#!/usr/bin/perl # $Id: update.cgi,v 1.13 2006/12/28 02:44:02 rmurray Exp $ # (c) 1999 Randolph Chung. Licensed under the GPL. # (c) 2006 Ryan Murray. Licensed under the GPL. # Copyright (c) 2008, 2011, 2012, 2014, 2015 Peter Palfrader use lib '.'; use strict vars; #use Apache::Registry; use CGI; use Data::UUID; use Digest::HMAC_SHA1 qw(hmac_sha1_hex); use Digest::MD5 qw(md5_hex); use Util; use English; use URI::Escape; use Crypt::PasswdMD5; use Net::LDAP qw(LDAP_SUCCESS LDAP_PROTOCOL_ERROR); use Net::LDAP::Util qw(ldap_explode_dn); my %config = &Util::ReadConfigFile; my $query = new CGI; my $proto = ($ENV{HTTPS} ? "https" : "http"); my $id = $query->param('id'); my $authtoken = $query->param('authtoken'); my $password = undef; if ($authtoken || $id) { $password = Util::TouchAuthToken($authtoken, $id); } else { $password = ''; $id = ''; $authtoken = ''; } if ($proto eq "http" || !($id && $password)) { print "Location: https://$ENV{SERVER_NAME}/$config{webloginhtml}\n\n"; exit; } my $ldap; open (F, "<$config{passdir}/key-hmac-$UID") || &Util::HTMLError($!); my $hmac_key = ; close(F); chomp($hmac_key); sub DieHandler { $ldap->unbind if (defined($ldap)); } #$SIG{__DIE__} = \&DieHandler; my $editdn = "uid=$id,$config{basedn}"; $ldap = Net::LDAP->new($config{ldaphost}); &Util::UpgradeConnection($ldap) unless $config{usessl} eq 'False'; my $auth = 0; my $mesg; $mesg = $ldap->bind($editdn, password => $password); $mesg->sync; $auth = ($mesg->code == LDAP_SUCCESS); if (!$auth) { $ldap->unbind; &Util::HTMLError("You have not been authenticated. Please Login"); } # Authenticated.... # Get our entry... $mesg = $ldap->search(base => $editdn, filter => "uid=*"); $mesg->code && &Util::HTMLError($mesg->error); my $entries = $mesg->as_struct; if ($mesg->count != 1) { # complain and quit } $mesg = $ldap->search(base => $config{hostbasedn}, filter => 'host=*'); $mesg->code && &Util::HTMLError($mesg->error); my $host_entries = $mesg->as_struct; my @dns = keys(%$entries); my $entry = $entries->{$dns[0]}; if (!($query->param('doupdate'))) { # Not yet update, just fill in the form with the current values my %data; # Fill in %data # First do the easy stuff - this catches most of the cases foreach (keys(%$entry)) { $data{$_} = $entry->{$_}->[0]; $data{$_} = CGI::escapeHTML($data{$_}) if defined $data{$_}; } $data{gender} = 9 if not $data{gender}; # Now we have to fill in the rest that needs some processing... $data{id} = $id; $data{authtoken} = $authtoken; $data{editdn} = $editdn; $data{staddress} = $entry->{postaladdress}->[0]; $data{staddress} =~ s/\$/\n/; $data{staddress} = CGI::escapeHTML($data{staddress}); $data{countryname} = &Util::LookupCountry($data{c}); if ($data{mailgreylisting} eq "TRUE") { $data{mailgreylisting} = " checked"; } else { $data{mailgreylisting} = ""; } if ($data{mailcallout} eq "TRUE") { $data{mailcallout} = " checked"; } else { $data{mailcallout} = ""; } $data{maildefaultoptions} ||= 'TRUE'; if ($data{maildefaultoptions} eq "TRUE") { $data{maildefaultoptions} = " checked"; } else { $data{maildefaultoptions} = ""; } $data{mailcontentinspectionaction} ||= 'reject'; $data{email} = CGI::escapeHTML(join(", ", @{$entry->{emailforward}})); my $genderselect = ''; my $mailcontentselect = ' (delete)\n"; $sudopassword .= $e; if ($status eq 'unconfirmed') { my $data = join(':', 'confirm-new-password', 'sudo', $data{'uid'}, $uuid, $hosts, $crypted); my $hmac = hmac_sha1_hex( $data, $hmac_key); $confirmstring .= CGI::escapeHTML("confirm sudopassword $uuid $hosts $hmac\n"); } }; if ($confirmstring ne '') { $confirmstring = "
To confirm your new sudo passwords send signed mail to changes\@$config{maildomain} with a signed body containing these lines:
$confirmstring
