1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
/* |
4
|
|
|
* This file is part of the TYPO3 CMS project. |
5
|
|
|
* |
6
|
|
|
* It is free software; you can redistribute it and/or modify it under |
7
|
|
|
* the terms of the GNU General Public License, either version 2 |
8
|
|
|
* of the License, or any later version. |
9
|
|
|
* |
10
|
|
|
* For the full copyright and license information, please read the |
11
|
|
|
* LICENSE.txt file that was distributed with this source code. |
12
|
|
|
* |
13
|
|
|
* The TYPO3 project - inspiring people to share! |
14
|
|
|
*/ |
15
|
|
|
|
16
|
|
|
namespace TYPO3\CMS\Core\Authentication; |
17
|
|
|
|
18
|
|
|
use TYPO3\CMS\Core\Crypto\PasswordHashing\InvalidPasswordHashException; |
19
|
|
|
use TYPO3\CMS\Core\Crypto\PasswordHashing\PasswordHashFactory; |
20
|
|
|
use TYPO3\CMS\Core\Database\ConnectionPool; |
21
|
|
|
use TYPO3\CMS\Core\SysLog\Action\Login as SystemLogLoginAction; |
22
|
|
|
use TYPO3\CMS\Core\SysLog\Error as SystemLogErrorClassification; |
23
|
|
|
use TYPO3\CMS\Core\SysLog\Type as SystemLogType; |
24
|
|
|
use TYPO3\CMS\Core\TimeTracker\TimeTracker; |
25
|
|
|
use TYPO3\CMS\Core\Utility\GeneralUtility; |
26
|
|
|
|
27
|
|
|
/** |
28
|
|
|
* Authentication services class |
29
|
|
|
*/ |
30
|
|
|
class AuthenticationService extends AbstractAuthenticationService |
31
|
|
|
{ |
32
|
|
|
/** |
33
|
|
|
* Process the submitted credentials. |
34
|
|
|
* In this case hash the clear text password if it has been submitted. |
35
|
|
|
* |
36
|
|
|
* @param array $loginData Credentials that are submitted and potentially modified by other services |
37
|
|
|
* @param string $passwordTransmissionStrategy Keyword of how the password has been hashed or encrypted before submission |
38
|
|
|
* @return bool |
39
|
|
|
*/ |
40
|
|
|
public function processLoginData(array &$loginData, $passwordTransmissionStrategy) |
41
|
|
|
{ |
42
|
|
|
$isProcessed = false; |
43
|
|
|
if ($passwordTransmissionStrategy === 'normal') { |
44
|
|
|
$loginData = array_map('trim', $loginData); |
45
|
|
|
$loginData['uident_text'] = $loginData['uident']; |
46
|
|
|
$isProcessed = true; |
47
|
|
|
} |
48
|
|
|
return $isProcessed; |
49
|
|
|
} |
50
|
|
|
|
51
|
|
|
/** |
52
|
|
|
* Find a user (eg. look up the user record in database when a login is sent) |
53
|
|
|
* |
54
|
|
|
* @return mixed User array or FALSE |
55
|
|
|
*/ |
56
|
|
|
public function getUser() |
57
|
|
|
{ |
58
|
|
|
if ($this->login['status'] !== LoginType::LOGIN) { |
59
|
|
|
return false; |
60
|
|
|
} |
61
|
|
|
if ((string)$this->login['uident_text'] === '') { |
62
|
|
|
// Failed Login attempt (no password given) |
63
|
|
|
$this->writelog(SystemLogType::LOGIN, SystemLogLoginAction::ATTEMPT, SystemLogErrorClassification::SECURITY_NOTICE, 2, 'Login-attempt from ###IP### for username \'%s\' with an empty password!', [ |
64
|
|
|
$this->login['uname'] |
65
|
|
|
]); |
66
|
|
|
$this->logger->warning(sprintf('Login-attempt from %s, for username \'%s\' with an empty password!', $this->authInfo['REMOTE_ADDR'], $this->login['uname'])); |
67
|
|
|
return false; |
68
|
|
|
} |
69
|
|
|
|
70
|
|
|
$user = $this->fetchUserRecord($this->login['uname']); |
71
|
|
|
if (!is_array($user)) { |
72
|
|
|
// Failed login attempt (no username found) |
73
|
|
|
$this->writelog(SystemLogType::LOGIN, SystemLogLoginAction::ATTEMPT, SystemLogErrorClassification::SECURITY_NOTICE, 2, 'Login-attempt from ###IP###, username \'%s\' not found!!', [$this->login['uname']]); |
74
|
|
|
$this->logger->info('Login-attempt from username \'' . $this->login['uname'] . '\' not found!', [ |
