--- loncom/auth/lonauth.pm 2000/01/14 21:12:40 1.4 +++ loncom/auth/lonauth.pm 2008/10/01 11:11:08 1.95 @@ -1,152 +1,359 @@ # The LearningOnline Network # User Authentication Module -# 5/21/99,5/22,5/25,5/26,5/27,5/29,6/2,6/11,6/14,6/15 -# 16/11,12/16, -# 1/14 Gerd Kortemeyer +# +# $Id: lonauth.pm,v 1.95 2008/10/01 11:11:08 bisitz Exp $ +# +# Copyright Michigan State University Board of Trustees +# +# This file is part of the LearningOnline Network with CAPA (LON-CAPA). +# +# LON-CAPA is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# (at your option) any later version. +# +# LON-CAPA is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with LON-CAPA; if not, write to the Free Software +# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA +# +# /home/httpd/html/adm/gpl.txt +# +# http://www.lon-capa.org/ +# package Apache::lonauth; +use strict; +use LONCAPA; use Apache::Constants qw(:common); -use Apache::File; use CGI qw(:standard); -use CGI::Cookie(); -use Apache::lonnet(); - +use DynaLoader; # for Crypt::DES version +use Crypt::DES; +use Apache::loncommon(); +use Apache::lonnet; +use Apache::lonmenu(); +use Apache::createaccount; +use Fcntl qw(:flock); +use Apache::lonlocal; + # ------------------------------------------------------------ Successful login - sub success { - my ($r, $username, $domain, $authhost) = @_; - my $lonids=$r->dir_config('lonIDsDir'); + my ($r, $username, $domain, $authhost, $lowerurl, $extra_env, + $form) = @_; + +# ------------------------------------------------------------ Get cookie ready + my $cookie = + &Apache::loncommon::init_user_environment($r, $username, $domain, + $authhost, $form, + {'extra_env' => $extra_env,}); + + my $public=($username eq 'public' && $domain eq 'public'); + + if ($public or $lowerurl eq 'noredirect') { return $cookie; } + +# -------------------------------------------------------------------- Log this -# See if old ID present, if so, remove - my $cookie; - while ($cookie=<$lonids/$username\_*\_$domain\_$authhost.id>) { - unlink($cookie); - } - -# Give them a new cookie - - my $now=time; - $cookie="$username\_$now\_$domain\_$authhost"; - my $rolesdump=Apache::lonnet::reply("dump:$domain:$username:roles", - $authhost); - my $userroles=''; - if ($rolesdump ne '') { - map { - my ($area,$role)=split(/=/,$_); - my ($trole,$tend,$tstart)=split(/_/,$role); - if ($tend!=0) { - if ($tend<$now) { - my $localtime=localtime($tend); - $trole="Role expired $localtime"; - } - } - if ($tstart!=0) { - if ($tstart>$now) { - my $localtime=localtime($tend); - $trole="Role becomes active $localtime"; - } - } - if ($area ne '') { - $userroles.="user.role.$area=$trole\n"; - } - } split(/&/,$rolesdump); - } - { - my $idf=Apache::File->new(">$lonids/$cookie.id"); - print $idf "user.name=$username\n"; - print $idf "user.domain=$domain\n"; - print $idf "user.home=$authhost\n"; - if ($userroles ne '') { print $idf "$userroles" }; + &Apache::lonnet::log($domain,$username,$authhost, + "Login $ENV{'REMOTE_ADDR'}"); + +# ------------------------------------------------- Check for critical messages + + my @what=&Apache::lonnet::dump('critical',$domain,$username); + if ($what[0]) { + if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) { + $lowerurl='/adm/email?critical=display'; } + } +# ------------------------------------------------------------ Get cookie ready $cookie="lonID=$cookie; path=/"; - $r->send_cgi_header(< 1,}); + my $end_page =&Apache::loncommon::end_page(); + + my $continuelink; + if (($env{'browser.interface'} eq 'textual') || + ($env{'environment.remote'} eq 'off')) { + $continuelink="".&mt('Continue').""; + } +# ------------------------------------------------- Output for successful login -ENDHEADER + &Apache::loncommon::content_type($r,'text/html'); + $r->header_out('Set-cookie' => $cookie); + $r->send_http_header; + + my %lt=&Apache::lonlocal::texthash( + 'wel' => 'Welcome', + 'mes' => 'Welcome to the LearningOnline Network with CAPA. Please wait while your session is being set up.', + 'pro' => 'Login problems?', + 'log' => 'loginproblems.html', + ); $r->print(< - -Successful Login to the LearningOnline Network with CAPA - - - - - - +$start_page +$setflags +$windowinfo +

$lt{'wel'}

+$lt{'mes'}

+$lt{'pro'}

+$remoteinfo +$maincall +$continuelink +$end_page ENDSUCCESS } # --------------------------------------------------------------- Failed login! sub failed { - my ($r,$message) = @_; - $r->send_cgi_header(<print(< - -Unsuccessful Login to the LearningOnline Network with CAPA - - - -

Sorry ...

