Annotation of loncom/auth/lonauth.pm, revision 1.95
1.1 albertel 1: # The LearningOnline Network
2: # User Authentication Module
1.27 www 3: #
1.95 ! bisitz 4: # $Id: lonauth.pm,v 1.94 2008/07/13 00:51:31 raeburn Exp $
1.27 www 5: #
6: # Copyright Michigan State University Board of Trustees
7: #
8: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
9: #
10: # LON-CAPA is free software; you can redistribute it and/or modify
11: # it under the terms of the GNU General Public License as published by
12: # the Free Software Foundation; either version 2 of the License, or
13: # (at your option) any later version.
14: #
15: # LON-CAPA is distributed in the hope that it will be useful,
16: # but WITHOUT ANY WARRANTY; without even the implied warranty of
17: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18: # GNU General Public License for more details.
19: #
20: # You should have received a copy of the GNU General Public License
21: # along with LON-CAPA; if not, write to the Free Software
22: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23: #
24: # /home/httpd/html/adm/gpl.txt
25: #
26: # http://www.lon-capa.org/
27: #
1.1 albertel 28:
29: package Apache::lonauth;
30:
1.18 albertel 31: use strict;
1.78 albertel 32: use LONCAPA;
1.1 albertel 33: use Apache::Constants qw(:common);
34: use CGI qw(:standard);
1.26 harris41 35: use DynaLoader; # for Crypt::DES version
1.8 www 36: use Crypt::DES;
1.45 matthew 37: use Apache::loncommon();
1.66 albertel 38: use Apache::lonnet;
1.12 www 39: use Apache::lonmenu();
1.90 raeburn 40: use Apache::createaccount;
1.18 albertel 41: use Fcntl qw(:flock);
1.56 www 42: use Apache::lonlocal;
1.85 albertel 43:
1.1 albertel 44: # ------------------------------------------------------------ Successful login
1.85 albertel 45: sub success {
46: my ($r, $username, $domain, $authhost, $lowerurl, $extra_env,
47: $form) = @_;
1.1 albertel 48:
1.85 albertel 49: # ------------------------------------------------------------ Get cookie ready
50: my $cookie =
51: &Apache::loncommon::init_user_environment($r, $username, $domain,
52: $authhost, $form,
1.86 albertel 53: {'extra_env' => $extra_env,});
1.4 www 54:
1.69 albertel 55: my $public=($username eq 'public' && $domain eq 'public');
56:
1.85 albertel 57: if ($public or $lowerurl eq 'noredirect') { return $cookie; }
1.78 albertel 58:
1.7 www 59: # -------------------------------------------------------------------- Log this
60:
61: &Apache::lonnet::log($domain,$username,$authhost,
62: "Login $ENV{'REMOTE_ADDR'}");
1.4 www 63:
1.14 www 64: # ------------------------------------------------- Check for critical messages
65:
1.21 www 66: my @what=&Apache::lonnet::dump('critical',$domain,$username);
1.14 www 67: if ($what[0]) {
1.22 www 68: if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) {
1.21 www 69: $lowerurl='/adm/email?critical=display';
1.14 www 70: }
71: }
72:
1.5 www 73: # ------------------------------------------------------------ Get cookie ready
1.1 albertel 74: $cookie="lonID=$cookie; path=/";
1.12 www 75: # -------------------------------------------------------- Menu script and info
1.85 albertel 76: my $windowinfo=&Apache::lonmenu::open($env{'browser.os'});
1.35 www 77: my $startupremote=&Apache::lonmenu::startupremote($lowerurl);
1.63 albertel 78: my $remoteinfo=&Apache::lonmenu::load_remote_msg($lowerurl);
1.35 www 79: my $setflags=&Apache::lonmenu::setflags();
80: my $maincall=&Apache::lonmenu::maincall();
1.74 albertel 81: my $start_page=&Apache::loncommon::start_page('Successful Login',
1.76 albertel 82: $startupremote,
83: {'no_inline_link' => 1,});
1.74 albertel 84: my $end_page =&Apache::loncommon::end_page();
85:
1.64 albertel 86: my $continuelink;
1.66 albertel 87: if (($env{'browser.interface'} eq 'textual') ||
88: ($env{'environment.remote'} eq 'off')) {
1.64 albertel 89: $continuelink="<a href=\"$lowerurl\">".&mt('Continue')."</a>";
90: }
1.5 www 91: # ------------------------------------------------- Output for successful login
92:
1.74 albertel 93: &Apache::loncommon::content_type($r,'text/html');
94: $r->header_out('Set-cookie' => $cookie);
95: $r->send_http_header;
1.1 albertel 96:
1.58 www 97: my %lt=&Apache::lonlocal::texthash(
98: 'wel' => 'Welcome',
1.92 bisitz 99: 'mes' => 'Welcome to the Learning<i>Online</i> Network with CAPA. Please wait while your session is being set up.',
100: 'pro' => 'Login problems?',
1.58 www 101: 'log' => 'loginproblems.html',
102: );
1.1 albertel 103: $r->print(<<ENDSUCCESS);
1.74 albertel 104: $start_page
1.35 www 105: $setflags
1.19 www 106: $windowinfo
1.58 www 107: <h1>$lt{'wel'}</h1>
1.92 bisitz 108: $lt{'mes'}<p>
109: <a href="/adm/$lt{'log'}">$lt{'pro'}</a></p>
1.63 albertel 110: $remoteinfo
1.35 www 111: $maincall
1.64 albertel 112: $continuelink
1.74 albertel 113: $end_page
1.1 albertel 114: ENDSUCCESS
115: }
116:
117: # --------------------------------------------------------------- Failed login!
