1
0
Fork 0
mirror of https://github.com/Kozea/Radicale.git synced 2025-06-26 16:45:52 +00:00
Radicale/radicale/auth/__init__.py

231 lines
11 KiB
Python
Raw Normal View History

2021-12-08 21:45:42 +01:00
# This file is part of Radicale - CalDAV and CardDAV server
2018-08-28 16:19:36 +02:00
# Copyright © 2008 Nicolas Kandel
# Copyright © 2008 Pascal Halter
# Copyright © 2008-2017 Guillaume Ayoub
2024-06-07 06:46:16 +02:00
# Copyright © 2017-2022 Unrud <unrud@outlook.com>
# Copyright © 2024-2024 Peter Bieringer <pb@bieringer.de>
2018-08-28 16:19:36 +02:00
#
# This library is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Radicale. If not, see <http://www.gnu.org/licenses/>.
"""
2020-01-12 23:32:28 +01:00
Authentication module.
2018-08-28 16:19:36 +02:00
2020-01-12 23:32:28 +01:00
Authentication is based on usernames and passwords. If something more
advanced is needed an external WSGI server or reverse proxy can be used
(see ``remote_user`` or ``http_x_remote_user`` backend).
2018-08-28 16:19:36 +02:00
2020-01-12 23:32:28 +01:00
Take a look at the class ``BaseAuth`` if you want to implement your own.
2018-08-28 16:19:36 +02:00
"""
2024-12-30 08:17:15 +01:00
import hashlib
import time
2024-12-31 16:13:52 +01:00
import threading
from typing import Sequence, Set, Tuple, Union, final
2018-08-28 16:19:36 +02:00
2021-07-26 20:56:46 +02:00
from radicale import config, types, utils
from radicale.log import logger
2018-08-28 16:19:36 +02:00
2021-07-26 20:56:46 +02:00
INTERNAL_TYPES: Sequence[str] = ("none", "remote_user", "http_x_remote_user",
2024-06-07 06:45:39 +02:00
"denyall",
2024-08-25 14:11:48 +02:00
"htpasswd",
"ldap",
"dovecot")
2018-08-28 16:19:36 +02:00
2021-07-26 20:56:46 +02:00
def load(configuration: "config.Configuration") -> "BaseAuth":
2020-01-14 22:43:48 +01:00
"""Load the authentication module chosen in configuration."""
if configuration.get("auth", "type") == "none":
logger.warning("No user authentication is selected: '[auth] type=none' (insecure)")
if configuration.get("auth", "type") == "denyall":
logger.warning("All access is blocked by: '[auth] type=denyall'")
2021-07-26 20:56:46 +02:00
return utils.load_plugin(INTERNAL_TYPES, "auth", "Auth", BaseAuth,
configuration)
2018-08-28 16:19:36 +02:00
2024-12-25 22:28:01 +03:00
2018-08-28 16:19:36 +02:00
class BaseAuth:
2021-07-26 20:56:46 +02:00
2024-09-11 14:13:06 +02:00
_ldap_groups: Set[str] = set([])
_lc_username: bool
_uc_username: bool
2024-07-18 06:50:29 +02:00
_strip_domain: bool
_type: str
2024-12-30 08:17:15 +01:00
_cache_logins: bool
2024-12-31 07:57:54 +01:00
_cache_successful: dict # login -> (digest, time_ns)
_cache_successful_logins_expiry: int
2024-12-31 16:13:52 +01:00
_cache_failed: dict # digest_failed -> (time_ns, login)
2024-12-31 07:57:54 +01:00
_cache_failed_logins_expiry: int
_cache_failed_logins_salt_ns: int # persistent over runtime
2024-12-31 16:13:52 +01:00
_lock: threading.Lock
2021-07-26 20:56:46 +02:00
def __init__(self, configuration: "config.Configuration") -> None:
2020-01-13 15:51:10 +01:00
"""Initialize BaseAuth.
``configuration`` see ``radicale.config`` module.
The ``configuration`` must not change during the lifetime of
this object, it is kept as an internal reference.
