the session and set for the request |
97
|
|
|
|
|
|
|
sub recognize_user_mp1 ($$) { &recognize_user_real } |
98
|
|
|
|
|
|
|
sub recognize_user_mp2 : method { &recognize_user_real } |
99
|
|
|
|
|
|
|
*recognize_user = ($MP eq 1) ? \&recognize_user_mp1 : \&recognize_user_mp2; |
100
|
|
|
|
|
|
|
|
101
|
|
|
|
|
|
|
sub recognize_user_real { |
102
|
|
|
|
|
|
|
my ($self, $r) = @_; |
103
|
|
|
|
|
|
|
my ($auth_type, $auth_name) = ($r->auth_type, $r->auth_name); |
104
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
return DECLINED unless $auth_type and $auth_name; |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
my $cookie_name = $self->cookie_name($r); |
108
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
my ($cookie) = $r->headers_in->{'Cookie'} =~ /$cookie_name=([^;]+)/; |
110
|
|
|
|
|
|
|
if (!$cookie && $r->dir_config("${auth_name}Keysource")) { |
111
|
|
|
|
|
|
|
# Try to get key text using alternate method then compute the key. |
112
|
|
|
|
|
|
|
# FetchKeysource returns '' if no custom source is configured, in |
113
|
|
|
|
|
|
|
# which case the cookie should have been previously set, so non-zero |
114
|
|
|
|
|
|
|
# output is required. |
115
|
|
|
|
|
|
|
$cookie = $self->FetchKeysource($r); |
116
|
|
|
|
|
|
|
if ($cookie) { |
117
|
|
|
|
|
|
|
$cookie = CreateSessionAuthKey($cookie); |
118
|
|
|
|
|
|
|
} |
119
|
|
|
|
|
|
|
} |
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
return DECLINED unless $cookie; |
122
|
|
|
|
|
|
|
|
123
|
|
|
|
|
|
|
$self->Log($r, ('debug', "recognize_user(): cookie $cookie_name is " . XHalf($cookie))); |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
my ($user,@args) = $auth_type->authen_ses_key($r, $cookie); |
126
|
|
|
|
|
|
|
if ($user and scalar @args == 0) { |
127
|
|
|
|
|
|
|
$self->Log($r, ('debug', "recognize_user(): user is $user")); |
128
|
|
|
|
|
|
|
($MP eq 1) ? ($r->connection->user($user)) : ($r->user($user)); |
129
|
|
|
|
|
|
|
} elsif (scalar @args > 0 and $auth_type->can('custom_errors')) { |
130
|
|
|
|
|
|
|
return $auth_type->custom_errors($r, $user, @args); |
131
|
|
|
|
|
|
|
} else { |
132
|
|
|
|
|
|
|
# Shrug |
133
|
|
|
|
|
|
|
$self->Log($r, ('warn', "recognize_user(): Unexpected result")); |
134
|
|
|
|
|
|
|
return DECLINED; |
135
|
|
|
|
|
|
|
} |
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
return OK; |
138
|
|
|
|
|
|
|
} |
139
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
# Get the cookie name for this protected area |
141
|
|
|
|
|
|
|
sub cookie_name { |
142
|
|
|
|
|
|
|
my ($self, $r) = @_; |
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
my $auth_type = $r->auth_type; |
145
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
146
|
|
|
|
|
|
|
my $cookie_name = $r->dir_config("${auth_name}CookieName") || |
147
|
|
|
|
|
|
|
"${auth_type}_${auth_name}"; |
148
|
|
|
|
|
|
|
return $cookie_name; |
149
|
|
|
|
|
|
|
} |
150
|
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
# Set request cache options (no-cache unless specifically told to cache) |
152
|
|
|
|
|
|
|
sub handle_cache { |
153
|
|
|
|
|
|
|
my ($self, $r) = @_; |
154
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
156
|
|
|
|
|
|
|
return unless $auth_name; |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
unless ($r->dir_config("${auth_name}Cache")) { |
159
|
|
|
|
|
|
|
$r->no_cache(1); |
160
|
|
|
|
|
|
|
if (!$r->headers_out->{'Pragma'}) { |
161
|
|
|
|
|
|
|
$r->err_headers_out->{'Pragma'} = 'no-cache'; |
162
|
|
|
|
|
|
|
} |
163
|
|
|
|
|
|
|
} |
164
|
|
|
|
|
|
|
} |
165
|
|
|
|
|
|
|
|
166
|
|
|
|
|
|
|
# Backdate cookie to attempt to clear from web browser cookie store |
167
|
|
|
|
|
|
|
sub remove_cookie { |
168
|
|
|
|
|
|
|
my ($self, $r) = @_; |
169
|
|
|
|
|
|
|
|
170
|
|
|
|
|
|
|
my $cookie_name = $self->cookie_name($r); |
171
|
|
|
|
|
|
|
my $str = $self->cookie_string( request => $r, |
172
|
|
|
|
|
|
|
key => $cookie_name, |
173
|
|
|
|
|
|
|
value => '', |
174
|
|
|
|
|
|
|
expires => 'Mon, 21-May-1971 00:00:00 GMT' ); |
175
|
|
|
|
|
|
|
|
176
|
|
|
|
|
|
|
$r->err_headers_out->add("Set-Cookie" => "$str"); |
177
|
|
|
|
|
|
|
|
178
|
|
|
|
|
|
|
$self->Log($r, ('debug', "remove_cookie(): removed_cookie \"$cookie_name\"")); |
179
|
|
|
|
|
|
|
} |
180
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
# Convert current POST request to GET |
182
|
|
|
|
|
|
|
# Note - The use of this is questionable now that Apache::Request is being |
183
|
|
|
|
|
|
|
# used. May go away in the future. |
184
|
|
|
|
|
|
|
sub _convert_to_get { |
185
|
|
|
|
|
|
|
my ($self, $r) = @_; |
186
|
|
|
|
|
|
|
return unless $r->method eq 'POST'; |
187
|
|
|
|
|
|
|
|
188
|
|
|
|
|
|
|
$self->Log($r, ('debug', "Converting POST -> GET")); |
189
|
|
|
|
|
|
|
|
190
|
|
|
|
|
|
|
# Use Apache::Request for immediate access to all arguments. |
191
|
|
|
|
|
|
|
my $ar = ($MP eq 1) ? |
192
|
|
|
|
|
|
|
Apache::Request->instance($r) : |
193
|
|
|
|
|
|
|
Apache2::Request->new($r); |
194
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
# Pull list if GET and POST args |
196
|
|
|
|
|
|
|
my @params = $ar->param; |
197
|
|
|
|
|
|
|
my ($name, @values, $value); |
198
|
|
|
|
|
|
|
my @pairs = (); |
199
|
|
|
|
|
|
|
|
200
|
|
|
|
|
|
|
foreach $name (@params) { |
201
|
|
|
|
|
|
|
# we don't want to copy login data, only extra data. |
202
|
|
|
|
|
|
|
$name =~ /^(destination|credential_\d+)$/ and next; |
203
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
# Pull list of values for this key |
205
|
|
|
|
|
|
|
@values = $ar->param($name); |
206
|
|
|
|
|
|
|
|
207
|
|
|
|
|
|
|
# Make sure there is at least one value, which can be empty |
208
|
|
|
|
|
|
|
(scalar(@values)) or ($values[0] = ''); |
209
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
foreach $value (@values) { |
211
|
|
|
|
|
|
|
if ($MP eq 1) { |
212
|
|
|
|
|
|
|
push(@pairs, Apache::Util::escape_uri($name) . '=' . |
213
|
|
|
|
|
|
|
Apache::Util::escape_uri($value)); |
214
|
|
|
|
|
|
|
} else { |
215
|
|
|
|
|
|
|
# Assume mod_perl 2 behaviour |
216
|
|
|
|
|
|
|
push(@pairs, Apache2::Util::escape_path($name, $r->pool) . |
217
|
|
|
|
|
|
|
'=' . Apache2::Util::escape_path($value, $r->pool)); |
218
|
|
|
|
|
|
|
} |
219
|
|
|
|
|
|
|
} |
220
|
|
|
|
|
|
|
} |
221
|
|
|
|
|
|
|
|
222
|
|
|
|
|
|
|
$r->args(join '&', @pairs) if scalar(@pairs) > 0; |
223
|
|
|
|
|
|
|
|
224
|
|
|
|
|
|
|
$r->method('GET'); |
225
|
|
|
|
|
|
|
$r->method_number(M_GET); |
226
|
|
|
|
|
|
|
$r->headers_in->unset('Content-Length'); |
227
|
|
|
|
|
|
|
} |
228
|
|
|
|
|
|
|
|
229
|
|
|
|
|
|
|
|
230
|
|
|
|
|
|
|
# Handle regular (form based) login |
231
|
|
|
|
|
|
|
sub login_mp1 ($$) { &login_real } |
232
|
|
|
|
|
|
|
sub login_mp2 : method { &login_real } |
233
|
|
|
|
|
|
|
*login = ($MP eq 1) ? \&login_mp1 : \&login_mp2; |
234
|
|
|
|
|
|
|
sub login_real { |
235
|
|
|
|
|
|
|
my ($self, $r) = @_; |
236
|
|
|
|
|
|
|
my ($auth_type, $auth_name) = ($r->auth_type, $r->auth_name); |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
# Use the magic of Apache::Request to ditch POST handling code |
239
|
|
|
|
|
|
|
# and cut to the args. |
240
|
|
|
|
|
|
|
my $ar = ($MP eq 1) ? |
241
|
|
|
|
|
|
|
Apache::Request->instance($r) : |
242
|
|
|
|
|
|
|
Apache2::Request->new($r); |
243
|
|
|
|
|
|
|
|
244
|
|
|
|
|
|
|
my ($ses_key, $tc, $destination, $nonce, $sig, $serverkey); |
245
|
|
|
|
|
|
|
my @credentials = (); |
246
|
|
|
|
|
|
|
|
247
|
|
|
|
|
|
|
# Get the hard set destination, or setup to just reload |
248
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}LoginDestination")) { |
249
|
|
|
|
|
|
|
$destination = $r->dir_config("${auth_name}LoginDestination"); |
250
|
|
|
|
|
|
|
} elsif ($ar->param("destination")) { |
251
|
|
|
|
|
|
|
$destination = $ar->param("destination"); |
252
|
|
|
|
|
|
|
} else { |
253
|
|
|
|
|
|
|
# Someday something slick could hold the URL, then cut through |
254
|
|
|
|
|
|
|
# to it. Someday. Today we die. |
255
|
|
|
|
|
|
|
$self->Log($r, ('warn', "No key 'destination' found in form data")); |
256
|
|
|
|
|
|
|
$r->subprocess_env('AuthCookieReason', 'no_cookie'); |
257
|
|
|
|
|
|
|
return $auth_type->login_form($r); |
258
|
|
|
|
|
|
|
} |
259
|
|
|
|
|
|
|
|
260
|
|
|
|
|
|
|
# Check form nonce and signature |
261
|
|
|
|
|
|
|
if (defined($ar->param("nonce")) and defined($ar->param("sig"))) { |
262
|
|
|
|
|
|
|
unless (($nonce = CheckSidFormat($ar->param("nonce"))) and |
263
|
|
|
|
|
|
|
($sig = CheckSidFormat($ar->param("sig")))) { |
264
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
$self->Log($r, ('warn', "Missing/invalid form nonce or sig")); |
266
|
|
|
|
|
|
|
$r->subprocess_env('AuthCookieReason', 'no_cookie'); |
267
|
|
|
|
|
|
|
$r->err_headers_out->{'Location'} = $self->URLErrorCode($destination, 'bad_credentials'); |
268
|
|
|
|
|
|
|
$r->status(REDIRECT); |
269
|
|
|
|
|
|
|
return REDIRECT; |
270
|
|
|
|
|
|
|
} |
271
|
|
|
|
|
|
|
$serverkey = $self->GetServerKey($r) or die("FATAL: Could not fetch valid server key\n"); |
272
|
|
|
|
|
|
|
|
273
|
|
|
|
|
|
|
# Now check! |
274
|
|
|
|
|
|
|
unless ($sig eq ComputeSessionId($nonce, $serverkey)) { |
275
|
|
|
|
|
|
|
# Failed! |
276
|
|
|
|
|
|
|
$self->Log($r, ('warn', "Bad signature on posted form (Possible scripted attack)")); |
277
|
|
|
|
|
|
|
$r->subprocess_env('AuthCookieReason', 'no_cookie'); |
278
|
|
|
|
|
|
|
$r->err_headers_out->{'Location'} = $self->URLErrorCode($destination, 'bad_credentials'); |
279
|
|
|
|
|
|
|
$r->status(REDIRECT); |
280
|
|
|
|
|
|
|
return REDIRECT; |
281
|
|
|
|
|
|
|
} |
282
|
|
|
|
|
|
|
} else { |
283
|
|
|
|
|
|
|
# Failed! |
284
|
|
|
|
|
|
|
$self->Log($r, ('warn', "Missing NONCE and/or SIG in posted form (Possible scripted attack)")); |
285
|
|
|
|
|
|
|
$r->subprocess_env('AuthCookieReason', 'no_cookie'); |
286
|
|
|
|
|
|
|
$r->err_headers_out->{'Location'} = $self->URLErrorCode($destination, 'bad_credentials'); |
287
|
|
|
|
|
|
|
$r->status(REDIRECT); |
288
|
|
|
|
|
|
|
return REDIRECT; |
289
|
|
|
|
|
|
|
} |
290
|
|
|
|
|
|
|
|
291
|
|
|
|
|
|
|
# Get the credentials from the data posted by the client |
292
|
|
|
|
|
|
|
while ($tc = $ar->param("credential_" . scalar(@credentials))) { |
293
|
|
|
|
|
|
|
push(@credentials, $tc); |
294
|
|
|
|
|
|
|
|
295
|
|
|
|
|
|
|
($tc) ? ($tc =~ s/^(.).*$/$1/s) : ($tc = ''); # Only pull first char |
296
|
|
|
|
|
|
|
# for logging |
297
|
|
|
|
|
|
|
$self->Log($r, ('debug', "login(); Received credential_" . (scalar(@credentials) - 1) . ": $tc (hint)")); |
298
|
|
|
|
|
|
|
} |
299
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
# Convert all args into a GET and clear the credential_X args |
301
|
|
|
|
|
|
|
$self->_convert_to_get($r) if $r->method eq 'POST'; |
302
|
|
|
|
|
|
|
|
303
|
|
|
|
|
|
|
# Check against credential cache if UniqueCredentials is set |
304
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}AuthUnique")) { |
305
|
|
|
|
|
|
|
unless ($self->CheckTracker($r, 'AuthUnique', @credentials)) { |
306
|
|
|
|
|
|
|
# Tried to send the same credentials twice (or tracker system |
307
|
|
|
|
|
|
|
# failure. Delete the credentials to fall through |
308
|
|
|
|
|
|
|
@credentials = (); |
309
|
|
|
|
|
|
|
$self->Log($r, ('warn', "login(): AuthUnique check failed: Tracker failure, or same credentials have been sent before")); |
310
|
|
|
|
|
|
|
} |
311
|
|
|
|
|
|
|
} |
312
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
if (@credentials) { |
314
|
|
|
|
|
|
|
# Exchange the credentials for a session key. |
315
|
|
|
|
|
|
|
$ses_key = $self->authen_cred($r, @credentials); |
316
|
|
|
|
|
|
|
if ($ses_key) { |
317
|
|
|
|
|
|
|
# Set session cookie with expiration included if SessionExpire |
318
|
|
|
|
|
|
|
# is set. (Extended +8 hours so we see logout events and cleanup) |
319
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}SessionExpire")) { |
320
|
|
|
|
|
|
|
$self->send_cookie($r, $ses_key, {expires => $r->dir_config("${auth_name}SessionExpire") + 28800}); |
321
|
|
|
|
|
|
|
} else { |
322
|
|
|
|
|
|
|
$self->send_cookie($r, $ses_key); |
323
|
|
|
|
|
|
|
} |
324
|
|
|
|
|
|
|
$self->handle_cache($r); |
325
|
|
|
|
|
|
|
|
326
|
|
|
|
|
|
|
# Log 1/2 of session key to debug |
327
|
|
|
|
|
|
|
$self->Log($r, ('debug', "login(): session key (browser cookie value): " . XHalf($ses_key))); |
328
|
|
|
|
|
|
|
|
329
|
|
|
|
|
|
|
# Godspeed You Black Emperor! |
330
|
|
|
|
|
|
|
$r->headers_out->{"Location"} = $destination; |
331
|
|
|
|
|
|
|
return HTTP_MOVED_TEMPORARILY; |
332
|
|
|
|
|
|
|
} |
333
|
|
|
|
|
|
|
} |
334
|
|
|
|
|
|
|
|
335
|
|
|
|
|
|
|
# Add their IP to the failure tracker |
336
|
|
|
|
|
|
|
# Ignores return (refusing a login page to an attacker doesn't stop them |
337
|
|
|
|
|
|
|
# from blindly reposting... can add a fail here if an embedded form |
338
|
|
|
|
|
|
|
# verification key is added to the mix in the future) |
339
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}IPFailures")) { |
340
|
|
|
|
|
|
|
if ($MP eq 1) { |
341
|
|
|
|
|
|
|
$self->CheckTracker($r, 'IPFailures', $r->dir_config("${auth_name}IPFailures"), $r->get_remote_host); |
342
|
|
|
|
|
|
|
} else { |
343
|
|
|
|
|
|
|
$self->CheckTracker($r, 'IPFailures', $r->dir_config("${auth_name}IPFailures"), $r->connection->get_remote_host); |
344
|
|
|
|
|
|
|
} |
345
|
|
|
|
|
|
|
} |
346
|
|
|
|
|
|
|
|
347
|
|
|
|
|
|
|
# Append special error message code and try to redirect to the entry |
348
|
|
|
|
|
|
|
# point. (Avoids having the LOGIN URL show up in the browser window) |
349
|
|
|
|
|
|
|
$r->err_headers_out->{'Location'} = $self->URLErrorCode($destination, 'bad_credentials'); |
350
|
|
|
|
|
|
|
$r->status(REDIRECT); |
351
|
|
|
|
|
|
|
return REDIRECT; |
352
|
|
|
|
|
|
|
# Handle this ol' style - XXX remove? |
353
|
|
|
|
|
|
|
#$r->subprocess_env('AuthCookieReason', 'bad_credentials'); |
354
|
|
|
|
|
|
|
#$r->uri($destination); |
355
|
|
|
|
|
|
|
#return $auth_type->login_form($r); |
356
|
|
|
|
|
|
|
} |
357
|
|
|
|
|
|
|
|
358
|
|
|
|
|
|
|
# Special version of login that handles Basic Auth login instead of form |
359
|
|
|
|
|
|
|
# Can be called by authenticate() if there is no valid session but a |
360
|
|
|
|
|
|
|
# Authorization: Basic header is detected. Can also be called directly, |
361
|
|
|
|
|
|
|
# just like login() for targeted triggering |
362
|
|
|
|
|
|
|
sub loginBasic_mp1 ($$) { &loginBasic_real } |
363
|
|
|
|
|
|
|
sub loginBasic_mp2 : method { &loginBasic_real } |
364
|
|
|
|
|
|
|
*loginBasic = ($MP eq 1) ? \&loginBasic_mp1 : \&loginBasic_mp2; |
365
|
|
|
|
|
|
|
sub loginBasic_real { |
366
|
|
|
|
|
|
|
my ($self, $r) = @_; |
367
|
|
|
|
|
|
|
my ($auth_type, $auth_name) = ($r->auth_type, $r->auth_name); |
368
|
|
|
|
|
|
|
|
369
|
|
|
|
|
|
|
my ($ses_key, $t, @at, $tc); |
370
|
|
|
|
|
|
|
my @credentials = (); |