118:
119: sub failed {
1.85 albertel 120: my ($r,$message,$form) = @_;
1.76 albertel 121: my $start_page = &Apache::loncommon::start_page('Unsuccessful Login',undef,
122: {'no_inline_link' => 1,});
1.74 albertel 123: my $end_page = &Apache::loncommon::end_page();
124: &Apache::loncommon::content_type($r,'text/html');
1.95 ! bisitz 125: sleep 1; # brute force counteraction: slow down attackers, which try to hack user authentication with automated scripts
1.74 albertel 126: $r->send_http_header;
1.92 bisitz 127: $r->print(
128: $start_page
129: .'<h1>'.&mt('Sorry ...').'</h1>'
1.95 ! bisitz 130: .'<p class="LC_warning">'.&mt($message).'</p>'
1.92 bisitz 131: .'<p>'.&mt('Please [_1]log in again[_2].'
132: ,"<a href=\"/adm/login?username=$form->{'uname'}&domain=$form->{'udom'}\">",'</a>')
133: .'</p>'
134: .'<p><a href="/adm/loginproblems.html">'.&mt('Login problems?').'</a></p>'
135: .$end_page
136: );
137: }
1.60 www 138:
1.55 www 139: # ------------------------------------------------------------------ Rerouting!
140:
141: sub reroute {
1.74 albertel 142: my ($r) = @_;
143: &Apache::loncommon::content_type($r,'text/html');
144: $r->send_http_header;
1.92 bisitz 145: my $msg='<h1>'.&mt('Sorry ...').'</h1>'
146: .&mt('Please [_1]log in again[_2].');
1.74 albertel 147: &Apache::loncommon::simple_error_page($r,'Rerouting',$msg);
1.55 www 148: }
149:
1.1 albertel 150: # ---------------------------------------------------------------- Main handler
151:
152: sub handler {
153: my $r = shift;
1.85 albertel 154: my $form;
1.55 www 155: # Are we re-routing?
156: if (-e '/home/httpd/html/lon-status/reroute.txt') {
157: &reroute($r);
158: return OK;
159: }
1.56 www 160:
1.57 www 161: &Apache::lonlocal::get_language_handle($r);
1.1 albertel 162:
1.59 www 163: # -------------------------------- Prevent users from attempting to login twice
1.89 albertel 164: my $handle = &Apache::lonnet::check_for_valid_session($r);
165: if ($handle ne '') {
1.59 www 166: # Indeed, a valid token is found
1.89 albertel 167: &Apache::loncommon::content_type($r,'text/html');
168: $r->send_http_header;
169: my $start_page =
170: &Apache::loncommon::start_page('Already logged in');
171: my $end_page =
172: &Apache::loncommon::end_page();
1.92 bisitz 173: $r->print(
174: $start_page
175: .'<h1>'.&mt('You are already logged in!').'</h1>'
176: .'<p>'.&mt('Please either [_1]continue the current session[_2] or [_3]logout[_4].'
