Project

General

Profile

Download (56.6 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/*
3
 * auth.inc
4
 *
5
 * part of pfSense (https://www.pfsense.org)
6
 * Copyright (c) 2003-2006 Manuel Kasper <mk@neon1.net>
7
 * Copyright (c) 2005-2006 Bill Marquette <bill.marquette@gmail.com>
8
 * Copyright (c) 2006 Paul Taylor <paultaylor@winn-dixie.com>
9
 * Copyright (c) 2004-2018 Rubicon Communications, LLC (Netgate)
10
 * All rights reserved.
11
 *
12
 * Licensed under the Apache License, Version 2.0 (the "License");
13
 * you may not use this file except in compliance with the License.
14
 * You may obtain a copy of the License at
15
 *
16
 * http://www.apache.org/licenses/LICENSE-2.0
17
 *
18
 * Unless required by applicable law or agreed to in writing, software
19
 * distributed under the License is distributed on an "AS IS" BASIS,
20
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21
 * See the License for the specific language governing permissions and
22
 * limitations under the License.
23
 */
24

    
25
/*
26
 * NOTE : Portions of the mschapv2 support was based on the BSD licensed CHAP.php
27
 * file courtesy of Michael Retterklieber.
28
 */
29
include_once('phpsessionmanager.inc');
30
if (!$do_not_include_config_gui_inc) {
31
	require_once("config.gui.inc");
32
}
33

    
34
// Will be changed to false if security checks fail
35
$security_passed = true;
36

    
37
/* If this function doesn't exist, we're being called from Captive Portal or
38
   another internal subsystem which does not include authgui.inc */
39
if (function_exists("display_error_form")) {
40
	/* Extra layer of lockout protection. Check if the user is in the GUI
41
	 * lockout table before processing a request */
42

    
43
	/* Fetch the contents of the lockout table. */
44
	exec("/sbin/pfctl -t 'webConfiguratorlockout' -T show", $entries);
45

    
46
	/* If the client is in the lockout table, print an error, kill states, and exit */
47
	if (in_array($_SERVER['REMOTE_ADDR'], array_map('trim', $entries))) {
48
		if (!security_checks_disabled()) {
49
			/* They may never see the error since the connection will be cut off, but try to be nice anyhow. */
50
			display_error_form("501", gettext("Access Denied<br/><br/>Access attempt from a temporarily locked out client address.<br /><br />Try accessing the firewall again after the lockout expires."));
51
			/* If they are locked out, they shouldn't have a state. Disconnect their connections. */
52
			$retval = pfSense_kill_states($_SERVER['REMOTE_ADDR']);
53
			if (is_ipaddrv4($_SERVER['REMOTE_ADDR'])) {
54
				$retval = pfSense_kill_states("0.0.0.0/0", $_SERVER['REMOTE_ADDR']);
55
			} elseif (is_ipaddrv6($_SERVER['REMOTE_ADDR'])) {
56
				$retval = pfSense_kill_states("::", $_SERVER['REMOTE_ADDR']);
57
			}
58
			exit;
59
		}
60
		$security_passed = false;
61
	}
62
}
63

    
64
if (function_exists("display_error_form") && !isset($config['system']['webgui']['nodnsrebindcheck'])) {
65
	/* DNS ReBinding attack prevention.  https://redmine.pfsense.org/issues/708 */
66
	$found_host = false;
67

    
68
	/* Either a IPv6 address with or without a alternate port */
69
	if (strstr($_SERVER['HTTP_HOST'], "]")) {
70
		$http_host_port = explode("]", $_SERVER['HTTP_HOST']);
71
		/* v6 address has more parts, drop the last part */
72
		if (count($http_host_port) > 1) {
73
			array_pop($http_host_port);
74
			$http_host = str_replace(array("[", "]"), "", implode(":", $http_host_port));
75
		} else {
76
			$http_host = str_replace(array("[", "]"), "", implode(":", $http_host_port));
77
		}
78
	} else {
79
		$http_host = explode(":", $_SERVER['HTTP_HOST']);
80
		$http_host = $http_host[0];
81
	}
82
	if (is_ipaddr($http_host) or $_SERVER['SERVER_ADDR'] == "127.0.0.1" or
83
		strcasecmp($http_host, "localhost") == 0 or $_SERVER['SERVER_ADDR'] == "::1") {
84
		$found_host = true;
85
	}
86
	if (strcasecmp($http_host, $config['system']['hostname'] . "." . $config['system']['domain']) == 0 or
87
		strcasecmp($http_host, $config['system']['hostname']) == 0) {
88
		$found_host = true;
89
	}
90

    
91
	if (is_array($config['dyndnses']['dyndns']) && !$found_host) {
92
		foreach ($config['dyndnses']['dyndns'] as $dyndns) {
93
			if (strcasecmp($dyndns['host'], $http_host) == 0) {
94
				$found_host = true;
95
				break;
96
			}
97
		}
98
	}
99

    
100
	if (is_array($config['dnsupdates']['dnsupdate']) && !$found_host) {
101
		foreach ($config['dnsupdates']['dnsupdate'] as $rfc2136) {
102
			if (strcasecmp($rfc2136['host'], $http_host) == 0) {
103
				$found_host = true;
104
				break;
105
			}
106
		}
107
	}
108

    
109
	if (!empty($config['system']['webgui']['althostnames']) && !$found_host) {
110
		$althosts = explode(" ", $config['system']['webgui']['althostnames']);
111
		foreach ($althosts as $ah) {
112
			if (strcasecmp($ah, $http_host) == 0 or strcasecmp($ah, $_SERVER['SERVER_ADDR']) == 0) {
113
				$found_host = true;
114
				break;
115
			}
116
		}
117
	}
118

    
119
	if ($found_host == false) {
120
		if (!security_checks_disabled()) {
121
			display_error_form("501", gettext("Potential DNS Rebind attack detected, see http://en.wikipedia.org/wiki/DNS_rebinding<br />Try accessing the router by IP address instead of by hostname."));
122
			exit;
123
		}
124
		$security_passed = false;
125
	}
126
}
127

    
128
// If the HTTP_REFERER is something other than ourselves then disallow.
129
if (function_exists("display_error_form") && !isset($config['system']['webgui']['nohttpreferercheck'])) {
130
	if ($_SERVER['HTTP_REFERER']) {
131
		if (file_exists("{$g['tmp_path']}/setupwizard_lastreferrer")) {
132
			if ($_SERVER['HTTP_REFERER'] == file_get_contents("{$g['tmp_path']}/setupwizard_lastreferrer")) {
133
				unlink("{$g['tmp_path']}/setupwizard_lastreferrer");
134
				header("Refresh: 1; url=index.php");
135
?>
136
<!DOCTYPE html>
137
<html lang="en">
138
<head>
139
	<link rel="stylesheet" href="/css/pfSense.css" />
140
	<title><?=gettext("Redirecting..."); ?></title>
141
</head>
142
<body id="error" class="no-menu">
143
	<div id="jumbotron">
144
		<div class="container">
145
			<div class="col-sm-offset-3 col-sm-6 col-xs-12">
146
				<p><?=gettext("Redirecting to the dashboard...")?></p>
147
			</div>
148
		</div>
149
	</div>
150
</body>
151
</html>
152
<?php
153
				exit;
154
			}
155
		}
156
		$found_host = false;
157
		$referrer_host = parse_url($_SERVER['HTTP_REFERER'], PHP_URL_HOST);
158
		$referrer_host = str_replace(array("[", "]"), "", $referrer_host);
159
		if ($referrer_host) {
160
			if (strcasecmp($referrer_host, $config['system']['hostname'] . "." . $config['system']['domain']) == 0 ||
161
			    strcasecmp($referrer_host, $config['system']['hostname']) == 0) {
162
				$found_host = true;
163
			}
164

    
165
			if (!empty($config['system']['webgui']['althostnames']) && !$found_host) {
166
				$althosts = explode(" ", $config['system']['webgui']['althostnames']);
167
				foreach ($althosts as $ah) {
168
					if (strcasecmp($referrer_host, $ah) == 0) {
169
						$found_host = true;
170
						break;
171
					}
172
				}
173
			}
174

    
175
			if (is_array($config['dyndnses']['dyndns']) && !$found_host) {
176
				foreach ($config['dyndnses']['dyndns'] as $dyndns) {
177
					if (strcasecmp($dyndns['host'], $referrer_host) == 0) {
178
						$found_host = true;
179
						break;
180
					}
181
				}
182
			}
183

    
184
			if (is_array($config['dnsupdates']['dnsupdate']) && !$found_host) {
185
				foreach ($config['dnsupdates']['dnsupdate'] as $rfc2136) {
186
					if (strcasecmp($rfc2136['host'], $referrer_host) == 0) {
187
						$found_host = true;
188
						break;
189
					}
190
				}
191
			}
192

    
193
			if (!$found_host) {
194
				$interface_list_ips = get_configured_ip_addresses();
195
				foreach ($interface_list_ips as $ilips) {
196
					if (strcasecmp($referrer_host, $ilips) == 0) {
197
						$found_host = true;
198
						break;
199
					}
200
				}
201
				$interface_list_ipv6s = get_configured_ipv6_addresses(true);
202
				foreach ($interface_list_ipv6s as $ilipv6s) {
203
					$ilipv6s = explode('%', $ilipv6s)[0];
204
					if (strcasecmp($referrer_host, $ilipv6s) == 0) {
205
						$found_host = true;
206
						break;
207
					}
208
				}
209
				if ($referrer_host == "127.0.0.1" || $referrer_host == "localhost") {
210
					// allow SSH port forwarded connections and links from localhost
211
					$found_host = true;
212
				}
213
			}
214
		}
215
		if ($found_host == false) {
216
			if (!security_checks_disabled()) {
217
				display_error_form("501", "An HTTP_REFERER was detected other than what is defined in System -> Advanced (" . htmlspecialchars($_SERVER['HTTP_REFERER']) . ").  If not needed, this check can be disabled in System -> Advanced -> Admin.");
218
				exit;
219
			}
220
			$security_passed = false;
221
		}
222
	} else {
223
		$security_passed = false;
224
	}
225
}
226