"""
2018-08-28 16:19:36 +02:00
self.configuration = configuration
self._lc_username = configuration.get("auth", "lc_username")
self._uc_username = configuration.get("auth", "uc_username")
2024-07-18 06:50:29 +02:00
self._strip_domain = configuration.get("auth", "strip_domain")
logger.info("auth.strip_domain: %s", self._strip_domain)
logger.info("auth.lc_username: %s", self._lc_username)
logger.info("auth.uc_username: %s", self._uc_username)
if self._lc_username is True and self._uc_username is True:
raise RuntimeError("auth.lc_username and auth.uc_username cannot be enabled together")
2024-12-31 07:57:54 +01:00
# cache_successful_logins
self._cache_logins = configuration.get("auth", "cache_logins")
self._type = configuration.get("auth", "type")
if (self._type in [ "dovecot", "ldap", "htpasswd" ]) or (self._cache_logins is False):
logger.info("auth.cache_logins: %s", self._cache_logins)
else:
logger.info("auth.cache_logins: %s (but not required for type '%s' and disabled therefore)", self._cache_logins, self._type)
self._cache_logins = False
2024-12-30 08:17:15 +01:00
if self._cache_logins is True:
self._cache_successful_logins_expiry = configuration.get("auth", "cache_successful_logins_expiry")
if self._cache_successful_logins_expiry < 0:
raise RuntimeError("self._cache_successful_logins_expiry cannot be < 0")
self._cache_failed_logins_expiry = configuration.get("auth", "cache_failed_logins_expiry")
if self._cache_failed_logins_expiry < 0:
raise RuntimeError("self._cache_failed_logins_expiry cannot be < 0")
2024-12-31 07:57:54 +01:00
logger.info("auth.cache_successful_logins_expiry: %s seconds", self._cache_successful_logins_expiry)
logger.info("auth.cache_failed_logins_expiry: %s seconds", self._cache_failed_logins_expiry)
# cache init
self._cache_successful = dict()
self._cache_failed = dict()
self._cache_failed_logins_salt_ns = time.time_ns()
2024-12-31 16:13:52 +01:00
self._lock = threading.Lock()
2024-12-30 08:17:15 +01:00
def _cache_digest(self, login: str, password: str, salt: str) -> str:
h = hashlib.sha3_512()
h.update(salt.encode())
h.update(login.encode())
h.update(password.encode())
2024-12-30 05:25:10 +01:00
return str(h.digest())
2018-08-28 16:19:36 +02:00
2021-07-26 20:56:46 +02:00
def get_external_login(self, environ: types.WSGIEnviron) -> Union[
Tuple[()], Tuple[str, str]]:
2018-08-28 16:19:36 +02:00
"""Optionally provide the login and password externally.
``environ`` a dict with the WSGI environment
If ``()`` is returned, Radicale handles HTTP authentication.
Otherwise, returns a tuple ``(login, password)``. For anonymous users
``login`` must be ``""``.
"""
return ()
def _login(self, login: str, password: str) -> str:
2018-08-28 16:19:36 +02:00
"""Check credentials and map login to internal user
``login`` the login name
``password`` the password
2022-01-07 23:54:34 +01:00
Returns the username or ``""`` for invalid credentials.
