piler/webui/model/user/auth.php

322 lines
11 KiB
PHP
Raw Normal View History

2012-02-08 23:14:28 +01:00
<?php
class ModelUserAuth extends Model {
public function checkLogin($username = '', $password = '') {
2012-10-06 14:18:00 +02:00
$ok = 0;
2012-02-08 23:14:28 +01:00
if($username == '' || $password == '') { return 0; }
if(ENABLE_LDAP_AUTH == 1) {
$ok = $this->checkLoginAgainstLDAP($username, $password);
if($ok == 1) { return $ok; }
}
if(ENABLE_IMAP_AUTH == 1) {
require 'Zend/Mail/Protocol/Imap.php';
$ok = $this->checkLoginAgainstIMAP($username, $password);
if($ok == 1) { return $ok; }
}
// fallback local auth
$query = $this->db->query("SELECT u.username, u.uid, u.realname, u.dn, u.password, u.isadmin, u.domain FROM " . TABLE_USER . " u, " . TABLE_EMAIL . " e WHERE e.email=? AND e.uid=u.uid", array($username));
2012-02-08 23:14:28 +01:00
if(!isset($query->row['password'])) { return 0; }
$pass = crypt($password, $query->row['password']);
if($pass == $query->row['password']){
2012-10-06 14:18:00 +02:00
$ok = 1;
2012-02-08 23:14:28 +01:00
2012-10-06 14:18:00 +02:00
AUDIT(ACTION_LOGIN, $username, '', '', 'successful auth against user table');
}
else {
AUDIT(ACTION_LOGIN_FAILED, $username, '', '', 'failed auth against user table');
}
if($ok == 0 && strlen($query->row['dn']) > 3) {
$ok = $this->checkLoginAgainstFallbackLDAP($query->row, $password);
2012-10-06 14:18:00 +02:00
}
if($ok == 1) {
2012-02-08 23:14:28 +01:00
$_SESSION['username'] = $query->row['username'];
$_SESSION['uid'] = $query->row['uid'];
$_SESSION['admin_user'] = $query->row['isadmin'];
$_SESSION['email'] = $username;
$_SESSION['domain'] = $query->row['domain'];
$_SESSION['realname'] = $query->row['realname'];
2013-01-05 16:42:36 +01:00
$_SESSION['auditdomains'] = $this->model_user_user->get_users_all_domains($query->row['uid']);
2012-07-06 15:02:23 +02:00
$_SESSION['emails'] = $this->model_user_user->get_users_all_email_addresses($query->row['uid']);
2012-09-06 15:27:20 +02:00
$_SESSION['folders'] = $this->model_folder_folder->get_all_folder_ids($query->row['uid']);
2012-09-15 15:30:35 +02:00
$_SESSION['extra_folders'] = $this->model_folder_folder->get_all_extra_folder_ids($query->row['uid']);
2012-02-08 23:14:28 +01:00
return 1;
}
return 0;
}
private function checkLoginAgainstLDAP($username = '', $password = '') {
2013-07-20 11:15:13 +02:00
$ldap_type = '';
2013-07-08 11:31:17 +02:00
$ldap_host = LDAP_HOST;
$ldap_base_dn = LDAP_BASE_DN;
$ldap_helper_dn = LDAP_HELPER_DN;
$ldap_helper_password = LDAP_HELPER_PASSWORD;
2013-07-23 22:44:34 +02:00
$ldap_auditor_member_dn = LDAP_AUDITOR_MEMBER_DN;
$ldap_admin_member_dn = LDAP_ADMIN_MEMBER_DN;
$role = 0;
2013-07-08 11:31:17 +02:00
if(ENABLE_SAAS == 1) {
$a = $this->model_saas_ldap->get_ldap_params_by_email($username);
2013-07-23 22:44:34 +02:00
if(count($a) >= 6) {
2013-07-20 11:15:13 +02:00
$ldap_type = $a[0];
$ldap_host = $a[1];
$ldap_base_dn = $a[2];
