torrentpier-lts/library/Zend/Authentication/Adapter/Http.php

821 lines
26 KiB
PHP

<?php
/**
* Zend Framework (http://framework.zend.com/)
*
* @link http://github.com/zendframework/zf2 for the canonical source repository
* @copyright Copyright (c) 2005-2015 Zend Technologies USA Inc. (http://www.zend.com)
* @license http://framework.zend.com/license/new-bsd New BSD License
*/
namespace Zend\Authentication\Adapter;
use Zend\Authentication;
use Zend\Http\Request as HTTPRequest;
use Zend\Http\Response as HTTPResponse;
use Zend\Uri\UriFactory;
use Zend\Crypt\Utils as CryptUtils;
/**
* HTTP Authentication Adapter
*
* Implements a pretty good chunk of RFC 2617.
*
* @todo Support auth-int
* @todo Track nonces, nonce-count, opaque for replay protection and stale support
* @todo Support Authentication-Info header
*/
class Http implements AdapterInterface
{
/**
* Reference to the HTTP Request object
*
* @var HTTPRequest
*/
protected $request;
/**
* Reference to the HTTP Response object
*
* @var HTTPResponse
*/
protected $response;
/**
* Object that looks up user credentials for the Basic scheme
*
* @var Http\ResolverInterface
*/
protected $basicResolver;
/**
* Object that looks up user credentials for the Digest scheme
*
* @var Http\ResolverInterface
*/
protected $digestResolver;
/**
* List of authentication schemes supported by this class
*
* @var array
*/
protected $supportedSchemes = array('basic', 'digest');
/**
* List of schemes this class will accept from the client
*
* @var array
*/
protected $acceptSchemes;
/**
* Space-delimited list of protected domains for Digest Auth
*
* @var string
*/
protected $domains;
/**
* The protection realm to use
*
* @var string
*/
protected $realm;
/**
* Nonce timeout period
*
* @var int
*/
protected $nonceTimeout;
/**
* Whether to send the opaque value in the header. True by default
*
* @var bool
*/
protected $useOpaque;
/**
* List of the supported digest algorithms. I want to support both MD5 and
* MD5-sess, but MD5-sess won't make it into the first version.
*
* @var array
*/
protected $supportedAlgos = array('MD5');
/**
* The actual algorithm to use. Defaults to MD5
*
* @var string
*/
protected $algo;
/**
* List of supported qop options. My intention is to support both 'auth' and
* 'auth-int', but 'auth-int' won't make it into the first version.
*
* @var array
*/
protected $supportedQops = array('auth');
/**
* Whether or not to do Proxy Authentication instead of origin server
* authentication (send 407's instead of 401's). Off by default.
*
* @var bool
*/
protected $imaProxy = false;
/**
* Flag indicating the client is IE and didn't bother to return the opaque string
*
* @var bool
*/
protected $ieNoOpaque = false;
/**
* Constructor
*
* @param array $config Configuration settings:
* 'accept_schemes' => 'basic'|'digest'|'basic digest'
* 'realm' => <string>
* 'digest_domains' => <string> Space-delimited list of URIs
* 'nonce_timeout' => <int>
* 'use_opaque' => <bool> Whether to send the opaque value in the header
* 'algorithm' => <string> See $supportedAlgos. Default: MD5
* 'proxy_auth' => <bool> Whether to do authentication as a Proxy
* @throws Exception\InvalidArgumentException
*/
public function __construct(array $config)
{
if (empty($config['accept_schemes'])) {
throw new Exception\InvalidArgumentException('Config key "accept_schemes" is required');
}
$schemes = explode(' ', $config['accept_schemes']);
$this->acceptSchemes = array_intersect($schemes, $this->supportedSchemes);
if (empty($this->acceptSchemes)) {
throw new Exception\InvalidArgumentException(sprintf(
'No supported schemes given in "accept_schemes". Valid values: %s',
implode(', ', $this->supportedSchemes)
));
}
// Double-quotes are used to delimit the realm string in the HTTP header,
// and colons are field delimiters in the password file.
