auth.py 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240
  1. # This file is part of Radicale Server - Calendar Server
  2. # Copyright © 2008 Nicolas Kandel
  3. # Copyright © 2008 Pascal Halter
  4. # Copyright © 2008-2017 Guillaume Ayoub
  5. #
  6. # This library is free software: you can redistribute it and/or modify
  7. # it under the terms of the GNU General Public License as published by
  8. # the Free Software Foundation, either version 3 of the License, or
  9. # (at your option) any later version.
  10. #
  11. # This library is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU General Public License
  17. # along with Radicale. If not, see <http://www.gnu.org/licenses/>.
  18. """
  19. Authentication management.
  20. Default is htpasswd authentication.
  21. Apache's htpasswd command (httpd.apache.org/docs/programs/htpasswd.html)
  22. manages a file for storing user credentials. It can encrypt passwords using
  23. different methods, e.g. BCRYPT, MD5-APR1 (a version of MD5 modified for
  24. Apache), SHA1, or by using the system's CRYPT routine. The CRYPT and SHA1
  25. encryption methods implemented by htpasswd are considered as insecure. MD5-APR1
  26. provides medium security as of 2015. Only BCRYPT can be considered secure by
  27. current standards.
  28. MD5-APR1-encrypted credentials can be written by all versions of htpasswd (it
  29. is the default, in fact), whereas BCRYPT requires htpasswd 2.4.x or newer.
  30. The `is_authenticated(user, password)` function provided by this module
  31. verifies the user-given credentials by parsing the htpasswd credential file
  32. pointed to by the ``htpasswd_filename`` configuration value while assuming
  33. the password encryption method specified via the ``htpasswd_encryption``
  34. configuration value.
  35. The following htpasswd password encrpytion methods are supported by Radicale
  36. out-of-the-box:
  37. - plain-text (created by htpasswd -p...) -- INSECURE
  38. - CRYPT (created by htpasswd -d...) -- INSECURE
  39. - SHA1 (created by htpasswd -s...) -- INSECURE
  40. When passlib (https://pypi.python.org/pypi/passlib) is importable, the
  41. following significantly more secure schemes are parsable by Radicale:
  42. - MD5-APR1 (htpasswd -m...) -- htpasswd's default method
  43. - BCRYPT (htpasswd -B...) -- Requires htpasswd 2.4.x
  44. """
  45. import base64
  46. import functools
  47. import hashlib
  48. import hmac
  49. import os
  50. from importlib import import_module
  51. INTERNAL_TYPES = ("None", "none", "remote_user", "http_x_remote_user",
  52. "htpasswd")
  53. def load(configuration, logger):
  54. """Load the authentication manager chosen in configuration."""
  55. auth_type = configuration.get("auth", "type")
  56. if auth_type in ("None", "none"): # DEPRECATED: use "none"
  57. class_ = NoneAuth
  58. elif auth_type == "remote_user":
  59. class_ = RemoteUserAuth
  60. elif auth_type == "http_x_remote_user":
  61. class_ = HttpXRemoteUserAuth
  62. elif auth_type == "htpasswd":
  63. class_ = Auth
  64. else:
  65. try:
  66. class_ = import_module(auth_type).Auth
  67. except Exception as e:
  68. raise RuntimeError("Failed to load authentication module %r: %s" %
  69. (auth_type, e)) from e
  70. logger.info("Authentication type is %r", auth_type)
  71. return class_(configuration, logger)
  72. class BaseAuth:
  73. def __init__(self, configuration, logger):
  74. self.configuration = configuration
  75. self.logger = logger
  76. def get_external_login(self, environ):
  77. """Optionally provide the login and password externally.
  78. Returns a tuple (login, password) or ().
  79. """
  80. return ()
  81. def is_authenticated(self, user, password):
  82. """Validate credentials.
  83. Iterate through htpasswd credential file until user matches, extract
  84. hash (encrypted password) and check hash against user-given password,
  85. using the method specified in the Radicale config.
  86. """
  87. raise NotImplementedError
  88. def map_login_to_user(self, login):
  89. """Map login to internal username."""