    
227
if (function_exists("display_error_form") && $security_passed) {
228
	/* Security checks passed, so it should be OK to turn them back on */
229
	restore_security_checks();
230
}
231
unset($security_passed);
232

    
233
$groupindex = index_groups();
234
$userindex = index_users();
235

    
236
function index_groups() {
237
	global $g, $debug, $config, $groupindex;
238

    
239
	$groupindex = array();
240

    
241
	if (is_array($config['system']['group'])) {
242
		$i = 0;
243
		foreach ($config['system']['group'] as $groupent) {
244
			$groupindex[$groupent['name']] = $i;
245
			$i++;
246
		}
247
	}
248

    
249
	return ($groupindex);
250
}
251

    
252
function index_users() {
253
	global $g, $debug, $config;
254

    
255
	if (is_array($config['system']['user'])) {
256
		$i = 0;
257
		foreach ($config['system']['user'] as $userent) {
258
			$userindex[$userent['name']] = $i;
259
			$i++;
260
		}
261
	}
262

    
263
	return ($userindex);
264
}
265

    
266
function & getUserEntry($name) {
267
	global $debug, $config, $userindex;
268
	$authcfg = auth_get_authserver($config['system']['webgui']['authmode']);
269

    
270
	if (isset($userindex[$name])) {
271
		return $config['system']['user'][$userindex[$name]];
272
	} elseif ($authcfg['type'] != "Local Database") {
273
		$user = array();
274
		$user['name'] = $name;
275
		return $user;
276
	}
277
}
278

    
279
function & getUserEntryByUID($uid) {
280
	global $debug, $config;
281

    
282
	if (is_array($config['system']['user'])) {
283
		foreach ($config['system']['user'] as & $user) {
284
			if ($user['uid'] == $uid) {
285
				return $user;
286
			}
287
		}
288
	}
289

    
290
	return false;
291
}
292

    
293
function & getGroupEntry($name) {
294
	global $debug, $config, $groupindex;
295
	if (isset($groupindex[$name])) {
296
		return $config['system']['group'][$groupindex[$name]];
297
	}
298
}
299

    
300
function & getGroupEntryByGID($gid) {
301
	global $debug, $config;
302

    
303
	if (is_array($config['system']['group'])) {
304
		foreach ($config['system']['group'] as & $group) {
305
			if ($group['gid'] == $gid) {
306
				return $group;
307
			}
308
		}
309
	}
310

    
311
	return false;
312
}
313

    
314
function get_user_privileges(& $user) {
315
	global $config, $_SESSION;
316

    
317
	$authcfg = auth_get_authserver($config['system']['webgui']['authmode']);
318
	$allowed_groups = array();
319

    
320
	$privs = $user['priv'];
321
	if (!is_array($privs)) {
322
		$privs = array();
323
	}
324

    
325
	// cache auth results for a short time to ease load on auth services & logs
326
	if (isset($config['system']['webgui']['auth_refresh_time'])) {
327
		$recheck_time = $config['system']['webgui']['auth_refresh_time'];
328
	} else {
329
		$recheck_time = 30;
330
	}
331

    
332
	if ($authcfg['type'] == "ldap") {
333
		if (isset($_SESSION["ldap_allowed_groups"]) &&
334
		    (time() <= $_SESSION["auth_check_time"] + $recheck_time)) {
335
			$allowed_groups = $_SESSION["ldap_allowed_groups"];
336
		} else {
337
			$allowed_groups = @ldap_get_groups($user['name'], $authcfg);
338
			$_SESSION["ldap_allowed_groups"] = $allowed_groups;
339
			$_SESSION["auth_check_time"] = time();
340
		}
341
	} elseif ($authcfg['type'] == "radius") {
342
		if (isset($_SESSION["radius_allowed_groups"]) &&
343
		    (time() <= $_SESSION["auth_check_time"] + $recheck_time)) {
344
			$allowed_groups = $_SESSION["radius_allowed_groups"];
345
		} else {
346
			$allowed_groups = @radius_get_groups($_SESSION['user_radius_attributes']);
347
			$_SESSION["radius_allowed_groups"] = $allowed_groups;
348
			$_SESSION["auth_check_time"] = time();
349
		}
350
	}
351

    
352
	if (empty($allowed_groups)) {
353
		$allowed_groups = local_user_get_groups($user, true);
354
	}
355

    
356
	if (is_array($allowed_groups)) {
357
		foreach ($allowed_groups as $name) {
358
			$group = getGroupEntry($name);
359
			if (is_array($group['priv'])) {
360
				$privs = array_merge($privs, $group['priv']);
361
			}
362
		}
363
	}
364

    
365
	return $privs;
366
}
367

    
368
function userHasPrivilege($userent, $privid = false) {
369

    
370
	if (!$privid || !is_array($userent)) {
371
		return false;
372
	}
373

    
374
	$privs = get_user_privileges($userent);
375

    
376
	if (!is_array($privs)) {
377
		return false;
378
	}
379

    
380
	if (!in_array($privid, $privs)) {
381
		return false;
382
	}
383

    
384
	return true;
385
}
386

    
387
function local_backed($username, $passwd) {
388

    
389
	$user = getUserEntry($username);
390
	if (!$user) {
391
		return false;
392
	}
393

    
394
	if (is_account_disabled($username) || is_account_expired($username)) {
395
		return false;
396
	}
397

    
398
	if ($user['bcrypt-hash']) {
399
		if (password_verify($passwd, $user['bcrypt-hash'])) {
400
			return true;
401
		}
402
	}
403

    
404
	//for backwards compatibility
405
	if ($user['password']) {
406
		if (crypt($passwd, $user['password']) == $user['password']) {
407
			return true;
408
		}
409
	}
410

    
411
	if ($user['md5-hash']) {
412
		if (md5($passwd) == $user['md5-hash']) {
413
			return true;
414
		}
415
	}
416

    
417
	return false;
418
}
419

    
420
function local_sync_accounts($u2add, $u2del, $g2add, $g2del) {
421
	global $config, $debug;
422

    
423
	if (empty($u2add) && empty($u2del) && empty($g2add) && empty($g2del)) {
424
		/* Nothing to be done here */
425
		return;
426
	}
427

    
428
	foreach($u2del as $user) {
429
		if ($user['uid'] < 2000 || $user['uid'] > 65000) {
430
			continue;
431
		}
432

    
433
		/*
434
		 * If a crontab was created to user, pw userdel will be
435
		 * interactive and can cause issues. Just remove crontab
436
		 * before run it when necessary
437
		 */
438
		unlink_if_exists("/var/cron/tabs/{$user['name']}");
439
		$cmd = "/usr/sbin/pw userdel -n " .
440
		    escapeshellarg($user['name']);
441
		if ($debug) {
442
			log_error(sprintf(gettext("Running: %s"), $cmd));
443
		}
444
		mwexec($cmd);
445
		local_group_del_user($user);
446

    
447
		$system_user = $config['system']['user'];
448
		for ($i = 0; $i < count($system_user); $i++) {
449
			if ($system_user[$i]['name'] == $user['name']) {
450
				log_error("Removing user: {$user['name']}");
451
				unset($config['system']['user'][$i]);
452
				break;
453
			}
454
		}
455
	}
456

    
457
	foreach($g2del as $group) {
458
		if ($group['gid'] < 1999 || $group['gid'] > 65000) {
459
			continue;
460
		}
461

    
462
		$cmd = "/usr/sbin/pw groupdel -g " .
463
		    escapeshellarg($group['name']);
464
		if ($debug) {
465
			log_error(sprintf(gettext("Running: %s"), $cmd));
466
		}
467
		mwexec($cmd);
468

    
469
		$system_group = $config['system']['group'];
470
		for ($i = 0; $i < count($system_group); $i++) {
471
			if ($system_group[$i]['name'] == $group['name']) {
472
				log_error("Removing group: {$group['name']}");
473
				unset($config['system']['group'][$i]);
474
				break;
475
			}
476
		}
477
	}
478

    
479
	foreach ($u2add as $user) {
480
		log_error("Adding user: {$user['name']}");
481
		$config['system']['user'][] = $user;
482
	}
483

    
484
	foreach ($g2add as $group) {
485
		log_error("Adding group: {$group['name']}");
486
		$config['system']['group'][] = $group;
487
	}
488

    
489
	/* Sort it alphabetically */
490
	usort($config['system']['user'], function($a, $b) {
491
		return strcmp($a['name'], $b['name']);
492
	});
493
	usort($config['system']['group'], function($a, $b) {
494
		return strcmp($a['name'], $b['name']);
495
	});
496

    
497
	write_config("Sync'd users and groups via XMLRPC");
498

    
499
	/* make sure the all group exists */
500
	$allgrp = getGroupEntryByGID(1998);
501
	local_group_set($allgrp, true);
502

    
503
	foreach ($u2add as $user) {
504
		local_user_set($user);
505
	}
506

    
507
	foreach ($g2add as $group) {
508
		local_group_set($group);
509
	}
510
}
511

