checkLoginAgainstLDAP($username, $password); if($ok == 1) { return $ok; } } if(ENABLE_IMAP_AUTH == 1) { require 'Zend/Mail/Protocol/Imap.php'; $ok = $this->checkLoginAgainstIMAP($username, $password); if($ok == 1) { return $ok; } } // fallback local auth $query = $this->db->query("SELECT u.username, u.uid, u.realname, u.dn, u.password, u.isadmin, u.domain FROM " . TABLE_USER . " u, " . TABLE_EMAIL . " e WHERE e.email=? AND e.uid=u.uid", array($username)); if(!isset($query->row['password'])) { return 0; } $pass = crypt($password, $query->row['password']); if($pass == $query->row['password']){ $ok = 1; AUDIT(ACTION_LOGIN, $username, '', '', 'successful auth against user table'); } else { AUDIT(ACTION_LOGIN_FAILED, $username, '', '', 'failed auth against user table'); } if($ok == 0 && strlen($query->row['dn']) > 3) { $ok = $this->checkLoginAgainstFallbackLDAP($query->row, $password); } if($ok == 1) { $_SESSION['username'] = $query->row['username']; $_SESSION['uid'] = $query->row['uid']; $_SESSION['admin_user'] = $query->row['isadmin']; $_SESSION['email'] = $username; $_SESSION['domain'] = $query->row['domain']; $_SESSION['realname'] = $query->row['realname']; $_SESSION['auditdomains'] = $this->model_user_user->get_users_all_domains($query->row['uid']); $_SESSION['emails'] = $this->model_user_user->get_users_all_email_addresses($query->row['uid']); $_SESSION['folders'] = $this->model_folder_folder->get_all_folder_ids($query->row['uid']); $_SESSION['extra_folders'] = $this->model_folder_folder->get_all_extra_folder_ids($query->row['uid']); return 1; } return 0; } private function checkLoginAgainstLDAP($username = '', $password = '') { $ldap_type = ''; $ldap_host = LDAP_HOST; $ldap_base_dn = LDAP_BASE_DN; $ldap_helper_dn = LDAP_HELPER_DN; $ldap_helper_password = LDAP_HELPER_PASSWORD; $ldap_auditor_member_dn = LDAP_AUDITOR_MEMBER_DN; $ldap_admin_member_dn = LDAP_ADMIN_MEMBER_DN; $role = 0; if(ENABLE_SAAS == 1) { $a = $this->model_saas_ldap->get_ldap_params_by_email($username); if(count($a) >= 6) { $ldap_type = $a[0]; $ldap_host = $a[1]; $ldap_base_dn = $a[2]; $ldap_helper_dn = $a[3]; $ldap_helper_password = $a[4]; $ldap_auditor_member_dn = $a[5]; } } list($ldap_mail_attr, $ldap_account_objectclass, $ldap_distributionlist_attr, $ldap_distributionlist_objectclass) = get_ldap_attribute_names($ldap_type); if($ldap_host == '' || $ldap_helper_password == '') { return 0; } $ldap = new LDAP($ldap_host, $ldap_helper_dn, $ldap_helper_password); if($ldap->is_bind_ok()) { $query = $ldap->query($ldap_base_dn, "(&(objectClass=$ldap_account_objectclass)($ldap_mail_attr=$username))", array()); if(isset($query->row['dn']) && $query->row['dn']) { $a = $query->row; $ldap_auth = new LDAP($ldap_host, $a['dn'], $password); if(ENABLE_SYSLOG == 1) { syslog(LOG_INFO, "ldap auth against '" . $ldap_host . "', dn: '" . $a['dn'] . "', result: " . $ldap_auth->is_bind_ok()); } if($ldap_auth->is_bind_ok()) { $query = $ldap->query($ldap_base_dn, "(|(&(objectClass=$ldap_account_objectclass)($ldap_mail_attr=$username))(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=$username)" . ")(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=" . stripslashes($a['dn']) . ")))", array("mail", "mailalternateaddress", "proxyaddresses", "zimbraMailForwardingAddress", "member", "memberOfGroup")); if($this->check_ldap_membership($ldap_auditor_member_dn, $query->rows) == 1) { $role = 2; } if($this->check_ldap_membership($ldap_admin_member_dn, $query->rows) == 1) { $role = 1; } $emails = $this->get_email_array_from_ldap_attr($query->rows); $this->add_session_vars($a['cn'], $username, $emails, $role); AUDIT(ACTION_LOGIN, $username, '', '', 'successful auth against LDAP'); return 1; } else { AUDIT(ACTION_LOGIN_FAILED, $username, '', '', 'failed auth against LDAP'); } } } else if(ENABLE_SYSLOG == 1) { syslog(LOG_INFO, "cannot bind to '" . $ldap_host . "' as '" . $ldap_helper_dn . "'"); } return 0; } private function check_ldap_membership($ldap_auditor_member_dn = '', $e = array()) { if($ldap_auditor_member_dn == '') { return 0; } foreach($e as $a) { foreach (array("memberof", "dn") as $memberattr) { if(isset($a[$memberattr])) { if(isset($a[$memberattr]['count'])) { for($i = 0; $i < $a[$memberattr]['count']; $i++) { if($a[$memberattr][$i] == $ldap_auditor_member_dn) { return 1; } } } else { if($a[$memberattr] == $ldap_auditor_member_dn) { return 1; } } } } } return 0; } public function get_email_array_from_ldap_attr($e = array()) { $data = array(); foreach($e as $a) { foreach (array("mail", "mailalternateaddress", "proxyaddresses", "zimbraMailForwardingAddress", "member", "memberOfGroup") as $mailattr) { if(isset($a[$mailattr])) { if(is_array($a[$mailattr])) { for($i = 0; $i < $a[$mailattr]['count']; $i++) { if(preg_match("/^smtp\:/i", $a[$mailattr][$i]) || strchr($a[$mailattr][$i], '@') ) { $email = strtolower(preg_replace("/^smtp\:/i", "", $a[$mailattr][$i])); if(!in_array($email, $data) && strchr($email, '@') && substr($email, 0, 4) != 'sip:') { array_push($data, $email); } } } } else { $email = strtolower(preg_replace("/^smtp\:/i", "", $a[$mailattr])); if(!in_array($email, $data) && strchr($email, '@') && substr($email, 0, 4) != 'sip:') { array_push($data, $email); } } } } } return $data; } private function add_session_vars($name = '', $email = '', $emails = array(), $role = 0) { $a = explode("@", $email); $uid = $this->model_user_user->get_uid_by_email($email); if($uid < 1) { $uid = $this->model_user_user->get_next_uid(TABLE_EMAIL); $query = $this->db->query("INSERT INTO " . TABLE_EMAIL . " (uid, email) VALUES(?,?)", array($uid, $email)); } $_SESSION['username'] = $name; $_SESSION['uid'] = $uid; if($role > 0) { $_SESSION['admin_user'] = $role; } else { $_SESSION['admin_user'] = 0; } $_SESSION['email'] = $email; $_SESSION['domain'] = $a[1]; $_SESSION['realname'] = $name; $_SESSION['auditdomains'] = $this->model_domain_domain->get_your_all_domains_by_email($email); $_SESSION['emails'] = $emails; $_SESSION['folders'] = array(); $_SESSION['extra_folders'] = array(); } private function checkLoginAgainstFallbackLDAP($user = array(), $password = '') { if($password == '' || !isset($user['username']) || !isset($user['domain']) || !isset($user['dn']) || strlen($user['domain']) < 2){ return 0; } $query = $this->db->query("SELECT remotehost, basedn FROM " . TABLE_REMOTE . " WHERE remotedomain=?", array($user['domain'])); if($query->num_rows != 1) { return 0; } $ldap = new LDAP($query->row['remotehost'], $user['dn'], $password); if($ldap->is_bind_ok()) { $this->change_password($user['username'], $password); AUDIT(ACTION_LOGIN, $user['username'], '', '', 'changed password in local table'); return 1; } else { AUDIT(ACTION_LOGIN_FAILED, $user['username'], '', '', 'failed bind to ' . $query->row['remotehost'], $user['dn']); } return 0; } private function checkLoginAgainstIMAP($username = '', $password = '') { $user = array(); $imap = new Zend_Mail_Protocol_Imap(IMAP_HOST, IMAP_PORT, IMAP_SSL); if($imap->login($username, $password)) { $imap->logout(); $this->add_session_vars($username, $username, array($username), 0); $_SESSION['password'] = $password; return 1; } return 0; } public function check_ntlm_auth() { $ldap_mail_attr = 'mail'; $ldap_account_objectclass = 'user'; $ldap_distributionlist_attr = 'member'; $ldap_distributionlist_objectclass = 'group'; $ldap_auditor_member_dn = LDAP_AUDITOR_MEMBER_DN; $ldap_admin_member_dn = LDAP_ADMIN_MEMBER_DN; $role = 0; if(!isset($_SERVER['REMOTE_USER']) || $_SERVER['REMOTE_USER'] == '') { return 0; } $u = explode("\\", $_SERVER['REMOTE_USER']); if(isset($u[1])) { $username = $u[1]; } else { $username = $_SERVER['REMOTE_USER']; } if(ENABLE_SYSLOG == 1) { syslog(LOG_INFO, "sso login: $username"); } $ldap = new LDAP(LDAP_HOST, LDAP_HELPER_DN, LDAP_HELPER_PASSWORD); if($ldap->is_bind_ok()) { $query = $ldap->query(LDAP_BASE_DN, "(&(objectClass=$ldap_account_objectclass)(samaccountname=" . $username . "))", array()); if(isset($query->row['dn'])) { $a = $query->row; if(isset($a['mail']['count'])) { $username = $a['mail'][0]; } else { $username = $a['mail']; } $username = strtolower(preg_replace("/^smtp\:/i", "", $username)); $query = $ldap->query(LDAP_BASE_DN, "(|(&(objectClass=$ldap_account_objectclass)($ldap_mail_attr=$username))(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=$username)" . ")(&(objectClass=$ldap_distributionlist_objectclass)($ldap_distributionlist_attr=" . $a['dn'] . ")))", array()); $emails = $this->get_email_array_from_ldap_attr($query->rows); if($this->check_ldap_membership($ldap_auditor_member_dn, $query->rows) == 1) { $role = 2; } if($this->check_ldap_membership($ldap_admin_member_dn, $query->rows) == 1) { $role = 1; } $this->add_session_vars($a['cn'], $username, $emails, $role); AUDIT(ACTION_LOGIN, $username, '', '', 'successful auth against LDAP'); return 1; } } return 0; } public function change_password($username = '', $password = '') { if($username == "" || $password == ""){ return 0; } $query = $this->db->query("UPDATE " . TABLE_USER . " SET password=? WHERE username=?", array(crypt($password), $username)); $rc = $this->db->countAffected(); return $rc; } } ?>