| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
#=============================================================================== |
|
2
|
|
|
|
|
|
|
# |
|
3
|
|
|
|
|
|
|
# Apache::AuthCookiePAM |
|
4
|
|
|
|
|
|
|
# |
|
5
|
|
|
|
|
|
|
# An AuthCookie module backed by a PAM. |
|
6
|
|
|
|
|
|
|
# |
|
7
|
|
|
|
|
|
|
# Copyright (C) 2002 SF Interactive. |
|
8
|
|
|
|
|
|
|
# |
|
9
|
|
|
|
|
|
|
# Author: Vandana Awasthi |
|
10
|
|
|
|
|
|
|
# |
|
11
|
|
|
|
|
|
|
# This library is free software; you can redistribute it and/or |
|
12
|
|
|
|
|
|
|
# modify it under the terms of the GNU Lesser General Public |
|
13
|
|
|
|
|
|
|
# License as published by the Free Software Foundation; either |
|
14
|
|
|
|
|
|
|
# version 2.1 of the License, or (at your option) any later version. |
|
15
|
|
|
|
|
|
|
# |
|
16
|
|
|
|
|
|
|
# This library is distributed in the hope that it will be useful, |
|
17
|
|
|
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
18
|
|
|
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
|
19
|
|
|
|
|
|
|
# Lesser General Public License for more details. |
|
20
|
|
|
|
|
|
|
# |
|
21
|
|
|
|
|
|
|
# You should have received a copy of the GNU Lesser General Public |
|
22
|
|
|
|
|
|
|
# License along with this library; if not, write to the Free Software |
|
23
|
|
|
|
|
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
|
24
|
|
|
|
|
|
|
# |
|
25
|
|
|
|
|
|
|
#=============================================================================== |
|
26
|
|
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
package Apache::AuthCookiePAM; |
|
28
|
|
|
|
|
|
|
|
|
29
|
1
|
|
|
1
|
|
6709
|
use strict; |
|
|
1
|
|
|
|
|
3
|
|
|
|
1
|
|
|
|
|
49
|
|
|
30
|
1
|
|
|
1
|
|
32
|
use 5.004; |
|
|
1
|
|
|
|
|
4
|
|
|
|
1
|
|
|
|
|
45
|
|
|
31
|
1
|
|
|
1
|
|
6
|
use vars qw( $VERSION ); |
|
|
1
|
|
|
|
|
7
|
|
|
|
1
|
|
|
|
|
242
|
|
|
32
|
|
|
|
|
|
|
( $VERSION ) = '$Revision: 1.0 $' =~ /([\d.]+)/; |
|
33
|
|
|
|
|
|
|
|
|
34
|
1
|
|
|
1
|
|
1932
|
use Apache; |
|
|
0
|
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
use Apache::Table; |
|
36
|
|
|
|
|
|
|
use Apache::Constants qw(:common M_GET FORBIDDEN REDIRECT); |
|
37
|
|
|
|
|
|
|
use Apache::AuthCookie::Util; |
|
38
|
|
|
|
|
|
|
use Apache::Util qw(escape_uri); |
|
39
|
|
|
|
|
|
|
use Apache::AuthCookie; |
|
40
|
|
|
|
|
|
|
use Authen::PAM; |
|
41
|
|
|
|
|
|
|
use vars qw( @ISA ); |
|
42
|
|
|
|
|
|
|
@ISA = qw( Apache::AuthCookie ); |
|
43
|
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
use Apache::File; |
|
45
|
|
|
|
|
|
|
use Digest::MD5 qw( md5_hex ); |
|
46
|
|
|
|
|
|
|
use Date::Calc qw( Today_and_Now Add_Delta_DHMS ); |
|
47
|
|
|
|
|
|
|
# Also uses Crypt::CBC if you're using encrypted cookies. |
|
48
|
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
#=============================================================================== |
|
50
|
|
|
|
|
|
|
# F U N C T I O N D E C L A R A T I O N S |
|
51
|
|
|
|
|
|
|
#=============================================================================== |
|
52
|
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
sub _log_not_set($$); |
|
54
|
|
|
|
|
|
|
sub _dir_config_var($$); |
|
55
|
|
|
|
|
|
|
sub _config_vars($); |
|
56
|
|
|
|
|
|
|
sub _now_year_month_day_hour_minute_second(); |
|
57
|
|
|
|
|
|
|
sub _percent_encode($); |
|
58
|
|
|
|
|
|
|
sub _percent_decode($); |
|
59
|
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
sub authen_cred($$\@); |
|
61
|
|
|
|
|
|
|
sub authen_ses_key($$$); |
|
62
|
|
|
|
|
|
|
sub group($$\@); |
|
63
|
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
#=============================================================================== |
|
65
|
|
|
|
|
|
|
# P A C K A G E G L O B A L S |
|
66
|
|
|
|
|
|
|
#=============================================================================== |
|
67
|
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
use vars qw( %CIPHERS ); |
|
69
|
|
|
|
|
|
|
# Stores Cipher::CBC objects in $CIPHERS{ idea:AuthName }, |
|
70
|
|
|
|
|
|
|
# $CIPHERS{ des:AuthName } etc. |
|
71
|
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
use vars qw( %SECRET_KEYS ); |
|
73
|
|
|
|
|
|
|
# Stores secret keys for MD5 checksums and encryption for each auth realm in |
|
74
|
|
|
|
|
|
|
# $SECRET_KEYS{ AuthName }. |
|
75
|
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
#=============================================================================== |
|
77
|
|
|
|
|
|
|
# S E R V E R S T A R T I N I T I A L I Z A T I O N |
|
78
|
|
|
|
|
|
|
#=============================================================================== |
|
79
|
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
BEGIN { |
|
81
|
|
|
|
|
|
|
my (@keyfile_vars, $keyfile_var); |
|
82
|
|
|
|
|
|
|
@keyfile_vars = grep { |
|
83
|
|
|
|
|
|
|
$_ =~ /PAM_SecretKeyFile$/ |
|
84
|
|
|
|
|
|
|
} keys %{ Apache->server->dir_config() }; |
|
85
|
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
foreach $keyfile_var ( @keyfile_vars ) { |
|
87
|
|
|
|
|
|
|
my $keyfile ; |
|
88
|
|
|
|
|
|
|
$keyfile = Apache->server->dir_config( $keyfile_var ); |
|
89
|
|
|
|
|
|
|
my $auth_name ; $auth_name = $keyfile_var; |
|
90
|
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
$auth_name =~ s/PAM_SecretKeyFile$//; |
|
92
