]> git.netwichtig.de Git - user/henk/code/inspircd.git/blobdiff - src/modules/m_sqlauth.cpp
Fix the cloaking module on C++98 compilers.
[user/henk/code/inspircd.git] / src / modules / m_sqlauth.cpp
index 29554b03176533756c3a062c041c7b6379a1700e..0ae51a86eaa339d0bcb79e0bd5b5b3ce3a9e2243 100644 (file)
@@ -1,21 +1,33 @@
-/*       +------------------------------------+
- *       | Inspire Internet Relay Chat Daemon |
- *       +------------------------------------+
+/*
+ * InspIRCd -- Internet Relay Chat Daemon
  *
- *  InspIRCd: (C) 2002-2010 InspIRCd Development Team
- * See: http://wiki.inspircd.org/Credits
+ *   Copyright (C) 2015 Daniel Vassdal <shutter@canternet.org>
+ *   Copyright (C) 2013, 2017-2019 Sadie Powell <sadie@witchery.services>
+ *   Copyright (C) 2012-2015 Attila Molnar <attilamolnar@hush.com>
+ *   Copyright (C) 2012, 2019 Robby <robby@chatbelgie.be>
+ *   Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
+ *   Copyright (C) 2007-2008 Robin Burchell <robin+git@viroteck.net>
+ *   Copyright (C) 2007 Dennis Friis <peavey@inspircd.org>
+ *   Copyright (C) 2005, 2007-2008, 2010 Craig Edwards <brain@inspircd.org>
  *
- * This program is free but copyrighted software; see
- *            the file COPYING for details.
+ * This file is part of InspIRCd.  InspIRCd is free software: you can
+ * redistribute it and/or modify it under the terms of the GNU General Public
+ * License as published by the Free Software Foundation, version 2.
  *
- * ---------------------------------------------------
+ * This program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+ * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
+ * details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
  */
 
-#include "inspircd.h"
-#include "sql.h"
-#include "hash.h"
 
-/* $ModDesc: Allow/Deny connections based upon an arbitary SQL table */
+#include "inspircd.h"
+#include "modules/sql.h"
+#include "modules/hash.h"
+#include "modules/ssl.h"
 
 enum AuthState {
        AUTH_STATE_NONE = 0,
@@ -23,81 +35,135 @@ enum AuthState {
        AUTH_STATE_FAIL = 2
 };
 
-class AuthQuery : public SQLQuery
+class AuthQuery : public SQL::Query
 {
  public:
        const std::string uid;
        LocalIntExt& pendingExt;
        bool verbose;
-       AuthQuery(Module* me, const std::string& u, LocalIntExt& e, bool v)
-               : SQLQuery(me), uid(u), pendingExt(e), verbose(v)
+       const std::string& kdf;
+       const std::string& pwcolumn;
+
+       AuthQuery(Module* me, const std::string& u, LocalIntExt& e, bool v, const std::string& kd, const std::string& pwcol)
+               : SQL::Query(me)
+               , uid(u)
+               , pendingExt(e)
+               , verbose(v)
+               , kdf(kd)
+               , pwcolumn(pwcol)
        {
        }
-       
-       void OnResult(SQLResult& res)
+
+       void OnResult(SQL::Result& res) CXX11_OVERRIDE
        {
-               User* user = ServerInstance->FindNick(uid);
+               LocalUser* user = IS_LOCAL(ServerInstance->FindUUID(uid));
                if (!user)
                        return;
+
                if (res.Rows())
                {
+                       if (!kdf.empty())
+                       {
+                               HashProvider* hashprov = ServerInstance->Modules->FindDataService<HashProvider>("hash/" + kdf);
+                               if (!hashprov)
+                               {
+                                       if (verbose)
+                                               ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s (a provider for %s was not loaded)", user->GetFullRealHost().c_str(), kdf.c_str());
+                                       pendingExt.set(user, AUTH_STATE_FAIL);
+                                       return;
+                               }
+
+                               size_t colindex = 0;
+                               if (!pwcolumn.empty() && !res.HasColumn(pwcolumn, colindex))
+                               {
+                                       if (verbose)
+                                               ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s (the column specified (%s) was not returned)", user->GetFullRealHost().c_str(), pwcolumn.c_str());
+                                       pendingExt.set(user, AUTH_STATE_FAIL);
+                                       return;
+                               }
+
+                               SQL::Row row;
+                               while (res.GetRow(row))
+                               {
+                                       if (hashprov->Compare(user->password, row[colindex]))
+                                       {
+                                               pendingExt.set(user, AUTH_STATE_NONE);
+                                               return;
+                                       }
+                               }
+
+                               if (verbose)
+                                       ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s (password from the SQL query did not match the user provided password)", user->GetFullRealHost().c_str());
+                               pendingExt.set(user, AUTH_STATE_FAIL);
+                               return;
+                       }
+
                        pendingExt.set(user, AUTH_STATE_NONE);
                }
                else
                {
                        if (verbose)
-                               ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s!%s@%s (SQL query returned no matches)", user->nick.c_str(), user->ident.c_str(), user->host.c_str());
+                               ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s (SQL query returned no matches)", user->GetFullRealHost().c_str());
                        pendingExt.set(user, AUTH_STATE_FAIL);
                }
        }
 
