mirror of
https://github.com/librenms/librenms.git
synced 2024-10-07 16:52:45 +00:00
* Enable secure cookies for authentication Enables secure cookies for authentication when HTTPS is used. * Add line with example secure session cookies * Fix comment line that's too long * Remove session secure cookie config * Added secure cookie config to init.php Commented out because having this enabled will prevent the server from sending cookies over HTTPS. * Enable secure cookies if config value provided * Make code formatting consistent * Remove secure cookie config * Use $config['secure_cookies'] to set cookies * Add default option to turn secure cookies on * Fix formatting issues * Set secure cookies to default to false * Add info about secure cookies * Fix formatting * Remove trailing whitespace * move secure cookie default config to defaults.inc.php * Remove trailing whitespace * Fix formatting * Remove empty line by rrd config * Remove whitespace
201 lines
6.1 KiB
PHP
201 lines
6.1 KiB
PHP
<?php
|
|
/**
|
|
* functions.php
|
|
*
|
|
* authentication functions
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
* @package LibreNMS
|
|
* @link http://librenms.org
|
|
* @copyright 2017 Tony Murray
|
|
* @author Tony Murray <murraytony@gmail.com>
|
|
*/
|
|
|
|
use LibreNMS\Authentication\TwoFactor;
|
|
use LibreNMS\Exceptions\AuthenticationException;
|
|
use Phpass\PasswordHash;
|
|
|
|
/**
|
|
* Log out the user, unset cookies, destroy the session
|
|
*
|
|
* @param string $message The logout message.
|
|
*/
|
|
function log_out_user($message = 'Logged Out')
|
|
{
|
|
global $auth_message;
|
|
|
|
dbInsert(array('user' => $_SESSION['username'], 'address' => get_client_ip(), 'result' => 'Logged Out'), 'authlog');
|
|
|
|
clear_remember_me($_SESSION['username']);
|
|
|
|
unset($_SESSION['authenticated']);
|
|
session_destroy();
|
|
|
|
$auth_message = $message; // global variable used to display a message to the user
|
|
}
|
|
|
|
/**
|
|
* Log in the user and set up a few login tasks
|
|
* $_SESSION['username'] must be set prior to calling this function
|
|
* If twofactor authentication is enabled, it will be checked here.
|
|
*
|
|
* If everything goes well, $_SESSION['authenticated'] will be true after this function completes.
|
|
* @return bool If the user was successfully logged in.
|
|
* @throws AuthenticationException if anything failed why trying to log in
|
|
*/
|
|
function log_in_user()
|
|
{
|
|
global $config;
|
|
|
|
// set up variables, but don't override existing ones (ad anonymous bind can only get user_id at login)
|
|
if (!isset($_SESSION['userlevel'])) {
|
|
$_SESSION['userlevel'] = get_userlevel($_SESSION['username']);
|
|
}
|
|
|
|
if (!isset($_SESSION['user_id'])) {
|
|
$_SESSION['user_id'] = get_userid($_SESSION['username']);
|
|
}
|
|
|
|
// check for valid user_id
|
|
if ($_SESSION['user_id'] === false || $_SESSION['user_id'] < 0) {
|
|
throw new AuthenticationException('Invalid Credentials');
|
|
}
|
|
|
|
if (!session_authenticated()) {
|
|
// check twofactor
|
|
if ($config['twofactor'] === true && !isset($_SESSION['twofactor'])) {
|
|
if (TwoFactor::showForm()) {
|
|
return false; // not done yet, one more cycle to show the 2fa form
|
|
}
|
|
}
|
|
|
|
// if two factor isn't enabled or it has passed already ware are logged in
|
|
if (!$config['twofactor'] || $_SESSION['twofactor']) {
|
|
$_SESSION['authenticated'] = true;