|
|
|
|
|
|
|
unless ( open( KEY, "<$keyfile" ) ) { |
|
93
|
|
|
|
|
|
|
Apache::log_error( "Could not open keyfile for $auth_name in file $keyfile" ); |
|
94
|
|
|
|
|
|
|
} else { |
|
95
|
|
|
|
|
|
|
$SECRET_KEYS{ $auth_name } = ; |
|
96
|
|
|
|
|
|
|
close KEY; |
|
97
|
|
|
|
|
|
|
} |
|
98
|
|
|
|
|
|
|
} |
|
99
|
|
|
|
|
|
|
} |
|
100
|
|
|
|
|
|
|
|
|
101
|
|
|
|
|
|
|
#=============================================================================== |
|
102
|
|
|
|
|
|
|
# P E R L D O C |
|
103
|
|
|
|
|
|
|
#=============================================================================== |
|
104
|
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
=head1 NAME |
|
106
|
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
Apache::AuthCookiePAM - An AuthCookie module backed by a PAM . |
|
108
|
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
=head1 VERSION |
|
110
|
|
|
|
|
|
|
|
|
111
|
|
|
|
|
|
|
$Revision: 1.0 $ |
|
112
|
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
114
|
|
|
|
|
|
|
|
|
115
|
|
|
|
|
|
|
# In httpd.conf or .htaccess |
|
116
|
|
|
|
|
|
|
# This PerlSetVar MUST precede the PerlModule line because the |
|
117
|
|
|
|
|
|
|
# key is read in a BEGIN block when the module is loaded. |
|
118
|
|
|
|
|
|
|
PerlSetVar WhatEverPaM_SecretKeyFile /etc/httpd/acme.com.key |
|
119
|
|
|
|
|
|
|
PerlSetVar WhatEverPAM_service login |
|
120
|
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
PerlModule Apache::AuthCookiePAM |
|
122
|
|
|
|
|
|
|
PerlSetVar WhatEverPath / |
|
123
|
|
|
|
|
|
|
PerlSetVar WhatEverLoginScript /login.pl |
|
124
|
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
# Optional, to share tickets between servers. |
|
126
|
|
|
|
|
|
|
PerlSetVar WhatEverDomain .domain.com |
|
127
|
|
|
|
|
|
|
PerlSetVar WhatEverChangePwdScript /changepwd.pl |
|
128
|
|
|
|
|
|
|
|
|
129
|
|
|
|
|
|
|
# These are optional, the module sets sensible defaults. |
|
130
|
|
|
|
|
|
|
PerlSetVar WhatEverPAM_SessionLifetime 00-24-00-00 |
|
131
|
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
# Protected by AuthCookiePAM. |
|
133
|
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
AuthType Apache::AuthCookiePAM |
|
135
|
|
|
|
|
|
|
AuthName WhatEver |
|
136
|
|
|
|
|
|
|
PerlAuthenHandler Apache::AuthCookiePAM->authenticate |
|
137
|
|
|
|
|
|
|
PerlAuthzHandler Apache::AuthCookiePAM->authorize |
|
138
|
|
|
|
|
|
|
require valid-user |
|
139
|
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
|
|
141
|
|
|
|
|
|
|
# Login location. *** DEBUG *** I still think this is screwy |
|
142
|
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
AuthType Apache::AuthCookiePAM |
|
144
|
|
|
|
|
|
|
AuthName WhatEver |
|
145
|
|
|
|
|
|
|
SetHandler perl-script |
|
146
|
|
|
|
|
|
|
PerlHandler Apache::AuthCookiePAM->login |
|
147
|
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
|
|
149
|
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
AuthType Apache::AuthCookiePAM |
|
151
|
|
|
|
|
|
|
AuthName WhatEver |
|
152
|
|
|
|
|
|
|
SetHandler perl-script |
|
153
|
|
|
|
|
|
|
PerlHandler Apache::AuthCookiePAM->changepwd |
|
154
|
|
|
|
|
|
|
|
|
155
|
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
157
|
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
This module is an authentication handler that uses the basic mechanism |
|
159
|
|
|
|
|
|
|
provided by Apache::AuthCookie with PAM (based on DBI) . It is based on |
|
160
|
|
|
|
|
|
|
two tokens being provided, a username and password, which can be any |
|
161
|
|
|
|
|
|
|
strings (there are no illegal characters for either). The username is |
|
162
|
|
|
|
|
|
|
used to set the remote user as if Basic Authentication was used. |
|
163
|
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
On an attempt to access a protected location without a valid cookie being |
|
165
|
|
|
|
|
|
|
provided, the module prints an HTML login form (produced by a CGI or any |
|
166
|
|
|
|
|
|
|
other handler; this can be a static file if you want to always send people |
|
167
|
|
|
|
|
|
|
to the same entry page when they log in). This login form has fields for |
|
168
|
|
|
|
|
|
|
username and password. On submitting it, the username and password are verfied |
|
169
|
|
|
|
|
|
|
using PAM. If this succeeds, the user is issued a ticket. This ticket contains |
|
170
|
|
|
|
|
|
|
the username, an issue time, an expire time, and an MD5 checksum of those and a |
|
171
|
|
|
|
|
|
|
secret key for the server. It can optionally be encrypted before returning it |
|
172
|
|
|
|
|
|
|
to the client in the cookie; |
|
173
|
|
|
|
|
|
|
encryption is only useful for preventing the client from seeing the expire |
|
174
|
|
|
|
|
|
|
time. If you wish to protect passwords in transport, use an SSL-encrypted |
|
175
|
|
|
|
|
|
|
connection. The ticket is given in a cookie that the browser stores. |
|
176
|
|
|
|
|
|
|
|
|
177
|
|
|
|
|
|
|
After a login the user is redirected to the location they originally wished |
|
178
|
|
|
|
|
|
|
to view (or to a fixed page if the login "script" was really a static file). |
|
179
|
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
On this access and any subsequent attempt to access a protected document, the |
|
181
|
|
|
|
|
|
|
browser returns the ticket to the server. The server unencrypts it if |