$ldap_helper_dn = $a[3];
$ldap_helper_password = $a[4];
2013-07-23 22:44:34 +02:00
$ldap_auditor_member_dn = $a[5];
2013-07-12 11:14:09 +02:00
}
2013-07-08 11:31:17 +02:00
}
2013-07-20 11:15:13 +02:00
list($ldap_mail_attr, $ldap_account_objectclass, $ldap_distributionlist_attr, $ldap_distributionlist_objectclass) = get_ldap_attribute_names($ldap_type);
if($ldap_host == '' || $ldap_helper_password == '') { return 0; }
2013-07-08 11:31:17 +02:00
$ldap = new LDAP($ldap_host, $ldap_helper_dn, $ldap_helper_password);
if($ldap->is_bind_ok()) {
2013-07-12 11:14:09 +02:00
$query = $ldap->query($ldap_base_dn, "(&(objectClass=$ldap_account_objectclass)($ldap_mail_attr=$username))", array());
2013-07-03 11:36:41 +02:00
if(isset($query->row['dn']) && $query->row['dn']) {
$a = $query->row;
2013-07-08 11:31:17 +02:00
$ldap_auth = new LDAP($ldap_host, $a['dn'], $password);
2013-07-08 11:31:17 +02:00
if(ENABLE_SYSLOG == 1) { syslog(LOG_INFO, "ldap auth against '" . $ldap_host . "', dn: '" . $a['dn'] . "', result: " . $ldap_auth->is_bind_ok()); }
2013-04-03 22:45:05 +02:00
if($ldap_auth->is_bind_ok()) {
2013-07-12 15:30:49 +02:00
$query = $ldap->query($ldap_base_dn, "(|(&(objectClass=$ldap_account_objectclass)($ldap_mail_attr=$username))(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=$username)" . ")(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=" . stripslashes($a['dn']) . ")))", array("mail", "mailalternateaddress", "proxyaddresses", "zimbraMailForwardingAddress", "member", "memberOfGroup"));
if($this->check_ldap_membership($ldap_auditor_member_dn, $query->rows) == 1) { $role = 2; }
if($this->check_ldap_membership($ldap_admin_member_dn, $query->rows) == 1) { $role = 1; }
2013-05-03 09:48:32 +02:00
2013-03-02 14:09:06 +01:00
$emails = $this->get_email_array_from_ldap_attr($query->rows);
$this->add_session_vars($a['cn'], $username, $emails, $role);
AUDIT(ACTION_LOGIN, $username, '', '', 'successful auth against LDAP');
return 1;
}
else {
AUDIT(ACTION_LOGIN_FAILED, $username, '', '', 'failed auth against LDAP');
}
}
}
else if(ENABLE_SYSLOG == 1) {
2013-07-08 11:31:17 +02:00
syslog(LOG_INFO, "cannot bind to '" . $ldap_host . "' as '" . $ldap_helper_dn . "'");
}
2012-02-08 23:14:28 +01:00
return 0;
}
2013-07-23 22:44:34 +02:00
private function check_ldap_membership($ldap_auditor_member_dn = '', $e = array()) {
if($ldap_auditor_member_dn == '') { return 0; }
2013-05-03 09:48:32 +02:00
foreach($e as $a) {
2013-08-09 10:13:54 +02:00
foreach (array("memberof", "dn") as $memberattr) {
2013-05-03 09:48:32 +02:00
if(isset($a[$memberattr])) {
if(isset($a[$memberattr]['count'])) {
for($i = 0; $i < $a[$memberattr]['count']; $i++) {
2013-07-23 22:44:34 +02:00
if($a[$memberattr][$i] == $ldap_auditor_member_dn) {
2013-05-03 09:48:32 +02:00
return 1;
}
}
}
else {
2013-07-23 22:44:34 +02:00
if($a[$memberattr] == $ldap_auditor_member_dn) {
2013-05-03 09:48:32 +02:00
return 1;