|
|
dbInsert(array('user' => $_SESSION['username'], 'address' => get_client_ip(), 'result' => 'Logged In'), 'authlog');
|
|
}
|
|
}
|
|
|
|
if (session_authenticated()) {
|
|
set_remember_me();
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Check if the session is authenticated
|
|
*
|
|
* @return bool
|
|
*/
|
|
function session_authenticated()
|
|
{
|
|
return isset($_SESSION['authenticated']) && $_SESSION['authenticated'];
|
|
}
|
|
|
|
/**
|
|
* Set or update the remember me cookie if $_SESSION['remember'] is set
|
|
* If setting a new cookie, $_SESSION['username'] must be set
|
|
*/
|
|
function set_remember_me()
|
|
{
|
|
global $config;
|
|
|
|
if (!isset($_SESSION['remember'])) {
|
|
return;
|
|
}
|
|
unset($_SESSION['remember']);
|
|
|
|
$sess_id = session_id();
|
|
$expiration = time() + 60 * 60 * 24 * $config['auth_remember'];
|
|
|
|
$db_entry = array(
|
|
'session_value' => $sess_id,
|
|
'session_expiry' => $expiration,
|
|
);
|
|
|
|
if (isset($_COOKIE['token'], $_COOKIE['auth'])) {
|
|
$token_id = $_COOKIE['token'];
|
|
$auth = $_COOKIE['auth'];
|
|
dbUpdate($db_entry, 'session', 'session_auth=?', array($_COOKIE['auth']));
|
|
} else {
|
|
$token = strgen();
|
|
$auth = strgen();
|
|
$hasher = new PasswordHash(8, false);
|
|
$token_id = $_SESSION['username'] . '|' . $hasher->HashPassword($_SESSION['username'] . $token);
|
|
|
|
$db_entry['session_username'] = $_SESSION['username'];
|
|
$db_entry['session_token'] = $token;
|
|
$db_entry['session_auth'] = $auth;
|
|
dbInsert($db_entry, 'session');
|
|
}\
|
|
|
|
setcookie('sess_id', $sess_id, $expiration, '/', null, $config['secure_cookies'], true);
|
|
setcookie('token', $token_id, $expiration, '/', null, $config['secure_cookies'], true);
|
|
setcookie('auth', $auth, $expiration, '/', null, $config['secure_cookies'], true);
|
|
}
|
|
|
|
/**
|
|
* Check the remember me cookie
|
|
* If the cookie is valid, $_SESSION['username'] will be set
|
|
*
|
|
* @param string $sess_id sess_id cookie value
|
|
* @param string $token token cookie value
|
|
* @return bool is the remember me token valid
|
|
* @throws AuthenticationException thrown if the cookie is invalid
|
|
*/
|
|
function check_remember_me($sess_id, $token)
|
|
{
|
|
list($uname, $hash) = explode('|', $token);
|
|
$session = dbFetchRow(
|
|
"SELECT * FROM `session` WHERE `session_username`=? AND `session_value`=?",
|
|
array($uname, $sess_id),
|
|
true
|
|
);
|
|
|
|
$hasher = new PasswordHash(8, false);
|
|
if ($hasher->CheckPassword($uname . $session['session_token'], $hash)) {
|
|
$_SESSION['username'] = $uname;
|
|
return true;
|
|
}
|
|
|
|
clear_remember_me($uname);
|
|
throw new AuthenticationException('Cookie invalid, please log in.');
|
|
}
|
|
|
|
/**
|
|
* Clear remember cookie and remove our database record
|
|
*
|
|
* @param $username
|
|
*/
|
|
function clear_remember_me($username)
|
|
{
|
|
global $config;
|
|
|
|
dbDelete(
|
|
'session',
|
|
'`session_username` = ? AND `session_value` = ?',
|
|
array($username, $_COOKIE['sess_id'])
|
|
);
|
|
|
|
unset($_COOKIE);
|
|
|
|
$time = time() - 60 * 60 * 24 * $config['auth_remember']; // time in the past to make sure
|
|
|
|
setcookie('sess_id', '', $time, '/', null, $config['secure_cookies']);
|
|
setcookie('token', '', $time, '/', null, $config['secure_cookies']);
|
|
setcookie('auth', '', $time, '/', null, $config['secure_cookies']);
|
|
}
|