1: # The LearningOnline Network
2: # User Authentication Module
3: #
4: # $Id: lonauth.pm,v 1.77 2006/05/31 15:33:39 albertel Exp $
5: #
6: # Copyright Michigan State University Board of Trustees
7: #
8: # This file is part of the LearningOnline Network with CAPA (LON-CAPA).
9: #
10: # LON-CAPA is free software; you can redistribute it and/or modify
11: # it under the terms of the GNU General Public License as published by
12: # the Free Software Foundation; either version 2 of the License, or
13: # (at your option) any later version.
14: #
15: # LON-CAPA is distributed in the hope that it will be useful,
16: # but WITHOUT ANY WARRANTY; without even the implied warranty of
17: # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18: # GNU General Public License for more details.
19: #
20: # You should have received a copy of the GNU General Public License
21: # along with LON-CAPA; if not, write to the Free Software
22: # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23: #
24: # /home/httpd/html/adm/gpl.txt
25: #
26: # http://www.lon-capa.org/
27: #
28:
29: package Apache::lonauth;
30:
31: use strict;
32: use Apache::Constants qw(:common);
33: use Apache::File;
34: use CGI qw(:standard);
35: use CGI::Cookie();
36: use DynaLoader; # for Crypt::DES version
37: use Crypt::DES;
38: use Apache::loncommon();
39: use Apache::lonnet;
40: use Apache::lonmenu();
41: use Fcntl qw(:flock);
42: use Apache::lonlocal;
43:
44: my %FORM;
45:
46: # ------------------------------------------------------------ Successful login
47:
48: sub success {
49: my ($r, $username, $domain, $authhost,$lowerurl) = @_;
50: my $lonids=$r->dir_config('lonIDsDir');
51:
52: my $public=($username eq 'public' && $domain eq 'public');
53:
54: # See if old ID present, if so, remove
55:
56: my ($filename,$cookie,$userroles);
57: my $now=time;
58:
59: if ($public) {
60: my $max_public=100;
61: my $oldest;
62: my $oldest_time=0;
63: for(my $next=1;$next<=$max_public;$next++) {
64: if (-e $lonids."/publicuser_$next.id") {
65: my $mtime=(stat($lonids."/publicuser_$next.id"))[9];
66: if ($mtime<$oldest_time || !$oldest_time) {
67: $oldest_time=$mtime;
68: $oldest=$next;
69: }
70: } else {
71: $cookie="publicuser_$next";
72: last;
73: }
74: }
75: if (!$cookie) { $cookie="publicuser_$oldest"; }
76: } else {
77: opendir(DIR,$lonids);
78: while ($filename=readdir(DIR)) {
79: if ($filename=~/^$username\_\d+\_$domain\_$authhost\.id$/) {
80: unlink($lonids.'/'.$filename);
81: }
82: }
83: closedir(DIR);
84:
85: # Give them a new cookie
86:
87: $cookie="$username\_$now\_$domain\_$authhost";
88:
89: # Initialize roles
90:
91: $userroles=Apache::lonnet::rolesinit($domain,$username,$authhost);
92: }
93: # ------------------------------------ Check browser type and MathML capability
94:
95: my ($httpbrowser,$clientbrowser,$clientversion,$clientmathml,
96: $clientunicode,$clientos) = &Apache::loncommon::decode_user_agent($r);
97:
98: # -------------------------------------- Any accessibility options to remember?
99: if (($FORM{'interface'}) && ($FORM{'remember'} eq 'true')) {
100: foreach ('imagesuppress','appletsuppress',
101: 'embedsuppress','fontenhance','blackwhite') {
102: if ($FORM{$_} eq 'true') {
103: &Apache::lonnet::put('environment',{$_ => 'on'},
104: $domain,$username);
105: } else {
106: &Apache::lonnet::del('environment',[$_],$domain,$username);
107: }
108: }
109: }
110: # ------------------------------------------------------------- Get environment
111:
112: my $userenv;
113: my %userenv=Apache::lonnet::dump('environment',$domain,$username);
114: my ($tmp) = keys(%userenv);
115: if ($tmp !~ /^(con_lost|error|no_such_host)/i) {
116: # default remote control to off
117: if ($userenv{'remote'} ne 'on') { $userenv{'remote'} = 'off'; }
118: foreach my $key (keys(%userenv)) {
119: $userenv.="environment.$key=$userenv{$key}\n";
120: }
121: }
122: if (($userenv{'interface'}) && (!$FORM{'interface'})) {
123: $FORM{'interface'}=$userenv{'interface'};
124: }
125: $env{'environment.remote'}=$userenv{'remote'};
126: if ($userenv{'texengine'} eq 'ttm') { $clientmathml=1; }
127:
128: # --------------- Do not trust query string to be put directly into environment
129: foreach ('imagesuppress','appletsuppress',
130: 'embedsuppress','fontenhance','blackwhite',
131: 'interface','localpath','localres') {
132: $FORM{$_}=~s/[\n\r\=]//gs;
133: }
134: # --------------------------------------------------------- Write first profile
135:
136: {
137: my $idf=Apache::File->new(">$lonids/$cookie.id");
138: unless (flock($idf,LOCK_EX)) {
139: &Apache::lonnet::logthis("<font color=blue>WARNING: ".
