mirror of
https://github.com/webmin/webmin.git
synced 2025-07-20 16:48:46 +00:00
332 lines
7.6 KiB
Perl
Executable File
332 lines
7.6 KiB
Perl
Executable File
# Functions for MD5 and SHA1 password encryption
|
|
|
|
use strict;
|
|
use warnings;
|
|
no warnings 'redefine';
|
|
no warnings 'uninitialized';
|
|
our %config;
|
|
|
|
# check_md5()
|
|
# Returns a perl module name if the needed perl module(s) for MD5 encryption
|
|
# are not installed, or undef if they are
|
|
sub check_md5
|
|
{
|
|
# On some systems, the crypt function just works!
|
|
return undef if (&unix_crypt_supports_md5());
|
|
|
|
# Try Perl modules
|
|
eval "use MD5";
|
|
if (!$@) {
|
|
eval "use Digest::MD5";
|
|
if ($@) {
|
|
return "Digest::MD5";
|
|
}
|
|
}
|
|
return undef;
|
|
}
|
|
|
|
# encrypt_md5(string, [salt])
|
|
# Returns a string encrypted in MD5 format
|
|
sub encrypt_md5
|
|
{
|
|
my ($passwd, $salt) = @_;
|
|
my $magic = '$1$';
|
|
if ($salt && $salt =~ /^\$1\$([^\$]+)/) {
|
|
# Extract actual salt from already encrypted password
|
|
$salt = $1;
|
|
}
|
|
if ($salt && $salt !~ /^[a-z0-9\/\.]{8}$/i) {
|
|
# Non-MD5 salt
|
|
$salt = undef;
|
|
}
|
|
$salt ||= substr(time(), -8);
|
|
|
|
# Use built-in crypt support for MD5, if we can
|
|
if (&unix_crypt_supports_md5()) {
|
|
return crypt($passwd, $magic.$salt.'$xxxxxxxxxxxxxxxxxxxxxx');
|
|
}
|
|
|
|
# Add the password, magic and salt
|
|
my $cls = "MD5";
|
|
eval "use MD5";
|
|
if ($@) {
|
|
$cls = "Digest::MD5";
|
|
eval "use Digest::MD5";
|
|
if ($@) {
|
|
&error("Missing MD5 or Digest::MD5 perl modules");
|
|
}
|
|
}
|
|
my $ctx = eval "new $cls";
|
|
$ctx->add($passwd);
|
|
$ctx->add($magic);
|
|
$ctx->add($salt);
|
|
|
|
# Add some more stuff from the hash of the password and salt
|
|
my $ctx1 = eval "new $cls";
|
|
$ctx1->add($passwd);
|
|
$ctx1->add($salt);
|
|
$ctx1->add($passwd);
|
|
my $final = $ctx1->digest();
|
|
for(my $pl=length($passwd); $pl>0; $pl-=16) {
|
|
$ctx->add($pl > 16 ? $final : substr($final, 0, $pl));
|
|
}
|
|
|
|
# This piece of code seems rather pointless, but it's in the C code that
|
|
# does MD5 in PAM so it has to go in!
|
|
my $j = 0;
|
|
for(my $i=length($passwd); $i; $i >>= 1) {
|
|
if ($i & 1) {
|
|
$ctx->add("\0");
|
|
}
|
|
else {
|
|
$ctx->add(substr($passwd, $j, 1));
|
|
}
|
|
}
|
|
$final = $ctx->digest();
|
|
|
|
# This loop exists only to waste time
|
|
for(my $i=0; $i<1000; $i++) {
|
|
my $ctx1 = eval "new $cls";
|
|
$ctx1->add($i & 1 ? $passwd : $final);
|
|
$ctx1->add($salt) if ($i % 3);
|
|
$ctx1->add($passwd) if ($i % 7);
|
|
$ctx1->add($i & 1 ? $final : $passwd);
|
|
$final = $ctx1->digest();
|
|
}
|
|
|
|
# Convert the 16-byte final string into a readable form
|
|
my $rv = $magic.$salt.'$';
|
|
my @final = map { ord($_) } split(//, $final);
|
|
my $l = ($final[ 0]<<16) + ($final[ 6]<<8) + $final[12];
|
|
$rv .= &to64($l, 4);
|
|
$l = ($final[ 1]<<16) + ($final[ 7]<<8) + $final[13];
|
|
$rv .= &to64($l, 4);
|
|
$l = ($final[ 2]<<16) + ($final[ 8]<<8) + $final[14];
|
|
$rv .= &to64($l, 4);
|
|