if (empty($config['realm']) ||
!ctype_print($config['realm']) ||
strpos($config['realm'], ':') !== false ||
strpos($config['realm'], '"') !== false) {
throw new Exception\InvalidArgumentException(
'Config key \'realm\' is required, and must contain only printable characters,'
. 'excluding quotation marks and colons'
);
} else {
$this->realm = $config['realm'];
}
if (in_array('digest', $this->acceptSchemes)) {
$this->useOpaque = true;
$this->algo = 'MD5';
if (empty($config['digest_domains']) ||
!ctype_print($config['digest_domains']) ||
strpos($config['digest_domains'], '"') !== false) {
throw new Exception\InvalidArgumentException(
'Config key \'digest_domains\' is required, and must contain '
. 'only printable characters, excluding quotation marks'
);
} else {
$this->domains = $config['digest_domains'];
}
if (empty($config['nonce_timeout']) ||
!is_numeric($config['nonce_timeout'])) {
throw new Exception\InvalidArgumentException(
'Config key \'nonce_timeout\' is required, and must be an integer'
);
} else {
$this->nonceTimeout = (int) $config['nonce_timeout'];
}
// We use the opaque value unless explicitly told not to
if (isset($config['use_opaque']) && false == (bool) $config['use_opaque']) {
$this->useOpaque = false;
}
if (isset($config['algorithm']) && in_array($config['algorithm'], $this->supportedAlgos)) {
$this->algo = (string) $config['algorithm'];
}
}
// Don't be a proxy unless explicitly told to do so
if (isset($config['proxy_auth']) && true == (bool) $config['proxy_auth']) {
$this->imaProxy = true; // I'm a Proxy
}
}
/**
* Setter for the basicResolver property
*
* @param Http\ResolverInterface $resolver
* @return Http Provides a fluent interface
*/
public function setBasicResolver(Http\ResolverInterface $resolver)
{
$this->basicResolver = $resolver;
return $this;
}
/**
* Getter for the basicResolver property
*
* @return Http\ResolverInterface
*/
public function getBasicResolver()
{
return $this->basicResolver;
}
/**
* Setter for the digestResolver property
*
* @param Http\ResolverInterface $resolver
* @return Http Provides a fluent interface
*/
public function setDigestResolver(Http\ResolverInterface $resolver)
{
$this->digestResolver = $resolver;
return $this;
}
/**
* Getter for the digestResolver property
*
* @return Http\ResolverInterface
*/
public function getDigestResolver()
{
return $this->digestResolver;
}
/**
* Setter for the Request object
*
* @param HTTPRequest $request
* @return Http Provides a fluent interface
*/
public function setRequest(HTTPRequest $request)
{
$this->request = $request;
return $this;
}
/**
* Getter for the Request object
*
* @return HTTPRequest
*/
public function getRequest()
{
return $this->request;
}
/**
* Setter for the Response object
*
* @param HTTPResponse $response
* @return Http Provides a fluent interface
*/
public function setResponse(HTTPResponse $response)
{
$this->response = $response;
return $this;
}
/**
* Getter for the Response object
*
* @return HTTPResponse
*/
public function getResponse()
{
return $this->response;
}
/**
* Authenticate
*
* @throws Exception\RuntimeException
* @return Authentication\Result
*/
public function authenticate()
{
if (empty($this->request) || empty($this->response)) {
throw new Exception\RuntimeException(
'Request and Response objects must be set before calling authenticate()'
);
}
if ($this->imaProxy) {
$getHeader = 'Proxy-Authorization';
} else {
$getHeader = 'Authorization';
}
$headers = $this->request->getHeaders();
if (!$headers->has($getHeader)) {
return $this->challengeClient();
}
$authHeader = $headers->get($getHeader)->getFieldValue();
if (!$authHeader) {
return $this->challengeClient();
}
list($clientScheme) = explode(' ', $authHeader);
$clientScheme = strtolower($clientScheme);
// The server can issue multiple challenges, but the client should
// answer with only the selected auth scheme.
if (!in_array($clientScheme, $this->supportedSchemes)) {
$this->response->setStatusCode(400);
return new Authentication\Result(
Authentication\Result::FAILURE_UNCATEGORIZED,
array(),
array('Client requested an incorrect or unsupported authentication scheme')
);
}
// client sent a scheme that is not the one required
if (!in_array($clientScheme, $this->acceptSchemes)) {
// challenge again the client
return $this->challengeClient();
}
switch ($clientScheme) {
case 'basic':
$result = $this->_basicAuth($authHeader);
break;
case 'digest':
$result = $this->_digestAuth($authHeader);
break;
default:
throw new Exception\RuntimeException('Unsupported authentication scheme: ' . $clientScheme);
}
return $result;
}
/**
* @deprecated
* @see Http::challengeClient()
* @return Authentication\Result Always returns a non-identity Auth result
*/
protected function _challengeClient()
{
trigger_error(sprintf(
'The method "%s" is deprecated and will be removed in the future; '
. 'please use the public method "%s::challengeClient()" instead',
__METHOD__,
__CLASS__
), E_USER_DEPRECATED);
return $this->challengeClient();
}
/**
* Challenge Client
*
* Sets a 401 or 407 Unauthorized response code, and creates the
* appropriate Authenticate header(s) to prompt for credentials.
