Server IP : 195.201.23.43 / Your IP : 3.145.164.105 Web Server : Apache System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64 User : kdecoratie ( 1041) PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/webmin/passwd/ |
Upload File : |
=head1 passwd-lib.pl Functions to support the change passwords module. Some example code : foreign_require('passwd', 'passwd-lib.pl'); $user = passwd::find_user('joe'); if ($user) { passwd::change_password($user, 'smeg', 0); } =cut BEGIN { push(@INC, ".."); }; use WebminCore; &init_config(); %access = &get_module_acl(); $rate_limit_file = "$module_var_directory/rate-limit"; $rate_limit_timeout = 10*60; # 10 minutes $rate_limit_max = 10; =head2 can_edit_passwd(&user) Returns 1 if the current Webmin user can change the password for the Unix user whose details are in the given hash ref, which is in the format returned by useradmin::list_users. =cut sub can_edit_passwd { if ($access{'self'} && $_[0]->[0] eq $remote_user) { # Self-editing override is enabled return 1; } if ($access{'mode'} == 0) { # Can change any return 1; } elsif ($access{'mode'} == 3) { # Only own password return $_[0]->[0] eq $remote_user; } elsif ($access{'mode'} == 4) { # UID within range return (!$access{'low'} || $_[0]->[2] >= $access{'low'}) && (!$access{'high'} || $_[0]->[2] <= $access{'high'}); } elsif ($access{'mode'} == 5) { # Member of some group (except for exclusion list) return 0 if (&indexof($_[0]->[0], split(/\s+/, $access{'notusers'})) >= 0); local $g = getgrgid($_[0]->[3]); return 1 if (&indexof($g, split(/\s+/, $access{'groups'})) >= 0); if ($access{'sec'}) { local $gname; foreach $gname (split(/\s+/, $access{'groups'})) { local @g = getgrnam($gname); return 1 if (&indexof($_[0]->[0], split(/\s+/, $g[3])) >= 0); } } return 0; } elsif ($access{'mode'} == 6) { # Users matching regexp return $_[0]->[0] =~ /$access{'users'}/; } else { # Users on / not on some list local $idx = &indexof($_[0]->[0], split(/\s+/, $access{'users'})); return $access{'mode'} == 1 && $idx >= 0 || $access{'mode'} == 2 && $idx < 0; } } =head2 find_user(name) Looks up the user structure for some name, in the useradmin, ldap-useradmin and nis modules, and returns it. =cut sub find_user { local $mod; foreach $mod ([ "useradmin", "user-lib.pl" ], [ "ldap-useradmin", "ldap-useradmin-lib.pl" ], ) { next if (!&foreign_installed($mod->[0], 1)); &foreign_require($mod->[0], $mod->[1]); local @ulist = &foreign_call($mod->[0], "list_users"); local ($user) = grep { $_->{'user'} eq $_[0] } @ulist; if ($user) { $user->{'mod'} = $mod->[0]; return $user; } } return undef; } =head2 change_password(&user, pass, do-others) Updates a user's password. The required parameters are : =item user - A hash ref of user details, in the format supplied by find_user. =item pass - The new password, in plain text. =item do-others - If set to 1, the password is changed in other Webmin modules too. =cut sub change_password { local ($user, $pass, $others) = @_; local $mod = $user->{'mod'} || "useradmin"; local $pft = $mod eq "useradmin" ? &useradmin::passfiles_type() : $mod eq "ldap-useradmin" ? 1 : 0; # Do the change! $user->{'olduser'} = $user->{'user'}; $user->{'pass'} = &foreign_call($mod, "encrypt_password", $pass); $user->{'passmode'} = 3; # Modification ALain De Witte - on change of the password set # ADMCHG flag for AIX $user->{'admchg'} = 1; $user->{'plainpass'} = $pass; if ($pft == 2 || $pft == 5) { if ($in{'expire'}) { $user->{'change'} = 0; } else { $user->{'change'} = int(time() / (60*60*24)); } } elsif ($pft == 4) { $user->{'change'} = time(); } &foreign_call($mod, "lock_user_files"); &foreign_call($mod, "set_user_envs", $user, 'MODIFY_USER', $in{'new'}); &foreign_call($mod, "making_changes"); &foreign_call($mod, "modify_user", $user, $user); &foreign_call($mod, "made_changes"); &foreign_call($mod, "unlock_user_files"); if ($others) { &foreign_call($mod, "other_modules", "useradmin_modify_user", $user); } } # apply_rate_limit(key) # Delays for some amount of time based on the key, to prevent brute force attacks sub apply_rate_limit { my ($key) = @_; my $now = time(); my %rate; &lock_file($rate_limit_file); &read_file($rate_limit_file, \%rate); $rate{$key."_last"} ||= $now; if ($now - $rate{$key."_last"} > $rate_limit_timeout) { # Time since blocking for this key started as expired delete($rate{$key}); delete($rate{$key."_last"}); } my $rv; if ($rate{$key} > $rate_limit_max) { $rv = "Too many failures for $key"; } else { sleep(2 ** $rate{$key}); $rate{$key}++; } &write_file($rate_limit_file, \%rate); &unlock_file($rate_limit_file); return $rv; } # clear_rate_limit(key) # After a successful operation, clear any rate limits for the given key sub clear_rate_limit { my ($key) = @_; my %rate; &lock_file($rate_limit_file); &read_file($rate_limit_file, \%rate); delete($rate{$key}); delete($rate{$key."_last"}); &write_file($rate_limit_file, \%rate); &unlock_file($rate_limit_file); } 1;Private