177: ,'<a href="/adm/roles">','</a>','<a href="/adm/logout">','</a>')
178: .'</p>'
179: .'<p><a href="/adm/loginproblems.html">'.&mt('Login problems?').'</a></p>'
180: .$end_page
181: );
182: return OK;
1.59 www 183: }
184:
185: # ---------------------------------------------------- No valid token, continue
186:
187:
1.1 albertel 188: my $buffer;
1.84 albertel 189: if ($r->header_in('Content-length') > 0) {
190: $r->read($buffer,$r->header_in('Content-length'),0);
191: }
1.85 albertel 192: my %form;
193: foreach my $pair (split(/&/,$buffer)) {
194: my ($name,$value) = split(/=/,$pair);
1.7 www 195: $value =~ tr/+/ /;
196: $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
1.85 albertel 197: $form{$name}=$value;
1.1 albertel 198: }
199:
1.85 albertel 200: if ((!$form{'uname'}) || (!$form{'upass0'}) || (!$form{'udom'})) {
201: &failed($r,'Username, password and domain need to be specified.',
202: \%form);
1.1 albertel 203: return OK;
204: }
1.61 www 205:
206: # split user logging in and "su"-user
207:
1.85 albertel 208: ($form{'uname'},$form{'suname'})=split(/\:/,$form{'uname'});
1.87 albertel 209: $form{'uname'} = &LONCAPA::clean_username($form{'uname'});
210: $form{'suname'}= &LONCAPA::clean_username($form{'suname'});
211: $form{'udom'} = &LONCAPA::clean_domain( $form{'udom'});
1.1 albertel 212:
213: my $role = $r->dir_config('lonRole');
214: my $domain = $r->dir_config('lonDefDomain');
215: my $prodir = $r->dir_config('lonUsersDir');
1.93 raeburn 216: my $contact_name = &mt('LON-CAPA helpdesk');
1.1 albertel 217:
1.8 www 218: # ---------------------------------------- Get the information from login token
219:
1.85 albertel 220: my $tmpinfo=Apache::lonnet::reply('tmpget:'.$form{'logtoken'},
221: $form{'serverid'});
1.8 www 222:
223: if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) {
1.85 albertel 224: &failed($r,'Information needed to verify your login information is missing, inaccessible or expired.',\%form);
1.8 www 225: return OK;
1.44 www 226: } else {
1.85 albertel 227: my $reply = &Apache::lonnet::reply('tmpdel:'.$form{'logtoken'},
228: $form{'serverid'});
1.77 albertel 229: if ( $reply ne 'ok' ) {
1.85 albertel 230: &failed($r,'Session could not be opened.',\%form);
231: &Apache::lonnet::logthis("ERROR got a reply of $reply when trying to contact ". $form{'serverid'}." to get login token");
1.77 albertel 232: return OK;
1.44 www 233: }
1.8 www 234: }
1.93 raeburn 235: if (!&Apache::lonnet::domain($form{'udom'})) {
236: &failed($r,'The domain you provided is not a valid LON-CAPA domain.',\%form);
237: return OK;
238: }
1.9 www 239: my ($key,$firsturl)=split(/&/,$tmpinfo);
1.8 www 240:
241: my $keybin=pack("H16",$key);
242:
1.26 harris41 243: my $cipher;
244: if ($Crypt::DES::VERSION>=2.03) {
245: $cipher=new Crypt::DES $keybin;
246: }
247: else {
248: $cipher=new DES $keybin;
249: }
1.67 www 250: my $upass='';
251: for (my $i=0;$i<=2;$i++) {
252: my $chunk=
1.85 albertel 253: $cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},0,16))));
1.8 www 254:
1.67 www 255: $chunk.=
1.85 albertel 256: $cipher->decrypt(unpack("a8",pack("H16",substr($form{'upass'.$i},16,16))));
1.8 www 257:
1.67 www 258: $chunk=substr($chunk,1,ord(substr($chunk,0,1)));
259: $upass.=$chunk;
260: }
1.8 www 261:
1.1 albertel 262: # ---------------------------------------------------------------- Authenticate
1.91 raeburn 263: my @cancreate;
1.90 raeburn 264: my %domconfig = &Apache::lonnet::get_dom('configuration',['usercreation'],$form{'udom'});
265: if (ref($domconfig{'usercreation'}) eq 'HASH') {
266: if (ref($domconfig{'usercreation'}{'cancreate'}) eq 'HASH') {
1.91 raeburn 267: if (ref($domconfig{'usercreation'}{'cancreate'}{'selfcreate'}) eq 'ARRAY') {
268: @cancreate = @{$domconfig{'usercreation'}{'cancreate'}{'selfcreate'}};
269: } elsif (($domconfig{'usercreation'}{'cancreate'}{'selfcreate'} ne 'none') &&
270: ($domconfig{'usercreation'}{'cancreate'}{'selfcreate'} ne '')) {
271: @cancreate = ($domconfig{'usercreation'}{'cancreate'}{'selfcreate'});
1.90 raeburn 272: }
273: }
274: }
275: my $defaultauth;
1.91 raeburn 276: if (grep(/^login$/,@cancreate)) {
1.90 raeburn 277: $defaultauth = 1;
278: }
279: my $authhost=Apache::lonnet::authenticate($form{'uname'},$upass,
280: $form{'udom'},$defaultauth);
1.1 albertel 281:
282: # --------------------------------------------------------------------- Failed?
