YOURLS/includes/functions-auth.php

364 lines
11 KiB
PHP
Raw Normal View History

2013-04-07 12:52:52 +02:00
<?php
/**
* Check for valid user via login form or stored cookie. Returns true or an error message
*
*/
2013-04-07 12:52:52 +02:00
function yourls_is_valid_user() {
static $valid = false;
if( $valid )
return true;
// Allow plugins to short-circuit the whole function
$pre = yourls_apply_filter( 'shunt_is_valid_user', null );
if ( null !== $pre ) {
$valid = ( $pre === true ) ;
return $pre;
}
2013-05-07 15:26:14 +02:00
// $unfiltered_valid : are credentials valid? Boolean value. It's "unfiltered" to allow plugins to eventually filter it.
2013-04-07 12:52:52 +02:00
$unfiltered_valid = false;
// Logout request
if( isset( $_GET['action'] ) && $_GET['action'] == 'logout' ) {
yourls_do_action( 'logout' );
yourls_store_cookie( null );
return yourls__( 'Logged out successfully' );
}
// Check cookies or login request. Login form has precedence.
2013-05-07 18:15:12 +02:00
2013-04-07 12:52:52 +02:00
yourls_do_action( 'pre_login' );
// Determine auth method and check credentials
if
// API only: Secure (no login or pwd) and time limited token
// ?timestamp=12345678&signature=md5(totoblah12345678)
( yourls_is_API() &&
isset( $_REQUEST['timestamp'] ) && !empty($_REQUEST['timestamp'] ) &&
isset( $_REQUEST['signature'] ) && !empty($_REQUEST['signature'] )
)
{
yourls_do_action( 'pre_login_signature_timestamp' );
$unfiltered_valid = yourls_check_signature_timestamp();
}
elseif
// API only: Secure (no login or pwd)
// ?signature=md5(totoblah)
( yourls_is_API() &&
!isset( $_REQUEST['timestamp'] ) &&
isset( $_REQUEST['signature'] ) && !empty( $_REQUEST['signature'] )
)
{
yourls_do_action( 'pre_login_signature' );
$unfiltered_valid = yourls_check_signature();
}
elseif
// API or normal: login with username & pwd
( isset( $_REQUEST['username'] ) && isset( $_REQUEST['password'] )
&& !empty( $_REQUEST['username'] ) && !empty( $_REQUEST['password'] ) )
{
yourls_do_action( 'pre_login_username_password' );
$unfiltered_valid = yourls_check_username_password();
}
elseif
// Normal only: cookies
( !yourls_is_API() &&
2013-06-05 04:58:13 +00:00
isset( $_COOKIE['yourls_username'] ) )
2013-04-07 12:52:52 +02:00
{
yourls_do_action( 'pre_login_cookie' );
$unfiltered_valid = yourls_check_auth_cookie();
}
2013-05-07 15:26:14 +02:00
// Regardless of validity, allow plugins to filter the boolean and have final word
2013-04-07 12:52:52 +02:00
$valid = yourls_apply_filter( 'is_valid_user', $unfiltered_valid );
// Login for the win!
if ( $valid ) {
yourls_do_action( 'login' );
2013-05-07 18:15:12 +02:00
2013-05-07 15:26:14 +02:00
// (Re)store encrypted cookie if needed
if ( !yourls_is_API() ) {
2013-04-07 12:52:52 +02:00
yourls_store_cookie( YOURLS_USER );
2013-05-07 18:15:12 +02:00
2013-05-07 15:26:14 +02:00
// Login form : redirect to requested URL to avoid re-submitting the login form on page reload
if( isset( $_REQUEST['username'] ) && isset( $_REQUEST['password'] ) ) {
2013-05-07 18:15:12 +02:00
$url = $_SERVER['REQUEST_URI'];
yourls_redirect( $url );
2013-05-07 15:26:14 +02:00
}
}
// Login successful
2013-04-07 12:52:52 +02:00
return true;
}
// Login failed
yourls_do_action( 'login_failed' );
if ( isset( $_REQUEST['username'] ) || isset( $_REQUEST['password'] ) ) {
return yourls__( 'Invalid username or password' );
} else {
return yourls__( 'Please log in' );
}
}
/**
* Check auth against list of login=>pwd. Sets user if applicable, returns bool
*
*/
2013-04-07 12:52:52 +02:00
function yourls_check_username_password() {
global $yourls_user_passwords;
2013-05-07 18:15:12 +02:00
if( isset( $yourls_user_passwords[ $_REQUEST['username'] ] ) && yourls_check_password_hash( $_REQUEST['username'], $_REQUEST['password'] ) ) {
2013-04-07 12:52:52 +02:00
yourls_set_user( $_REQUEST['username'] );
return true;
}
return false;
}
/**
