870 Zeilen
29 KiB
PHP
870 Zeilen
29 KiB
PHP
|
<?php
|
||
|
/**
|
||
|
* Zend Framework
|
||
|
*
|
||
|
* LICENSE
|
||
|
*
|
||
|
* This source file is subject to the new BSD license that is bundled
|
||
|
* with this package in the file LICENSE.txt.
|
||
|
* It is also available through the world-wide-web at this URL:
|
||
|
* http://framework.zend.com/license/new-bsd
|
||
|
* If you did not receive a copy of the license and are unable to
|
||
|
* obtain it through the world-wide-web, please send an email
|
||
|
* to license@zend.com so we can send you a copy immediately.
|
||
|
*
|
||
|
* @category Zend
|
||
|
* @package Zend_Auth
|
||
|
* @subpackage Zend_Auth_Adapter_Http
|
||
|
* @copyright Copyright (c) 2005-2011 Zend Technologies USA Inc. (http://www.zend.com)
|
||
|
* @license http://framework.zend.com/license/new-bsd New BSD License
|
||
|
* @version $Id$
|
||
|
*/
|
||
|
|
||
|
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Interface
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Interface.php';
|
||
|
|
||
|
|
||
|
/**
|
||
|
* HTTP Authentication Adapter
|
||
|
*
|
||
|
* Implements a pretty good chunk of RFC 2617.
|
||
|
*
|
||
|
* @category Zend
|
||
|
* @package Zend_Auth
|
||
|
* @subpackage Zend_Auth_Adapter_Http
|
||
|
* @copyright Copyright (c) 2005-2011 Zend Technologies USA Inc. (http://www.zend.com)
|
||
|
* @license http://framework.zend.com/license/new-bsd New BSD License
|
||
|
* @todo Support auth-int
|
||
|
* @todo Track nonces, nonce-count, opaque for replay protection and stale support
|
||
|
* @todo Support Authentication-Info header
|
||
|
*/
|
||
|
class Zend_Auth_Adapter_Http implements Zend_Auth_Adapter_Interface
|
||
|
{
|
||
|
/**
|
||
|
* Reference to the HTTP Request object
|
||
|
*
|
||
|
* @var Zend_Controller_Request_Http
|
||
|
*/
|
||
|
protected $_request;
|
||
|
|
||
|
/**
|
||
|
* Reference to the HTTP Response object
|
||
|
*
|
||
|
* @var Zend_Controller_Response_Http
|
||
|
*/
|
||
|
protected $_response;
|
||
|
|
||
|
/**
|
||
|
* Object that looks up user credentials for the Basic scheme
|
||
|
*
|
||
|
* @var Zend_Auth_Adapter_Http_Resolver_Interface
|
||
|
*/
|
||
|
protected $_basicResolver;
|
||
|
|
||
|
/**
|
||
|
* Object that looks up user credentials for the Digest scheme
|
||
|
*
|
||
|
* @var Zend_Auth_Adapter_Http_Resolver_Interface
|
||
|
*/
|
||
|
protected $_digestResolver;
|
||
|
|
||
|
/**
|
||
|
* List of authentication schemes supported by this class
|
||
|
*
|
||
|
* @var array
|
||
|
*/
|
||
|
protected $_supportedSchemes = array('basic', 'digest');
|
||
|
|
||
|
/**
|
||
|
* List of schemes this class will accept from the client
|
||
|
*
|
||
|
* @var array
|
||
|
*/
|
||
|
protected $_acceptSchemes;
|
||
|
|
||
|
/**
|
||
|
* Space-delimited list of protected domains for Digest Auth
|
||
|
*
|
||
|
* @var string
|
||
|
*/
|
||
|
protected $_domains;
|
||
|
|
||
|
/**
|
||
|
* The protection realm to use
|
||
|
*
|
||
|
* @var string
|
||
|
*/
|
||
|
protected $_realm;
|
||
|
|
||
|
/**
|
||
|
* Nonce timeout period
|
||
|
*
|
||
|
* @var integer
|
||
|
*/
|
||
|
protected $_nonceTimeout;
|
||
|
|
||
|
/**
|
||
|
* Whether to send the opaque value in the header. True by default
|
||
|
*
|
||
|
* @var boolean
|
||
|
*/
|
||
|
protected $_useOpaque;
|
||
|
|
||
|
/**
|
||
|
* List of the supported digest algorithms. I want to support both MD5 and
|
||
|
* MD5-sess, but MD5-sess won't make it into the first version.