|
182
|
|
|
|
|
|
|
encrypted tickets are enabled, then extracts the username, issue time, expire |
|
183
|
|
|
|
|
|
|
time and checksum. A new checksum is calculated of the username, issue time, |
|
184
|
|
|
|
|
|
|
expire time and the secret key again; if it agrees with the checksum that |
|
185
|
|
|
|
|
|
|
the client supplied, we know that the data has not been tampered with. We |
|
186
|
|
|
|
|
|
|
next check that the expire time has not passed. If not, the ticket is still |
|
187
|
|
|
|
|
|
|
good, so we set the username. |
|
188
|
|
|
|
|
|
|
|
|
189
|
|
|
|
|
|
|
Authorization checks then check that any "require valid-user" . If checks pass, |
|
190
|
|
|
|
|
|
|
the document requested is displayed. |
|
191
|
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
If a ticket has expired or is otherwise invalid it is cleared in the browser |
|
193
|
|
|
|
|
|
|
and the login form is shown again. |
|
194
|
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
=cut |
|
196
|
|
|
|
|
|
|
|
|
197
|
|
|
|
|
|
|
#=============================================================================== |
|
198
|
|
|
|
|
|
|
# P R I V A T E F U N C T I O N S |
|
199
|
|
|
|
|
|
|
#=============================================================================== |
|
200
|
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
202
|
|
|
|
|
|
|
# _log_not_set -- Log that a particular authentication variable was not set. |
|
203
|
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
sub _log_not_set($$) |
|
205
|
|
|
|
|
|
|
{ |
|
206
|
|
|
|
|
|
|
my( $r, $variable ) = @_; |
|
207
|
|
|
|
|
|
|
my $auth_name; $auth_name = $r->auth_name; |
|
208
|
|
|
|
|
|
|
$r->log_error( "Apache::AuthCookiePAM: $variable not set for auth realm |
|
209
|
|
|
|
|
|
|
$auth_name", $r->uri ); |
|
210
|
|
|
|
|
|
|
} |
|
211
|
|
|
|
|
|
|
|
|
212
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
213
|
|
|
|
|
|
|
# _dir_config_var -- Get a particular authentication variable. |
|
214
|
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
sub _dir_config_var($$) |
|
216
|
|
|
|
|
|
|
{ |
|
217
|
|
|
|
|
|
|
my( $r, $variable ) = @_; |
|
218
|
|
|
|
|
|
|
my $auth_name; $auth_name = $r->auth_name; |
|
219
|
|
|
|
|
|
|
return $r->dir_config( "$auth_name$variable" ); |
|
220
|
|
|
|
|
|
|
} |
|
221
|
|
|
|
|
|
|
|
|
222
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
223
|
|
|
|
|
|
|
# _config_vars -- Gets the config variables from the dir_config and logs |
|
224
|
|
|
|
|
|
|
# errors if required fields were not set, returns undef if any of the fields |
|
225
|
|
|
|
|
|
|
# had errors or a hash of the values if they were all OK. Takes a request |
|
226
|
|
|
|
|
|
|
# object. |
|
227
|
|
|
|
|
|
|
|
|
228
|
|
|
|
|
|
|
sub _config_vars($) |
|
229
|
|
|
|
|
|
|
{ |
|
230
|
|
|
|
|
|
|
my( $r ) = @_; |
|
231
|
|
|
|
|
|
|
|
|
232
|
|
|
|
|
|
|
my %c; # config variables hash |
|
233
|
|
|
|
|
|
|
|
|
234
|
|
|
|
|
|
|
=head1 APACHE CONFIGURATION DIRECTIVES |
|
235
|
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
All configuration directives for this module are passed in PerlSetVars. These |
|
237
|
|
|
|
|
|
|
PerlSetVars must begin with the AuthName that you are describing, so if your |
|
238
|
|
|
|
|
|
|
AuthName is PrivateBankingSystem they will look like: |
|
239
|
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
PerlSetVar ProvateBankingSystemLoginScript /bvsm/login.pl |
|
241
|
|
|
|
|
|
|
|
|
242
|
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
See also L for the directives required for any kind |
|
244
|
|
|
|
|
|
|
of Apache::AuthCookie-based authentication system. |
|
245
|
|
|
|
|
|
|
|
|
246
|
|
|
|
|
|
|
In the following descriptions, replace "WhatEver" with your particular |
|
247
|
|
|
|
|
|
|
AuthName. The available configuration directives are as follows: |
|
248
|
|
|
|
|
|
|
|
|
249
|
|
|
|
|
|
|
=over 4 |
|
250
|
|
|
|
|
|
|
|
|
251
|
|
|
|
|
|
|
=item C |
|
252
|
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
The file that contains the secret key (on the first line of the file). This |
|
254
|
|
|
|
|
|
|
is required and has no default value. This key should be owned and only |
|
255
|
|
|
|
|
|
|
readable by root. It is read at server startup time. The key should be long |
|
256
|
|
|
|
|
|
|
and fairly random. If you want, you can change it and restart the server, |
|
257
|
|
|
|
|
|
|
(maybe daily), which will invalidate all prior-issued tickets. |
|
258
|
|
|
|
|
|
|
|
|
259
|
|
|
|
|
|
|
This directive MUST be set before the PerlModule line that loads this module, |
|
260
|
|
|
|
|
|
|
because the secret key file is read immediately (at server start time). This |
|
261
|
|
|
|
|
|
|
is so you can have it owned and only readable by root even though Apache |
|
262
|
|
|
|
|
|
|
then changes to another user. |
|
263
|
|
|
|
|
|
|
|
|
264
|
|
|
|
|
|
|
=cut |
|
265
|
|
|
|
|
|
|
|
|
266
|
|
|
|
|
|
|
unless ( |
|
267
|
|
|
|
|
|
|
$c{ PAM_secretkeyfile } = _dir_config_var $r, 'PAM_SecretKeyFile' |
|
268
|
|
|
|
|
|
|
) { |
|
269
|
|
|
|
|
|
|
_log_not_set $r, 'PAM_SecretKeyFile'; |
|
270
|
|
|
|
|
|
|
return undef; |
|
271
|
|
|
|
|
|
|
} |
|
272
|
|
|
|
|
|
|
|
|
273
|
|
|
|
|
|
|
=item C |
|
274
|
|
|
|
|
|
|
|
|
275
|
|
|
|
|
|
|
