1 |
<? |
2 |
|
3 |
/* |
4 |
Document manager handling for authentification of users |
5 |
based on: |
6 |
* refearer header from remote browser (it's really easy to forge this) |
7 |
* remote IP address |
8 |
* remote DNS hostname |
9 |
|
10 |
Written by Dobrica Pavlinusic <dpavlin@rot13.org> |
11 |
|
12 |
Usage example: |
13 |
|
14 |
docman.conf: |
15 |
|
16 |
$gblUsers = "htusers_header"; |
17 |
|
18 |
.htusers examples: |
19 |
|
20 |
REMOTE_ADDR=10.0.0.3:Dobrica (client ip):auth_header:dpavlin@foo.bar |
21 |
will match exact IP adress |
22 |
remote_hostname=hbreyer2:Dobrica (hostname):auth_header:dpavlin@foo.bar |
23 |
will match exact hostname |
24 |
http_referer=test.foo.bar:Dobrica (by referer):auth_header:dpavlin@foo.bar |
25 |
will match user which comes from site test.foo.bar |
26 |
remote_user=dpavlin:Dobrica (by server http auth):auth_header:dpavlin@foo.bar |
27 |
will match user "dpavlin" which is authetificated using .htaccess |
28 |
|
29 |
*/ |
30 |
|
31 |
$htusers_file=dirname($SCRIPT_FILENAME)."/.htusers"; |
32 |
|
33 |
$cookie_name="docman_autologin"; |
34 |
$cookie_val=md5($htusers_file.$GLOBALS[REMOTE_ADDR]); |
35 |
$cookie_val_force=md5($htusers_file.$GLOBALS[REMOTE_USER]); |
36 |
|
37 |
if (isset($HTTP_COOKIE_VARS[$cookie_name]) && $HTTP_COOKIE_VARS[$cookie_name] == $cookie_val) { |
38 |
// no PHP_AUTH_PW set |
39 |
$login_allowed=1; |
40 |
} elseif (isset($HTTP_COOKIE_VARS[$cookie_name]) && $HTTP_COOKIE_VARS[$cookie_name] == $cookie_val_force) { |
41 |
// PHP_AUTH_PW is set, force login! |
42 |
$force_login_allowed=1; |
43 |
} else { |
44 |
$login_allowed=0; |
45 |
} |
46 |
|
47 |
$force_login_allowed=0; |
48 |
|
49 |
$htusers=fopen($htusers_file,"r"); |
50 |
while($user = fgetcsv($htusers,255,":")) { |
51 |
if ( $user[2]=="auth_header" ) { |
52 |
$tmp = explode("=",$user[0]); |
53 |
if (stristr($tmp[0],"REMOTE_ADDR") && $tmp[1] == $GLOBALS[REMOTE_ADDR]) $login_allowed=1; |
54 |
elseif (stristr($tmp[0],"REMOTE_hostname")) { |
55 |
$remote_hostname=gethostbyaddr($GLOBALS[REMOTE_ADDR]); |
56 |
// remove everything after first dot |
57 |
$remote_hostname=substr($remote_hostname,0,strpos($remote_hostname,".")); |
58 |
if ($tmp[1] == $remote_hostname) $login_allowed=1; |
59 |
} elseif (stristr($tmp[0],"http_referer")) { |
60 |
//error_log("$tmp[0]: $tmp[1] ?? $GLOBALS[HTTP_REFERER]",0); |
61 |
if (isset($GLOBALS[HTTP_REFERER]) && stristr($GLOBALS[HTTP_REFERER],$tmp[1])) { |
62 |
setcookie($cookie_name,$cookie_val_force,time()+3600); |
63 |
$login_allowed=1; |
64 |
//error_log("$tmp[0]: $tmp[1] == $GLOBALS[HTTP_REFERER]",0); |
65 |
} |
66 |
} elseif (stristr($tmp[0],"remote_user") && isset($GLOBALS[AUTH_TYPE]) && isset($GLOBALS[REMOTE_USER])) { |
67 |
if ($GLOBALS[REMOTE_USER] == $tmp[1]) { |
68 |
$force_login_allowed=1; |
69 |
} |
70 |
|
71 |
} |
72 |
//error_log("$tmp[0]: $tmp[1] == $GLOBALS[REMOTE_USER] go!go!go! $login_allowed|$force_login_allowed|$PHP_AUTH_PW",0); |
73 |
if (($login_allowed && !isset($GLOBALS[gblPasswd])) || ($force_login_allowed && isset($GLOBALS[gblPasswd]))) { |
74 |
$gblUserName=$user[1]; |
75 |
// make fake login credentials |
76 |
$GLOBALS[gblPasswd]=$GLOBALS[gblLogin]=$user[0]; |
77 |
$secHash=md5($GLOBALS[gblLogin].$GLOBALS[gblPasswd]); |
78 |
$gblEmail=$user[3]; |
79 |
break ; |
80 |
} |
81 |
} |
82 |
} |
83 |
fclose($htusers); |
84 |
|
85 |
?> |