|
||
|
*
|
||
|
* @var array
|
||
|
*/
|
||
|
protected $_supportedAlgos = array('MD5');
|
||
|
|
||
|
/**
|
||
|
* The actual algorithm to use. Defaults to MD5
|
||
|
*
|
||
|
* @var string
|
||
|
*/
|
||
|
protected $_algo;
|
||
|
|
||
|
/**
|
||
|
* List of supported qop options. My intetion is to support both 'auth' and
|
||
|
* 'auth-int', but 'auth-int' won't make it into the first version.
|
||
|
*
|
||
|
* @var array
|
||
|
*/
|
||
|
protected $_supportedQops = array('auth');
|
||
|
|
||
|
/**
|
||
|
* Whether or not to do Proxy Authentication instead of origin server
|
||
|
* authentication (send 407's instead of 401's). Off by default.
|
||
|
*
|
||
|
* @var boolean
|
||
|
*/
|
||
|
protected $_imaProxy;
|
||
|
|
||
|
/**
|
||
|
* Flag indicating the client is IE and didn't bother to return the opaque string
|
||
|
*
|
||
|
* @var boolean
|
||
|
*/
|
||
|
protected $_ieNoOpaque;
|
||
|
|
||
|
/**
|
||
|
* Constructor
|
||
|
*
|
||
|
* @param array $config Configuration settings:
|
||
|
* 'accept_schemes' => 'basic'|'digest'|'basic digest'
|
||
|
* 'realm' => <string>
|
||
|
* 'digest_domains' => <string> Space-delimited list of URIs
|
||
|
* 'nonce_timeout' => <int>
|
||
|
* 'use_opaque' => <bool> Whether to send the opaque value in the header
|
||
|
* 'alogrithm' => <string> See $_supportedAlgos. Default: MD5
|
||
|
* 'proxy_auth' => <bool> Whether to do authentication as a Proxy
|
||
|
* @throws Zend_Auth_Adapter_Exception
|
||
|
* @return void
|
||
|
*/
|
||
|
public function __construct(array $config)
|
||
|
{
|
||
|
if (!extension_loaded('hash')) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception(__CLASS__ . ' requires the \'hash\' extension');
|
||
|
}
|
||
|
|
||
|
$this->_request = null;
|
||
|
$this->_response = null;
|
||
|
$this->_ieNoOpaque = false;
|
||
|
|
||
|
|
||
|
if (empty($config['accept_schemes'])) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Config key \'accept_schemes\' is required');
|
||
|
}
|
||
|
|
||
|
$schemes = explode(' ', $config['accept_schemes']);
|
||
|
$this->_acceptSchemes = array_intersect($schemes, $this->_supportedSchemes);
|
||
|
if (empty($this->_acceptSchemes)) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('No supported schemes given in \'accept_schemes\'. Valid values: '
|
||
|
. implode(', ', $this->_supportedSchemes));
|
||
|
}
|
||
|
|
||
|
// Double-quotes are used to delimit the realm string in the HTTP header,
|
||
|
// and colons are field delimiters in the password file.
