Project

General

Profile

Download (59.6 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/*
3
 * auth.inc
4
 *
5
 * part of pfSense (https://www.pfsense.org)
6
 * Copyright (c) 2003-2006 Manuel Kasper <mk@neon1.net>
7
 * Copyright (c) 2005-2006 Bill Marquette <bill.marquette@gmail.com>
8
 * Copyright (c) 2006 Paul Taylor <paultaylor@winn-dixie.com>
9
 * Copyright (c) 2004-2018 Rubicon Communications, LLC (Netgate)
10
 * All rights reserved.
11
 *
12
 * Licensed under the Apache License, Version 2.0 (the "License");
13
 * you may not use this file except in compliance with the License.
14
 * You may obtain a copy of the License at
15
 *
16
 * http://www.apache.org/licenses/LICENSE-2.0
17
 *
18
 * Unless required by applicable law or agreed to in writing, software
19
 * distributed under the License is distributed on an "AS IS" BASIS,
20
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21
 * See the License for the specific language governing permissions and
22
 * limitations under the License.
23
 */
24

    
25
/*
26
 * NOTE : Portions of the mschapv2 support was based on the BSD licensed CHAP.php
27
 * file courtesy of Michael Retterklieber.
28
 */
29
include_once('phpsessionmanager.inc');
30
if (!$do_not_include_config_gui_inc) {
31
	require_once("config.gui.inc");
32
}
33

    
34
// Will be changed to false if security checks fail
35
$security_passed = true;
36

    
37
/* If this function doesn't exist, we're being called from Captive Portal or
38
   another internal subsystem which does not include authgui.inc */
39
if (function_exists("display_error_form")) {
40
	/* Extra layer of lockout protection. Check if the user is in the GUI
41
	 * lockout table before processing a request */
42

    
43
	/* Fetch the contents of the lockout table. */
44
	exec("/sbin/pfctl -t 'webConfiguratorlockout' -T show", $entries);
45

    
46
	/* If the client is in the lockout table, print an error, kill states, and exit */
47
	if (in_array($_SERVER['REMOTE_ADDR'], array_map('trim', $entries))) {
48
		if (!security_checks_disabled()) {
49
			/* They may never see the error since the connection will be cut off, but try to be nice anyhow. */
50
			display_error_form("501", gettext("Access Denied<br/><br/>Access attempt from a temporarily locked out client address.<br /><br />Try accessing the firewall again after the lockout expires."));
51
			/* If they are locked out, they shouldn't have a state. Disconnect their connections. */
52
			$retval = pfSense_kill_states($_SERVER['REMOTE_ADDR']);
53
			if (is_ipaddrv4($_SERVER['REMOTE_ADDR'])) {
54
				$retval = pfSense_kill_states("0.0.0.0/0", $_SERVER['REMOTE_ADDR']);
55
			} elseif (is_ipaddrv6($_SERVER['REMOTE_ADDR'])) {
56
				$retval = pfSense_kill_states("::", $_SERVER['REMOTE_ADDR']);
57
			}
58
			exit;
59
		}
60
		$security_passed = false;
61
	}
62
}
63

    
64
if (function_exists("display_error_form") && !isset($config['system']['webgui']['nodnsrebindcheck'])) {
65
	/* DNS ReBinding attack prevention.  https://redmine.pfsense.org/issues/708 */
66
	$found_host = false;
67

    
68
	/* Either a IPv6 address with or without a alternate port */
69
	if (strstr($_SERVER['HTTP_HOST'], "]")) {
70
		$http_host_port = explode("]", $_SERVER['HTTP_HOST']);
71
		/* v6 address has more parts, drop the last part */
72
		if (count($http_host_port) > 1) {
73
			array_pop($http_host_port);
74
			$http_host = str_replace(array("[", "]"), "", implode(":", $http_host_port));
75
		} else {
76
			$http_host = str_replace(array("[", "]"), "", implode(":", $http_host_port));
77
		}
78
	} else {
79
		$http_host = explode(":", $_SERVER['HTTP_HOST']);
80
		$http_host = $http_host[0];
81
	}
82
	if (is_ipaddr($http_host) or $_SERVER['SERVER_ADDR'] == "127.0.0.1" or
83
		strcasecmp($http_host, "localhost") == 0 or $_SERVER['SERVER_ADDR'] == "::1") {
84
		$found_host = true;
85
	}
86
	if (strcasecmp($http_host, $config['system']['hostname'] . "." . $config['system']['domain']) == 0 or
87
		strcasecmp($http_host, $config['system']['hostname']) == 0) {
88
		$found_host = true;
89
	}
90

    
91
	if (is_array($config['dyndnses']['dyndns']) && !$found_host) {
92
		foreach ($config['dyndnses']['dyndns'] as $dyndns) {
93
			if (strcasecmp($dyndns['host'], $http_host) == 0) {
94
				$found_host = true;
95
				break;
96
			}
97
		}
98
	}
99

    
100
	if (is_array($config['dnsupdates']['dnsupdate']) && !$found_host) {
101
		foreach ($config['dnsupdates']['dnsupdate'] as $rfc2136) {
102
			if (strcasecmp($rfc2136['host'], $http_host) == 0) {
103
				$found_host = true;
104
				break;
105
			}
106
		}
107
	}
108

    
109
	if (!empty($config['system']['webgui']['althostnames']) && !$found_host) {
110
		$althosts = explode(" ", $config['system']['webgui']['althostnames']);
111
		foreach ($althosts as $ah) {
112
			if (strcasecmp($ah, $http_host) == 0 or strcasecmp($ah, $_SERVER['SERVER_ADDR']) == 0) {
113
				$found_host = true;
114
				break;
115
			}
116
		}
117
	}
118

    
119
	if ($found_host == false) {
120
		if (!security_checks_disabled()) {
121
			display_error_form("501", gettext("Potential DNS Rebind attack detected, see http://en.wikipedia.org/wiki/DNS_rebinding<br />Try accessing the router by IP address instead of by hostname."));
122
			exit;
123
		}
124
		$security_passed = false;
125
	}
126
}
127

    
128
// If the HTTP_REFERER is something other than ourselves then disallow.
129
if (function_exists("display_error_form") && !isset($config['system']['webgui']['nohttpreferercheck'])) {
130
	if ($_SERVER['HTTP_REFERER']) {
131
		if (file_exists("{$g['tmp_path']}/setupwizard_lastreferrer")) {
132
			if ($_SERVER['HTTP_REFERER'] == file_get_contents("{$g['tmp_path']}/setupwizard_lastreferrer")) {
133
				unlink("{$g['tmp_path']}/setupwizard_lastreferrer");
134
				header("Refresh: 1; url=index.php");
135
?>
136
<!DOCTYPE html>
137
<html lang="en">
138
<head>
139
	<link rel="stylesheet" href="/css/pfSense.css" />
140
	<title><?=gettext("Redirecting..."); ?></title>
141
</head>
142
<body id="error" class="no-menu">
143
	<div id="jumbotron">
144
		<div class="container">
145
			<div class="col-sm-offset-3 col-sm-6 col-xs-12">
146
				<p><?=gettext("Redirecting to the dashboard...")?></p>
147
			</div>
148
		</div>
149
	</div>
150
</body>
151
</html>
152
<?php
153
				exit;
154
			}
155
		}
156
		$found_host = false;
157
		$referrer_host = parse_url($_SERVER['HTTP_REFERER'], PHP_URL_HOST);
158
		$referrer_host = str_replace(array("[", "]"), "", $referrer_host);
159
		if ($referrer_host) {
160
			if (strcasecmp($referrer_host, $config['system']['hostname'] . "." . $config['system']['domain']) == 0 ||
161
			    strcasecmp($referrer_host, $config['system']['hostname']) == 0) {
162
				$found_host = true;
163
			}
164

    
165
			if (!empty($config['system']['webgui']['althostnames']) && !$found_host) {
166
				$althosts = explode(" ", $config['system']['webgui']['althostnames']);
167
				foreach ($althosts as $ah) {
168
					if (strcasecmp($referrer_host, $ah) == 0) {
169
						$found_host = true;
170
						break;
171
					}
172
				}
173
			}
174

    
175
			if (is_array($config['dyndnses']['dyndns']) && !$found_host) {
176
				foreach ($config['dyndnses']['dyndns'] as $dyndns) {
177
					if (strcasecmp($dyndns['host'], $referrer_host) == 0) {
178
						$found_host = true;
179
						break;
180
					}
181
				}
182
			}
183

    
184
			if (is_array($config['dnsupdates']['dnsupdate']) && !$found_host) {
185
				foreach ($config['dnsupdates']['dnsupdate'] as $rfc2136) {
186
					if (strcasecmp($rfc2136['host'], $referrer_host) == 0) {
187
						$found_host = true;
188
						break;
189
					}
190
				}
191
			}
192

    
193
			if (!$found_host) {
194
				$interface_list_ips = get_configured_ip_addresses();
195
				foreach ($interface_list_ips as $ilips) {
196
					if (strcasecmp($referrer_host, $ilips) == 0) {
197
						$found_host = true;
198
						break;
199
					}
200
				}
201
				$interface_list_ipv6s = get_configured_ipv6_addresses(true);
202
				foreach ($interface_list_ipv6s as $ilipv6s) {
203
					$ilipv6s = explode('%', $ilipv6s)[0];
204
					if (strcasecmp($referrer_host, $ilipv6s) == 0) {
205
						$found_host = true;
206
						break;
207
					}
208
				}
209
				if ($referrer_host == "127.0.0.1" || $referrer_host == "localhost") {
210
					// allow SSH port forwarded connections and links from localhost
211
					$found_host = true;
212
				}
213
			}
214
		}
215
		if ($found_host == false) {
216
			if (!security_checks_disabled()) {
217
				display_error_form("501", "An HTTP_REFERER was detected other than what is defined in System -> Advanced (" . htmlspecialchars($_SERVER['HTTP_REFERER']) . ").  If not needed, this check can be disabled in System -> Advanced -> Admin.");
218
				exit;
219
			}
220
			$security_passed = false;
221
		}
222
	} else {
223
		$security_passed = false;
224
	}
225
}
226

    
227
if (function_exists("display_error_form") && $security_passed) {
228
	/* Security checks passed, so it should be OK to turn them back on */
229
	restore_security_checks();
230
}
231
unset($security_passed);
232