371
|
|
|
|
|
|
|
|
372
|
|
|
|
|
|
|
return DECLINED unless $r->is_initial_req; # Authenticate first req only |
373
|
|
|
|
|
|
|
|
374
|
|
|
|
|
|
|
# Count input credentials to figure how to split input |
375
|
|
|
|
|
|
|
my @authmethods = $self->GetAuthMethods($r); |
376
|
|
|
|
|
|
|
(@authmethods) || (die("loginBasic(): Missing authentication methods\n")); |
377
|
|
|
|
|
|
|
my $amc = scalar(@authmethods); |
378
|
|
|
|
|
|
|
|
379
|
|
|
|
|
|
|
# Extract basic auth info and fill out @credentials array |
380
|
|
|
|
|
|
|
my ($stat, $pass) = $r->get_basic_auth_pw; |
381
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
if ($r->user && $pass) { |
383
|
|
|
|
|
|
|
# Strip "domain\" portion of user if present. |
384
|
|
|
|
|
|
|
# (Thanks Windows Mobile ActiveSync for forcing domain\username syntax) |
385
|
|
|
|
|
|
|
$t = $r->user; |
386
|
|
|
|
|
|
|
$t =~ s/^.*\\+//; |
387
|
|
|
|
|
|
|
$r->user($t); |
388
|
|
|
|
|
|
|
push(@credentials, $t); |
389
|
|
|
|
|
|
|
|
390
|
|
|
|
|
|
|
# Use custom map pattern if set; else just a generic split on semicolon |
391
|
|
|
|
|
|
|
if (defined($r->dir_config("${auth_name}BasicAuthMap"))) { |
392
|
|
|
|
|
|
|
push(@credentials, $self->ApplyAuthMap($r,$pass,$amc)); |
393
|
|
|
|
|
|
|
} else { |
394
|
|
|
|
|
|
|
# Boring old in-order split |
395
|
|
|
|
|
|
|
foreach (split(';', $pass, $amc)) { |
396
|
|
|
|
|
|
|
push(@credentials, $_); |
397
|
|
|
|
|
|
|
} |
398
|
|
|
|
|
|
|
} |
399
|
|
|
|
|
|
|
|
400
|
|
|
|
|
|
|
# Log partial first char of each credential |
401
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}Debug")) { |
402
|
|
|
|
|
|
|
for (my $i = 0; $i < scalar(@credentials); $i++) { |
403
|
|
|
|
|
|
|
$credentials[$i] =~ /^(.)/; |
404
|
|
|
|
|
|
|
$self->Log($r, ('debug', "loginBasic(): Received credential_$i: $1 (hint)")); |
405
|
|
|
|
|
|
|
} |
406
|
|
|
|
|
|
|
} |
407
|
|
|
|
|
|
|
|
408
|
|
|
|
|
|
|
# Check against credential cache if AuthUnique is set |
409
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}AuthUnique")) { |
410
|
|
|
|
|
|
|
unless ($self->CheckTracker($r, 'AuthUnique', @credentials)) { |
411
|
|
|
|
|
|
|
# Tried to send the same credentials twice (or tracker system |
412
|
|
|
|
|
|
|
# failure. Delete the credentials to fall through |
413
|
|
|
|
|
|
|
@credentials = (); |
414
|
|
|
|
|
|
|
$self->Log($r, ('warn', "loginBasic(): AuthUnique check failed: Same credentials have been sent before")); |
415
|
|
|
|
|
|
|
} |
416
|
|
|
|
|
|
|
} |
417
|
|
|
|
|
|
|
|
418
|
|
|
|
|
|
|
if (@credentials) { |
419
|
|
|
|
|
|
|
# Exchange the credentials for a session key. |
420
|
|
|
|
|
|
|
$ses_key = $self->authen_cred($r, @credentials); |
421
|
|
|
|
|
|
|
if ($ses_key) { |
422
|
|
|
|
|
|
|
# Set session cookie with expiration included if SessionExpire |
423
|
|
|
|
|
|
|
# is set. (Extended +8 hours for logouts/cleanup) |
424
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}SessionExpire")) { |
425
|
|
|
|
|
|
|
$self->send_cookie($r, $ses_key, {expires => $r->dir_config("${auth_name}SessionExpire") + 28800}); |
426
|
|
|
|
|
|
|
} else { |
427
|
|
|
|
|
|
|
$self->send_cookie($r, $ses_key); |
428
|
|
|
|
|
|
|
} |
429
|
|
|
|
|
|
|
$self->handle_cache($r); |
430
|
|
|
|
|
|
|
|
431
|
|
|
|
|
|
|
# Log 1/2 of session key to debug |
432
|
|
|
|
|
|
|
$self->Log($r, ('debug', "loginBasic(): session key (browser cookie value): " . XHalf($ses_key))); |
433
|
|
|
|
|
|
|
|
434
|
|
|
|
|
|
|
# Godspeed You Black Emperor! |
435
|
|
|
|
|
|
|
$t = $r->uri; |
436
|
|
|
|
|
|
|
($r->args) && ($t .= '?' . $r->args); |
437
|
|
|
|
|
|
|
$self->Log($r, ('debug', "loginBasic(): REDIRECTING TO: $t")); |
438
|
|
|
|
|
|
|
$r->err_headers_out->{'Location'} = $t; |
439
|
|
|
|
|
|
|
return REDIRECT; |
440
|
|
|
|
|
|
|
} |
441
|
|
|
|
|
|
|
} |
442
|
|
|
|
|
|
|
} |
443
|
|
|
|
|
|
|
|
444
|
|
|
|
|
|
|
# Unset the username if set |
445
|
|
|
|
|
|
|
$r->user() and $r->user(undef); |
446
|
|
|
|
|
|
|
|
447
|
|
|
|
|
|
|
# Add their IP to the failure tracker and just return HTTP_FORBIDDEN |
448
|
|
|
|
|
|
|
# if they exceed the limit |
449
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}IPFailures")) { |
450
|
|
|
|
|
|
|
if ($MP eq 1) { |
451
|
|
|
|
|
|
|
unless ($self->CheckTracker($r, 'IPFailures', $r->dir_config("${auth_name}IPFailures"), $r->get_remote_host)) { |
452
|
|
|
|
|
|
|
$self->Log($r, ('warn', "loginBasic(): Returning HTTP_FORBIDDEN to IPFailires banned IP")); |
453
|
|
|
|
|
|
|
return HTTP_FORBIDDEN; |
454
|
|
|
|
|
|
|
} |
455
|
|
|
|
|
|
|
} else { |
456
|
|
|
|
|
|
|
unless ($self->CheckTracker($r, 'IPFailures', $r->dir_config("${auth_name}IPFailures"), $r->connection->get_remote_host)) { |
457
|
|
|
|
|
|
|
$self->Log($r, ('warn', "loginBasic(): Returning HTTP_FORBIDDEN to IPFailires banned IP")); |
458
|
|
|
|
|
|
|
return HTTP_FORBIDDEN; |
459
|
|
|
|
|
|
|
} |
460
|
|
|
|
|
|
|
} |
461
|
|
|
|
|
|
|
} |
462
|
|
|
|
|
|
|
|
463
|
|
|
|
|
|
|
# Set the basic auth header and send back to the client |
464
|
|
|
|
|
|
|
$r->note_basic_auth_failure; |
465
|
|
|
|
|
|
|
return HTTP_UNAUTHORIZED; |
466
|
|
|
|
|
|
|
} |
467
|
|
|
|
|
|
|
|
468
|
|
|
|
|
|
|
|
469
|
|
|
|
|
|
|
# Logout, kill session, kill, kill, kill |
470
|
|
|
|
|
|
|
sub logout_mp1 ($$) { &logout_real } |
471
|
|
|
|
|
|
|
sub logout_mp2 : method { &logout_real } |
472
|
|
|
|
|
|
|
*logout = ($MP eq 1) ? \&logout_mp1 : \&logout_mp2; |
473
|
|
|
|
|
|
|
sub logout_real { |
474
|
|
|
|
|
|
|
my $self = shift; |
475
|
|
|
|
|
|
|
my $r = shift; |
476
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
477
|
|
|
|
|
|
|
my $redirect = shift || ""; |
478
|
|
|
|
|
|
|
my ($sid, %sess, $sessconfig, $username, $alterlist); |
479
|
|
|
|
|
|
|
|
480
|
|
|
|
|
|
|
# Get the Cookie header. If there is a session key for this realm, strip |
481
|
|
|
|
|
|
|
# off everything but the value of the cookie. |
482
|
|
|
|
|
|
|
my $cookie_name = $self->cookie_name($r); |
483
|
|
|
|
|
|
|
my ($key) = $r->headers_in->{'Cookie'} =~ /$cookie_name=([^;]+)/; |
484
|
|
|
|
|
|
|
|
485
|
|
|
|
|
|
|
# Try custom keysource if no cookie is present and Keysource is configured |
486
|
|
|
|
|
|
|
if (!$key && $auth_name && $r->dir_config("${auth_name}Keysource")) { |
487
|
|
|
|
|
|
|
# Pull in key text |
488
|
|
|
|
|
|
|
$key = $self->FetchKeysource($r); |
489
|
|
|
|
|
|
|
# Non-empty, so use to generate the real session auth key |
490
|
|
|
|
|
|
|
if ($key) { |
491
|
|
|
|
|
|
|
$key = CreateSessionAuthKey($key); |
492
|
|
|
|
|
|
|
} |
493
|
|
|
|
|
|
|
} |
494
|
|
|
|
|
|
|
|
495
|
|
|
|
|
|
|
# If set, check key format, else check for custom keysource |
496
|
|
|
|
|
|
|
if ($key) { |
497
|
|
|
|
|
|
|
($key = CheckSidFormat($key)) || (($self->Log($r, 'error', 'logout(): Invalid Session Key Format')) && (return undef)); |
498
|
|
|
|
|
|
|
} |
499
|
|
|
|
|
|
|
|
500
|
|
|
|
|
|
|
# Get session config from Apache |
501
|
|
|
|
|
|
|
($sessconfig = $self->GetSessionConfig($r)) || (die("logout: Unable to get session configuration while checking authentication\n")); |
502
|
|
|
|
|
|
|
|
503
|
|
|
|
|
|
|
if ($key) { |
504
|
|
|
|
|
|
|
# Enter the authentication key into the session config (NEVER STORE IT |
505
|
|
|
|
|
|
|
# IN THE ACTUAL SESSION DATA!) |
506
|
|
|
|
|
|
|
$sessconfig->{key} = $key; |
507
|
|
|
|
|
|
|
|
508
|
|
|
|
|
|
|
# Compute real session ID |
509
|
|
|
|
|
|
|
($sessconfig->{ServerKey}) || |
510
|
|
|
|
|
|
|
(($self->Log($r, ('error', 'logout(): ${auth_name}SessionServerPass or ${auth_name}SessionServerKey not set (required for HMAC sessions)'))) && |
511
|
|
|
|
|
|
|
(return undef)); |
512
|
|
|
|
|
|
|
($sid = ComputeSessionId($key, $sessconfig->{ServerKey})) || (($self->Log($r, ('error', 'logout(): Error computing session ID'))) && (return undef)); |
513
|
|
|
|
|
|
|
} else { |
514
|
|
|
|
|
|
|
$sid = ''; |
515
|
|
|
|
|
|
|
} |
516
|
|
|
|
|
|
|
|
517
|
|
|
|
|
|
|
# Try to delete the session. Note that session handling errors do not |
518
|
|
|
|
|
|
|
# return but fall through to return OK or REDIRECT depending |
519
|
|
|
|
|
|
|
# on how we were called. |
520
|
|
|
|
|
|
|
if ($sid) { |
521
|
|
|
|
|
|
|
# Check the SID |
522
|
|
|
|
|
|
|
if ($sid = CheckSidFormat($sid)) { |
523
|
|
|
|
|
|
|
# Open the session (this should die on a non-existant session)!!! |
524
|
|
|
|
|
|
|
eval { tie(%sess, 'Apache::AppSamurai::Session', $sid, $sessconfig); }; |
525
|
|
|
|
|
|
|
if ($@) { |
526
|
|
|
|
|
|
|
$self->Log($r, ('debug', "logout(): Unable to open session \"$sid\": $@")); |
527
|
|
|
|
|
|
|
} else { |
528
|
|
|
|
|
|
|
$username = $sess{'username'}; |
529
|
|
|
|
|
|
|
|
530
|
|
|
|
|
|
|
# Load alterlist |
531
|
|
|
|
|
|
|
$alterlist = $self->AlterlistLoad(\%sess); |
532
|
|
|
|
|
|
|
# Re-apply passback cookies to which were cleared and backdated |
533
|
|
|
|
|
|
|
# after session creation. (This clears the passback cookies) |
534
|
|
|
|
|
|
|
if (defined($alterlist->{cookie})) { |
535
|
|
|
|
|
|
|
$self->AlterlistPassBackCookie($alterlist, $r); |
536
|
|
|
|
|
|
|
} |
537
|
|
|
|
|
|
|
|
538
|
|
|
|
|
|
|
$self->DestroySession($r, \%sess); |
539
|
|
|
|
|
|
|
untie(%sess); |
540
|
|
|
|
|
|
|
$self->Log($r, ('notice', "LOGOUT: username=\"$username\", session=\"$sid\", reason=logout")); |
541
|
|
|
|
|
|
|
} |
542
|
|
|
|
|
|
|
} else { |
543
|
|
|
|
|
|
|
$self->Log($r, ('error', 'logout(): Invalid Session ID Format')); |
544
|
|
|
|
|
|
|
} |
545
|
|
|
|
|
|
|
} else { |
546
|
|
|
|
|
|
|
# No cookie set |
547
|
|
|
|
|
|
|
$self->Log($r, ('error', 'logout(): Missing session ID')); |
548
|
|
|
|
|
|
|
} |
549
|
|
|
|
|
|
|
|
550
|
|
|
|
|
|
|
# Clear cookie and set no-cache for client |
551
|
|
|
|
|
|
|
$self->remove_cookie($r); |
552
|
|
|
|
|
|
|
$self->handle_cache($r); |
553
|
|
|
|
|
|
|
|
554
|
|
|
|
|
|
|
# Check for hard-coded redirect for logout, or failing that, our |
555
|
|
|
|
|
|
|
# landing page |
556
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}LogoutDestination")) { |
557
|
|
|
|
|
|
|
$redirect = $r->dir_config("${auth_name}LogoutDestination"); |
558
|
|
|
|
|
|
|
} elsif ($r->dir_config("${auth_name}LoginDestination")) { |
559
|
|
|
|
|
|
|
$redirect = $r->dir_config("${auth_name}LoginDestination"); |
560
|
|
|
|
|
|
|
} |
561
|
|
|
|
|
|
|
|
562
|
|
|
|
|
|
|
if ($redirect ne '') { |
563
|
|
|
|
|
|
|
$r->err_headers_out->{'Location'} = $redirect; |
564
|
|
|
|
|
|
|
$r->status(REDIRECT); |
565
|
|
|
|
|
|
|
return REDIRECT; |
566
|
|
|
|
|
|
|
} else { |
567
|
|
|
|
|
|
|
# Strip path and reload - THIS ONLY WORKS IF / IS REDIRECTED TO THE |
568
|
|
|
|
|
|
|
# LANDING PAGE |
569
|
|
|
|
|
|
|
$r->err_headers_out->{'Location'} = '/'; |
570
|
|
|
|
|
|
|
$r->status(REDIRECT); |
571
|
|
|
|
|
|
|
return REDIRECT; |
572
|
|
|
|
|
|
|
} |
573
|
|
|
|
|
|
|
|
574
|
|
|
|
|
|
|
# Returning the login form without redirecting on logout is probably not |
575
|
|
|
|
|
|
|
# right for any circumstance. (Leaving this here for reference.) |
576
|
|
|
|
|
|
|
# else { |
577
|
|
|
|
|
|
|
# return $self->login_form($r); |
578
|
|
|
|
|
|
|
# } |
579
|
|
|
|
|
|
|
} |
580
|
|
|
|
|
|
|
|
581
|
|
|
|
|
|
|
|
582
|
|
|
|
|
|
|
# Check for unauthenticated session and force login if not authenticated |
583
|
|
|
|
|
|
|
sub authenticate_mp1 ($$) { &authenticate_real } |
584
|
|
|
|
|
|
|
sub authenticate_mp2 : method { &authenticate_real } |
585
|
|
|
|
|
|
|
*authenticate = ($MP eq 1) ? \&authenticate_mp1 : \&authenticate_mp2; |
586
|
|
|
|
|
|
|
sub authenticate_real { |
587
|
|
|
|
|
|
|
my ($self, $r) = @_; |
588
|
|
|
|
|
|
|
my $auth_user; |
589
|
|
|
|
|
|
|
my ($t, $foundcookie); |
590
|
|
|
|
|
|
|
|
591
|
|
|
|
|
|
|
unless ($r->is_initial_req) { |
592
|
|
|
|
|
|
|
if (defined $r->prev) { |
593
|
|
|
|
|
|
|
# we are in a sub-request. Just copy user from previous request. |
594
|
|
|
|
|
|
|
($MP eq 1) ? ($r->connection->user($r->prev->connection->user)) : |
595
|
|
|
|
|
|
|
($r->user($r->prev->user)); |
596
|
|
|
|
|
|
|
} |
597
|
|
|
|
|
|
|
return OK; |
598
|
|
|
|
|
|
|
} |
599
|
|
|
|
|
|
|
|
600
|
|
|
|
|
|
|
# Type must either be our own, or Basic |
601
|
|
|
|
|
|
|
unless (($r->auth_type eq $self) || ($r->auth_type =~ /^basic$/i)) { |
602
|
|
|
|
|
|
|
# Location requires authentication but we don't handle this AuthType. |
603
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authenticate(): AuthType mismatch: $self =/= ".$r->auth_type)); |
604
|
|
|
|
|
|
|
return DECLINED; |
605
|
|
|
|
|
|
|
} |
606
|
|
|
|
|
|
|
|
607
|
|
|
|
|
|
|
# AuthType is $auth_type which we handle, Check the authentication realm |
608
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
609
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authenticate(): auth_name " . $auth_name)); |
610
|
|
|
|
|
|
|
unless ($auth_name) { |
611
|
|
|
|
|
|
|
$r->log_reason("AuthName not set, AuthType=$self", $r->uri); |
612
|
|
|
|
|
|
|
return HTTP_INTERNAL_SERVER_ERROR; |
613
|
|
|
|
|
|
|
} |
614
|
|
|
|
|
|
|
|
615
|
|
|
|
|
|
|
# Get the Cookie header. If there is a session key for this realm, strip |
616
|
|
|
|
|
|
|
# off everything but the value of the cookie. |
617
|
|
|
|
|
|
|
my $cookie_name = $self->cookie_name($r); |
618
|
|
|
|
|
|
|
my ($ses_key_cookie) = ($r->headers_in->{"Cookie"} || "") =~ /$cookie_name=([^;]+)/; |
619
|
|
|
|
|
|
|
|
620
|
|
|
|
|
|
|
$foundcookie = 0; |
621
|
|
|
|
|
|
|
if ($ses_key_cookie) { |
622
|
|
|
|
|
|
|
# If cookie found and not "", set $foundcookie to note auth key source |
623
|
|
|
|
|
|
|
$foundcookie = 1; |
624
|
|
|
|
|
|
|
} elsif ($r->dir_config("${auth_name}Keysource")) { |
625
|
|
|
|
|
|
|
# Try custom keysource if no cookie is present and Keysource is configured |
626
|
|
|
|
|
|
|
# Pull in key text |
627
|
|
|
|
|
|
|
$ses_key_cookie = $self->FetchKeysource($r); |
628
|
|
|
|
|
|
|
|
629
|
|
|
|
|
|
|
if ($ses_key_cookie) { |
630
|
|
|
|
|
|
|
# Non-empty, so use to generate the real session auth key |
631
|
|
|
|
|
|
|
$ses_key_cookie = CreateSessionAuthKey($ses_key_cookie); |
632
|
|
|
|
|
|
|
} else { |
633
|
|
|
|
|
|
|
$ses_key_cookie = ""; |
634
|
|
|
|
|
|
|
} |
635
|
|
|
|
|
|
|
} else { |
636
|
|
|
|
|
|
|
$ses_key_cookie = ""; |
637
|
|
|
|
|
|
|
} |
638
|
|
|
|
|
|
|
|
639
|
|
|
|
|
|
|
# Report half of session key |
640
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authenticate(): Current ses_key_cookie: \"" . XHalf($ses_key_cookie) . "\"")); |
641
|
|
|
|
|
|
|
|
642
|
|
|
|
|
|
|
if ($ses_key_cookie) { |
643
|
|
|
|
|
|
|
my ($auth_user, @args) = $self->authen_ses_key($r, $ses_key_cookie); |
644
|
|
|
|
|
|
|
|
645
|
|
|
|
|
|
|
if ($auth_user and scalar @args == 0) { |
646
|
|
|
|
|
|
|
# We have a valid session key, so we return with an OK value. |
647
|
|
|
|
|
|
|
# Tell the rest of Apache what the authentication method and |
648
|
|
|
|
|
|
|
# user is. |
649
|
|
|
|
|
|