2018-08-28 16:19:36 +02:00
"""
raise NotImplementedError
@final
def login(self, login: str, password: str) -> str:
2024-07-18 06:50:29 +02:00
if self._lc_username:
login = login.lower()
if self._uc_username:
login = login.upper()
2024-07-18 06:50:29 +02:00
if self._strip_domain:
login = login.split('@')[0]
2024-12-30 08:17:15 +01:00
if self._cache_logins is True:
# time_ns is also used as salt
result = ""
digest = ""
time_ns = time.time_ns()
2024-12-31 16:13:52 +01:00
# cleanup failed login cache to avoid out-of-memory
cache_failed_entries = len(self._cache_failed)
if cache_failed_entries > 0:
logger.debug("Login failed cache investigation start (entries: %d)", cache_failed_entries)
self._lock.acquire()
cache_failed_cleanup = dict()
for digest in self._cache_failed:
(time_ns_cache, login_cache) = self._cache_failed[digest]
age_failed = int((time_ns - time_ns_cache) / 1000 / 1000 / 1000)
if age_failed > self._cache_failed_logins_expiry:
cache_failed_cleanup[digest] = (login_cache, age_failed)
cache_failed_cleanup_entries = len(cache_failed_cleanup)
logger.debug("Login failed cache cleanup start (entries: %d)", cache_failed_cleanup_entries)
if cache_failed_cleanup_entries > 0:
for digest in cache_failed_cleanup:
(login, age_failed) = cache_failed_cleanup[digest]
logger.debug("Login failed cache entry for user+password expired: '%s' (age: %d > %d sec)", login_cache, age_failed, self._cache_failed_logins_expiry)
del self._cache_failed[digest]
self._lock.release()
logger.debug("Login failed cache investigation finished")
# check for cache failed login
2024-12-31 07:57:54 +01:00
digest_failed = login + ":" + self._cache_digest(login, password, str(self._cache_failed_logins_salt_ns))
if self._cache_failed.get(digest_failed):
2024-12-31 16:13:52 +01:00
# login+password found in cache "failed" -> shortcut return
(time_ns_cache, login_cache) = self._cache_failed[digest]
2024-12-31 07:57:54 +01:00
age_failed = int((time_ns - time_ns_cache) / 1000 / 1000 / 1000)
2024-12-31 16:13:52 +01:00
logger.debug("Login failed cache entry for user+password found: '%s' (age: %d sec)", login_cache, age_failed)
return ""
2024-12-31 07:57:54 +01:00
if self._cache_successful.get(login):
# login found in cache "successful"
(digest_cache, time_ns_cache) = self._cache_successful[login]
2024-12-30 08:17:15 +01:00
digest = self._cache_digest(login, password, str(time_ns_cache))
if digest == digest_cache:
2024-12-31 07:57:54 +01:00
age_success = int((time_ns - time_ns_cache) / 1000 / 1000 / 1000)
if age_success > self._cache_successful_logins_expiry:
logger.debug("Login successful cache entry for user+password found but expired: '%s' (age: %d > %d sec)", login, age_success, self._cache_successful_logins_expiry)
# delete expired success from cache
del self._cache_successful[login]
2024-12-30 08:17:15 +01:00
digest = ""
else:
2024-12-31 07:57:54 +01:00
logger.debug("Login successful cache entry for user+password found: '%s' (age: %d sec)", login, age_success)
2024-12-30 08:17:15 +01:00
result = login
else:
2024-12-31 07:57:54 +01:00
logger.debug("Login successful cache entry for user+password not matching: '%s'", login)
2024-12-30 08:17:15 +01:00
else:
2024-12-31 07:57:54 +01:00
# login not found in cache, caculate always to avoid timing attacks
2024-12-30 08:17:15 +01:00
digest = self._cache_digest(login, password, str(time_ns))
if result == "":
2024-12-31 07:57:54 +01:00
# verify login+password via configured backend
logger.debug("Login verification for user+password via backend: '%s'", login)
2024-12-30 08:17:15 +01:00
result = self._login(login, password)
2024-12-30 05:25:10 +01:00
if result != "":
2024-12-31 07:57:54 +01:00
logger.debug("Login successful for user+password via backend: '%s'", login)
2024-12-30 05:25:10 +01:00
if digest == "":
2024-12-30 08:17:15 +01:00
# successful login, but expired, digest must be recalculated
digest = self._cache_digest(login, password, str(time_ns))
# store successful login in cache
2024-12-31 16:13:52 +01:00
self._lock.acquire()
2024-12-31 07:57:54 +01:00
self._cache_successful[login] = (digest, time_ns)
2024-12-31 16:13:52 +01:00
self._lock.release()
2024-12-31 07:57:54 +01:00
logger.debug("Login successful cache for user set: '%s'", login)
if self._cache_failed.get(digest_failed):
logger.debug("Login failed cache for user cleared: '%s'", login)
del self._cache_failed[digest_failed]
else:
logger.debug("Login failed for user+password via backend: '%s'", login)
2024-12-31 16:13:52 +01:00
self._lock.acquire()
self._cache_failed[digest_failed] = (time_ns, login)
self._lock.release()
2024-12-31 07:57:54 +01:00
logger.debug("Login failed cache for user set: '%s'", login)
2024-12-30 08:17:15 +01:00
return result
else:
return self._login(login, password)