pve-access-control/PVE/Auth/LDAP.pm
Thomas Lamprecht 3b7eaef10f ldaps: support TLS 1.3 as SSL version
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
2019-11-06 20:24:00 +01:00

157 lines
3.8 KiB
Perl
Executable File

package PVE::Auth::LDAP;
use strict;
use warnings;
use PVE::Tools;
use PVE::Auth::Plugin;
use Net::LDAP;
use Net::IP;
use base qw(PVE::Auth::Plugin);
sub type {
return 'ldap';
}
sub properties {
return {
base_dn => {
description => "LDAP base domain name",
type => 'string',
pattern => '\w+=[^,]+(,\s*\w+=[^,]+)*',
optional => 1,
maxLength => 256,
},
user_attr => {
description => "LDAP user attribute name",
type => 'string',
pattern => '\S{2,}',
optional => 1,
maxLength => 256,
},
bind_dn => {
description => "LDAP bind domain name",
type => 'string',
pattern => '\w+=[^,]+(,\s*\w+=[^,]+)*',
optional => 1,
maxLength => 256,
},
verify => {
description => "Verify the server's SSL certificate",
type => 'boolean',
optional => 1,
default => 0,
},
capath => {
description => "Path to the CA certificate store",
type => 'string',
optional => 1,
default => '/etc/ssl/certs',
},
cert => {
description => "Path to the client certificate",
type => 'string',
optional => 1,
},
certkey => {
description => "Path to the client certificate key",
type => 'string',
optional => 1,
},
};
}
sub options {
return {
server1 => {},
server2 => { optional => 1 },
base_dn => {},
bind_dn => { optional => 1 },
user_attr => {},
port => { optional => 1 },
secure => { optional => 1 },
sslversion => { optional => 1 },
default => { optional => 1 },
comment => { optional => 1 },
tfa => { optional => 1 },
verify => { optional => 1 },
capath => { optional => 1 },
cert => { optional => 1 },
certkey => { optional => 1 },
};
}
my $authenticate_user_ldap = sub {
my ($config, $server, $username, $password, $realm) = @_;
my $default_port = $config->{secure} ? 636: 389;
my $port = $config->{port} ? $config->{port} : $default_port;
my $scheme = $config->{secure} ? 'ldaps' : 'ldap';
$server = "[$server]" if Net::IP::ip_is_ipv6($server);
my $conn_string = "$scheme://${server}:$port";
my %ldap_args;
if ($config->{verify}) {
$ldap_args{verify} = 'require';
if (defined(my $cert = $config->{cert})) {
$ldap_args{clientcert} = $cert;
}
if (defined(my $key = $config->{certkey})) {
$ldap_args{clientkey} = $key;
}
if (defined(my $capath = $config->{capath})) {
if (-d $capath) {
$ldap_args{capath} = $capath;
} else {
$ldap_args{cafile} = $capath;
}
}
} else {
$ldap_args{verify} = 'none';
}
if ($config->{secure}) {
$ldap_args{sslversion} = $config->{sslversion} || 'tlsv1_2';
}
my $ldap = Net::LDAP->new($conn_string, %ldap_args) || die "$@\n";
if (my $bind_dn = $config->{bind_dn}) {
my $bind_pass = PVE::Tools::file_read_firstline("/etc/pve/priv/ldap/${realm}.pw");
die "missing password for realm $realm\n" if !defined($bind_pass);
my $res = $ldap->bind($bind_dn, password => $bind_pass);
my $code = $res->code();
my $err = $res->error;
die "failed to authenticate to ldap service: $err\n" if ($code);
}
my $search = $config->{user_attr} . "=" . $username;
my $result = $ldap->search( base => "$config->{base_dn}",
scope => "sub",
filter => "$search",
attrs => ['dn']
);
die "no entries returned\n" if !$result->entries;
my @entries = $result->entries;
my $res = $ldap->bind($entries[0]->dn, password => $password);
my $code = $res->code();
my $err = $res->error;
$ldap->unbind();
die "$err\n" if ($code);
};
sub authenticate_user {
my ($class, $config, $realm, $username, $password) = @_;
eval { &$authenticate_user_ldap($config, $config->{server1}, $username, $password, $realm); };
my $err = $@;
return 1 if !$err;
die $err if !$config->{server2};
&$authenticate_user_ldap($config, $config->{server2}, $username, $password, $realm);
}
1;