-       void OnError(SQLerror& error)
+       void OnError(SQL::Error& error) CXX11_OVERRIDE
        {
                User* user = ServerInstance->FindNick(uid);
                if (!user)
                        return;
                pendingExt.set(user, AUTH_STATE_FAIL);
                if (verbose)
-                       ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s!%s@%s (SQL query failed: %s)", user->nick.c_str(), user->ident.c_str(), user->host.c_str(), error.Str());
+                       ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s (SQL query failed: %s)", user->GetFullRealHost().c_str(), error.ToString());
        }
 };
 
 class ModuleSQLAuth : public Module
 {
        LocalIntExt pendingExt;
-       dynamic_reference<SQLProvider> SQL;
+       dynamic_reference<SQL::Provider> SQL;
+       UserCertificateAPI sslapi;
 
        std::string freeformquery;
        std::string killreason;
        std::string allowpattern;
        bool verbose;
+       std::vector<std::string> hash_algos;
+       std::string kdf;
+       std::string pwcolumn;
 
  public:
-       ModuleSQLAuth() : pendingExt("sqlauth-wait", this), SQL(this, "SQL")
-       {
-       }
-
-       void init()
+       ModuleSQLAuth()
+               : pendingExt("sqlauth-wait", ExtensionItem::EXT_USER, this)
+               , SQL(this, "SQL")
+               , sslapi(this)
        {
-               ServerInstance->Modules->AddService(pendingExt);
-               OnRehash(NULL);
-               Implementation eventlist[] = { I_OnUserDisconnect, I_OnCheckReady, I_OnRehash, I_OnUserRegister };
-               ServerInstance->Modules->Attach(eventlist, this, 4);
        }
 
-       void OnRehash(User* user)
+       void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE
        {
-               ConfigReader Conf;
-
-               SQL.SetProvider("SQL/" + Conf.ReadValue("sqlauth", "dbid", 0));         /* Database ID, given to the SQL service provider */
-               freeformquery   = Conf.ReadValue("sqlauth", "query", 0);        /* Field name where username can be found */
-               killreason      = Conf.ReadValue("sqlauth", "killreason", 0);   /* Reason to give when access is denied to a user (put your reg details here) */
-               allowpattern    = Conf.ReadValue("sqlauth", "allowpattern",0 ); /* Allow nicks matching this pattern without requiring auth */
-               verbose         = Conf.ReadFlag("sqlauth", "verbose", 0);               /* Set to true if failed connects should be reported to operators */
-               SQL.lookup();
+               ConfigTag* conf = ServerInstance->Config->ConfValue("sqlauth");
+               std::string dbid = conf->getString("dbid");
+               if (dbid.empty())
+                       SQL.SetProvider("SQL");
+               else
+                       SQL.SetProvider("SQL/" + dbid);
+               freeformquery = conf->getString("query");
+               killreason = conf->getString("killreason");
+               allowpattern = conf->getString("allowpattern");
+               verbose = conf->getBool("verbose");
+               kdf = conf->getString("kdf");
+               pwcolumn = conf->getString("column");
+
+               hash_algos.clear();
+               irc::commasepstream algos(conf->getString("hash", "md5,sha256"));
+               std::string algo;
+               while (algos.GetToken(algo))
+                       hash_algos.push_back(algo);
        }
 
-       ModResult OnUserRegister(LocalUser* user)
+       ModResult OnUserRegister(LocalUser* user) CXX11_OVERRIDE
        {
                // Note this is their initial (unresolved) connect block
                ConfigTag* tag = user->MyClass->config;
@@ -110,26 +176,33 @@ class ModuleSQLAuth : public Module
                if (pendingExt.get(user))
                        return MOD_RES_PASSTHRU;
 
+               if (!SQL)
+               {
+                       ServerInstance->SNO->WriteGlobalSno('a', "Forbidden connection from %s (SQL database not present)", user->GetFullRealHost().c_str());
+                       ServerInstance->Users->QuitUser(user, killreason);
+                       return MOD_RES_PASSTHRU;
+               }
+
                pendingExt.set(user, AUTH_STATE_BUSY);
 
-               ParamM userinfo;
-               SQL->PopulateUserInfo(user, userinfo);
+               SQL::ParamMap userinfo;
+               SQL::PopulateUserInfo(user, userinfo);
                userinfo["pass"] = user->password;
+               userinfo["certfp"] = sslapi ? sslapi->GetFingerprint(user) : "";
 
-               HashProvider* md5 = ServerInstance->Modules->FindDataService<HashProvider>("hash/md5");
-               if (md5)
-                       userinfo["md5pass"] = md5->hexsum(user->password);
-
-               HashProvider* sha256 = ServerInstance->Modules->FindDataService<HashProvider>("hash/sha256");
-               if (sha256)
-                       userinfo["sha256pass"] = sha256->hexsum(user->password);
+               for (std::vector<std::string>::const_iterator it = hash_algos.begin(); it != hash_algos.end(); ++it)
+               {
+                       HashProvider* hashprov = ServerInstance->Modules->FindDataService<HashProvider>("hash/" + *it);
+                       if (hashprov && !hashprov->IsKDF())
+                               userinfo[*it + "pass"] = hashprov->Generate(user->password);
+               }
 
-               SQL->submit(new AuthQuery(this, user->uuid, pendingExt, verbose), freeformquery, userinfo);
+               SQL->Submit(new AuthQuery(this, user->uuid, pendingExt, verbose, kdf, pwcolumn), freeformquery, userinfo);
 
                return MOD_RES_PASSTHRU;
        }
 
-       ModResult OnCheckReady(LocalUser* user)
+       ModResult OnCheckReady(LocalUser* user) CXX11_OVERRIDE
        {
                switch (pendingExt.get(user))
                {
@@ -144,9 +217,9 @@ class ModuleSQLAuth : public Module
                return MOD_RES_PASSTHRU;
        }
 
-       Version GetVersion()
+       Version GetVersion() CXX11_OVERRIDE
        {
-               return Version("Allow/Deny connections based upon an arbitary SQL table", VF_VENDOR);
+               return Version("Allows connecting users to be authenticated against an arbitrary SQL table.", VF_VENDOR);
        }
 };