##@file # Extends Net::LDAP package Lemonldap::NG::Portal::Lib::LDAP; use strict; use Net::LDAP; #inherits use Net::LDAP::Util qw(escape_filter_value); use base qw(Net::LDAP); use Lemonldap::NG::Portal::Main::Constants ':all'; use Encode; use Unicode::String qw(utf8); use Scalar::Util 'weaken'; our $VERSION = '2.0.0'; our $ppLoaded = 0; BEGIN { eval { require threads::shared; threads::shared::share($ppLoaded); }; } # INITIALIZATION # Build a Net::LDAP object using parameters issued from $portal sub new { my ( $class, $args ) = @_; my $portal = $args->{p} or die "$class : p argument required !"; my $conf = $args->{conf} or die "$class : conf argument required !"; my $self; my $useTls = 0; my $tlsParam; my @servers = (); foreach my $server ( split /[\s,]+/, $conf->{ldapServer} ) { if ( $server =~ m{^ldap\+tls://([^/]+)/?\??(.*)$} ) { $useTls = 1; $server = $1; $tlsParam = $2 || ""; } else { $useTls = 0; } push @servers, $server; } $self = Net::LDAP->new( \@servers, onerror => undef, ( $conf->{ldapPort} ? ( port => $conf->{ldapPort} ) : () ), ( $conf->{ldapTimeout} ? ( timeout => $conf->{ldapTimeout} ) : () ), ( $conf->{ldapVersion} ? ( version => $conf->{ldapVersion} ) : () ), ( $conf->{ldapRaw} ? ( raw => $conf->{ldapRaw} ) : () ), ); unless ($self) { $portal->lmLog( $@, 'error' ); return 0; } bless $self, $class; if ($useTls) { my %h = split( /[&=]/, $tlsParam ); $h{cafile} = $conf->{caFile} if ( $conf->{caFile} ); $h{capath} = $conf->{caPath} if ( $conf->{caPath} ); my $mesg = $self->start_tls(%h); if ( $mesg->code ) { $portal->lmLog( 'StartTLS failed', 'error' ); return 0; } } $self->{portal} = $portal; $self->{conf} = $conf; weaken $self->{portal}; # Setting default LDAP password storage encoding to utf-8 $self->{conf}->{ldapPwdEnc} ||= 'utf-8'; return $self; } # RUNNING METHODS ## @method Net::LDAP::Message bind(string dn, hash args) # Reimplementation of Net::LDAP::bind(). Connection is done : # - with $dn and $args->{password} as dn/password if defined, # - or with Lemonldap::NG account, # - or with an anonymous bind. # @param $dn LDAP distinguish name # @param %args See Net::LDAP(3) manpage for more # @return Net::LDAP::Message sub bind { my ( $self, $dn, %args ) = @_; my $mesg; unless ($dn) { $dn = $self->{conf}->{managerDn}; $args{password} = decode( 'utf-8', $self->{conf}->{managerPassword} ); } if ( $dn && $args{password} ) { if ( $self->{conf}->{ldapPwdEnc} ne 'utf-8' ) { eval { my $tmp = encode( $self->{conf}->{ldapPwdEnc}, decode( 'utf-8', $args{password} ) ); $args{password} = $tmp; }; print STDERR "$@\n" if ($@); } $mesg = $self->SUPER::bind( $dn, %args ); } else { $mesg = $self->SUPER::bind(); } return $mesg; } ## @method Net::LDAP::Message unbind() # Reimplementation of Net::LDAP::unbind() to force call to disconnect() # @return Net::LDAP::Message sub unbind { my $self = shift; my $ldap_uri = $self->uri; $self->{portal}->lmLog( "Unbind and disconnect from $ldap_uri", 'debug' ); my $mesg = $self->SUPER::unbind(); $self->SUPER::disconnect(); return $mesg; } ## @method private boolean loadPP () # Load Net::LDAP::Control::PasswordPolicy # @return true if succeed. sub loadPP { my $self = shift; return 1 if ($ppLoaded); # Minimal version of Net::LDAP required if ( $Net::LDAP::VERSION < 0.38 ) { die( "Module Net::LDAP is too old for password policy, please install version 0.38 or higher" ); } # Require Perl module eval { require Net::LDAP::Control::PasswordPolicy }; if ($@) { $self->{portal}->lmLog( "Module Net::LDAP::Control::PasswordPolicy not found in @INC", 'error' ); return 0; } $ppLoaded = 1; } ## @method protected int userBind(string dn, hash args) # Call bind() with dn/password and return # @param $dn LDAP distinguish name # @param %args See Net::LDAP(3) manpage for more # @return Lemonldap::NG portal error code sub userBind { my $self = shift; if ( $self->{conf}->{ldapPpolicyControl} ) { # Create Control object my $pp = Net::LDAP::Control::PasswordPolicy->new(); # Bind with user credentials my $mesg = $self->bind( @_, control => [$pp] ); # Get server control response my ($resp) = $mesg->control("1.3.6.1.4.1.42.2.27.8.5.1"); # Return direct unless control resonse unless ( defined $resp ) { if ( $mesg->code == 49 ) { $self->{portal}->userError("Bad password"); return PE_BADCREDENTIALS; } return ( $mesg->code == 0 ? PE_OK : PE_LDAPERROR ); } # Check for ppolicy error my $pp_error = $resp->pp_error; if ( defined $pp_error ) { $self->{portal}->userError( "Password policy error $pp_error for $self->{portal}->{user}"); return [ PE_PP_PASSWORD_EXPIRED, PE_PP_ACCOUNT_LOCKED, PE_PP_CHANGE_AFTER_RESET, PE_PP_PASSWORD_MOD_NOT_ALLOWED, PE_PP_MUST_SUPPLY_OLD_PASSWORD, PE_PP_INSUFFICIENT_PASSWORD_QUALITY, PE_PP_PASSWORD_TOO_SHORT, PE_PP_PASSWORD_TOO_YOUNG, PE_PP_PASSWORD_IN_HISTORY, ]->[$pp_error]; } elsif ( $mesg->code == 0 ) { # Get expiration warning and graces if ( $resp->grace_authentications_remaining ) { # TODO $self->{portal}->info( "

" . $resp->grace_authentications_remaining . " " . $self->{portal}->msg(PM_PP_GRACE) . "

" ); } if ( $resp->time_before_expiration ) { $self->{portal}->info( "

" . sprintf( $self->{portal}->msg(PM_PP_EXP_WARNING), $self->{portal} ->convertSec( $resp->time_before_expiration ) ) . "

" ); } return PE_OK; } } else { my $mesg = $self->bind(@_); if ( $mesg->code == 0 ) { return PE_OK; } } $self->{portal}->userError("Bad password for $self->{portal}->{user}"); return PE_BADCREDENTIALS; } ## @method int userModifyPassword(string dn, string newpassword, string oldpassword, boolean ad) # Change user's password. # @param $dn DN # @param $newpassword New password # @param $oldpassword Current password # @param $ad Active Directory mode # @return Lemonldap::NG::Portal constant sub userModifyPassword { my ( $self, $dn, $newpassword, $oldpassword, $ad ) = @_; my $ppolicyControl = $self->{conf}->{ldapPpolicyControl}; my $setPassword = $self->{conf}->{ldapSetPassword}; my $asUser = $self->{conf}->{ldapChangePasswordAsUser}; my $requireOldPassword = $self->{conf}->{portalRequireOldPassword}; my $passwordAttribute = "userPassword"; my $err; my $mesg; # Adjust configuration for AD if ($ad) { $ppolicyControl = 0; $setPassword = 0; $passwordAttribute = "unicodePwd"; # Encode password for AD $newpassword = utf8( chr(34) . $newpassword . chr(34) )->utf16le(); if ( $oldpassword and $asUser ) { $oldpassword = utf8( chr(34) . $oldpassword . chr(34) )->utf16le(); } $self->{portal}->lmLog( "Active Directory mode enabled", 'debug' ); } # First case: no ppolicy if ( !$ppolicyControl ) { if ($setPassword) { # Bind as user if oldpassword and ldapChangePasswordAsUser if ( $oldpassword and $asUser ) { $mesg = $self->bind( $dn, password => $oldpassword ); if ( $mesg->code != 0 ) { $self->{portal}->lmLog( "Bad old password", 'debug' ); return PE_BADOLDPASSWORD; } } # Use SetPassword extended operation require Net::LDAP::Extension::SetPassword; $mesg = ($oldpassword) ? $self->set_password( user => $dn, oldpasswd => $oldpassword, newpasswd => $newpassword ) : $self->set_password( user => $dn, newpasswd => $newpassword ); # Catch the "Unwilling to perform" error if ( $mesg->code == 53 ) { $self->{portal}->lmLog( "Bad old password", 'debug' ); return PE_BADOLDPASSWORD; } } else { # AD specific # Change password as user with a delete/add modification if ( $ad and $oldpassword and $asUser ) { $mesg = $self->modify( $dn, changes => [ delete => [ $passwordAttribute => $oldpassword ], add => [ $passwordAttribute => $newpassword ] ] ); } else { if ($requireOldPassword) { return PE_MUST_SUPPLY_OLD_PASSWORD if ( !$oldpassword ); # Check old password with a bind $mesg = $self->bind( $dn, password => $oldpassword ); # For AD password expiration to work: # ppolicy must be desactivated, # and "change as user" must be desactivated if ($ad) { if ( $mesg->error =~ /LdapErr: .* data ([^,]+),.