+ Attrs.append((ldap.MOD_ADD, "dnsZoneEntry", sanitized))
+ return "DNS Entry added " + sanitized
+
+ Attrs.append((ldap.MOD_REPLACE, "dnsZoneEntry", sanitized))
+ SeenDNS = 1
+ return "DNS Entry replaced with " + sanitized
+
+
+# Handle an RBL list (mailRBL, mailRHSBL, mailWhitelist)
+def DoRBL(Str, Attrs):
+ Match = re.compile('^mail(rbl|rhsbl|whitelist) ([-a-z0-9.]+)$').match(Str.lower())
+ if Match is None:
+ return None
+
+ if Match.group(1) == "rbl":
+ Key = "mailRBL"
+ if Match.group(1) == "rhsbl":
+ Key = "mailRHSBL"
+ if Match.group(1) == "whitelist":
+ Key = "mailWhitelist"
+ Host = Match.group(2)
+
+ global SeenList
+ if Key in SeenList:
+ Attrs.append((ldap.MOD_ADD, Key, Host))
+ return "%s added %s" % (Key, Host)
+
+ Attrs.append((ldap.MOD_REPLACE, Key, Host))
+ SeenList[Key] = 1
+ return "%s replaced with %s" % (Key, Host)
+
+
+# Handle a ConfirmSudoPassword request
+def DoConfirmSudopassword(Str, SudoPasswd):
+ Match = re.compile('^confirm sudopassword (' + UUID_FORMAT + ') ([a-z0-9.,*-]+) ([0-9a-f]{40})$').match(Str)
+ if Match is None:
+ return None
+
+ uuid = Match.group(1)
+ hosts = Match.group(2)
+ hmac = Match.group(3)
+
+ SudoPasswd[uuid] = (hosts, hmac)
+ return "got confirm for sudo password %s on host(s) %s, auth code %s" % (uuid, hosts, hmac)
+
+
+def FinishConfirmSudopassword(l, uid, Attrs, SudoPasswd):
+ result = "\n"
+
+ if len(SudoPasswd) == 0:
+ return None
+
+ res = lc.search_s(BaseDn, ldap.SCOPE_ONELEVEL, "uid=" + uid, ['sudoPassword'])
+ if len(res) != 1:
+ raise UDFormatError("Not exactly one hit when searching for user")
+ if sudoPassword in res[0][1]:
+ inldap = res[0][1]['sudoPassword']
+ else:
+ inldap = []
+
+ newldap = []
+ for entry in inldap:
+ Match = re.compile('^(' + UUID_FORMAT + ') (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*-]+) ([^ ]+)$').match(entry)
+ if Match is None:
+ raise UDFormatError("Could not parse existing sudopasswd entry")
+ uuid = Match.group(1)
+ status = Match.group(2)
+ hosts = Match.group(3)
+ cryptedpass = Match.group(4)
+
+ if uuid in SudoPasswd:
+ confirmedHosts = SudoPasswd[uuid][0]
+ confirmedHmac = SudoPasswd[uuid][1]
+ if status.startswith('confirmed:'):
+ if status == 'confirmed:' + make_passwd_hmac('password-is-confirmed', 'sudo', uid, uuid, hosts, cryptedpass):
+ result += "Entry %s for sudo password on hosts %s already confirmed.\n" % (uuid, hosts)
+ else:
+ result += "Entry %s for sudo password on hosts %s is listed as confirmed, but HMAC does not verify.\n" % (uuid, hosts)
+ elif confirmedHosts != hosts:
+ result += "Entry %s hostlist mismatch (%s vs. %s).\n" % (uuid, hosts, confirmedHosts)
+ elif make_passwd_hmac('confirm-new-password', 'sudo', uid, uuid, hosts, cryptedpass) == confirmedHmac:
+ result += "Entry %s for sudo password on hosts %s now confirmed.\n" % (uuid, hosts)
+ status = 'confirmed:' + make_passwd_hmac('password-is-confirmed', 'sudo', uid, uuid, hosts, cryptedpass)
+ else:
+ result += "Entry %s for sudo password on hosts %s HMAC verify failed.\n" % (uuid, hosts)
+ del SudoPasswd[uuid]
+
+ newentry = " ".join([uuid, status, hosts, cryptedpass])
+ if len(newldap) == 0:
+ newldap.append((ldap.MOD_REPLACE, "sudoPassword", newentry))
+ else:
+ newldap.append((ldap.MOD_ADD, "sudoPassword", newentry))
+
+ for entry in SudoPasswd:
+ result += "Entry %s that you confirm is not listed in ldap." % (entry,)
+
+ for entry in newldap:
+ Attrs.append(entry)
+
+ return result
+
+
+def connect_to_ldap_and_check_if_locked(DnRecord):
+ # Connect to the ldap server
+ lc = connectLDAP()
+ F = open(PassDir + "/pass-" + pwd.getpwuid(os.getuid())[0], "r")
+ AccessPass = F.readline().strip().split(" ")
+ F.close()
+ lc.simple_bind_s("uid={},{}".format(AccessPass[0], BaseDn), AccessPass[1])
+
+ # Check for a locked account
+ Attrs = lc.search_s(BaseDn, ldap.SCOPE_ONELEVEL, "uid=" + GetAttr(DnRecord, "uid"))
+ if (GetAttr(Attrs[0], "userPassword").find("*LK*") != -1) \
+ or GetAttr(Attrs[0], "userPassword").startswith("!"):
+ raise UDNotAllowedError("This account is locked")
+ return l
+