75
|
|
|
'REMOTE_ADDR' => $this->authInfo['REMOTE_ADDR'] |
76
|
|
|
]); |
77
|
|
|
} else { |
78
|
|
|
$this->logger->debug('User found', [ |
79
|
|
|
$this->db_user['userid_column'] => $user[$this->db_user['userid_column']], |
80
|
|
|
$this->db_user['username_column'] => $user[$this->db_user['username_column']] |
81
|
|
|
]); |
82
|
|
|
} |
83
|
|
|
return $user; |
84
|
|
|
} |
85
|
|
|
|
86
|
|
|
/** |
87
|
|
|
* Authenticate a user: Check submitted user credentials against stored hashed password. |
88
|
|
|
* |
89
|
|
|
* Returns one of the following status codes: |
90
|
|
|
* >= 200: User authenticated successfully. No more checking is needed by other auth services. |
91
|
|
|
* >= 100: User not authenticated; this service is not responsible. Other auth services will be asked. |
92
|
|
|
* > 0: User authenticated successfully. Other auth services will still be asked. |
93
|
|
|
* <= 0: Authentication failed, no more checking needed by other auth services. |
94
|
|
|
* |
95
|
|
|
* @param array $user User data |
96
|
|
|
* @return int Authentication status code, one of 0, 100, 200 |
97
|
|
|
*/ |
98
|
|
|
public function authUser(array $user): int |
99
|
|
|
{ |
100
|
|
|
// Early 100 "not responsible, check other services" if username or password is empty |
101
|
|
|
if (!isset($this->login['uident_text']) || (string)$this->login['uident_text'] === '' |
102
|
|
|
|| !isset($this->login['uname']) || (string)$this->login['uname'] === '') { |
103
|
|
|
return 100; |
104
|
|
|
} |
105
|
|
|
|
106
|
|
|
if (empty($this->db_user['table'])) { |
107
|
|
|
throw new \RuntimeException('User database table not set', 1533159150); |
108
|
|
|
} |
109
|
|
|
|
110
|
|
|
$submittedUsername = (string)$this->login['uname']; |
111
|
|
|
$submittedPassword = (string)$this->login['uident_text']; |
112
|
|
|
$passwordHashInDatabase = $user['password']; |
113
|
|
|
$userDatabaseTable = $this->db_user['table']; |
114
|
|
|
|
115
|
|
|
$isReHashNeeded = false; |
116
|
|
|
|
117
|
|
|
$saltFactory = GeneralUtility::makeInstance(PasswordHashFactory::class); |
118
|
|
|
|
119
|
|
|
// Get a hashed password instance for the hash stored in db of this user |
120
|
|
|
try { |
121
|
|
|
$hashInstance = $saltFactory->get($passwordHashInDatabase, $this->pObj->loginType); |
122
|
|
|
} catch (InvalidPasswordHashException $exception) { |
123
|
|
|
// Could not find a responsible hash algorithm for given password. This is unusual since other |
124
|
|
|
// authentication services would usually be called before this one with higher priority. We thus log |
125
|
|
|
// the failed login but still return '100' to proceed with other services that may follow. |
126
|
|
|
$message = 'Login-attempt from ###IP###, username \'%s\', no suitable hash method found!'; |
127
|
|
|
$this->writeLogMessage($message, $submittedUsername); |
128
|
|
|
$this->writelog(SystemLogType::LOGIN, SystemLogLoginAction::ATTEMPT, SystemLogErrorClassification::SECURITY_NOTICE, 1, $message, [$submittedUsername]); |
129
|
|
|
$this->logger->info(sprintf($message, $submittedUsername)); |
130
|
|
|
// Not responsible, check other services |
131
|
|
|
return 100; |
132
|
|
|
} |
133
|
|
|
|
134
|
|
|
// An instance of the currently configured salted password mechanism |
135
|
|
|
// Don't catch InvalidPasswordHashException here: Only install tool should handle those configuration failures |
136
|
|
|
$defaultHashInstance = $saltFactory->getDefaultHashInstance($this->pObj->loginType); |
137
|
|
|
|
138
|
|
|
// We found a hash class that can handle this type of hash |
139
|
|
|
