| OLD | NEW |
| (Empty) | |
| 1 # |
| 2 # Licensed to the Apache Software Foundation (ASF) under one or more |
| 3 # contributor license agreements. See the NOTICE file distributed with |
| 4 # this work for additional information regarding copyright ownership. |
| 5 # The ASF licenses this file to You under the Apache License, Version 2.0 |
| 6 # (the "License"); you may not use this file except in compliance with |
| 7 # the License. You may obtain a copy of the License at |
| 8 # |
| 9 # http://www.apache.org/licenses/LICENSE-2.0 |
| 10 # |
| 11 # Unless required by applicable law or agreed to in writing, software |
| 12 # distributed under the License is distributed on an "AS IS" BASIS, |
| 13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 14 # See the License for the specific language governing permissions and |
| 15 # limitations under the License. |
| 16 |
| 17 #for more functionality see the HTTPD::UserAdmin module: |
| 18 # http://www.perl.com/CPAN/modules/by-module/HTTPD/HTTPD-Tools-x.xx.tar.gz |
| 19 # |
| 20 # usage: dbmmanage <DBMfile> <command> <user> <password> <groups> <comment> |
| 21 |
| 22 package dbmmanage; |
| 23 # -ldb -lndbm -lgdbm -lsdbm |
| 24 BEGIN { @AnyDBM_File::ISA = qw(SDBM_File) } |
| 25 use strict; |
| 26 use Fcntl; |
| 27 use AnyDBM_File (); |
| 28 |
| 29 sub usage { |
| 30 my $cmds = join "|", sort keys %dbmc::; |
| 31 die <<SYNTAX; |
| 32 Usage: dbmmanage [enc] dbname command [username [pw [group[,group] [comment]]]] |
| 33 |
| 34 where enc is -d for crypt encryption (default except on Win32, Netware) |
| 35 -m for MD5 encryption (default on Win32, Netware) |
| 36 -s for SHA1 encryption |
| 37 -p for plaintext |
| 38 |
| 39 command is one of: $cmds |
| 40 |
| 41 pw of . for update command retains the old password |
| 42 pw of - (or blank) for update command prompts for the password |
| 43 |
| 44 groups or comment of . (or blank) for update command retains old values |
| 45 groups or comment of - for update command clears the existing value |
| 46 groups or comment of - for add and adduser commands is the empty value |
| 47 SYNTAX |
| 48 } |
| 49 |
| 50 sub need_sha1_crypt { |
| 51 if (!eval ('require "Digest/SHA1.pm";')) { |
| 52 print STDERR <<SHAERR; |
| 53 dbmmanage SHA1 passwords require the interface or the module Digest::SHA1 |
| 54 available from CPAN: |
| 55 |
| 56 http://www.cpan.org/modules/by-module/Digest/Digest-MD5-2.12.tar.gz |
| 57 |
| 58 Please install Digest::SHA1 and try again, or use a different crypt option: |
| 59 |
| 60 SHAERR |
| 61 usage(); |
| 62 } |
| 63 } |
| 64 |
| 65 sub need_md5_crypt { |
| 66 if (!eval ('require "Crypt/PasswdMD5.pm";')) { |
| 67 print STDERR <<MD5ERR; |
| 68 dbmmanage MD5 passwords require the module Crypt::PasswdMD5 available from CPAN |
| 69 |
| 70 http://www.cpan.org/modules/by-module/Crypt/Crypt-PasswdMD5-1.1.tar.gz |
| 71 |
| 72 Please install Crypt::PasswdMD5 and try again, or use a different crypt option: |
| 73 |
| 74 MD5ERR |
| 75 usage(); |
| 76 } |
| 77 } |
| 78 |
| 79 # if your osname is in $newstyle_salt, then use new style salt (starts with '_'
and contains |
| 80 # four bytes of iteration count and four bytes of salt). Otherwise, just use |
| 81 # the traditional two-byte salt. |
| 82 # see the man page on your system to decide if you have a newer crypt() lib. |
| 83 # I believe that 4.4BSD derived systems do (at least BSD/OS 2.0 does). |
| 84 # The new style crypt() allows up to 20 characters of the password to be |