    
233
$groupindex = index_groups();
234
$userindex = index_users();
235

    
236
function index_groups() {
237
	global $g, $debug, $config, $groupindex;
238

    
239
	$groupindex = array();
240

    
241
	if (is_array($config['system']['group'])) {
242
		$i = 0;
243
		foreach ($config['system']['group'] as $groupent) {
244
			$groupindex[$groupent['name']] = $i;
245
			$i++;
246
		}
247
	}
248

    
249
	return ($groupindex);
250
}
251

    
252
function index_users() {
253
	global $g, $debug, $config;
254

    
255
	if (is_array($config['system']['user'])) {
256
		$i = 0;
257
		foreach ($config['system']['user'] as $userent) {
258
			$userindex[$userent['name']] = $i;
259
			$i++;
260
		}
261
	}
262

    
263
	return ($userindex);
264
}
265

    
266
function & getUserEntry($name) {
267
	global $debug, $config, $userindex;
268
	$authcfg = auth_get_authserver($config['system']['webgui']['authmode']);
269

    
270
	if (isset($userindex[$name])) {
271
		return $config['system']['user'][$userindex[$name]];
272
	} elseif ($authcfg['type'] != "Local Database") {
273
		$user = array();
274
		$user['name'] = $name;
275
		return $user;
276
	}
277
}
278

    
279
function & getUserEntryByUID($uid) {
280
	global $debug, $config;
281

    
282
	if (is_array($config['system']['user'])) {
283
		foreach ($config['system']['user'] as & $user) {
284
			if ($user['uid'] == $uid) {
285
				return $user;
286
			}
287
		}
288
	}
289

    
290
	return false;
291
}
292

    
293
function & getGroupEntry($name) {
294
	global $debug, $config, $groupindex;
295
	if (isset($groupindex[$name])) {
296
		return $config['system']['group'][$groupindex[$name]];
297
	}
298
}
299

    
300
function & getGroupEntryByGID($gid) {
301
	global $debug, $config;
302

    
303
	if (is_array($config['system']['group'])) {
304
		foreach ($config['system']['group'] as & $group) {
305
			if ($group['gid'] == $gid) {
306
				return $group;
307
			}
308
		}
309
	}
310

    
311
	return false;
312
}
313

    
314
function get_user_privileges(& $user) {
315
	global $config, $_SESSION;
316

    
317
	$authcfg = auth_get_authserver($config['system']['webgui']['authmode']);
318
	$allowed_groups = array();
319

    
320
	$privs = $user['priv'];
321
	if (!is_array($privs)) {
322
		$privs = array();
323
	}
324

    
325
	// cache auth results for a short time to ease load on auth services & logs
326
	if (isset($config['system']['webgui']['auth_refresh_time'])) {
327
		$recheck_time = $config['system']['webgui']['auth_refresh_time'];
328
	} else {
329
		$recheck_time = 30;
330
	}
331

    
332
	if ($authcfg['type'] == "ldap") {
333
		if (isset($_SESSION["ldap_allowed_groups"]) &&
334
		    (time() <= $_SESSION["auth_check_time"] + $recheck_time)) {
335
			$allowed_groups = $_SESSION["ldap_allowed_groups"];
336
		} else {
337
			$allowed_groups = @ldap_get_groups($user['name'], $authcfg);
338
			$_SESSION["ldap_allowed_groups"] = $allowed_groups;
339
			$_SESSION["auth_check_time"] = time();
340
		}
341
	} elseif ($authcfg['type'] == "radius") {
342
		if (isset($_SESSION["radius_allowed_groups"]) &&
343
		    (time() <= $_SESSION["auth_check_time"] + $recheck_time)) {
344
			$allowed_groups = $_SESSION["radius_allowed_groups"];
345
		} else {
346
			$allowed_groups = @radius_get_groups($_SESSION['user_radius_attributes']);
347
			$_SESSION["radius_allowed_groups"] = $allowed_groups;
348
			$_SESSION["auth_check_time"] = time();
349
		}
350
	}
351

    
352
	if (empty($allowed_groups)) {
353
		$allowed_groups = local_user_get_groups($user, true);
354
	}
355

    
356
	if (is_array($allowed_groups)) {
357
		foreach ($allowed_groups as $name) {
358
			$group = getGroupEntry($name);
359
			if (is_array($group['priv'])) {
360
				$privs = array_merge($privs, $group['priv']);
361
			}
362
		}
363
	}
364

    
365
	return $privs;
366
}
367

    
368
function userHasPrivilege($userent, $privid = false) {
369

    
370
	if (!$privid || !is_array($userent)) {
371
		return false;
372
	}
373

    
374
	$privs = get_user_privileges($userent);
375

    
376
	if (!is_array($privs)) {
377
		return false;
378
	}
379

    
380
	if (!in_array($privid, $privs)) {
381
		return false;
382
	}
383

    
384
	return true;
385
}
386

    
387
function local_backed($username, $passwd) {
388

    
389
	$user = getUserEntry($username);
390
	if (!$user) {
391
		return false;
392
	}
393

    
394
	if (is_account_disabled($username) || is_account_expired($username)) {
395
		return false;
396
	}
397

    
398
	if ($user['bcrypt-hash']) {
399
		if (password_verify($passwd, $user['bcrypt-hash'])) {
400
			return true;
401
		}
402
	}
403

    
404
	//for backwards compatibility
405
	if ($user['password']) {
406
		if (crypt($passwd, $user['password']) == $user['password']) {
407
			return true;
408
		}
409
	}
410

    
411
	if ($user['md5-hash']) {
412
		if (md5($passwd) == $user['md5-hash']) {
413
			return true;
414
		}
415
	}
416

    
417
	return false;
418
}
419

    
420
function local_sync_accounts($u2add, $u2del, $g2add, $g2del) {
421
	global $config, $debug;
422

    
423
	if (empty($u2add) && empty($u2del) && empty($g2add) && empty($g2del)) {
424
		/* Nothing to be done here */
425
		return;
426
	}
427

    
428
	foreach($u2del as $user) {
429
		if ($user['uid'] < 2000 || $user['uid'] > 65000) {
430
			continue;
431
		}
432

    
433
		/*
434
		 * If a crontab was created to user, pw userdel will be
435
		 * interactive and can cause issues. Just remove crontab
436
		 * before run it when necessary
437
		 */
438
		unlink_if_exists("/var/cron/tabs/{$user['name']}");
439
		$cmd = "/usr/sbin/pw userdel -n " .
440
		    escapeshellarg($user['name']);
441
		if ($debug) {
442
			log_error(sprintf(gettext("Running: %s"), $cmd));
443
		}
444
		mwexec($cmd);
445
		local_group_del_user($user);
446

    
447
		$system_user = $config['system']['user'];
448
		for ($i = 0; $i < count($system_user); $i++) {
449
			if ($system_user[$i]['name'] == $user['name']) {
450
				log_error("Removing user: {$user['name']}");
451
				unset($config['system']['user'][$i]);
452
				break;
453
			}
454
		}
455
	}
456

    
457
	foreach($g2del as $group) {
458
		if ($group['gid'] < 1999 || $group['gid'] > 65000) {
459
			continue;
460
		}
461

    
462
		$cmd = "/usr/sbin/pw groupdel -g " .
463
		    escapeshellarg($group['name']);
464
		if ($debug) {
465
			log_error(sprintf(gettext("Running: %s"), $cmd));
466
		}
467
		mwexec($cmd);
468

    
469
		$system_group = $config['system']['group'];
470
		for ($i = 0; $i < count($system_group); $i++) {
471
			if ($system_group[$i]['name'] == $group['name']) {
472
				log_error("Removing group: {$group['name']}");
473
				unset($config['system']['group'][$i]);
474
				break;
475
			}
476
		}
477
	}
478

    
479
	foreach ($u2add as $user) {
480
		log_error("Adding user: {$user['name']}");
481
		$config['system']['user'][] = $user;
482
	}
483

    
484
	foreach ($g2add as $group) {
485
		log_error("Adding group: {$group['name']}");
486
		$config['system']['group'][] = $group;
487
	}
488

    
489
	/* Sort it alphabetically */
490
	usort($config['system']['user'], function($a, $b) {
491
		return strcmp($a['name'], $b['name']);
492
	});
493
	usort($config['system']['group'], function($a, $b) {
494
		return strcmp($a['name'], $b['name']);
495
	});
496

    
497
	write_config("Sync'd users and groups via XMLRPC");
498

    
499
	/* make sure the all group exists */
500
	$allgrp = getGroupEntryByGID(1998);
501
	local_group_set($allgrp, true);
502

    
503
	foreach ($u2add as $user) {
504
		local_user_set($user);
505
	}
506

    
507
	foreach ($g2add as $group) {
508
		local_group_set($group);
509
	}
510
}
511

    
512
function local_reset_accounts() {
513
	global $debug, $config;
514

    
515
	/* remove local users to avoid uid conflicts */
516
	$fd = popen("/usr/sbin/pw usershow -a", "r");
517
	if ($fd) {
518
		while (!feof($fd)) {
519
			$line = explode(":", fgets($fd));
520
			if ($line[0] != "admin") {
521
				if (!strncmp($line[0], "_", 1)) {
522
					continue;
523
				}
524
				if ($line[2] < 2000) {
525
					continue;
526
				}
527
				if ($line[2] > 65000) {
528
					continue;
529
				}
530
			}
531
			/*
532
			 * If a crontab was created to user, pw userdel will be interactive and
533
			 * can cause issues. Just remove crontab before run it when necessary
534
			 */
535
			unlink_if_exists("/var/cron/tabs/{$line[0]}");
536
			$cmd = "/usr/sbin/pw userdel -n " . escapeshellarg($line[0]);
537
			if ($debug) {
538
				log_error(sprintf(gettext("Running: %s"), $cmd));
539
			}
540
			mwexec($cmd);
541
		}
542
		pclose($fd);
543
	}
544