|
if ($MP eq 1) { |
650
|
|
|
|
|
|
|
$r->connection->auth_type($self); |
651
|
|
|
|
|
|
|
$r->connection->user($auth_user); |
652
|
|
|
|
|
|
|
} else { |
653
|
|
|
|
|
|
|
# Assume MP2 behaviour |
654
|
|
|
|
|
|
|
$r->ap_auth_type($self); |
655
|
|
|
|
|
|
|
$r->user($auth_user); |
656
|
|
|
|
|
|
|
} |
657
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authenticate(): user authenticated as $auth_user")); |
658
|
|
|
|
|
|
|
|
659
|
|
|
|
|
|
|
return OK; |
660
|
|
|
|
|
|
|
|
661
|
|
|
|
|
|
|
} elsif (scalar @args > 0 and $self->can('custom_errors')) { |
662
|
|
|
|
|
|
|
return $self->custom_errors($r, $auth_user, @args); |
663
|
|
|
|
|
|
|
} else { |
664
|
|
|
|
|
|
|
# There was a session key set, but it's invalid. |
665
|
|
|
|
|
|
|
if ($foundcookie) { |
666
|
|
|
|
|
|
|
# Remove cookie from the client now so it does not come back. |
667
|
|
|
|
|
|
|
$self->remove_cookie($r); |
668
|
|
|
|
|
|
|
} |
669
|
|
|
|
|
|
|
$self->handle_cache($r); |
670
|
|
|
|
|
|
|
$r->subprocess_env('AppSamuraiReason', 'bad_cookie'); |
671
|
|
|
|
|
|
|
|
672
|
|
|
|
|
|
|
# Add to our the session tracker (so we can short cut if resent) |
673
|
|
|
|
|
|
|
# Ignores return (we are already on the way out...) |
674
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}SessionUnique")) { |
675
|
|
|
|
|
|
|
$self->CheckTracker($r, 'SessionUnique', $ses_key_cookie); |
676
|
|
|
|
|
|
|
} |
677
|
|
|
|
|
|
|
} |
678
|
|
|
|
|
|
|
} else { |
679
|
|
|
|
|
|
|
# They have no cookie or Keysource generated auth key |
680
|
|
|
|
|
|
|
$r->subprocess_env('AppSamuraiReason', 'no_cookie'); |
681
|
|
|
|
|
|
|
} |
682
|
|
|
|
|
|
|
|
683
|
|
|
|
|
|
|
# If serving Basic, hand control over the the basic login handler |
684
|
|
|
|
|
|
|
if ($r->auth_type =~ /^basic$/i) { |
685
|
|
|
|
|
|
|
# (Returns an OK if the login was good or return a 401 if not.) |
686
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authenticate(): Basic auth protected area: Attempting loginBasic()")); |
687
|
|
|
|
|
|
|
return $self->loginBasic($r); |
688
|
|
|
|
|
|
|
} else { |
689
|
|
|
|
|
|
|
# They aren't authenticated, and they tried to get a protected |
690
|
|
|
|
|
|
|
# document. Send them the authen form. |
691
|
|
|
|
|
|
|
return $self->login_form($r); |
692
|
|
|
|
|
|
|
} |
693
|
|
|
|
|
|
|
} |
694
|
|
|
|
|
|
|
|
695
|
|
|
|
|
|
|
# Generate login form |
696
|
|
|
|
|
|
|
sub login_form { |
697
|
|
|
|
|
|
|
my ($self, $r) = @_; |
698
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
699
|
|
|
|
|
|
|
|
700
|
|
|
|
|
|
|
# Pull POST args into the GET args and set type as GET |
701
|
|
|
|
|
|
|
$self->_convert_to_get($r) if $r->method eq 'POST'; |
702
|
|
|
|
|
|
|
|
703
|
|
|
|
|
|
|
my $authen_script; |
704
|
|
|
|
|
|
|
unless ($authen_script = $r->dir_config($auth_name . "LoginScript")) { |
705
|
|
|
|
|
|
|
$self->Log($r, ('error', "login_form(): PerlSetVar '${auth_name}LoginScript' not set", $r->uri)); |
706
|
|
|
|
|
|
|
return HTTP_INTERNAL_SERVER_ERROR; |
707
|
|
|
|
|
|
|
} |
708
|
|
|
|
|
|
|
$self->Log($r, ('debug', "login_form(): Displaying $authen_script")); |
709
|
|
|
|
|
|
|
$r->custom_response(HTTP_FORBIDDEN, $authen_script); |
710
|
|
|
|
|
|
|
|
711
|
|
|
|
|
|
|
return HTTP_FORBIDDEN; |
712
|
|
|
|
|
|
|
} |
713
|
|
|
|
|
|
|
|
714
|
|
|
|
|
|
|
# Check for sane "satisfy" setting |
715
|
|
|
|
|
|
|
sub satisfy_is_valid { |
716
|
|
|
|
|
|
|
my ($self, $r, $satisfy) = @_; |
717
|
|
|
|
|
|
|
$satisfy = lc $satisfy; |
718
|
|
|
|
|
|
|
|
719
|
|
|
|
|
|
|
if ($satisfy eq 'any' or $satisfy eq 'all') { |
720
|
|
|
|
|
|
|
return 1; |
721
|
|
|
|
|
|
|
} else { |
722
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
723
|
|
|
|
|
|
|
$self->Log($r, ('error', "satisfy_is_valid(): PerlSetVar ${auth_name}Satisfy $satisfy invalid",$r->uri)); |
724
|
|
|
|
|
|
|
return 0; |
725
|
|
|
|
|
|
|
} |
726
|
|
|
|
|
|
|
} |
727
|
|
|
|
|
|
|
|
728
|
|
|
|
|
|
|
# Get satisfy setting |
729
|
|
|
|
|
|
|
sub get_satisfy { |
730
|
|
|
|
|
|
|
my ($self, $r) = @_; |
731
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
732
|
|
|
|
|
|
|
return lc $r->dir_config("${auth_name}Satisfy") || 'all'; |
733
|
|
|
|
|
|
|
} |
734
|
|
|
|
|
|
|
|
735
|
|
|
|
|
|
|
|
736
|
|
|
|
|
|
|
# Check for proper authorization for the area |
737
|
|
|
|
|
|
|
sub authorize_mp1 ($$) { &authorize_real } |
738
|
|
|
|
|
|
|
sub authorize_mp2 : method { &authorize_real } |
739
|
|
|
|
|
|
|
*authorize = ($MP eq 1) ? \&authorize_mp1 : \&authorize_mp2; |
740
|
|
|
|
|
|
|
sub authorize_real { |
741
|
|
|
|
|
|
|
my ($self, $r) = @_; |
742
|
|
|
|
|
|
|
|
743
|
|
|
|
|
|
|
$self->Log($r, ('debug', 'authorize(): URI '.$r->uri())); |
744
|
|
|
|
|
|
|
return OK unless $r->is_initial_req; #only the first internal request |
745
|
|
|
|
|
|
|
|
746
|
|
|
|
|
|
|
unless (($r->auth_type eq $self) || ($r->auth_type =~ /^basic$/i)) { |
747
|
|
|
|
|
|
|
$self->Log($r, ('debug', $self . "authorize(): Wrong auth type: " . $r->auth_type)); |
748
|
|
|
|
|
|
|
return DECLINED; |
749
|
|
|
|
|
|
|
} |
750
|
|
|
|
|
|
|
|
751
|
|
|
|
|
|
|
my $reqs_arr = $r->requires or return DECLINED; |
752
|
|
|
|
|
|
|
|
753
|
|
|
|
|
|
|
my $user = ($MP eq 1) ? ($r->connection->user) : ($r->user); |
754
|
|
|
|
|
|
|
unless ($user) { |
755
|
|
|
|
|
|
|
# user is either undef or =0 which means the authentication failed |
756
|
|
|
|
|
|
|
$r->log_reason("No user authenticated", $r->uri); |
757
|
|
|
|
|
|
|
return HTTP_FORBIDDEN; |
758
|
|
|
|
|
|
|
} |
759
|
|
|
|
|
|
|
|
760
|
|
|
|
|
|
|
my $satisfy = $self->get_satisfy($r); |
761
|
|
|
|
|
|
|
return HTTP_INTERNAL_SERVER_ERROR unless $self->satisfy_is_valid($r,$satisfy); |
762
|
|
|
|
|
|
|
my $satisfy_all = $satisfy eq 'all'; |
763
|
|
|
|
|
|
|
|
764
|
|
|
|
|
|
|
my ($forbidden); |
765
|
|
|
|
|
|
|
foreach my $req (@$reqs_arr) { |
766
|
|
|
|
|
|
|
my ($requirement, $args) = split /\s+/, $req->{requirement}, 2; |
767
|
|
|
|
|
|
|
$args = '' unless defined $args; |
768
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authorize(): requirement := $requirement, $args")); |
769
|
|
|
|
|
|
|
|
770
|
|
|
|
|
|
|
if ( lc($requirement) eq 'valid-user' ) { |
771
|
|
|
|
|
|
|
if ($satisfy_all) { |
772
|
|
|
|
|
|
|
next; |
773
|
|
|
|
|
|
|
} else { |
774
|
|
|
|
|
|
|
return OK; |
775
|
|
|
|
|
|
|
} |
776
|
|
|
|
|
|
|
} |
777
|
|
|
|
|
|
|
|
778
|
|
|
|
|
|
|
if($requirement eq 'user') { |
779
|
|
|
|
|
|
|
if ($args =~ m/\b$user\b/) { |
780
|
|
|
|
|
|
|
next if $satisfy_all; |
781
|
|
|
|
|
|
|
return OK; # satisfy any |
782
|
|
|
|
|
|
|
} |
783
|
|
|
|
|
|
|
|
784
|
|
|
|
|
|
|
$forbidden = 1; |
785
|
|
|
|
|
|
|
next; |
786
|
|
|
|
|
|
|
} |
787
|
|
|
|
|
|
|
|
788
|
|
|
|
|
|
|
# Call a custom method |
789
|
|
|
|
|
|
|
my $ret_val = $self->$requirement($r, $args); |
790
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authorize(): $self->$requirement returned $ret_val")); |
791
|
|
|
|
|
|
|
if ($ret_val == OK) { |
792
|
|
|
|
|
|
|
next if $satisfy_all; |
793
|
|
|
|
|
|
|
return OK; # satisfy any |
794
|
|
|
|
|
|
|
} |
795
|
|
|
|
|
|
|
|
796
|
|
|
|
|
|
|
# Nothing succeeded, deny access to this user. |
797
|
|
|
|
|
|
|
$forbidden = 1; |
798
|
|
|
|
|
|
|
} |
799
|
|
|
|
|
|
|
|
800
|
|
|
|
|
|
|
return $forbidden ? HTTP_FORBIDDEN : OK; |
801
|
|
|
|
|
|
|
} |
802
|
|
|
|
|
|
|
|
803
|
|
|
|
|
|
|
# Have a session cookie Mr. Browser |
804
|
|
|
|
|
|
|
sub send_cookie { |
805
|
|
|
|
|
|
|
my ($self, $r, $ses_key, $cookie_args) = @_; |
806
|
|
|
|
|
|
|
|
807
|
|
|
|
|
|
|
$cookie_args = {} unless defined $cookie_args; |
808
|
|
|
|
|
|
|
|
809
|
|
|
|
|
|
|
my $cookie_name = $self->cookie_name($r); |
810
|
|
|
|
|
|
|
|
811
|
|
|
|
|
|
|
my $cookie = $self->cookie_string( request => $r, |
812
|
|
|
|
|
|
|
key => $cookie_name, |
813
|
|
|
|
|
|
|
value => $ses_key, |
814
|
|
|
|
|
|
|
%$cookie_args ); |
815
|
|
|
|
|
|
|
|
816
|
|
|
|
|
|
|
# add P3P header if user has configured it. |
817
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
818
|
|
|
|
|
|
|
if (my $p3p = $r->dir_config("${auth_name}P3P")) { |
819
|
|
|
|
|
|
|
$r->err_headers_out->{'P3P'} = $p3p; |
820
|
|
|
|
|
|
|
} |
821
|
|
|
|
|
|
|
|
822
|
|
|
|
|
|
|
$r->err_headers_out->add("Set-Cookie" => $cookie); |
823
|
|
|
|
|
|
|
} |
824
|
|
|
|
|
|
|
|
825
|
|
|
|
|
|
|
# Convert cookie store to header ready string |
826
|
|
|
|
|
|
|
sub cookie_string { |
827
|
|
|
|
|
|
|
my $self = shift; |
828
|
|
|
|
|
|
|
|
829
|
|
|
|
|
|
|
# if passed 3 args, we have old-style call. |
830
|
|
|
|
|
|
|
if (scalar(@_) == 3) { |
831
|
|
|
|
|
|
|
carp "cookie_string(): deprecated old style call to ".__PACKAGE__."::cookie_string()"; |
832
|
|
|
|
|
|
|
my ($r, $key, $value) = @_; |
833
|
|
|
|
|
|
|
return $self->cookie_string(request=>$r, key=>$key, value=>$value); |
834
|
|
|
|
|
|
|
} |
835
|
|
|
|
|
|
|
# otherwise assume named parameters. |
836
|
|
|
|
|
|
|
my %p = @_; |
837
|
|
|
|
|
|
|
for (qw/request key/) { |
838
|
|
|
|
|
|
|
die("cookie_string(): missing required parameter $_\n") unless defined $p{$_}; |
839
|
|
|
|
|
|
|
} |
840
|
|
|
|
|
|
|
# its okay if value is undef here. |
841
|
|
|
|
|
|
|
|
842
|
|
|
|
|
|
|
my $r = $p{request}; |
843
|
|
|
|
|
|
|
|
844
|
|
|
|
|
|
|
$p{value} = '' unless defined $p{value}; |
845
|
|
|
|
|
|
|
|
846
|
|
|
|
|
|
|
my $string = sprintf '%s=%s', @p{'key','value'}; |
847
|
|
|
|
|
|
|
|
848
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
849
|
|
|
|
|
|
|
|
850
|
|
|
|
|
|
|
if (my $expires = $p{expires} || $r->dir_config("${auth_name}Expires")) { |
851
|
|
|
|
|
|
|
$expires = Apache::AppSamurai::Util::expires($expires); |
852
|
|
|
|
|
|
|
$string .= "; expires=$expires"; |
853
|
|
|
|
|
|
|
} |
854
|
|
|
|
|
|
|
|
855
|
|
|
|
|
|
|
$string .= '; path=' . ( $self->get_cookie_path($r) || '/' ); |
856
|
|
|
|
|
|
|
|
857
|
|
|
|
|
|
|
if (my $domain = $r->dir_config("${auth_name}Domain")) { |
858
|
|
|
|
|
|
|
$string .= "; domain=$domain"; |
859
|
|
|
|
|
|
|
} |
860
|
|
|
|
|
|
|
|
861
|
|
|
|
|
|
|
if (!$r->dir_config("${auth_name}Secure") || ($r->dir_config("${auth_name}Secure") == 1)) { |
862
|
|
|
|
|
|
|
$string .= '; secure'; |
863
|
|
|
|
|
|
|
} |
864
|
|
|
|
|
|
|
|
865
|
|
|
|
|
|
|
# HttpOnly is an MS extension. See |
866
|
|
|
|
|
|
|
# http://msdn.microsoft.com/workshop/author/dhtml/httponly_cookies.asp |
867
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}HttpOnly")) { |
868
|
|
|
|
|
|
|
$string .= '; HttpOnly'; |
869
|
|
|
|
|
|
|
} |
870
|
|
|
|
|
|
|
|
871
|
|
|
|
|
|
|
return $string; |
872
|
|
|
|
|
|
|
} |
873
|
|
|
|
|
|
|
|
874
|
|
|
|
|
|
|
# Retrieve session cookie value |
875
|
|
|
|
|
|
|
sub key { |
876
|
|
|
|
|
|
|
my ($self, $r) = @_; |
877
|
|
|
|
|
|
|
|
878
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
879
|
|
|
|
|
|
|
my $key = ""; |
880
|
|
|
|
|
|
|
|
881
|
|
|
|
|
|
|
my $allcook = ($r->headers_in->{"Cookie"} || ""); |
882
|
|
|
|
|
|
|
my $cookie_name = $self->cookie_name($r); |
883
|
|
|
|
|
|
|
($key) = $allcook =~ /(?:^|\s)$cookie_name=([^;]*)/; |
884
|
|
|
|
|
|
|
|
885
|
|
|
|
|
|
|
# Try custom keysource if no cookie is present and Keysource is configured |
886
|
|
|
|
|
|
|
if (!$key && $auth_name && $r->dir_config("${auth_name}Keysource")) { |
887
|
|
|
|
|
|
|
# Pull in key text |
888
|
|
|
|
|
|
|
$key = $self->FetchKeysource($r); |
889
|
|
|
|
|
|
|
# Non-empty, so use to generate the real session auth key |
890
|
|
|
|
|
|
|
if ($key) { |
891
|
|
|
|
|
|
|
$key = CreateSessionAuthKey($key); |
892
|
|
|
|
|
|
|
} |
893
|
|
|
|
|
|
|
} |
894
|
|
|
|
|
|
|
|
895
|
|
|
|
|
|
|
return $key; |
896
|
|
|
|
|
|
|
} |
897
|
|
|
|
|
|
|
|
898
|
|
|
|
|
|
|
# Retrieve session cookie path |
899
|
|
|
|
|
|
|
sub get_cookie_path { |
900
|
|
|
|
|
|
|
my ($self, $r) = @_; |
901
|
|
|
|
|
|
|
|
902
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
903
|
|
|
|
|
|
|
|
904
|
|
|
|
|
|
|
return $r->dir_config("${auth_name}Path"); |
905
|
|
|
|
|
|
|
} |
906
|
|
|
|
|
|
|
|
907
|
|
|
|
|
|
|
# Check authentication credentials and return a new session key |
908
|
|
|
|
|
|
|
sub authen_cred { |
909
|
|
|
|
|
|
|
my $self = shift; |
910
|
|
|
|
|
|
|
my $r = shift; |
911
|
|
|
|
|
|
|
my $username = shift; |
912
|
|
|
|
|
|
|
my @creds = @_; |
913
|
|
|
|
|
|
|
my $alterlist = {}; |
914
|
|
|
|
|
|
|
|
915
|
|
|
|
|
|
|
# Check for matching credentials and configured authentication methods |
916
|
|
|
|
|
|
|
unless (@creds) { |
917
|
|
|
|
|
|
|
$self->Log($r, ('error', "LOGIN FAILURE: Missing credentials")); |
918
|
|
|
|
|
|
|
return undef; |
919
|
|
|
|
|
|
|
} |
920
|
|
|
|
|
|
|
|
921
|
|
|
|
|
|
|
my @authmethods = $self->GetAuthMethods($r); |
922
|
|
|
|
|
|
|
unless (@authmethods) { |
923
|
|
|
|
|
|
|
$self->Log($r, ('error', "LOGIN FAILURE: No authentication methods defined")); |
924
|
|
|
|
|
|
|
return undef; |
925
|
|
|
|
|
|
|
} |
926
|
|
|
|
|
|
|
unless (scalar(@creds) == scalar(@authmethods)) { |
927
|
|
|
|
|
|
|
$self->Log($r, ('error', "LOGIN FAILURE: Wrong number of credentials supplied")); |
928
|
|
|
|
|
|
|
return undef; |
929
|
|
|
|
|
|
|
} |
930
|
|
|
|
|
|
|
|
931
|
|
|
|
|
|
|
my $authenticated = 0; |
932
|
|
|
|
|
|
|
|
933
|
|
|
|
|
|
|
my ($ret, $errors); |
934
|
|
|
|
|
|
|
|
935
|
|
|
|
|
|
|
# Require and get new instance of each authentication module |
936
|
|
|
|
|
|
|
my $authenticators = $self->InitAuthenticators($r, @authmethods); |
937
|
|
|
|
|
|
|
|
938
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authen_cred(): About to cycle authenticators")); |
939
|
|
|
|
|
|
|
for (my $i = 0; $i < scalar(@authmethods); $i++) { |
940
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authen_cred(): Checking $authmethods[$i]")); |
941
|
|
|
|
|
|
|
|
942
|
|
|
|
|
|
|
# Perform auth check |
943
|
|
|
|
|
|
|
$ret = $authenticators->{$authmethods[$i]}->Authenticate($username, $_[$i]); |
944
|
|
|
|
|
|
|
# Log any errors, warnings, etc. |
945
|
|
|
|
|
|
|
($errors = $authenticators->{$authmethods[$i]}->Errors) && ($self->Log($r, $errors)); |
946
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authen_cred(): Done checking $authmethods[$i]")); |
947
|
|
|
|
|
|
|
|
948
|
|
|
|
|
|
|
if ($ret) { |
949
|
|
|
|
|
|
|
# Success! |
950
|
|
|
|
|
|
|
$authenticated++; |
951
|
|
|
|
|
|
|
|
952
|
|
|
|
|
|
|
# Modify header (add/delete/filter) and cookie |
953
|
|
|
|
|
|
|
# (add/delete/filter/pass) rules |
954
|
|
|
|
|
|
|
$self->AlterlistMod($alterlist, $authenticators->{$authmethods[$i]}->{alterlist}); |
955
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authen_cred(): Added alterlist groups for" . join(",", keys %{$alterlist}))); |
956
|
|
|
|
|
|
|
|
957
|
|
|
|
|
|
|
} else { |
958
|
|
|
|
|
|
|
# Failure! Stop checking auth. |
959
|
|
|
|
|
|
|
last; |
960
|
|
|
|
|
|
|
} |
961
|
|
|
|
|
|
|
} |
962
|
|
|
|
|
|
|
|
963