How long tickets are good for after being issued. Note that presently |
|
276
|
|
|
|
|
|
|
Apache::AuthCookie does not set a client-side expire time, which means that |
|
277
|
|
|
|
|
|
|
most clients will only keep the cookie until the user quits the browser. |
|
278
|
|
|
|
|
|
|
However, if you wish to force people to log in again sooner than that, set |
|
279
|
|
|
|
|
|
|
this value. This can be 'forever' or a life time specified as: |
|
280
|
|
|
|
|
|
|
|
|
281
|
|
|
|
|
|
|
DD-hh-mm-ss -- Days, hours, minute and seconds to live. |
|
282
|
|
|
|
|
|
|
|
|
283
|
|
|
|
|
|
|
This is not required and defaults to '00-24-00-00' or 24 hours. |
|
284
|
|
|
|
|
|
|
|
|
285
|
|
|
|
|
|
|
=cut |
|
286
|
|
|
|
|
|
|
|
|
287
|
|
|
|
|
|
|
$c{ PAM_sessionlifetime } |
|
288
|
|
|
|
|
|
|
= _dir_config_var( $r, 'PAM_SessionLifetime' ) || '00-24-00-00'; |
|
289
|
|
|
|
|
|
|
|
|
290
|
|
|
|
|
|
|
=item C |
|
291
|
|
|
|
|
|
|
|
|
292
|
|
|
|
|
|
|
What kind of encryption to use to prevent the user from looking at the fields |
|
293
|
|
|
|
|
|
|
in the ticket we give them. This is almost completely useless, so don't |
|
294
|
|
|
|
|
|
|
switch it on unless you really know you need it. It does not provide any |
|
295
|
|
|
|
|
|
|
protection of the password in transport; use SSL for that. It can be 'none', |
|
296
|
|
|
|
|
|
|
'des', 'idea', 'blowfish', or 'blowfish_pp'. |
|
297
|
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
This is not required and defaults to 'none'. |
|
299
|
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
=cut |
|
301
|
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
$c{ PAM_encryptiontype } = _dir_config_var( $r, 'PAM_EncryptionType' ) |
|
303
|
|
|
|
|
|
|
|| 'none'; |
|
304
|
|
|
|
|
|
|
# If we used encryption we need to pull in Crypt::CBC. |
|
305
|
|
|
|
|
|
|
if ( $c{ PAM_encryptiontype } ne 'none' ) { |
|
306
|
|
|
|
|
|
|
require Crypt::CBC; |
|
307
|
|
|
|
|
|
|
} |
|
308
|
|
|
|
|
|
|
|
|
309
|
|
|
|
|
|
|
=item C |
|
310
|
|
|
|
|
|
|
|
|
311
|
|
|
|
|
|
|
The service that will be using PAM libraries for authentication. |
|
312
|
|
|
|
|
|
|
These will be one of the services configured in /etc/pam.conf or /etc/pam.d/ |
|
313
|
|
|
|
|
|
|
|
|
314
|
|
|
|
|
|
|
This directive defaults to "login" |
|
315
|
|
|
|
|
|
|
|
|
316
|
|
|
|
|
|
|
=cut |
|
317
|
|
|
|
|
|
|
|
|
318
|
|
|
|
|
|
|
$c{ PAM_service } = _dir_config_var ( $r, 'PAM_service' ) || 'login'; |
|
319
|
|
|
|
|
|
|
|
|
320
|
|
|
|
|
|
|
return %c; |
|
321
|
|
|
|
|
|
|
} |
|
322
|
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
324
|
|
|
|
|
|
|
# _now_year_month_day_hour_minute_second -- Return a string with the time in |
|
325
|
|
|
|
|
|
|
# this order separated by dashes. |
|
326
|
|
|
|
|
|
|
|
|
327
|
|
|
|
|
|
|
sub _now_year_month_day_hour_minute_second() |
|
328
|
|
|
|
|
|
|
{ |
|
329
|
|
|
|
|
|
|
return sprintf '%04d-%02d-%02d-%02d-%02d-%02d', Today_and_Now; |
|
330
|
|
|
|
|
|
|
} |
|
331
|
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
333
|
|
|
|
|
|
|
# _percent_encode -- Percent-encode (like URI encoding) any non-alphanumberics |
|
334
|
|
|
|
|
|
|
# in the supplied string. |
|
335
|
|
|
|
|
|
|
|
|
336
|
|
|
|
|
|
|
sub _percent_encode($) |
|
337
|
|
|
|
|
|
|
{ |
|
338
|
|
|
|
|
|
|
my( $str ) = @_; |
|
339
|
|
|
|
|
|
|
$str =~ s/([^\w])/ uc sprintf '%%%02x', ord $1 /eg; |
|
340
|
|
|
|
|
|
|
return $str; |
|
341
|
|
|
|
|
|
|
} |
|
342
|
|
|
|
|
|
|
|
|
343
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
344
|
|
|
|
|
|
|
# _percent_decode -- Percent-decode (like URI decoding) any %XX sequences in |
|
345
|
|
|
|
|
|
|
# the supplied string. |
|
346
|
|
|
|
|
|
|
|
|
347
|
|
|
|
|
|
|
sub _percent_decode($) |
|
348
|
|
|
|
|
|
|
{ |
|
349
|
|
|
|
|
|
|
my( $str ) = @_; |
|
350
|
|
|
|
|
|
|
$str =~ s/%([0-9a-fA-F]{2})/ pack( "c",hex( $1 ) ) /ge; |
|
351
|
|
|
|
|
|
|
return $str; |
|
352
|
|
|
|
|
|
|
} |
|
353
|
|
|
|
|
|
|
|
|
354
|
|
|
|
|
|
|
#=============================================================================== |
|
355
|
|
|
|
|
|
|
# P U B L I C F U N C T I O N S |
|
356
|
|
|
|
|
|
|
#=============================================================================== |
|
357
|
|
|
|
|
|
|
|
|
358
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
359
|
|
|
|
|
|
|
# Take the credentials for a user and check that they match; if so, return |
|
360
|
|
|
|
|
|
|
# a new session key for this user that can be stored in the cookie. |
|
361
|
|
|
|
|
|
|
# If there is a problem, return a bogus session key. |
|
362
|
|
|
|
|
|
|
|
|
363
|
|
|
|
|
|
|
sub authen_cred($$\@) |
|
364
|
|
|
|
|
|
|
{ |
|
365
|
|
|
|
|
|
|
my( $self, $r, @credentials ) ; |
|
366
|
|
|
|
|
|
|
( $self, $r, @credentials ) = @_; |
|
367
|
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
my $auth_name; $auth_name = $r->auth_name; |
|
369
|
|
|
|
|
|
|
my %c ; %c = _config_vars $r; |
|
370
|
|
|
|
|
|
|
|
|
371
|
|
|
|
|
|
|
# Username goes in credential_0 |
|
372
|
|
|
|
|
|
|
my $user; $user = $credentials[ 0 ]; |
|
373
|
|
|
|
|
|
|
$user=~ tr/A-Z/a-z/; |
|
374
|
|
|
|
|
|
|
unless ( $user =~ /^.+$/ ) { |
|
375
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: no username supplied for auth realm $auth_name", $r->uri ); |
|
376
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'No username provided. Try again.'); |