*
* @return Authentication\Result Always returns a non-identity Auth result
*/
public function challengeClient()
{
if ($this->imaProxy) {
$statusCode = 407;
$headerName = 'Proxy-Authenticate';
} else {
$statusCode = 401;
$headerName = 'WWW-Authenticate';
}
$this->response->setStatusCode($statusCode);
// Send a challenge in each acceptable authentication scheme
$headers = $this->response->getHeaders();
if (in_array('basic', $this->acceptSchemes)) {
$headers->addHeaderLine($headerName, $this->_basicHeader());
}
if (in_array('digest', $this->acceptSchemes)) {
$headers->addHeaderLine($headerName, $this->_digestHeader());
}
return new Authentication\Result(
Authentication\Result::FAILURE_CREDENTIAL_INVALID,
array(),
array('Invalid or absent credentials; challenging client')
);
}
/**
* Basic Header
*
* Generates a Proxy- or WWW-Authenticate header value in the Basic
* authentication scheme.
*
* @return string Authenticate header value
*/
protected function _basicHeader()
{
return 'Basic realm="' . $this->realm . '"';
}
/**
* Digest Header
*
* Generates a Proxy- or WWW-Authenticate header value in the Digest
* authentication scheme.
*
* @return string Authenticate header value
*/
protected function _digestHeader()
{
$wwwauth = 'Digest realm="' . $this->realm . '", '
. 'domain="' . $this->domains . '", '
. 'nonce="' . $this->_calcNonce() . '", '
. ($this->useOpaque ? 'opaque="' . $this->_calcOpaque() . '", ' : '')
. 'algorithm="' . $this->algo . '", '
. 'qop="' . implode(',', $this->supportedQops) . '"';
return $wwwauth;
}
/**
* Basic Authentication
*
* @param string $header Client's Authorization header
* @throws Exception\ExceptionInterface
* @return Authentication\Result
*/
protected function _basicAuth($header)
{
if (empty($header)) {
throw new Exception\RuntimeException('The value of the client Authorization header is required');
}
if (empty($this->basicResolver)) {
throw new Exception\RuntimeException(
'A basicResolver object must be set before doing Basic authentication'
);
}
// Decode the Authorization header
$auth = substr($header, strlen('Basic '));
$auth = base64_decode($auth);
if (!$auth) {
throw new Exception\RuntimeException('Unable to base64_decode Authorization header value');
}
// See ZF-1253. Validate the credentials the same way the digest
// implementation does. If invalid credentials are detected,
// re-challenge the client.
if (!ctype_print($auth)) {
return $this->challengeClient();
}
// Fix for ZF-1515: Now re-challenges on empty username or password
$creds = array_filter(explode(':', $auth));
if (count($creds) != 2) {
return $this->challengeClient();
}
$result = $this->basicResolver->resolve($creds[0], $this->realm, $creds[1]);
if ($result instanceof Authentication\Result && $result->isValid()) {
return $result;
}
if (!$result instanceof Authentication\Result
&& !is_array($result)
&& CryptUtils::compareStrings($result, $creds[1])
) {
$identity = array('username' => $creds[0], 'realm' => $this->realm);
return new Authentication\Result(Authentication\Result::SUCCESS, $identity);
} elseif (is_array($result)) {
return new Authentication\Result(Authentication\Result::SUCCESS, $result);
}
return $this->challengeClient();
}
/**
* Digest Authentication
*
* @param string $header Client's Authorization header
* @throws Exception\ExceptionInterface
* @return Authentication\Result Valid auth result only on successful auth
*/
protected function _digestAuth($header)
{
if (empty($header)) {
throw new Exception\RuntimeException('The value of the client Authorization header is required');
}
if (empty($this->digestResolver)) {
throw new Exception\RuntimeException('A digestResolver object must be set before doing Digest authentication');
}
$data = $this->_parseDigestAuth($header);
if ($data === false) {
$this->response->setStatusCode(400);
return new Authentication\Result(
Authentication\Result::FAILURE_UNCATEGORIZED,
array(),
array('Invalid Authorization header format')
);
}
// See ZF-1052. This code was a bit too unforgiving of invalid
// usernames. Now, if the username is bad, we re-challenge the client.
if ('::invalid::' == $data['username']) {
return $this->challengeClient();
}
// Verify that the client sent back the same nonce
if ($this->_calcNonce() != $data['nonce']) {
return $this->challengeClient();
}
// The opaque value is also required to match, but of course IE doesn't
// play ball.
if (!$this->ieNoOpaque && $this->_calcOpaque() != $data['opaque']) {
return $this->challengeClient();
}
// Look up the user's password hash. If not found, deny access.