| 85 # significant rather than only 8. |
| 86 # |
| 87 my $newstyle_salt_platforms = join '|', qw{bsdos}; #others? |
| 88 my $newstyle_salt = $^O =~ /(?:$newstyle_salt_platforms)/; |
| 89 |
| 90 # Some platforms just can't crypt() for Apache |
| 91 # |
| 92 my $crypt_not_supported_platforms = join '|', qw{MSWin32 NetWare}; #others? |
| 93 my $crypt_not_supported = $^O =~ /(?:$crypt_not_supported_platforms)/; |
| 94 |
| 95 my $crypt_method = "crypt"; |
| 96 |
| 97 if ($crypt_not_supported) { |
| 98 $crypt_method = "md5"; |
| 99 } |
| 100 |
| 101 # Some platforms won't jump through our favorite hoops |
| 102 # |
| 103 my $not_unix_platforms = join '|', qw{MSWin32 NetWare}; #others? |
| 104 my $not_unix = $^O =~ /(?:$not_unix_platforms)/; |
| 105 |
| 106 if ($crypt_not_supported) { |
| 107 $crypt_method = "md5"; |
| 108 } |
| 109 |
| 110 if (@ARGV[0] eq "-d") { |
| 111 shift @ARGV; |
| 112 if ($crypt_not_supported) { |
| 113 print STDERR |
| 114 "Warning: Apache/$^O does not support crypt()ed passwords!\n\n"; |
| 115 } |
| 116 $crypt_method = "crypt"; |
| 117 } |
| 118 |
| 119 if (@ARGV[0] eq "-m") { |
| 120 shift @ARGV; |
| 121 $crypt_method = "md5"; |
| 122 } |
| 123 |
| 124 if (@ARGV[0] eq "-p") { |
| 125 shift @ARGV; |
| 126 if (!$crypt_not_supported) { |
| 127 print STDERR |
| 128 "Warning: Apache/$^O does not support plaintext passwords!\n\n"; |
| 129 } |
| 130 $crypt_method = "plain"; |
| 131 } |
| 132 |
| 133 if (@ARGV[0] eq "-s") { |
| 134 shift @ARGV; |
| 135 need_sha1_crypt(); |
| 136 $crypt_method = "sha1"; |
| 137 } |
| 138 |
| 139 if ($crypt_method eq "md5") { |
| 140 need_md5_crypt(); |
| 141 } |
| 142 |
| 143 my($file,$command,$key,$crypted_pwd,$groups,$comment) = @ARGV; |
| 144 |
| 145 usage() unless $file and $command and defined &{$dbmc::{$command}}; |
| 146 |
| 147 # remove extension if any |
| 148 my $chop = join '|', qw{db.? pag dir}; |
| 149 $file =~ s/\.($chop)$//; |
| 150 |
| 151 my $is_update = $command eq "update"; |
| 152 my %DB = (); |
| 153 my @range = (); |
| 154 my($mode, $flags) = $command =~ |
| 155 /^(?:view|check)$/ ? (0644, O_RDONLY) : (0644, O_RDWR|O_CREAT); |
| 156 |
| 157 tie (%DB, "AnyDBM_File", $file, $flags, $mode) || die "Can't tie $file: $!"; |
| 158 dbmc->$command(); |
| 159 untie %DB; |
| 160 |
| 161 |
| 162 my $x; |
| 163 sub genseed { |
| 164 my $psf; |
| 165 if ($not_unix) { |
| 166 srand (time ^ $$ or time ^ ($$ + ($$ << 15))); |
| 167 } |
| 168 else { |
| 169 for (qw(-xlwwa -le)) { |
| 170 `ps $_ 2>/dev/null`; |
| 171 $psf = $_, last unless $?; |
| 172 } |
| 173 srand (time ^ $$ ^ unpack("%L*", `ps $psf | gzip -f`)); |
| 174 } |
| 175 @range = (qw(. /), '0'..'9','a'..'z','A'..'Z'); |
| 176 $x = int scalar @range; |
| 177 } |
| 178 |
| 179 sub randchar { |
| 180 join '', map $range[rand $x], 1..shift||1; |
| 181 } |
| 182 |
| 183 sub saltpw_crypt { |
| 184 genseed() unless @range; |
| 185 return $newstyle_salt ? |
| 186 join '', "_", randchar, "a..", randchar(4) : |
| 187 randchar(2); |
| 188 } |
| 189 |
| 190 sub cryptpw_crypt { |
| 191 my ($pw, $salt) = @_; |
| 192 $salt = saltpw_crypt unless $salt; |
| 193 crypt $pw, $salt; |
| 194 } |
| 195 |
| 196 sub saltpw_md5 { |
| 197 genseed() unless @range; |
| 198 randchar(8); |
| 199 } |
| 200 |
| 201 sub cryptpw_md5 { |
| 202 my($pw, $salt) = @_; |
| 203 $salt = saltpw_md5 unless $salt; |
| 204 Crypt::PasswdMD5::apache_md5_crypt($pw, $salt); |
| 205 } |
| 206 |
| 207 sub cryptpw_sha1 { |