|
||
|
if (empty($config['realm']) ||
|
||
|
!ctype_print($config['realm']) ||
|
||
|
strpos($config['realm'], ':') !== false ||
|
||
|
strpos($config['realm'], '"') !== false) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Config key \'realm\' is required, and must contain only printable '
|
||
|
. 'characters, excluding quotation marks and colons');
|
||
|
} else {
|
||
|
$this->_realm = $config['realm'];
|
||
|
}
|
||
|
|
||
|
if (in_array('digest', $this->_acceptSchemes)) {
|
||
|
if (empty($config['digest_domains']) ||
|
||
|
!ctype_print($config['digest_domains']) ||
|
||
|
strpos($config['digest_domains'], '"') !== false) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Config key \'digest_domains\' is required, and must contain '
|
||
|
. 'only printable characters, excluding quotation marks');
|
||
|
} else {
|
||
|
$this->_domains = $config['digest_domains'];
|
||
|
}
|
||
|
|
||
|
if (empty($config['nonce_timeout']) ||
|
||
|
!is_numeric($config['nonce_timeout'])) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Config key \'nonce_timeout\' is required, and must be an '
|
||
|
. 'integer');
|
||
|
} else {
|
||
|
$this->_nonceTimeout = (int) $config['nonce_timeout'];
|
||
|
}
|
||
|
|
||
|
// We use the opaque value unless explicitly told not to
|
||
|
if (isset($config['use_opaque']) && false == (bool) $config['use_opaque']) {
|
||
|
$this->_useOpaque = false;
|
||
|
} else {
|
||
|
$this->_useOpaque = true;
|
||
|
}
|
||
|
|
||
|
if (isset($config['algorithm']) && in_array($config['algorithm'], $this->_supportedAlgos)) {
|
||
|
$this->_algo = $config['algorithm'];
|
||
|
} else {
|
||
|
$this->_algo = 'MD5';
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Don't be a proxy unless explicitly told to do so
|
||
|
if (isset($config['proxy_auth']) && true == (bool) $config['proxy_auth']) {
|
||
|
$this->_imaProxy = true; // I'm a Proxy
|
||
|
} else {
|
||
|
$this->_imaProxy = false;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Setter for the _basicResolver property
|
||
|
*
|
||
|
* @param Zend_Auth_Adapter_Http_Resolver_Interface $resolver
|
||
|
* @return Zend_Auth_Adapter_Http Provides a fluent interface
|
||
|
*/
|
||
|
public function setBasicResolver(Zend_Auth_Adapter_Http_Resolver_Interface $resolver)
|
||
|
{
|
||
|
$this->_basicResolver = $resolver;
|
||
|
|
||
|
return $this;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Getter for the _basicResolver property
|
||
|
*
|
||
|
* @return Zend_Auth_Adapter_Http_Resolver_Interface
|
||
|
*/
|
||
|
public function getBasicResolver()
|
||
|
{
|
||
|
return $this->_basicResolver;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Setter for the _digestResolver property
|
||
|
*
|
||
|
* @param Zend_Auth_Adapter_Http_Resolver_Interface $resolver
|
||
|
* @return Zend_Auth_Adapter_Http Provides a fluent interface
|
||
|
*/
|
||
|
public function setDigestResolver(Zend_Auth_Adapter_Http_Resolver_Interface $resolver)
|
||
|
{
|
||
|
$this->_digestResolver = $resolver;
|
||
|
|
||
|
return $this;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Getter for the _digestResolver property
|
||
|
*
|
||
|
* @return Zend_Auth_Adapter_Http_Resolver_Interface
|
||
|
*/
|
||
|
public function getDigestResolver()
|
||
|
{
|
||
|
return $this->_digestResolver;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Setter for the Request object
|
||
|
*
|
||
|
* @param Zend_Controller_Request_Http $request
|
||
|
* @return Zend_Auth_Adapter_Http Provides a fluent interface
|
||
|
*/
|
||
|
public function setRequest(Zend_Controller_Request_Http $request)
|
||
|
{
|
||
|
$this->_request = $request;
|
||
|
|
||
|
return $this;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Getter for the Request object
|
||
|
*
|
||
|
* @return Zend_Controller_Request_Http
|
||
|
*/
|
||
|
public function getRequest()