// This makes no assumptions about how the password hash was
// constructed beyond that it must have been built in such a way as
// to be recreatable with the current settings of this object.
$ha1 = $this->digestResolver->resolve($data['username'], $data['realm']);
if ($ha1 === false) {
return $this->challengeClient();
}
// If MD5-sess is used, a1 value is made of the user's password
// hash with the server and client nonce appended, separated by
// colons.
if ($this->algo == 'MD5-sess') {
$ha1 = hash('md5', $ha1 . ':' . $data['nonce'] . ':' . $data['cnonce']);
}
// Calculate h(a2). The value of this hash depends on the qop
// option selected by the client and the supported hash functions
switch ($data['qop']) {
case 'auth':
$a2 = $this->request->getMethod() . ':' . $data['uri'];
break;
case 'auth-int':
// Should be REQUEST_METHOD . ':' . uri . ':' . hash(entity-body),
// but this isn't supported yet, so fall through to default case
default:
throw new Exception\RuntimeException('Client requested an unsupported qop option');
}
// Using hash() should make parameterizing the hash algorithm
// easier
$ha2 = hash('md5', $a2);
// Calculate the server's version of the request-digest. This must
// match $data['response']. See RFC 2617, section 3.2.2.1
$message = $data['nonce'] . ':' . $data['nc'] . ':' . $data['cnonce'] . ':' . $data['qop'] . ':' . $ha2;
$digest = hash('md5', $ha1 . ':' . $message);
// If our digest matches the client's let them in, otherwise return
// a 401 code and exit to prevent access to the protected resource.
if (CryptUtils::compareStrings($digest, $data['response'])) {
$identity = array('username' => $data['username'], 'realm' => $data['realm']);
return new Authentication\Result(Authentication\Result::SUCCESS, $identity);
}
return $this->challengeClient();
}
/**
* Calculate Nonce
*
* @return string The nonce value
*/
protected function _calcNonce()
{
// Once subtle consequence of this timeout calculation is that it
// actually divides all of time into nonceTimeout-sized sections, such
// that the value of timeout is the point in time of the next
// approaching "boundary" of a section. This allows the server to
// consistently generate the same timeout (and hence the same nonce
// value) across requests, but only as long as one of those
// "boundaries" is not crossed between requests. If that happens, the
// nonce will change on its own, and effectively log the user out. This
// would be surprising if the user just logged in.
$timeout = ceil(time() / $this->nonceTimeout) * $this->nonceTimeout;
$userAgentHeader = $this->request->getHeaders()->get('User-Agent');
if ($userAgentHeader) {
$userAgent = $userAgentHeader->getFieldValue();
} elseif (isset($_SERVER['HTTP_USER_AGENT'])) {
$userAgent = $_SERVER['HTTP_USER_AGENT'];
} else {
$userAgent = 'Zend_Authenticaion';
}
$nonce = hash('md5', $timeout . ':' . $userAgent . ':' . __CLASS__);
return $nonce;
}
/**
* Calculate Opaque
*
* The opaque string can be anything; the client must return it exactly as
* it was sent. It may be useful to store data in this string in some
* applications. Ideally, a new value for this would be generated each time
* a WWW-Authenticate header is sent (in order to reduce predictability),
* but we would have to be able to create the same exact value across at
* least two separate requests from the same client.
*
* @return string The opaque value
*/
protected function _calcOpaque()
{
return hash('md5', 'Opaque Data:' . __CLASS__);
}
/**
* Parse Digest Authorization header
*
* @param string $header Client's Authorization: HTTP header
* @return array|bool Data elements from header, or false if any part of
* the header is invalid
*/
protected function _parseDigestAuth($header)
{
$temp = null;
$data = array();
// See ZF-1052. Detect invalid usernames instead of just returning a
// 400 code.