140: 'Could not obtain exclusive lock in lonauth: '.$!);
141: $idf->close();
142: return 'error: '.$!;
143: }
144: if ($userenv ne '') { print $idf "$userenv\n"; }
145: print $idf "user.name=$username\n";
146: print $idf "user.domain=$domain\n";
147: print $idf "user.home=$authhost\n";
148: print $idf "browser.type=$clientbrowser\n";
149: print $idf "browser.version=$clientversion\n";
150: print $idf "browser.mathml=$clientmathml\n";
151: print $idf "browser.unicode=$clientunicode\n";
152: print $idf "browser.os=$clientos\n";
153: if ($FORM{'localpath'}) {
154: print $idf "browser.localpath=$FORM{'localpath'}\n";
155: print $idf "browser.localres=$FORM{'localres'}\n";
156: }
157: print $idf "server.domain=".$r->dir_config('lonDefDomain')."\n";
158: print $idf "request.course.fn=\n";
159: print $idf "request.course.uri=\n";
160: print $idf "request.course.sec=\n";
161: print $idf "request.role=cm\n";
162: print $idf "request.role.adv=$env{'user.adv'}\n";
163: print $idf "request.host=$ENV{'REMOTE_ADDR'}\n";
164: if ($public) {
165: print $idf "environment.remote=off\n";
166: }
167: if ($FORM{'interface'}) {
168: $FORM{'interface'}=~s/\W//gs;
169: print $idf "browser.interface=$FORM{'interface'}\n";
170: $env{'browser.interface'}=$FORM{'interface'};
171: foreach ('imagesuppress','appletsuppress',
172: 'embedsuppress','fontenhance','blackwhite') {
173: if (($FORM{$_} eq 'true') ||
174: ($userenv{$_} eq 'on')) {
175: print $idf "browser.$_=on\n";
176: }
177: }
178: }
179: if ($userroles ne '') { print $idf "$userroles"; }
180: $idf->close();
181: }
182: $env{'request.role'}='cm';
183: $env{'request.role.adv'}=$env{'user.adv'};
184: $env{'browser.type'}=$clientbrowser;
185: # -------------------------------------------------------------------- Log this
186:
187: &Apache::lonnet::log($domain,$username,$authhost,
188: "Login $ENV{'REMOTE_ADDR'}");
189:
190: # ------------------------------------------------- Check for critical messages
191:
192: my @what=&Apache::lonnet::dump('critical',$domain,$username);
193: if ($what[0]) {
194: if (($what[0] ne 'con_lost') && ($what[0]!~/^error\:/)) {
195: $lowerurl='/adm/email?critical=display';
196: }
197: }
198:
199: # ------------------------------------------------------------ Get cookie ready
200:
201: if ($public or $lowerurl eq 'noredirect') { return $cookie; }
202:
203: $cookie="lonID=$cookie; path=/";
204: # -------------------------------------------------------- Menu script and info
205: my $windowinfo=&Apache::lonmenu::open($clientos);
206: my $startupremote=&Apache::lonmenu::startupremote($lowerurl);
207: my $remoteinfo=&Apache::lonmenu::load_remote_msg($lowerurl);
208: my $setflags=&Apache::lonmenu::setflags();
209: my $maincall=&Apache::lonmenu::maincall();
210: my $start_page=&Apache::loncommon::start_page('Successful Login',
211: $startupremote,
212: {'no_inline_link' => 1,});
213: my $end_page =&Apache::loncommon::end_page();
214:
215: my $continuelink;
216: if (($env{'browser.interface'} eq 'textual') ||
217: ($env{'environment.remote'} eq 'off')) {
218: $continuelink="<a href=\"$lowerurl\">".&mt('Continue')."</a>";
219: }
220: # ------------------------------------------------- Output for successful login
221:
222: &Apache::loncommon::content_type($r,'text/html');
223: $r->header_out('Set-cookie' => $cookie);
224: $r->send_http_header;
225:
226: my %lt=&Apache::lonlocal::texthash(
227: 'wel' => 'Welcome',
228: 'mes' => 'Welcome to the Learning<i>Online</i> Network with CAPA. Please wait while your session is being set up',
229: 'pro' => 'Problems',
230: 'log' => 'loginproblems.html',
231: );
232: $r->print(<<ENDSUCCESS);
233: $start_page
234: $setflags
235: $windowinfo
236: <h1>$lt{'wel'}</h1>
237: $lt{'mes'}.<p>
238: <a href="/adm/$lt{'log'}">$lt{'pro'}?</a></p>
239: $remoteinfo
240: $maincall
241: $continuelink
242: $end_page
243: ENDSUCCESS
244: }
245:
246: # --------------------------------------------------------------- Failed login!
