/**
  * @static
  * @throws Exception
  * @return User
  */
 public static function authenticateDigest()
 {
     // the following is a fix for Basic Auth in an FastCGI Environment
     if (isset($_SERVER['Authorization']) && !empty($_SERVER['Authorization'])) {
         $parts = explode(" ", $_SERVER['Authorization']);
         $type = array_shift($parts);
         $cred = implode(" ", $parts);
         if ($type == 'Digest') {
             $_SERVER["PHP_AUTH_DIGEST"] = $cred;
         }
     }
     // only digest auth is supported anymore
     try {
         $auth = new Sabre_HTTP_DigestAuth();
         $auth->setRealm("pimcore");
         $auth->init();
         if ($user = User::getByName($auth->getUsername())) {
             if (!$user->isAdmin()) {
                 throw new Exception("Only admins can access WebDAV");
             }
             if ($auth->validateA1($user->getPassword())) {
                 return $user;
             }
         }
         throw new Exception("Authentication required");
     } catch (Exception $e) {
         $auth->requireLogin();
         echo "Authentication required\n";
         die;
     }
 }
 /**
  * Authenticates the user based on the current request.
  *
  * If authentication is successful, true must be returned.
  * If authentication fails, an exception must be thrown.
  *
  * @param Sabre_DAV_Server $server
  * @param string $realm
  * @throws Sabre_DAV_Exception_NotAuthenticated
  * @return bool
  */
 public function authenticate(Sabre_DAV_Server $server, $realm)
 {
     $digest = new Sabre_HTTP_DigestAuth();
     // Hooking up request and response objects
     $digest->setHTTPRequest($server->httpRequest);
     $digest->setHTTPResponse($server->httpResponse);
     $digest->setRealm($realm);
     $digest->init();
     $username = $digest->getUsername();
     // No username was given
     if (!$username) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('No digest authentication headers were found');
     }
     $hash = $this->getDigestHash($realm, $username);
     // If this was false, the user account didn't exist
     if ($hash === false || is_null($hash)) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('The supplied username was not on file');
     }
     if (!is_string($hash)) {
         throw new Sabre_DAV_Exception('The returned value from getDigestHash must be a string or null');
     }
     // If this was false, the password or part of the hash was incorrect.
     if (!$digest->validateA1($hash)) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('Incorrect username');
     }
     $this->currentUser = $username;
     return true;
 }
Example #3
0
 /**
  * Authenticates the user based on the current request.
  *
  * If authentication is succesful, true must be returned.
  * If authentication fails, an exception must be thrown.
  *
  * @throws Sabre_DAV_Exception_NotAuthenticated
  * @return bool 
  */
 public function authenticate(Sabre_DAV_Server $server, $realm)
 {
     $digest = new Sabre_HTTP_DigestAuth();
     // Hooking up request and response objects
     $digest->setHTTPRequest($server->httpRequest);
     $digest->setHTTPResponse($server->httpResponse);
     $digest->setRealm($realm);
     $digest->init();
     $username = $digest->getUsername();
     // No username was given
     if (!$username) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('No digest authentication headers were found');
     }
     $userData = $this->getUserInfo($realm, $username);
     // If this was false, the user account didn't exist
     if ($userData === false) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('The supplied username was not on file');
     }
     if (!is_array($userData)) {
         throw new Sabre_DAV_Exception('The returntype for getUserInfo must be either false or an array');
     }
     if (!isset($userData['uri']) || !isset($userData['digestHash'])) {
         throw new Sabre_DAV_Exception('The returned array from getUserInfo must contain at least a uri and digestHash element');
     }
     // If this was false, the password or part of the hash was incorrect.
     if (!$digest->validateA1($userData['digestHash'])) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('Incorrect username');
     }
     $this->currentUser = $userData;
     return true;
 }
 public function process()
 {
     // initialize authentication
     $auth = new Sabre_HTTP_DigestAuth();
     $auth->setRealm($this->app->config->site->auth_realm);
     $auth->init();
     // authenticate and get correct user
     $email = $auth->getUsername();
     $class_name = SwatDBClassMap::get('PinholeAdminUser');
     $user = new $class_name();
     $user->setDatabase($this->app->db);
     if (!$user->loadFromEmail($email) || !$auth->validateA1($user->digest_ha1)) {
         $auth->requireLogin();
         echo Pinhole::_('Authentication required') . "\n";
         exit;
     }
     // create directory for account and object tree for dav server
     $root = new PinholeDavDirectory($this->app, $user);
     $tree = new Sabre_DAV_ObjectTree($root);
     // create server
     $server = new Sabre_DAV_Server($tree);
     $server->setBaseUri($this->getDavBaseUri());
     // don't save temp files in the database
     $tempFilePlugin = new Sabre_DAV_TemporaryFileFilterPlugin($this->getDataDir('dav/temp'));
     $server->addPlugin($tempFilePlugin);
     // set up lock plugin
     $lockBackend = new Sabre_DAV_Locks_Backend_FS($this->getDataDir('dav/locks'));
     $lockPlugin = new Sabre_DAV_Locks_Plugin($lockBackend);
     $server->addPlugin($lockPlugin);
     // also allow regular web browsing
     $browserPlugin = new Sabre_DAV_Browser_Plugin(false);
     $server->addPlugin($browserPlugin);
     // serve it up!