    
545
	/* remove local groups to avoid gid conflicts */
546
	$gids = array();
547
	$fd = popen("/usr/sbin/pw groupshow -a", "r");
548
	if ($fd) {
549
		while (!feof($fd)) {
550
			$line = explode(":", fgets($fd));
551
			if (!strncmp($line[0], "_", 1)) {
552
				continue;
553
			}
554
			if ($line[2] < 2000) {
555
				continue;
556
			}
557
			if ($line[2] > 65000) {
558
				continue;
559
			}
560
			$cmd = "/usr/sbin/pw groupdel -g " . escapeshellarg($line[2]);
561
			if ($debug) {
562
				log_error(sprintf(gettext("Running: %s"), $cmd));
563
			}
564
			mwexec($cmd);
565
		}
566
		pclose($fd);
567
	}
568

    
569
	/* make sure the all group exists */
570
	$allgrp = getGroupEntryByGID(1998);
571
	local_group_set($allgrp, true);
572

    
573
	/* sync all local users */
574
	if (is_array($config['system']['user'])) {
575
		foreach ($config['system']['user'] as $user) {
576
			local_user_set($user);
577
		}
578
	}
579

    
580
	/* sync all local groups */
581
	if (is_array($config['system']['group'])) {
582
		foreach ($config['system']['group'] as $group) {
583
			local_group_set($group);
584
		}
585
	}
586
}
587

    
588
function local_user_set(& $user) {
589
	global $g, $debug;
590

    
591
	if (empty($user['password']) && empty($user['bcrypt-hash'])) {
592
		log_error("There is something wrong in the config because user {$user['name']} password is missing!");
593
		return;
594
	}
595

    
596

    
597
	$home_base = "/home/";
598
	$user_uid = $user['uid'];
599
	$user_name = $user['name'];
600
	$user_home = "{$home_base}{$user_name}";
601
	$user_shell = "/etc/rc.initial";
602
	$user_group = "nobody";
603

    
604
	// Ensure $home_base exists and is writable
605
	if (!is_dir($home_base)) {
606
		mkdir($home_base, 0755);
607
	}
608

    
609
	$lock_account = false;
610
	/* configure shell type */
611
	/* Cases here should be ordered by most privileged to least privileged. */
612
	if (userHasPrivilege($user, "user-shell-access") || userHasPrivilege($user, "page-all")) {
613
		$user_shell = "/bin/tcsh";
614
	} elseif (userHasPrivilege($user, "user-copy-files-chroot")) {
615
		$user_shell = "/usr/local/sbin/scponlyc";
616
	} elseif (userHasPrivilege($user, "user-copy-files")) {
617
		$user_shell = "/usr/local/bin/scponly";
618
	} elseif (userHasPrivilege($user, "user-ssh-tunnel")) {
619
		$user_shell = "/usr/local/sbin/ssh_tunnel_shell";
620
	} elseif (userHasPrivilege($user, "user-ipsec-xauth-dialin")) {
621
		$user_shell = "/sbin/nologin";
622
	} else {
623
		$user_shell = "/sbin/nologin";
624
		$lock_account = true;
625
	}
626

    
627
	/* Lock out disabled or expired users, unless it's root/admin. */
628
	if ((is_account_disabled($user_name) || is_account_expired($user_name)) && ($user_uid != 0)) {
629
		$user_shell = "/sbin/nologin";
630
		$lock_account = true;
631
	}
632

    
633
	/* root user special handling */
634
	if ($user_uid == 0) {
635
		$cmd = "/usr/sbin/pw usermod -q -n root -s /bin/sh -H 0";
636
		if ($debug) {
637
			log_error(sprintf(gettext("Running: %s"), $cmd));
638
		}
639
		$fd = popen($cmd, "w");
640
		if (empty($user['bcrypt-hash'])) {
641
			fwrite($fd, $user['password']);
642
		} else {
643
			fwrite($fd, $user['bcrypt-hash']);
644
		}
645
		pclose($fd);
646
		$user_group = "wheel";
647
		$user_home = "/root";
648
		$user_shell = "/etc/rc.initial";
649
	}
650

    
651
	/* read from pw db */
652
	$fd = popen("/usr/sbin/pw usershow -n {$user_name} 2>&1", "r");
653
	$pwread = fgets($fd);
654
	pclose($fd);
655
	$userattrs = explode(":", trim($pwread));
656

    
657
	$skel_dir = '/etc/skel';
658

    
659
	/* determine add or mod */
660
	if (($userattrs[0] != $user['name']) || (!strncmp($pwread, "pw:", 3))) {
661
		$user_op = "useradd -m -k " . escapeshellarg($skel_dir) . " -o";
662
	} else {
663
		$user_op = "usermod";
664
	}
665

    
666
	$comment = str_replace(array(":", "!", "@"), " ", $user['descr']);
667
	/* add or mod pw db */
668
	$cmd = "/usr/sbin/pw {$user_op} -q " .
669
			" -u " . escapeshellarg($user_uid) .
670
			" -n " . escapeshellarg($user_name) .
671
			" -g " . escapeshellarg($user_group) .
672
			" -s " . escapeshellarg($user_shell) .
673
			" -d " . escapeshellarg($user_home) .
674
			" -c " . escapeshellarg($comment) .
675
			" -H 0 2>&1";
676

    
677
	if ($debug) {
678
		log_error(sprintf(gettext("Running: %s"), $cmd));
679
	}
680
	$fd = popen($cmd, "w");
681
	if (empty($user['bcrypt-hash'])) {
682
		fwrite($fd, $user['password']);
683
	} else {
684
		fwrite($fd, $user['bcrypt-hash']);
685
	}
686
	pclose($fd);
687

    
688
	/* create user directory if required */
689
	if (!is_dir($user_home)) {
690
		mkdir($user_home, 0700);
691
	}
692
	@chown($user_home, $user_name);
693
	@chgrp($user_home, $user_group);
694

    
695
	/* Make sure all users have last version of config files */
696
	foreach (glob("{$skel_dir}/dot.*") as $dot_file) {
697
		$target = $user_home . '/' . substr(basename($dot_file), 3);
698
		@copy($dot_file, $target);
699
		@chown($target, $user_name);
700
		@chgrp($target, $user_group);
701
	}
702

    
703
	/* write out ssh authorized key file */
704
	if ($user['authorizedkeys']) {
705
		if (!is_dir("{$user_home}/.ssh")) {
706
			@mkdir("{$user_home}/.ssh", 0700);
707
			@chown("{$user_home}/.ssh", $user_name);
708
		}
709
		$keys = base64_decode($user['authorizedkeys']);
710
		@file_put_contents("{$user_home}/.ssh/authorized_keys", $keys);
711
		@chown("{$user_home}/.ssh/authorized_keys", $user_name);
712
	} else {
713
		unlink_if_exists("{$user_home}/.ssh/authorized_keys");
714
	}
715

    
716
	$un = $lock_account ? "" : "un";
717
	exec("/usr/sbin/pw {$un}lock " . escapeshellarg($user_name) . " -q 2>/dev/null");
718

    
719
}
720

    
721
function local_user_del($user) {
722
	global $debug;
723

    
724
	/* remove all memberships */
725
	local_user_set_groups($user);
726

    
727
	/* Don't remove /root */
728
	if ($user['uid'] != 0) {
729
		$rmhome = "-r";
730
	}
731

    
732
	/* read from pw db */
733
	$fd = popen("/usr/sbin/pw usershow -n {$user['name']} 2>&1", "r");
734
	$pwread = fgets($fd);
735
	pclose($fd);
736
	$userattrs = explode(":", trim($pwread));
737

    
738
	if ($userattrs[0] != $user['name']) {
739
		log_error("Tried to remove user {$user['name']} but got user {$userattrs[0]} instead. Bailing.");
740
		return;
741
	}
742

    
743
	/* delete from pw db */
744
	$cmd = "/usr/sbin/pw userdel -n " . escapeshellarg($user['name']) . " " . escapeshellarg($rmhome);
745

    
746
	if ($debug) {
747
		log_error(sprintf(gettext("Running: %s"), $cmd));
748
	}
749
	mwexec($cmd);
750

    
751
	/* Delete user from groups needs a call to write_config() */
752
	local_group_del_user($user);
753
}
754

    
755
function local_user_set_password(&$user, $password) {
756
	unset($user['password']);
757
	unset($user['md5-hash']);
758
	$user['bcrypt-hash'] = password_hash($password, PASSWORD_BCRYPT);
759
}
760

    
761
function local_user_get_groups($user, $all = false) {
762
	global $debug, $config;
763

    
764
	$groups = array();
765
	if (!is_array($config['system']['group'])) {
766
		return $groups;
767
	}
768

    
769
	foreach ($config['system']['group'] as $group) {
770
		if ($all || (!$all && ($group['name'] != "all"))) {
771
			if (is_array($group['member'])) {
772
				if (in_array($user['uid'], $group['member'])) {
773
					$groups[] = $group['name'];
774
				}
775
			}
776
		}
777
	}
778

    
779
	if ($all) {
780
		$groups[] = "all";
781
	}
782

    
783
	sort($groups);
784

    
785
	return $groups;
786

    
787
}
788

    
789
function local_user_set_groups($user, $new_groups = NULL) {
790
	global $debug, $config, $groupindex, $userindex;
791

    
792
	if (!is_array($config['system']['group'])) {
793
		return;
794
	}
795

    
796
	$cur_groups = local_user_get_groups($user, true);
797
	$mod_groups = array();
798

    
799
	if (!is_array($new_groups)) {
800
		$new_groups = array();
801
	}
802

    
803
	if (!is_array($cur_groups)) {
804
		$cur_groups = array();
805
	}
806

    
807
	/* determine which memberships to add */
808
	foreach ($new_groups as $groupname) {
809
		if ($groupname == '' || in_array($groupname, $cur_groups)) {
810
			continue;
811
		}
812
		$group = & $config['system']['group'][$groupindex[$groupname]];
813
		$group['member'][] = $user['uid'];
814
		$mod_groups[] = $group;
815

    
816
		/*
817
		 * If it's a new user, make sure it is added before try to
818
		 * add it as a member of a group
819
		 */
820
		if (!isset($userindex[$user['uid']])) {
821
			local_user_set($user);
822
		}
823
	}
824
	unset($group);
825