|
||
|
{
|
||
|
return $this->_request;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Setter for the Response object
|
||
|
*
|
||
|
* @param Zend_Controller_Response_Http $response
|
||
|
* @return Zend_Auth_Adapter_Http Provides a fluent interface
|
||
|
*/
|
||
|
public function setResponse(Zend_Controller_Response_Http $response)
|
||
|
{
|
||
|
$this->_response = $response;
|
||
|
|
||
|
return $this;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Getter for the Response object
|
||
|
*
|
||
|
* @return Zend_Controller_Response_Http
|
||
|
*/
|
||
|
public function getResponse()
|
||
|
{
|
||
|
return $this->_response;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Authenticate
|
||
|
*
|
||
|
* @throws Zend_Auth_Adapter_Exception
|
||
|
* @return Zend_Auth_Result
|
||
|
*/
|
||
|
public function authenticate()
|
||
|
{
|
||
|
if (empty($this->_request) ||
|
||
|
empty($this->_response)) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Request and Response objects must be set before calling '
|
||
|
. 'authenticate()');
|
||
|
}
|
||
|
|
||
|
if ($this->_imaProxy) {
|
||
|
$getHeader = 'Proxy-Authorization';
|
||
|
} else {
|
||
|
$getHeader = 'Authorization';
|
||
|
}
|
||
|
|
||
|
$authHeader = $this->_request->getHeader($getHeader);
|
||
|
if (!$authHeader) {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
|
||
|
list($clientScheme) = explode(' ', $authHeader);
|
||
|
$clientScheme = strtolower($clientScheme);
|
||
|
|
||
|
// The server can issue multiple challenges, but the client should
|
||
|
// answer with only the selected auth scheme.
|
||
|
if (!in_array($clientScheme, $this->_supportedSchemes)) {
|
||
|
$this->_response->setHttpResponseCode(400);
|
||
|
return new Zend_Auth_Result(
|
||
|
Zend_Auth_Result::FAILURE_UNCATEGORIZED,
|
||
|
array(),
|
||
|
array('Client requested an incorrect or unsupported authentication scheme')
|
||
|
);
|
||
|
}
|
||
|
|
||
|
// client sent a scheme that is not the one required
|
||
|
if (!in_array($clientScheme, $this->_acceptSchemes)) {
|
||
|
// challenge again the client
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
|
||
|
switch ($clientScheme) {
|
||
|
case 'basic':
|
||
|
$result = $this->_basicAuth($authHeader);
|
||
|
break;
|
||
|
case 'digest':
|
||
|
$result = $this->_digestAuth($authHeader);
|
||
|
break;
|
||
|
default:
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Unsupported authentication scheme');
|
||
|
}
|
||
|
|
||
|
return $result;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Challenge Client
|
||
|
*
|
||
|
* Sets a 401 or 407 Unauthorized response code, and creates the
|
||
|
* appropriate Authenticate header(s) to prompt for credentials.
|
||
|
*
|
||
|
* @return Zend_Auth_Result Always returns a non-identity Auth result
|
||
|
*/
|
||
|
protected function _challengeClient()
|
||
|
{
|
||
|
if ($this->_imaProxy) {
|
||
|
$statusCode = 407;
|
||
|
$headerName = 'Proxy-Authenticate';
|
||
|
} else {
|
||
|
$statusCode = 401;
|
||
|
$headerName = 'WWW-Authenticate';
|
||
|
}
|
||
|
|
||
|
$this->_response->setHttpResponseCode($statusCode);
|
||
|
|
||
|
// Send a challenge in each acceptable authentication scheme
|
||
|
if (in_array('basic', $this->_acceptSchemes)) {
|
||
|
$this->_response->setHeader($headerName, $this->_basicHeader());
|
||
|
}
|
||
|
if (in_array('digest', $this->_acceptSchemes)) {
|
||
|
$this->_response->setHeader($headerName, $this->_digestHeader());
|
||
|
}
|
||
|
return new Zend_Auth_Result(
|
||
|
Zend_Auth_Result::FAILURE_CREDENTIAL_INVALID,
|
||
|
array(),
|
||
|
array('Invalid or absent credentials; challenging client')
|
||
|
);
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Basic Header
|
||
|
*
|
||
|
* Generates a Proxy- or WWW-Authenticate header value in the Basic
|
||
|
* authentication scheme.