2013-05-07 18:15:12 +02:00
* Check a submitted password sent in plain text against stored password which can be a salted hash
*
*/
2013-05-07 18:15:12 +02:00
function yourls_check_password_hash( $user, $submitted_password ) {
global $yourls_user_passwords;
if( !isset( $yourls_user_passwords[ $user ] ) )
return false;
if ( yourls_has_phpass_password( $user ) ) {
// Stored password is hashed with phpass
$hasher = new PasswordHash( 8, false );
list( , $hash ) = explode( ':', $yourls_user_passwords[ $user ] );
$hash = str_replace( '!', '$', $hash );
return ( $hasher->CheckPassword( $submitted_password, $hash ) );
} else if( yourls_has_md5_password( $user ) ) {
// Stored password is a salted md5 hash: "md5:<$r = rand(10000,99999)>:<md5($r.'thepassword')>"
2013-05-07 18:15:12 +02:00
list( , $salt, ) = explode( ':', $yourls_user_passwords[ $user ] );
return( $yourls_user_passwords[ $user ] == 'md5:'.$salt.':'.md5( $salt . $submitted_password ) );
2013-04-07 12:52:52 +02:00
} else {
2013-05-07 18:15:12 +02:00
// Password stored in clear text
return( $yourls_user_passwords[ $user ] == $submitted_password );
2013-04-07 12:52:52 +02:00
}
}
/**
* Overwrite plaintext passwords in config file with phpassed versions.
*
* @since 1.7
* @return true if overwrite was successful, an error message otherwise
*/
function yourls_hash_passwords_now() {
global $yourls_user_passwords;
$configdata = file_get_contents( YOURLS_CONFIGFILE );
if( $configdata == false )
return 'could not read file';
$to_hash = 0; // keep track of number of passwords that need hashing
$hasher = new PasswordHash( 8, false );
// TODO: check mode for writability
foreach ( $yourls_user_passwords as $user => $password ) {
if ( !yourls_has_phpass_password( $user ) && !yourls_has_md5_password( $user ) ) {
$to_hash++;
$hash = $hasher->HashPassword( $password );
// PHP would interpret $ as a variable, so replace it in storage.
$hash = str_replace( '$', '!', $hash );
$quotes = "'" . '"';
$pattern = "/[$quotes]${user}[$quotes]\s*=>\s*[$quotes]" . preg_quote( $password, '-' ) . "[$quotes]/";
$replace = "'$user' => 'phpass:$hash' /* Password encrypted by YOURLS */ ";
$count = 0;
$configdata = preg_replace( $pattern, $replace, $configdata, -1, $count );
// There should be exactly one replacement. Otherwise, fast fail.
if ( $count != 1 ) {
global $ydb;
$ydb->debug_log[] = "Problem with preg_replace for password hash of user $user";
return 'preg_replace problem';
}
}
}
if( $to_hash == 0 )
return true; // There was no password to encrypt
$success = file_put_contents( YOURLS_CONFIGFILE, $configdata );
if ( $success === FALSE ) {
global $ydb;
$ydb->debug_log[] = "Failed writing to " . YOURLS_CONFIGFILE;
return 'could not write file';
}
return true;
}
/**
* Check to see if any passwords are stored as cleartext.
*
* @since 1.7
* @return bool true if any passwords are cleartext
*/
function yourls_has_cleartext_passwords() {
global $yourls_user_passwords;
foreach ( $yourls_user_passwords as $user => $pwdata ) {
if ( !yourls_has_md5_password( $user ) && !yourls_has_phpass_password( $user ) ) {
return true;
}
}
return false;
}
2013-05-07 18:15:12 +02:00
/**
* Check if a user has a hashed password
*
* Check if a user password is 'md5:[38 chars]'. TODO: deprecate this when/if we have proper user management with
* password hashes stored in the DB
*
* @since 1.7
* @param string $user user login
* @return bool true if password hashed, false otherwise
*/
function yourls_has_md5_password( $user ) {
2013-05-07 18:15:12 +02:00
global $yourls_user_passwords;
return( isset( $yourls_user_passwords[ $user ] )
&& substr( $yourls_user_passwords[ $user ], 0, 4 ) == 'md5:'
&& strlen( $yourls_user_passwords[ $user ] ) == 42 // http://www.google.com/search?q=the+answer+to+life+the+universe+and+everything
);
}
2013-04-07 12:52:52 +02:00
/**
* Check if a user's password is hashed with PHPASS.
