Bläddra i källkod

New IMAP ACL

Secure authentication based on the ``imaplib`` module.

Validating users against a modern IMAP4rev1 server that awaits STARTTLS
on port 143. Legacy SSL (often on legacy port 993) is deprecated and
thus unsupported. STARTTLS is enforced except if host is ``localhost``
as passwords are sent in PLAIN.

Python 3.2 or newer is required for TLS.
Daniel Aleksandersen 13 år sedan
förälder
incheckning
360d4e6411
1 ändrade filer med 83 tillägg och 0 borttagningar
  1. 83 0
      radicale/acl/IMAP.py

+ 83 - 0
radicale/acl/IMAP.py

@@ -0,0 +1,83 @@
+# -*- coding: utf-8 -*-
+#
+# This file is part of Radicale Server - Calendar Server
+# Copyright © 2012 Daniel Aleksandersen
+# Copyright © 2011 Corentin Le Bail
+# Copyright © 2011 Guillaume Ayoub
+#
+# This library is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This library is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with Radicale.  If not, see <http://www.gnu.org/licenses/>.
+
+"""
+IMAP ACL.
+
+Secure authentication based on the ``imaplib`` module.
+
+Validating users against a modern IMAP4rev1 server that awaits STARTTLS on
+port 143. Legacy SSL (often on legacy port 993) is deprecated and thus
+unsupported. STARTTLS is enforced except if host is ``localhost`` as
+passwords are sent in PLAIN.
+
+Python 3.2 or newer is required for TLS.
+
+"""
+
+import imaplib
+
+from radicale import acl, config, log
+
+IMAP_SERVER = config.get("acl", "imap_auth_host_name")
+IMAP_SERVER_PORT = config.get("acl", "imap_auth_host_port")
+
+def has_right(owner, user, password):
+    """Check if ``user``/``password`` couple is valid."""
+
+    if not user or (owner not in acl.PRIVATE_USERS and user != owner):
+        # No user given, or owner is not private and is not user, forbidden
+        return False
+
+    log.LOGGER.debug("[IMAP ACL] Connecting to %s:%s." % (IMAP_SERVER, IMAP_SERVER_PORT,))
+    connection = imaplib.IMAP4(host=IMAP_SERVER, port=IMAP_SERVER_PORT)
+
+    def secure_connection():
+        try:
+            connection.starttls()
+            log.LOGGER.debug("[IMAP ACL] Server connection changed to TLS.")
+            return True
+        except (IMAP4.error, IAMP4.abort) as err:
+            import sys
+            PY_MIN = float(3.2)
+            PY_SYS = float("%s.%s" % (sys.version_info.major, sys.version_info.minor))
+            if PY_SYS < PY_MIN:
+                log.LOGGER.error("[IMAP ACL] Python 3.2 or newer is required for TLS.")
+            log.LOGGER.warning("[IMAP ACL] Server at %s failed to accept TLS connection because of: %s" % (IMAP_SERVER, str(err)))
+        return False # server is not secure
+
+    def server_is_local():
+        if IMAP_HOST == "localhost":
+            log.LOGGER.warning("[IMAP ACL] Server is local. Will allow transmitting unencrypted credentials.")
+            return True
+        return False # server is not local
+
+    """Enforcing security policy of only transmitting credentials over TLS or to local server."""
+    if secure_connection() or server_is_local():
+        try:
+            connection.login( user, password )
+            connection.logout()
+            log.LOGGER.debug("[IMAP ACL] Authenticated user %s via %s." % (user, IMAP_SERVER))
+            return True
+        except ( imaplib.IMAP4.error, imaplib.IMAP4.abort, Exception ) as err:
+            log.LOGGER.error("[IMAP ACL] Server could not authenticate user %s because of: %s" % (user, str(err)))
+    else:
+        log.LOGGER.critical("[IMAP ACL] Server did not support TLS and is not ``localhost``. Refusing to transmit passwords under these conditions. Authentication attempt aborted.")
+    return False # authentication failed