}
}
}
}
}
return 0;
}
2013-08-22 11:24:54 +02:00
public function get_email_array_from_ldap_attr($e = array()) {
$data = array();
2013-03-02 14:09:06 +01:00
foreach($e as $a) {
2013-07-12 15:30:49 +02:00
foreach (array("mail", "mailalternateaddress", "proxyaddresses", "zimbraMailForwardingAddress", "member", "memberOfGroup") as $mailattr) {
2013-03-02 14:09:06 +01:00
if(isset($a[$mailattr])) {
2013-08-28 13:11:05 +02:00
if(is_array($a[$mailattr])) {
2013-03-02 14:09:06 +01:00
for($i = 0; $i < $a[$mailattr]['count']; $i++) {
if(preg_match("/^smtp\:/i", $a[$mailattr][$i]) || strchr($a[$mailattr][$i], '@') ) {
$email = strtolower(preg_replace("/^smtp\:/i", "", $a[$mailattr][$i]));
2013-05-03 16:05:09 +02:00
if(!in_array($email, $data) && strchr($email, '@') && substr($email, 0, 4) != 'sip:') { array_push($data, $email); }
2013-03-02 14:09:06 +01:00
}
}
}
2013-03-02 14:09:06 +01:00
else {
$email = strtolower(preg_replace("/^smtp\:/i", "", $a[$mailattr]));
2013-05-03 16:05:09 +02:00
if(!in_array($email, $data) && strchr($email, '@') && substr($email, 0, 4) != 'sip:') { array_push($data, $email); }
2013-03-02 14:09:06 +01:00
}
}
2013-07-12 15:30:49 +02:00
}
}
return $data;
}
private function add_session_vars($name = '', $email = '', $emails = array(), $role = 0) {
$a = explode("@", $email);
$uid = $this->model_user_user->get_uid_by_email($email);
if($uid < 1) {
2013-04-12 22:30:48 +02:00
$uid = $this->model_user_user->get_next_uid(TABLE_EMAIL);
$query = $this->db->query("INSERT INTO " . TABLE_EMAIL . " (uid, email) VALUES(?,?)", array($uid, $email));
}
$_SESSION['username'] = $name;
$_SESSION['uid'] = $uid;
2013-05-03 09:48:32 +02:00
if($role > 0) {
$_SESSION['admin_user'] = $role;
2013-05-03 09:48:32 +02:00
} else {
$_SESSION['admin_user'] = 0;
}
$_SESSION['email'] = $email;
$_SESSION['domain'] = $a[1];
$_SESSION['realname'] = $name;
2013-07-12 15:02:50 +02:00
$_SESSION['auditdomains'] = $this->model_domain_domain->get_your_all_domains_by_email($email);
$_SESSION['emails'] = $emails;
$_SESSION['folders'] = array();
$_SESSION['extra_folders'] = array();
}
private function checkLoginAgainstFallbackLDAP($user = array(), $password = '') {
2012-02-08 23:14:28 +01:00
if($password == '' || !isset($user['username']) || !isset($user['domain']) || !isset($user['dn']) || strlen($user['domain']) < 2){ return 0; }
$query = $this->db->query("SELECT remotehost, basedn FROM " . TABLE_REMOTE . " WHERE remotedomain=?", array($user['domain']));
if($query->num_rows != 1) { return 0; }
$ldap = new LDAP($query->row['remotehost'], $user['dn'], $password);
if($ldap->is_bind_ok()) {
2012-06-22 15:22:02 +02:00
$this->change_password($user['username'], $password);
2012-02-08 23:14:28 +01:00
AUDIT(ACTION_LOGIN, $user['username'], '', '', 'changed password in local table');
return 1;
}
else {
AUDIT(ACTION_LOGIN_FAILED, $user['username'], '', '', 'failed bind to ' . $query->row['remotehost'], $user['dn']);