    
826
	/* determine which memberships to remove */
827
	foreach ($cur_groups as $groupname) {
828
		if (in_array($groupname, $new_groups)) {
829
			continue;
830
		}
831
		if (!isset($config['system']['group'][$groupindex[$groupname]])) {
832
			continue;
833
		}
834
		$group = & $config['system']['group'][$groupindex[$groupname]];
835
		if (is_array($group['member'])) {
836
			$index = array_search($user['uid'], $group['member']);
837
			array_splice($group['member'], $index, 1);
838
			$mod_groups[] = $group;
839
		}
840
	}
841
	unset($group);
842

    
843
	/* sync all modified groups */
844
	foreach ($mod_groups as $group) {
845
		local_group_set($group);
846
	}
847
}
848

    
849
function local_group_del_user($user) {
850
	global $config;
851

    
852
	if (!is_array($config['system']['group'])) {
853
		return;
854
	}
855

    
856
	foreach ($config['system']['group'] as $group) {
857
		if (is_array($group['member'])) {
858
			foreach ($group['member'] as $idx => $uid) {
859
				if ($user['uid'] == $uid) {
860
					unset($config['system']['group']['member'][$idx]);
861
				}
862
			}
863
		}
864
	}
865
}
866

    
867
function local_group_set($group, $reset = false) {
868
	global $debug;
869

    
870
	$group_name = $group['name'];
871
	$group_gid = $group['gid'];
872
	$group_members = '';
873

    
874
	if (!$reset && !empty($group['member']) && count($group['member']) > 0) {
875
		$group_members = implode(",", $group['member']);
876
	}
877

    
878
	if (empty($group_name)) {
879
		return;
880
	}
881

    
882
	// If the group is now remote, make sure there is no local group with the same name
883
	if ($group['scope'] == "remote") {
884
		local_group_del($group);
885
		return;
886
	}
887

    
888
	/* determine add or mod */
889
	if (mwexec("/usr/sbin/pw groupshow -g " . escapeshellarg($group_gid) . " 2>&1", true) == 0) {
890
		$group_op = "groupmod -l";
891
	} else {
892
		$group_op = "groupadd -n";
893
	}
894

    
895
	/* add or mod group db */
896
	$cmd = "/usr/sbin/pw {$group_op} " .
897
		escapeshellarg($group_name) .
898
		" -g " . escapeshellarg($group_gid) .
899
		" -M " . escapeshellarg($group_members) . " 2>&1";
900

    
901
	if ($debug) {
902
		log_error(sprintf(gettext("Running: %s"), $cmd));
903
	}
904

    
905
	mwexec($cmd);
906
}
907

    
908
function local_group_del($group) {
909
	global $debug;
910

    
911
	/* delete from group db */
912
	$cmd = "/usr/sbin/pw groupdel " . escapeshellarg($group['name']);
913

    
914
	if ($debug) {
915
		log_error(sprintf(gettext("Running: %s"), $cmd));
916
	}
917
	mwexec($cmd);
918
}
919

    
920
function ldap_test_connection($authcfg) {
921
	if ($authcfg) {
922
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
923
			$ldapproto = "ldaps";
924
		} else {
925
			$ldapproto = "ldap";
926
		}
927
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
928
		$ldapport = $authcfg['ldap_port'];
929
		if (!empty($ldapport)) {
930
			$ldapserver .= ":{$ldapport}";
931
		}
932
	} else {
933
		return false;
934
	}
935

    
936
	/* first check if there is even an LDAP server populated */
937
	if (!$ldapserver) {
938
		return false;
939
	}
940

    
941
	/* Setup CA environment if needed. */
942
	ldap_setup_caenv($authcfg);
943

    
944
	/* connect and see if server is up */
945
	$error = false;
946
	if (!($ldap = ldap_connect($ldapserver))) {
947
		$error = true;
948
	}
949

    
950
	if ($error == true) {
951
		log_error(sprintf(gettext("ERROR!  Could not connect to server %s."), $authcfg['name']));
952
		return false;
953
	}
954

    
955
	return true;
956
}
957

    
958
function ldap_setup_caenv($authcfg) {
959
	global $g;
960
	require_once("certs.inc");
961

    
962
	unset($caref);
963
	if (empty($authcfg['ldap_caref']) || strstr($authcfg['ldap_urltype'], "Standard")) {
964
		putenv('LDAPTLS_REQCERT=never');
965
		return;
966
	} elseif ($authcfg['ldap_caref'] == "global") {
967
		putenv('LDAPTLS_REQCERT=hard');
968
		putenv("LDAPTLS_CACERTDIR=/etc/ssl/");
969
		putenv("LDAPTLS_CACERT=/etc/ssl/cert.pem");
970
	} else {
971
		$caref = lookup_ca($authcfg['ldap_caref']);
972
		$param = array('caref' => $authcfg['ldap_caref']);
973
		$cachain = ca_chain($param);
974
		if (!$caref) {
975
			log_error(sprintf(gettext("LDAP: Could not lookup CA by reference for host %s."), $authcfg['ldap_caref']));
976
			/* XXX: Prevent for credential leaking since we cannot setup the CA env. Better way? */
977
			putenv('LDAPTLS_REQCERT=hard');
978
			return;
979
		}
980
		if (!is_dir("{$g['varrun_path']}/certs")) {
981
			@mkdir("{$g['varrun_path']}/certs");
982
		}
983
		if (file_exists("{$g['varrun_path']}/certs/{$caref['refid']}.ca")) {
984
			@unlink("{$g['varrun_path']}/certs/{$caref['refid']}.ca");
985
		}
986
		file_put_contents("{$g['varrun_path']}/certs/{$caref['refid']}.ca", $cachain);
987
		@chmod("{$g['varrun_path']}/certs/{$caref['refid']}.ca", 0600);
988
		putenv('LDAPTLS_REQCERT=hard');
989
		/* XXX: Probably even the hashed link should be created for this? */
990
		putenv("LDAPTLS_CACERTDIR={$g['varrun_path']}/certs");
991
		putenv("LDAPTLS_CACERT={$g['varrun_path']}/certs/{$caref['refid']}.ca");
992
	}
993
}
994

    
995
function ldap_test_bind($authcfg) {
996
	global $debug, $config, $g;
997

    
998
	if ($authcfg) {
999
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1000
			$ldapproto = "ldaps";
1001
		} else {
1002
			$ldapproto = "ldap";
1003
		}
1004
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1005
		$ldapport = $authcfg['ldap_port'];
1006
		if (!empty($ldapport)) {
1007
			$ldapserver .= ":{$ldapport}";
1008
		}
1009
		$ldapbasedn = $authcfg['ldap_basedn'];
1010
		$ldapbindun = $authcfg['ldap_binddn'];
1011
		$ldapbindpw = $authcfg['ldap_bindpw'];
1012
		$ldapver = $authcfg['ldap_protver'];
1013
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1014
		if (empty($ldapbindun) || empty($ldapbindpw)) {
1015
			$ldapanon = true;
1016
		} else {
1017
			$ldapanon = false;
1018
		}
1019
	} else {
1020
		return false;
1021
	}
1022

    
1023
	/* first check if there is even an LDAP server populated */
1024
	if (!$ldapserver) {
1025
		return false;
1026
	}
1027

    
1028
	/* Setup CA environment if needed. */
1029
	ldap_setup_caenv($authcfg);
1030

    
1031
	/* connect and see if server is up */
1032
	$error = false;
1033
	if (!($ldap = ldap_connect($ldapserver))) {
1034
		$error = true;
1035
	}
1036

    
1037
	if ($error == true) {
1038
		log_error(sprintf(gettext("ERROR!  Could not connect to server %s."), $ldapname));
1039
		return false;
1040
	}
1041

    
1042
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1043
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1044
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1045
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1046
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1047

    
1048
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1049
		if (!(@ldap_start_tls($ldap))) {
1050
			log_error(sprintf(gettext("ERROR! ldap_test_bind() could not STARTTLS to server %s."), $ldapname));
1051
			@ldap_close($ldap);
1052
			return false;
1053
		}
1054
	}
1055

    
1056
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1057
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1058
	if ($ldapanon == true) {
1059
		if (!($res = @ldap_bind($ldap))) {
1060
			@ldap_close($ldap);
1061
			return false;
1062
		}
1063
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1064
		@ldap_close($ldap);
1065
		return false;
1066
	}
1067

    
1068
	@ldap_unbind($ldap);
1069

    
1070
	return true;
1071
}
1072

    
1073
function ldap_get_user_ous($show_complete_ou=true, $authcfg) {
1074
	global $debug, $config, $g;
1075

    
1076
	if (!function_exists("ldap_connect")) {
1077
		return;
1078
	}
1079

    
1080
	$ous = array();
1081

    
1082
	if ($authcfg) {
1083
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1084
			$ldapproto = "ldaps";
1085
		} else {
1086
			$ldapproto = "ldap";
1087
		}
1088
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1089
		$ldapport = $authcfg['ldap_port'];
1090
		if (!empty($ldapport)) {
1091
			$ldapserver .= ":{$ldapport}";
1092
		}
1093
		$ldapbasedn = $authcfg['ldap_basedn'];
1094
		$ldapbindun = $authcfg['ldap_binddn'];
1095
		$ldapbindpw = $authcfg['ldap_bindpw'];
1096
		$ldapver = $authcfg['ldap_protver'];
1097
		if (empty($ldapbindun) || empty($ldapbindpw)) {
1098
			$ldapanon = true;
1099
		} else {
1100
			$ldapanon = false;
1101
		}
1102
		$ldapname = $authcfg['name'];
1103
		$ldapfallback = false;
1104
		$ldapscope = $authcfg['ldap_scope'];
1105
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1106
	} else {
1107
		return false;
1108
	}
1109

    
1110
	/* first check if there is even an LDAP server populated */
1111
	if (!$ldapserver) {
1112
		log_error(gettext("ERROR!  ldap_get_user_ous() backed selected with no LDAP authentication server defined."));
1113
		return $ous;
1114
	}
1115

    
1116
	/* Setup CA environment if needed. */
1117
	ldap_setup_caenv($authcfg);
1118

    
1119
	/* connect and see if server is up */
1120
	$error = false;
1121
	if (!($ldap = ldap_connect($ldapserver))) {
1122
		$error = true;
1123
	}
1124

    
1125
	if ($error == true) {
1126
		log_error(sprintf(gettext("ERROR!  Could not connect to server %s."), $ldapname));
1127
		return $ous;
1128
	}
1129