    
512
function local_reset_accounts() {
513
	global $debug, $config;
514

    
515
	/* remove local users to avoid uid conflicts */
516
	$fd = popen("/usr/sbin/pw usershow -a", "r");
517
	if ($fd) {
518
		while (!feof($fd)) {
519
			$line = explode(":", fgets($fd));
520
			if ($line[0] != "admin") {
521
				if (!strncmp($line[0], "_", 1)) {
522
					continue;
523
				}
524
				if ($line[2] < 2000) {
525
					continue;
526
				}
527
				if ($line[2] > 65000) {
528
					continue;
529
				}
530
			}
531
			/*
532
			 * If a crontab was created to user, pw userdel will be interactive and
533
			 * can cause issues. Just remove crontab before run it when necessary
534
			 */
535
			unlink_if_exists("/var/cron/tabs/{$line[0]}");
536
			$cmd = "/usr/sbin/pw userdel -n " . escapeshellarg($line[0]);
537
			if ($debug) {
538
				log_error(sprintf(gettext("Running: %s"), $cmd));
539
			}
540
			mwexec($cmd);
541
		}
542
		pclose($fd);
543
	}
544

    
545
	/* remove local groups to avoid gid conflicts */
546
	$gids = array();
547
	$fd = popen("/usr/sbin/pw groupshow -a", "r");
548
	if ($fd) {
549
		while (!feof($fd)) {
550
			$line = explode(":", fgets($fd));
551
			if (!strncmp($line[0], "_", 1)) {
552
				continue;
553
			}
554
			if ($line[2] < 2000) {
555
				continue;
556
			}
557
			if ($line[2] > 65000) {
558
				continue;
559
			}
560
			$cmd = "/usr/sbin/pw groupdel -g " . escapeshellarg($line[2]);
561
			if ($debug) {
562
				log_error(sprintf(gettext("Running: %s"), $cmd));
563
			}
564
			mwexec($cmd);
565
		}
566
		pclose($fd);
567
	}
568

    
569
	/* make sure the all group exists */
570
	$allgrp = getGroupEntryByGID(1998);
571
	local_group_set($allgrp, true);
572

    
573
	/* sync all local users */
574
	if (is_array($config['system']['user'])) {
575
		foreach ($config['system']['user'] as $user) {
576
			local_user_set($user);
577
		}
578
	}
579

    
580
	/* sync all local groups */
581
	if (is_array($config['system']['group'])) {
582
		foreach ($config['system']['group'] as $group) {
583
			local_group_set($group);
584
		}
585
	}
586
}
587

    
588
function local_user_set(& $user) {
589
	global $g, $debug;
590

    
591
	if (empty($user['password']) && empty($user['bcrypt-hash'])) {
592
		log_error("There is something wrong in the config because user {$user['name']} password is missing!");
593
		return;
594
	}
595

    
596

    
597
	$home_base = "/home/";
598
	$user_uid = $user['uid'];
599
	$user_name = $user['name'];
600
	$user_home = "{$home_base}{$user_name}";
601
	$user_shell = "/etc/rc.initial";
602
	$user_group = "nobody";
603

    
604
	// Ensure $home_base exists and is writable
605
	if (!is_dir($home_base)) {
606
		mkdir($home_base, 0755);
607
	}
608

    
609
	$lock_account = false;
610
	/* configure shell type */
611
	/* Cases here should be ordered by most privileged to least privileged. */
612
	if (userHasPrivilege($user, "user-shell-access") || userHasPrivilege($user, "page-all")) {
613
		$user_shell = "/bin/tcsh";
614
	} elseif (userHasPrivilege($user, "user-copy-files-chroot")) {
615
		$user_shell = "/usr/local/sbin/scponlyc";
616
	} elseif (userHasPrivilege($user, "user-copy-files")) {
617
		$user_shell = "/usr/local/bin/scponly";
618
	} elseif (userHasPrivilege($user, "user-ssh-tunnel")) {
619
		$user_shell = "/usr/local/sbin/ssh_tunnel_shell";
620
	} elseif (userHasPrivilege($user, "user-ipsec-xauth-dialin")) {
621
		$user_shell = "/sbin/nologin";
622
	} else {
623
		$user_shell = "/sbin/nologin";
624
		$lock_account = true;
625
	}
626

    
627
	/* Lock out disabled or expired users, unless it's root/admin. */
628
	if ((is_account_disabled($user_name) || is_account_expired($user_name)) && ($user_uid != 0)) {
629
		$user_shell = "/sbin/nologin";
630
		$lock_account = true;
631
	}
632

    
633
	/* root user special handling */
634
	if ($user_uid == 0) {
635
		$cmd = "/usr/sbin/pw usermod -q -n root -s /bin/sh -H 0";
636
		if ($debug) {
637
			log_error(sprintf(gettext("Running: %s"), $cmd));
638
		}
639
		$fd = popen($cmd, "w");
640
		if (empty($user['bcrypt-hash'])) {
641
			fwrite($fd, $user['password']);
642
		} else {
643
			fwrite($fd, $user['bcrypt-hash']);
644
		}
645
		pclose($fd);
646
		$user_group = "wheel";
647
		$user_home = "/root";
648
		$user_shell = "/etc/rc.initial";
649
	}
650

    
651
	/* read from pw db */
652
	$fd = popen("/usr/sbin/pw usershow -n {$user_name} 2>&1", "r");
653
	$pwread = fgets($fd);
654
	pclose($fd);
655
	$userattrs = explode(":", trim($pwread));
656

    
657
	$skel_dir = '/etc/skel';
658

    
659
	/* determine add or mod */
660
	if (($userattrs[0] != $user['name']) || (!strncmp($pwread, "pw:", 3))) {
661
		$user_op = "useradd -m -k " . escapeshellarg($skel_dir) . " -o";
662
	} else {
663
		$user_op = "usermod";
664
	}
665

    
666
	$comment = str_replace(array(":", "!", "@"), " ", $user['descr']);
667
	/* add or mod pw db */
668
	$cmd = "/usr/sbin/pw {$user_op} -q " .
669
			" -u " . escapeshellarg($user_uid) .
670
			" -n " . escapeshellarg($user_name) .
671
			" -g " . escapeshellarg($user_group) .
672
			" -s " . escapeshellarg($user_shell) .
673
			" -d " . escapeshellarg($user_home) .
674
			" -c " . escapeshellarg($comment) .
675
			" -H 0 2>&1";
676

    
677
	if ($debug) {
678
		log_error(sprintf(gettext("Running: %s"), $cmd));
679
	}
680
	$fd = popen($cmd, "w");
681
	if (empty($user['bcrypt-hash'])) {
682
		fwrite($fd, $user['password']);
683
	} else {
684
		fwrite($fd, $user['bcrypt-hash']);
685
	}
686
	pclose($fd);
687

    
688
	/* create user directory if required */
689
	if (!is_dir($user_home)) {
690
		mkdir($user_home, 0700);
691
	}
692
	@chown($user_home, $user_name);
693
	@chgrp($user_home, $user_group);
694

    
695
	/* Make sure all users have last version of config files */
696
	foreach (glob("{$skel_dir}/dot.*") as $dot_file) {
697
		$target = $user_home . '/' . substr(basename($dot_file), 3);
698
		@copy($dot_file, $target);
699
		@chown($target, $user_name);
700
		@chgrp($target, $user_group);
701
	}
702

    
703
	/* write out ssh authorized key file */
704
	if ($user['authorizedkeys']) {
705
		if (!is_dir("{$user_home}/.ssh")) {
706
			@mkdir("{$user_home}/.ssh", 0700);
707
			@chown("{$user_home}/.ssh", $user_name);
708
		}
709
		$keys = base64_decode($user['authorizedkeys']);
710
		@file_put_contents("{$user_home}/.ssh/authorized_keys", $keys);
711
		@chown("{$user_home}/.ssh/authorized_keys", $user_name);
712
	} else {
713
		unlink_if_exists("{$user_home}/.ssh/authorized_keys");
714
	}
715

    
716
	$un = $lock_account ? "" : "un";
717
	exec("/usr/sbin/pw {$un}lock " . escapeshellarg($user_name) . " -q 2>/dev/null");
718

    
719
}
720

    
721
function local_user_del($user) {
722
	global $debug;
723

    
724
	/* remove all memberships */
725
	local_user_set_groups($user);
726

    
727
	/* Don't remove /root */
728
	if ($user['uid'] != 0) {
729
		$rmhome = "-r";
730
	}
731

    
732
	/* read from pw db */
733
	$fd = popen("/usr/sbin/pw usershow -n {$user['name']} 2>&1", "r");
734
	$pwread = fgets($fd);
735
	pclose($fd);
736
	$userattrs = explode(":", trim($pwread));
737

    
738
	if ($userattrs[0] != $user['name']) {
739
		log_error("Tried to remove user {$user['name']} but got user {$userattrs[0]} instead. Bailing.");
740
		return;
741
	}
742

    
743
	/* delete from pw db */
744
	$cmd = "/usr/sbin/pw userdel -n " . escapeshellarg($user['name']) . " " . escapeshellarg($rmhome);
745

    
746
	if ($debug) {
747
		log_error(sprintf(gettext("Running: %s"), $cmd));
748
	}
749
	mwexec($cmd);
750

    
751
	/* Delete user from groups needs a call to write_config() */
752
	local_group_del_user($user);
753
}
754

    
755
function local_user_set_password(&$user, $password) {
756

    
757
	unset($user['password']);
758
	unset($user['md5-hash']);
759
	$user['bcrypt-hash'] = password_hash($password, PASSWORD_BCRYPT);
760

    
761
	/* Maintain compatibility with FreeBSD - change $2y$ prefix to $2b$
762
	 * https://reviews.freebsd.org/D2742
763
	 * XXX: Can be removed as soon as r284483 is MFC'd.
764
	 */
765
	if ($user['bcrypt-hash'][2] == "y") {
766
		$user['bcrypt-hash'][2] = "b";
767
	}
768