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authen_cred(): Done cycling authenticators")); |
964
|
|
|
|
|
|
|
|
965
|
|
|
|
|
|
|
# If the number of successful authentications equals the number of |
966
|
|
|
|
|
|
|
# authentication methods, you may pass. |
967
|
|
|
|
|
|
|
if (($authenticated == scalar(@authmethods)) && ($ret = $self->CreateSession($r, $username, $alterlist))) { |
968
|
|
|
|
|
|
|
return $ret; |
969
|
|
|
|
|
|
|
} else { |
970
|
|
|
|
|
|
|
# Log username (Log handles cleanup of the username and all log lines) |
971
|
|
|
|
|
|
|
if ($username) { |
972
|
|
|
|
|
|
|
$self->Log($r, ('error', "LOGIN FAILURE: Authentication failed for \"$username\"")); |
973
|
|
|
|
|
|
|
} else { |
974
|
|
|
|
|
|
|
$self->Log($r, ('error', "LOGIN FAILURE: Authentication failed for missing or malformed username")); |
975
|
|
|
|
|
|
|
} |
976
|
|
|
|
|
|
|
|
977
|
|
|
|
|
|
|
# Lame excuse for brute force protection! Sleep from 0.0 to 1.0 secs |
978
|
|
|
|
|
|
|
# on failure to ensure someone can DoS us. :) IPFailures tracker needs |
979
|
|
|
|
|
|
|
# work to have a pre-check, or to have a call out to a script to |
980
|
|
|
|
|
|
|
# do something (like add the IP to a firewall block table) |
981
|
|
|
|
|
|
|
usleep(rand(1000000)); |
982
|
|
|
|
|
|
|
} |
983
|
|
|
|
|
|
|
|
984
|
|
|
|
|
|
|
return undef; |
985
|
|
|
|
|
|
|
} |
986
|
|
|
|
|
|
|
|
987
|
|
|
|
|
|
|
# Check session key and return user ID |
988
|
|
|
|
|
|
|
sub authen_ses_key { |
989
|
|
|
|
|
|
|
my ($self, $r, $key) = @_; |
990
|
|
|
|
|
|
|
my ($sid, %sess, $username, $sessconfig, $tk, $tv, $reason); |
991
|
|
|
|
|
|
|
my $alterlist = {}; |
992
|
|
|
|
|
|
|
|
993
|
|
|
|
|
|
|
# Is it well formed? |
994
|
|
|
|
|
|
|
($key = CheckSidFormat($key)) || (($self->Log($r,('error', 'Invalid Session Key Format'))) && (return undef)); |
995
|
|
|
|
|
|
|
|
996
|
|
|
|
|
|
|
# Get session config from Apache |
997
|
|
|
|
|
|
|
($sessconfig = $self->GetSessionConfig($r)) || (die("authen_ses_key(): Unable to get session configuration while checking authentication\n")); |
998
|
|
|
|
|
|
|
|
999
|
|
|
|
|
|
|
# Enter the authentication key into the session config |
1000
|
|
|
|
|
|
|
# (NOTE: MUST NOT BE STORED INSIDE SESSION) |
1001
|
|
|
|
|
|
|
$sessconfig->{key} = $key; |
1002
|
|
|
|
|
|
|
|
1003
|
|
|
|
|
|
|
# Compute real session ID |
1004
|
|
|
|
|
|
|
($sessconfig->{ServerKey}) || (($self->Log($r, ('error', 'authen_ses_key(): ServerPass or ServerKey not set (required for HMAC sessions)'))) && (return undef)); |
1005
|
|
|
|
|
|
|
|
1006
|
|
|
|
|
|
|
($sid = ComputeSessionId($sessconfig->{key}, $sessconfig->{ServerKey})) || (($self->Log($r, ('error', 'authen_ses_key(): Error computing session ID'))) && (return undef)); |
1007
|
|
|
|
|
|
|
|
1008
|
|
|
|
|
|
|
# Open the session (Eval will die on a non-existent session) |
1009
|
|
|
|
|
|
|
eval { tie(%sess, 'Apache::AppSamurai::Session', $sid, $sessconfig); }; |
1010
|
|
|
|
|
|
|
if ($@) { |
1011
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authen_ses_key(): Unable to open session \"$sid\": $@")); |
1012
|
|
|
|
|
|
|
return undef; |
1013
|
|
|
|
|
|
|
} |
1014
|
|
|
|
|
|
|
|
1015
|
|
|
|
|
|
|
# Dump session contents to log (with some attempted cleanup for security) |
1016
|
|
|
|
|
|
|
if ($self->_debug($r)) { |
1017
|
|
|
|
|
|
|
my @tsl = (); |
1018
|
|
|
|
|
|
|
push(@tsl, "authen_ses_key(): Dump of session \"$sid\": "); |
1019
|
|
|
|
|
|
|
foreach $tk (sort keys %sess) { |
1020
|
|
|
|
|
|
|
$tv = $sess{$tk}; |
1021
|
|
|
|
|
|
|
if ($tk eq 'al-header') { |
1022
|
|
|
|
|
|
|
# Sanitize headers (Leaving 8 chars of context for each) |
1023
|
|
|
|
|
|
|
$tv =~ s/^(\w+:authorization:.{1,8})(.*)$/$1 . "X" x length($2)/gmie; |
1024
|
|
|
|
|
|
|
} elsif ($tk eq 'al-cookie') { |
1025
|
|
|
|
|
|
|
# Sanitize cookies (Leaving 8 characters of context) |
1026
|
|
|
|
|
|
|
$tv =~ s/^(\w+:[^\:\=]+:.{1,8})([^;]*)(;.*)$/$1 . ("X" x length($2)) . $3/gmie; |
1027
|
|
|
|
|
|
|
} elsif ($tk =~ /auth/i) { |
1028
|
|
|
|
|
|
|
# Probably something we want hidden |
1029
|
|
|
|
|
|
|
$tv =~ s/^(.{1,8})(.*)$/$1 . "X" x length($2)/gmie; |
1030
|
|
|
|
|
|
|
} |
1031
|
|
|
|
|
|
|
push(@tsl, "$tk=>\"$tv\""); |
1032
|
|
|
|
|
|
|
} |
1033
|
|
|
|
|
|
|
$self->Log($r, ('debug', join(",", @tsl))); |
1034
|
|
|
|
|
|
|
} |
1035
|
|
|
|
|
|
|
|
1036
|
|
|
|
|
|
|
# Pull header and cookie mod lists |
1037
|
|
|
|
|
|
|
$alterlist = $self->AlterlistLoad(\%sess); |
1038
|
|
|
|
|
|
|
|
1039
|
|
|
|
|
|
|
# No reason... yet |
1040
|
|
|
|
|
|
|
$reason = ''; |
1041
|
|
|
|
|
|
|
|
1042
|
|
|
|
|
|
|
# Give me a reason... anything... any little excuse to kill your session... |
1043
|
|
|
|
|
|
|
$username = $sess{'username'}; |
1044
|
|
|
|
|
|
|
if (!$username) { |
1045
|
|
|
|
|
|
|
# Session must have a username |
1046
|
|
|
|
|
|
|
$reason = 'no_username'; |
1047
|
|
|
|
|
|
|
# Extra-bad! |
1048
|
|
|
|
|
|
|
$self->Log($r, ('error', "authen_ses_key(): No username for session \"$sid\"")); |
1049
|
|
|
|
|
|
|
} elsif (!$self->CheckTime(\%sess)) { |
1050
|
|
|
|
|
|
|
# Expiration check failed |
1051
|
|
|
|
|
|
|
$reason = 'timeout'; |
1052
|
|
|
|
|
|
|
} elsif (($sess{"Authorization"}) && ($r->headers_in->{"Authorization"}) && ($r->headers_in->{"Authorization"} ne $sess{"Authorization"})) { |
1053
|
|
|
|
|
|
|
# Client sent a Authorization header that does not match the one sent |
1054
|
|
|
|
|
|
|
# when logging in. This indicates one of two potential issues: |
1055
|
|
|
|
|
|
|
# 1) For areas configured to use basic auth, the auth has changed on |
1056
|
|
|
|
|
|
|
# the browser side, so kill the session. |
1057
|
|
|
|
|
|
|
# 2) For areas we front with a form, this indicates that the backend |
1058
|
|
|
|
|
|
|
# server sent a 401 to the client. We need to kill the session to |
1059
|
|
|
|
|
|
|
# get things in line again. |
1060
|
|
|
|
|
|
|
$reason = "basic_auth_change"; |
1061
|
|
|
|
|
|
|
} |
1062
|
|
|
|
|
|
|
|
1063
|
|
|
|
|
|
|
if ($reason) { |
1064
|
|
|
|
|
|
|
# Oh no! They gave us a reason... It's ON! (well, off) |
1065
|
|
|
|
|
|
|
|
1066
|
|
|
|
|
|
|
# Remove passback and session cookies first |
1067
|
|
|
|
|
|
|
if (defined($alterlist->{cookie})) { |
1068
|
|
|
|
|
|
|
$self->AlterlistPassBackCookie($alterlist, $r); |
1069
|
|
|
|
|
|
|
} |
1070
|
|
|
|
|
|
|
|
1071
|
|
|
|
|
|
|
$self->remove_cookie($r); |
1072
|
|
|
|
|
|
|
$self->handle_cache($r); |
1073
|
|
|
|
|
|
|
|
1074
|
|
|
|
|
|
|
# Wake up. Time to die. |
1075
|
|
|
|
|
|
|
$self->DestroySession($r, \%sess); |
1076
|
|
|
|
|
|
|
untie(%sess); |
1077
|
|
|
|
|
|
|
$self->Log($r, ('notice', "LOGOUT: username=\"$username\", session=\"$sid\", reason=$reason")); |
1078
|
|
|
|
|
|
|
|
1079
|
|
|
|
|
|
|
# If serving basic auth, return undef instead of triggering login form |
1080
|
|
|
|
|
|
|
if ($r->auth_type =~ /^basic$/i) { |
1081
|
|
|
|
|
|
|
return undef; |
1082
|
|
|
|
|
|
|
} else { |
1083
|
|
|
|
|
|
|
# Use Apache::AuthCookie based custom_errors feature, which will |
1084
|
|
|
|
|
|
|
# call back into our custom_errors() method. (expired_cookie |
1085
|
|
|
|
|
|
|
# applies as an acceptable error for all of these cases.) |
1086
|
|
|
|
|
|
|
return('login', 'expired_cookie'); |
1087
|
|
|
|
|
|
|
} |
1088
|
|
|
|
|
|
|
} |
1089
|
|
|
|
|
|
|
|
1090
|
|
|
|
|
|
|
# Apply header and cookie alterations to request headed for backend server |
1091
|
|
|
|
|
|
|
$self->AlterlistApply($alterlist, $r); |
1092
|
|
|
|
|
|
|
$self->Log($r, ('debug', "authen_ses_key(): Loaded and applied alterlist groups " . join(",", keys %{$alterlist}))); |
1093
|
|
|
|
|
|
|
|
1094
|
|
|
|
|
|
|
# Release session file |
1095
|
|
|
|
|
|
|
untie(%sess); |
1096
|
|
|
|
|
|
|
|
1097
|
|
|
|
|
|
|
return $username; |
1098
|
|
|
|
|
|
|
} |
1099
|
|
|
|
|
|
|
|
1100
|
|
|
|
|
|
|
|
1101
|
|
|
|
|
|
|
# custom_errors are a nice way to get flexible actions based on certain events |
1102
|
|
|
|
|
|
|
# without having to rewrite authentication() and other methods. Takes |
1103
|
|
|
|
|
|
|
# the request, a "code", and a message. The original intent of this was to |
1104
|
|
|
|
|
|
|
# allow for custom server return messages, but I muck it up to do things like |
1105
|
|
|
|
|
|
|
# redirecting on certain errors, too. |
1106
|
|
|
|
|
|
|
sub custom_errors { |
1107
|
|
|
|
|
|
|
my ($self, $r, $code, $message) = @_; |
1108
|
|
|
|
|
|
|
my $t; |
1109
|
|
|
|
|
|
|
|
1110
|
|
|
|
|
|
|
# Handle request based on the format of the $code argument |
1111
|
|
|
|
|
|
|
if ($code =~ /^login$/) { |
1112
|
|
|
|
|
|
|
# Append the passed error code using ASERRCODE and bring up the login |
1113
|
|
|
|
|
|
|
# form. (Adds error code query to the current URI, which the login |
1114
|
|
|
|
|
|
|
# form will pull back in) |
1115
|
|
|
|
|
|
|
$t = $r->uri; |
1116
|
|
|
|
|
|
|
($r->args) && ($t .= "?" . $r->args); |
1117
|
|
|
|
|
|
|
$r->uri($self->URLErrorCode($t, 'message')); |
1118
|
|
|
|
|
|
|
return $self->login_form($r); |
1119
|
|
|
|
|
|
|
} elsif ($code =~ /^([A-Z0-9_]+)$/) { |
1120
|
|
|
|
|
|
|
# Codes in all caps with an underscore are assumed to be Apache |
1121
|
|
|
|
|
|
|
# response codes |
1122
|
|
|
|
|
|
|
($message) && ($r->custom_response($code, $message)); |
1123
|
|
|
|
|
|
|
return $code; |
1124
|
|
|
|
|
|
|
} else { |
1125
|
|
|
|
|
|
|
# What was that? Die out. |
1126
|
|
|
|
|
|
|
die "custom_errors(): Invalid code passed to custom_errors: \"$code\""; |
1127
|
|
|
|
|
|
|
} |
1128
|
|
|
|
|
|
|
} |
1129
|
|
|
|
|
|
|
|
1130
|
|
|
|
|
|
|
## END Apache::AuthCookie based methods |
1131
|
|
|
|
|
|
|
|
1132
|
|
|
|
|
|
|
# Everything past this point is not an overridden/modified Apache::AuthCookie |
1133
|
|
|
|
|
|
|
# function. |
1134
|
|
|
|
|
|
|
|
1135
|
|
|
|
|
|
|
# Taking a request, try to get the AuthMethods list for the resource |
1136
|
|
|
|
|
|
|
sub GetAuthMethods { |
1137
|
|
|
|
|
|
|
my ($self, $r) = @_; |
1138
|
|
|
|
|
|
|
my ($authname, $authmethlist); |
1139
|
|
|
|
|
|
|
my @authmethods = (); |
1140
|
|
|
|
|
|
|
|
1141
|
|
|
|
|
|
|
# Get the auth name |
1142
|
|
|
|
|
|
|
($authname = $r->auth_name()) || (die("GetAuthMethods(): No auth name set for this request!\n")); |
1143
|
|
|
|
|
|
|
($authmethlist = $r->dir_config($authname . "AuthMethods")) || (die("GetAuthMethods(): No authentication methods found for $authname!\n")); |
1144
|
|
|
|
|
|
|
|
1145
|
|
|
|
|
|
|
# AuthMethods should be a comma deliminated list of methods. Let |
1146
|
|
|
|
|
|
|
# us see, shall we? |
1147
|
|
|
|
|
|
|
foreach (split(',', $authmethlist)) { |
1148
|
|
|
|
|
|
|
(/^\s*(Auth[\w\d]+)\s*$/) || (die("GetAuthMethods(): Invalid ${authname}AuthMethods definition!\n")); |
1149
|
|
|
|
|
|
|
push(@authmethods, $1); |
1150
|
|
|
|
|
|
|
} |
1151
|
|
|
|
|
|
|
|
1152
|
|
|
|
|
|
|
return @authmethods; |
1153
|
|
|
|
|
|
|
} |
1154
|
|
|
|
|
|
|
|
1155
|
|
|
|
|
|
|
# This just loads the appropriate Apache::AppSamurai::AuthXXX modules |
1156
|
|
|
|
|
|
|
# so they are ready to authenticate against. Note that this function |
1157
|
|
|
|
|
|
|
# needs only be called by authen_cred() most of the time. Returns a ref |
1158
|
|
|
|
|
|
|
# to a hash with AuthName->AuthNameInstance mappings |
1159
|
|
|
|
|
|
|
sub InitAuthenticators { |
1160
|
|
|
|
|
|
|
my $self = shift; |
1161
|
|
|
|
|
|
|
my $r = shift; |
1162
|
|
|
|
|
|
|
my @authmethods = @_; |
1163
|
|
|
|
|
|
|
my ($am, $amn, $lkn, $skn, $ch, $authname, $dirconfig); |
1164
|
|
|
|
|
|
|
|
1165
|
|
|
|
|
|
|
(scalar(@authmethods)) || (die("InitAuthenticators(): You must specify at least one authentication method!\n")); |
1166
|
|
|
|
|
|
|
|
1167
|
|
|
|
|
|
|
# Clear authenticator handle hash |
1168
|
|
|
|
|
|
|
my $authenticators = {}; |
1169
|
|
|
|
|
|
|
|
1170
|
|
|
|
|
|
|
# Get directory authentication name and a hash of its config |
1171
|
|
|
|
|
|
|
($authname = $r->auth_name()) || (die("InitAuthenticators(): No auth name set for this request!\n")); |
1172
|
|
|
|
|
|
|
$dirconfig = $r->dir_config(); |
1173
|
|
|
|
|
|
|
|
1174
|
|
|
|
|
|
|
# Init each auth method |
1175
|
|
|
|
|
|
|
foreach $am (@authmethods) { |
1176
|
|
|
|
|
|
|
($am =~ /^Auth[A-Z0-9][a-zA-Z0-9:]+$/) || (die("InitAuthenticators(): Illegal authentication method name! (Check case)\n")); |
1177
|
|
|
|
|
|
|
|
1178
|
|
|
|
|
|
|
# Extract any config variables set for the configure auth methods |
1179
|
|
|
|
|
|
|
# and store in a temp hash before creating auth module instance |
1180
|
|
|
|
|
|
|
$ch = {}; |
1181
|
|
|
|
|
|
|
$lkn = ''; |
1182
|
|
|
|
|
|
|
$skn = ''; |
1183
|
|
|
|
|
|
|
foreach $lkn (keys %{$dirconfig}) { |
1184
|
|
|
|
|
|
|
($lkn =~ /^${authname}${am}([\w\d]+)\s*$/) || (next); |
1185
|
|
|
|
|
|
|
$skn = $1; |
1186
|
|
|
|
|
|
|
$ch->{$skn} = $dirconfig->{$lkn}; |
1187
|
|
|
|
|
|
|
|
1188
|
|
|
|
|
|
|
# If a "header:" is requested, replace with the named |
1189
|
|
|
|
|
|
|
# header's value from the client request, or an empty string |
1190
|
|
|
|
|
|
|
if ($ch->{$skn} =~ /^header:([\w\d\-]+)$/i) { |
1191
|
|
|
|
|
|
|
$ch->{$skn} = $r->headers_in->{$1}; |
1192
|
|
|
|
|
|
|
} |
1193
|
|
|
|
|
|
|
} |
1194
|
|
|
|
|
|
|
|
1195
|
|
|
|
|
|
|
if ($am =~ /^(AuthSimple)(.+)$/) { |
1196
|
|
|
|
|
|
|
# Framework auth modules (like AuthSimple) - These need |
1197
|
|
|
|
|
|
|
# a master AppSamurai::Auth*** module that expects the name |
1198
|
|
|
|
|
|
|
# of a submodule and its arguments |
1199
|
|
|
|
|
|
|
# Set submodule name, assuming it is under the master's tree |
1200
|
|
|
|
|
|
|
$ch->{SubModule} = $2; |
1201
|
|
|
|
|
|
|
# Use the master auth module from AppSamurai itself |
1202
|
|
|
|
|
|
|
$amn = 'Apache::AppSamurai::' . $1; |
1203
|
|
|
|
|
|
|
} else { |
1204
|
|
|
|
|
|
|
$amn = 'Apache::AppSamurai::' . $am; |
1205
|
|
|
|
|
|
|
} |
1206
|
|
|
|
|
|
|
|
1207
|
|
|
|
|
|
|
(eval "require $amn;") || |
1208
|
|
|
|
|
|
|
(die("InitAuthenticators(): Could not load $amn\n")); |
1209
|
|
|
|
|
|
|
|
1210
|
|
|
|
|
|
|
{ |
1211
|
|
|
|
|
|
|
# Disable strict within block so we can call ::new |
1212
|
|
|
|
|
|
|
no strict 'refs'; |
1213
|
|
|
|
|
|
|
($authenticators->{$am} = $amn->new(%{$ch})) || |
1214
|
|
|
|
|
|
|
(die("InitAuthenticators(): Could not create new $amn instance: " . $! . "\n")); |
1215
|
|
|
|
|
|
|
} |
1216
|
|
|
|
|
|
|
|
1217
|
|
|
|
|
|
|
# A little sanity check on the returned authenticator |
1218
|
|
|
|
|
|
|
$authenticators->{$am}->can("Authenticate") or die("InitAuthenticators(): Newly created $amn instance (for $am) does not have Authenticate() method"); |
1219
|
|
|
|
|
|
|
} |
1220
|
|
|
|
|
|
|
|
1221
|
|
|
|
|
|
|
return $authenticators; |
1222
|
|
|
|
|
|
|
} |
1223
|
|
|
|
|
|
|
|
1224
|
|
|
|
|
|
|
# Retrieve session configuration from Apache config and return as a hash ref |
1225
|
|
|
|
|
|
|
sub GetSessionConfig { |
1226
|
|
|
|
|
|
|
my ($self, $r) = @_; |
1227
|
|
|
|
|
|