    
1130
	$ldapfilter = "(|(ou=*)(cn=Users))";
1131

    
1132
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1133
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1134
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1135
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1136
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1137

    
1138
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1139
		if (!(@ldap_start_tls($ldap))) {
1140
			log_error(sprintf(gettext("ERROR! ldap_get_user_ous() could not STARTTLS to server %s."), $ldapname));
1141
			@ldap_close($ldap);
1142
			return false;
1143
		}
1144
	}
1145

    
1146
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1147
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1148
	if ($ldapanon == true) {
1149
		if (!($res = @ldap_bind($ldap))) {
1150
			log_error(sprintf(gettext("ERROR! ldap_get_user_ous() could not bind anonymously to server %s."), $ldapname));
1151
			@ldap_close($ldap);
1152
			return $ous;
1153
		}
1154
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1155
		log_error(sprintf(gettext("ERROR! ldap_get_user_ous() could not bind to server %s."), $ldapname));
1156
		@ldap_close($ldap);
1157
		return $ous;
1158
	}
1159

    
1160
	if ($ldapscope == "one") {
1161
		$ldapfunc = "ldap_list";
1162
	} else {
1163
		$ldapfunc = "ldap_search";
1164
	}
1165

    
1166
	$search = @$ldapfunc($ldap, $ldapbasedn, $ldapfilter);
1167
	$info = @ldap_get_entries($ldap, $search);
1168

    
1169
	if (is_array($info)) {
1170
		foreach ($info as $inf) {
1171
			if (!$show_complete_ou) {
1172
				$inf_split = explode(",", $inf['dn']);
1173
				$ou = $inf_split[0];
1174
				$ou = str_replace("OU=", "", $ou);
1175
				$ou = str_replace("CN=", "", $ou);
1176
			} else {
1177
				if ($inf['dn']) {
1178
					$ou = $inf['dn'];
1179
				}
1180
			}
1181
			if ($ou) {
1182
				$ous[] = $ou;
1183
			}
1184
		}
1185
	}
1186

    
1187
	@ldap_unbind($ldap);
1188

    
1189
	return $ous;
1190
}
1191

    
1192
function ldap_get_groups($username, $authcfg) {
1193
	global $debug, $config;
1194

    
1195
	if (!function_exists("ldap_connect")) {
1196
		return;
1197
	}
1198

    
1199
	if (!$username) {
1200
		return false;
1201
	}
1202

    
1203
	if (!isset($authcfg['ldap_nostrip_at']) && stristr($username, "@")) {
1204
		$username_split = explode("@", $username);
1205
		$username = $username_split[0];
1206
	}
1207

    
1208
	if (stristr($username, "\\")) {
1209
		$username_split = explode("\\", $username);
1210
		$username = $username_split[0];
1211
	}
1212

    
1213
	//log_error("Getting LDAP groups for {$username}.");
1214
	if ($authcfg) {
1215
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1216
			$ldapproto = "ldaps";
1217
		} else {
1218
			$ldapproto = "ldap";
1219
		}
1220
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1221
		$ldapport = $authcfg['ldap_port'];
1222
		if (!empty($ldapport)) {
1223
			$ldapserver .= ":{$ldapport}";
1224
		}
1225
		$ldapbasedn = $authcfg['ldap_basedn'];
1226
		$ldapbindun = $authcfg['ldap_binddn'];
1227
		$ldapbindpw = $authcfg['ldap_bindpw'];
1228
		$ldapauthcont = $authcfg['ldap_authcn'];
1229
		$ldapnameattribute = strtolower($authcfg['ldap_attr_user']);
1230
		$ldapgroupattribute = strtolower($authcfg['ldap_attr_member']);
1231
		if (isset($authcfg['ldap_rfc2307'])) {
1232
			$ldapfilter         = "(&(objectClass={$authcfg['ldap_attr_groupobj']})({$ldapgroupattribute}={$username}))";
1233
		} else {
1234
			$ldapfilter         = "({$ldapnameattribute}={$username})";
1235
		}
1236
		$ldaptype = "";
1237
		$ldapver = $authcfg['ldap_protver'];
1238
		if (empty($ldapbindun) || empty($ldapbindpw)) {
1239
			$ldapanon = true;
1240
		} else {
1241
			$ldapanon = false;
1242
		}
1243
		$ldapname = $authcfg['name'];
1244
		$ldapfallback = false;
1245
		$ldapscope = $authcfg['ldap_scope'];
1246
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1247
	} else {
1248
		return false;
1249
	}
1250

    
1251
	if (isset($authcfg['ldap_rfc2307'])) {
1252
		$ldapdn = $ldapbasedn;
1253
	} else {
1254
		$ldapdn = $_SESSION['ldapdn'];
1255
	}
1256

    
1257
	/*Convert attribute to lowercase.  php ldap arrays put everything in lowercase */
1258
	$ldapgroupattribute = strtolower($ldapgroupattribute);
1259
	$memberof = array();
1260

    
1261
	/* Setup CA environment if needed. */
1262
	ldap_setup_caenv($authcfg);
1263

    
1264
	/* connect and see if server is up */
1265
	$error = false;
1266
	if (!($ldap = ldap_connect($ldapserver))) {
1267
		$error = true;
1268
	}
1269

    
1270
	if ($error == true) {
1271
		log_error(sprintf(gettext("ERROR! ldap_get_groups() Could not connect to server %s."), $ldapname));
1272
		return $memberof;
1273
	}
1274

    
1275
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1276
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1277
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1278
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1279
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1280

    
1281
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1282
		if (!(@ldap_start_tls($ldap))) {
1283
			log_error(sprintf(gettext("ERROR! ldap_get_groups() could not STARTTLS to server %s."), $ldapname));
1284
			@ldap_close($ldap);
1285
			return false;
1286
		}
1287
	}
1288

    
1289
	/* bind as user that has rights to read group attributes */
1290
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1291
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1292
	if ($ldapanon == true) {
1293
		if (!($res = @ldap_bind($ldap))) {
1294
			log_error(sprintf(gettext("ERROR! ldap_get_groups() could not bind anonymously to server %s."), $ldapname));
1295
			@ldap_close($ldap);
1296
			return false;
1297
		}
1298
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1299
		log_error(sprintf(gettext("ERROR! ldap_get_groups() could not bind to server %s."), $ldapname));
1300
		@ldap_close($ldap);
1301
		return $memberof;
1302
	}
1303

    
1304
	/* get groups from DN found */
1305
	/* use ldap_read instead of search so we don't have to do a bunch of extra work */
1306
	/* since we know the DN is in $_SESSION['ldapdn'] */
1307
	//$search    = ldap_read($ldap, $ldapdn, "(objectclass=*)", array($ldapgroupattribute));
1308
	if ($ldapscope == "one") {
1309
		$ldapfunc = "ldap_list";
1310
	} else {
1311
		$ldapfunc = "ldap_search";
1312
	}
1313

    
1314
	$search = @$ldapfunc($ldap, $ldapdn, $ldapfilter, array($ldapgroupattribute));
1315
	$info = @ldap_get_entries($ldap, $search);
1316

    
1317
	$gresults = isset($authcfg['ldap_rfc2307']) ? $info : $info[0][$ldapgroupattribute];
1318

    
1319
	if (is_array($gresults)) {
1320
		/* Iterate through the groups and throw them into an array */
1321
		foreach ($gresults as $grp) {
1322
			if (((isset($authcfg['ldap_rfc2307'])) && (stristr($grp["dn"], "CN=") !== false)) ||
1323
			    ((!isset($authcfg['ldap_rfc2307'])) && (stristr($grp, "CN=") !== false))) {
1324
				$grpsplit = isset($authcfg['ldap_rfc2307']) ? explode(",", $grp["dn"]) : explode(",", $grp);
1325
				$memberof[] = preg_replace("/CN=/i", "", $grpsplit[0]);
1326
			}
1327
		}
1328
	}
1329

    
1330
	/* Time to close LDAP connection */
1331
	@ldap_unbind($ldap);
1332

    
1333
	$groups = print_r($memberof, true);
1334

    
1335
	//log_error("Returning groups ".$groups." for user $username");
1336

    
1337
	return $memberof;
1338
}
1339

    
1340
function ldap_format_host($host) {
1341
	return is_ipaddrv6($host) ? "[$host]" : $host ;
1342
}
1343

    
1344
function ldap_backed($username, $passwd, $authcfg, &$attributes = array()) {
1345
	global $debug, $config;
1346

    
1347
	if (!$username) {
1348
		$attributes['error_message'] = gettext("Invalid Login.");
1349
		return false;
1350
	}
1351

    
1352
	if (!function_exists("ldap_connect")) {
1353
		log_error(gettext("ERROR! unable to find ldap_connect() function."));
1354
		$attributes['error_message'] = gettext("Internal error during authentication.");
1355
		return null;
1356
	}
1357

    
1358
	if (!isset($authcfg['ldap_nostrip_at']) && stristr($username, "@")) {
1359
		$username_split = explode("@", $username);
1360
		$username = $username_split[0];
1361
	}
1362
	if (stristr($username, "\\")) {
1363
		$username_split = explode("\\", $username);
1364
		$username = $username_split[0];
1365
	}
1366

    
1367
	$username = ldap_escape($username, null, LDAP_ESCAPE_FILTER);
1368

    
1369
	if ($authcfg) {
1370
		if (strstr($authcfg['ldap_urltype'], "SSL")) {
1371
			$ldapproto = "ldaps";
1372
		} else {
1373
			$ldapproto = "ldap";
1374
		}
1375
		$ldapserver = "{$ldapproto}://" . ldap_format_host($authcfg['host']);
1376
		$ldapport = $authcfg['ldap_port'];
1377
		if (!empty($ldapport)) {
1378
			$ldapserver .= ":{$ldapport}";
1379
		}
1380
		$ldapbasedn = $authcfg['ldap_basedn'];
1381
		$ldapbindun = $authcfg['ldap_binddn'];
1382
		$ldapbindpw = $authcfg['ldap_bindpw'];
1383
		if (empty($ldapbindun) || empty($ldapbindpw)) {
1384
			$ldapanon = true;
1385
		} else {
1386
			$ldapanon = false;
1387
		}
1388
		$ldapauthcont = $authcfg['ldap_authcn'];
1389
		$ldapnameattribute = strtolower($authcfg['ldap_attr_user']);
1390
		$ldapextendedqueryenabled = $authcfg['ldap_extended_enabled'];
1391
		$ldapextendedquery = $authcfg['ldap_extended_query'];
1392
		$ldapfilter = "";
1393
		if (!$ldapextendedqueryenabled) {
1394
			$ldapfilter = "({$ldapnameattribute}={$username})";
1395
		} else {
1396
			$ldapfilter = "(&({$ldapnameattribute}={$username})({$ldapextendedquery}))";
1397
		}
1398
		$ldaptype = "";
1399
		$ldapver = $authcfg['ldap_protver'];
1400
		$ldapname = $authcfg['name'];
1401
		$ldapscope = $authcfg['ldap_scope'];
1402
		$ldaptimeout = is_numeric($authcfg['ldap_timeout']) ? $authcfg['ldap_timeout'] : 5;
1403
	} else {
1404
		return null;
1405
	}
1406