    
769
	// Converts ascii to unicode.
770
	$astr = (string) $password;
771
	$ustr = '';
772
	for ($i = 0; $i < strlen($astr); $i++) {
773
		$a = ord($astr{$i}) << 8;
774
		$ustr .= sprintf("%X", $a);
775
	}
776

    
777
}
778

    
779
function local_user_get_groups($user, $all = false) {
780
	global $debug, $config;
781

    
782
	$groups = array();
783
	if (!is_array($config['system']['group'])) {
784
		return $groups;
785
	}
786

    
787
	foreach ($config['system']['group'] as $group) {
788
		if ($all || (!$all && ($group['name'] != "all"))) {
789
			if (is_array($group['member'])) {
790
				if (in_array($user['uid'], $group['member'])) {
791
					$groups[] = $group['name'];
792
				}
793
			}
794
		}
795
	}
796

    
797
	if ($all) {
798
		$groups[] = "all";
799
	}
800

    
801
	sort($groups);
802

    
803
	return $groups;
804

    
805
}
806

    
807
function local_user_set_groups($user, $new_groups = NULL) {
808
	global $debug, $config, $groupindex;
809

    
810
	if (!is_array($config['system']['group'])) {
811
		return;
812
	}
813

    
814
	$cur_groups = local_user_get_groups($user, true);
815
	$mod_groups = array();
816

    
817
	if (!is_array($new_groups)) {
818
		$new_groups = array();
819
	}
820

    
821
	if (!is_array($cur_groups)) {
822
		$cur_groups = array();
823
	}
824

    
825
	/* determine which memberships to add */
826
	foreach ($new_groups as $groupname) {
827
		if ($groupname == '' || in_array($groupname, $cur_groups)) {
828
			continue;
829
		}
830
		$group = & $config['system']['group'][$groupindex[$groupname]];
831
		$group['member'][] = $user['uid'];
832
		$mod_groups[] = $group;
833
	}
834
	unset($group);
835

    
836
	/* determine which memberships to remove */
837
	foreach ($cur_groups as $groupname) {
838
		if (in_array($groupname, $new_groups)) {
839
			continue;
840
		}
841
		if (!isset($config['system']['group'][$groupindex[$groupname]])) {
842
			continue;
843
		}
844
		$group = & $config['system']['group'][$groupindex[$groupname]];
845
		if (is_array($group['member'])) {
846
			$index = array_search($user['uid'], $group['member']);
847
			array_splice($group['member'], $index, 1);
848
			$mod_groups[] = $group;
849
		}
850
	}
851
	unset($group);
852

    
853
	/* sync all modified groups */
854
	foreach ($mod_groups as $group) {
855
		local_group_set($group);
856
	}
857
}
858

    
859
function local_group_del_user($user) {
860
	global $config;
861

    
862
	if (!is_array($config['system']['group'])) {
863
		return;
864
	}
865

    
866
	foreach ($config['system']['group'] as $group) {
867
		if (is_array($group['member'])) {
868
			foreach ($group['member'] as $idx => $uid) {
869
				if ($user['uid'] == $uid) {
870
					unset($config['system']['group']['member'][$idx]);
871
				}
872
			}
873
		}
874
	}
875
}
876

    
877
function local_group_set($group, $reset = false) {
878
	global $debug;
879

    
880
	$group_name = $group['name'];
881
	$group_gid = $group['gid'];
882
	$group_members = '';
883
	if (!$reset && !empty($group['member']) && count($group['member']) > 0) {
884
		$group_members = implode(",", $group['member']);
885
	}
886

    
887
	if (empty($group_name) || $group['scope'] == "remote") {
888
		return;
889
	}
890

    
891
	/* determine add or mod */
892
	if (mwexec("/usr/sbin/pw groupshow -g " . escapeshellarg($group_gid) . " 2>&1", true) == 0) {
893
		$group_op = "groupmod -l";
894
	} else {
895
		$group_op = "groupadd -n";
896
	}
897

    
898
	/* add or mod group db */
899
	$cmd = "/usr/sbin/pw {$group_op} " .
900
		escapeshellarg($group_name) .
901
		" -g " . escapeshellarg($group_gid) .
902
		" -M " . escapeshellarg($group_members) . " 2>&1";
903

    
904
	if ($debug) {
905
		log_error(sprintf(gettext("Running: %s"), $cmd));
906
	}
907
	mwexec($cmd);
908

    
909
}
910

    
911
function local_group_del($group) {
912
	global $debug;
913

    
914
	/* delete from group db */
915
	$cmd = "/usr/sbin/pw groupdel " . escapeshellarg($group['name']);
916

    
917
	if ($debug) {
918
		log_error(sprintf(gettext("Running: %s"), $cmd));
919
	}
920
	mwexec($cmd);
921
}
922

    
923
function ldap_test_connection($authcfg) {
924
	if ($authcfg) {
925
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
926
			$ldapproto = "ldaps";
927
		} else {
928
			$ldapproto = "ldap";
929
		}
930
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
931
		$ldapport = $authcfg['ldap_port'];
932
		if (!empty($ldapport)) {
933
			$ldapserver .= ":{$ldapport}";
934
		}
935
	} else {
936
		return false;
937
	}
938

    
939
	/* first check if there is even an LDAP server populated */
940
	if (!$ldapserver) {
941
		return false;
942
	}
943

    
944
	/* Setup CA environment if needed. */
945
	ldap_setup_caenv($authcfg);
946

    
947
	/* connect and see if server is up */
948
	$error = false;
949
	if (!($ldap = ldap_connect($ldapserver))) {
950
		$error = true;
951
	}
952

    
953
	if ($error == true) {
954
		log_error(sprintf(gettext("ERROR!  Could not connect to server %s."), $authcfg['name']));
955
		return false;
956
	}
957

    
958
	return true;
959
}
960

    
961
function ldap_setup_caenv($authcfg) {
962
	global $g;
963
	require_once("certs.inc");
964

    
965
	unset($caref);
966
	if (empty($authcfg['ldap_caref']) || strstr($authcfg['ldap_urltype'], "Standard")) {
967
		putenv('LDAPTLS_REQCERT=never');
968
		return;
969
	} elseif ($authcfg['ldap_caref'] == "global") {
970
		putenv('LDAPTLS_REQCERT=hard');
971
		putenv("LDAPTLS_CACERTDIR=/etc/ssl/");
972
		putenv("LDAPTLS_CACERT=/etc/ssl/cert.pem");
973
	} else {
974
		$caref = lookup_ca($authcfg['ldap_caref']);
975
		$param = array('caref' => $authcfg['ldap_caref']);
976
		$cachain = ca_chain($param);
977
		if (!$caref) {
978
			log_error(sprintf(gettext("LDAP: Could not lookup CA by reference for host %s."), $authcfg['ldap_caref']));
979
			/* XXX: Prevent for credential leaking since we cannot setup the CA env. Better way? */
980
			putenv('LDAPTLS_REQCERT=hard');
981
			return;
982
		}
983
		if (!is_dir("{$g['varrun_path']}/certs")) {
984
			@mkdir("{$g['varrun_path']}/certs");
985
		}
986
		if (file_exists("{$g['varrun_path']}/certs/{$caref['refid']}.ca")) {
987
			@unlink("{$g['varrun_path']}/certs/{$caref['refid']}.ca");
988
		}
989
		file_put_contents("{$g['varrun_path']}/certs/{$caref['refid']}.ca", $cachain);
990
		@chmod("{$g['varrun_path']}/certs/{$caref['refid']}.ca", 0600);
991
		putenv('LDAPTLS_REQCERT=hard');
992
		/* XXX: Probably even the hashed link should be created for this? */
993
		putenv("LDAPTLS_CACERTDIR={$g['varrun_path']}/certs");
994
		putenv("LDAPTLS_CACERT={$g['varrun_path']}/certs/{$caref['refid']}.ca");
995
	}
996
}
997

    
998
function ldap_test_bind($authcfg) {
999
	global $debug, $config, $g;
1000

    
1001
	if ($authcfg) {
1002
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1003
			$ldapproto = "ldaps";
1004
		} else {
1005
			$ldapproto = "ldap";
1006
		}
1007
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1008
		$ldapport = $authcfg['ldap_port'];
1009
		if (!empty($ldapport)) {
1010
			$ldapserver .= ":{$ldapport}";
1011
		}
1012
		$ldapbasedn = $authcfg['ldap_basedn'];
1013
		$ldapbindun = $authcfg['ldap_binddn'];
1014
		$ldapbindpw = $authcfg['ldap_bindpw'];
1015
		$ldapver = $authcfg['ldap_protver'];
1016
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1017
		if (empty($ldapbndun) || empty($ldapbindpw)) {
1018
			$ldapanon = true;
1019
		} else {
1020
			$ldapanon = false;
1021
		}
1022
	} else {
1023
		return false;
1024
	}
1025

    
1026
	/* first check if there is even an LDAP server populated */
1027
	if (!$ldapserver) {
1028
		return false;
1029
	}
1030

    
1031
	/* Setup CA environment if needed. */
1032
	ldap_setup_caenv($authcfg);
1033

    
1034
	/* connect and see if server is up */
1035
	$error = false;
1036
	if (!($ldap = ldap_connect($ldapserver))) {
1037
		$error = true;
1038
	}
1039

    
1040
	if ($error == true) {
1041
		log_error(sprintf(gettext("ERROR!  Could not connect to server %s."), $ldapname));
1042
		return false;
1043
	}
1044

    
1045
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1046
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1047
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1048
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1049
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1050

    
1051
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1052
		if (!(@ldap_start_tls($ldap))) {
1053
			log_error(sprintf(gettext("ERROR! ldap_test_bind() could not STARTTLS to server %s."), $ldapname));
1054
			@ldap_close($ldap);
1055
			return false;
1056
		}
1057
	}
1058