|
my $auth_name = ($r->auth_name()) || (die("GetSessionConfig(): No auth name defined!\n")); |
1228
|
|
|
|
|
|
|
my $dirconfig = $r->dir_config; |
1229
|
|
|
|
|
|
|
# Set some defaults that shouldn't be too horrible |
1230
|
|
|
|
|
|
|
my $sessconfig = {}; |
1231
|
|
|
|
|
|
|
|
1232
|
|
|
|
|
|
|
# Pull in session configuration |
1233
|
|
|
|
|
|
|
foreach (keys %{$dirconfig}) { |
1234
|
|
|
|
|
|
|
(/^${auth_name}Session([\w\d]+)\s*$/) || (next); |
1235
|
|
|
|
|
|
|
$sessconfig->{$1} = $dirconfig->{$_}; |
1236
|
|
|
|
|
|
|
} |
1237
|
|
|
|
|
|
|
|
1238
|
|
|
|
|
|
|
unless (scalar(keys %{$sessconfig})) { |
1239
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetSessionConfig(): No Session configuration found for $auth_name!")); |
1240
|
|
|
|
|
|
|
return undef; |
1241
|
|
|
|
|
|
|
} |
1242
|
|
|
|
|
|
|
|
1243
|
|
|
|
|
|
|
## TODO - This section of session autoconfig/defaults is pretty |
1244
|
|
|
|
|
|
|
## inflexilbe and too tightly tied to HMAC_SHA and CryptBase64. |
1245
|
|
|
|
|
|
|
## It should be abolished or moved out and into a generalized |
1246
|
|
|
|
|
|
|
## pre-config module that can be called ONCE (at startup) |
1247
|
|
|
|
|
|
|
|
1248
|
|
|
|
|
|
|
# Use files for storage and locking by default |
1249
|
|
|
|
|
|
|
(exists($sessconfig->{Store})) || ($sessconfig->{Store} = "File"); |
1250
|
|
|
|
|
|
|
(exists($sessconfig->{Lock})) || ($sessconfig->{Lock} = "File"); |
1251
|
|
|
|
|
|
|
|
1252
|
|
|
|
|
|
|
# If files are being used, paths must be set |
1253
|
|
|
|
|
|
|
if ($sessconfig->{Store} eq 'File' && !exists($sessconfig->{Directory})) { |
1254
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetSessionConfig(): ${auth_name}SessionDirectoy must be defined for the File session store")); |
1255
|
|
|
|
|
|
|
return undef; |
1256
|
|
|
|
|
|
|
} |
1257
|
|
|
|
|
|
|
if ($sessconfig->{Lock} eq 'File' && !exists($sessconfig->{LockDirectory})) { |
1258
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetSessionConfig(): ${auth_name}SessionLockDirectoy must be defined for the File session lock")); |
1259
|
|
|
|
|
|
|
return undef; |
1260
|
|
|
|
|
|
|
} |
1261
|
|
|
|
|
|
|
|
1262
|
|
|
|
|
|
|
# Use HMAC_SHA and CryptBase64 for session creation and serialization |
1263
|
|
|
|
|
|
|
# by default. |
1264
|
|
|
|
|
|
|
(exists($sessconfig->{Generate})) || ($sessconfig->{Generate} = "AppSamurai/HMAC_SHA"); |
1265
|
|
|
|
|
|
|
(exists($sessconfig->{Serialize})) || ($sessconfig->{Serialize} = "AppSamurai/CryptBase64"); |
1266
|
|
|
|
|
|
|
|
1267
|
|
|
|
|
|
|
# Check/clean ServerPass if present (else assume ServerKey set) |
1268
|
|
|
|
|
|
|
if (exists($sessconfig->{ServerPass})) { |
1269
|
|
|
|
|
|
|
# Set the key (note - GetServerKey logs the error, if any) |
1270
|
|
|
|
|
|
|
($sessconfig->{ServerKey} = $self->GetServerKey($r)) || (return undef); |
1271
|
|
|
|
|
|
|
} |
1272
|
|
|
|
|
|
|
|
1273
|
|
|
|
|
|
|
# We have to have a ServerKey at this point, in hex form. |
1274
|
|
|
|
|
|
|
if (($sessconfig->{Generate} =~ /HMAC/i) || ($sessconfig->{Serialize} =~ /Crypt/i)) { |
1275
|
|
|
|
|
|
|
unless (CheckSidFormat($sessconfig->{ServerKey})) { |
1276
|
|
|
|
|
|
|
# Bad server key format |
1277
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetSessionConfig(): You must a valid ${auth_name}ServerPass or ${auth_name}ServerKey!")); |
1278
|
|
|
|
|
|
|
return undef; |
1279
|
|
|
|
|
|
|
} |
1280
|
|
|
|
|
|
|
|
1281
|
|
|
|
|
|
|
# For speed, SerializeCipher should be set in the config |
1282
|
|
|
|
|
|
|
if (!$sessconfig->{SerializeCipher}) { |
1283
|
|
|
|
|
|
|
# Attempt to load CryptBase64 module |
1284
|
|
|
|
|
|
|
unless (eval "require Apache::AppSamurai::Session::Serialize::CryptBase64") { |
1285
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetSessionConfig(): Could not load CryptBase64 while attempting to auto-select ${auth_name}SerializeCipher value: $!")); |
1286
|
|
|
|
|
|
|
return undef; |
1287
|
|
|
|
|
|
|
} |
1288
|
|
|
|
|
|
|
# Use CryptBase64 cipher detection utility (Slower) |
1289
|
|
|
|
|
|
|
unless ($sessconfig->{SerializeCipher} = &Apache::AppSamurai::Session::Serialize::CryptBase64::find_cipher()) { |
1290
|
|
|
|
|
|
|
# None found. (Note - Check @allowedciphers in CryptBase64.pm |
1291
|
|
|
|
|
|
|
# for supported ciphers) |
1292
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetSessionConfig(): Could not auto-detect a suitable ${auth_name}SerializeCipher value (Please configure manualy): $!")); |
1293
|
|
|
|
|
|
|
return undef; |
1294
|
|
|
|
|
|
|
} |
1295
|
|
|
|
|
|
|
} |
1296
|
|
|
|
|
|
|
} |
1297
|
|
|
|
|
|
|
|
1298
|
|
|
|
|
|
|
# Set a 1hr Timeout if neither Timeout or Expire are set |
1299
|
|
|
|
|
|
|
unless ($sessconfig->{Timeout} || $sessconfig->{Expire}) { |
1300
|
|
|
|
|
|
|
$sessconfig->{Timeout} = 3600; |
1301
|
|
|
|
|
|
|
} |
1302
|
|
|
|
|
|
|
|
1303
|
|
|
|
|
|
|
return $sessconfig; |
1304
|
|
|
|
|
|
|
} |
1305
|
|
|
|
|
|
|
|
1306
|
|
|
|
|
|
|
|
1307
|
|
|
|
|
|
|
# Compute/check server key from server pass, returning key. |
1308
|
|
|
|
|
|
|
sub GetServerKey { |
1309
|
|
|
|
|
|
|
my ($self, $r) = @_; |
1310
|
|
|
|
|
|
|
my $auth_name = ($r->auth_name()) || (die("GetServerKey(): No auth name defined!\n")); |
1311
|
|
|
|
|
|
|
my $dirconfig = $r->dir_config; |
1312
|
|
|
|
|
|
|
my $serverkey = ''; |
1313
|
|
|
|
|
|
|
|
1314
|
|
|
|
|
|
|
if (exists($dirconfig->{$auth_name . "SessionServerPass"})) { |
1315
|
|
|
|
|
|
|
my $serverpass = $dirconfig->{$auth_name . "SessionServerPass"}; |
1316
|
|
|
|
|
|
|
|
1317
|
|
|
|
|
|
|
unless ($serverpass =~ s/^\s*([[:print:]]{8,}?)\s*$/$1/s) { |
1318
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetServerKey(): Invalid ${auth_name}SessionServerPass (must be use at least 8 printable characters")); |
1319
|
|
|
|
|
|
|
return undef; |
1320
|
|
|
|
|
|
|
} |
1321
|
|
|
|
|
|
|
|
1322
|
|
|
|
|
|
|
if ($serverpass =~ /^(password|serverkey|serverpass|12345678)$/i) { |
1323
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetServerKey(): ${auth_name}SessionServerPass is $1... That is too lousy")); |
1324
|
|
|
|
|
|
|
return undef; |
1325
|
|
|
|
|
|
|
} |
1326
|
|
|
|
|
|
|
|
1327
|
|
|
|
|
|
|
unless ($serverkey = HashPass($serverpass)) { |
1328
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetServerKey(): Problem computing server key hash for ${auth_name}SessionServerPass")); |
1329
|
|
|
|
|
|
|
return undef; |
1330
|
|
|
|
|
|
|
} |
1331
|
|
|
|
|
|
|
|
1332
|
|
|
|
|
|
|
} elsif (exists($dirconfig->{$auth_name . "SessionServerKey"})) { |
1333
|
|
|
|
|
|
|
$serverkey = $dirconfig->{$auth_name . "SessionServerKey"}; |
1334
|
|
|
|
|
|
|
|
1335
|
|
|
|
|
|
|
} else { |
1336
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetServerKey(): You must define either ${auth_name}SessionServerPass or ${auth_name}SessionServerKey in your Apache configuration")); |
1337
|
|
|
|
|
|
|
return undef; |
1338
|
|
|
|
|
|
|
} |
1339
|
|
|
|
|
|
|
|
1340
|
|
|
|
|
|
|
# Check for valid key format |
1341
|
|
|
|
|
|
|
unless (CheckSidFormat($serverkey)) { |
1342
|
|
|
|
|
|
|
# Not good, dude. This should not happen |
1343
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetServerKey(): Invalid server session key (CheckSidFormat() failure) for $auth_name")); |
1344
|
|
|
|
|
|
|
return undef; |
1345
|
|
|
|
|
|
|
} |
1346
|
|
|
|
|
|
|
|
1347
|
|
|
|
|
|
|
return $serverkey; |
1348
|
|
|
|
|
|
|
} |
1349
|
|
|
|
|
|
|
|
1350
|
|
|
|
|
|
|
|
1351
|
|
|
|
|
|
|
# Apply the configured BasicAuthMap to the passed in credentials |
1352
|
|
|
|
|
|
|
# BasicAuthMap allows for flexibly parsing a single line of authentication |
1353
|
|
|
|
|
|
|
# data into multiple credentials in any order. (Keep those users happy...) |
1354
|
|
|
|
|
|
|
# Returns an array with the parsed credentials in order, or an empty set on |
1355
|
|
|
|
|
|
|
# failure. |
1356
|
|
|
|
|
|
|
sub ApplyAuthMap { |
1357
|
|
|
|
|
|
|
my ($self, $r, $pass, $amc) = @_; |
1358
|
|
|
|
|
|
|
my $auth_name = ($r->auth_name) || (''); |
1359
|
|
|
|
|
|
|
my ($o, $m, $i, @ct); |
1360
|
|
|
|
|
|
|
my @creds = (); |
1361
|
|
|
|
|
|
|
|
1362
|
|
|
|
|
|
|
# Check basic map format |
1363
|
|
|
|
|
|
|
($r->dir_config("${auth_name}BasicAuthMap") =~ /^\s*([\d\,]+)\s*\=\s*(.+?)\s*$/) || (die("ApplyAuthMap(): Bad format in ${auth_name}BasicAuthMap\n")); |
1364
|
|
|
|
|
|
|
$o = $1; |
1365
|
|
|
|
|
|
|
$m = $2; |
1366
|
|
|
|
|
|
|
|
1367
|
|
|
|
|
|
|
# Try to map values from pass string |
1368
|
|
|
|
|
|
|
(@ct) = $pass =~ /^$m$/; |
1369
|
|
|
|
|
|
|
unless (scalar(@ct) eq $amc) { |
1370
|
|
|
|
|
|
|
$self->Log($r, ('warn', "ApplyAuthMap: Unable to match credentials with ${auth_name}BasicAuthMap")); |
1371
|
|
|
|
|
|
|
return (); |
1372
|
|
|
|
|
|
|
} |
1373
|
|
|
|
|
|
|
|
1374
|
|
|
|
|
|
|
# Check credential numbers for sanity and assign values |
1375
|
|
|
|
|
|
|
foreach $i (split(',', $o)) { |
1376
|
|
|
|
|
|
|
($i =~ s/^\s*(\d+)\s*$/$1/) || (die("ApplyAuthMap(): Bad mapping format in ${auth_name}BasicAuthMap\n")); |
1377
|
|
|
|
|
|
|
push(@creds, $ct[$i - 1]); |
1378
|
|
|
|
|
|
|
} |
1379
|
|
|
|
|
|
|
|
1380
|
|
|
|
|
|
|
return @creds; |
1381
|
|
|
|
|
|
|
} |
1382
|
|
|
|
|
|
|
|
1383
|
|
|
|
|
|
|
|
1384
|
|
|
|
|
|
|
# Gather header and argument items from request to build custom session |
1385
|
|
|
|
|
|
|
# authentication key. Not nearly as secure as random generation, but |
1386
|
|
|
|
|
|
|
# for cookie losing clients (generally automated), it is the only choice. |
1387
|
|
|
|
|
|
|
# |
1388
|
|
|
|
|
|
|
# Synatax: |
1389
|
|
|
|
|
|
|
# |
1390
|
|
|
|
|
|
|
# TYPE:NAME |
1391
|
|
|
|
|
|
|
# |
1392
|
|
|
|
|
|
|
# TYPE - Type of item (header or arg) to pull in |
1393
|
|
|
|
|
|
|
# NAME - Name of header or argument to pull in |
1394
|
|
|
|
|
|
|
# |
1395
|
|
|
|
|
|
|
# The name match is case insensitive, but strict: Only the exact names |
1396
|
|
|
|
|
|
|
# will be used to ensure a consistent key text source. MAKE SURE TO USE |
1397
|
|
|
|
|
|
|
# PER-CLIENT UNIQUE VALUES! The less random the key text source is, the |
1398
|
|
|
|
|
|
|
# easier it can be guessed/hacked. (Once again: Do not use the custom |
1399
|
|
|
|
|
|
|
# key text source feature if you can avoid it!) |
1400
|
|
|
|
|
|
|
sub FetchKeysource { |
1401
|
|
|
|
|
|
|
my ($self, $r) = @_; |
1402
|
|
|
|
|
|
|
my $auth_name = ($r->auth_name()) || (die("FetchKeysource(): No auth name defined!\n")); |
1403
|
|
|
|
|
|
|
my @srcs = $r->dir_config->get("${auth_name}Keysource"); |
1404
|
|
|
|
|
|
|
|
1405
|
|
|
|
|
|
|
# Return empty, which session key creators MUST interpret as a request |
1406
|
|
|
|
|
|
|
# for a fully randomized key |
1407
|
|
|
|
|
|
|
return '' unless (scalar @srcs); |
1408
|
|
|
|
|
|
|
|
1409
|
|
|
|
|
|
|
# Use Apache::Request for immediate access to all arguments. |
1410
|
|
|
|
|
|
|
my $ar = ($MP eq 1) ? Apache::Request->instance($r) : Apache2::Request->new($r); |
1411
|
|
|
|
|
|
|
|
1412
|
|
|
|
|
|
|
my ($s, $t); |
1413
|
|
|
|
|
|
|
my $keytext = ''; |
1414
|
|
|
|
|
|
|
|
1415
|
|
|
|
|
|
|
# Pull values in with very moderate checking |
1416
|
|
|
|
|
|
|
foreach $s (@srcs) { |
1417
|
|
|
|
|
|
|
if ($s =~ /^\s*header:([\w\d\-\_]+)\s*$/i) { |
1418
|
|
|
|
|
|
|
if ($r->headers_in->{$1} and |
1419
|
|
|
|
|
|
|
($t) = $r->headers_in->{$1} =~ /^\s*([\x20-\x7e]+?)\s*$/s) { |
1420
|
|
|
|
|
|
|
$keytext .= $t; |
1421
|
|
|
|
|
|
|
$self->Log($r, ('debug', "FetchKeysource(): Collected $s: " . XHalf($t))); |
1422
|
|
|
|
|
|
|
} else { |
1423
|
|
|
|
|
|
|
$self->Log($r, ('warn', "FetchKeysource(): Missing header field: \"$1\": Can not calculate session key")); |
1424
|
|
|
|
|
|
|
return undef; |
1425
|
|
|
|
|
|
|
} |
1426
|
|
|
|
|
|
|
} elsif ($s =~ /^\s*arg:([\w\d\.\-\_]+)\s*$/i) { |
1427
|
|
|
|
|
|
|
if (($t = $ar->param($1)) && ($t =~ s/^\s*([^\r\n]+?)\s*$/$1/)) { |
1428
|
|
|
|
|
|
|
$keytext .= $t; |
1429
|
|
|
|
|
|
|
$self->Log($r, ('debug', "FetchKeysource(): Collected $s: " . XHalf($t))); |
1430
|
|
|
|
|
|
|
} else { |
1431
|
|
|
|
|
|
|
$self->Log($r, ('warn', "FetchKeysource(): Missing argument: \"$1\": Can not calculate session key")); |
1432
|
|
|
|
|
|
|
return undef; |
1433
|
|
|
|
|
|
|
} |
1434
|
|
|
|
|
|
|
} else { |
1435
|
|
|
|
|
|
|
$self->Log($r, ('error', "FetchKeysource(): Invalid Keysource definition for $auth_name")); |
1436
|
|
|
|
|
|
|
return undef; |
1437
|
|
|
|
|
|
|
} |
1438
|
|
|
|
|
|
|
} |
1439
|
|
|
|
|
|
|
|
1440
|
|
|
|
|
|
|
return $keytext; |
1441
|
|
|
|
|
|
|
} |
1442
|
|
|
|
|
|
|
|
1443
|
|
|
|
|
|
|
# Initiate a new session and return a session key. Takes the $r request (for |
1444
|
|
|
|
|
|
|
# record keeping), the username, and an optional "alter list" to be used |
1445
|
|
|
|
|
|
|
# to change cookies and/or headers sent from the proxy to the backend server. |
1446
|
|
|
|
|
|
|
sub CreateSession { |
1447
|
|
|
|
|
|
|
my ($self, $r, $username, $alterlist) = @_; |
1448
|
|
|
|
|
|
|
(defined($alterlist)) || ($alterlist = {}); |
1449
|
|
|
|
|
|
|
my (%sess, $sid, $sessconfig, $kt); |
1450
|
|
|
|
|
|
|
|
1451
|
|
|
|
|
|
|
# Extract the session config |
1452
|
|
|
|
|
|
|
($sessconfig = $self->GetSessionConfig($r)) || (die "CreateSession(): Unable to get session configuration while creating new session"); |
1453
|
|
|
|
|
|
|
|
1454
|
|
|
|
|
|
|
# Create a session auth key to send back to send back as the cookie |
1455
|
|
|
|
|
|
|
# value, and to use the HMAC-SHA and optional session file encryptor. |
1456
|
|
|
|
|
|
|
# FetchKeysource returns "" by default, resulting in a fully randomized |
1457
|
|
|
|
|
|
|
# key. |
1458
|
|
|
|
|
|
|
$kt = $self->FetchKeysource($r); |
1459
|
|
|
|
|
|
|
if (defined($kt)) { |
1460
|
|
|
|
|
|
|
$sessconfig->{key} = CreateSessionAuthKey($kt); |
1461
|
|
|
|
|
|
|
} else { |
1462
|
|
|
|
|
|
|
$self->Log($r, ('warn', "CreateSession(): Failed to generate session authentication key: Session creation denied")); |
1463
|
|
|
|
|
|
|
return undef; |
1464
|
|
|
|
|
|
|
} |
1465
|
|
|
|
|
|
|
|
1466
|
|
|
|
|
|
|
# Check for valid looking key |
1467
|
|
|
|
|
|
|
unless (CheckSidFormat($sessconfig->{key})) { |
1468
|
|
|
|
|
|
|
$self->Log($r, ('warn', "CreateSession(): Bad session authentication key returned! Session creation denied")); |
1469
|
|
|
|
|
|
|
return undef; |
1470
|
|
|
|
|
|
|
} |
1471
|
|
|
|
|
|
|
|
1472
|
|
|
|
|
|
|
# Run against the unique session tracker if configured. (*Don't make |
1473
|
|
|
|
|
|
|
# the same session twice) |
1474
|
|
|
|
|
|
|
if ($sessconfig->{Unique}) { |
1475
|
|
|
|
|
|
|
unless ($self->CheckTracker($r, 'SessionUnique', $sessconfig->{key})) { |
1476
|
|
|
|
|
|
|
$self->Log($r, ('warn', "CreateSession(): SessionUnique detected duplicate session authentication key! Session creation denied")); |
1477
|
|
|
|
|
|
|
return undef; |
1478
|
|
|
|
|
|
|
} |
1479
|
|
|
|
|
|
|
} |
1480
|
|
|
|
|
|
|
|
1481