|
||
|
*
|
||
|
* @return string Authenticate header value
|
||
|
*/
|
||
|
protected function _basicHeader()
|
||
|
{
|
||
|
return 'Basic realm="' . $this->_realm . '"';
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Digest Header
|
||
|
*
|
||
|
* Generates a Proxy- or WWW-Authenticate header value in the Digest
|
||
|
* authentication scheme.
|
||
|
*
|
||
|
* @return string Authenticate header value
|
||
|
*/
|
||
|
protected function _digestHeader()
|
||
|
{
|
||
|
$wwwauth = 'Digest realm="' . $this->_realm . '", '
|
||
|
. 'domain="' . $this->_domains . '", '
|
||
|
. 'nonce="' . $this->_calcNonce() . '", '
|
||
|
. ($this->_useOpaque ? 'opaque="' . $this->_calcOpaque() . '", ' : '')
|
||
|
. 'algorithm="' . $this->_algo . '", '
|
||
|
. 'qop="' . implode(',', $this->_supportedQops) . '"';
|
||
|
|
||
|
return $wwwauth;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Basic Authentication
|
||
|
*
|
||
|
* @param string $header Client's Authorization header
|
||
|
* @throws Zend_Auth_Adapter_Exception
|
||
|
* @return Zend_Auth_Result
|
||
|
*/
|
||
|
protected function _basicAuth($header)
|
||
|
{
|
||
|
if (empty($header)) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('The value of the client Authorization header is required');
|
||
|
}
|
||
|
if (empty($this->_basicResolver)) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('A basicResolver object must be set before doing Basic '
|
||
|
. 'authentication');
|
||
|
}
|
||
|
|
||
|
// Decode the Authorization header
|
||
|
$auth = substr($header, strlen('Basic '));
|
||
|
$auth = base64_decode($auth);
|
||
|
if (!$auth) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Unable to base64_decode Authorization header value');
|
||
|
}
|
||
|
|
||
|
// See ZF-1253. Validate the credentials the same way the digest
|
||
|
// implementation does. If invalid credentials are detected,
|
||
|
// re-challenge the client.
|
||
|
if (!ctype_print($auth)) {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
// Fix for ZF-1515: Now re-challenges on empty username or password
|
||
|
$creds = array_filter(explode(':', $auth));
|
||
|
if (count($creds) != 2) {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
|
||
|
$password = $this->_basicResolver->resolve($creds[0], $this->_realm);
|
||
|
if ($password && $this->_secureStringCompare($password, $creds[1])) {
|
||
|
$identity = array('username'=>$creds[0], 'realm'=>$this->_realm);
|
||
|
return new Zend_Auth_Result(Zend_Auth_Result::SUCCESS, $identity);
|
||
|
} else {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Digest Authentication
|
||
|
*
|
||
|
* @param string $header Client's Authorization header
|
||
|
* @throws Zend_Auth_Adapter_Exception
|
||
|
* @return Zend_Auth_Result Valid auth result only on successful auth
|
||
|
*/
|
||
|
protected function _digestAuth($header)
|
||
|
{
|
||
|
if (empty($header)) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('The value of the client Authorization header is required');
|
||
|
}
|
||
|
if (empty($this->_digestResolver)) {
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('A digestResolver object must be set before doing Digest authentication');
|
||
|
}
|
||
|
|
||
|
$data = $this->_parseDigestAuth($header);
|
||
|
if ($data === false) {
|
||
|
$this->_response->setHttpResponseCode(400);
|
||
|
return new Zend_Auth_Result(
|
||
|
Zend_Auth_Result::FAILURE_UNCATEGORIZED,
|
||
|
array(),
|
||
|
array('Invalid Authorization header format')
|
||
|
);
|
||
|
}
|
||
|
|
||
|
// See ZF-1052. This code was a bit too unforgiving of invalid
|
||
|
// usernames. Now, if the username is bad, we re-challenge the client.