*
* @since 1.7
* @param string $user user login
* @return bool true if password hashed with PHPASS, otherwise false
*/
function yourls_has_phpass_password( $user ) {
global $yourls_user_passwords;
return( isset( $yourls_user_passwords[ $user ] )
&& substr( $yourls_user_passwords[ $user ], 0, 7 ) == 'phpass:'
);
}
/**
* Check auth against encrypted COOKIE data. Sets user if applicable, returns bool
*
*/
2013-04-07 12:52:52 +02:00
function yourls_check_auth_cookie() {
global $yourls_user_passwords;
foreach( $yourls_user_passwords as $valid_user => $valid_password ) {
if ( yourls_salt( $valid_user ) == $_COOKIE['yourls_username'] ) {
2013-04-07 12:52:52 +02:00
yourls_set_user( $valid_user );
return true;
}
}
return false;
}
/**
* Check auth against signature and timestamp. Sets user if applicable, returns bool
*
*/
2013-04-07 12:52:52 +02:00
function yourls_check_signature_timestamp() {
// Timestamp in PHP : time()
// Timestamp in JS: parseInt(new Date().getTime() / 1000)
global $yourls_user_passwords;
foreach( $yourls_user_passwords as $valid_user => $valid_password ) {
if (
(
md5( $_REQUEST['timestamp'].yourls_auth_signature( $valid_user ) ) == $_REQUEST['signature']
or
md5( yourls_auth_signature( $valid_user ).$_REQUEST['timestamp'] ) == $_REQUEST['signature']
)
&&
yourls_check_timestamp( $_REQUEST['timestamp'] )
) {
yourls_set_user( $valid_user );
return true;
}
}
return false;
}
/**
* Check auth against signature. Sets user if applicable, returns bool
*
*/
2013-04-07 12:52:52 +02:00
function yourls_check_signature() {
global $yourls_user_passwords;
foreach( $yourls_user_passwords as $valid_user => $valid_password ) {
if ( yourls_auth_signature( $valid_user ) == $_REQUEST['signature'] ) {
yourls_set_user( $valid_user );
return true;
}
}
return false;
}
/**
* Generate secret signature hash
*
*/
2013-04-07 12:52:52 +02:00
function yourls_auth_signature( $username = false ) {
if( !$username && defined('YOURLS_USER') ) {
$username = YOURLS_USER;
}
return ( $username ? substr( yourls_salt( $username ), 0, 10 ) : 'Cannot generate auth signature: no username' );
}
/**
* Check if timestamp is not too old
*
*/
2013-04-07 12:52:52 +02:00
function yourls_check_timestamp( $time ) {
$now = time();
// Allow timestamp to be a little in the future or the past -- see Issue 766
return yourls_apply_filter( 'check_timestamp', abs( $now - $time ) < YOURLS_NONCE_LIFE, $time );
}
/**
* Store new cookie. No $user will delete the cookie.
*
*/
2013-04-07 12:52:52 +02:00
function yourls_store_cookie( $user = null ) {
if( !$user ) {
$pass = null;
$time = time() - 3600;
} else {
global $yourls_user_passwords;
if( isset($yourls_user_passwords[$user]) ) {
$pass = $yourls_user_passwords[$user];
} else {
die( 'Stealing cookies?' ); // This should never happen
}
$time = time() + YOURLS_COOKIE_LIFE;
}
$domain = yourls_apply_filter( 'setcookie_domain', parse_url( YOURLS_SITE, 1 ) );
$secure = yourls_apply_filter( 'setcookie_secure', yourls_is_ssl() );
$httponly = yourls_apply_filter( 'setcookie_httponly', true );
2013-06-04 04:44:12 +00:00
2013-04-07 12:52:52 +02:00
if ( !headers_sent() ) {
// Set httponly if the php version is >= 5.2.0
if( version_compare( phpversion(), '5.2.0', 'ge' ) ) {
setcookie('yourls_username', yourls_salt( $user ), $time, '/', $domain, $secure, $httponly );
} else {
setcookie('yourls_username', yourls_salt( $user ), $time, '/', $domain, $secure );
}
2013-05-07 15:26:14 +02:00
} else {
// For some reason cookies were not stored: action to be able to debug that
yourls_do_action( 'setcookie_failed', $user );
2013-04-07 12:52:52 +02:00
}
}
/**
* Set user name
*
*/
2013-04-07 12:52:52 +02:00
function yourls_set_user( $user ) {
if( !defined( 'YOURLS_USER' ) )
define( 'YOURLS_USER', $user );
}
2013-05-07 18:15:12 +02:00