  90. return login
  91. class NoneAuth(BaseAuth):
  92. def is_authenticated(self, user, password):
  93. return True
  94. class Auth(BaseAuth):
  95. def __init__(self, configuration, logger):
  96. super().__init__(configuration, logger)
  97. self.filename = os.path.expanduser(
  98. configuration.get("auth", "htpasswd_filename"))
  99. self.encryption = configuration.get("auth", "htpasswd_encryption")
  100. if self.encryption == "ssha":
  101. self.verify = self._ssha
  102. elif self.encryption == "sha1":
  103. self.verify = self._sha1
  104. elif self.encryption == "plain":
  105. self.verify = self._plain
  106. elif self.encryption == "md5":
  107. try:
  108. from passlib.hash import apr_md5_crypt
  109. except ImportError as e:
  110. raise RuntimeError(
  111. "The htpasswd encryption method 'md5' requires "
  112. "the passlib module.") from e
  113. self.verify = functools.partial(self._md5apr1, apr_md5_crypt)
  114. elif self.encryption == "bcrypt":
  115. try:
  116. from passlib.hash import bcrypt
  117. except ImportError as e:
  118. raise RuntimeError(
  119. "The htpasswd encryption method 'bcrypt' requires "
  120. "the passlib module with bcrypt support.") from e
  121. # A call to `encrypt` raises passlib.exc.MissingBackendError with a
  122. # good error message if bcrypt backend is not available. Trigger
  123. # this here.
  124. bcrypt.encrypt("test-bcrypt-backend")
  125. self.verify = functools.partial(self._bcrypt, bcrypt)
  126. elif self.encryption == "crypt":
  127. try:
  128. import crypt
  129. except ImportError as e:
  130. raise RuntimeError(
  131. "The htpasswd encryption method 'crypt' requires "
  132. "the crypt() system support.") from e
  133. self.verify = functools.partial(self._crypt, crypt)
  134. else:
  135. raise RuntimeError(
  136. "The htpasswd encryption method %r is not "
  137. "supported." % self.encryption)
  138. def _plain(self, hash_value, password):
  139. """Check if ``hash_value`` and ``password`` match, plain method."""
  140. return hmac.compare_digest(hash_value, password)
  141. def _crypt(self, crypt, hash_value, password):
  142. """Check if ``hash_value`` and ``password`` match, crypt method."""
  143. return hmac.compare_digest(crypt.crypt(password, hash_value),
  144. hash_value)
  145. def _sha1(self, hash_value, password):
  146. """Check if ``hash_value`` and ``password`` match, sha1 method."""
  147. hash_value = hash_value.replace("{SHA}", "").encode("ascii")
  148. password = password.encode(self.configuration.get("encoding", "stock"))
  149. sha1 = hashlib.sha1()
  150. sha1.update(password)
  151. return hmac.compare_digest(sha1.digest(), base64.b64decode(hash_value))
  152. def _ssha(self, hash_value, password):
  153. """Check if ``hash_value`` and ``password`` match, salted sha1 method.
  154. This method is not directly supported by htpasswd, but it can be
  155. written with e.g. openssl, and nginx can parse it.
  156. """
  157. hash_value = base64.b64decode(hash_value.replace(
  158. "{SSHA}", "").encode("ascii"))
  159. password = password.encode(self.configuration.get("encoding", "stock"))
  160. salt_value = hash_value[20:]
  161. hash_value = hash_value[:20]
  162. sha1 = hashlib.sha1()
  163. sha1.update(password)
  164. sha1.update(salt_value)
  165. return hmac.compare_digest(sha1.digest(), hash_value)
  166. def _bcrypt(self, bcrypt, hash_value, password):
  167. return bcrypt.verify(password, hash_value)
  168. def _md5apr1(self, md5_apr1, hash_value, password):
  169. return md5_apr1.verify(password, hash_value)
  170. def is_authenticated(self, user, password):
  171. # The content of the file is not cached because reading is generally a
  172. # very cheap operation, and it's useful to get live updates of the
  173. # htpasswd file.
  174. try:
  175. with open(self.filename) as fd:
  176. for line in fd:
  177. line = line.strip()
  178. if line:
  179. try:
  180. login, hash_value = line.split(":")
  181. # Always compare both login and password to avoid
  182. # timing attacks, see #591.
  183. login_ok = hmac.compare_digest(login, user)
  184. password_ok = self.verify(hash_value, password)
  185. if login_ok & password_ok:
  186. return True
  187. except ValueError as e:
  188. raise RuntimeError("Invalid htpasswd file %r: %s" %
  189. (self.filename, e)) from e
  190. except OSError as e:
  191. raise RuntimeError("Failed to load htpasswd file %r: %s" %
  192. (self.filename, e)) from e
  193. return False
  194. class RemoteUserAuth(NoneAuth):
  195. def get_external_login(self, environ):
  196. return environ.get("REMOTE_USER", ""), ""
  197. class HttpXRemoteUserAuth(NoneAuth):
  198. def get_external_login(self, environ):
  199. return environ.get("HTTP_X_REMOTE_USER", ""), ""