| /* ==================================================================== |
| * Copyright (c) 1995-1999 The Apache Group. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * 3. All advertising materials mentioning features or use of this |
| * software must display the following acknowledgment: |
| * "This product includes software developed by the Apache Group |
| * for use in the Apache HTTP server project (http://www.apache.org/)." |
| * |
| * 4. The names "Apache Server" and "Apache Group" must not be used to |
| * endorse or promote products derived from this software without |
| * prior written permission. For written permission, please contact |
| * apache@apache.org. |
| * |
| * 5. Products derived from this software may not be called "Apache" |
| * nor may "Apache" appear in their names without prior written |
| * permission of the Apache Group. |
| * |
| * 6. Redistributions of any form whatsoever must retain the following |
| * acknowledgment: |
| * "This product includes software developed by the Apache Group |
| * for use in the Apache HTTP server project (http://www.apache.org/)." |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE APACHE GROUP ``AS IS'' AND ANY |
| * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE GROUP OR |
| * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| * OF THE POSSIBILITY OF SUCH DAMAGE. |
| * ==================================================================== |
| * |
| * This software consists of voluntary contributions made by many |
| * individuals on behalf of the Apache Group and was originally based |
| * on public domain software written at the National Center for |
| * Supercomputing Applications, University of Illinois, Urbana-Champaign. |
| * For more information on the Apache Group and the Apache HTTP server |
| * project, please see <http://www.apache.org/>. |
| * |
| */ |
| |
| /* |
| * http_auth: authentication |
| * |
| * Rob McCool |
| * |
| * Adapted to Apache by rst. |
| * |
| * dirkx - Added Authoritative control to allow passing on to lower |
| * modules if and only if the userid is not known to this |
| * module. A known user with a faulty or absent password still |
| * causes an AuthRequired. The default is 'Authoritative', i.e. |
| * no control is passed along. |
| */ |
| |
| #include "ap_config.h" |
| #include "apr_md5.h" |
| #include "httpd.h" |
| #include "http_config.h" |
| #include "http_core.h" |
| #include "http_log.h" |
| #include "http_protocol.h" |
| #include "http_request.h" |
| |
| typedef struct auth_config_struct { |
| char *auth_pwfile; |
| char *auth_grpfile; |
| int auth_authoritative; |
| } auth_config_rec; |
| |
| static void *create_auth_dir_config(ap_context_t *p, char *d) |
| { |
| auth_config_rec *sec = |
| (auth_config_rec *) ap_pcalloc(p, sizeof(auth_config_rec)); |
| sec->auth_pwfile = NULL; /* just to illustrate the default really */ |
| sec->auth_grpfile = NULL; /* unless you have a broken HP cc */ |
| sec->auth_authoritative = 1; /* keep the fortress secure by default */ |
| return sec; |
| } |
| |
| static const char *set_auth_slot(cmd_parms *cmd, void *offset, char *f, char *t) |
| { |
| if (t && strcmp(t, "standard")) |
| return ap_pstrcat(cmd->pool, "Invalid auth file type: ", t, NULL); |
| |
| return ap_set_file_slot(cmd, offset, f); |
| } |
| |
| static const command_rec auth_cmds[] = |
| { |
| {"AuthUserFile", set_auth_slot, |
| (void *) XtOffsetOf(auth_config_rec, auth_pwfile), OR_AUTHCFG, TAKE12, |
| "text file containing user IDs and passwords"}, |
| {"AuthGroupFile", set_auth_slot, |
| (void *) XtOffsetOf(auth_config_rec, auth_grpfile), OR_AUTHCFG, TAKE12, |
| "text file containing group names and member user IDs"}, |
| {"AuthAuthoritative", ap_set_flag_slot, |
| (void *) XtOffsetOf(auth_config_rec, auth_authoritative), |
| OR_AUTHCFG, FLAG, |
| "Set to 'no' to allow access control to be passed along to lower modules if the UserID is not known to this module"}, |
| {NULL} |
| }; |
| |
| module MODULE_VAR_EXPORT auth_module; |
| |
| static char *get_pw(request_rec *r, char *user, char *auth_pwfile) |
| { |
| configfile_t *f; |
| char l[MAX_STRING_LEN]; |
| const char *rpw, *w; |
| ap_status_t status; |
| |
| if ((status = ap_pcfg_openfile(&f, r->pool, auth_pwfile)) != APR_SUCCESS) { |
| ap_log_rerror(APLOG_MARK, APLOG_ERR, status, r, |
| "Could not open password file: %s", auth_pwfile); |
| return NULL; |
| } |
| while (!(ap_cfg_getline(l, MAX_STRING_LEN, f))) { |
| if ((l[0] == '#') || (!l[0])) |
| continue; |
| rpw = l; |
| w = ap_getword(r->pool, &rpw, ':'); |
| |
| if (!strcmp(user, w)) { |
| ap_cfg_closefile(f); |
| return ap_getword(r->pool, &rpw, ':'); |
| } |
| } |
| ap_cfg_closefile(f); |
| return NULL; |
| } |
| |
| static ap_table_t *groups_for_user(ap_context_t *p, char *user, char *grpfile) |
| { |
| configfile_t *f; |
| ap_table_t *grps = ap_make_table(p, 15); |
| ap_context_t *sp; |
| char l[MAX_STRING_LEN]; |
| const char *group_name, *ll, *w; |
| ap_status_t status; |
| |