247:
248: sub failed {
249: my ($r,$message) = @_;
250: my $start_page = &Apache::loncommon::start_page('Unsuccessful Login',undef,
251: {'no_inline_link' => 1,});
252: my $end_page = &Apache::loncommon::end_page();
253:
254: my %lt=('sorry' => &mt('Sorry ...'),
255: 'please' =>
256: &mt('Please [_1]log in again[_2].',
257: "<a href=\"/adm/login?username=$FORM{'uname'}&domain=$FORM{'udom'}\">",
258: '</a>'),
259: 'problemspage' => &mt('loginproblems.html'),
260: 'problems' => 'Problems',
261: );
262: &Apache::loncommon::content_type($r,'text/html');
263: $r->send_http_header;
264:
265: $r->print(<<ENDFAILED);
266: $start_page
267: <h1>$lt{'sorry'}</h1>
268: <p><b>$message</b></p>
269: <p>$lt{'please'}</p>
270: <p>
271: <a href="/adm/$lt{'problemspage'}">$lt{'problems'}</a></p>
272: $end_page
273: ENDFAILED
274: }
275:
276: # ------------------------------------------------------------------ Rerouting!
277:
278: sub reroute {
279: my ($r) = @_;
280: &Apache::loncommon::content_type($r,'text/html');
281: $r->send_http_header;
282: my $msg='<h1>Sorry ...</h1>
283: Please <a href="/">log in again</a>.';
284: &Apache::loncommon::simple_error_page($r,'Rerouting',$msg);
285: }
286:
287: # ---------------------------------------------------------------- Main handler
288:
289: sub handler {
290: my $r = shift;
291:
292: # Are we re-routing?
293: if (-e '/home/httpd/html/lon-status/reroute.txt') {
294: &reroute($r);
295: return OK;
296: }
297:
298: &Apache::lonlocal::get_language_handle($r);
299:
300: # -------------------------------- Prevent users from attempting to login twice
301: my %cookies=CGI::Cookie->parse($r->header_in('Cookie'));
302: my $lonid=$cookies{'lonID'};
303: my $cookie;
304: if ($lonid) {
305: my $handle=$lonid->value;
306: $handle=~s/\W//g;
307: my $lonidsdir=$r->dir_config('lonIDsDir');
308: if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) {
309: # Indeed, a valid token is found
310: &Apache::loncommon::content_type($r,'text/html');
311: $r->send_http_header;
312: my $start_page =
313: &Apache::loncommon::start_page('Already logged in');
314: my $end_page =
315: &Apache::loncommon::end_page();
316: $r->print(<<ENDFAILED);
317: $start_page
318: <h1>You are already logged in</h1>
319: <p>Please either <a href="/adm/roles">continue the current session</a> or
320: <a href="/adm/logout">logout</a>.</p>
321: <p>
322: <a href="/adm/loginproblems.html">Problems?</a></p>
323: $end_page
324: ENDFAILED
325: return OK;
326: }
327: }
328:
329: # ---------------------------------------------------- No valid token, continue
330:
331:
332: my $buffer;
333: $r->read($buffer,$r->header_in('Content-length'),0);
334: my @pairs=split(/&/,$buffer);
335: my $pair; my $name; my $value;
336: undef %FORM;
337: %FORM=();
338: foreach $pair (@pairs) {
339: ($name,$value) = split(/=/,$pair);
340: $value =~ tr/+/ /;
341: $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg;
342: $FORM{$name}=$value;
343: }
344:
345: if ((!$FORM{'uname'}) || (!$FORM{'upass0'}) || (!$FORM{'udom'})) {
346: failed($r,'Username, password and domain need to be specified.');
347: return OK;
348: }
349:
350: # split user logging in and "su"-user
351:
352: ($FORM{'uname'},$FORM{'suname'})=split(/\:/,$FORM{'uname'});
353: $FORM{'uname'} =~ s/\W//g;
354: $FORM{'suname'} =~ s/\W//g;