"; } my $sudopasswordhosts = ''; # finally we can send output... my ($sub, $substr); &Util::HTMLSendHeader; open (F, "<$config{webupdatehtml}") || &Util::HTMLError($!); while () { s/~(.+?)~/$data{$1}/g; s/<\?genderselect>/$genderselect/; s/<\?mailcontentselect>/$mailcontentselect/; s/<\?sudopassword>/$sudopassword/; s/<\?sudopasswordhosts>/$sudopasswordhosts/; s/<\?confirmstring>/$confirmstring/; print; } close F; } else { my @ldapinfo_for_pwcheck; for my $a (qw{cn sn md gecos uid}) { for my $e (@{$entry->{$a}}) { push @ldapinfo_for_pwcheck, $e; } } # Actually update stuff... my ($newpassword, $newstaddress, $newwebpassword, $newrtcpassword); # Good god, why would we want to do that here? it breaks password setting # etc, and it doesn't prevent people from setting eveil stuff in ldap # directly. # &Util::FixParams($query); if (($query->param('labeleduri')) && ($query->param('labeleduri') !~ /^https?:\/\//i)) { &Util::HTMLError("Your homepage URL is invalid"); } if ($query->param('newpass') && $query->param('newpassvrfy')) { if ($query->param('newpass') ne $query->param('newpassvrfy')) { # passwords don't match... &Util::HTMLError("The passwords you specified do not match. Please go back and try again."); } my ($r, $msg) = &Util::checkPasswordQuality($query->param('newpass'), undef, [@ldapinfo_for_pwcheck]); if ($r) { &Util::HTMLError("Password check failed: $msg. Please go back and try again."); } # create a md5 crypted password $newpassword = '{crypt}'.crypt($query->param('newpass'), &Util::CreateCryptSalt(1)); &Util::LDAPUpdate($ldap, $editdn, 'userPassword', $newpassword); &Util::UpdateAuthToken($authtoken, $query->param('newpass')); } if ($query->param('newwebpass') && $query->param('newwebpassvrfy')) { if ($query->param('newwebpass') ne $query->param('newwebpassvrfy')) { # passwords don't match... &Util::HTMLError("The web-passwords you specified do not match. Please go back and try again."); } my ($r, $msg) = &Util::checkPasswordQuality($query->param('newwebpass'), undef, [@ldapinfo_for_pwcheck]); if ($r) { &Util::HTMLError("Password check failed for web-password: $msg. Please go back and try again."); } # create a md5 crypted password $newwebpassword = apache_md5_crypt($query->param('newwebpass'), &Util::CreateCryptSalt(1, 1)); &Util::LDAPUpdate($ldap, $editdn, 'webPassword', $newwebpassword); } if ($query->param('newrtcpass') && $query->param('newrtcpassvrfy')) { if ($query->param('newrtcpass') ne $query->param('newrtcpassvrfy')) { # passwords don't match... &Util::HTMLError("The rtc-passwords you specified do not match. Please go back and try again."); } my ($r, $msg) = &Util::checkPasswordQuality($query->param('newrtcpass'), undef, [@ldapinfo_for_pwcheck]); if ($r) { &Util::HTMLError("Password check failed for rtc-password: $msg. Please go back and try again."); } # create a md5 crypted password $newrtcpassword = &md5_hex( ldap_explode_dn($editdn)->[0]{UID} . '@debian.org:rtc.debian.org:' . $query->param('newrtcpass') ); &Util::LDAPUpdate($ldap, $editdn, 'rtcPassword', $newrtcpassword); } $newstaddress = $query->param('staddress'); $newstaddress =~ s/\n/\$/m; my $gender = $query->param('gender'); if ($gender != 1 && $gender != 2) { $gender = 9; # unspecified } my ($bd_ok, $bd_yr, $bd_mo, $bd_day); if ($query->param('birthdate') =~ /^([1-9][0-9]{3})([01][0-9])([0-3][0-9])$/) { $bd_yr = $1; $bd_mo = $2; $bd_day = $3; if ($bd_yr > 1850 and $bd_mo > 0 and $bd_mo <= 12 and $bd_day > 0) { if ($bd_mo == 2) { if ($bd_day == 29 and ($bd_yr % 4 == 0 && ($bd_yr % 100 != 0 || $bd_yr % 400 == 0))) { $bd_ok = 1; } elsif ($bd_day <= 28) { $bd_ok = 1; } } elsif ($bd_mo == 4 or $bd_mo == 6 or $bd_mo == 9 or $bd_mo == 11) { if ($bd_day <= 30) { $bd_ok = 1; } } else { if ($bd_day <= 31) { $bd_ok = 1; } } } } elsif (not defined($query->param('birthdate')) or $query->param('birthdate') =~ /^\s*$/) { $bd_ok = 1; } my ($lat, $long); ($lat, $long) = &Util::CheckLatLong($query->param('latitude'), $query->param('longitude')); my ($greylisting, $callout, $mailcontentinspection, $defaultoptions); $greylisting = $query->param('mailgreylisting'); if (!$greylisting or $greylisting ne "TRUE") { $greylisting = "FALSE"; } $callout = $query->param('mailcallout'); if (!$callout or $callout ne "TRUE") { $callout = "FALSE"; } $mailcontentinspection = $query->param('mailcontentinspection'); if (!