$l = ($final[ 3]<<16) + ($final[ 9]<<8) + $final[15];
|
|
$rv .= &to64($l, 4);
|
|
$l = ($final[ 4]<<16) + ($final[10]<<8) + $final[ 5];
|
|
$rv .= &to64($l, 4);
|
|
$l = $final[11];
|
|
$rv .= &to64($l, 2);
|
|
|
|
return $rv;
|
|
}
|
|
|
|
# unix_crypt_supports_md5()
|
|
# Returns 1 if the built-in crypt() function can already do MD5
|
|
sub unix_crypt_supports_md5
|
|
{
|
|
my $hash = '$1$A9wB3O18$zaZgqrEmb9VNltWTL454R/';
|
|
my $newhash = eval { crypt('test', $hash) };
|
|
return $newhash eq $hash;
|
|
}
|
|
|
|
our @itoa64 = split(//, "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz");
|
|
|
|
sub to64
|
|
{
|
|
my ($v, $n) = @_;
|
|
my $r = "";
|
|
while(--$n >= 0) {
|
|
$r .= $itoa64[$v & 0x3f];
|
|
$v >>= 6;
|
|
}
|
|
return $r;
|
|
}
|
|
|
|
sub check_sha1
|
|
{
|
|
eval "use Digest::SHA1";
|
|
return undef if (!$@);
|
|
eval "use Digest::SHA";
|
|
return undef if (!$@);
|
|
return "Digest::SHA";
|
|
}
|
|
|
|
# encrypt_sha1(password)
|
|
# Encrypts a password in SHA1 format
|
|
sub encrypt_sha1
|
|
{
|
|
my ($pass) = @_;
|
|
my $sh = eval "use Digest::SHA1 qw(sha1_base64);return sha1_base64(\$pass);";
|
|
if ($@) {
|
|
$sh = eval "use Digest::SHA qw(sha1_base64);return sha1_base64(\$pass);";
|
|
}
|
|
return "{SHA}$sh=";
|
|
}
|
|
|
|
# encrypt_sha1_hash(password, salt)
|
|
# Hashes a combined salt+password with SHA1, and returns it in hex. Used on OSX
|
|
sub encrypt_sha1_hash
|
|
{
|
|
my ($pass, $salt) = @_;
|
|
# XXX not done yet??
|
|
}
|
|
|
|
# check_blowfish()
|
|
# Returns an missing Perl module if blowfish is not available, undef if OK
|
|
sub check_blowfish
|
|
{
|
|
eval "use Crypt::Eksblowfish::Bcrypt";
|
|
return $@ ? "Crypt::Eksblowfish::Bcrypt" : undef;
|
|
}
|
|
|
|
# encrypt_blowfish(password, [salt])
|
|
# Returns a string encrypted in blowfish format, suitable for /etc/shadow
|
|
sub encrypt_blowfish
|
|
{
|
|
my ($passwd, $salt) = @_;
|
|
my ($plain, $base64) = ("", "");
|
|
eval "use Crypt::Eksblowfish::Bcrypt";
|
|
if ($salt && $salt !~ /^\$2a\$/) {
|
|
# Invalid salt for Blowfish
|
|
$salt = undef;
|
|
}
|
|
if (!$salt) {
|
|
# Generate a 22-character base-64 format salt
|
|
&seed_random();
|
|
while(length($base64) < 22) {
|
|
$plain .= chr(int(rand()*96)+32);
|
|
$base64 = Crypt::Eksblowfish::Bcrypt::en_base64($plain);
|
|
}
|
|
$base64 = substr($base64, 0, 22);
|
|
$salt = '$2a$'.'08'.'$'.$base64;
|
|
}
|
|
return Crypt::Eksblowfish::Bcrypt::bcrypt($passwd, $salt);
|
|
}
|
|
|
|
# unix_crypt_supports_sha512()
|
|
# Returns 1 if the built-in crypt() function can already do SHA512
|
|
sub unix_crypt_supports_sha512
|
|
{
|
|
my $hash = '$6$Tk5o/GEE$zjvXhYf/dr5M7/jan3pgunkNrAsKmQO9r5O8sr/Cr1hFOLkWmsH4iE9hhqdmHwXd5Pzm4ubBWTEjtMeC.h5qv1';
|
|
my $newhash = eval { crypt('test', $hash) };
|
|
return $newhash eq $hash;
|
|
}
|
|
|
|
# check_sha512()
|
|
# Returns undef if SHA512 hashing is supported, or an error message if not
|
|
sub check_sha512
|
|
{
|
|
return &unix_crypt_supports_sha512() ? undef : 'Crypt::SHA';
|
|
}
|
|
|
|
# encrypt_sha512(password, [salt])
|