| if ((status = ap_pcfg_openfile(&f, p, grpfile)) != APR_SUCCESS) { |
| /*add? aplog_error(APLOG_MARK, APLOG_ERR, NULL, |
| "Could not open group file: %s", grpfile);*/ |
| return NULL; |
| } |
| |
| ap_create_context(&sp, p); |
| |
| while (!(ap_cfg_getline(l, MAX_STRING_LEN, f))) { |
| if ((l[0] == '#') || (!l[0])) |
| continue; |
| ll = l; |
| ap_clear_pool(sp); |
| |
| group_name = ap_getword(sp, &ll, ':'); |
| |
| while (ll[0]) { |
| w = ap_getword_conf(sp, &ll); |
| if (!strcmp(w, user)) { |
| ap_table_setn(grps, ap_pstrdup(p, group_name), "in"); |
| break; |
| } |
| } |
| } |
| ap_cfg_closefile(f); |
| ap_destroy_pool(sp); |
| return grps; |
| } |
| |
| /* These functions return 0 if client is OK, and proper error status |
| * if not... either AUTH_REQUIRED, if we made a check, and it failed, or |
| * SERVER_ERROR, if things are so totally confused that we couldn't |
| * figure out how to tell if the client is authorized or not. |
| * |
| * If they return DECLINED, and all other modules also decline, that's |
| * treated by the server core as a configuration error, logged and |
| * reported as such. |
| */ |
| |
| /* Determine user ID, and check if it really is that user, for HTTP |
| * basic authentication... |
| */ |
| |
| static int authenticate_basic_user(request_rec *r) |
| { |
| auth_config_rec *sec = |
| (auth_config_rec *) ap_get_module_config(r->per_dir_config, &auth_module); |
| const char *sent_pw; |
| char *real_pw; |
| ap_status_t invalid_pw; |
| int res; |
| |
| if ((res = ap_get_basic_auth_pw(r, &sent_pw))) |
| return res; |
| |
| if (!sec->auth_pwfile) |
| return DECLINED; |
| |
| if (!(real_pw = get_pw(r, r->user, sec->auth_pwfile))) { |
| if (!(sec->auth_authoritative)) |
| return DECLINED; |
| ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r, |
| "user %s not found: %s", r->user, r->uri); |
| ap_note_basic_auth_failure(r); |
| return AUTH_REQUIRED; |
| } |
| invalid_pw = ap_validate_password(sent_pw, real_pw); |
| if (invalid_pw != APR_SUCCESS) { |
| ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r, |
| "user %s: authentication failure for \"%s\": " |
| "Password Mismatch", |
| r->user, r->uri); |
| ap_note_basic_auth_failure(r); |
| return AUTH_REQUIRED; |
| } |
| return OK; |
| } |
| |
| /* Checking ID */ |
| |
| static int check_user_access(request_rec *r) |
| { |
| auth_config_rec *sec = |
| (auth_config_rec *) ap_get_module_config(r->per_dir_config, &auth_module); |
| char *user = r->user; |
| int m = r->method_number; |
| int method_restricted = 0; |
| register int x; |
| const char *t, *w; |
| ap_table_t *grpstatus; |
| const ap_array_header_t *reqs_arr = ap_requires(r); |
| require_line *reqs; |
| |
| /* BUG FIX: tadc, 11-Nov-1995. If there is no "requires" directive, |
| * then any user will do. |
| */ |
| if (!reqs_arr) |
| return (OK); |
| reqs = (require_line *) reqs_arr->elts; |
| |
| if (sec->auth_grpfile) |
| grpstatus = groups_for_user(r->pool, user, sec->auth_grpfile); |
| else |
| grpstatus = NULL; |
| |
| for (x = 0; x < reqs_arr->nelts; x++) { |
| |
| if (!(reqs[x].method_mask & (1 << m))) |
| continue; |
| |
| method_restricted = 1; |
| |
| t = reqs[x].requirement; |
| w = ap_getword_white(r->pool, &t); |
| if (!strcmp(w, "valid-user")) |
| return OK; |
| if (!strcmp(w, "user")) { |
| while (t[0]) { |
| w = ap_getword_conf(r->pool, &t); |
| if (!strcmp(user, w)) |
| return OK; |
| } |
| } |
| else if (!strcmp(w, "group")) { |
| if (!grpstatus) |
| return DECLINED; /* DBM group? Something else? */ |
| |
| while (t[0]) { |
| w = ap_getword_conf(r->pool, &t); |
| if (ap_table_get(grpstatus, w)) |
| return OK; |
| } |
| } else if (sec->auth_authoritative) { |
| /* if we aren't authoritative, any require directive could be |
| * valid even if we don't grok it. However, if we are |
| * authoritative, we can warn the user they did something wrong. |
| * That something could be a missing "AuthAuthoritative off", but |
| * more likely is a typo in the require directive. |
| */ |
| ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r, |
| "access to %s failed, reason: unknown require directive:" |
| "\"%s\"", r->uri, reqs[x].requirement); |
| } |
| } |
| |
| if (!method_restricted) |
| return OK; |
| |
| if (!(sec->auth_authoritative)) |
| return DECLINED; |
| |
| ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r, |
| "access to %s failed, reason: user %s not allowed access", |
| r->uri, user); |
| |
| ap_note_basic_auth_failure(r); |
| return AUTH_REQUIRED; |
| } |
| |
| static void register_hooks(void) |
| { |
| ap_hook_check_user_id(authenticate_basic_user,NULL,NULL,HOOK_MIDDLE); |
| ap_hook_auth_checker(check_user_access,NULL,NULL,HOOK_MIDDLE); |
| } |
| |
| module MODULE_VAR_EXPORT auth_module = |
| { |
| STANDARD20_MODULE_STUFF, |
| create_auth_dir_config, /* dir config creater */ |
| NULL, /* dir merger --- default is to override */ |
| NULL, /* server config */ |
| NULL, /* merge server config */ |
| auth_cmds, /* command ap_table_t */ |
| NULL, /* handlers */ |
| register_hooks /* register hooks */ |
| }; |