    
1059
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1060
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1061
	if ($ldapanon == true) {
1062
		if (!($res = @ldap_bind($ldap))) {
1063
			@ldap_close($ldap);
1064
			return false;
1065
		}
1066
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1067
		@ldap_close($ldap);
1068
		return false;
1069
	}
1070

    
1071
	@ldap_unbind($ldap);
1072

    
1073
	return true;
1074
}
1075

    
1076
function ldap_get_user_ous($show_complete_ou=true, $authcfg) {
1077
	global $debug, $config, $g;
1078

    
1079
	if (!function_exists("ldap_connect")) {
1080
		return;
1081
	}
1082

    
1083
	$ous = array();
1084

    
1085
	if ($authcfg) {
1086
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1087
			$ldapproto = "ldaps";
1088
		} else {
1089
			$ldapproto = "ldap";
1090
		}
1091
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1092
		$ldapport = $authcfg['ldap_port'];
1093
		if (!empty($ldapport)) {
1094
			$ldapserver .= ":{$ldapport}";
1095
		}
1096
		$ldapbasedn = $authcfg['ldap_basedn'];
1097
		$ldapbindun = $authcfg['ldap_binddn'];
1098
		$ldapbindpw = $authcfg['ldap_bindpw'];
1099
		$ldapver = $authcfg['ldap_protver'];
1100
		if (empty($ldapbindun) || empty($ldapbindpw)) {
1101
			$ldapanon = true;
1102
		} else {
1103
			$ldapanon = false;
1104
		}
1105
		$ldapname = $authcfg['name'];
1106
		$ldapfallback = false;
1107
		$ldapscope = $authcfg['ldap_scope'];
1108
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1109
	} else {
1110
		return false;
1111
	}
1112

    
1113
	/* first check if there is even an LDAP server populated */
1114
	if (!$ldapserver) {
1115
		log_error(gettext("ERROR!  ldap_get_user_ous() backed selected with no LDAP authentication server defined."));
1116
		return $ous;
1117
	}
1118

    
1119
	/* Setup CA environment if needed. */
1120
	ldap_setup_caenv($authcfg);
1121

    
1122
	/* connect and see if server is up */
1123
	$error = false;
1124
	if (!($ldap = ldap_connect($ldapserver))) {
1125
		$error = true;
1126
	}
1127

    
1128
	if ($error == true) {
1129
		log_error(sprintf(gettext("ERROR!  Could not connect to server %s."), $ldapname));
1130
		return $ous;
1131
	}
1132

    
1133
	$ldapfilter = "(|(ou=*)(cn=Users))";
1134

    
1135
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1136
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1137
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1138
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1139
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1140

    
1141
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1142
		if (!(@ldap_start_tls($ldap))) {
1143
			log_error(sprintf(gettext("ERROR! ldap_get_user_ous() could not STARTTLS to server %s."), $ldapname));
1144
			@ldap_close($ldap);
1145
			return false;
1146
		}
1147
	}
1148

    
1149
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1150
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1151
	if ($ldapanon == true) {
1152
		if (!($res = @ldap_bind($ldap))) {
1153
			log_error(sprintf(gettext("ERROR! ldap_get_user_ous() could not bind anonymously to server %s."), $ldapname));
1154
			@ldap_close($ldap);
1155
			return $ous;
1156
		}
1157
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1158
		log_error(sprintf(gettext("ERROR! ldap_get_user_ous() could not bind to server %s."), $ldapname));
1159
		@ldap_close($ldap);
1160
		return $ous;
1161
	}
1162

    
1163
	if ($ldapscope == "one") {
1164
		$ldapfunc = "ldap_list";
1165
	} else {
1166
		$ldapfunc = "ldap_search";
1167
	}
1168

    
1169
	$search = @$ldapfunc($ldap, $ldapbasedn, $ldapfilter);
1170
	$info = @ldap_get_entries($ldap, $search);
1171

    
1172
	if (is_array($info)) {
1173
		foreach ($info as $inf) {
1174
			if (!$show_complete_ou) {
1175
				$inf_split = explode(",", $inf['dn']);
1176
				$ou = $inf_split[0];
1177
				$ou = str_replace("OU=", "", $ou);
1178
				$ou = str_replace("CN=", "", $ou);
1179
			} else {
1180
				if ($inf['dn']) {
1181
					$ou = $inf['dn'];
1182
				}
1183
			}
1184
			if ($ou) {
1185
				$ous[] = $ou;
1186
			}
1187
		}
1188
	}
1189

    
1190
	@ldap_unbind($ldap);
1191

    
1192
	return $ous;
1193
}
1194

    
1195
function ldap_get_groups($username, $authcfg) {
1196
	global $debug, $config;
1197

    
1198
	if (!function_exists("ldap_connect")) {
1199
		return;
1200
	}
1201

    
1202
	if (!$username) {
1203
		return false;
1204
	}
1205

    
1206
	if (!isset($authcfg['ldap_nostrip_at']) && stristr($username, "@")) {
1207
		$username_split = explode("@", $username);
1208
		$username = $username_split[0];
1209
	}
1210

    
1211
	if (stristr($username, "\\")) {
1212
		$username_split = explode("\\", $username);
1213
		$username = $username_split[0];
1214
	}
1215

    
1216
	//log_error("Getting LDAP groups for {$username}.");
1217
	if ($authcfg) {
1218
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1219
			$ldapproto = "ldaps";
1220
		} else {
1221
			$ldapproto = "ldap";
1222
		}
1223
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1224
		$ldapport = $authcfg['ldap_port'];
1225
		if (!empty($ldapport)) {
1226
			$ldapserver .= ":{$ldapport}";
1227
		}
1228
		$ldapbasedn = $authcfg['ldap_basedn'];
1229
		$ldapbindun = $authcfg['ldap_binddn'];
1230
		$ldapbindpw = $authcfg['ldap_bindpw'];
1231
		$ldapauthcont = $authcfg['ldap_authcn'];
1232
		$ldapnameattribute = strtolower($authcfg['ldap_attr_user']);
1233
		$ldapgroupattribute = strtolower($authcfg['ldap_attr_member']);
1234
		if (isset($authcfg['ldap_rfc2307'])) {
1235
			$ldapfilter         = "(&(objectClass={$authcfg['ldap_attr_groupobj']})({$ldapgroupattribute}={$username}))";
1236
		} else {
1237
			$ldapfilter         = "({$ldapnameattribute}={$username})";
1238
		}
1239
		$ldaptype = "";
1240
		$ldapver = $authcfg['ldap_protver'];
1241
		if (empty($ldapbindun) || empty($ldapbindpw)) {
1242
			$ldapanon = true;
1243
		} else {
1244
			$ldapanon = false;
1245
		}
1246
		$ldapname = $authcfg['name'];
1247
		$ldapfallback = false;
1248
		$ldapscope = $authcfg['ldap_scope'];
1249
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1250
	} else {
1251
		return false;
1252
	}
1253

    
1254
	if (isset($authcfg['ldap_rfc2307'])) {
1255
		$ldapdn = $ldapbasedn;
1256
	} else {
1257
		$ldapdn = $_SESSION['ldapdn'];
1258
	}
1259

    
1260
	/*Convert attribute to lowercase.  php ldap arrays put everything in lowercase */
1261
	$ldapgroupattribute = strtolower($ldapgroupattribute);
1262
	$memberof = array();
1263

    
1264
	/* Setup CA environment if needed. */
1265
	ldap_setup_caenv($authcfg);
1266

    
1267
	/* connect and see if server is up */
1268
	$error = false;
1269
	if (!($ldap = ldap_connect($ldapserver))) {
1270
		$error = true;
1271
	}
1272

    
1273
	if ($error == true) {
1274
		log_error(sprintf(gettext("ERROR! ldap_get_groups() Could not connect to server %s."), $ldapname));
1275
		return $memberof;
1276
	}
1277

    
1278
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1279
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1280
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1281
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1282
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1283

    
1284
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1285
		if (!(@ldap_start_tls($ldap))) {
1286
			log_error(sprintf(gettext("ERROR! ldap_get_groups() could not STARTTLS to server %s."), $ldapname));
1287
			@ldap_close($ldap);
1288
			return false;
1289
		}
1290
	}
1291

    
1292
	/* bind as user that has rights to read group attributes */
1293
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1294
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1295
	if ($ldapanon == true) {
1296
		if (!($res = @ldap_bind($ldap))) {
1297
			log_error(sprintf(gettext("ERROR! ldap_get_groups() could not bind anonymously to server %s."), $ldapname));
1298
			@ldap_close($ldap);
1299
			return false;
1300
		}
1301
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1302
		log_error(sprintf(gettext("ERROR! ldap_get_groups() could not bind to server %s."), $ldapname));
1303
		@ldap_close($ldap);
1304
		return $memberof;
1305
	}
1306

    
1307
	/* get groups from DN found */
1308
	/* use ldap_read instead of search so we don't have to do a bunch of extra work */
1309
	/* since we know the DN is in $_SESSION['ldapdn'] */
1310
	//$search    = ldap_read($ldap, $ldapdn, "(objectclass=*)", array($ldapgroupattribute));
1311
	if ($ldapscope == "one") {
1312
		$ldapfunc = "ldap_list";
1313
	} else {
1314
		$ldapfunc = "ldap_search";
1315
	}
1316

    
1317
	$search = @$ldapfunc($ldap, $ldapdn, $ldapfilter, array($ldapgroupattribute));
1318
	$info = @ldap_get_entries($ldap, $search);
1319

    
1320
	$gresults = isset($authcfg['ldap_rfc2307']) ? $info : $info[0][$ldapgroupattribute];
1321