|
# Hashes a password, possibly with the given salt, with SHA512
|
|
sub encrypt_sha512
|
|
{
|
|
my ($passwd, $salt) = @_;
|
|
$salt = '$6$'.substr(time(), -8).'$' if (!$salt || $salt !~ /^\$6\$/);
|
|
return crypt($passwd, $salt);
|
|
}
|
|
|
|
# unix_crypt_supports_yescrypt()
|
|
# Returns 1 if the built-in crypt() function can already do yescrypt
|
|
sub unix_crypt_supports_yescrypt
|
|
{
|
|
my $hash = '$y$j9T$waHytoaqP/CEnKFroGn0S/$fxd5mVc2mBPUc3vv.cpqDckpwrWTyIm2iD4JfnVBi26';
|
|
my $newhash = eval { crypt('test', $hash) };
|
|
return $newhash eq $hash;
|
|
}
|
|
|
|
# check_yescrypt()
|
|
# Returns undef if yescrypt hashing is supported, or an error message if not
|
|
sub check_yescrypt
|
|
{
|
|
return &unix_crypt_supports_yescrypt() ? undef : 'Crypt::NaCl::Sodium';
|
|
}
|
|
|
|
# encrypt_yescrypt(password, [salt])
|
|
# Hashes a password, possibly with the given salt, with yescrypt
|
|
sub encrypt_yescrypt
|
|
{
|
|
my ($passwd, $salt) = @_;
|
|
$salt = &substitute_pattern('$y$j9T$[A-Z]{4}.[a-zA-Z0-9]{16}.$[a-zA-Z0-9]{14}.[a-zA-Z0-9]{7}/[a-zA-Z0-9]{15}/[a-zA-Z0-9]{4}') if (!$salt || $salt !~ /^\$y\$/);
|
|
return crypt($passwd, $salt);
|
|
}
|
|
|
|
# validate_password(password, hash)
|
|
# Compares a password with a hash to see if they match, returns 1 if so,
|
|
# 0 otherwise. Tries all supported hashing schemes.
|
|
sub validate_password
|
|
{
|
|
my ($passwd, $hash) = @_;
|
|
|
|
# Classic Unix crypt
|
|
my $chash = eval {
|
|
local $main::error_must_die = 1;
|
|
&unix_crypt($passwd, $hash);
|
|
};
|
|
return 1 if ($chash eq $hash);
|
|
|
|
# MD5
|
|
if (!&check_md5()) {
|
|
my $mhash = &encrypt_md5($passwd, $hash);
|
|
return 1 if ($mhash eq $hash);
|
|
}
|
|
|
|
# Blowfish
|
|
if (!&check_blowfish()) {
|
|
my $mhash = &encrypt_blowfish($passwd, $hash);
|
|
return 1 if ($mhash eq $hash);
|
|
}
|
|
|
|
# SHA512
|
|
if (!&check_sha512()) {
|
|
my $shash = &encrypt_sha512($passwd, $hash);
|
|
return 1 if ($shash && $shash eq $hash);
|
|
}
|
|
|
|
# yescrypt
|
|
if (!&check_yescrypt()) {
|
|
my $shash = &encrypt_yescrypt($passwd, $hash);
|
|
return 1 if ($shash && $shash eq $hash);
|
|
}
|
|
|
|
# Some other hashing, maybe supported by crypt
|
|
my $ohash = eval { crypt($passwd, $hash) };
|
|
return 1 if ($ohash && $ohash eq $hash);
|
|
|
|
return 0;
|
|
}
|
|
|
|
=head2 is_dictionary_word(word)
|
|
|
|
Returns 1 if some file can be found in a dictionary words file
|
|
|
|
=cut
|
|
sub is_dictionary_word
|
|
{
|
|
my ($word) = @_;
|
|
$word = lc($word);
|
|
my @files;
|
|
if ($config{'dict_file'}) {
|
|
@files = split(/\s+/, $config{'dict_file'});
|
|
}
|
|
else {
|
|
@files = ( "/usr/share/dict/words",
|
|
"/usr/share/dict/linux.words",
|
|
"/usr/dict/words" );
|
|
}
|
|
foreach my $f (@files) {
|
|
my $found = 0;
|
|
my $fh = "WORDS";
|
|
&open_readfile($fh, $f);
|
|
while(<$fh>) {
|
|
s/#.*//;
|
|
s/\s//;
|
|
if (lc($_) eq $word) {
|
|
$found = 1;
|
|
last;
|
|
}
|
|
}
|
|
close($fh);
|
|
return 1 if ($found);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
1;
|
|
|