283:
284: if ($authhost eq 'no_host') {
1.85 albertel 285: &failed($r,'Username and/or password could not be authenticated.',
286: \%form);
1.1 albertel 287: return OK;
1.90 raeburn 288: } elsif ($authhost eq 'no_account_on_host') {
289: my %domconfig =
290: &Apache::lonnet::get_dom('configuration',['usercreation'],$form{'udom'});
1.91 raeburn 291: if (grep(/^login$/,@cancreate)) {
1.90 raeburn 292: my $start_page =
293: &Apache::loncommon::start_page('Create a user account in LON-CAPA',
294: '',{'no_inline_link' => 1,});
295: my $domdesc = &Apache::lonnet::domain($form{'udom'},'description');
1.93 raeburn 296: my $lonhost = $r->dir_config('lonHostID');
297: my $origmail = $Apache::lonnet::perlvar{'lonSupportEMail'};
298: my $contacts =
299: &Apache::loncommon::build_recipient_list(undef,'helpdeskmail',
300: $form{'udom'},$origmail);
301: my ($contact_email) = split(',',$contacts);
1.94 raeburn 302: my $output = &Apache::createaccount::username_check($form{'uname'},
303: $form{'udom'},$domdesc,'',
304: $lonhost,$contact_email,$contact_name);
1.90 raeburn 305: &Apache::loncommon::content_type($r,'text/html');
306: $r->send_http_header;
307: &Apache::createaccount::print_header($r,$start_page);
1.94 raeburn 308: $r->print('<h3>'.&mt('Account creation').'</h3>'.
309: &mt('Although your username and password were authenticated, you do not currently have a LON-CAPA account at this institution.').'<br />'.
310: $output.&Apache::loncommon::end_page());
1.90 raeburn 311: return OK;
312: } else {
313: &failed($r,'Although your username and password were authenticated, you do not currently have a LON-CAPA account in this domain, and you are not permitted to create one.',\%form);
314: return OK;
315: }
1.1 albertel 316: }
317:
1.59 www 318: if (($firsturl eq '') ||
319: ($firsturl=~/^\/adm\/(logout|remote)/)) {
1.24 www 320: $firsturl='/adm/roles';
1.7 www 321: }
1.61 www 322: # --------------------------------- Are we attempting to login as somebody else?
1.85 albertel 323: if ($form{'suname'}) {
1.61 www 324: # ------------ see if the original user has enough privileges to pull this stunt
1.85 albertel 325: if (&Apache::lonnet::privileged($form{'uname'},$form{'udom'})) {
1.61 www 326: # ---------------------------------------------------- see if the su-user exists
1.85 albertel 327: unless (&Apache::lonnet::homeserver($form{'suname'},$form{'udom'})
1.61 www 328: eq 'no_host') {
1.85 albertel 329: &Apache::lonnet::logthis(&Apache::lonnet::homeserver($form{'suname'},$form{'udom'}));
1.61 www 330: # ------------------------------ see if the su-user is not too highly privileged
1.85 albertel 331: unless (&Apache::lonnet::privileged($form{'suname'},$form{'udom'})) {
1.61 www 332: # -------------------------------------------------------- actually switch users
1.85 albertel 333: &Apache::lonnet::logperm('User '.$form{'uname'}.' at '.$form{'udom'}.
334: ' logging in as '.$form{'suname'});
335: $form{'uname'}=$form{'suname'};
1.61 www 336: } else {
337: &Apache::lonnet::logthis('Attempted switch user to privileged user');
338: }
339: }
340: } else {
341: &Apache::lonnet::logthis('Non-privileged user attempting switch user');
342: }
343: }
1.85 albertel 344:
1.81 albertel 345: if ($r->dir_config("lonBalancer") eq 'yes') {
1.85 albertel 346: &success($r,$form{'uname'},$form{'udom'},$authhost,'noredirect',undef,
347: \%form);
1.81 albertel 348: $r->internal_redirect('/adm/switchserver');
349: } else {
1.85 albertel 350: &success($r,$form{'uname'},$form{'udom'},$authhost,$firsturl,undef,
351: \%form);
1.81 albertel 352: }
1.1 albertel 353: return OK;
354: }
355:
356: 1;
357: __END__
1.7 www 358:
359:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>