    
1322
	if (is_array($gresults)) {
1323
		/* Iterate through the groups and throw them into an array */
1324
		foreach ($gresults as $grp) {
1325
			if (((isset($authcfg['ldap_rfc2307'])) && (stristr($grp["dn"], "CN=") !== false)) ||
1326
			    ((!isset($authcfg['ldap_rfc2307'])) && (stristr($grp, "CN=") !== false))) {
1327
				$grpsplit = isset($authcfg['ldap_rfc2307']) ? explode(",", $grp["dn"]) : explode(",", $grp);
1328
				$memberof[] = preg_replace("/CN=/i", "", $grpsplit[0]);
1329
			}
1330
		}
1331
	}
1332

    
1333
	/* Time to close LDAP connection */
1334
	@ldap_unbind($ldap);
1335

    
1336
	$groups = print_r($memberof, true);
1337

    
1338
	//log_error("Returning groups ".$groups." for user $username");
1339

    
1340
	return $memberof;
1341
}
1342

    
1343
function ldap_format_host($host) {
1344
	return is_ipaddrv6($host) ? "[$host]" : $host ;
1345
}
1346

    
1347
function ldap_backed($username, $passwd, $authcfg) {
1348
	global $debug, $config;
1349

    
1350
	if (!$username) {
1351
		return;
1352
	}
1353

    
1354
	if (!function_exists("ldap_connect")) {
1355
		return;
1356
	}
1357

    
1358
	if (!isset($authcfg['ldap_nostrip_at']) && stristr($username, "@")) {
1359
		$username_split = explode("@", $username);
1360
		$username = $username_split[0];
1361
	}
1362
	if (stristr($username, "\\")) {
1363
		$username_split = explode("\\", $username);
1364
		$username = $username_split[0];
1365
	}
1366

    
1367
	if ($authcfg) {
1368
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1369
			$ldapproto = "ldaps";
1370
		} else {
1371
			$ldapproto = "ldap";
1372
		}
1373
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1374
		$ldapport = $authcfg['ldap_port'];
1375
		if (!empty($ldapport)) {
1376
			$ldapserver .= ":{$ldapport}";
1377
		}
1378
		$ldapbasedn = $authcfg['ldap_basedn'];
1379
		$ldapbindun = $authcfg['ldap_binddn'];
1380
		$ldapbindpw = $authcfg['ldap_bindpw'];
1381
		if (empty($ldapbindun) || empty($ldapbindpw)) {
1382
			$ldapanon = true;
1383
		} else {
1384
			$ldapanon = false;
1385
		}
1386
		$ldapauthcont = $authcfg['ldap_authcn'];
1387
		$ldapnameattribute = strtolower($authcfg['ldap_attr_user']);
1388
		$ldapextendedqueryenabled = $authcfg['ldap_extended_enabled'];
1389
		$ldapextendedquery = $authcfg['ldap_extended_query'];
1390
		$ldapfilter = "";
1391
		if (!$ldapextendedqueryenabled) {
1392
			$ldapfilter = "({$ldapnameattribute}={$username})";
1393
		} else {
1394
			$ldapfilter = "(&({$ldapnameattribute}={$username})({$ldapextendedquery}))";
1395
		}
1396
		$ldaptype = "";
1397
		$ldapver = $authcfg['ldap_protver'];
1398
		$ldapname = $authcfg['name'];
1399
		$ldapscope = $authcfg['ldap_scope'];
1400
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1401
	} else {
1402
		return false;
1403
	}
1404

    
1405
	/* first check if there is even an LDAP server populated */
1406
	if (!$ldapserver) {
1407
		if ($ldapfallback) {
1408
			log_error(gettext("ERROR! ldap_backed() called with no LDAP authentication server defined.  Defaulting to local user database. Visit System -> User Manager."));
1409
			return local_backed($username, $passwd);
1410
		} else {
1411
			log_error(gettext("ERROR! ldap_backed() called with no LDAP authentication server defined."));
1412
		}
1413

    
1414
		return false;
1415
	}
1416

    
1417
	/* Setup CA environment if needed. */
1418
	ldap_setup_caenv($authcfg);
1419

    
1420
	/* Make sure we can connect to LDAP */
1421
	$error = false;
1422
	if (!($ldap = ldap_connect($ldapserver))) {
1423
		$error = true;
1424
	}
1425

    
1426
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1427
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1428
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1429
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1430
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1431

    
1432
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1433
		if (!(@ldap_start_tls($ldap))) {
1434
			log_error(sprintf(gettext("ERROR! ldap_backed() could not STARTTLS to server %s."), $ldapname));
1435
			@ldap_close($ldap);
1436
			return false;
1437
		}
1438
	}
1439

    
1440
	if ($error == true) {
1441
		log_error(sprintf(gettext("ERROR!  Could not connect to server %s."), $ldapname));
1442
		return false;
1443
	}
1444

    
1445
	/* ok, its up.  now, lets bind as the bind user so we can search it */
1446
	$error = false;
1447
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1448
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1449
	if ($ldapanon == true) {
1450
		if (!($res = @ldap_bind($ldap))) {
1451
			$error = true;
1452
		}
1453
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1454
		$error = true;
1455
	}
1456

    
1457
	if ($error == true) {
1458
		@ldap_close($ldap);
1459
		log_error(sprintf(gettext("ERROR! Could not bind to server %s."), $ldapname));
1460
		return false;
1461
	}
1462

    
1463
	/* Get LDAP Authcontainers and split em up. */
1464
	$ldac_splits = explode(";", $ldapauthcont);
1465

    
1466
	/* setup the usercount so we think we haven't found anyone yet */
1467
	$usercount = 0;
1468

    
1469
	/*****************************************************************/
1470
	/*  We first find the user based on username and filter          */
1471
	/*  then, once we find the first occurrence of that person       */
1472
	/*  we set session variables to point to the OU and DN of the    */
1473
	/*  person.  To later be used by ldap_get_groups.                */
1474
	/*  that way we don't have to search twice.                      */
1475
	/*****************************************************************/
1476
	if ($debug) {
1477
		log_auth(sprintf(gettext("Now Searching for %s in directory."), $username));
1478
	}
1479
	/* Iterate through the user containers for search */
1480
	foreach ($ldac_splits as $i => $ldac_split) {
1481
		$ldac_split = isset($authcfg['ldap_utf8']) ? utf8_encode($ldac_split) : $ldac_split;
1482
		$ldapfilter = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapfilter) : $ldapfilter;
1483
		$ldapsearchbasedn = isset($authcfg['ldap_utf8']) ? utf8_encode("{$ldac_split},{$ldapbasedn}") : "{$ldac_split},{$ldapbasedn}";
1484
		/* Make sure we just use the first user we find */
1485
		if ($debug) {
1486
			log_auth(sprintf(gettext('Now Searching in server %1$s, container %2$s with filter %3$s.'), $ldapname, utf8_decode($ldac_split), utf8_decode($ldapfilter)));
1487
		}
1488
		if ($ldapscope == "one") {
1489
			$ldapfunc = "ldap_list";
1490
		} else {
1491
			$ldapfunc = "ldap_search";
1492
		}
1493
		/* Support legacy auth container specification. */
1494
		if (stristr($ldac_split, "DC=") || empty($ldapbasedn)) {
1495
			$search = @$ldapfunc($ldap, $ldac_split, $ldapfilter);
1496
		} else {
1497
			$search = @$ldapfunc($ldap, $ldapsearchbasedn, $ldapfilter);
1498
		}
1499
		if (!$search) {
1500
			log_error(sprintf(gettext("Search resulted in error: %s"), ldap_error($ldap)));
1501
			continue;
1502
		}
1503
		$info = ldap_get_entries($ldap, $search);
1504
		$matches = $info['count'];
1505
		if ($matches == 1) {
1506
			$userdn = $_SESSION['ldapdn'] = $info[0]['dn'];
1507
			$_SESSION['ldapou'] = $ldac_split[$i];
1508
			$_SESSION['ldapon'] = "true";
1509
			$usercount = 1;
1510
			break;
1511
		}
1512
	}
1513

    
1514
	if ($usercount != 1) {
1515
		@ldap_unbind($ldap);
1516
		log_error(gettext("ERROR! Either LDAP search failed, or multiple users were found."));
1517
		return false;
1518
	}
1519

    
1520
	/* Now lets bind as the user we found */
1521
	$passwd = isset($authcfg['ldap_utf8']) ? utf8_encode($passwd) : $passwd;
1522
	if (!($res = @ldap_bind($ldap, $userdn, $passwd))) {
1523
		log_error(sprintf(gettext('ERROR! Could not login to server %1$s as user %2$s: %3$s'), $ldapname, $username, ldap_error($ldap)));
1524
		@ldap_unbind($ldap);
1525
		return false;
1526
	}
1527

    
1528
	if ($debug) {
1529
		$userdn = isset($authcfg['ldap_utf8']) ? utf8_decode($userdn) : $userdn;
1530
		log_auth(sprintf(gettext('Logged in successfully as %1$s via LDAP server %2$s with DN = %3$s.'), $username, $ldapname, $userdn));
1531
	}
1532

    
1533
	/* At this point we are bound to LDAP so the user was auth'd okay. Close connection. */
1534
	@ldap_unbind($ldap);
1535

    
1536
	return true;
1537
}
1538

    
1539
function radius_backed($username, $password, $authcfg, &$attributes = array()) {
1540
	global $debug, $config;
1541
	$ret = false;
1542