|
|
|
|
|
|
|
# Wrapped this in an eval, since Apache:Session dies on failures |
1482
|
|
|
|
|
|
|
eval { tie(%sess, 'Apache::AppSamurai::Session', undef, $sessconfig); }; |
1483
|
|
|
|
|
|
|
if ($@) { |
1484
|
|
|
|
|
|
|
$self->Log($r, ('error', "CreateSession(): Unable to create new session: $@")); |
1485
|
|
|
|
|
|
|
return undef; |
1486
|
|
|
|
|
|
|
} |
1487
|
|
|
|
|
|
|
$sid = $sess{_session_id}; |
1488
|
|
|
|
|
|
|
|
1489
|
|
|
|
|
|
|
# Make sure we received a good session ID. |
1490
|
|
|
|
|
|
|
(CheckSidFormat($sid)) || (($self->Log($r, ('error', 'CreateSession(): Invalid Session ID Format on new Session'))) && (return undef)); |
1491
|
|
|
|
|
|
|
$self->Log($r, ('notice', "LOGIN: username=\"$username\", session=\"$sid\"")); |
1492
|
|
|
|
|
|
|
|
1493
|
|
|
|
|
|
|
# Store some basics |
1494
|
|
|
|
|
|
|
$sess{'username'} = $username; |
1495
|
|
|
|
|
|
|
$sess{'ctime'} = time(); |
1496
|
|
|
|
|
|
|
|
1497
|
|
|
|
|
|
|
# Track last access time if Timeout is set |
1498
|
|
|
|
|
|
|
if ($sessconfig->{Timeout}) { |
1499
|
|
|
|
|
|
|
$sess{'atime'} = $sess{'ctime'}; |
1500
|
|
|
|
|
|
|
$sess{'Timeout'} = $sessconfig->{Timeout}; |
1501
|
|
|
|
|
|
|
} |
1502
|
|
|
|
|
|
|
|
1503
|
|
|
|
|
|
|
# Set hard expiration time if Expire is set |
1504
|
|
|
|
|
|
|
if ($sessconfig->{Expire}) { |
1505
|
|
|
|
|
|
|
$sess{'etime'} = $sess{'ctime'} + $sessconfig->{Expire}; |
1506
|
|
|
|
|
|
|
$sess{'Expire'} = $sessconfig->{Expire}; |
1507
|
|
|
|
|
|
|
} |
1508
|
|
|
|
|
|
|
|
1509
|
|
|
|
|
|
|
# Apply passback cookies to response, and pull in updated alterlist |
1510
|
|
|
|
|
|
|
if (defined($alterlist->{cookie})) { |
1511
|
|
|
|
|
|
|
$alterlist = $self->AlterlistPassBackCookie($alterlist, $r); |
1512
|
|
|
|
|
|
|
} |
1513
|
|
|
|
|
|
|
|
1514
|
|
|
|
|
|
|
# If present, save Authorization header to detect future changes, |
1515
|
|
|
|
|
|
|
# then prepend an alterlist rule to delete the header to prevent |
1516
|
|
|
|
|
|
|
# pass though to the backend server. (If needed, a separate |
1517
|
|
|
|
|
|
|
# alterlist rule to add an Authorization header should be set |
1518
|
|
|
|
|
|
|
# by a auth module.) |
1519
|
|
|
|
|
|
|
if ($r->headers_in->{"Authorization"}) { |
1520
|
|
|
|
|
|
|
$sess{'Authorization'} = $r->headers_in->{"Authorization"}; |
1521
|
|
|
|
|
|
|
# Stick it in front in case we have an existing add |
1522
|
|
|
|
|
|
|
# header from an auth module |
1523
|
|
|
|
|
|
|
unshift(@{$alterlist->{header}}, 'delete:Authorization:'); |
1524
|
|
|
|
|
|
|
} |
1525
|
|
|
|
|
|
|
|
1526
|
|
|
|
|
|
|
# Save current alterlist to session |
1527
|
|
|
|
|
|
|
$self->AlterlistSave($alterlist, \%sess); |
1528
|
|
|
|
|
|
|
|
1529
|
|
|
|
|
|
|
# Release session |
1530
|
|
|
|
|
|
|
untie(%sess); |
1531
|
|
|
|
|
|
|
|
1532
|
|
|
|
|
|
|
# Return the session auth key |
1533
|
|
|
|
|
|
|
return $sessconfig->{key}; |
1534
|
|
|
|
|
|
|
} |
1535
|
|
|
|
|
|
|
|
1536
|
|
|
|
|
|
|
# Destroy a session, rendering it forever useless. Takes a request hash ref |
1537
|
|
|
|
|
|
|
# and a session hash ref as args. (Session must be tied when DestroySession |
1538
|
|
|
|
|
|
|
# is called.) |
1539
|
|
|
|
|
|
|
sub DestroySession { |
1540
|
|
|
|
|
|
|
my ($self, $r, $sess) = @_; |
1541
|
|
|
|
|
|
|
|
1542
|
|
|
|
|
|
|
# Call the delete method for the the tied hash. Wrapped in eval goodness |
1543
|
|
|
|
|
|
|
# since Apache::Session will die on error. |
1544
|
|
|
|
|
|
|
eval { tied(%{$sess})->delete; }; |
1545
|
|
|
|
|
|
|
if ($@) { |
1546
|
|
|
|
|
|
|
$self->Log($r, ('warn', "DestroySession(): Unable to destroy session: $@")); |
1547
|
|
|
|
|
|
|
return undef; |
1548
|
|
|
|
|
|
|
} |
1549
|
|
|
|
|
|
|
|
1550
|
|
|
|
|
|
|
return 1; |
1551
|
|
|
|
|
|
|
} |
1552
|
|
|
|
|
|
|
|
1553
|
|
|
|
|
|
|
|
1554
|
|
|
|
|
|
|
## TRACKER - A system to store persistant and shared data for various |
1555
|
|
|
|
|
|
|
## uses. This is yet more code that could be refactored and busted into |
1556
|
|
|
|
|
|
|
## external modules to allow for adding arbitrary stateful checks of |
1557
|
|
|
|
|
|
|
## all sorts of things, (like the authentication handlers). |
1558
|
|
|
|
|
|
|
## For now, only a small set of tracker types are provided, |
1559
|
|
|
|
|
|
|
## and all are defined in this module. |
1560
|
|
|
|
|
|
|
|
1561
|
|
|
|
|
|
|
# Get Tracker config (Tracker being a special case Session type targetted |
1562
|
|
|
|
|
|
|
# at IPC tasks) The tracker should never hold sensitive data since encryption |
1563
|
|
|
|
|
|
|
# support is not provided! Make sure to hash sensitive info if you need to |
1564
|
|
|
|
|
|
|
# track old session authentication keys or other items. |
1565
|
|
|
|
|
|
|
sub GetTrackerConfig { |
1566
|
|
|
|
|
|
|
my ($self, $r) = @_; |
1567
|
|
|
|
|
|
|
my $auth_name = ($r->auth_name()) || (die("GetTrackerConfig(): No auth name defined!\n")); |
1568
|
|
|
|
|
|
|
my $dirconfig = $r->dir_config; |
1569
|
|
|
|
|
|
|
|
1570
|
|
|
|
|
|
|
my $trakconfig = {}; |
1571
|
|
|
|
|
|
|
|
1572
|
|
|
|
|
|
|
# Pull in the session configurations then write the tracker config |
1573
|
|
|
|
|
|
|
# over top. |
1574
|
|
|
|
|
|
|
foreach (keys %{$dirconfig}) { |
1575
|
|
|
|
|
|
|
(/^${auth_name}Session([\w\d]+)\s*$/) || (next); |
1576
|
|
|
|
|
|
|
$trakconfig->{$1} = $dirconfig->{$_}; |
1577
|
|
|
|
|
|
|
} |
1578
|
|
|
|
|
|
|
|
1579
|
|
|
|
|
|
|
foreach (keys %{$dirconfig}) { |
1580
|
|
|
|
|
|
|
(/^${auth_name}Tracker([\w\d]+)\s*$/) || (next); |
1581
|
|
|
|
|
|
|
$trakconfig->{$1} = $dirconfig->{$_}; |
1582
|
|
|
|
|
|
|
} |
1583
|
|
|
|
|
|
|
|
1584
|
|
|
|
|
|
|
# Use files for storage and locking by default |
1585
|
|
|
|
|
|
|
(exists($trakconfig->{Store})) || ($trakconfig->{Store} = "File"); |
1586
|
|
|
|
|
|
|
(exists($trakconfig->{Lock})) || ($trakconfig->{Lock} = "File"); |
1587
|
|
|
|
|
|
|
|
1588
|
|
|
|
|
|
|
# Always use the basic Base64 serializer: it is portable, and avoids |
1589
|
|
|
|
|
|
|
# having to special case of override when Crypt is used on sessions |
1590
|
|
|
|
|
|
|
$trakconfig->{Serialize} = "Base64"; |
1591
|
|
|
|
|
|
|
|
1592
|
|
|
|
|
|
|
# If files are being used, use the Session paths (if set), else die |
1593
|
|
|
|
|
|
|
if ($trakconfig->{Store} eq 'File' && !exists($trakconfig->{Directory})) { |
1594
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetTrackerConfig(): ${auth_name}TrackerDirectoy must be defined for the File store")); |
1595
|
|
|
|
|
|
|
return undef; |
1596
|
|
|
|
|
|
|
} |
1597
|
|
|
|
|
|
|
if ($trakconfig->{Lock} eq 'File' && !exists($trakconfig->{LockDirectory})) { |
1598
|
|
|
|
|
|
|
$self->Log($r, ('error', "GetTrackerConfig(): ${auth_name}TrackerLockDirectoy must be defined for the File lock")); |
1599
|
|
|
|
|
|
|
return undef; |
1600
|
|
|
|
|
|
|
} |
1601
|
|
|
|
|
|
|
|
1602
|
|
|
|
|
|
|
return $trakconfig; |
1603
|
|
|
|
|
|
|
} |
1604
|
|
|
|
|
|
|
|
1605
|
|
|
|
|
|
|
# Initiate the tracker. Takes the $r request, a name (usually just the name of |
1606
|
|
|
|
|
|
|
# the module using the tracker), and returns a tied tracker hash reference. |
1607
|
|
|
|
|
|
|
# Currently does not support different settings for various tracker modules. |
1608
|
|
|
|
|
|
|
# All use the same cleanup, etc. |
1609
|
|
|
|
|
|
|
sub InitTracker { |
1610
|
|
|
|
|
|
|
my ($self, $r, $name) = @_; |
1611
|
|
|
|
|
|
|
my (%trak, $trakconfig); |
1612
|
|
|
|
|
|
|
|
1613
|
|
|
|
|
|
|
# Extract the tracker config |
1614
|
|
|
|
|
|
|
($trakconfig = $self->GetTrackerConfig($r)) || (die("InitTracker(): Unable to get tracker configuration: Please properly configure the tracker system or dissable features that use it\n")); |
1615
|
|
|
|
|
|
|
|
1616
|
|
|
|
|
|
|
# Basic sanity check on name, then set value in tracker config so the |
1617
|
|
|
|
|
|
|
# Tracker module can pick it up if needed |
1618
|
|
|
|
|
|
|
(($name) && ($name =~ /^[\w\d:\.\_\-]+$/)) || (die("InitTracker(): No tracker name or bad name specified for tracker\n")); |
1619
|
|
|
|
|
|
|
$trakconfig->{Name} = $name; |
1620
|
|
|
|
|
|
|
|
1621
|
|
|
|
|
|
|
# Wrapped this in an eval, since Apache:Session type modules die on failure |
1622
|
|
|
|
|
|
|
eval { tie(%trak, 'Apache::AppSamurai::Tracker', $name, $trakconfig); }; |
1623
|
|
|
|
|
|
|
if ($@) { |
1624
|
|
|
|
|
|
|
$self->Log($r, ('error', "InitTracker(): Unable to setup tracker for \"$name\", retrying...")); |
1625
|
|
|
|
|
|
|
# Try making a new one |
1626
|
|
|
|
|
|
|
eval { tie(%trak, 'Apache::AppSamurai::Tracker', undef, $trakconfig); }; |
1627
|
|
|
|
|
|
|
if ($@) { |
1628
|
|
|
|
|
|
|
$self->Log($r, ('error', "InitTracker(): Unable to create new tracker for \"$name\": $@")); |
1629
|
|
|
|
|
|
|
return undef; |
1630
|
|
|
|
|
|
|
} |
1631
|
|
|
|
|
|
|
# Save its name inside |
1632
|
|
|
|
|
|
|
$trak{Name} = $name; |
1633
|
|
|
|
|
|
|
$self->Log($r, ('error', "InitTracker(): Created new tracker instance for \"$name\"")); |
1634
|
|
|
|
|
|
|
} |
1635
|
|
|
|
|
|
|
|
1636
|
|
|
|
|
|
|
# If cleanup is set, check if we need to run it |
1637
|
|
|
|
|
|
|
if ($trakconfig->{Cleanup}) { |
1638
|
|
|
|
|
|
|
# Fake last cleanup time as now, if not already set |
1639
|
|
|
|
|
|
|
unless($trak{LastClean}) { |
1640
|
|
|
|
|
|
|
$trak{LastClean} = time(); |
1641
|
|
|
|
|
|
|
$self->Log($r, ('debug', "InitTracker(): Set last cleanup for \"$name\" to " . $trak{LastClean})); |
1642
|
|
|
|
|
|
|
} |
1643
|
|
|
|
|
|
|
|
1644
|
|
|
|
|
|
|
if ((time() - $trak{LastClean}) >= $trakconfig->{Cleanup}) { |
1645
|
|
|
|
|
|
|
$self->CleanupTracker($r, \%trak, $trakconfig->{Cleanup}); |
1646
|
|
|
|
|
|
|
} |
1647
|
|
|
|
|
|
|
} |
1648
|
|
|
|
|
|
|
|
1649
|
|
|
|
|
|
|
# Return the open tracker hash ref |
1650
|
|
|
|
|
|
|
return \%trak; |
1651
|
|
|
|
|
|
|
} |
1652
|
|
|
|
|
|
|
|
1653
|
|
|
|
|
|
|
# Cleanup stale tracker items older than the given cleanup interval. |
1654
|
|
|
|
|
|
|
# Each item to clean MUST have a timestamp record in the first slot |
1655
|
|
|
|
|
|
|
# prefixed by "ts". |
1656
|
|
|
|
|
|
|
sub CleanupTracker { |
1657
|
|
|
|
|
|
|
my ($self,$r,$trak,$to) = @_; |
1658
|
|
|
|
|
|
|
my ($tk, $tts); |
1659
|
|
|
|
|
|
|
my $time = time(); |
1660
|
|
|
|
|
|
|
|
1661
|
|
|
|
|
|
|
(tied(%{$trak})) || die("CleanupTracker(): Called without valid tracker handle\n"); |
1662
|
|
|
|
|
|
|
($trak->{LastClean}) || die("CleanupTracker(): Called without LastClean set for " . $trak->{Name} . "\n"); |
1663
|
|
|
|
|
|
|
|
1664
|
|
|
|
|
|
|
# Default to 24 hour cleanup |
1665
|
|
|
|
|
|
|
($to) || die("CleanupTracker(): Called without Cleanup time specified for " . $trak->{Name} . "\n"); |
1666
|
|
|
|
|
|
|
|
1667
|
|
|
|
|
|
|
$self->Log($r, ('debug', "CleanupTracker(): Cleaning up items in \"" . $trak->{Name} . "\" older than $to seconds")); |
1668
|
|
|
|
|
|
|
|
1669
|
|
|
|
|
|
|
foreach $tk (keys %{$trak}) { |
1670
|
|
|
|
|
|
|
# Skip items with no time stamp at start of value |
1671
|
|
|
|
|
|
|
next unless ($trak->{$tk} =~ /^ts(\d+)/); |
1672
|
|
|
|
|
|
|
$tts = $1; |
1673
|
|
|
|
|
|
|
if (($tts + $to) < $time) { |
1674
|
|
|
|
|
|
|
# Older than timeout: kill! |
1675
|
|
|
|
|
|
|
$self->Log($r, ('debug', "CleanupTracker(): Deleting stale item in \"" . $trak->{Name} . "\": $tk," . $trak->{$tk})); |
1676
|
|
|
|
|
|
|
delete($trak->{$tk}); |
1677
|
|
|
|
|
|
|
} |
1678
|
|
|
|
|
|
|
} |
1679
|
|
|
|
|
|
|
|
1680
|
|
|
|
|
|
|
# Update the LastClean time |
1681
|
|
|
|
|
|
|
$trak->{LastClean} = $time; |
1682
|
|
|
|
|
|
|
} |
1683
|
|
|
|
|
|
|
|
1684
|
|
|
|
|
|
|
# Get ready to use tracker handle, then pass the specified tracker module |
1685
|
|
|
|
|
|
|
# (second arg), and pass it the rest of the arguments. Returns 1 on sucessful |
1686
|
|
|
|
|
|
|
# setup and a good return from the tracker module, else 0; |
1687
|
|
|
|
|
|
|
sub CheckTracker { |
1688
|
|
|
|
|
|
|
my $self = shift; |
1689
|
|
|
|
|
|
|
my $r = shift; |
1690
|
|
|
|
|
|
|
my $tmod = shift; |
1691
|
|
|
|
|
|
|
my @args = @_; |
1692
|
|
|
|
|
|
|
my ($tconf,$trak); |
1693
|
|
|
|
|
|
|
my $ret = 0; |
1694
|
|
|
|
|
|
|
|
1695
|
|
|
|
|
|
|
# This should all be extended to use external modules instead (like the |
1696
|
|
|
|
|
|
|
# authentication modules.) I am pressed for time, so only a small set |
1697
|
|
|
|
|
|
|
# of local checks are currently supported. |
1698
|
|
|
|
|
|
|
if ($tmod =~ /^(IPFailures|AuthUnique|SessionUnique)$/) { |
1699
|
|
|
|
|
|
|
$tmod = "CheckTracker" . $tmod; |
1700
|
|
|
|
|
|
|
|
1701
|
|
|
|
|
|
|
$self->Log($r, ('debug', "CheckTracker(): Calling $tmod")); |
1702
|
|
|
|
|
|
|
|
1703
|
|
|
|
|
|
|
unless ($trak = $self->InitTracker($r,$tmod)) { |
1704
|
|
|
|
|
|
|
$self->Log($r, ('error', "CheckTracker(): Failed to get initialized tracker handle for $tmod")); |
1705
|
|
|
|
|
|
|
return 0; |
1706
|
|
|
|
|
|
|
} |
1707
|
|
|
|
|
|
|
|
1708
|
|
|
|
|
|
|
# Tracker methods currently die on major failure. (A move to |
1709
|
|
|
|
|
|
|
# object based setup, like auth system, would allow removing this |
1710
|
|
|
|
|
|
|
# while maintining proper logging.) |
1711
|
|
|
|
|
|
|
eval { { no strict "refs"; $ret = &$tmod($trak, @args) } }; |
1712
|
|
|
|
|
|
|
|
1713
|
|
|
|
|
|
|
if ($@) { |
1714
|
|
|
|
|
|
|
$self->Log($r, ('error', "CheckTracker(): Tracker processing error: $@")); |
1715
|
|
|
|
|
|
|
untie(%{$trak}); |
1716
|
|
|
|
|
|
|
return undef; |
1717
|
|
|
|
|
|
|
} |
1718
|
|
|
|
|
|
|
|
1719
|
|
|
|
|
|
|
# Uncomment to get a dump of the tracker to the log |
1720
|
|
|
|
|
|
|
#foreach (sort keys %{$trak}) { |
1721
|
|
|
|
|
|
|
# $self->Log($r, ('debug', "$tmod: $_ = " . $trak->{$_})); |
1722
|
|
|
|
|
|
|
#} |
1723
|
|
|
|
|
|
|
|
1724
|
|
|
|
|
|
|
untie(%{$trak}); |
1725
|
|
|
|
|
|
|
} else { |
1726
|
|
|
|
|
|
|
$self->Log($r, ('error', "CheckTracker(): Unknown tracker type $tmod")); |
1727
|
|
|
|
|
|
|
$ret = 0; |
1728
|
|
|
|
|
|
|
} |
1729
|
|
|
|
|
|
|
|
1730
|
|
|
|
|
|
|
return $ret; |
1731
|
|
|
|
|
|
|
} |
1732
|
|
|
|
|
|
|
|
1733
|
|
|
|
|
|
|
# TODO - GET ALL TRACKER CHECKS AND MANAGEMENT REFACTORED TO OUTSIDE MODULES |
1734
|
|
|
|
|
|
|
# Check given tracker hash ($_[0]) for IP ($_[1]) hitting more than max ($_[2]) |
1735
|
|
|
|
|
|
|
# times with no less than in interval ($_[3]) seconds between. |
1736
|
|
|
|
|
|
|
# Updates tracker item. |
1737
|
|
|
|
|
|
|
sub CheckTrackerIPFailures { |
1738
|
|
|
|
|
|
|
my ($trak, $setting, $ip) = @_; |
1739
|
|
|
|
|
|
|
my ($max, $interval, $tc, $tts); |
1740
|
|
|
|
|
|
|
my $time = time(); |
1741
|
|
|
|
|
|
|
|
1742
|
|
|
|
|
|
|
($max,$interval) = split(':', $setting); |
1743
|
|
|
|
|
|
|
unless (($max) && ($max =~ /^\d+$/) && ($interval) && ($interval =~ /^\d+$/)) { |
1744
|
|
|
|
|
|
|
die("CheckTrackerIPFailures(): FATAL: Bad arguments to IPFailures: \"$setting\"\n"); |
1745
|
|
|
|
|
|
|
} |
1746
|
|
|
|
|
|
|
|
1747
|
|
|
|
|
|
|