*/ ) { # extended data message code: # 532: password expired (but provided password is correct) # 773: must change password at next connection (but provided password is correct) # 52e: password is incorrect unless ( ( $1 eq '532' ) || ( $1 eq '773' ) ) { $self->{portal} ->lmLog( "Bad old password", 'warn' ); return PE_BADOLDPASSWORD; } } # if error message has not been catched, then it IS a success } else { # this is not AD, a 0 error code means good old password if ( $mesg->code != 0 ) { $self->{portal} ->lmLog( "Bad old password", 'warn' ); return PE_BADOLDPASSWORD; } } # Rebind as Manager only if user is not granted to change its password $self->bind() unless $asUser; } # Use standard modification $mesg = $self->modify( $dn, replace => { $passwordAttribute => $newpassword } ); } } $self->{portal} ->lmLog( "Modification return code: " . $mesg->code, 'debug' ); return PE_WRONGMANAGERACCOUNT if ( $mesg->code == 50 || $mesg->code == 8 ); return PE_PP_INSUFFICIENT_PASSWORD_QUALITY if ( $mesg->code == 53 && $ad ); return PE_PP_PASSWORD_MOD_NOT_ALLOWED if ( $mesg->code == 19 && $ad ); return PE_LDAPERROR unless ( $mesg->code == 0 ); $self->{portal}->userNotice("Password changed $self->{portal}->{user}"); # Rebind as manager for next LDAP operations if we were bound as user $self->bind() if $asUser; return PE_PASSWORD_OK; } else { # Create Control object my $pp = Net::LDAP::Control::PasswordPolicy->new; if ($setPassword) { # Bind as user if oldpassword and ldapChangePasswordAsUser if ( $oldpassword and $asUser ) { $mesg = $self->bind( $dn, password => $oldpassword, control => [$pp] ); my ($bind_resp) = $mesg->control("1.3.6.1.4.1.42.2.27.8.5.1"); unless ( defined $bind_resp ) { if ( $mesg->code != 0 ) { $self->{portal}->lmLog( "Bad old password", 'debug' ); return PE_BADOLDPASSWORD; } } else { # Check if password is expired my $pp_error = $bind_resp->pp_error; if ( defined $pp_error and $pp_error == 0 and $self->{conf}->{ldapAllowResetExpiredPassword} ) { $self->{portal}->lmLog( "Password is expired but user is allowed to change it", 'debug' ); } else { if ( $mesg->code != 0 ) { $self->{portal} ->lmLog( "Bad old password", 'debug' ); return PE_BADOLDPASSWORD; } } } } # Use SetPassword extended operation # Warning: need a patch on Perl-LDAP # See http://groups.google.com/group/perl.ldap/browse_thread/thread/5703a41ccb17b221/377a68f872cc2bb4?lnk=gst&q=setpassword#377a68f872cc2bb4 use Net::LDAP::Extension::SetPassword; $mesg = ($oldpassword) ? $self->set_password( user => $dn, oldpasswd => $oldpassword, newpasswd => $newpassword, control => [$pp] ) : $self->set_password( user => $dn, newpasswd => $newpassword, control => [$pp] ); # Catch the "Unwilling to perform" error if ( $mesg->code == 53 ) { $self->{portal}->lmLog( "Bad old password", 'debug' ); return PE_BADOLDPASSWORD; } } else { if ($oldpassword) { # Check old password with a bind $mesg = $self->bind( $dn, password => $oldpassword, control => [$pp] ); my ($bind_resp) = $mesg->control("1.3.6.1.4.1.42.2.27.8.5.1"); unless ( defined $bind_resp ) { if ( $mesg->code != 0 ) { $self->{portal}->lmLog( "Bad old password", 'debug' ); return PE_BADOLDPASSWORD; } } else { # Check if password is expired my $pp_error = $bind_resp->pp_error; if ( defined $pp_error and $pp_error == 0 and $self->{conf}->{ldapAllowResetExpiredPassword} ) { $self->{portal}->lmLog( "Password is expired but user is allowed to change it", 'debug' ); } else { if ( $mesg->code != 0 ) { $self->{portal} ->lmLog( "Bad old password", 'debug' ); return PE_BADOLDPASSWORD; } } } # Rebind as Manager only if user is not granted to change its password $self->bind() unless $asUser; } # Use standard modification $mesg = $self->modify( $dn, replace => { $passwordAttribute => $newpassword }, control => [$pp] ); } # Get server control response my ($resp) = $mesg->control("1.3.6.1.4.1.42.2.27.8.5.1"); $self->{portal} ->lmLog( "Modification return code: " . $mesg->code, 