|
||
|
if ('::invalid::' == $data['username']) {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
|
||
|
// Verify that the client sent back the same nonce
|
||
|
if ($this->_calcNonce() != $data['nonce']) {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
// The opaque value is also required to match, but of course IE doesn't
|
||
|
// play ball.
|
||
|
if (!$this->_ieNoOpaque && $this->_calcOpaque() != $data['opaque']) {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
|
||
|
// Look up the user's password hash. If not found, deny access.
|
||
|
// This makes no assumptions about how the password hash was
|
||
|
// constructed beyond that it must have been built in such a way as
|
||
|
// to be recreatable with the current settings of this object.
|
||
|
$ha1 = $this->_digestResolver->resolve($data['username'], $data['realm']);
|
||
|
if ($ha1 === false) {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
|
||
|
// If MD5-sess is used, a1 value is made of the user's password
|
||
|
// hash with the server and client nonce appended, separated by
|
||
|
// colons.
|
||
|
if ($this->_algo == 'MD5-sess') {
|
||
|
$ha1 = hash('md5', $ha1 . ':' . $data['nonce'] . ':' . $data['cnonce']);
|
||
|
}
|
||
|
|
||
|
// Calculate h(a2). The value of this hash depends on the qop
|
||
|
// option selected by the client and the supported hash functions
|
||
|
switch ($data['qop']) {
|
||
|
case 'auth':
|
||
|
$a2 = $this->_request->getMethod() . ':' . $data['uri'];
|
||
|
break;
|
||
|
case 'auth-int':
|
||
|
// Should be REQUEST_METHOD . ':' . uri . ':' . hash(entity-body),
|
||
|
// but this isn't supported yet, so fall through to default case
|
||
|
default:
|
||
|
/**
|
||
|
* @see Zend_Auth_Adapter_Exception
|
||
|
*/
|
||
|
require_once 'Zend/Auth/Adapter/Exception.php';
|
||
|
throw new Zend_Auth_Adapter_Exception('Client requested an unsupported qop option');
|
||
|
}
|
||
|
// Using hash() should make parameterizing the hash algorithm
|
||
|
// easier
|
||
|
$ha2 = hash('md5', $a2);
|
||
|
|
||
|
|
||
|
// Calculate the server's version of the request-digest. This must
|
||
|
// match $data['response']. See RFC 2617, section 3.2.2.1
|
||
|
$message = $data['nonce'] . ':' . $data['nc'] . ':' . $data['cnonce'] . ':' . $data['qop'] . ':' . $ha2;
|
||
|
$digest = hash('md5', $ha1 . ':' . $message);
|
||
|
|
||
|
// If our digest matches the client's let them in, otherwise return
|
||
|
// a 401 code and exit to prevent access to the protected resource.
|
||
|
if ($this->_secureStringCompare($digest, $data['response'])) {
|
||
|
$identity = array('username'=>$data['username'], 'realm'=>$data['realm']);
|
||
|
return new Zend_Auth_Result(Zend_Auth_Result::SUCCESS, $identity);
|
||
|
} else {
|
||
|
return $this->_challengeClient();
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Calculate Nonce
|
||
|
*
|
||
|
* @return string The nonce value
|
||
|
*/
|
||
|
protected function _calcNonce()
|
||
|
{
|
||
|
// Once subtle consequence of this timeout calculation is that it
|
||
|
// actually divides all of time into _nonceTimeout-sized sections, such
|
||
|
// that the value of timeout is the point in time of the next
|
||
|
// approaching "boundary" of a section. This allows the server to
|
||
|
// consistently generate the same timeout (and hence the same nonce
|
||
|
// value) across requests, but only as long as one of those
|
||
|
// "boundaries" is not crossed between requests. If that happens, the
|
||
|
// nonce will change on its own, and effectively log the user out. This
|
||
|
// would be surprising if the user just logged in.
