2021-12-08 21:45:42 +01:00
|
|
|
# This file is part of Radicale - CalDAV and CardDAV server
|
2009-07-27 15:04:54 +00:00
|
|
|
# Copyright © 2008 Nicolas Kandel
|
|
|
|
# Copyright © 2008 Pascal Halter
|
2017-05-27 17:28:07 +02:00
|
|
|
# Copyright © 2008-2017 Guillaume Ayoub
|
2019-06-17 04:13:25 +02:00
|
|
|
# Copyright © 2017-2019 Unrud <unrud@outlook.com>
|
2024-03-12 06:08:26 +01:00
|
|
|
# Copyright © 2024 Peter Bieringer <pb@bieringer.de>
|
2008-12-30 16:25:42 +00:00
|
|
|
#
|
|
|
|
# This library is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This library is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with Radicale. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2020-01-12 23:32:28 +01:00
|
|
|
"""
|
|
|
|
Authentication backend that checks credentials with a htpasswd file.
|
|
|
|
|
|
|
|
Apache's htpasswd command (httpd.apache.org/docs/programs/htpasswd.html)
|
|
|
|
manages a file for storing user credentials. It can encrypt passwords using
|
2024-03-12 06:08:26 +01:00
|
|
|
different the methods BCRYPT/SHA256/SHA512 or MD5-APR1 (a version of MD5 modified for
|
|
|
|
Apache). MD5-APR1 provides medium security as of 2015. Only BCRYPT/SHA256/SHA512 can be
|
2020-01-19 18:26:14 +01:00
|
|
|
considered secure by current standards.
|
2020-01-12 23:32:28 +01:00
|
|
|
|
|
|
|
MD5-APR1-encrypted credentials can be written by all versions of htpasswd (it
|
2024-03-12 06:08:26 +01:00
|
|
|
is the default, in fact), whereas BCRYPT/SHA256/SHA512 requires htpasswd 2.4.x or newer.
|
2020-01-12 23:32:28 +01:00
|
|
|
|
|
|
|
The `is_authenticated(user, password)` function provided by this module
|
|
|
|
verifies the user-given credentials by parsing the htpasswd credential file
|
|
|
|
pointed to by the ``htpasswd_filename`` configuration value while assuming
|
|
|
|
the password encryption method specified via the ``htpasswd_encryption``
|
|
|
|
configuration value.
|
|
|
|
|
2024-07-24 11:22:49 +02:00
|
|
|
The following htpasswd password encryption methods are supported by Radicale
|
2020-01-12 23:32:28 +01:00
|
|
|
out-of-the-box:
|
2024-03-12 06:08:26 +01:00
|
|
|
- plain-text (created by htpasswd -p ...) -- INSECURE
|
|
|
|
- MD5-APR1 (htpasswd -m ...) -- htpasswd's default method, INSECURE
|
|
|
|
- SHA256 (htpasswd -2 ...)
|
|
|
|
- SHA512 (htpasswd -5 ...)
|
2020-01-12 23:32:28 +01:00
|
|
|
|
2024-03-07 07:28:43 +01:00
|
|
|
When bcrypt is installed:
|
2024-03-12 06:08:26 +01:00
|
|
|
- BCRYPT (htpasswd -B ...) -- Requires htpasswd 2.4.x
|
2020-01-12 23:32:28 +01:00
|
|
|
|
|
|
|
"""
|
|
|
|
|
2016-07-04 14:32:33 +02:00
|
|
|
import functools
|
2017-05-23 03:02:22 +02:00
|
|
|