|
377
|
|
|
|
|
|
|
return undef; |
|
378
|
|
|
|
|
|
|
} |
|
379
|
|
|
|
|
|
|
# Password goes in credential_1 |
|
380
|
|
|
|
|
|
|
my $password; $password = $credentials[ 1 ]; |
|
381
|
|
|
|
|
|
|
unless ( $password =~ /^.+$/ ) { |
|
382
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: no password supplied for auth realm $auth_name", $r->uri ); |
|
383
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'No password provided. Try again.'); |
|
384
|
|
|
|
|
|
|
return undef; |
|
385
|
|
|
|
|
|
|
} |
|
386
|
|
|
|
|
|
|
# service to be used for authentication |
|
387
|
|
|
|
|
|
|
my $service; $service = $c{PAM_service}; |
|
388
|
|
|
|
|
|
|
my ($pamh,$res,$funcref); |
|
389
|
|
|
|
|
|
|
$funcref=create_conv_func($r,$user,$password); |
|
390
|
|
|
|
|
|
|
|
|
391
|
|
|
|
|
|
|
ref($pamh = new Authen::PAM($service, $user,$funcref)) || die "Error code $pamh during PAM init!"; |
|
392
|
|
|
|
|
|
|
# call auth module to authenticate user |
|
393
|
|
|
|
|
|
|
$res = $pamh->pam_authenticate; |
|
394
|
|
|
|
|
|
|
$funcref=0; |
|
395
|
|
|
|
|
|
|
if ( $res != PAM_SUCCESS()) { |
|
396
|
|
|
|
|
|
|
$r->log_error("ERROR: Authentication for $user Failed\n"); |
|
397
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'Authentication failed. Username/Password provided incorrect.'); |
|
398
|
|
|
|
|
|
|
$pamh=0; |
|
399
|
|
|
|
|
|
|
undef $pamh; |
|
400
|
|
|
|
|
|
|
return undef; |
|
401
|
|
|
|
|
|
|
} |
|
402
|
|
|
|
|
|
|
else { # Now check if account is valid |
|
403
|
|
|
|
|
|
|
$res = $pamh->pam_acct_mgmt(); |
|
404
|
|
|
|
|
|
|
if ( $res == PAM_ACCT_EXPIRED() ) { |
|
405
|
|
|
|
|
|
|
$r->log_error("ERROR: Account for $user is locked. Contact your Administrator.\n"); |
|
406
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'Account for $user is locked. Contact your Administrator.'); |
|
407
|
|
|
|
|
|
|
return 'bad'; |
|
408
|
|
|
|
|
|
|
} |
|
409
|
|
|
|
|
|
|
if ( $res == PAM_NEW_AUTHTOK_REQD() ) { |
|
410
|
|
|
|
|
|
|
$r->log_error("ERROR: PAssword for $user expired. Change Password\n"); |
|
411
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'Password Expired. Please Change your password.'); |
|
412
|
|
|
|
|
|
|
return $r->auth_type->changepwd_form ($user); |
|
413
|
|
|
|
|
|
|
} |
|
414
|
|
|
|
|
|
|
if ( $res == PAM_SUCCESS() ) { |
|
415
|
|
|
|
|
|
|
# Create the expire time for the ticket. |
|
416
|
|
|
|
|
|
|
my $expire_time; |
|
417
|
|
|
|
|
|
|
# expire time in a zillion years if it's forever. |
|
418
|
|
|
|
|
|
|
if ( lc $c{ PAM_sessionlifetime } eq 'forever' ) { |
|
419
|
|
|
|
|
|
|
$expire_time = '9999-01-01-01-01-01'; |
|
420
|
|
|
|
|
|
|
} else { |
|
421
|
|
|
|
|
|
|
my( $deltaday, $deltahour, $deltaminute, $deltasecond ) = split /-/, $c{ PAM_sessionlifetime }; |
|
422
|
|
|
|
|
|
|
# Figure out the expire time. |
|
423
|
|
|
|
|
|
|
$expire_time = sprintf( '%04d-%02d-%02d-%02d-%02d-%02d', |
|
424
|
|
|
|
|
|
|
Add_Delta_DHMS( Today_and_Now, |
|
425
|
|
|
|
|
|
|
$deltaday, $deltahour, |
|
426
|
|
|
|
|
|
|
$deltaminute, $deltasecond )); |
|
427
|
|
|
|
|
|
|
} |
|
428
|
|
|
|
|
|
|
|
|
429
|
|
|
|
|
|
|
# Now we need to %-encode non-alphanumberics in the username so we |
|
430
|
|
|
|
|
|
|
# can stick it in the cookie safely. *** DEBUG *** check this |
|
431
|
|
|
|
|
|
|
my $enc_user; $enc_user = _percent_encode $user; |
|
432
|
|
|
|
|
|
|
|
|
433
|
|
|
|
|
|
|
# OK, now we stick the username and the current time and the expire |
|
434
|
|
|
|
|
|
|
# time together to make the public part of the session key: |
|
435
|
|
|
|
|
|
|
my $current_time; $current_time = _now_year_month_day_hour_minute_second; |
|
436
|
|
|
|
|
|
|
my $public_part; $public_part = "$enc_user:$current_time:$expire_time"; |
|
437
|
|
|
|
|
|
|
|
|
438
|
|
|
|
|
|
|
# Now we calculate the hash of this and the secret key and then |
|
439
|
|
|
|
|
|
|
# calculate the hash of *that* and the secret key again. |
|
440
|
|
|
|
|
|
|
my $secret_key; $secret_key = $SECRET_KEYS{ $auth_name }; |
|
441
|
|
|
|
|
|
|
unless ( defined $secret_key ) { |
|
442
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: didn't have the secret key for auth realm $auth_name", $r->uri ); |
|
443
|
|
|
|
|
|
|
return 'bad'; |
|
444
|
|
|
|
|
|
|
} |
|
445
|
|
|
|
|
|
|
my $hash ; $hash = md5_hex( join ':', $secret_key, md5_hex( |
|
446
|
|
|
|
|
|
|
join ':', $public_part, $secret_key |
|
447
|
|
|
|
|
|
|
) ); |
|
448
|
|
|
|
|
|
|
|
|
449
|
|
|
|
|
|
|
# Now we add this hash to the end of the public part. |
|
450
|
|
|
|
|
|
|
my $session_key; $session_key = "$public_part:$hash"; |
|
451
|
|
|
|
|
|
|
|
|
452
|
|
|
|
|
|
|
# Now we encrypt this and return it. |
|
453
|
|
|
|
|
|
|
my $encrypted_session_key; |
|
454
|
|
|
|
|
|
|
if ( $c{ PAM_encryptiontype } eq 'none' ) { |
|
455
|
|
|
|
|
|
|
$encrypted_session_key = $session_key; |
|
456
|
|
|
|
|
|
|
} elsif ( lc $c{ PAM_encryptiontype } eq 'des' ) { |
|
457
|
|
|
|
|
|
|
$CIPHERS{ "des:$auth_name" } |
|
458
|
|
|
|
|
|
|
||= Crypt::CBC->new( $secret_key, 'DES' ); |
|
459
|
|
|
|
|
|
|
$encrypted_session_key = $CIPHERS{ |
|
460
|
|
|
|
|
|
|
"des:$auth_name" |
|
461
|
|
|
|
|
|
|
}->encrypt_hex( $session_key ); |
|
462
|
|
|
|
|
|
|
} elsif ( lc $c{ PAM_encryptiontype } eq 'idea' ) { |
|
463
|
|
|
|
|
|
|