}
return 0;
}
private function checkLoginAgainstIMAP($username = '', $password = '') {
$user = array();
$imap = new Zend_Mail_Protocol_Imap(IMAP_HOST, IMAP_PORT, IMAP_SSL);
if($imap->login($username, $password)) {
$imap->logout();
2013-05-03 09:48:32 +02:00
$this->add_session_vars($username, $username, array($username), 0);
2013-04-02 22:22:30 +02:00
$_SESSION['password'] = $password;
return 1;
}
return 0;
}
2012-10-17 13:11:08 +02:00
public function check_ntlm_auth() {
2013-07-12 11:14:09 +02:00
$ldap_mail_attr = 'mail';
$ldap_account_objectclass = 'user';
$ldap_distributionlist_attr = 'member';
$ldap_distributionlist_objectclass = 'group';
$ldap_auditor_member_dn = LDAP_AUDITOR_MEMBER_DN;
$ldap_admin_member_dn = LDAP_ADMIN_MEMBER_DN;
$role = 0;
2013-07-12 11:14:09 +02:00
2013-08-21 00:06:41 +02:00
if(!isset($_SERVER['REMOTE_USER']) || $_SERVER['REMOTE_USER'] == '') { return 0; }
2012-10-17 13:11:08 +02:00
$u = explode("\\", $_SERVER['REMOTE_USER']);
2013-08-21 00:06:41 +02:00
if(isset($u[1])) { $username = $u[1]; }
else { $username = $_SERVER['REMOTE_USER']; }
if(ENABLE_SYSLOG == 1) { syslog(LOG_INFO, "sso login: $username"); }
2012-10-17 13:11:08 +02:00
2013-04-19 20:39:38 +02:00
$ldap = new LDAP(LDAP_HOST, LDAP_HELPER_DN, LDAP_HELPER_PASSWORD);
2012-10-17 13:11:08 +02:00
2013-04-19 20:39:38 +02:00
if($ldap->is_bind_ok()) {
2012-10-17 13:11:08 +02:00
2013-08-21 00:06:41 +02:00
$query = $ldap->query(LDAP_BASE_DN, "(&(objectClass=$ldap_account_objectclass)(samaccountname=" . $username . "))", array());
2013-04-19 20:39:38 +02:00
if(isset($query->row['dn'])) {
$a = $query->row;
if(isset($a['mail']['count'])) { $username = $a['mail'][0]; } else { $username = $a['mail']; }
$username = strtolower(preg_replace("/^smtp\:/i", "", $username));
2013-07-12 11:14:09 +02:00
$query = $ldap->query(LDAP_BASE_DN, "(|(&(objectClass=$ldap_account_objectclass)($ldap_mail_attr=$username))(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=$username)" . ")(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=" . $a['dn'] . ")))", array());
2013-04-19 20:39:38 +02:00
$emails = $this->get_email_array_from_ldap_attr($query->rows);
if($this->check_ldap_membership($ldap_auditor_member_dn, $query->rows) == 1) { $role = 2; }
if($this->check_ldap_membership($ldap_admin_member_dn, $query->rows) == 1) { $role = 1; }
$this->add_session_vars($a['cn'], $username, $emails, $role);
2013-04-19 20:39:38 +02:00
AUDIT(ACTION_LOGIN, $username, '', '', 'successful auth against LDAP');
return 1;
}
2012-10-17 13:11:08 +02:00
}
return 0;
}
2012-06-22 15:22:02 +02:00
public function change_password($username = '', $password = '') {
2012-02-08 23:14:28 +01:00
if($username == "" || $password == ""){ return 0; }
$query = $this->db->query("UPDATE " . TABLE_USER . " SET password=? WHERE username=?", array(crypt($password), $username));
$rc = $this->db->countAffected();
return $rc;
}
}
?>