use strict vars;
#use Apache::Registry;
use CGI;
+use Data::UUID;
+use Digest::HMAC_SHA1 qw(hmac_sha1_hex);
use Util;
+use English;
use URI::Escape;
use Net::LDAP qw(:all);
my $ldap;
+open (F, "<$config{passdir}/key-hmac-$UID") || &Util::HTMLError($!);
+my $hmac_key = <F>;
+close(F);
+chomp($hmac_key);
+
sub DieHandler {
$ldap->unbind if (defined($ldap));
}
if ($mesg->count != 1) {
# complain and quit
}
-
+
+$mesg = $ldap->search(base => $config{hostbasedn}, filter => 'host=*');
+$mesg->code && &Util::HTMLError($mesg->error);
+my $host_entries = $mesg->as_struct;
+
my @dns = keys(%$entries);
my $entry = $entries->{$dns[0]};
# First do the easy stuff - this catches most of the cases
foreach (keys(%$entry)) {
$data{$_} = $entry->{$_}->[0];
+ $data{$_} = CGI::escapeHTML($data{$_}) if defined $data{$_};
}
-
+
$data{gender} = 9 if not $data{gender};
# Now we have to fill in the rest that needs some processing...
$data{editdn} = $editdn;
$data{staddress} = $entry->{postaladdress}->[0];
$data{staddress} =~ s/\$/\n/;
+ $data{staddress} = CGI::escapeHTML($data{staddress});
$data{countryname} = &Util::LookupCountry($data{c});
if ($data{mailgreylisting} eq "TRUE") {
$data{mailcallout} = "";
}
- $data{email} = join(", ", @{$entry->{emailforward}});
+ $data{email} = CGI::escapeHTML(join(", ", @{$entry->{emailforward}}));
my $genderselect = '<select name="gender">'
. '<option value="9"'
. '>male<option value="2"'
. ($data{gender} == 2 ? ' selected' : '')
. '>female</select>';
+ my $confirmstring = '';
+ my $sudopassword = '';
+ for my $e(@{$entry->{'sudopassword'}}) {
+ my ($uuid, $status, $hosts, $crypted) = ($e =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*]+) ([^ ]+)$/);
+ unless (defined $uuid) {
+ $sudopassword .= "<tr><td>Unparseable line!</td></tr>\n";
+ next;
+ }
+ if ($status =~ /^confirmed:/) {
+ my $data = join(':', 'password-is-confirmed', $uuid, $hosts, $crypted);
+ my $hmac = hmac_sha1_hex( $data, $hmac_key);
+ if ($status eq "confirmed:$hmac") {
+ $status = 'confirmed';
+ } else {
+ $status = 'INVALID';
+ }
+ }
+ my $e = "<tr><td>".CGI::escapeHTML($hosts)."</td>
+ <td>".CGI::escapeHTML($status)."</td>
+ <td><small>not shown</small></td>
+ <!--<td><small><code>".CGI::escapeHTML($uuid)."</code></small></td>-->
+ <td><input name=\"sudopassword-delete-".CGI::escapeHTML($uuid)."\" type=\"checkbox\" value=\"delete\"> (delete)</td></tr>\n";
+ $sudopassword .= $e;
+ if ($status eq 'unconfirmed') {
+ my $data = join(':', 'confirm-new-password', $uuid, $hosts, $crypted);
+ my $hmac = hmac_sha1_hex( $data, $hmac_key);
+ $confirmstring .= CGI::escapeHTML("confirm sudopassword $uuid $hosts $hmac\n");
+ }
+ };
+ if ($confirmstring ne '') {
+ $confirmstring = "<br>To confirm your new sudo passwords send signed mail to changes\@db.debian.org with a signed body containing these lines:<br><pre>$confirmstring</pre>";
+ }
+
+ my $sudopasswordhosts = '<select name="newsudopass-host"> <option value="*">ALL';
+ for my $dn (sort {$host_entries->{$a}->{host}->[0] cmp $host_entries->{$b}->{host}->[0]} keys(%$host_entries)) {
+ my $data = $host_entries->{$dn};
+ my $host = $data->{'host'}->[0];
+ my $hostname = $data->{'hostname'}->[0];
+ $sudopasswordhosts .= "<option value=\"$hostname\">$host\n";
+ };
+ $sudopasswordhosts .= '</select>';
# finally we can send output...
my ($sub, $substr);
while (<F>) {
s/~(.+?)~/$data{$1}/g;
s/<\?genderselect>/$genderselect/;
+ s/<\?sudopassword>/$sudopassword/;
+ s/<\?sudopasswordhosts>/$sudopasswordhosts/;
+ s/<\?confirmstring>/$confirmstring/;
print;
}
close F;
-
} else {
+ my @ldapinfo_for_pwcheck;
+ for my $a (qw{cn sn md gecos uid}) {
+ for my $e (@{$entry->{$a}}) {
+ push @ldapinfo_for_pwcheck, $e;
+ }
+ }
+
+
# Actually update stuff...
my ($newpassword, $newstaddress);
- &Util::FixParams($query);
+ # Good god, why would we want to do that here? it breaks password setting
+ # etc, and it doesn't prevent people from setting eveil stuff in ldap
+ # directly.