$CIPHERS{ "idea:$auth_name" } |
|
464
|
|
|
|
|
|
|
||= Crypt::CBC->new( $secret_key, 'IDEA' ); |
|
465
|
|
|
|
|
|
|
$encrypted_session_key = $CIPHERS{ |
|
466
|
|
|
|
|
|
|
"idea:$auth_name" |
|
467
|
|
|
|
|
|
|
}->encrypt_hex( $session_key ); |
|
468
|
|
|
|
|
|
|
} elsif ( lc $c{ PAM_encryptiontype } eq 'blowfish' ) { |
|
469
|
|
|
|
|
|
|
$CIPHERS{ "blowfish:$auth_name" } |
|
470
|
|
|
|
|
|
|
||= Crypt::CBC->new( $secret_key, 'Blowfish' ); |
|
471
|
|
|
|
|
|
|
$encrypted_session_key = $CIPHERS{ |
|
472
|
|
|
|
|
|
|
"blowfish:$auth_name" |
|
473
|
|
|
|
|
|
|
}->encrypt_hex( $session_key ); |
|
474
|
|
|
|
|
|
|
} |
|
475
|
|
|
|
|
|
|
$pamh=0; |
|
476
|
|
|
|
|
|
|
undef $pamh; |
|
477
|
|
|
|
|
|
|
return $encrypted_session_key; |
|
478
|
|
|
|
|
|
|
} |
|
479
|
|
|
|
|
|
|
} |
|
480
|
|
|
|
|
|
|
} |
|
481
|
|
|
|
|
|
|
|
|
482
|
|
|
|
|
|
|
|
|
483
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
484
|
|
|
|
|
|
|
# Conversation function for PAM - authentication and change of password |
|
485
|
|
|
|
|
|
|
sub create_conv_func |
|
486
|
|
|
|
|
|
|
{ |
|
487
|
|
|
|
|
|
|
my ($r,$user,$pass,$newpass,$confpass); |
|
488
|
|
|
|
|
|
|
($r,$user,$pass,$newpass,$confpass) = @_; |
|
489
|
|
|
|
|
|
|
|
|
490
|
|
|
|
|
|
|
my $state; $state = 0; |
|
491
|
|
|
|
|
|
|
|
|
492
|
|
|
|
|
|
|
return sub { |
|
493
|
|
|
|
|
|
|
my (@res); |
|
494
|
|
|
|
|
|
|
while ( @_ ) |
|
495
|
|
|
|
|
|
|
{ |
|
496
|
|
|
|
|
|
|
my ($code, $msg, $ans); |
|
497
|
|
|
|
|
|
|
$code = shift; |
|
498
|
|
|
|
|
|
|
$msg = shift ; |
|
499
|
|
|
|
|
|
|
$ans = ""; |
|
500
|
|
|
|
|
|
|
|
|
501
|
|
|
|
|
|
|
$ans = $user if ($code == PAM_PROMPT_ECHO_ON() ); |
|
502
|
|
|
|
|
|
|
if ($code == PAM_PROMPT_ECHO_OFF() ) { |
|
503
|
|
|
|
|
|
|
if ($state == 0) { |
|
504
|
|
|
|
|
|
|
$ans = $pass ; |
|
505
|
|
|
|
|
|
|
} |
|
506
|
|
|
|
|
|
|
if ($state == 1) { |
|
507
|
|
|
|
|
|
|
$ans = $newpass ; |
|
508
|
|
|
|
|
|
|
} |
|
509
|
|
|
|
|
|
|
if ($state == 2) { |
|
510
|
|
|
|
|
|
|
$ans = $confpass ; |
|
511
|
|
|
|
|
|
|
} |
|
512
|
|
|
|
|
|
|
$r->log_error("VA: $msg $user $pass $newpass $confpass $state=$ans"); |
|
513
|
|
|
|
|
|
|
$state++; |
|
514
|
|
|
|
|
|
|
} |
|
515
|
|
|
|
|
|
|
push @res, (PAM_SUCCESS(),$ans); |
|
516
|
|
|
|
|
|
|
} |
|
517
|
|
|
|
|
|
|
push @res, PAM_SUCCESS(); |
|
518
|
|
|
|
|
|
|
return @res; |
|
519
|
|
|
|
|
|
|
}; |
|
520
|
|
|
|
|
|
|
} |
|
521
|
|
|
|
|
|
|
|
|
522
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
523
|
|
|
|
|
|
|
# Take a session key and check that it is still valid; if so, return the user. |
|
524
|
|
|
|
|
|
|
|
|
525
|
|
|
|
|
|
|
sub authen_ses_key($$$) |
|
526
|
|
|
|
|
|
|
{ |
|
527
|
|
|
|
|
|
|
my( $self, $r, $encrypted_session_key ) = @_; |
|
528
|
|
|
|
|
|
|
|
|
529
|
|
|
|
|
|
|
my $auth_name ; $auth_name = $r->auth_name; |
|
530
|
|
|
|
|
|
|
|
|
531
|
|
|
|
|
|
|
# Get the configuration information. |
|
532
|
|
|
|
|
|
|
my %c; %c = _config_vars $r; |
|
533
|
|
|
|
|
|
|
|
|
534
|
|
|
|
|
|
|
# Get the secret key. |
|
535
|
|
|
|
|
|
|
my $secret_key; $secret_key = $SECRET_KEYS{ $auth_name }; |
|
536
|
|
|
|
|
|
|
unless ( defined $secret_key ) { |
|
537
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: didn't the secret key from for auth realm $auth_name", $r->uri ); |
|
538
|
|
|
|
|
|
|
return undef; |
|
539
|
|
|
|
|
|
|
} |
|
540
|
|
|
|
|
|
|
|
|
541
|
|
|
|
|
|
|
# Decrypt the session key. |
|
542
|
|
|
|
|
|
|
my $session_key; |
|
543
|
|
|
|
|
|
|
if ( $c{ PAM_encryptiontype } eq 'none' ) { |
|
544
|
|
|
|
|
|
|
$session_key = $encrypted_session_key; |
|
545
|
|
|
|
|
|
|
} else { |
|
546
|
|
|
|
|
|
|
# Check that this looks like an encrypted hex-encoded string. |
|
547
|
|
|
|
|
|
|
unless ( $encrypted_session_key =~ /^[0-9a-fA-F]+$/ ) { |
|
548
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: encrypted session key $encrypted_session_key doesn't look like it's properly hex-encoded for auth realm $auth_name", $r->uri ); |
|
549
|
|
|
|
|
|
|
return undef; |
|
550
|
|
|
|
|
|
|
} |
|
551
|
|
|
|
|
|
|
|
|
552
|
|
|
|
|
|
|
# Get the cipher from the cache, or create a new one if the |
|
553
|
|
|
|
|
|
|
# cached cipher hasn't been created, & decrypt the session key. |
|
554
|
|
|
|
|
|
|
my $cipher; |
|
555
|
|
|
|
|
|
|
if ( lc $c{ PAM_encryptiontype } eq 'des' ) { |
|
556
|
|
|
|
|
|
|
$cipher = $CIPHERS{ "des:$auth_name" } |
|
557
|
|
|
|
|
|
|
||= Crypt::CBC->new( $secret_key, 'DES' ); |
|
558
|
|
|
|
|
|
|
} elsif ( lc $c{ PAM_encryptiontype } eq 'idea' ) { |
|
559
|
|
|
|
|
|
|
$cipher = $CIPHERS{ "idea:$auth_name" } |
|
560
|
|
|
|
|
|
|
||= Crypt::CBC->new( $secret_key, 'IDEA' ); |
|
561
|
|
|
|
|
|
|
} elsif ( lc $c{ PAM_encryptiontype } eq 'blowfish' ) { |
|
562
|
|
|
|
|
|
|
$cipher = $CIPHERS{ "blowfish:$auth_name" } |
|
563
|
|
|
|
|
|
|
||= Crypt::CBC->new( $secret_key, 'Blowfish' ); |
|
564
|
|
|
|
|
|
|
} elsif ( lc $c{ PAM_encryptiontype } eq 'blowfish_pp' ) { |
|
565
|
|
|
|
|
|
|
$cipher = $CIPHERS{ "blowfish_pp:$auth_name" } |
|
566
|
|
|
|
|
|
|
||= Crypt::CBC->new( $secret_key, 'Blowfish_PP' ); |
|
567
|
|
|
|
|
|
|
} else { |
|
568
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: unknown encryption type $c{ PAM_encryptiontype } for auth realm $auth_name", $r->uri ); |
|
569
|
|
|
|
|
|
|
return undef; |
|