($ip = CheckHostIP($ip)) || (die("CheckTrackerIPFailures(): FATAL: Bad IP address\n")); |
1748
|
|
|
|
|
|
|
|
1749
|
|
|
|
|
|
|
# Force defaults of 10 failures in 1 minute or less intervals. |
1750
|
|
|
|
|
|
|
($max) || ($max = 10); |
1751
|
|
|
|
|
|
|
($interval) || ($interval = 60); |
1752
|
|
|
|
|
|
|
|
1753
|
|
|
|
|
|
|
# If defined and not timed out: add. Else starts fresh |
1754
|
|
|
|
|
|
|
if ($trak->{$ip}) { |
1755
|
|
|
|
|
|
|
($tts, $tc) = split(':', $trak->{$ip}, 2); |
1756
|
|
|
|
|
|
|
|
1757
|
|
|
|
|
|
|
# Sanity check, and pull actual numbers |
1758
|
|
|
|
|
|
|
(($tts =~ s/^ts(\d+)$/$1/) && ($tc =~ s/^cnt(\d+)$/$1/)) || (die("CheckTrackerIPFailures(): FATAL: Corrupt entry for $ip detected\n")); |
1759
|
|
|
|
|
|
|
|
1760
|
|
|
|
|
|
|
# Not yet timed out |
1761
|
|
|
|
|
|
|
if (($tts + $interval) > $time) { |
1762
|
|
|
|
|
|
|
$tc++; |
1763
|
|
|
|
|
|
|
$tts = $time; |
1764
|
|
|
|
|
|
|
|
1765
|
|
|
|
|
|
|
$trak->{$ip} = join(':', "ts$tts", "cnt$tc"); |
1766
|
|
|
|
|
|
|
|
1767
|
|
|
|
|
|
|
if ($tc >= $max) { |
1768
|
|
|
|
|
|
|
die("CheckTrackerIPFailures(): RULE VIOLATION: ip=$ip, count=$tc\n"); |
1769
|
|
|
|
|
|
|
} |
1770
|
|
|
|
|
|
|
|
1771
|
|
|
|
|
|
|
return 1; |
1772
|
|
|
|
|
|
|
} |
1773
|
|
|
|
|
|
|
} |
1774
|
|
|
|
|
|
|
|
1775
|
|
|
|
|
|
|
# Expired or New entry: Set timestamp to now and count to 1 |
1776
|
|
|
|
|
|
|
$trak->{$ip} = join(':', "ts$time", "cnt1"); |
1777
|
|
|
|
|
|
|
|
1778
|
|
|
|
|
|
|
return 1; |
1779
|
|
|
|
|
|
|
} |
1780
|
|
|
|
|
|
|
|
1781
|
|
|
|
|
|
|
# Check given tracker hash ($_[0]), make sure we have not seen the same |
1782
|
|
|
|
|
|
|
# set of credentials ($_[1] - $_[n-1]) before. Stores a hash of credential |
1783
|
|
|
|
|
|
|
# string to minimize security risk. |
1784
|
|
|
|
|
|
|
sub CheckTrackerAuthUnique { |
1785
|
|
|
|
|
|
|
my $trak = shift; |
1786
|
|
|
|
|
|
|
my $ch = HashAny(@_); |
1787
|
|
|
|
|
|
|
my $time = time(); |
1788
|
|
|
|
|
|
|
|
1789
|
|
|
|
|
|
|
# If defined, the jig is up! |
1790
|
|
|
|
|
|
|
if ($trak->{$ch}) { |
1791
|
|
|
|
|
|
|
die("CheckTrackerAuthUnique(): RULE VIOLATION: credkey=$ch\n"); |
1792
|
|
|
|
|
|
|
} else { |
1793
|
|
|
|
|
|
|
# Set value to |
1794
|
|
|
|
|
|
|
$trak->{$ch} = 'ts' . $time . ":cnt1"; |
1795
|
|
|
|
|
|
|
} |
1796
|
|
|
|
|
|
|
|
1797
|
|
|
|
|
|
|
return 1; |
1798
|
|
|
|
|
|
|
} |
1799
|
|
|
|
|
|
|
|
1800
|
|
|
|
|
|
|
# Check given tracker hash ($_[0]), make sure we have not seen the same |
1801
|
|
|
|
|
|
|
# session authentication key (cookie) before. Stores a hash of session key |
1802
|
|
|
|
|
|
|
# string to minimize security risk. |
1803
|
|
|
|
|
|
|
sub CheckTrackerSessionUnique { |
1804
|
|
|
|
|
|
|
my $trak = shift; |
1805
|
|
|
|
|
|
|
my $ch = HashAny(@_); |
1806
|
|
|
|
|
|
|
my $time = time(); |
1807
|
|
|
|
|
|
|
|
1808
|
|
|
|
|
|
|
# If defined, the jig is up! |
1809
|
|
|
|
|
|
|
if ($trak->{$ch}) { |
1810
|
|
|
|
|
|
|
die("CheckTrackerSessionUnique(): RULE VIOLATION: sesskey=$ch\n"); |
1811
|
|
|
|
|
|
|
} else { |
1812
|
|
|
|
|
|
|
# Set value to |
1813
|
|
|
|
|
|
|
$trak->{$ch} = 'ts' . $time . ":cnt1"; |
1814
|
|
|
|
|
|
|
} |
1815
|
|
|
|
|
|
|
|
1816
|
|
|
|
|
|
|
return 1; |
1817
|
|
|
|
|
|
|
} |
1818
|
|
|
|
|
|
|
|
1819
|
|
|
|
|
|
|
# Check the last access time stamp, and update if needed, for a given session. |
1820
|
|
|
|
|
|
|
# Does NOT update the time if a fixed timeout has been set. |
1821
|
|
|
|
|
|
|
# Returns undef if the atime is more than the session's timeout age |
1822
|
|
|
|
|
|
|
# or if etime is set and is over the session's expire age. |
1823
|
|
|
|
|
|
|
sub CheckTime { |
1824
|
|
|
|
|
|
|
my ($self, $sess) = @_; |
1825
|
|
|
|
|
|
|
my $time = time(); |
1826
|
|
|
|
|
|
|
my $tdiff; |
1827
|
|
|
|
|
|
|
my $ret = undef; |
1828
|
|
|
|
|
|
|
|
1829
|
|
|
|
|
|
|
# All sessions require at least a floating or fixed timeout! |
1830
|
|
|
|
|
|
|
($sess->{atime} || $sess->{etime}) or return undef; |
1831
|
|
|
|
|
|
|
|
1832
|
|
|
|
|
|
|
# Check the hard timeout first, if it exists. |
1833
|
|
|
|
|
|
|
# This short circuits further checking since the hard timeout is king! |
1834
|
|
|
|
|
|
|
if ($sess->{etime}) { |
1835
|
|
|
|
|
|
|
if ($time >= $sess->{etime}) { |
1836
|
|
|
|
|
|
|
return undef; |
1837
|
|
|
|
|
|
|
} else { |
1838
|
|
|
|
|
|
|
$ret = $sess->{etime}; |
1839
|
|
|
|
|
|
|
} |
1840
|
|
|
|
|
|
|
} |
1841
|
|
|
|
|
|
|
|
1842
|
|
|
|
|
|
|
if ($sess->{atime}) { |
1843
|
|
|
|
|
|
|
$tdiff = $time - $sess->{atime}; |
1844
|
|
|
|
|
|
|
if ($tdiff < $sess->{Timeout}) { |
1845
|
|
|
|
|
|
|
# We are still valid. Update the time if we are over 60 seconds |
1846
|
|
|
|
|
|
|
# stale. |
1847
|
|
|
|
|
|
|
if ($tdiff >= 60) { |
1848
|
|
|
|
|
|
|
$sess->{atime} = $time; |
1849
|
|
|
|
|
|
|
} |
1850
|
|
|
|
|
|
|
$ret = $sess->{atime}; |
1851
|
|
|
|
|
|
|
} else { |
1852
|
|
|
|
|
|
|
return undef; |
1853
|
|
|
|
|
|
|
} |
1854
|
|
|
|
|
|
|
} |
1855
|
|
|
|
|
|
|
|
1856
|
|
|
|
|
|
|
return $ret; |
1857
|
|
|
|
|
|
|
} |
1858
|
|
|
|
|
|
|
|
1859
|
|
|
|
|
|
|
|
1860
|
|
|
|
|
|
|
# The Alterlist functions manipulate and apply a list of transforms to apply to |
1861
|
|
|
|
|
|
|
# the headers and cookies of the client request before sending the request |
1862
|
|
|
|
|
|
|
# through to the backend server. $self->{alterlist} is a hash containing |
1863
|
|
|
|
|
|
|
# one or more of the following container arrays: |
1864
|
|
|
|
|
|
|
# |
1865
|
|
|
|
|
|
|
# header |
1866
|
|
|
|
|
|
|
# ------ |
1867
|
|
|
|
|
|
|
# @{$self->{alterlist}->{header}} - One or more header transforms, with the |
1868
|
|
|
|
|
|
|
# syntax: |
1869
|
|
|
|
|
|
|
# ACTION:NAME:VALUE |
1870
|
|
|
|
|
|
|
# ACTION - add, replace, or delete |
1871
|
|
|
|
|
|
|
# NAME - Header name (or regex match for delete) |
1872
|
|
|
|
|
|
|
# VALUE - New value of header for add or replace, else optional regex filter |
1873
|
|
|
|
|
|
|
# for delete (Prefix pattern with ! for negation) |
1874
|
|
|
|
|
|
|
# |
1875
|
|
|
|
|
|
|
# cookie |
1876
|
|
|
|
|
|
|
# ------ |
1877
|
|
|
|
|
|
|
# @{$self->{alterlist}->{cookie}} - One or more cookie transforms, with the |
1878
|
|
|
|
|
|
|
# syntax: |
1879
|
|
|
|
|
|
|
# ACTION:NAME:VALUE |
1880
|
|
|
|
|
|
|
# ACTION - add, replace, delete, or passback |
1881
|
|
|
|
|
|
|
# NAME - Cookie name (or regex match for delete) |
1882
|
|
|
|
|
|
|
# VALUE - New value of cookie, or regex filter for delete action (Prefix |
1883
|
|
|
|
|
|
|
# pattern with ! for negation) |
1884
|
|
|
|
|
|
|
# |
1885
|
|
|
|
|
|
|
# Note - delete rules with optional value match pattern will delete only values |
1886
|
|
|
|
|
|
|
# of a multi-value cookie that match the value pattern |
1887
|
|
|
|
|
|
|
# |
1888
|
|
|
|
|
|
|
# The special "passback" action passes cookies back to the web browser on |
1889
|
|
|
|
|
|
|
# login, This allows us to gather cookies from backend servers on login, but |
1890
|
|
|
|
|
|
|
# have the web browser maintain them. |
1891
|
|
|
|
|
|
|
# |
1892
|
|
|
|
|
|
|
# More containers can be added without modifying the generic functions. |
1893
|
|
|
|
|
|
|
|
1894
|
|
|
|
|
|
|
# Load Alterlist rules from session and return a ref to the loaded alterlist |
1895
|
|
|
|
|
|
|
sub AlterlistLoad { |
1896
|
|
|
|
|
|
|
my ($self, $sess) = @_; |
1897
|
|
|
|
|
|
|
my ($sk,$rk); |
1898
|
|
|
|
|
|
|
my $alterlist = {}; |
1899
|
|
|
|
|
|
|
|
1900
|
|
|
|
|
|
|
# All alterlist save value start with al- |
1901
|
|
|
|
|
|
|
foreach $sk (keys %{$sess}) { |
1902
|
|
|
|
|
|
|
($sk =~ /^al\-([\w]+)$/) || (next); |
1903
|
|
|
|
|
|
|
$rk = $1; |
1904
|
|
|
|
|
|
|
@{$alterlist->{$rk}} = split("\n", $sess->{$sk}); |
1905
|
|
|
|
|
|
|
} |
1906
|
|
|
|
|
|
|
|
1907
|
|
|
|
|
|
|
return $alterlist; |
1908
|
|
|
|
|
|
|
} |
1909
|
|
|
|
|
|
|
|
1910
|
|
|
|
|
|
|
# Update current alterlist with given alterlist hash ref |
1911
|
|
|
|
|
|
|
sub AlterlistMod { |
1912
|
|
|
|
|
|
|
my ($self, $alterlist, $alm) = @_; |
1913
|
|
|
|
|
|
|
my $rk; |
1914
|
|
|
|
|
|
|
|
1915
|
|
|
|
|
|
|
(defined($alterlist)) || ($alterlist = {}); |
1916
|
|
|
|
|
|
|
|
1917
|
|
|
|
|
|
|
# Update alterlist from $alm hash ref |
1918
|
|
|
|
|
|
|
foreach $rk (keys %{$alm}) { |
1919
|
|
|
|
|
|
|
foreach (@{$alm->{$rk}}) { |
1920
|
|
|
|
|
|
|
push(@{$alterlist->{$rk}}, $_); |
1921
|
|
|
|
|
|
|
} |
1922
|
|
|
|
|
|
|
} |
1923
|
|
|
|
|
|
|
|
1924
|
|
|
|
|
|
|
# Modifications made directly, but return the ref in case |
1925
|
|
|
|
|
|
|
return $alterlist; |
1926
|
|
|
|
|
|
|
} |
1927
|
|
|
|
|
|
|
|
1928
|
|
|
|
|
|
|
# Save existing alterlist to given session |
1929
|
|
|
|
|
|
|
sub AlterlistSave { |
1930
|
|
|
|
|
|
|
my ($self, $alterlist, $sess) = @_; |
1931
|
|
|
|
|
|
|
my ($sk,$rk); |
1932
|
|
|
|
|
|
|
|
1933
|
|
|
|
|
|
|
# Save alterlist to session in \n deliminated form. |
1934
|
|
|
|
|
|
|
if (defined($alterlist) && scalar(keys %{$alterlist})) { |
1935
|
|
|
|
|
|
|
foreach $rk (keys %{$alterlist}) { |
1936
|
|
|
|
|
|
|
$sk = "al-" . $rk; |
1937
|
|
|
|
|
|
|
$sess->{$sk} = join("\n", @{$alterlist->{$rk}}); |
1938
|
|
|
|
|
|
|
} |
1939
|
|
|
|
|
|
|
} |
1940
|
|
|
|
|
|
|
|
1941
|
|
|
|
|
|
|
return $alterlist; |
1942
|
|
|
|
|
|
|
} |
1943
|
|
|
|
|
|
|
|
1944
|
|
|
|
|
|
|
# Apply current alterlist rules to request (just calls sub methods in order) |
1945
|
|
|
|
|
|
|
sub AlterlistApply { |
1946
|
|
|
|
|
|
|
my ($self, $alterlist, $r) = @_; |
1947
|
|
|
|
|
|
|
my $status = 1; |
1948
|
|
|
|
|
|
|
(defined($alterlist)) || (return 0); |
1949
|
|
|
|
|
|
|
|
1950
|
|
|
|
|
|
|
if (defined($alterlist->{header})) { |
1951
|
|
|
|
|
|
|
# Run through headers (saving off alter count) |
1952
|
|
|
|
|
|
|
$self->AlterlistApplyHeader($alterlist, $r); |
1953
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApply(): Applied alterlist for header")); |
1954
|
|
|
|
|
|
|
} |
1955
|
|
|
|
|
|
|
|
1956
|
|
|
|
|
|
|
if (defined($alterlist->{cookie})) { |
1957
|
|
|
|
|
|
|
# Run through cookies (saving off alter count) |
1958
|
|
|
|
|
|
|
$self->AlterlistApplyCookie($alterlist, $r); |
1959
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApply(): Applied alterlist for cookie")); |
1960
|
|
|
|
|
|
|
} |
1961
|
|
|
|
|
|
|
|
1962
|
|
|
|
|
|
|
return $alterlist; |
1963
|
|
|
|
|
|
|
} |
1964
|
|
|
|
|
|
|
|
1965
|
|
|
|
|
|
|
# Apply alterlist rules to request headers. |
1966
|
|
|
|
|
|
|
sub AlterlistApplyHeader { |
1967
|
|
|
|
|
|
|
my ($self, $alterlist, $r) = @_; |
1968
|
|
|
|
|
|
|
(defined($alterlist->{header})) || (return 0); |
1969
|
|
|
|
|
|
|
my ($t, $h, $hl, $act, $key, $val, $tk, $tv); |
1970
|
|
|
|
|
|
|
|
1971
|
|
|
|
|
|
|
# Extract current header hash and build \n deliminated lookup string |
1972
|
|
|
|
|
|
|
# to fast match against |
1973
|
|
|
|
|
|
|
$h = $r->headers_in; |
1974
|
|
|
|
|
|
|
$hl = "\n" . join("\n", keys(%{$h})) . "\n"; |
1975
|
|
|
|
|
|
|
|
1976
|
|
|
|
|
|
|
# Cycle through all header transforms |
1977
|
|
|
|
|
|
|
foreach $t (@{$alterlist->{header}}) { |
1978
|
|
|
|
|
|
|
($t =~ /^(add|replace|rep|delete|del):([\w\d\-]+):(.*?)$/i) || (($self->Log($r, ('debug', "AlterlistApplyHeader(): Skipping illegal header transform \"$t\""))) && (next)); |
1979
|
|
|
|
|
|
|
$act = $1; |
1980
|
|
|
|
|
|
|
$key = $2; |
1981
|
|
|
|
|
|
|
$val = $3; |
1982
|
|
|
|
|
|
|
|
1983
|
|
|
|
|
|
|
if ($act =~ /^add$/) { |
1984
|
|
|
|
|
|
|
# Blindly clear then add the header |
1985
|
|
|
|
|
|
|
$r->headers_in->unset($key); |
1986
|
|
|
|
|
|
|
$r->headers_in->add($key => $val); |
1987
|
|
|
|
|
|
|
|
1988
|
|
|
|
|
|
|
# Log obscured value |
1989
|
|
|
|
|
|
|
$self->Log($r, ('debug', "HEADER ADD: $key: " . XHalf($val))); |
1990
|
|
|
|
|
|
|
} else { |
1991
|
|
|
|
|
|
|
# Replace and delete allow for regex header name matches |
1992
|
|
|
|
|
|
|
while ($hl =~ /($key)/igm) { |
1993
|
|
|
|
|
|
|
# Update |
1994
|
|
|
|
|
|
|
$tk = $1; |
1995
|
|
|
|
|
|
|
# Make sure header was not deleted |
1996
|
|
|
|
|
|
|
($r->headers_in->{$tk}) || (next); |
1997
|
|
|
|
|
|
|
if ($act =~ /^replace|rep$/) { |
1998
|
|
|
|
|
|
|
# Blindly delete then add the header |
1999
|
|
|
|
|
|
|
# Save old value for log |
2000
|
|
|
|
|
|
|
$tv = $r->headers_in->{$tk}; |
2001
|
|
|
|
|
|
|
$r->headers_in->unset($tk); |
2002
|
|
|
|
|
|
|
$r->headers_in->add($tk => $val); |
2003
|
|
|
|
|
|
|
|
2004
|
|
|
|
|
|
|
# Log obscured values |
2005
|
|
|
|
|
|
|
$self->Log($r, 'debug', ("AlterlistApplyHeader(): HEADER REPLACE: $tk: " . XHalf($tv) . " -> " . XHalf($val))); |
2006
|
|
|
|
|
|
|
|
2007
|
|
|
|
|
|
|
} elsif ($act =~ /^delete|del$/) { |
2008
|
|
|
|
|
|
|
# Check for extra content match |
2009
|
|
|
|
|
|
|
if ($val) { |
2010
|
|
|
|
|
|
|
$tv = $r->headers_in->{$tk}; |
2011
|
|
|
|
|
|
|
# Handle negation |
2012
|
|
|
|
|
|
|
if ($val =~ s/^\!//) { |
2013
|
|
|
|
|
|
|
($tv =~ /($val)/is) && (next); |
2014
|
|
|
|
|
|
|
} else { |
2015
|
|
|
|
|
|
|
($tv =~ /($val)/is) || (next); |
2016
|
|
|
|
|
|
|
} |
2017
|
|
|
|
|
|
|
} |
2018
|
|
|
|
|
|
|
|
2019
|
|
|
|
|
|
|
# Kill! |
2020
|
|
|
|
|
|
|
$r->headers_in->unset($tk); |
2021
|
|
|
|
|
|
|
|
2022
|
|
|
|
|
|
|
# Log obscured value |
2023
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApplyHeader(): HEADER DELETE: $tk: " . XHalf($tv))); |
2024
|
|
|
|
|
|
|
} |
2025
|
|
|
|
|
|
|
} |
2026
|
|
|
|
|
|
|
} |
2027
|
|
|
|
|
|
|
} |
2028
|
|
|
|
|
|
|
|
2029
|
|
|
|
|
|
|
return $alterlist; |
2030
|
|
|
|
|
|
|
} |
2031
|
|
|
|
|
|
|
|
2032
|
|
|
|
|
|
|
|
2033
|
|
|
|
|
|
|
# Apply alterlist rules to request cookies. |
2034
|
|
|
|
|
|
|
# Note - Does not handle "passback" cookie. Use AlterlistPassBackCookie() to |
2035
|
|
|
|
|
|
|
# retrieve and clear passback cookies) |
2036
|
|
|
|
|
|
|
sub AlterlistApplyCookie { |
2037
|
|
|
|
|
|
|
my ($self, $alterlist, $r) = @_; |
2038
|
|
|
|
|
|
|
|
2039
|
|
|
|
|
|
|
(defined($alterlist->{cookie})) || (return 0); |
2040
|
|
|
|
|
|
|
my ($t, %c, $cl, $act, $key, $val, $tk, $tv, @ta, @td); |
2041
|
|
|
|
|
|
|
my $alterred = 0; |
2042
|
|
|
|
|
|
|
|
2043
|
|
|
|
|
|
|
# Grab any cookies any put into a hash of CGI::Cookies, or just make an |
2044
|
|
|
|
|
|
|
# empty cookie hash for now. |
2045
|
|
|
|
|
|
|
%c = CGI::Cookie->fetch($r); |
2046
|
|
|
|
|
|
|
(%c) || (%c = ()); |
2047
|
|
|
|
|
|
|
# Build \n deliminated lookup string to fast match against |
2048
|
|
|
|
|
|
|
$cl = "\n" . join("\n", keys(%c)) . "\n"; |
2049
|
|
|
|
|
|
|
|
2050
|
|
|
|
|
|
|
foreach $t (@{$alterlist->{cookie}}) { |
2051
|
|
|
|
|
|
|
# Note - : or = allowed between NAME and VALUE to make life easier |
2052
|
|
|
|
|
|
|
($t =~ /^(add|replace|rep|delete|del|passback|set):([\w\d\-]+)(?:\:|\=)(.*?)$/i) || (($self->Log($r, ('debug', "AlterlistApplyCookie(): Skipping illegal cookie transform \"$t\""))) && (next)); |
2053
|
|
|
|
|
|
|
$act = $1; |
2054
|
|
|
|
|
|
|
$key = $2; |