-

$message to use the LearningOnline Network with CAPA

- - -ENDFAILED + my ($r,$message,$form) = @_; + my $start_page = &Apache::loncommon::start_page('Unsuccessful Login',undef, + {'no_inline_link' => 1,}); + my $end_page = &Apache::loncommon::end_page(); + &Apache::loncommon::content_type($r,'text/html'); + sleep 1; # brute force counteraction: slow down attackers, which try to hack user authentication with automated scripts + $r->send_http_header; + $r->print( + $start_page + .'

'.&mt('Sorry ...').'

' + .'

'.&mt($message).'

' + .'

'.&mt('Please [_1]log in again[_2].' + ,"{'uname'}&domain=$form->{'udom'}\">",'') + .'

' + .'

'.&mt('Login problems?').'

' + .$end_page + ); + } + +# ------------------------------------------------------------------ Rerouting! + +sub reroute { + my ($r) = @_; + &Apache::loncommon::content_type($r,'text/html'); + $r->send_http_header; + my $msg='

'.&mt('Sorry ...').'

' + .&mt('Please [_1]log in again[_2].'); + &Apache::loncommon::simple_error_page($r,'Rerouting',$msg); } # ---------------------------------------------------------------- Main handler sub handler { my $r = shift; + my $form; +# Are we re-routing? + if (-e '/home/httpd/html/lon-status/reroute.txt') { + &reroute($r); + return OK; + } + + &Apache::lonlocal::get_language_handle($r); + +# -------------------------------- Prevent users from attempting to login twice + my $handle = &Apache::lonnet::check_for_valid_session($r); + if ($handle ne '') { +# Indeed, a valid token is found + &Apache::loncommon::content_type($r,'text/html'); + $r->send_http_header; + my $start_page = + &Apache::loncommon::start_page('Already logged in'); + my $end_page = + &Apache::loncommon::end_page(); + $r->print( + $start_page + .'

'.&mt('You are already logged in!').'

' + .'

'.&mt('Please either [_1]continue the current session[_2] or [_3]logout[_4].' + ,'','','','') + .'

' + .'

'.&mt('Login problems?').'

' + .$end_page + ); + return OK; + } + +# ---------------------------------------------------- No valid token, continue + my $buffer; - $r->read($buffer,$r->header_in('Content-length')); - my @pairs=split(/&/,$buffer); - my $pair; my $name; my $value; my %FORM; - foreach $pair (@pairs) { - ($name,$value) = split(/=/,$pair); - $FORM{$name}=$value; + if ($r->header_in('Content-length') > 0) { + $r->read($buffer,$r->header_in('Content-length'),0); + } + my %form; + foreach my $pair (split(/&/,$buffer)) { + my ($name,$value) = split(/=/,$pair); + $value =~ tr/+/ /; + $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; + $form{$name}=$value; } - if ((!$FORM{'uname'}) || (!$FORM{'upass'}) || (!$FORM{'udom'})) { - failed($r,'Username, password and domain need to be specified'); + if ((!$form{'uname'}) || (!$form{'upass0'}) || (!$form{'udom'})) { + &failed($r,'Username, password and domain need to be specified.', + \%form); return OK; } - $FORM{'uname'} =~ s/\W//g; - $FORM{'upass'} =~ s/\W//g; - $FORM{'udom'} =~ s/\W//g; + +# split user logging in and "su"-user + + ($form{'uname'},$form{'suname'})=split(/\:/,$form{'uname'}); + $form{'uname'} = &LONCAPA::clean_username($form{'uname'}); + $form{'suname'}= &LONCAPA::clean_username($form{'suname'}); + $form{'udom'} = &LONCAPA::clean_domain( $form{'udom'}); my $role = $r->dir_config('lonRole'); my $domain = $r->dir_config('lonDefDomain'); my $prodir = $r->dir_config('lonUsersDir'); + my $contact_name = &mt('LON-CAPA helpdesk'); + +# ---------------------------------------- Get the information from login token + + my $tmpinfo=Apache::lonnet::reply('tmpget:'.$form{'logtoken'}, + $form{'serverid'}); + + if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) { + &failed($r,'Information needed to verify your login information is missing, inaccessible or expired.',\%form); + return OK; + } else { + my $reply = &Apache::lonnet::reply('tmpdel:'.$form{'logtoken'}, + $form{'serverid'}); + if ( $reply ne 'ok' ) { + &failed($r,'Session could not be opened.',\%form); + &Apache::lonnet::logthis("ERROR got a reply of $reply when trying to contact ". $form{'serverid'}." to get login token"); + return OK; + } + } + if (!&Apache::lonnet::domain($form{'udom'})) { + &failed($r,'The domain you provided is not a valid LON-CAPA domain.',\%form); + return OK; + } + my ($key,$firsturl)=split(/&/,$tmpinfo); + + my $keybin=pack("H16",$key); + + my $cipher; + if ($Crypt::DES::VERSION>=2.03) { + $cipher=new Crypt::DES $keybin; + } + else { + $cipher=new DES $keybin; + } + my $upass=''; + for (my $i=0;$i<=2;$i++) { + my $chunk= + $cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},0,16)))); + + $chunk.= + $cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},16,16)))); + + $chunk=substr($chunk,1,ord(substr($chunk,0,1))); + $upass.=$chunk; + } # ---------------------------------------------------------------- Authenticate - my $authhost=Apache::lonnet::authenticate($FORM{'uname'}, - $FORM{'upass'}, - $FORM{'udom'}); + my @cancreate; + my %domconfig = &Apache::lonnet::get_dom('configuration',['usercreation'],$form{'udom'}); + if (ref($domconfig{'usercreation'}) eq 'HASH') { + if (ref($domconfig{'usercreation'}{'cancreate'}) eq 'HASH') { + if (ref($domconfig{'usercreation'}{'cancreate'}{'selfcreate'}) eq 'ARRAY') { + @cancreate = @{$domconfig{'usercreation'}{'cancreate'}{'selfcreate'}}; + } elsif (($domconfig{'usercreation'}{'cancreate'}{'selfcreate'} ne 'none') && + ($domconfig{'usercreation'}{'cancreate'}{'selfcreate'} ne '')) { + @cancreate = ($domconfig{'usercreation'}{'cancreate'}{'selfcreate'}); + } + } + } + my $defaultauth; + if (grep(/^login$/,@cancreate)) { + $defaultauth = 1; + } + my $authhost=Apache::lonnet::authenticate($form{'uname'},$upass, + $form{'udom'},$defaultauth); # --------------------------------------------------------------------- Failed? if ($authhost eq 'no_host') { - failed($r,'Username and/or password could not be authenticated'); + &failed($r,'Username and/or password could not be authenticated.', + \%form); return OK; + } elsif ($authhost eq 'no_account_on_host') { + my %domconfig = + &Apache::lonnet::get_dom('configuration',['usercreation'],$form{'udom'}); + if (grep(/^login$/,@cancreate)) { + my $start_page = + &Apache::loncommon::start_page('Create a user account in LON-CAPA', + '',{'no_inline_link' => 1,}); + my $domdesc = &Apache::lonnet::domain($form{'udom'},'description'); + my $lonhost = $r->dir_config('lonHostID'); + my $origmail = $Apache::lonnet::perlvar{'lonSupportEMail'}; + my $contacts = + &Apache::loncommon::build_recipient_list(undef,'helpdeskmail', + $form{'udom'},$origmail); + my ($contact_email) = split(',',$contacts); + my $output = &Apache::createaccount::username_check($form{'uname'}, + $form{'udom'},$domdesc,'', + $lonhost,$contact_email,$contact_name); + &Apache::loncommon::content_type($r,'text/html'); + $r->send_http_header; + &Apache::createaccount::print_header($r,$start_page); + $r->print('