| 208 my($pw, $salt) = @_; |
| 209 '{SHA}' . Digest::SHA1::sha1_base64($pw) . "="; |
| 210 } |
| 211 |
| 212 sub cryptpw { |
| 213 if ($crypt_method eq "md5") { |
| 214 return cryptpw_md5(@_); |
| 215 } elsif ($crypt_method eq "sha1") { |
| 216 return cryptpw_sha1(@_); |
| 217 } elsif ($crypt_method eq "crypt") { |
| 218 return cryptpw_crypt(@_); |
| 219 } |
| 220 @_[0]; # otherwise return plaintext |
| 221 } |
| 222 |
| 223 sub getpass { |
| 224 my $prompt = shift || "Enter password:"; |
| 225 |
| 226 unless($not_unix) { |
| 227 open STDIN, "/dev/tty" or warn "couldn't open /dev/tty $!\n"; |
| 228 system "stty -echo;"; |
| 229 } |
| 230 |
| 231 my($c,$pwd); |
| 232 print STDERR $prompt; |
| 233 while (($c = getc(STDIN)) ne '' and $c ne "\n" and $c ne "\r") { |
| 234 $pwd .= $c; |
| 235 } |
| 236 |
| 237 system "stty echo" unless $not_unix; |
| 238 print STDERR "\n"; |
| 239 die "Can't use empty password!\n" unless length $pwd; |
| 240 return $pwd; |
| 241 } |
| 242 |
| 243 sub dbmc::update { |
| 244 die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key}; |
| 245 $crypted_pwd = (split /:/, $DB{$key}, 3)[0] if $crypted_pwd eq '.'; |
| 246 $groups = (split /:/, $DB{$key}, 3)[1] if !$groups || $groups eq '.'; |
| 247 $comment = (split /:/, $DB{$key}, 3)[2] if !$comment || $comment eq '.'; |
| 248 if (!$crypted_pwd || $crypted_pwd eq '-') { |
| 249 dbmc->adduser; |
| 250 } |
| 251 else { |
| 252 dbmc->add; |
| 253 } |
| 254 } |
| 255 |
| 256 sub dbmc::add { |
| 257 die "Can't use empty password!\n" unless $crypted_pwd; |
| 258 unless($is_update) { |
| 259 die "Sorry, user `$key' already exists!\n" if $DB{$key}; |
| 260 } |
| 261 $groups = '' if $groups eq '-'; |
| 262 $comment = '' if $comment eq '-'; |
| 263 $groups .= ":" . $comment if $comment; |
| 264 $crypted_pwd .= ":" . $groups if $groups; |
| 265 $DB{$key} = $crypted_pwd; |
| 266 my $action = $is_update ? "updated" : "added"; |
| 267 print "User $key $action with password encrypted to $DB{$key} using $crypt_m
ethod\n"; |
| 268 } |
| 269 |
| 270 sub dbmc::adduser { |
| 271 my $value = getpass "New password:"; |
| 272 die "They don't match, sorry.\n" unless getpass("Re-type new password:") eq
$value; |
| 273 $crypted_pwd = cryptpw $value; |
| 274 dbmc->add; |
| 275 } |
| 276 |
| 277 sub dbmc::delete { |
| 278 die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key}; |
| 279 delete $DB{$key}, print "`$key' deleted\n"; |
| 280 } |
| 281 |
| 282 sub dbmc::view { |
| 283 print $key ? "$key:$DB{$key}\n" : map { "$_:$DB{$_}\n" if $DB{$_} } keys %DB
; |
| 284 } |
| 285 |
| 286 sub dbmc::check { |
| 287 die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key}; |
| 288 my $chkpass = (split /:/, $DB{$key}, 3)[0]; |
| 289 my $testpass = getpass(); |
| 290 if (substr($chkpass, 0, 6) eq '$apr1$') { |
| 291 need_md5_crypt; |
| 292 $crypt_method = "md5"; |
| 293 } elsif (substr($chkpass, 0, 5) eq '{SHA}') { |
| 294 need_sha1_crypt; |
| 295 $crypt_method = "sha1"; |
| 296 } elsif (length($chkpass) == 13 && $chkpass ne $testpass) { |
| 297 $crypt_method = "crypt"; |
| 298 } else { |
| 299 $crypt_method = "plain"; |
| 300 } |
| 301 print $crypt_method . (cryptpw($testpass, $chkpass) eq $chkpass |
| 302 ? " password ok\n" : " password mismatch\n"); |
| 303 } |
| 304 |
| 305 sub dbmc::import { |
| 306 while(defined($_ = <STDIN>) and chomp) { |
| 307 ($key,$crypted_pwd,$groups,$comment) = split /:/, $_, 4; |
| 308 dbmc->add; |
| 309 } |
| 310 } |
| 311 |
| OLD | NEW |