    
1407
	/* first check if there is even an LDAP server populated */
1408
	if (!$ldapserver) {
1409
		log_error(gettext("ERROR! could not find details of the LDAP server used for authentication."));
1410
		$attributes['error_message'] =  gettext("Internal error during authentication.");
1411
		return null;
1412
	}
1413

    
1414
	/* Setup CA environment if needed. */
1415
	ldap_setup_caenv($authcfg);
1416

    
1417
	/* Make sure we can connect to LDAP */
1418
	$error = false;
1419
	if (!($ldap = ldap_connect($ldapserver))) {
1420
		$error = true;
1421
	}
1422

    
1423
	ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
1424
	ldap_set_option($ldap, LDAP_OPT_DEREF, LDAP_DEREF_SEARCHING);
1425
	ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$ldapver);
1426
	ldap_set_option($ldap, LDAP_OPT_TIMELIMIT, (int)$ldaptimeout);
1427
	ldap_set_option($ldap, LDAP_OPT_NETWORK_TIMEOUT, (int)$ldaptimeout);
1428

    
1429
	if (strstr($authcfg['ldap_urltype'], "STARTTLS")) {
1430
		if (!(@ldap_start_tls($ldap))) {
1431
			log_error(sprintf(gettext("ERROR! could not connect to LDAP server %s using STARTTLS."), $ldapname));
1432
			$attributes['error_message'] = gettext("Error : could not connect to authentication server.");
1433
			@ldap_close($ldap);
1434
			return null;
1435
		}
1436
	}
1437

    
1438
	if ($error == true) {
1439
		$errormsg = sprintf(gettext("ERROR! Could not connect to server %s."), $ldapname);
1440
		$attributes['error_message'] = gettext("Error : could not connect to authentication server.");
1441
		return null;
1442
	}
1443

    
1444
	/* ok, its up.  now, lets bind as the bind user so we can search it */
1445
	$error = false;
1446
	$ldapbindun = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindun) : $ldapbindun;
1447
	$ldapbindpw = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapbindpw) : $ldapbindpw;
1448
	if ($ldapanon == true) {
1449
		if (!($res = @ldap_bind($ldap))) {
1450
			$error = true;
1451
		}
1452
	} else if (!($res = @ldap_bind($ldap, $ldapbindun, $ldapbindpw))) {
1453
		$error = true;
1454
	}
1455

    
1456
	if ($error == true) {
1457
		@ldap_close($ldap);
1458
		log_error(sprintf(gettext("ERROR! Could not bind to LDAP server %s. Please check the bind credentials."), $ldapname));
1459
		$attributes['error_message'] = gettext("Error : could not connect to authentication server.");
1460
		return null;
1461
	}
1462

    
1463
	/* Get LDAP Authcontainers and split em up. */
1464
	$ldac_splits = explode(";", $ldapauthcont);
1465

    
1466
	/* setup the usercount so we think we haven't found anyone yet */
1467
	$usercount = 0;
1468

    
1469
	/*****************************************************************/
1470
	/*  We first find the user based on username and filter          */
1471
	/*  then, once we find the first occurrence of that person       */
1472
	/*  we set session variables to point to the OU and DN of the    */
1473
	/*  person.  To later be used by ldap_get_groups.                */
1474
	/*  that way we don't have to search twice.                      */
1475
	/*****************************************************************/
1476
	if ($debug) {
1477
		log_auth(sprintf(gettext("Now Searching for %s in directory."), $username));
1478
	}
1479
	/* Iterate through the user containers for search */
1480
	foreach ($ldac_splits as $i => $ldac_split) {
1481
		$ldac_split = isset($authcfg['ldap_utf8']) ? utf8_encode($ldac_split) : $ldac_split;
1482
		$ldapfilter = isset($authcfg['ldap_utf8']) ? utf8_encode($ldapfilter) : $ldapfilter;
1483
		$ldapsearchbasedn = isset($authcfg['ldap_utf8']) ? utf8_encode("{$ldac_split},{$ldapbasedn}") : "{$ldac_split},{$ldapbasedn}";
1484
		/* Make sure we just use the first user we find */
1485
		if ($debug) {
1486
			log_auth(sprintf(gettext('Now Searching in server %1$s, container %2$s with filter %3$s.'), $ldapname, utf8_decode($ldac_split), utf8_decode($ldapfilter)));
1487
		}
1488
		if ($ldapscope == "one") {
1489
			$ldapfunc = "ldap_list";
1490
		} else {
1491
			$ldapfunc = "ldap_search";
1492
		}
1493
		/* Support legacy auth container specification. */
1494
		if (stristr($ldac_split, "DC=") || empty($ldapbasedn)) {
1495
			$search = @$ldapfunc($ldap, $ldac_split, $ldapfilter);
1496
		} else {
1497
			$search = @$ldapfunc($ldap, $ldapsearchbasedn, $ldapfilter);
1498
		}
1499
		if (!$search) {
1500
			log_error(sprintf(gettext("Search resulted in error: %s"), ldap_error($ldap)));
1501
			continue;
1502
		}
1503
		$info = ldap_get_entries($ldap, $search);
1504
		$matches = $info['count'];
1505
		if ($matches == 1) {
1506
			$userdn = $_SESSION['ldapdn'] = $info[0]['dn'];
1507
			$_SESSION['ldapou'] = $ldac_split[$i];
1508
			$_SESSION['ldapon'] = "true";
1509
			$usercount = 1;
1510
			break;
1511
		}
1512
	}
1513

    
1514
	if ($usercount != 1) {
1515
		@ldap_unbind($ldap);
1516
		if ($debug) {
1517
			if ($usercount === 0) {
1518
				log_error(sprintf(gettext("ERROR! LDAP search failed, no user matching %s was found."), $username));
1519
			} else {
1520
				log_error(sprintf(gettext("ERROR! LDAP search failed, multiple users matching %s were found."), $username));
1521
			}
1522
		}
1523
		$attributes['error_message'] = gettext("Invalid login specified.");
1524
		return false;
1525
	}
1526

    
1527
	/* Now lets bind as the user we found */
1528
	$passwd = isset($authcfg['ldap_utf8']) ? utf8_encode($passwd) : $passwd;
1529
	if (!($res = @ldap_bind($ldap, $userdn, $passwd))) {
1530
		if ($debug) {
1531
			log_error(sprintf(gettext('ERROR! Could not login to server %1$s as user %2$s: %3$s'), $ldapname, $username, ldap_error($ldap)));
1532
		}
1533
		@ldap_unbind($ldap);
1534
		return false;
1535
	}
1536

    
1537
	if ($debug) {
1538
		$userdn = isset($authcfg['ldap_utf8']) ? utf8_decode($userdn) : $userdn;
1539
		log_auth(sprintf(gettext('Logged in successfully as %1$s via LDAP server %2$s with DN = %3$s.'), $username, $ldapname, $userdn));
1540
	}
1541

    
1542
	/* At this point we are bound to LDAP so the user was auth'd okay. Close connection. */
1543
	@ldap_unbind($ldap);
1544

    
1545
	return true;
1546
}
1547

    
1548
function radius_backed($username, $password, $authcfg, &$attributes = array()) {
1549
	global $debug, $config;
1550
	$ret = false;
1551

    
1552
	require_once("Auth/RADIUS.php");
1553
	require_once("Crypt/CHAP.php");
1554

    
1555
	if ($authcfg) {
1556
		$radiusservers = array();
1557
		$radiusservers[0]['ipaddr'] = $authcfg['host'];
1558
		$radiusservers[0]['port'] = $authcfg['radius_auth_port'];
1559
		$radiusservers[0]['sharedsecret'] = $authcfg['radius_secret'];
1560
		$radiusservers[0]['timeout'] = $authcfg['radius_timeout'];
1561
		if(isset($authcfg['radius_protocol'])) {
1562
			$radius_protocol = $authcfg['radius_protocol'];
1563
		} else {
1564
			$radius_protocol = 'PAP';
1565
		}
1566
	} else {
1567
		log_error(gettext("ERROR! could not find details of the RADIUS server used for authentication."));
1568
		$attributes['error_message'] =  gettext("Internal error during authentication.");
1569
		return null;
1570
	}
1571

    
1572
	// Create our instance
1573
	$classname = 'Auth_RADIUS_' . $radius_protocol;
1574
	$rauth = new $classname($username, $password);
1575

    
1576
	/* Add new servers to our instance */
1577
	foreach ($radiusservers as $radsrv) {
1578
		$timeout = (is_numeric($radsrv['timeout'])) ? $radsrv['timeout'] : 5;
1579
		$rauth->addServer($radsrv['ipaddr'], $radsrv['port'], $radsrv['sharedsecret'], $timeout);
1580
	}
1581

    
1582
	// Construct data package
1583
	$rauth->username = $username;
1584
	switch ($radius_protocol) {
1585
		case 'CHAP_MD5':
1586
		case 'MSCHAPv1':
1587
			$classname = $radius_protocol == 'MSCHAPv1' ? 'Crypt_CHAP_MSv1' : 'Crypt_CHAP_MD5';
1588
			$crpt = new $classname;
1589
			$crpt->username = $username;
1590
			$crpt->password = $password;
1591
			$rauth->challenge = $crpt->challenge;
1592
			$rauth->chapid = $crpt->chapid;
1593
			$rauth->response = $crpt->challengeResponse();
1594
			$rauth->flags = 1;
1595
			break;
1596