|
||
|
$timeout = ceil(time() / $this->_nonceTimeout) * $this->_nonceTimeout;
|
||
|
|
||
|
$nonce = hash('md5', $timeout . ':' . $this->_request->getServer('HTTP_USER_AGENT') . ':' . __CLASS__);
|
||
|
return $nonce;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Calculate Opaque
|
||
|
*
|
||
|
* The opaque string can be anything; the client must return it exactly as
|
||
|
* it was sent. It may be useful to store data in this string in some
|
||
|
* applications. Ideally, a new value for this would be generated each time
|
||
|
* a WWW-Authenticate header is sent (in order to reduce predictability),
|
||
|
* but we would have to be able to create the same exact value across at
|
||
|
* least two separate requests from the same client.
|
||
|
*
|
||
|
* @return string The opaque value
|
||
|
*/
|
||
|
protected function _calcOpaque()
|
||
|
{
|
||
|
return hash('md5', 'Opaque Data:' . __CLASS__);
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Parse Digest Authorization header
|
||
|
*
|
||
|
* @param string $header Client's Authorization: HTTP header
|
||
|
* @return array|false Data elements from header, or false if any part of
|
||
|
* the header is invalid
|
||
|
*/
|
||
|
protected function _parseDigestAuth($header)
|
||
|
{
|
||
|
$temp = null;
|
||
|
$data = array();
|
||
|
|
||
|
// See ZF-1052. Detect invalid usernames instead of just returning a
|
||
|
// 400 code.
|
||
|
$ret = preg_match('/username="([^"]+)"/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])
|
||
|
|| !ctype_print($temp[1])
|
||
|
|| strpos($temp[1], ':') !== false) {
|
||
|
$data['username'] = '::invalid::';
|
||
|
} else {
|
||
|
$data['username'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
$ret = preg_match('/realm="([^"]+)"/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
return false;
|
||
|
}
|
||
|
if (!ctype_print($temp[1]) || strpos($temp[1], ':') !== false) {
|
||
|
return false;
|
||
|
} else {
|
||
|
$data['realm'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
$ret = preg_match('/nonce="([^"]+)"/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
return false;
|
||
|
}
|
||
|
if (!ctype_xdigit($temp[1])) {
|
||
|
return false;
|
||
|
} else {
|
||
|
$data['nonce'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
$ret = preg_match('/uri="([^"]+)"/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
return false;
|
||
|
}
|
||
|
// Section 3.2.2.5 in RFC 2617 says the authenticating server must
|
||
|
// verify that the URI field in the Authorization header is for the
|
||
|
// same resource requested in the Request Line.
|
||
|
$rUri = @parse_url($this->_request->getRequestUri());
|
||
|
$cUri = @parse_url($temp[1]);
|
||
|
if (false === $rUri || false === $cUri) {
|
||
|
return false;
|
||
|
} else {
|
||
|
// Make sure the path portion of both URIs is the same
|
||
|
if ($rUri['path'] != $cUri['path']) {
|
||
|
return false;
|
||
|
}
|
||
|
// Section 3.2.2.5 seems to suggest that the value of the URI
|
||
|
// Authorization field should be made into an absolute URI if the
|
||
|
// Request URI is absolute, but it's vague, and that's a bunch of
|
||
|
// code I don't want to write right now.