import hmac
|
2021-07-26 20:56:46 +02:00
|
|
|
from typing import Any
|
2009-07-27 15:04:54 +00:00
|
|
|
|
2024-03-12 06:08:26 +01:00
|
|
|
from passlib.hash import apr_md5_crypt, sha256_crypt, sha512_crypt
|
2020-01-19 18:26:14 +01:00
|
|
|
|
2024-03-12 06:08:26 +01:00
|
|
|
from radicale import auth, config, logger
|
2018-08-16 07:59:55 +02:00
|
|
|
|
2017-06-21 09:48:57 +02:00
|
|
|
|
2018-08-28 16:19:36 +02:00
|
|
|
class Auth(auth.BaseAuth):
|
2021-07-26 20:56:46 +02:00
|
|
|
|
|
|
|
_filename: str
|
|
|
|
_encoding: str
|
|
|
|
|
|
|
|
def __init__(self, configuration: config.Configuration) -> None:
|
2018-08-16 07:59:55 +02:00
|
|
|
super().__init__(configuration)
|
2020-01-19 18:01:13 +01:00
|
|
|
self._filename = configuration.get("auth", "htpasswd_filename")
|
2021-07-26 20:56:46 +02:00
|
|
|
self._encoding = configuration.get("encoding", "stock")
|
|
|
|
encryption: str = configuration.get("auth", "htpasswd_encryption")
|
2020-01-19 18:01:13 +01:00
|
|
|
|
2024-03-16 08:56:04 +01:00
|
|
|
logger.info("auth htpasswd encryption is 'radicale.auth.htpasswd_encryption.%s'", encryption)
|
2024-03-12 06:08:26 +01:00
|
|
|
|
2020-01-19 18:26:14 +01:00
|
|
|
if encryption == "plain":
|
2020-01-19 18:01:13 +01:00
|
|
|
self._verify = self._plain
|
|
|
|
elif encryption == "md5":
|
2020-01-19 18:26:14 +01:00
|
|
|
self._verify = self._md5apr1
|
2024-03-12 07:38:40 +01:00
|
|
|
elif encryption == "sha256":
|
|
|
|
self._verify = self._sha256
|
|
|
|
elif encryption == "sha512":
|
|
|
|
self._verify = self._sha512
|
2024-03-12 06:08:26 +01:00
|
|
|
elif encryption == "bcrypt" or encryption == "autodetect":
|
2016-04-22 11:37:02 +09:00
|
|
|
try:
|
2024-03-06 22:42:37 +01:00
|
|
|
import bcrypt
|
2017-05-31 11:08:32 +02:00
|
|
|
except ImportError as e:
|
2016-04-22 11:37:02 +09:00
|
|
|
raise RuntimeError(
|
2024-03-18 06:50:30 +01:00
|
|
|
"The htpasswd encryption method 'bcrypt' or 'autodetect' requires "
|
2024-03-06 22:42:37 +01:00
|
|
|
"the bcrypt module.") from e
|
2024-03-12 06:08:26 +01:00
|
|
|
if encryption == "bcrypt":
|
|
|
|
self._verify = functools.partial(self._bcrypt, bcrypt)
|
|
|
|
else:
|
|
|
|
self._verify = self._autodetect
|
|
|
|
self._verify_bcrypt = functools.partial(self._bcrypt, bcrypt)
|
2016-04-22 11:37:02 +09:00
|
|
|
else:
|
2020-01-19 18:01:13 +01:00
|
|
|
raise RuntimeError("The htpasswd encryption method %r is not "
|
|
|
|
"supported." % encryption)
|
2016-04-22 11:37:02 +09:00
|
|
|
|
2021-07-26 20:56:46 +02:00
|
|
|
def _plain(self, hash_value: str, password: str) -> bool:
|
2016-05-18 22:41:05 +02:00
|
|
|
"""Check if ``hash_value`` and ``password`` match, plain method."""