$mailcontentinspection or ($mailcontentinspection ne "blackhole" and $mailcontentinspection ne "markup")) { $mailcontentinspection = "reject"; } $defaultoptions = $query->param('maildefaultoptions'); if (!$defaultoptions or $defaultoptions ne "TRUE") { $defaultoptions = "FALSE"; } my $newsudo; my $newsudo_hosts; if ($query->param('newsudopass') && $query->param('newsudopassvrfy')) { my $host = $query->param('newsudopass-host'); if ($host =~ /[^a-z0-9.-]/ and $host ne '*') { &Util::HTMLError("The sudo host has weird characters '$host'."); } if ($query->param('newsudopass') ne $query->param('newsudopassvrfy')) { &Util::HTMLError("The sudo passwords you specified do not match. Please go back and try again."); } my $ldappass = $password; $ldappass = $query->param('newpass') if $query->param('newpass'); push @ldapinfo_for_pwcheck, $host, split(/\./, $host); my ($r, $msg) = &Util::checkPasswordQuality($query->param('newsudopass'), $ldappass, [@ldapinfo_for_pwcheck]); if ($r) { &Util::HTMLError("Password check failed for new sudo pass: $msg. Please go back and try again."); } # create a md5 crypted password my $newsudopassword = crypt($query->param('newsudopass'), &Util::CreateCryptSalt(1)); my $ug = new Data::UUID; my $uuid = $ug->create_str(); $newsudo = "$uuid unconfirmed $host $newsudopassword"; $newsudo_hosts = $host; } my %delete_uuids = map { s/^sudopassword-delete-//; $_ => 1} grep { $query->param($_) eq 'delete' } grep { /^sudopassword-delete-/ } $query->param; my @keepsudo; for my $entry (@{$entry->{'sudopassword'}}) { my ($uuid, $status, $hosts, $crypted) = ($entry =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*-]+) ([^ ]+)$/); next unless defined ($uuid); next if (defined $delete_uuids{$uuid}); my %hosts = map { $_ => 1 } split(/,/, $hosts); next if ($hosts{$newsudo_hosts}); push @keepsudo, $entry; }; if ($newsudo ne '') { push @keepsudo, $newsudo; } &Util::LDAPUpdate($ldap, $editdn, 'postalAddress', $newstaddress); &Util::LDAPUpdate($ldap, $editdn, 'l', $query->param('l')); &Util::LDAPUpdate($ldap, $editdn, 'latitude', $lat); &Util::LDAPUpdate($ldap, $editdn, 'longitude', $long); &Util::LDAPUpdate($ldap, $editdn, 'c', $query->param('country')); &Util::LDAPUpdate($ldap, $editdn, 'postalCode', $query->param('postalcode')); &Util::LDAPUpdate($ldap, $editdn, 'telephoneNumber', $query->param('telephonenumber')); &Util::LDAPUpdate($ldap, $editdn, 'facsimileTelephoneNumber', $query->param('facsimiletelephonenumber')); &Util::LDAPUpdate($ldap, $editdn, 'bATVToken', $query->param('bATVToken')); &Util::LDAPUpdate($ldap, $editdn, 'VoIP', $query->param('VoIP')); &Util::LDAPUpdate($ldap, $editdn, 'loginShell', $query->param('loginshell')); &Util::LDAPUpdate($ldap, $editdn, 'emailForward', $query->param('email')); &Util::LDAPUpdate($ldap, $editdn, 'privateSub', $query->param('privatesub')); &Util::LDAPUpdate($ldap, $editdn, 'ircNick', $query->param('ircnick')); &Util::LDAPUpdate($ldap, $editdn, 'icqUin', $query->param('icquin')); &Util::LDAPUpdate($ldap, $editdn, 'jabberJID', $query->param('jabberjid')); &Util::LDAPUpdate($ldap, $editdn, 'labeledURI', $query->param('labeleduri')); &Util::LDAPUpdate($ldap, $editdn, 'onVacation', $query->param('onvacation')); &Util::LDAPUpdate($ldap, $editdn, 'gender', $gender); &Util::LDAPUpdate($ldap, $editdn, 'birthDate', $query->param('birthdate')) if $bd_ok; &Util::LDAPUpdate($ldap, $editdn, 'mailDisableMessage', $query->param('maildisablemessage')); &Util::LDAPUpdate($ldap, $editdn, 'mailCallout', $callout); &Util::LDAPUpdate($ldap, $editdn, 'mailContentInspectionAction', $mailcontentinspection); &Util::LDAPUpdate($ldap, $editdn, 'mailGreylisting', $greylisting); &Util::LDAPUpdate($ldap, $editdn, 'mailDefaultOptions', $defaultoptions); &Util::LDAPUpdate($ldap, $editdn, 'sudoPassword', \@keepsudo); # when we are done, reload the page with the updated details. my $url = "https://$ENV{SERVER_NAME}/$config{webupdateurl}?id=$id;authtoken=$authtoken"; print "Location: $url\n\n"; } $ldap->unbind;