355: $FORM{'udom'} =~ s/\W//g;
356:
357: my $role = $r->dir_config('lonRole');
358: my $domain = $r->dir_config('lonDefDomain');
359: my $prodir = $r->dir_config('lonUsersDir');
360:
361: # ---------------------------------------- Get the information from login token
362:
363: my $tmpinfo=Apache::lonnet::reply('tmpget:'.$FORM{'logtoken'},
364: $FORM{'serverid'});
365:
366: if (($tmpinfo=~/^error/) || ($tmpinfo eq 'con_lost')) {
367: failed($r,'Information needed to verify your login information is missing, inaccessible or expired.');
368: return OK;
369: } else {
370: my $reply = &Apache::lonnet::reply('tmpdel:'.$FORM{'logtoken'},
371: $FORM{'serverid'});
372: if ( $reply ne 'ok' ) {
373: &failed($r,'Session could not be opened.');
374: &Apache::lonnet::logthis("ERROR got a reply of $reply when trying to contact ". $FORM{'serverid'}." to get login token");
375: return OK;
376: }
377: }
378: my ($key,$firsturl)=split(/&/,$tmpinfo);
379:
380: my $keybin=pack("H16",$key);
381:
382: my $cipher;
383: if ($Crypt::DES::VERSION>=2.03) {
384: $cipher=new Crypt::DES $keybin;
385: }
386: else {
387: $cipher=new DES $keybin;
388: }
389: my $upass='';
390: for (my $i=0;$i<=2;$i++) {
391: my $chunk=
392: $cipher->decrypt(unpack("a8",pack("H16",substr($FORM{'upass'.$i},0,16))));
393:
394: $chunk.=
395: $cipher->decrypt(unpack("a8",pack("H16",substr($FORM{'upass'.$i},16,16))));
396:
397: $chunk=substr($chunk,1,ord(substr($chunk,0,1)));
398: $upass.=$chunk;
399: }
400:
401: # ---------------------------------------------------------------- Authenticate
402: my $authhost=Apache::lonnet::authenticate($FORM{'uname'},
403: $upass,
404: $FORM{'udom'});
405:
406: # --------------------------------------------------------------------- Failed?
407:
408: if ($authhost eq 'no_host') {
409: failed($r,'Username and/or password could not be authenticated.');
410: return OK;
411: }
412:
413: if (($firsturl eq '') ||
414: ($firsturl=~/^\/adm\/(logout|remote)/)) {
415: $firsturl='/adm/roles';
416: }
417: # --------------------------------- Are we attempting to login as somebody else?
418: if ($FORM{'suname'}) {
419: # ------------ see if the original user has enough privileges to pull this stunt
420: if (&Apache::lonnet::privileged($FORM{'uname'},$FORM{'udom'})) {
421: # ---------------------------------------------------- see if the su-user exists
422: unless (&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'})
423: eq 'no_host') {
424: &Apache::lonnet::logthis(&Apache::lonnet::homeserver($FORM{'suname'},$FORM{'udom'}));
425: # ------------------------------ see if the su-user is not too highly privileged
426: unless (&Apache::lonnet::privileged($FORM{'suname'},$FORM{'udom'})) {
427: # -------------------------------------------------------- actually switch users
428: &Apache::lonnet::logperm('User '.$FORM{'uname'}.' at '.$FORM{'udom'}.
429: ' logging in as '.$FORM{'suname'});
430: $FORM{'uname'}=$FORM{'suname'};
431: } else {
432: &Apache::lonnet::logthis('Attempted switch user to privileged user');
433: }
434: }
435: } else {
436: &Apache::lonnet::logthis('Non-privileged user attempting switch user');
437: }
438: }
439: &success($r,$FORM{'uname'},$FORM{'udom'},$authhost,$firsturl);
440: return OK;
441: }
442:
443: 1;
444: __END__
445:
446:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>