    
1597
		case 'MSCHAPv2':
1598
			$crpt = new Crypt_CHAP_MSv2;
1599
			$crpt->username = $username;
1600
			$crpt->password = $password;
1601
			$rauth->challenge = $crpt->authChallenge;
1602
			$rauth->peerChallenge = $crpt->peerChallenge;
1603
			$rauth->chapid = $crpt->chapid;
1604
			$rauth->response = $crpt->challengeResponse();
1605
			break;
1606

    
1607
		default:
1608
			$rauth->password = $password;
1609
			break;
1610
	}
1611

    
1612
	if (PEAR::isError($rauth->start())) {
1613
		$ret = null;
1614
		log_error(sprintf(gettext("Error during RADIUS authentication : %s"), $rauth->getError()));
1615
		$attributes['error_message'] = gettext("Error : could not connect to authentication server.");
1616
	} else {
1617
		$nasid = $attributes['nas_identifier'];
1618
		$nasip = $authcfg['radius_nasip_attribute'];
1619
		if (empty($nasid)) {
1620
			$nasid = gethostname(); //If no RADIUS NAS-Identifier is given : we use pfsense's hostname as NAS-Identifier
1621
		}
1622
		if (!is_ipaddr($nasip)) {
1623
			$nasip = get_interface_ip($nasip);
1624
			
1625
			if (!is_ipaddr($nasip)) {
1626
				$nasip = get_interface_ip();//We use wan interface IP as fallback for NAS-IP-Address
1627
			}
1628
		}
1629
		$nasmac = get_interface_mac(find_ip_interface($nasip));
1630

    
1631
		$rauth->putAttribute(RADIUS_NAS_IP_ADDRESS, $nasip, "addr");
1632
		$rauth->putAttribute(RADIUS_NAS_IDENTIFIER, $nasid);
1633
		
1634
		if(!empty($attributes['calling_station_id'])) {
1635
			$rauth->putAttribute(RADIUS_CALLING_STATION_ID, $attributes['calling_station_id']);
1636
		}
1637
		// Carefully check that interface has a MAC address
1638
		if(!empty($nasmac)) {
1639
			$nasmac = mac_format($nasmac);
1640
			$rauth->putAttribute(RADIUS_CALLED_STATION_ID, $nasmac.':'.gethostname());
1641
		}
1642
		if(!empty($attributes['nas_port_type'])) {
1643
			$rauth->putAttribute(RADIUS_NAS_PORT_TYPE, $attributes['nas_port_type']);
1644
		}		
1645
		if(!empty($attributes['nas_port'])) {
1646
			$rauth->putAttribute(RADIUS_NAS_PORT, intval($attributes['nas_port']), 'integer');
1647
		}
1648
		if(!empty($attributes['framed_ip']) && is_ipaddr($attributes['framed_ip'])) {
1649
			$rauth->putAttribute(RADIUS_FRAMED_IP_ADDRESS, $attributes['framed_ip'], "addr");
1650
		}
1651
	}
1652

    
1653
	// XXX - billm - somewhere in here we need to handle securid challenge/response
1654

    
1655
	/* Send request */
1656
	$result = $rauth->send();
1657
	if (PEAR::isError($result)) {
1658
		log_error(sprintf(gettext("Error during RADIUS authentication : %s"), $rauth->getError()));
1659
		$attributes['error_message'] = gettext("Error : could not connect to authentication server.");
1660
		$ret = null;
1661
	} else if ($result === true) {
1662
		$ret = true;
1663
	} else {
1664
		$ret = false;
1665
	}
1666

    
1667
	
1668
	// Get attributes, even if auth failed.
1669
	if ($rauth->getAttributes()) {
1670
	$attributes = array_merge($attributes,$rauth->listAttributes());
1671

    
1672
	// We convert the session_terminate_time to unixtimestamp if its set before returning the whole array to our caller
1673
	if (!empty($attributes['session_terminate_time'])) {
1674
			$stt = &$attributes['session_terminate_time'];
1675
			$stt = strtotime(preg_replace("/\+(\d+):(\d+)$/", " +\${1}\${2}", preg_replace("/(\d+)T(\d+)/", "\${1} \${2}",$stt)));
1676
		}
1677
	}
1678
	
1679
	// close OO RADIUS_AUTHENTICATION
1680
	$rauth->close();
1681

    
1682
	return $ret;
1683
}
1684

    
1685
/*
1686
	$attributes must contain a "class" key containing the groups and local
1687
	groups must exist to match.
1688
*/
1689
function radius_get_groups($attributes) {
1690
	$groups = array();
1691
	if (!empty($attributes) && is_array($attributes) && (!empty($attributes['class']) || !empty($attributes['class_int']))) {
1692
		/* Some RADIUS servers return multiple class attributes, so check them all. */
1693
		$groups = array();
1694
		if (!empty($attributes['class']) && is_array($attributes['class'])) {
1695
			foreach ($attributes['class'] as $class) {
1696
				$groups = array_unique(array_merge($groups, explode(";", $class)));
1697
			}
1698
		}
1699

    
1700
		foreach ($groups as & $grp) {
1701
			$grp = trim($grp);
1702
			if (strtolower(substr($grp, 0, 3)) == "ou=") {
1703
				$grp = substr($grp, 3);
1704
			}
1705
		}
1706
	}
1707
	return $groups;
1708
}
1709

    
1710
function get_user_expiration_date($username) {
1711
	$user = getUserEntry($username);
1712
	if ($user['expires']) {
1713
		return $user['expires'];
1714
	}
1715
}
1716

    
1717
function is_account_expired($username) {
1718
	$expirydate = get_user_expiration_date($username);
1719
	if ($expirydate) {
1720
		if (strtotime("-1 day") > strtotime(date("m/d/Y", strtotime($expirydate)))) {
1721
			return true;
1722
		}
1723
	}
1724

    
1725
	return false;
1726
}
1727

    
1728
function is_account_disabled($username) {
1729
	$user = getUserEntry($username);
1730
	if (isset($user['disabled'])) {
1731
		return true;
1732
	}
1733

    
1734
	return false;
1735
}
1736

    
1737
function get_user_settings($username) {
1738
	global $config;
1739
	$settings = array();
1740
	$settings['widgets'] = $config['widgets'];
1741
	$settings['webgui']['dashboardcolumns'] = $config['system']['webgui']['dashboardcolumns'];
1742
	$settings['webgui']['webguihostnamemenu'] = $config['system']['webgui']['webguihostnamemenu'];
1743
	$settings['webgui']['webguicss'] = $config['system']['webgui']['webguicss'];
1744
	$settings['webgui']['logincss'] = $config['system']['webgui']['logincss'];
1745
	$settings['webgui']['interfacessort'] = isset($config['system']['webgui']['interfacessort']);
1746
	$settings['webgui']['dashboardavailablewidgetspanel'] = isset($config['system']['webgui']['dashboardavailablewidgetspanel']);
1747
	$settings['webgui']['webguifixedmenu'] = isset($config['system']['webgui']['webguifixedmenu']);
1748
	$settings['webgui']['webguileftcolumnhyper'] = isset($config['system']['webgui']['webguileftcolumnhyper']);
1749
	$settings['webgui']['disablealiaspopupdetail'] = isset($config['system']['webgui']['disablealiaspopupdetail']);
1750
	$settings['webgui']['systemlogsfilterpanel'] = isset($config['system']['webgui']['systemlogsfilterpanel']);
1751
	$settings['webgui']['systemlogsmanagelogpanel'] = isset($config['system']['webgui']['systemlogsmanagelogpanel']);
1752
	$settings['webgui']['statusmonitoringsettingspanel'] = isset($config['system']['webgui']['statusmonitoringsettingspanel']);
1753
	$settings['webgui']['pagenamefirst'] = isset($config['system']['webgui']['pagenamefirst']);
1754
	$user = getUserEntry($username);
1755
	if (isset($user['customsettings'])) {
1756
		$settings['customsettings'] = true;
1757
		if (isset($user['widgets'])) {
1758
			// This includes the 'sequence', and any widgetname-config per-widget settings.
1759
			$settings['widgets'] = $user['widgets'];
1760
		}
1761
		if (isset($user['dashboardcolumns'])) {
1762
			$settings['webgui']['dashboardcolumns'] = $user['dashboardcolumns'];
1763
		}
1764
		if (isset($user['webguicss'])) {
1765
			$settings['webgui']['webguicss'] = $user['webguicss'];
1766
		}
1767
		if (isset($user['webguihostnamemenu'])) {
1768
			$settings['webgui']['webguihostnamemenu'] = $user['webguihostnamemenu'];
1769
		}
1770
		$settings['webgui']['interfacessort'] = isset($user['interfacessort']);
1771
		$settings['webgui']['dashboardavailablewidgetspanel'] = isset($user['dashboardavailablewidgetspanel']);
1772
		$settings['webgui']['webguifixedmenu'] = isset($user['webguifixedmenu']);
1773
		$settings['webgui']['webguileftcolumnhyper'] = isset($user['webguileftcolumnhyper']);
1774
		$settings['webgui']['disablealiaspopupdetail'] = isset($user['disablealiaspopupdetail']);
1775
		$settings['webgui']['systemlogsfilterpanel'] = isset($user['systemlogsfilterpanel']);
1776
		$settings['webgui']['systemlogsmanagelogpanel'] = isset($user['systemlogsmanagelogpanel']);
1777
		$settings['webgui']['statusmonitoringsettingspanel'] = isset($user['statusmonitoringsettingspanel']);
1778
		$settings['webgui']['pagenamefirst'] = isset($user['pagenamefirst']);
1779
	} else {
1780
		$settings['customsettings'] = false;
1781
	}
1782

    
1783
	if ($settings['webgui']['dashboardcolumns'] < 1) {
1784
		$settings['webgui']['dashboardcolumns'] = 2;
1785
	}
1786

    
1787
	return $settings;
1788
}
1789

    
1790
function save_widget_settings($username, $settings, $message = "") {
1791
	global $config, $userindex;
1792
	$user = getUserEntry($username);
1793

    
1794
	if (strlen($message) > 0) {
1795
		$msgout = $message;
1796
	} else {
1797
		$msgout = gettext("Widget configuration has been changed.");
1798
	}
1799