    
1543
	require_once("radius.inc");
1544
	require_once("Crypt/CHAP.php");
1545

    
1546
	if ($authcfg) {
1547
		$radiusservers = array();
1548
		$radiusservers[0]['ipaddr'] = $authcfg['host'];
1549
		$radiusservers[0]['port'] = $authcfg['radius_auth_port'];
1550
		$radiusservers[0]['sharedsecret'] = $authcfg['radius_secret'];
1551
		$radiusservers[0]['timeout'] = $authcfg['radius_timeout'];
1552
		if(isset($authcfg['radius_protocol'])) {
1553
			$radius_protocol = $authcfg['radius_protocol'];
1554
		} else {
1555
			$radius_protocol = 'PAP';
1556
		}
1557
	} else {
1558
		return false;
1559
	}
1560

    
1561
	// Create our instance
1562
	$classname = 'Auth_RADIUS_' . $radius_protocol;
1563
	$rauth = new $classname($username, $password);
1564

    
1565
	/* Add new servers to our instance */
1566
	foreach ($radiusservers as $radsrv) {
1567
		$timeout = (is_numeric($radsrv['timeout'])) ? $radsrv['timeout'] : 5;
1568
		$rauth->addServer($radsrv['ipaddr'], $radsrv['port'], $radsrv['sharedsecret'], $timeout);
1569
	}
1570

    
1571
	// Construct data package
1572
	$rauth->username = $username;
1573
	switch ($radius_protocol) {
1574
		case 'CHAP_MD5':
1575
		case 'MSCHAPv1':
1576
			$classname = $radius_protocol == 'MSCHAPv1' ? 'Crypt_CHAP_MSv1' : 'Crypt_CHAP_MD5';
1577
			$crpt = new $classname;
1578
			$crpt->username = $username;
1579
			$crpt->password = $password;
1580
			$rauth->challenge = $crpt->challenge;
1581
			$rauth->chapid = $crpt->chapid;
1582
			$rauth->response = $crpt->challengeResponse();
1583
			$rauth->flags = 1;
1584
			break;
1585

    
1586
		case 'MSCHAPv2':
1587
			$crpt = new Crypt_CHAP_MSv2;
1588
			$crpt->username = $username;
1589
			$crpt->password = $password;
1590
			$rauth->challenge = $crpt->authChallenge;
1591
			$rauth->peerChallenge = $crpt->peerChallenge;
1592
			$rauth->chapid = $crpt->chapid;
1593
			$rauth->response = $crpt->challengeResponse();
1594
			break;
1595

    
1596
		default:
1597
			$rauth->password = $password;
1598
			break;
1599
	}
1600

    
1601
	if (PEAR::isError($rauth->start())) {
1602
		$retvalue['auth_val'] = 1;
1603
		$retvalue['error'] = $rauth->getError();
1604
		if ($debug) {
1605
			printf(gettext("RADIUS start: %s") . "<br />\n", $retvalue['error']);
1606
		}
1607
	}
1608

    
1609
	// XXX - billm - somewhere in here we need to handle securid challenge/response
1610

    
1611
	/* Send request */
1612
	$result = $rauth->send();
1613
	if (PEAR::isError($result)) {
1614
		$retvalue['auth_val'] = 1;
1615
		$retvalue['error'] = $result->getMessage();
1616
		if ($debug) {
1617
			printf(gettext("RADIUS send failed: %s") . "<br />\n", $retvalue['error']);
1618
		}
1619
	} else if ($result === true) {
1620
		if ($rauth->getAttributes()) {
1621
			$attributes = $rauth->listAttributes();
1622
		}
1623
		$retvalue['auth_val'] = 2;
1624
		if ($debug) {
1625
			printf(gettext("RADIUS Auth succeeded")."<br />\n");
1626
		}
1627
		$ret = true;
1628
	} else {
1629
		$retvalue['auth_val'] = 3;
1630
		if ($debug) {
1631
			printf(gettext("RADIUS Auth rejected")."<br />\n");
1632
		}
1633
	}
1634

    
1635
	// close OO RADIUS_AUTHENTICATION
1636
	$rauth->close();
1637

    
1638
	return $ret;
1639
}
1640

    
1641
/*
1642
	$attributes must contain a "class" key containing the groups and local
1643
	groups must exist to match.
1644
*/
1645
function radius_get_groups($attributes) {
1646
	$groups = array();
1647
	if (!empty($attributes) && is_array($attributes) && (!empty($attributes['class']) || !empty($attributes['class_int']))) {
1648
		/* Some RADIUS servers return multiple class attributes, so check them all. */
1649
		$groups = array();
1650
		if (!empty($attributes['class']) && is_array($attributes['class'])) {
1651
			foreach ($attributes['class'] as $class) {
1652
				$groups = array_unique(array_merge($groups, explode(";", $class)));
1653
			}
1654
		}
1655

    
1656
		foreach ($groups as & $grp) {
1657
			$grp = trim($grp);
1658
			if (strtolower(substr($grp, 0, 3)) == "ou=") {
1659
				$grp = substr($grp, 3);
1660
			}
1661
		}
1662
	}
1663
	return $groups;
1664
}
1665

    
1666
function get_user_expiration_date($username) {
1667
	$user = getUserEntry($username);
1668
	if ($user['expires']) {
1669
		return $user['expires'];
1670
	}
1671
}
1672

    
1673
function is_account_expired($username) {
1674
	$expirydate = get_user_expiration_date($username);
1675
	if ($expirydate) {
1676
		if (strtotime("-1 day") > strtotime(date("m/d/Y", strtotime($expirydate)))) {
1677
			return true;
1678
		}
1679
	}
1680

    
1681
	return false;
1682
}
1683

    
1684
function is_account_disabled($username) {
1685
	$user = getUserEntry($username);
1686
	if (isset($user['disabled'])) {
1687
		return true;
1688
	}
1689

    
1690
	return false;
1691
}
1692

    
1693
function get_user_settings($username) {
1694
	global $config;
1695
	$settings = array();
1696
	$settings['widgets'] = $config['widgets'];
1697
	$settings['webgui']['dashboardcolumns'] = $config['system']['webgui']['dashboardcolumns'];
1698
	$settings['webgui']['webguihostnamemenu'] = $config['system']['webgui']['webguihostnamemenu'];
1699
	$settings['webgui']['webguicss'] = $config['system']['webgui']['webguicss'];
1700
	$settings['webgui']['logincss'] = $config['system']['webgui']['logincss'];
1701
	$settings['webgui']['interfacessort'] = isset($config['system']['webgui']['interfacessort']);
1702
	$settings['webgui']['dashboardavailablewidgetspanel'] = isset($config['system']['webgui']['dashboardavailablewidgetspanel']);
1703
	$settings['webgui']['webguifixedmenu'] = isset($config['system']['webgui']['webguifixedmenu']);
1704
	$settings['webgui']['webguileftcolumnhyper'] = isset($config['system']['webgui']['webguileftcolumnhyper']);
1705
	$settings['webgui']['disablealiaspopupdetail'] = isset($config['system']['webgui']['disablealiaspopupdetail']);
1706
	$settings['webgui']['systemlogsfilterpanel'] = isset($config['system']['webgui']['systemlogsfilterpanel']);
1707
	$settings['webgui']['systemlogsmanagelogpanel'] = isset($config['system']['webgui']['systemlogsmanagelogpanel']);
1708
	$settings['webgui']['statusmonitoringsettingspanel'] = isset($config['system']['webgui']['statusmonitoringsettingspanel']);
1709
	$settings['webgui']['pagenamefirst'] = isset($config['system']['webgui']['pagenamefirst']);
1710
	$user = getUserEntry($username);
1711
	if (isset($user['customsettings'])) {
1712
		$settings['customsettings'] = true;
1713
		if (isset($user['widgets'])) {
1714
			// This includes the 'sequence', and any widgetname-config per-widget settings.
1715
			$settings['widgets'] = $user['widgets'];
1716
		}
1717
		if (isset($user['dashboardcolumns'])) {
1718
			$settings['webgui']['dashboardcolumns'] = $user['dashboardcolumns'];
1719
		}
1720
		if (isset($user['webguicss'])) {
1721
			$settings['webgui']['webguicss'] = $user['webguicss'];
1722
		}
1723
		if (isset($user['webguihostnamemenu'])) {
1724
			$settings['webgui']['webguihostnamemenu'] = $user['webguihostnamemenu'];
1725
		}
1726
		$settings['webgui']['interfacessort'] = isset($user['interfacessort']);
1727
		$settings['webgui']['dashboardavailablewidgetspanel'] = isset($user['dashboardavailablewidgetspanel']);
1728
		$settings['webgui']['webguifixedmenu'] = isset($user['webguifixedmenu']);
1729
		$settings['webgui']['webguileftcolumnhyper'] = isset($user['webguileftcolumnhyper']);
1730
		$settings['webgui']['disablealiaspopupdetail'] = isset($user['disablealiaspopupdetail']);
1731
		$settings['webgui']['systemlogsfilterpanel'] = isset($user['systemlogsfilterpanel']);
1732
		$settings['webgui']['systemlogsmanagelogpanel'] = isset($user['systemlogsmanagelogpanel']);
1733
		$settings['webgui']['statusmonitoringsettingspanel'] = isset($user['statusmonitoringsettingspanel']);
1734
		$settings['webgui']['pagenamefirst'] = isset($user['pagenamefirst']);
1735
	} else {
1736
		$settings['customsettings'] = false;
1737
	}
1738

    
1739
	if ($settings['webgui']['dashboardcolumns'] < 1) {
1740
		$settings['webgui']['dashboardcolumns'] = 2;
1741
	}
1742

    
1743
	return $settings;
1744
}
1745

    
1746
function save_widget_settings($username, $settings, $message = "") {
1747
	global $config, $userindex;
1748
	$user = getUserEntry($username);
1749