'debug' ); return PE_WRONGMANAGERACCOUNT if ( $mesg->code == 50 || $mesg->code == 8 ); if ( $mesg->code == 0 ) { $self->{portal} ->userNotice("Password changed $self->{portal}->{user}"); # Rebind as manager for next LDAP operations if we were bound as user $self->bind() if $asUser; return PE_PASSWORD_OK; } if ( defined $resp ) { my $pp_error = $resp->pp_error; if ( defined $pp_error ) { $self->{portal}->userError("Password policy error $pp_error"); return [ PE_PP_PASSWORD_EXPIRED, PE_PP_ACCOUNT_LOCKED, PE_PP_CHANGE_AFTER_RESET, PE_PP_PASSWORD_MOD_NOT_ALLOWED, PE_PP_MUST_SUPPLY_OLD_PASSWORD, PE_PP_INSUFFICIENT_PASSWORD_QUALITY, PE_PP_PASSWORD_TOO_SHORT, PE_PP_PASSWORD_TOO_YOUNG, PE_PP_PASSWORD_IN_HISTORY, ]->[$pp_error]; } } else { return PE_LDAPERROR; } } } ## @method protected Lemonldap::NG::Portal::_LDAP ldap() # @return Lemonldap::NG::Portal::_LDAP object sub ldap { my $self = shift; return $self->{ldap} if ( ref( $self->{ldap} ) and $self->{flags}->{ldapActive} ); if ( $self->{ldap} = Lemonldap::NG::Portal::_LDAP->new($self) and my $mesg = $self->{ldap}->bind ) { if ( $mesg->code != 0 ) { $self->lmLog( "LDAP error: " . $mesg->error, 'error' ); $self->{ldap}->unbind; } else { if ( $self->{ldapPpolicyControl} and not $self->{ldap}->loadPP() ) { $self->lmLog( "LDAP password policy error", 'error' ); $self->{ldap}->unbind; } else { $self->{flags}->{ldapActive} = 1; return $self->{ldap}; } } } else { $self->lmLog( "LDAP error: $@", 'error' ); } return 0; } ## @method string searchGroups(string base, string key, string value, string attributes) # Get groups from LDAP directory # @param base LDAP search base # @param key Attribute name in group containing searched value # @param value Searched value # @param attributes to get from found groups (array ref) # @return hashRef groups sub searchGroups { my ( $self, $base, $key, $value, $attributes ) = @_; my $groups = {}; # Creating search filter my $searchFilter = "(&(objectClass=" . $self->{conf}->{ldapGroupObjectClass} . ")(|"; foreach ( split( $self->{conf}->{multiValuesSeparator}, $value ) ) { $searchFilter .= "(" . $key . "=" . escape_filter_value($_) . ")"; } $searchFilter .= "))"; $self->{p}->lmLog( "Group search filter: $searchFilter", 'debug' ); # Search my $mesg = $self->search( base => $base, filter => $searchFilter, attrs => $attributes, ); # Browse results if ( $mesg->code() == 0 ) { foreach my $entry ( $mesg->all_entries ) { $self->{p} ->lmLog( "Matching group " . $entry->dn() . " found", 'debug' ); # If recursive search is activated, do it here if ( $self->{conf}->{ldapGroupRecursive} ) { # Get searched value my $group_value = $self->getLdapValue( $entry, $self->{conf}->{ldapGroupAttributeNameGroup} ); # Launch group search if ($group_value) { $self->{p} ->lmLog( "Recursive search for $group_value", 'debug' ); my $recursive_groups = $self->searchGroups( $base, $key, $group_value, $attributes ); my %allGroups = ( %$groups, %$recursive_groups ) if ( ref $recursive_groups ); $groups = \%allGroups; } } # Use first attribute as group name my $groupName = $entry->get_value( $attributes->[0] ); $groups->{$groupName}->{name} = $groupName; # Now parse attributes foreach (@$attributes) { # Next if group attribute value next if ( $_ eq $self->{conf}->{ldapGroupAttributeValueGroup} ); my $data = $entry->get_value( $_, asref => 1 ); if ($data) { $self->{p}->lmLog( "Store values of $_ in group $groupName", 'debug' ); $groups->{$groupName}->{$_} = $data; } } } } return $groups; } ## @method string getLdapValue(Net::LDAP::Entry entry, string attribute) # Get the dn, or the attribute value with a separator for multi-valuated attributes # @param entry LDAP entry # @param attribute Attribute name # @return string value sub getLdapValue { my ( $self, $entry, $attribute ) = @_; return $entry->dn() if ( $attribute eq "dn" ); return join( $self->{conf}->{multiValuesSeparator}, $entry->get_value($attribute) ); } 1;