|
||
|
$data['uri'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
$ret = preg_match('/response="([^"]+)"/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
return false;
|
||
|
}
|
||
|
if (32 != strlen($temp[1]) || !ctype_xdigit($temp[1])) {
|
||
|
return false;
|
||
|
} else {
|
||
|
$data['response'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
// The spec says this should default to MD5 if omitted. OK, so how does
|
||
|
// that square with the algo we send out in the WWW-Authenticate header,
|
||
|
// if it can easily be overridden by the client?
|
||
|
$ret = preg_match('/algorithm="?(' . $this->_algo . ')"?/', $header, $temp);
|
||
|
if ($ret && !empty($temp[1])
|
||
|
&& in_array($temp[1], $this->_supportedAlgos)) {
|
||
|
$data['algorithm'] = $temp[1];
|
||
|
} else {
|
||
|
$data['algorithm'] = 'MD5'; // = $this->_algo; ?
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
// Not optional in this implementation
|
||
|
$ret = preg_match('/cnonce="([^"]+)"/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
return false;
|
||
|
}
|
||
|
if (!ctype_print($temp[1])) {
|
||
|
return false;
|
||
|
} else {
|
||
|
$data['cnonce'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
// If the server sent an opaque value, the client must send it back
|
||
|
if ($this->_useOpaque) {
|
||
|
$ret = preg_match('/opaque="([^"]+)"/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
|
||
|
// Big surprise: IE isn't RFC 2617-compliant.
|
||
|
if (false !== strpos($this->_request->getHeader('User-Agent'), 'MSIE')) {
|
||
|
$temp[1] = '';
|
||
|
$this->_ieNoOpaque = true;
|
||
|
} else {
|
||
|
return false;
|
||
|
}
|
||
|
}
|
||
|
// This implementation only sends MD5 hex strings in the opaque value
|
||
|
if (!$this->_ieNoOpaque &&
|
||
|
(32 != strlen($temp[1]) || !ctype_xdigit($temp[1]))) {
|
||
|
return false;
|
||
|
} else {
|
||
|
$data['opaque'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
}
|
||
|
|
||
|
// Not optional in this implementation, but must be one of the supported
|
||
|
// qop types
|
||
|
$ret = preg_match('/qop="?(' . implode('|', $this->_supportedQops) . ')"?/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
return false;
|
||
|
}
|
||
|
if (!in_array($temp[1], $this->_supportedQops)) {
|
||
|
return false;
|
||
|
} else {
|
||
|
$data['qop'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
// Not optional in this implementation. The spec says this value
|
||
|
// shouldn't be a quoted string, but apparently some implementations
|
||
|
// quote it anyway. See ZF-1544.
|
||
|
$ret = preg_match('/nc="?([0-9A-Fa-f]{8})"?/', $header, $temp);
|
||
|
if (!$ret || empty($temp[1])) {
|
||
|
return false;
|
||
|
}
|
||
|
if (8 != strlen($temp[1]) || !ctype_xdigit($temp[1])) {
|
||
|
return false;
|
||
|
} else {
|
||
|
$data['nc'] = $temp[1];
|
||
|
}
|
||
|
$temp = null;
|
||
|
|
||
|
return $data;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Securely compare two strings for equality while avoided C level memcmp()
|
||
|
* optimisations capable of leaking timing information useful to an attacker
|
||
|
* attempting to iteratively guess the unknown string (e.g. password) being
|
||
|
* compared against.
|
||
|
*
|
||
|
* @param string $a
|
||
|
* @param string $b
|
||
|
* @return bool
|
||
|
*/
|
||
|
protected function _secureStringCompare($a, $b)
|
||
|
{
|
||
|
if (strlen($a) !== strlen($b)) {
|
||
|
return false;
|
||
|
}
|
||
|
$result = 0;
|
||
|
for ($i = 0; $i < strlen($a); $i++) {
|
||
|
$result |= ord($a[$i]) ^ ord($b[$i]);
|
||
|
}
|
||
|
return $result == 0;
|
||
|
}
|
||
|
}
|