+ # &Util::FixParams($query);
if (($query->param('labeleduri')) &&
($query->param('labeleduri') !~ /^https?:\/\//i)) {
if ($query->param('newpass') ne $query->param('newpassvrfy')) {
# passwords don't match...
&Util::HTMLError("The passwords you specified do not match. Please go back and try again.");
- }
+ }
+
+ my ($r, $msg) = &Util::checkPasswordQuality($query->param('newpass'), undef, [@ldapinfo_for_pwcheck]);
+ if ($r) {
+ &Util::HTMLError("Password check failed: $msg. Please go back and try again.");
+ }
+
# create a md5 crypted password
$newpassword = '{crypt}'.crypt($query->param('newpass'), &Util::CreateCryptSalt(1));
$callout = "FALSE";
}
+ my $newsudo;
+ my $newsudo_hosts;
+ if ($query->param('newsudopass') && $query->param('newsudopassvrfy')) {
+ my $host = $query->param('newsudopass-host');
+ if ($host =~ /[^a-z0-9.-]/ and $host ne '*') {
+ &Util::HTMLError("The sudo host has weird characters '$host'.");
+ }
+
+ if ($query->param('newsudopass') ne $query->param('newsudopassvrfy')) {
+ &Util::HTMLError("The sudo passwords you specified do not match. Please go back and try again.");
+ }
+
+ my $ldappass = $password;
+ $ldappass = $query->param('newpass') if $query->param('newpass');
+ push @ldapinfo_for_pwcheck, $host, split(/\./, $host);
+ my ($r, $msg) = &Util::checkPasswordQuality($query->param('newsudopass'), $ldappass, [@ldapinfo_for_pwcheck]);
+ if ($r) {
+ &Util::HTMLError("Password check failed for new sudo pass: $msg. Please go back and try again.");
+ }
+
+ # create a md5 crypted password
+ my $newsudopassword = crypt($query->param('newsudopass'), &Util::CreateCryptSalt(1));
+ my $ug = new Data::UUID;
+ my $uuid = $ug->create_str();
+
+ $newsudo = "$uuid unconfirmed $host $newsudopassword";
+ $newsudo_hosts = $host;
+ }
+
+ my %delete_uuids = map { s/^sudopassword-delete-//; $_ => 1} grep { $query->param($_) eq 'delete' } grep { /^sudopassword-delete-/ } $query->param;
+ my @keepsudo;
+ for my $entry (@{$entry->{'sudopassword'}}) {
+ my ($uuid, $status, $hosts, $crypted) = ($entry =~ /^([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}) (confirmed:[0-9a-f]{40}|unconfirmed) ([a-z0-9.,*]+) ([^ ]+)$/);
+ next unless defined ($uuid);
+ next if (defined $delete_uuids{$uuid});
+ my %hosts = map { $_ => 1 } split(/,/, $hosts);
+ next if ($hosts{$newsudo_hosts});
+ push @keepsudo, $entry;
+ };
+ if ($newsudo ne '') {
+ push @keepsudo, $newsudo;
+ }
+
&Util::LDAPUpdate($ldap, $editdn, 'postalAddress', $newstaddress);
&Util::LDAPUpdate($ldap, $editdn, 'l', $query->param('l'));
&Util::LDAPUpdate($ldap, $editdn, 'latitude', $lat);
&Util::LDAPUpdate($ldap, $editdn, 'mailDisableMessage', $query->param('maildisablemessage'));
&Util::LDAPUpdate($ldap, $editdn, 'mailCallout', $callout);
&Util::LDAPUpdate($ldap, $editdn, 'mailGreylisting', $greylisting);
+ &Util::LDAPUpdate($ldap, $editdn, 'sudoPassword', \@keepsudo);
# when we are done, reload the page with the updated details.
my $url = "https://$ENV{SERVER_NAME}/$config{webupdateurl}?id=$id&authtoken=$authtoken&editdn=";