$ret = preg_match('/username="([^"]+)"/', $header, $temp);
if (!$ret || empty($temp[1])
|| !ctype_print($temp[1])
|| strpos($temp[1], ':') !== false) {
$data['username'] = '::invalid::';
} else {
$data['username'] = $temp[1];
}
$temp = null;
$ret = preg_match('/realm="([^"]+)"/', $header, $temp);
if (!$ret || empty($temp[1])) {
return false;
}
if (!ctype_print($temp[1]) || strpos($temp[1], ':') !== false) {
return false;
} else {
$data['realm'] = $temp[1];
}
$temp = null;
$ret = preg_match('/nonce="([^"]+)"/', $header, $temp);
if (!$ret || empty($temp[1])) {
return false;
}
if (!ctype_xdigit($temp[1])) {
return false;
}
$data['nonce'] = $temp[1];
$temp = null;
$ret = preg_match('/uri="([^"]+)"/', $header, $temp);
if (!$ret || empty($temp[1])) {
return false;
}
// Section 3.2.2.5 in RFC 2617 says the authenticating server must
// verify that the URI field in the Authorization header is for the
// same resource requested in the Request Line.
$rUri = $this->request->getUri();
$cUri = UriFactory::factory($temp[1]);
// Make sure the path portion of both URIs is the same
if ($rUri->getPath() != $cUri->getPath()) {
return false;
}
// Section 3.2.2.5 seems to suggest that the value of the URI
// Authorization field should be made into an absolute URI if the
// Request URI is absolute, but it's vague, and that's a bunch of
// code I don't want to write right now.
$data['uri'] = $temp[1];
$temp = null;
$ret = preg_match('/response="([^"]+)"/', $header, $temp);
if (!$ret || empty($temp[1])) {
return false;
}
if (!$this->isValidMd5Hash($temp[1])) {
return false;
}
$data['response'] = $temp[1];
$temp = null;
// The spec says this should default to MD5 if omitted. OK, so how does
// that square with the algo we send out in the WWW-Authenticate header,
// if it can easily be overridden by the client?
$ret = preg_match('/algorithm="?(' . $this->algo . ')"?/', $header, $temp);
if ($ret && !empty($temp[1])
&& in_array($temp[1], $this->supportedAlgos)) {
$data['algorithm'] = $temp[1];
} else {
$data['algorithm'] = 'MD5'; // = $this->algo; ?
}
$temp = null;
// Not optional in this implementation
$ret = preg_match('/cnonce="([^"]+)"/', $header, $temp);
if (!$ret || empty($temp[1])) {
return false;
}
if (!ctype_print($temp[1])) {
return false;
}
$data['cnonce'] = $temp[1];
$temp = null;
// If the server sent an opaque value, the client must send it back
if ($this->useOpaque) {
$ret = preg_match('/opaque="([^"]+)"/', $header, $temp);
if (!$ret || empty($temp[1])) {
// Big surprise: IE isn't RFC 2617-compliant.
$headers = $this->request->getHeaders();
if (!$headers->has('User-Agent')) {
return false;
}
$userAgent = $headers->get('User-Agent')->getFieldValue();
if (false === strpos($userAgent, 'MSIE')) {
return false;
}
$temp[1] = '';
$this->ieNoOpaque = true;
}
// This implementation only sends MD5 hex strings in the opaque value
if (!$this->ieNoOpaque &&
!$this->isValidMd5Hash($temp[1])) {
return false;
}
$data['opaque'] = $temp[1];
$temp = null;
}
// Not optional in this implementation, but must be one of the supported
// qop types
$ret = preg_match('/qop="?(' . implode('|', $this->supportedQops) . ')"?/', $header, $temp);
if (!$ret || empty($temp[1])) {
return false;
}
if (!in_array($temp[1], $this->supportedQops)) {
return false;
}
$data['qop'] = $temp[1];
$temp = null;
// Not optional in this implementation. The spec says this value
// shouldn't be a quoted string, but apparently some implementations
// quote it anyway. See ZF-1544.
$ret = preg_match('/nc="?([0-9A-Fa-f]{8})"?/', $header, $temp);
if (!$ret || empty($temp[1])) {
return false;
}
if (8 != strlen($temp[1]) || !ctype_xdigit($temp[1])) {
return false;
}
$data['nc'] = $temp[1];
return $data;
}
/**
* validates if $value is a valid Md5 hash
* @param string $value
* @return bool
*/
private function isValidMd5Hash($value)
{
return 32 == strlen($value) && ctype_xdigit($value);
}
}