570
|
|
|
|
|
|
|
} |
|
571
|
|
|
|
|
|
|
$session_key = $cipher->decrypt_hex( $encrypted_session_key ); |
|
572
|
|
|
|
|
|
|
} |
|
573
|
|
|
|
|
|
|
|
|
574
|
|
|
|
|
|
|
# Break up the session key. |
|
575
|
|
|
|
|
|
|
my( $enc_user, $issue_time, $expire_time, $supplied_hash ) |
|
576
|
|
|
|
|
|
|
= split /:/, $session_key; |
|
577
|
|
|
|
|
|
|
# Let's check that we got passed sensible values in the cookie. |
|
578
|
|
|
|
|
|
|
unless ( $enc_user =~ /^[a-zA-Z0-9_\%]+$/ ) { |
|
579
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: bad percent-encoded user $enc_user recovered from session ticket for auth_realm $auth_name", $r->uri ); |
|
580
|
|
|
|
|
|
|
return undef; |
|
581
|
|
|
|
|
|
|
} |
|
582
|
|
|
|
|
|
|
# decode the user |
|
583
|
|
|
|
|
|
|
my $user; $user = _percent_decode $enc_user; |
|
584
|
|
|
|
|
|
|
unless ( $issue_time =~ /^\d{4}-\d{2}-\d{2}-\d{2}-\d{2}-\d{2}$/ ) { |
|
585
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: bad issue time $issue_time recovered from ticket for user $user for auth_realm $auth_name", $r->uri ); |
|
586
|
|
|
|
|
|
|
return undef; |
|
587
|
|
|
|
|
|
|
} |
|
588
|
|
|
|
|
|
|
unless ( $expire_time =~ /^\d{4}-\d{2}-\d{2}-\d{2}-\d{2}-\d{2}$/ ) { |
|
589
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: bad expire time $expire_time recovered from ticket for user $user for auth_realm $auth_name", $r->uri ); |
|
590
|
|
|
|
|
|
|
return undef; |
|
591
|
|
|
|
|
|
|
} |
|
592
|
|
|
|
|
|
|
unless ( $supplied_hash =~ /^[0-9a-fA-F]{32}$/ ) { |
|
593
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: bad hash $supplied_hash recovered from ticket for user $user for auth_realm $auth_name", $r->uri ); |
|
594
|
|
|
|
|
|
|
return undef; |
|
595
|
|
|
|
|
|
|
} |
|
596
|
|
|
|
|
|
|
|
|
597
|
|
|
|
|
|
|
# Calculate the hash of the user, issue time, expire_time and |
|
598
|
|
|
|
|
|
|
# the secret key and then the hash of that and the secret key again. |
|
599
|
|
|
|
|
|
|
my $hash; $hash = md5_hex( join ':', $secret_key, md5_hex( |
|
600
|
|
|
|
|
|
|
join ':', $enc_user, $issue_time, $expire_time, $secret_key |
|
601
|
|
|
|
|
|
|
) ); |
|
602
|
|
|
|
|
|
|
|
|
603
|
|
|
|
|
|
|
# Compare it to the hash they gave us. |
|
604
|
|
|
|
|
|
|
unless ( $hash eq $supplied_hash ) { |
|
605
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: hash in cookie did not match calculated hash of contents for user $user for auth realm $auth_name", $r->uri ); |
|
606
|
|
|
|
|
|
|
return undef; |
|
607
|
|
|
|
|
|
|
} |
|
608
|
|
|
|
|
|
|
|
|
609
|
|
|
|
|
|
|
# Check that their session hasn't timed out. |
|
610
|
|
|
|
|
|
|
if ( _now_year_month_day_hour_minute_second gt $expire_time ) { |
|
611
|
|
|
|
|
|
|
$r->log_reason( "Apache:AuthCookiePAM: expire time $expire_time has passed for user $user for auth realm $auth_name", $r->uri ); |
|
612
|
|
|
|
|
|
|
return undef; |
|
613
|
|
|
|
|
|
|
} |
|
614
|
|
|
|
|
|
|
|
|
615
|
|
|
|
|
|
|
# If we're being paranoid about timing-out long-lived sessions, |
|
616
|
|
|
|
|
|
|
# check that the issue time + the current (server-set) session lifetime |
|
617
|
|
|
|
|
|
|
# hasn't passed too (in case we issued long-lived session tickets |
|
618
|
|
|
|
|
|
|
# in the past that we want to get rid of). *** DEBUG *** |
|
619
|
|
|
|
|
|
|
# if ( lc $c{ PAM_AlwaysUseCurrentSessionLifetime } eq 'on' ) |
|
620
|
|
|
|
|
|
|
|
|
621
|
|
|
|
|
|
|
# They must be okay, so return the user. |
|
622
|
|
|
|
|
|
|
return $user; |
|
623
|
|
|
|
|
|
|
} |
|
624
|
|
|
|
|
|
|
|
|
625
|
|
|
|
|
|
|
|
|
626
|
|
|
|
|
|
|
sub changepwd_form |
|
627
|
|
|
|
|
|
|
{ |
|
628
|
|
|
|
|
|
|
my $self; $self = shift; |
|
629
|
|
|
|
|
|
|
my $user; $user = shift; |
|
630
|
|
|
|
|
|
|
|
|
631
|
|
|
|
|
|
|
my $r; $r = Apache->request or die "no request"; |
|
632
|
|
|
|
|
|
|
$r->log_error(" $self "); |
|
633
|
|
|
|
|
|
|
$r->subprocess_env("AuthenChangePwdUser","$user"); |
|
634
|
|
|
|
|
|
|
my $auth_name; $auth_name = $r->auth_name; |
|
635
|
|
|
|
|
|
|
|
|
636
|
|
|
|
|
|
|
my %args; %args = $r->method eq 'POST' ? $r->content : $r->args; |
|
637
|
|
|
|
|
|
|
|
|
638
|
|
|
|
|
|
|
$self->_convert_to_get($r, \%args) if $r->method eq 'POST'; |
|
639
|
|
|
|
|
|
|
|
|
640
|
|
|
|
|
|
|
# There should be a PerlSetVar directive that gives us the URI of |
|
641
|
|
|
|
|
|
|
# the script to execute for the login form. |
|
642
|
|
|
|
|
|
|
|
|
643
|
|
|
|
|
|
|
my $script; |
|
644
|
|
|
|
|
|
|
unless ($script = $r->dir_config($auth_name . "ChangePwdScript")) { |
|
645
|
|
|
|
|
|
|
$r->log_reason("PerlSetVar '${auth_name}ChangePwdScript' not set", $r->uri); |
|
646
|
|
|
|
|
|
|
return SERVER_ERROR; |
|
647
|
|
|
|
|
|
|
} |
|
648
|
|
|
|
|
|
|
$r->log_error("Redirecting to $script"); |
|
649
|
|
|
|
|
|
|
$r->custom_response(REDIRECT, $script); |
|
650
|
|
|
|
|
|
|
|
|
651
|
|
|
|
|
|
|
return REDIRECT; |
|
652
|
|
|
|
|
|
|
} |
|
653
|
|
|
|
|
|
|
|
|
654
|
|
|
|
|
|
|
sub _convert_to_get |
|
655
|
|
|
|
|
|
|
{ |
|
656
|
|
|
|
|
|
|
my ($self, $r, $args) ; |
|
657
|
|
|
|
|
|
|
($self, $r, $args) = @_; |
|
658
|
|
|
|
|
|
|
|
|
659
|
|
|
|
|
|
|
return unless $r->method eq 'POST'; |
|
660
|
|
|
|
|
|
|
|
|
661
|
|
|
|
|
|
|
my $debug ; $debug = $r->dir_config("AuthCookieDebug") || 0; |
|
662
|
|
|
|
|
|
|
|
|
663
|
|
|
|
|
|
|