'.&mt('Account creation').'

'. + &mt('Although your username and password were authenticated, you do not currently have a LON-CAPA account at this institution.').'
'. + $output.&Apache::loncommon::end_page()); + return OK; + } else { + &failed($r,'Although your username and password were authenticated, you do not currently have a LON-CAPA account in this domain, and you are not permitted to create one.',\%form); + return OK; + } } - my %cookies=CGI::Cookie->parse($r->header_in('Cookie')); - my $lonurl=$cookies{'lonURL'}; - if (!$lonurl) { failed($r,'Cookies need to be activated'); return OK; } - my $lowerurl=$lonurl->value; + if (($firsturl eq '') || + ($firsturl=~/^\/adm\/(logout|remote)/)) { + $firsturl='/adm/roles'; + } +# --------------------------------- Are we attempting to login as somebody else? + if ($form{'suname'}) { +# ------------ see if the original user has enough privileges to pull this stunt + if (&Apache::lonnet::privileged($form{'uname'},$form{'udom'})) { +# ---------------------------------------------------- see if the su-user exists + unless (&Apache::lonnet::homeserver($form{'suname'},$form{'udom'}) + eq 'no_host') { + &Apache::lonnet::logthis(&Apache::lonnet::homeserver($form{'suname'},$form{'udom'})); +# ------------------------------ see if the su-user is not too highly privileged + unless (&Apache::lonnet::privileged($form{'suname'},$form{'udom'})) { +# -------------------------------------------------------- actually switch users + &Apache::lonnet::logperm('User '.$form{'uname'}.' at '.$form{'udom'}. + ' logging in as '.$form{'suname'}); + $form{'uname'}=$form{'suname'}; + } else { + &Apache::lonnet::logthis('Attempted switch user to privileged user'); + } + } + } else { + &Apache::lonnet::logthis('Non-privileged user attempting switch user'); + } + } - success($r,$FORM{'uname'},$FORM{'udom'},$authhost); + if ($r->dir_config("lonBalancer") eq 'yes') { + &success($r,$form{'uname'},$form{'udom'},$authhost,'noredirect',undef, + \%form); + $r->internal_redirect('/adm/switchserver'); + } else { + &success($r,$form{'uname'},$form{'udom'},$authhost,$firsturl,undef, + \%form); + } return OK; } 1; __END__ + +