2055
|
|
|
|
|
|
|
$val = $3; |
2056
|
|
|
|
|
|
|
|
2057
|
|
|
|
|
|
|
if ($act =~ /^passback|set$/) { |
2058
|
|
|
|
|
|
|
# passback not handled in this method |
2059
|
|
|
|
|
|
|
next; |
2060
|
|
|
|
|
|
|
} elsif ($act =~ /^add$/) { |
2061
|
|
|
|
|
|
|
# Blindly add the cookie |
2062
|
|
|
|
|
|
|
@ta = split('&', $val); |
2063
|
|
|
|
|
|
|
# Add a new CGI::Cookie to the hash |
2064
|
|
|
|
|
|
|
$c{$key} = new CGI::Cookie(-name => $key, -value => \@ta); |
2065
|
|
|
|
|
|
|
|
2066
|
|
|
|
|
|
|
# Log obscured value |
2067
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApplyCookie(): COOKIE ADD: $key=" . XHalf($val))); |
2068
|
|
|
|
|
|
|
$alterred++; |
2069
|
|
|
|
|
|
|
} else { |
2070
|
|
|
|
|
|
|
# Replace and delete allow for regex cookie name matches |
2071
|
|
|
|
|
|
|
while ($cl =~ /($key)/igm) { |
2072
|
|
|
|
|
|
|
# Update |
2073
|
|
|
|
|
|
|
$tk = $1; |
2074
|
|
|
|
|
|
|
if ($act =~ /^replace|rep$/) { |
2075
|
|
|
|
|
|
|
# Blindly delete then add the cookie back with new value |
2076
|
|
|
|
|
|
|
# Save old value for log |
2077
|
|
|
|
|
|
|
$tv = join('&', $c{$tk}->value);; |
2078
|
|
|
|
|
|
|
delete($c{$tk}); |
2079
|
|
|
|
|
|
|
@ta = split('&', $val); |
2080
|
|
|
|
|
|
|
$c{$tk} = new CGI::Cookie(-name => $tk, -value => \@ta); |
2081
|
|
|
|
|
|
|
|
2082
|
|
|
|
|
|
|
# Log obscured values |
2083
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApplyCookie(): COOKIE REPLACE: $tk: " . XHalf($tv) . " -> " . XHalf($val))); |
2084
|
|
|
|
|
|
|
$alterred++; |
2085
|
|
|
|
|
|
|
} elsif ($act =~ /^delete|del$/) { |
2086
|
|
|
|
|
|
|
# Check for extra content match |
2087
|
|
|
|
|
|
|
if ($val) { |
2088
|
|
|
|
|
|
|
@ta = (); |
2089
|
|
|
|
|
|
|
@td = (); |
2090
|
|
|
|
|
|
|
# Cycle through multi-values |
2091
|
|
|
|
|
|
|
foreach $tv ($c{$tk}->value) { |
2092
|
|
|
|
|
|
|
# Handle negation |
2093
|
|
|
|
|
|
|
if ($val =~ s/^\!//) { |
2094
|
|
|
|
|
|
|
# Save value and continue |
2095
|
|
|
|
|
|
|
if ($tv =~ /($val)/is) { |
2096
|
|
|
|
|
|
|
push(@ta, $tv); |
2097
|
|
|
|
|
|
|
next; |
2098
|
|
|
|
|
|
|
} |
2099
|
|
|
|
|
|
|
} else { |
2100
|
|
|
|
|
|
|
# Save value and continue |
2101
|
|
|
|
|
|
|
unless ($tv =~ /($val)/is) { |
2102
|
|
|
|
|
|
|
push(@ta, $tv); |
2103
|
|
|
|
|
|
|
next; |
2104
|
|
|
|
|
|
|
} |
2105
|
|
|
|
|
|
|
} |
2106
|
|
|
|
|
|
|
# Fell through, so this value is history/unsaved |
2107
|
|
|
|
|
|
|
push(@td, $tv); |
2108
|
|
|
|
|
|
|
$alterred++; |
2109
|
|
|
|
|
|
|
} |
2110
|
|
|
|
|
|
|
# Kill! |
2111
|
|
|
|
|
|
|
if (scalar @ta) { |
2112
|
|
|
|
|
|
|
# Some values left not deleted, so set those back |
2113
|
|
|
|
|
|
|
$c{$tk}->value(\@ta); |
2114
|
|
|
|
|
|
|
$tv = join('&', @td); |
2115
|
|
|
|
|
|
|
|
2116
|
|
|
|
|
|
|
# Log obscured value |
2117
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApplyCookie(): COOKIE DELETE PARTIAL: $tk=" . XHalf($tv))); |
2118
|
|
|
|
|
|
|
} else { |
2119
|
|
|
|
|
|
|
# Nothing left inside. KILL! |
2120
|
|
|
|
|
|
|
delete($c{$tk}); |
2121
|
|
|
|
|
|
|
$tv = join('&', @td); |
2122
|
|
|
|
|
|
|
|
2123
|
|
|
|
|
|
|
# Obscure values for logging |
2124
|
|
|
|
|
|
|
$tv =~ s/([^X])[\w\d]/${1}X/gs; |
2125
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApplyCookie(): COOKIE DELETE FULL: $tk=$tv")); |
2126
|
|
|
|
|
|
|
} |
2127
|
|
|
|
|
|
|
} else { |
2128
|
|
|
|
|
|
|
# Kill Em All |
2129
|
|
|
|
|
|
|
$tv = $c{$key}->value; |
2130
|
|
|
|
|
|
|
delete($c{$key}); |
2131
|
|
|
|
|
|
|
|
2132
|
|
|
|
|
|
|
# Obscure values for logging |
2133
|
|
|
|
|
|
|
$tv =~ s/([^X])[\w\d]/${1}X/gs; |
2134
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistApplyCookie(): COOKIE DELETE FULL: $key=$tv")); |
2135
|
|
|
|
|
|
|
|
2136
|
|
|
|
|
|
|
$alterred++; |
2137
|
|
|
|
|
|
|
} |
2138
|
|
|
|
|
|
|
} |
2139
|
|
|
|
|
|
|
} |
2140
|
|
|
|
|
|
|
} |
2141
|
|
|
|
|
|
|
} |
2142
|
|
|
|
|
|
|
|
2143
|
|
|
|
|
|
|
# Unset, then add cookies to header if changes were made |
2144
|
|
|
|
|
|
|
if ($alterred) { |
2145
|
|
|
|
|
|
|
$r->headers_in->unset('Cookie'); |
2146
|
|
|
|
|
|
|
$t = ''; |
2147
|
|
|
|
|
|
|
foreach $tk (keys %c) { |
2148
|
|
|
|
|
|
|
# Cookie to list in string form. |
2149
|
|
|
|
|
|
|
$t .= $c{$tk}->name . "=" . join('&', $c{$tk}->value) . "; "; |
2150
|
|
|
|
|
|
|
} |
2151
|
|
|
|
|
|
|
# Kill trailing '; ' |
2152
|
|
|
|
|
|
|
$t =~ s/\; $//s; |
2153
|
|
|
|
|
|
|
# Ship it |
2154
|
|
|
|
|
|
|
$r->headers_in->add('Cookie' => $t); |
2155
|
|
|
|
|
|
|
} |
2156
|
|
|
|
|
|
|
|
2157
|
|
|
|
|
|
|
return $alterlist; |
2158
|
|
|
|
|
|
|
} |
2159
|
|
|
|
|
|
|
|
2160
|
|
|
|
|
|
|
# Add a Set-cookie: header to r for all alterlist "passback" cookies and return |
2161
|
|
|
|
|
|
|
# a modified alterlist with the passback cookie values cleared and expired. |
2162
|
|
|
|
|
|
|
# |
2163
|
|
|
|
|
|
|
# Unlike normal alterlist rules, passback cookies are sent BACK to the client. |
2164
|
|
|
|
|
|
|
# The only time this can occur is upon login/redirect. The purpose of passback |
2165
|
|
|
|
|
|
|
# cookies is to set the same cookies in the browser as they would have set |
2166
|
|
|
|
|
|
|
# if they were connecting directly to the backend server(s). |
2167
|
|
|
|
|
|
|
# |
2168
|
|
|
|
|
|
|
# The return should be used to update the alterlist. When |
2169
|
|
|
|
|
|
|
# AlterlistPassBackCookie is applied again, it will UNSET the passback cookies. |
2170
|
|
|
|
|
|
|
# This should be done on logout. |
2171
|
|
|
|
|
|
|
sub AlterlistPassBackCookie() { |
2172
|
|
|
|
|
|
|
my ($self, $alterlist, $r) = @_; |
2173
|
|
|
|
|
|
|
|
2174
|
|
|
|
|
|
|
(defined($alterlist->{cookie})) || (return 0); |
2175
|
|
|
|
|
|
|
my ($t, $key, $val, $opt, $tdomain, $tpath, $texpire); |
2176
|
|
|
|
|
|
|
my @ct = (); |
2177
|
|
|
|
|
|
|
my %c = (); |
2178
|
|
|
|
|
|
|
|
2179
|
|
|
|
|
|
|
foreach $t (@{$alterlist->{cookie}}) { |
2180
|
|
|
|
|
|
|
# Note - : or = allowed between NAME and VALUE to make life easier |
2181
|
|
|
|
|
|
|
($t =~ /^(passback|set):([\w\d\-]+)(?:\:|\=)([^;]*)(;.*)?$/i) || ((push(@ct, $t)) && (next)); |
2182
|
|
|
|
|
|
|
$key = $2; |
2183
|
|
|
|
|
|
|
$val = $3; |
2184
|
|
|
|
|
|
|
$opt = $4; |
2185
|
|
|
|
|
|
|
$tdomain = $tpath = $texpire = ''; |
2186
|
|
|
|
|
|
|
|
2187
|
|
|
|
|
|
|
# Unlike AlterlistApplyCookie which just needs to parse name and |
2188
|
|
|
|
|
|
|
# value, the PassBack cookies are Set-Cookie items which may |
2189
|
|
|
|
|
|
|
# have options. Also, only process the last cookie value if |
2190
|
|
|
|
|
|
|
# a multi-value cookie is passed |
2191
|
|
|
|
|
|
|
|
2192
|
|
|
|
|
|
|
# Add a new CGI::Cookie to the hash |
2193
|
|
|
|
|
|
|
$c{$key} = new CGI::Cookie(-name => $key, |
2194
|
|
|
|
|
|
|
-value => $val, |
2195
|
|
|
|
|
|
|
); |
2196
|
|
|
|
|
|
|
# Set further options (only Expires and Path currently passed through) |
2197
|
|
|
|
|
|
|
foreach $t (split(';', $opt)) { |
2198
|
|
|
|
|
|
|
if ($t =~ /^\s*expires=([\w\d \:\;\-,]+)\s*$/) { |
2199
|
|
|
|
|
|
|
$c{$key}->expires($1); |
2200
|
|
|
|
|
|
|
} elsif ($t =~ /^\s*path=(\/.*?)\s*$/) { |
2201
|
|
|
|
|
|
|
$c{$key}->path($1); |
2202
|
|
|
|
|
|
|
} |
2203
|
|
|
|
|
|
|
} |
2204
|
|
|
|
|
|
|
|
2205
|
|
|
|
|
|
|
# Set other options to match session cookie values (could be made a |
2206
|
|
|
|
|
|
|
# configurable, and allow for maintaining the original options from the |
2207
|
|
|
|
|
|
|
# cookie. I don't see a need.) |
2208
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
2209
|
|
|
|
|
|
|
|
2210
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}Domain")) { |
2211
|
|
|
|
|
|
|
$c{$key}->domain($r->dir_config("${auth_name}Domain")); |
2212
|
|
|
|
|
|
|
} |
2213
|
|
|
|
|
|
|
if (!$r->dir_config("${auth_name}Secure") || ($r->dir_config("${auth_name}Secure") == 1)) { |
2214
|
|
|
|
|
|
|
$c{$key}->secure(1); |
2215
|
|
|
|
|
|
|
} |
2216
|
|
|
|
|
|
|
|
2217
|
|
|
|
|
|
|
$r->err_headers_out->add('Set-Cookie' => $c{$key}); |
2218
|
|
|
|
|
|
|
|
2219
|
|
|
|
|
|
|
# Clean up and log |
2220
|
|
|
|
|
|
|
$t = $c{$key}; |
2221
|
|
|
|
|
|
|
$t =~ /($key\s*\=\s*)(.*?)(;|$)/; |
2222
|
|
|
|
|
|
|
$self->Log($r, ('debug', "AlterlistPassBackCookie(): COOKIE PASSBACK: " . $1 . XHalf($2) . $3)); |
2223
|
|
|
|
|
|
|
|
2224
|
|
|
|
|
|
|
# Save an empty/expired cookie so next call to AlterlistPassBackCookie |
2225
|
|
|
|
|
|
|
# with this alterlist will unset the cookie |
2226
|
|
|
|
|
|
|
$c{$key}->value(''); |
2227
|
|
|
|
|
|
|
$c{$key}->expires('Thu, 1-Jan-1970 00:00:00 GMT'); |
2228
|
|
|
|
|
|
|
push(@ct, "passback:" . $c{$key}); |
2229
|
|
|
|
|
|
|
} |
2230
|
|
|
|
|
|
|
|
2231
|
|
|
|
|
|
|
# Save updated cookie array |
2232
|
|
|
|
|
|
|
@{$alterlist->{cookie}} = @ct; |
2233
|
|
|
|
|
|
|
|
2234
|
|
|
|
|
|
|
return $alterlist; |
2235
|
|
|
|
|
|
|
} |
2236
|
|
|
|
|
|
|
|
2237
|
|
|
|
|
|
|
|
2238
|
|
|
|
|
|
|
# Append an error code to the list of query args in a given URL. (Used to |
2239
|
|
|
|
|
|
|
# pass friendly error messages to users in external redirects. (Note that |
2240
|
|
|
|
|
|
|
# AuthCookie used subprocess_env() to pass that info, but since that will only |
2241
|
|
|
|
|
|
|
# work in the same main request, it won't pass into an external redirect.) |
2242
|
|
|
|
|
|
|
sub URLErrorCode { |
2243
|
|
|
|
|
|
|
my $self = shift; |
2244
|
|
|
|
|
|
|
my $uri = (shift) || (return undef); |
2245
|
|
|
|
|
|
|
my $ecode = (shift) || (''); |
2246
|
|
|
|
|
|
|
|
2247
|
|
|
|
|
|
|
($uri = new URI($uri)) || (return undef); |
2248
|
|
|
|
|
|
|
|
2249
|
|
|
|
|
|
|
# Error codes must contain only letters, numbers, and/or _ chars. |
2250
|
|
|
|
|
|
|
# Your login.pl script should read them in CAREFULLY and make sure |
2251
|
|
|
|
|
|
|
# they follow this format. |
2252
|
|
|
|
|
|
|
($ecode =~ /^([\w\d_]+)$/) || (return undef); |
2253
|
|
|
|
|
|
|
|
2254
|
|
|
|
|
|
|
# Add the error code and return the URI in string form |
2255
|
|
|
|
|
|
|
$uri->query_form($uri->query_form, 'ASERRCODE' => $ecode); |
2256
|
|
|
|
|
|
|
return $uri->as_string; |
2257
|
|
|
|
|
|
|
} |
2258
|
|
|
|
|
|
|
|
2259
|
|
|
|
|
|
|
# Log to configured log. Always takes the request as the 1st arg. Can |
2260
|
|
|
|
|
|
|
# take either a loglevel and a message as args 2 and 3, or an array |
2261
|
|
|
|
|
|
|
# of loglevel and message arrays as the 2nd arg. |
2262
|
|
|
|
|
|
|
sub Log { |
2263
|
|
|
|
|
|
|
my $self = shift; |
2264
|
|
|
|
|
|
|
my $r = shift; |
2265
|
|
|
|
|
|
|
my $la = []; |
2266
|
|
|
|
|
|
|
my $debug = $self->_debug($r); |
2267
|
|
|
|
|
|
|
|
2268
|
|
|
|
|
|
|
# Check if being called with a level and message, or with a log array |
2269
|
|
|
|
|
|
|
if (ref($_[0]) eq "ARRAY") { |
2270
|
|
|
|
|
|
|
$la = $_[0]; |
2271
|
|
|
|
|
|
|
(defined(@{$la}) && (scalar @{$la})) || (return 0); |
2272
|
|
|
|
|
|
|
} else { |
2273
|
|
|
|
|
|
|
(defined($_[0]) && defined($_[1])) || (return 0); |
2274
|
|
|
|
|
|
|
# Set to a single child array of arrays |
2275
|
|
|
|
|
|
|
$la = [[$_[0], $_[1]]]; |
2276
|
|
|
|
|
|
|
} |
2277
|
|
|
|
|
|
|
|
2278
|
|
|
|
|
|
|
# Collect a few tidbits (package name, client IP and URI?args) |
2279
|
|
|
|
|
|
|
my $auth_name = ($r->auth_name || ""); |
2280
|
|
|
|
|
|
|
$auth_name .= ': '; |
2281
|
|
|
|
|
|
|
my $info = '
|
2282
|
|
|
|
|
|
|
if ($MP eq 1) { |
2283
|
|
|
|
|
|
|
$info .= ($r->get_remote_host || ""); |
2284
|
|
|
|
|
|
|
} else { |
2285
|
|
|
|
|
|
|
$info .= ($r->connection->get_remote_host || ""); |
2286
|
|
|
|
|
|
|
} |
2287
|
|
|
|
|
|
|
$info .= ', uri="'; |
2288
|
|
|
|
|
|
|
$info .= ($r->uri() || ""); |
2289
|
|
|
|
|
|
|
(defined($r->args())) && ($info .= '?' . $r->args()); |
2290
|
|
|
|
|
|
|
$info .= '">'; |
2291
|
|
|
|
|
|
|
|
2292
|
|
|
|
|
|
|
# Get the log handle for the server |
2293
|
|
|
|
|
|
|
my $log = $r->server->log; |
2294
|
|
|
|
|
|
|
my $defaultlevel = 'error'; |
2295
|
|
|
|
|
|
|
my ($li, $level, $line); |
2296
|
|
|
|
|
|
|
|
2297
|
|
|
|
|
|
|
# Cycle through the log entries |
2298
|
|
|
|
|
|
|
foreach $li (@{$la}) { |
2299
|
|
|
|
|
|
|
if (scalar(@{$li}) == 2) { # 2 argument form with level and line |
2300
|
|
|
|
|
|
|
$level = $li->[0]; |
2301
|
|
|
|
|
|
|
($level) || ($level = $defaultlevel); |
2302
|
|
|
|
|
|
|
($level =~ s/^(emerg|alert|crit|error|warn|notice|info|debug)$/$1/i) || (return 0); |
2303
|
|
|
|
|
|
|
$level = lc($level); |
2304
|
|
|
|
|
|
|
# Skip debug unless debug is enabled |
2305
|
|
|
|
|
|
|
next if (!$debug && ($level eq 'debug')); |
2306
|
|
|
|
|
|
|
$line = $auth_name . $li->[1] . $info; |
2307
|
|
|
|
|
|
|
} elsif (scalar(@{$li}) == 1) { # 1 argument form: must add a level |
2308
|
|
|
|
|
|
|
$level = $defaultlevel; |
2309
|
|
|
|
|
|
|
$line = $auth_name . $li->[0] . $info; |
2310
|
|
|
|
|
|
|
} else { # Who knows form: must hit someone's fingers with a hammer |
2311
|
|
|
|
|
|
|
return 0; |
2312
|
|
|
|
|
|
|
} |
2313
|
|
|
|
|
|
|
|
2314
|
|
|
|
|
|
|
# Check log line, then ship it. |
2315
|
|
|
|
|
|
|
$line = $self->FilterLogLine($line); |
2316
|
|
|
|
|
|
|
$log->$level($line); |
2317
|
|
|
|
|
|
|
} |
2318
|
|
|
|
|
|
|
|
2319
|
|
|
|
|
|
|
return 1; |
2320
|
|
|
|
|
|
|
} |
2321
|
|
|
|
|
|
|
|
2322
|
|
|
|
|
|
|
# Check debug setting |
2323
|
|
|
|
|
|
|
sub _debug { |
2324
|
|
|
|
|
|
|
my $self = shift; |
2325
|
|
|
|
|
|
|
my $r = shift; |
2326
|
|
|
|
|
|
|
my $debug = 0; |
2327
|
|
|
|
|
|
|
if ($r->auth_name) { |
2328
|
|
|
|
|
|
|
my $auth_name = $r->auth_name; |
2329
|
|
|
|
|
|
|
if ($r->dir_config("${auth_name}Debug")) { |
2330
|
|
|
|
|
|
|
($r->dir_config("${auth_name}Debug") =~ /^(\d+)$/) && ($debug = $1); |
2331
|
|
|
|
|
|
|
} |
2332
|
|
|
|
|
|
|
} |
2333
|
|
|
|
|
|
|
|
2334
|
|
|
|
|
|
|
return $debug; |
2335
|
|
|
|
|
|
|
} |
2336
|
|
|
|
|
|
|
|
2337
|
|
|
|
|
|
|
# Filter the output line before logging. Restricts to no more than CharMax |
2338
|
|
|
|
|
|
|
# characters and converts everything matching BlankChars to a space to |
2339
|
|
|
|
|
|
|
# try and protect logging systems and log monitors from attack. |
2340
|
|
|
|
|
|
|
sub FilterLogLine { |
2341
|
|
|
|
|
|
|
my $self = shift; |
2342
|
|
|
|
|
|
|
my $line = (shift || return undef); |
2343
|
|
|
|
|
|
|
my $LogCharMax = 1024; |
2344
|
|
|
|
|
|
|
|
2345
|
|
|
|
|
|
|
# Strip surrounding whitespace |
2346
|
|
|
|
|
|
|
$line =~ s/^\s*(.+?)\s*$/$1/s; |
2347
|
|
|
|
|
|
|
# Convert newlines to ', ' |
2348
|
|
|
|
|
|
|
$line =~ s/\r?\n/, /sg; |
2349
|
|
|
|
|
|
|
# Check length and truncate if needed |
2350
|
|
|
|
|
|
|
$line = substr($line, 0, $LogCharMax); |
2351
|
|
|
|
|
|
|
# Convert BlankChars matches to blanks |
2352
|
|
|
|
|
|
|
$line =~ s/[\x00-\x08\x0b\x0c\x0e-\x1f\x7f\'\\]+/ /g; |
2353
|
|
|
|
|
|
|
|
2354
|
|
|
|
|
|
|
return $line; |
2355
|
|
|
|
|
|
|
} |
2356
|
|
|
|
|
|
|
|
2357
|
|
|
|
|
|
|
1; # End of Apache::AppSamurai |
2358
|
|
|
|
|
|
|
|
2359
|
|
|
|
|
|
|
__END__ |