     $server->exec();
 }
 public function testDigestAuthInt()
 {
     $this->auth->setQOP(Sabre_HTTP_DigestAuth::QOP_AUTHINT | Sabre_HTTP_DigestAuth::QOP_AUTH);
     list($nonce, $opaque) = $this->getServerTokens(Sabre_HTTP_DigestAuth::QOP_AUTHINT | Sabre_HTTP_DigestAuth::QOP_AUTH);
     $username = '******';
     $password = 12345;
     $nc = '00003';
     $cnonce = uniqid();
     $digestHash = md5(md5($username . ':' . self::REALM . ':' . $password) . ':' . $nonce . ':' . $nc . ':' . $cnonce . ':' . 'auth-int:' . md5('POST' . ':' . '/' . ':' . md5('body')));
     $request = new Sabre_HTTP_Request(array('REQUEST_METHOD' => 'POST', 'PHP_AUTH_DIGEST' => 'username="******", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth-int,nc=' . $nc . ',cnonce="' . $cnonce . '"'));
     $request->setBody('body');
     $this->auth->setHTTPRequest($request);
     $this->auth->init();
     $this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)), 'Authentication is deemed invalid through validateA1');
 }
 /**
  * This method is called before any HTTP method and forces users to be authenticated
  * 
  * @param string $method
  * @throws Sabre_DAV_Exception_NotAuthenticated
  * @return bool 
  */
 public function beforeMethod($method)
 {
     $digest = new Sabre_HTTP_DigestAuth();
     // Hooking up request and response objects
     $digest->setHTTPRequest($this->server->httpRequest);
     $digest->setHTTPResponse($this->server->httpResponse);
     $digest->setRealm($this->realm);
     $digest->init();
     $username = $digest->getUsername();
     // No username was given
     if (!$username) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('No digest authentication headers were found');
     }
     // Now checking the backend for the A1 hash
     $A1 = $this->authBackend->getDigestHash($username);
     // If this was false, the user account didn't exist
     if (!$A1) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('The supplied username was not on file');
     }
     // If this was false, the password or part of the hash was incorrect.
     if (!$digest->validateA1($A1)) {
         $digest->requireLogin();
         throw new Sabre_DAV_Exception_NotAuthenticated('Incorrect username');
     }
     $this->userName = $username;
     $this->userId = $this->authBackend->getUserId($username);
     // Eventhooks must return true to continue processing
     return true;
 }
        return null;
    }
    log_message('error', "Error fetching identities for user '{$userName}': " . $response['Message']);
    return null;
}
// Initialize WebDAV authentication
$realm = 'Inventory';
$auth = new Sabre_HTTP_DigestAuth();
$auth->setRealm($realm);
$auth->init();
$userID = null;
$userName = $auth->getUsername();
// Lookup the WebDAV ("a1hash") identity for the given username
$hash = get_a1_hash($userName, $userID);
// Check if the lookup was successful and that the credentials match
if (!$hash || !$auth->validateA1($hash)) {
    log_message('info', "WebDAV Authentication failed for user '{$userName}' requesting " . $_SERVER['REQUEST_URI']);
    $auth->requireLogin();
    echo "Authentication required\n";
    exit;
}
// Construct the WebDAV tree and server objects
$rootDirectory = new RootDirectory($userID);
$tree = new Sabre_DAV_ObjectTree($rootDirectory);
$server = new Sabre_DAV_Server($tree);
$server->setBaseUri($config['webdav_url_base_path']);
// Setup the WebDAV locking plugin
$lockBackend = new Sabre_DAV_Locks_Backend_FS('tmp');
$lockPlugin = new Sabre_DAV_Locks_Plugin($lockBackend);
$server->addPlugin($lockPlugin);
log_message('debug', "WebDAV handling " . $_SERVER['REQUEST_METHOD'] . " request for " . $_SERVER['REQUEST_URI']);
Example #8
0
     $username = $auth->getUserName();
     if (!$username) {
         Logging::logDebug("DAV digest authentication missing");
         $auth->requireLogin();
         echo "Authentication required\n";
         die;
     }
     $user = $env->configuration()->getUserByNameOrEmail($username);
     if (!$user) {
         Logging::logDebug("DAV digest authentication failure");
         $auth->requireLogin();
         echo "Authentication required\n";
         die;
     }
     $userAuth = $env->configuration()->getUserAuth($user["id"]);
     if (!$auth->validateA1($userAuth["a1hash"])) {
         Logging::logDebug("DAV digest authentication failure");
         $auth->requireLogin();
         echo "Authentication required\n";
         die;
     }
     $env->authentication()->setAuth($user, "pw");
 }
 $session->init($user);
 $dav = new Mollify_DAV_Server(new Mollify_DAV_Root($env));
 $rq->init($dav->httpRequest);
 $dav->setBaseUri($BASE_URI);
 if ($ENABLE_LOCKING) {
     $dav->addPlugin(new Sabre_DAV_Locks_Plugin(new Sabre_DAV_Locks_Backend_FS('data')));
 }
 if ($ENABLE_BROWSER) {