$isValidPassword = $hashInstance->checkPassword($submittedPassword, $passwordHashInDatabase); |
140
|
|
|
if ($isValidPassword) { |
141
|
|
|
if ($hashInstance->isHashUpdateNeeded($passwordHashInDatabase) |
142
|
|
|
|| $defaultHashInstance != $hashInstance |
143
|
|
|
) { |
144
|
|
|
// Lax object comparison intended: Rehash if old and new salt objects are not |
145
|
|
|
// instances of the same class. |
146
|
|
|
$isReHashNeeded = true; |
147
|
|
|
} |
148
|
|
|
} |
149
|
|
|
|
150
|
|
|
if (!$isValidPassword) { |
151
|
|
|
// Failed login attempt - wrong password |
152
|
|
|
$this->writeLogMessage($this->pObj->loginType . ' Authentication failed - wrong password for username \'%s\'', $submittedUsername); |
153
|
|
|
$message = 'Login-attempt from ###IP###, username \'%s\', password not accepted!'; |
154
|
|
|
$this->writelog(SystemLogType::LOGIN, SystemLogLoginAction::ATTEMPT, SystemLogErrorClassification::SECURITY_NOTICE, 1, $message, [$submittedUsername]); |
155
|
|
|
$this->logger->info(sprintf($message, $submittedUsername)); |
156
|
|
|
// Responsible, authentication failed, do NOT check other services |
157
|
|
|
return 0; |
158
|
|
|
} |
159
|
|
|
|
160
|
|
|
if ($isReHashNeeded) { |
161
|
|
|
// Given password validated but a re-hash is needed. Do so. |
162
|
|
|
$this->updatePasswordHashInDatabase( |
163
|
|
|
$userDatabaseTable, |
164
|
|
|
(int)$user['uid'], |
165
|
|
|
$defaultHashInstance->getHashedPassword($submittedPassword) |
166
|
|
|
); |
167
|
|
|
} |
168
|
|
|
|
169
|
|
|
// Responsible, authentication ok. Log successful login and return 'auth ok, do NOT check other services' |
170
|
|
|
$this->writeLogMessage($this->pObj->loginType . ' Authentication successful for username \'%s\'', $submittedUsername); |
171
|
|
|
return 200; |
172
|
|
|
} |
173
|
|
|
|
174
|
|
|
/** |
175
|
|
|
* Method updates a FE/BE user record - in this case a new password string will be set. |
176
|
|
|
* |
177
|
|
|
* @param string $table Database table of this user, usually 'be_users' or 'fe_users' |
178
|
|
|
* @param int $uid uid of user record that will be updated |
179
|
|
|
* @param string $newPassword Field values as key=>value pairs to be updated in database |
180
|
|
|
*/ |
181
|
|
|
protected function updatePasswordHashInDatabase(string $table, int $uid, string $newPassword): void |
182
|
|
|
{ |
183
|
|
|
$connection = GeneralUtility::makeInstance(ConnectionPool::class)->getConnectionForTable($table); |
184
|
|
|
$connection->update( |
185
|
|
|
$table, |
186
|
|
|
['password' => $newPassword], |
187
|
|
|
['uid' => $uid] |
188
|
|
|
); |
189
|
|
|
$this->logger->notice('Automatic password update for user record in ' . $table . ' with uid ' . $uid); |
190
|
|
|
} |
191
|
|
|
|
192
|
|
|
/** |
193
|
|
|
* Writes log message. Destination log depends on the current system mode. |
194
|
|
|
* |
195
|
|
|
* This function accepts variable number of arguments and can format |
196
|
|
|
* parameters. The syntax is the same as for sprintf() |
197
|
|
|
* |
198
|
|
|
* @param string $message Message to output |
199
|
|
|
* @param array<int,mixed> $params |
200
|
|
|
*/ |
201
|
|
|
protected function writeLogMessage(string $message, ...$params): void |
202
|
|
|
{ |
203
|
|
|
if (!empty($params)) { |
204
|
|
|
$message = vsprintf($message, $params); |
205
|
|
|
} |
206
|
|
|
if ($this->pObj->loginType === 'FE') { |
207
|
|
|
$timeTracker = GeneralUtility::makeInstance(TimeTracker::class); |
208
|
|
|
$timeTracker->setTSlogMessage($message); |
209
|
|
|
} |
210
|
|
|
$this->logger->notice($message); |
211
|
|
|
} |
212
|
|
|
} |
213
|
|
|
|