    
1750
	if (strlen($message) > 0) {
1751
		$msgout = $message;
1752
	} else {
1753
		$msgout = gettext("Widget configuration has been changed.");
1754
	}
1755

    
1756
	if (isset($user['customsettings'])) {
1757
		$config['system']['user'][$userindex[$username]]['widgets'] = $settings;
1758
		write_config($msgout . " " . sprintf(gettext("(User %s)"), $username));
1759
	} else {
1760
		$config['widgets'] = $settings;
1761
		write_config($msgout);
1762
	}
1763
}
1764

    
1765
function auth_get_authserver($name) {
1766
	global $config;
1767

    
1768
	if (is_array($config['system']['authserver'])) {
1769
		foreach ($config['system']['authserver'] as $authcfg) {
1770
			if ($authcfg['name'] == $name) {
1771
				return $authcfg;
1772
			}
1773
		}
1774
	}
1775
	if ($name == "Local Database") {
1776
		return array("name" => gettext("Local Database"), "type" => "Local Auth", "host" => $config['system']['hostname']);
1777
	}
1778
}
1779

    
1780
function auth_get_authserver_list() {
1781
	global $config;
1782

    
1783
	$list = array();
1784

    
1785
	if (is_array($config['system']['authserver'])) {
1786
		foreach ($config['system']['authserver'] as $authcfg) {
1787
			/* Add support for disabled entries? */
1788
			$list[$authcfg['name']] = $authcfg;
1789
		}
1790
	}
1791

    
1792
	$list["Local Database"] = array("name" => gettext("Local Database"), "type" => "Local Auth", "host" => $config['system']['hostname']);
1793
	return $list;
1794
}
1795

    
1796
function getUserGroups($username, $authcfg, &$attributes = array()) {
1797
	global $config;
1798

    
1799
	$allowed_groups = array();
1800

    
1801
	switch ($authcfg['type']) {
1802
		case 'ldap':
1803
			$allowed_groups = @ldap_get_groups($username, $authcfg);
1804
			break;
1805
		case 'radius':
1806
			$allowed_groups = @radius_get_groups($attributes);
1807
			break;
1808
		default:
1809
			$user = getUserEntry($username);
1810
			$allowed_groups = @local_user_get_groups($user, true);
1811
			break;
1812
	}
1813

    
1814
	$member_groups = array();
1815
	if (is_array($config['system']['group'])) {
1816
		foreach ($config['system']['group'] as $group) {
1817
			if (in_array($group['name'], $allowed_groups)) {
1818
				$member_groups[] = $group['name'];
1819
			}
1820
		}
1821
	}
1822

    
1823
	return $member_groups;
1824
}
1825

    
1826
function authenticate_user($username, $password, $authcfg = NULL, &$attributes = array()) {
1827

    
1828
	if (is_array($username) || is_array($password)) {
1829
		return false;
1830
	}
1831

    
1832
	if (!$authcfg) {
1833
		return local_backed($username, $password);
1834
	}
1835

    
1836
	$authenticated = false;
1837
	switch ($authcfg['type']) {
1838
		case 'ldap':
1839
			if (ldap_backed($username, $password, $authcfg)) {
1840
				$authenticated = true;
1841
			}
1842
			break;
1843
		case 'radius':
1844
			if (radius_backed($username, $password, $authcfg, $attributes)) {
1845
				$authenticated = true;
1846
			}
1847
			break;
1848
		default:
1849
			/* lookup user object by name */
1850
			if (local_backed($username, $password)) {
1851
				$authenticated = true;
1852
			}
1853
			break;
1854
		}
1855

    
1856
	return $authenticated;
1857
}
1858

    
1859
function session_auth() {
1860
	global $config, $_SESSION, $page;
1861

    
1862
	// Handle HTTPS httponly and secure flags
1863
	$currentCookieParams = session_get_cookie_params();
1864
	session_set_cookie_params(
1865
		$currentCookieParams["lifetime"],
1866
		$currentCookieParams["path"],
1867
		NULL,
1868
		($config['system']['webgui']['protocol'] == "https"),
1869
		true
1870
	);
1871

    
1872
	phpsession_begin();
1873

    
1874
	// Detect protocol change
1875
	if (!isset($_POST['login']) && !empty($_SESSION['Logged_In']) && $_SESSION['protocol'] != $config['system']['webgui']['protocol']) {
1876
		phpsession_end();
1877
		return false;
1878
	}
1879

    
1880
	/* Validate incoming login request */
1881
	$attributes = array();
1882
	if (isset($_POST['login']) && !empty($_POST['usernamefld']) && !empty($_POST['passwordfld'])) {
1883
		$authcfg = auth_get_authserver($config['system']['webgui']['authmode']);
1884
		$remoteauth = authenticate_user($_POST['usernamefld'], $_POST['passwordfld'], $authcfg, $attributes);
1885
		if ($remoteauth || authenticate_user($_POST['usernamefld'], $_POST['passwordfld'])) {
1886
			// Generate a new id to avoid session fixation
1887
			session_regenerate_id();
1888
			$_SESSION['Logged_In'] = "True";
1889
			$_SESSION['remoteauth'] = $remoteauth;
1890
			$_SESSION['Username'] = $_POST['usernamefld'];
1891
			$_SESSION['user_radius_attributes'] = $attributes;
1892
			$_SESSION['last_access'] = time();
1893
			$_SESSION['protocol'] = $config['system']['webgui']['protocol'];
1894
			phpsession_end(true);
1895
			if (!isset($config['system']['webgui']['quietlogin'])) {
1896
				log_auth(sprintf(gettext("Successful login for user '%1\$s' from: %2\$s"), $_POST['usernamefld'], $_SERVER['REMOTE_ADDR']));
1897
			}
1898
			if (isset($_POST['postafterlogin'])) {
1899
				return true;
1900
			} else {
1901
				if (empty($page)) {
1902
					$page = "/";
1903
				}
1904
				header("Location: {$page}");
1905
			}
1906
			exit;
1907
		} else {
1908
			/* give the user an error message */
1909
			$_SESSION['Login_Error'] = gettext("Username or Password incorrect");
1910
			log_auth("webConfigurator authentication error for '{$_POST['usernamefld']}' from {$_SERVER['REMOTE_ADDR']}");
1911
			if (isAjax()) {
1912
				echo "showajaxmessage('{$_SESSION['Login_Error']}');";
1913
				return;
1914
			}
1915
		}
1916
	}
1917

    
1918
	/* Show login page if they aren't logged in */
1919
	if (empty($_SESSION['Logged_In'])) {
1920
		phpsession_end(true);
1921
		return false;
1922
	}
1923

    
1924
	/* If session timeout isn't set, we don't mark sessions stale */
1925
	if (!isset($config['system']['webgui']['session_timeout'])) {
1926
		/* Default to 4 hour timeout if one is not set */
1927
		if ($_SESSION['last_access'] < (time() - 14400)) {
1928
			$_POST['logout'] = true;
1929
			$_SESSION['Logout'] = true;
1930
		} else {
1931
			$_SESSION['last_access'] = time();
1932
		}
1933
	} else if (intval($config['system']['webgui']['session_timeout']) == 0) {
1934
		/* only update if it wasn't ajax */
1935
		if (!isAjax()) {
1936
			$_SESSION['last_access'] = time();
1937
		}
1938
	} else {
1939
		/* Check for stale session */
1940
		if ($_SESSION['last_access'] < (time() - ($config['system']['webgui']['session_timeout'] * 60))) {
1941
			$_POST['logout'] = true;
1942
			$_SESSION['Logout'] = true;
1943
		} else {
1944
			/* only update if it wasn't ajax */
1945
			if (!isAjax()) {
1946
				$_SESSION['last_access'] = time();
1947
			}
1948
		}
1949
	}
1950

    
1951
	/* user hit the logout button */
1952
	if (isset($_POST['logout'])) {
1953

    
1954
		if ($_SESSION['Logout']) {
1955
			log_error(sprintf(gettext("Session timed out for user '%1\$s' from: %2\$s"), $_SESSION['Username'], $_SERVER['REMOTE_ADDR']));
1956
		} else {
1957
			log_error(sprintf(gettext("User logged out for user '%1\$s' from: %2\$s"), $_SESSION['Username'], $_SERVER['REMOTE_ADDR']));
1958
		}
1959

    
1960
		/* wipe out $_SESSION */
1961
		$_SESSION = array();
1962

    
1963
		if (isset($_COOKIE[session_name()])) {
1964
			setcookie(session_name(), '', time()-42000, '/');
1965
		}
1966

    
1967
		/* and destroy it */
1968
		phpsession_destroy();
1969

    
1970
		$scriptName = explode("/", $_SERVER["SCRIPT_FILENAME"]);
1971
		$scriptElms = count($scriptName);
1972
		$scriptName = $scriptName[$scriptElms-1];
1973

    
1974
		if (isAjax()) {
1975
			return false;
1976
		}
1977

    
1978
		/* redirect to page the user is on, it'll prompt them to login again */
1979
		header("Location: {$scriptName}");
1980

    
1981
		return false;
1982
	}
1983

    
1984
	/*
1985
	 * this is for debugging purpose if you do not want to use Ajax
1986
	 * to submit a HTML form. It basically disables the observation
1987
	 * of the submit event and hence does not trigger Ajax.
1988
	 */
1989
	if ($_REQUEST['disable_ajax']) {
1990
		$_SESSION['NO_AJAX'] = "True";
1991
	}
1992

    
1993
	/*
1994
	 * Same to re-enable Ajax.
1995
	 */
1996
	if ($_REQUEST['enable_ajax']) {
1997
		unset($_SESSION['NO_AJAX']);
1998
	}
1999
	phpsession_end(true);
2000
	return true;
2001
}
2002

    
2003
?>
(1-1/60)