    
1800
	if (isset($user['customsettings'])) {
1801
		$config['system']['user'][$userindex[$username]]['widgets'] = $settings;
1802
		write_config($msgout . " " . sprintf(gettext("(User %s)"), $username));
1803
	} else {
1804
		$config['widgets'] = $settings;
1805
		write_config($msgout);
1806
	}
1807
}
1808

    
1809
function auth_get_authserver($name) {
1810
	global $config;
1811

    
1812
	if (is_array($config['system']['authserver'])) {
1813
		foreach ($config['system']['authserver'] as $authcfg) {
1814
			if ($authcfg['name'] == $name) {
1815
				return $authcfg;
1816
			}
1817
		}
1818
	}
1819
	if ($name == "Local Database") {
1820
		return array("name" => gettext("Local Database"), "type" => "Local Auth", "host" => $config['system']['hostname']);
1821
	}
1822
}
1823

    
1824
function auth_get_authserver_list() {
1825
	global $config;
1826

    
1827
	$list = array();
1828

    
1829
	if (is_array($config['system']['authserver'])) {
1830
		foreach ($config['system']['authserver'] as $authcfg) {
1831
			/* Add support for disabled entries? */
1832
			$list[$authcfg['name']] = $authcfg;
1833
		}
1834
	}
1835

    
1836
	$list["Local Database"] = array("name" => gettext("Local Database"), "type" => "Local Auth", "host" => $config['system']['hostname']);
1837
	return $list;
1838
}
1839

    
1840
function getUserGroups($username, $authcfg, &$attributes = array()) {
1841
	global $config;
1842

    
1843
	$allowed_groups = array();
1844

    
1845
	switch ($authcfg['type']) {
1846
		case 'ldap':
1847
			$allowed_groups = @ldap_get_groups($username, $authcfg);
1848
			break;
1849
		case 'radius':
1850
			$allowed_groups = @radius_get_groups($attributes);
1851
			break;
1852
		default:
1853
			$user = getUserEntry($username);
1854
			$allowed_groups = @local_user_get_groups($user, true);
1855
			break;
1856
	}
1857

    
1858
	$member_groups = array();
1859
	if (is_array($config['system']['group'])) {
1860
		foreach ($config['system']['group'] as $group) {
1861
			if (in_array($group['name'], $allowed_groups)) {
1862
				$member_groups[] = $group['name'];
1863
			}
1864
		}
1865
	}
1866

    
1867
	return $member_groups;
1868
}
1869

    
1870
/*
1871
Possible return values : 
1872
true : authentication worked
1873
false : authentication failed (invalid login/password, not enought permission, etc...)
1874
null : error during authentication process (unable to reach remote server, etc...)
1875
*/
1876
function authenticate_user($username, $password, $authcfg = NULL, &$attributes = array()) {
1877

    
1878
	if (is_array($username) || is_array($password)) {
1879
		return false;
1880
	}
1881

    
1882
	if (!$authcfg) {
1883
		return local_backed($username, $password, $attributes);
1884
	}
1885

    
1886
	$authenticated = false;
1887
	switch ($authcfg['type']) {
1888
		case 'ldap':
1889
			$authenticated = ldap_backed($username, $password, $authcfg, $attributes);
1890
			break;
1891
		case 'radius':
1892
			$authenticated = radius_backed($username, $password, $authcfg, $attributes);
1893
			break;
1894
		default:
1895
			/* lookup user object by name */
1896
			$authenticated = local_backed($username, $password, $attributes);
1897
			break;
1898
		}
1899

    
1900
	return $authenticated;
1901
}
1902

    
1903
function session_auth() {
1904
	global $config, $_SESSION, $page;
1905

    
1906
	// Handle HTTPS httponly and secure flags
1907
	$currentCookieParams = session_get_cookie_params();
1908
	session_set_cookie_params(
1909
		$currentCookieParams["lifetime"],
1910
		$currentCookieParams["path"],
1911
		NULL,
1912
		($config['system']['webgui']['protocol'] == "https"),
1913
		true
1914
	);
1915

    
1916
	phpsession_begin();
1917

    
1918
	// Detect protocol change
1919
	if (!isset($_POST['login']) && !empty($_SESSION['Logged_In']) && $_SESSION['protocol'] != $config['system']['webgui']['protocol']) {
1920
		phpsession_end();
1921
		return false;
1922
	}
1923

    
1924
	/* Validate incoming login request */
1925
	$attributes = array();
1926
	if (isset($_POST['login']) && !empty($_POST['usernamefld']) && !empty($_POST['passwordfld'])) {
1927
		$authcfg = auth_get_authserver($config['system']['webgui']['authmode']);
1928
		$remoteauth = authenticate_user($_POST['usernamefld'], $_POST['passwordfld'], $authcfg, $attributes);
1929
		if ($remoteauth || authenticate_user($_POST['usernamefld'], $_POST['passwordfld'])) {
1930
			// Generate a new id to avoid session fixation
1931
			session_regenerate_id();
1932
			$_SESSION['Logged_In'] = "True";
1933
			$_SESSION['remoteauth'] = $remoteauth;
1934
			$_SESSION['Username'] = $_POST['usernamefld'];
1935
			$_SESSION['user_radius_attributes'] = $attributes;
1936
			$_SESSION['last_access'] = time();
1937
			$_SESSION['protocol'] = $config['system']['webgui']['protocol'];
1938
			phpsession_end(true);
1939
			if (!isset($config['system']['webgui']['quietlogin'])) {
1940
				log_auth(sprintf(gettext("Successful login for user '%1\$s' from: %2\$s"), $_POST['usernamefld'], $_SERVER['REMOTE_ADDR']));
1941
			}
1942
			if (isset($_POST['postafterlogin'])) {
1943
				return true;
1944
			} else {
1945
				if (empty($page)) {
1946
					$page = "/";
1947
				}
1948
				header("Location: {$page}");
1949
			}
1950
			exit;
1951
		} else {
1952
			/* give the user an error message */
1953
			$_SESSION['Login_Error'] = gettext("Username or Password incorrect");
1954
			log_auth("webConfigurator authentication error for '{$_POST['usernamefld']}' from {$_SERVER['REMOTE_ADDR']}");
1955
			if (isAjax()) {
1956
				echo "showajaxmessage('{$_SESSION['Login_Error']}');";
1957
				return;
1958
			}
1959
		}
1960
	}
1961

    
1962
	/* Show login page if they aren't logged in */
1963
	if (empty($_SESSION['Logged_In'])) {
1964
		phpsession_end(true);
1965
		return false;
1966
	}
1967

    
1968
	/* If session timeout isn't set, we don't mark sessions stale */
1969
	if (!isset($config['system']['webgui']['session_timeout'])) {
1970
		/* Default to 4 hour timeout if one is not set */
1971
		if ($_SESSION['last_access'] < (time() - 14400)) {
1972
			$_POST['logout'] = true;
1973
			$_SESSION['Logout'] = true;
1974
		} else {
1975
			$_SESSION['last_access'] = time();
1976
		}
1977
	} else if (intval($config['system']['webgui']['session_timeout']) == 0) {
1978
		/* only update if it wasn't ajax */
1979
		if (!isAjax()) {
1980
			$_SESSION['last_access'] = time();
1981
		}
1982
	} else {
1983
		/* Check for stale session */
1984
		if ($_SESSION['last_access'] < (time() - ($config['system']['webgui']['session_timeout'] * 60))) {
1985
			$_POST['logout'] = true;
1986
			$_SESSION['Logout'] = true;
1987
		} else {
1988
			/* only update if it wasn't ajax */
1989
			if (!isAjax()) {
1990
				$_SESSION['last_access'] = time();
1991
			}
1992
		}
1993
	}
1994

    
1995
	/* user hit the logout button */
1996
	if (isset($_POST['logout'])) {
1997

    
1998
		if ($_SESSION['Logout']) {
1999
			log_error(sprintf(gettext("Session timed out for user '%1\$s' from: %2\$s"), $_SESSION['Username'], $_SERVER['REMOTE_ADDR']));
2000
		} else {
2001
			log_error(sprintf(gettext("User logged out for user '%1\$s' from: %2\$s"), $_SESSION['Username'], $_SERVER['REMOTE_ADDR']));
2002
		}
2003

    
2004
		/* wipe out $_SESSION */
2005
		$_SESSION = array();
2006

    
2007
		if (isset($_COOKIE[session_name()])) {
2008
			setcookie(session_name(), '', time()-42000, '/');
2009
		}
2010

    
2011
		/* and destroy it */
2012
		phpsession_destroy();
2013

    
2014
		$scriptName = explode("/", $_SERVER["SCRIPT_FILENAME"]);
2015
		$scriptElms = count($scriptName);
2016
		$scriptName = $scriptName[$scriptElms-1];
2017

    
2018
		if (isAjax()) {
2019
			return false;
2020
		}
2021

    
2022
		/* redirect to page the user is on, it'll prompt them to login again */
2023
		header("Location: {$scriptName}");
2024

    
2025
		return false;
2026
	}
2027

    
2028
	/*
2029
	 * this is for debugging purpose if you do not want to use Ajax
2030
	 * to submit a HTML form. It basically disables the observation
2031
	 * of the submit event and hence does not trigger Ajax.
2032
	 */
2033
	if ($_REQUEST['disable_ajax']) {
2034
		$_SESSION['NO_AJAX'] = "True";
2035
	}
2036

    
2037
	/*
2038
	 * Same to re-enable Ajax.
2039
	 */
2040
	if ($_REQUEST['enable_ajax']) {
2041
		unset($_SESSION['NO_AJAX']);
2042
	}
2043
	phpsession_end(true);
2044
	return true;
2045
}
2046

    
2047
function print_credit() {
2048
	global $g;
2049

    
2050
	return  '<a target="_blank" href="https://pfsense.org">' . $g["product_name"] . '</a>' .
2051
			gettext(' is developed and maintained by ') .
2052
			'<a target="_blank" href="https://netgate.com">Netgate. </a>' . ' &copy; ESF ' . $g["product_copyright_years"] .
2053
			'<a target="_blank" href="https://pfsense.org/license">' .
2054
			gettext(' View license.') . '</a>';
2055
}
2056
?>
(2-2/60)