$r->log_error("Converting POST -> GET") if $debug >= 2; |
|
664
|
|
|
|
|
|
|
|
|
665
|
|
|
|
|
|
|
my @pairs ; @pairs =(); |
|
666
|
|
|
|
|
|
|
my ($name, $value); |
|
667
|
|
|
|
|
|
|
|
|
668
|
|
|
|
|
|
|
while ( ($name, $value) = each %$args) { |
|
669
|
|
|
|
|
|
|
# we dont want to copy login data, only extra data |
|
670
|
|
|
|
|
|
|
next if $name eq 'destination' |
|
671
|
|
|
|
|
|
|
or $name =~ /^credential_\d+$/; |
|
672
|
|
|
|
|
|
|
|
|
673
|
|
|
|
|
|
|
$value = '' unless defined $value; |
|
674
|
|
|
|
|
|
|
push @pairs, escape_uri($name) . '=' . escape_uri($value); |
|
675
|
|
|
|
|
|
|
} |
|
676
|
|
|
|
|
|
|
$r->args(join '&', @pairs) if scalar(@pairs) > 0; |
|
677
|
|
|
|
|
|
|
|
|
678
|
|
|
|
|
|
|
$r->method('GET'); |
|
679
|
|
|
|
|
|
|
$r->method_number(M_GET); |
|
680
|
|
|
|
|
|
|
$r->headers_in->unset('Content-Length'); |
|
681
|
|
|
|
|
|
|
} |
|
682
|
|
|
|
|
|
|
|
|
683
|
|
|
|
|
|
|
sub changepwd ($$) |
|
684
|
|
|
|
|
|
|
{ |
|
685
|
|
|
|
|
|
|
my ($self, $r) ; |
|
686
|
|
|
|
|
|
|
($self, $r) = @_; |
|
687
|
|
|
|
|
|
|
|
|
688
|
|
|
|
|
|
|
my $debug; $debug = $r->dir_config("AuthCookieDebug") || 0; |
|
689
|
|
|
|
|
|
|
|
|
690
|
|
|
|
|
|
|
my ($auth_type, $auth_name); |
|
691
|
|
|
|
|
|
|
($auth_type, $auth_name) = ($r->auth_type, $r->auth_name); |
|
692
|
|
|
|
|
|
|
|
|
693
|
|
|
|
|
|
|
my %args; %args = $r->method eq 'POST' ? $r->content : $r->args; |
|
694
|
|
|
|
|
|
|
|
|
695
|
|
|
|
|
|
|
$self->_convert_to_get($r, \%args) if $r->method eq 'POST'; |
|
696
|
|
|
|
|
|
|
|
|
697
|
|
|
|
|
|
|
unless (exists $args{'destination'}) { |
|
698
|
|
|
|
|
|
|
$r->log_error("No key 'destination' found in form data"); |
|
699
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'no_cookie'); |
|
700
|
|
|
|
|
|
|
return $auth_type->login_form; |
|
701
|
|
|
|
|
|
|
} |
|
702
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'Password Change requested/required'); |
|
703
|
|
|
|
|
|
|
|
|
704
|
|
|
|
|
|
|
# Get the credentials from the data posted by the client |
|
705
|
|
|
|
|
|
|
my @credentials; |
|
706
|
|
|
|
|
|
|
#user in credential_0 |
|
707
|
|
|
|
|
|
|
my $user; $user = $args{"credential_0"}; |
|
708
|
|
|
|
|
|
|
$user=~ tr/A-Z/a-z/; |
|
709
|
|
|
|
|
|
|
unless ( $user =~ /^.+$/ ) { |
|
710
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: no username supplied for auth realm $auth_name", $r->uri ); |
|
711
|
|
|
|
|
|
|
} |
|
712
|
|
|
|
|
|
|
# Old Password goes in credential_1 |
|
713
|
|
|
|
|
|
|
my $oldpassword; $oldpassword = $args{"credential_1"}; |
|
714
|
|
|
|
|
|
|
unless ( $oldpassword =~ /^.+$/ ) { |
|
715
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: no password supplied ", $r->uri ); |
|
716
|
|
|
|
|
|
|
} |
|
717
|
|
|
|
|
|
|
# New Password goes in credential_2 |
|
718
|
|
|
|
|
|
|
my $newpassword ; $newpassword = $args{"credential_2"}; |
|
719
|
|
|
|
|
|
|
unless ( $newpassword =~ /^.+$/ ) { |
|
720
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: no password supplied ", $r->uri ); |
|
721
|
|
|
|
|
|
|
} |
|
722
|
|
|
|
|
|
|
# Repeat Password goes in credential_3 |
|
723
|
|
|
|
|
|
|
my $confirmpassword; $confirmpassword = $args{"credential_3"}; |
|
724
|
|
|
|
|
|
|
unless ( $confirmpassword =~ /^.+$/ ) { |
|
725
|
|
|
|
|
|
|
$r->log_reason( "Apache::AuthCookiePAM: passwords don't match", $r->uri ); |
|
726
|
|
|
|
|
|
|
} |
|
727
|
|
|
|
|
|
|
|
|
728
|
|
|
|
|
|
|
# Now do password change |
|
729
|
|
|
|
|
|
|
# |
|
730
|
|
|
|
|
|
|
my ($pamh,$res); |
|
731
|
|
|
|
|
|
|
my $funcref; |
|
732
|
|
|
|
|
|
|
$funcref=create_conv_func($r,$user,$oldpassword,$newpassword,$confirmpassword); |
|
733
|
|
|
|
|
|
|
|
|
734
|
|
|
|
|
|
|
my %c; %c = _config_vars $r; |
|
735
|
|
|
|
|
|
|
|
|
736
|
|
|
|
|
|
|
my $service; $service = $c{PAM_service}; |
|
737
|
|
|
|
|
|
|
ref($pamh = new Authen::PAM($service, $user,$funcref)) || die "Error code $pamh during PAM init!"; |
|
738
|
|
|
|
|
|
|
$res = $pamh->pam_chauthtok(); |
|
739
|
|
|
|
|
|
|
$pamh=0; |
|
740
|
|
|
|
|
|
|
undef $pamh; |
|
741
|
|
|
|
|
|
|
|
|
742
|
|
|
|
|
|
|
if ( $res == PAM_SUCCESS()) { |
|
743
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', 'Password Updated. Please login with your new password'); |
|
744
|
|
|
|
|
|
|
$r->log_reason("AuthenCookiePAM:". $args{'destination'}."Password for $user Updated. Please login with your new password"); |
|
745
|
|
|
|
|
|
|
# |
|
746
|
|
|
|
|
|
|
$auth_type->logout($r); |
|
747
|
|
|
|
|
|
|
$r->err_header_out("Location" => $args{'destination'}); |
|
748
|
|
|
|
|
|
|
return REDIRECT; |
|
749
|
|
|
|
|
|
|
} |
|
750
|
|
|
|
|
|
|
else { |
|
751
|
|
|
|
|
|
|
$r->subprocess_env('AuthenReason', "Password Not Updated. New password did not satisfy specified rules or failed authentication"); |
|
752
|
|
|
|
|
|
|
$r->log_reason("AuthenCookiePAM: Password for $user Not Updated. "); |
|
753
|
|
|
|
|
|
|
return $auth_type->changepwd_form($user); |
|
754
|
|
|
|
|
|
|
} |
|
755
|
|
|
|
|
|
|
} |
|
756
|
|
|
|
|
|
|
|
|
757
|
|
|
|
|
|
|
#------------------------------------------------------------------------------- |
|
758
|
|
|
|
|
|
|
# Take a list of groups and make sure that the current remote user is a member |
|
759
|
|
|
|
|
|
|
# of one of them. |
|
760
|
|
|
|
|
|
|
|
|
761
|
|
|
|
|
|
|
__END__ |