|
2024-12-30 08:17:44 +01:00
|
|
|
return ("PLAIN", hmac.compare_digest(hash_value.encode(), password.encode()))
|
2016-04-22 11:37:02 +09:00
|
|
|
|
2021-07-26 20:56:46 +02:00
|
|
|
def _bcrypt(self, bcrypt: Any, hash_value: str, password: str) -> bool:
|
2024-12-30 08:17:44 +01:00
|
|
|
return ("BCRYPT", bcrypt.checkpw(password=password.encode('utf-8'), hashed_password=hash_value.encode()))
|
2016-04-22 11:37:02 +09:00
|
|
|
|
2021-07-26 20:56:46 +02:00
|
|
|
def _md5apr1(self, hash_value: str, password: str) -> bool:
|
2024-12-30 08:17:44 +01:00
|
|
|
return ("MD5-APR1", apr_md5_crypt.verify(password, hash_value.strip()))
|
2016-04-22 11:37:02 +09:00
|
|
|
|
2024-03-12 06:08:26 +01:00
|
|
|
def _sha256(self, hash_value: str, password: str) -> bool:
|
2024-12-30 08:17:44 +01:00
|
|
|
return ("SHA-256", sha256_crypt.verify(password, hash_value.strip()))
|
2024-03-12 06:08:26 +01:00
|
|
|
|
|
|
|
def _sha512(self, hash_value: str, password: str) -> bool:
|
2024-12-30 08:17:44 +01:00
|
|
|
return ("SHA-512", sha512_crypt.verify(password, hash_value.strip()))
|
2024-03-12 06:08:26 +01:00
|
|
|
|
|
|
|
def _autodetect(self, hash_value: str, password: str) -> bool:
|
|
|
|
if hash_value.startswith("$apr1$", 0, 6) and len(hash_value) == 37:
|
|
|
|
# MD5-APR1
|
|
|
|
return self._md5apr1(hash_value, password)
|
|
|
|
elif hash_value.startswith("$2y$", 0, 4) and len(hash_value) == 60:
|
|
|
|
# BCRYPT
|
|
|
|
return self._verify_bcrypt(hash_value, password)
|
|
|
|
elif hash_value.startswith("$5$", 0, 3) and len(hash_value) == 63:
|
|
|
|
# SHA-256
|
|
|
|
return self._sha256(hash_value, password)
|
|
|
|
elif hash_value.startswith("$6$", 0, 3) and len(hash_value) == 106:
|
|
|
|
# SHA-512
|
|
|
|
return self._sha512(hash_value, password)
|
|
|
|
else:
|
|
|
|
# assumed plaintext
|
|
|
|
return self._plain(hash_value, password)
|
|
|
|
|
2024-04-17 18:31:51 +03:00
|
|
|
def _login(self, login: str, password: str) -> str:
|
2017-09-17 14:03:46 +02:00
|
|
|
"""Validate credentials.
|
|
|
|
|
2018-08-16 07:59:58 +02:00
|
|
|
Iterate through htpasswd credential file until login matches, extract
|
|
|
|
hash (encrypted password) and check hash against password,
|
2017-09-17 14:03:46 +02:00
|
|
|
using the method specified in the Radicale config.
|
|
|
|
|
|
|
|
The content of the file is not cached because reading is generally a
|
|
|
|
very cheap operation, and it's useful to get live updates of the
|
|
|
|
htpasswd file.
|
|
|
|
|
|
|
|
"""
|
2017-05-31 11:08:32 +02:00
|
|
|
try:
|
2020-01-19 18:29:29 +01:00
|
|
|
with open(self._filename, encoding=self._encoding) as f:
|
2017-08-17 06:46:38 +02:00
|
|
|
for line in f:
|
|
|
|
line = line.rstrip("\n")
|
2017-08-17 06:46:40 +02:00
|
|
|
if line.lstrip() and not line.lstrip().startswith("#"):
|
2017-05-31 11:08:32 +02:00
|
|
|
try:
|
2018-08-16 07:59:58 +02:00
|
|
|
hash_login, hash_value = line.split(
|
|
|
|
":", maxsplit=1)
|
2017-05-31 11:08:32 +02:00
|
|
|
# Always compare both login and password to avoid
|
|
|
|
# timing attacks, see #591.
|
2020-01-19 18:29:29 +01:00
|
|
|
login_ok = hmac.compare_digest(
|
|
|
|
hash_login.encode(), login.encode())
|
2024-12-30 08:17:44 +01:00
|
|
|
(method, password_ok) = self._verify(hash_value, password)
|
2017-09-17 14:03:48 +02:00
|
|
|
if login_ok and password_ok:
|
2024-12-30 08:17:44 +01:00
|
|
|
logger.debug("Password verification for user '%s' with method '%s': password_ok=%s", login, method, password_ok)
|
2018-08-16 07:59:58 +02:00
|
|
|
return login
|
2017-05-31 11:08:32 +02:00
|
|
|
except ValueError as e:
|
|
|
|
raise RuntimeError("Invalid htpasswd file %r: %s" %
|
2020-01-19 18:01:13 +01:00
|
|
|
(self._filename, e)) from e
|
2017-05-31 11:08:32 +02:00
|
|
|
except OSError as e:
|
|
|
|
raise RuntimeError("Failed to load htpasswd file %r: %s" %
|
2020-01-19 18:01:13 +01:00
|
|
|
(self._filename, e)) from e
|
2018-08-16 07:59:58 +02:00
|
|
|
return ""
|