* @author Michael Bretterklieber * @copyright 2003-2005 Michael Wallner * @license http://www.php.net/license/3_0.txt PHP License 3.0 * @version CVS: $Id: Smb.php,v 1.18 2005/05/06 10:22:48 mike Exp $ * @link http://pear.php.net/package/File_Passwd */ /** * Requires File::Passwd::Common */ require_once 'File/Passwd/Common.php'; /** * Requires Crypt::CHAP */ require_once 'Crypt/CHAP.php'; /** * Manipulate SMB server passwd files. * * # Usage Example 1 (modifying existing file): * * $f = &File_Passwd::factory('SMB'); * $f->setFile('./smbpasswd'); * $f->load(); * $f->addUser('sepp3', 'MyPw', array('userid' => 12)); * $f->changePasswd('sepp', 'MyPw'); * $f->delUser('karli'); * foreach($f->listUser() as $user => $data) { * echo $user . ':' . implode(':', $data) ."\n"; * } * $f->save(); * * * # Usage Example 2 (creating a new file): * * $f = &File_Passwd::factory('SMB'); * $f->setFile('./smbpasswd'); * $f->addUser('sepp1', 'MyPw', array('userid'=> 12)); * $f->addUser('sepp3', 'MyPw', array('userid' => 1000)); * $f->save(); * * * # Usage Example 3 (authentication): * * $f = &File_Passwd::factory('SMB'); * $f->setFile('./smbpasswd'); * $f->load(); * if (true === $f->verifyPasswd('sepp', 'MyPw')) { * echo "User valid"; * } else { * echo "User invalid or disabled"; * } * * * @author Michael Bretterklieber * @author Michael Wallner * @package File_Passwd * @version $Revision: 1.18 $ * @access public */ class File_Passwd_Smb extends File_Passwd_Common { /** * Object which generates the NT-Hash and LAN-Manager-Hash passwds * * @access protected * @var object */ var $msc; /** * Constructor * * @access public * @param string $file SMB passwd file */ function File_Passwd_Smb($file = 'smbpasswd') { File_Passwd_Smb::__construct($file); } /** * Constructor (ZE2) * * Rewritten because we want to init our crypt engine. * * @access public * @param string $file SMB passwd file */ function __construct($file = 'smbpasswd') { $this->setFile($file); $this->msc = &new Crypt_CHAP_MSv1; } /** * Fast authentication of a certain user * * Returns a PEAR_Error if: * o file doesn't exist * o file couldn't be opened in read mode * o file couldn't be locked exclusively * o file couldn't be unlocked (only if auth fails) * o file couldn't be closed (only if auth fails) * o invalid encryption method $nt_or_lm was provided * * @static call this method statically for a reasonable fast authentication * @access public * @return mixed true if authenticated, false if not or PEAR_Error * @param string $file path to passwd file * @param string $user user to authenticate * @param string $pass plaintext password * @param string $nt_or_lm encryption mode to use (NT or LM hash) */ function staticAuth($file, $user, $pass, $nt_or_lm = 'nt') { $line = File_Passwd_Common::_auth($file, $user); if (!$line || PEAR::isError($line)) { return $line; } @list(,,$lm,$nt) = explode(':', $line); $chap = &new Crypt_CHAP_MSv1; switch(strToLower($nt_or_lm)){ case FILE_PASSWD_NT: $real = $nt; $crypted = $chap->ntPasswordHash($pass); break; case FILE_PASSWD_LM: $real = $lm; $crypted = $chap->lmPasswordHash($pass); break; default: return PEAR::raiseError( sprintf(FILE_PASSWD_E_INVALID_ENC_MODE_STR, $nt_or_lm), FILE_PASSWD_E_INVALID_ENC_MODE ); } return (strToUpper(bin2hex($crypted)) === $real); } /** * Parse smbpasswd file * * Returns a PEAR_Error if passwd file has invalid format. * * @access public * @return mixed true on success or PEAR_Error */ function parse() { foreach ($this->_contents as $line){ $info = explode(':', $line); if (count($info) < 4) { return PEAR::raiseError( FILE_PASSWD_E_INVALID_FORMAT_STR, FILE_PASSWD_E_INVALID_FORMAT ); } $user = array_shift($info); if (!empty($user)) { array_walk($info, 'trim'); $this->_users[$user] = @array( 'userid' => $info[0], 'lmhash' => $info[1], 'nthash' => $info[2], 'flags' => $info[3], 'lct' => $info[4], 'comment' => $info[5] ); } } $this->_contents = array(); return true; } /** * Add a user * * Returns a PEAR_Error if: * o user already exists * o user contains illegal characters * * @throws PEAR_Error * @return mixed true on success or PEAR_Error * @access public * @param string $user the user to add * @param string $pass the new plaintext password * @param array $params additional properties of user * + userid * + comment * @param boolean $isMachine whether to add an machine account */ function addUser($user, $pass, $params, $isMachine = false) { if ($this->userExists($user)) { return PEAR::raiseError( sprintf(FILE_PASSWD_E_EXISTS_ALREADY_STR, 'User ', $user), FILE_PASSWD_E_EXISTS_ALREADY ); } if (!preg_match($this->_pcre, $user)) { return PEAR::raiseError( sprintf(FILE_PASSWD_E_INVALID_CHARS_STR, 'User ', $user), FILE_PASSWD_E_INVALID_CHARS ); } if ($isMachine) { $flags = '[W ]'; $user .= '$'; } else { $flags = '[U ]'; } $this->_users[$user] = array( 'flags' => $flags, 'userid' => (int)@$params['userid'], 'comment' => trim(@$params['comment']), 'lct' => 'LCT-' . strToUpper(dechex(time())) ); return $this->changePasswd($user, $pass); } /** * Modify a certain user * * You should not modify the password with this method * unless it is already encrypted as nthash and lmhash! * * Returns a PEAR_Error if: * o user doesn't exist * o an invalid property was supplied * * @throws PEAR_Error * @access public * @return mixed true on success or PEAR_Error * @param string $user the user to modify * @param array $params an associative array of properties to change */ function modUser($user, $params) { if (!$this->userExists($user)) { return PEAR::raiseError( sprintf(FILE_PASSWD_E_EXISTS_NOT_STR, 'User ', $user), FILE_PASSWD_E_EXISTS_NOT ); } if (!preg_match($this->_pcre, $user)) { return PEAR::raiseError( sprintf(FILE_PASSWD_E_INVALID_CHARS_STR, 'User ', $user), FILE_PASSWD_E_INVALID_CHARS ); } foreach ($params as $key => $value){ $key = strToLower($key); if (!isset($this->_users[$user][$key])) { return PEAR::raiseError( sprintf(FILE_PASSWD_E_INVALID_PROPERTY_STR, $key), FILE_PASSWD_E_INVALID_PROPERTY ); } $this->_users[$user][$key] = trim($value); $this->_users[$user]['lct']= 'LCT-' . strToUpper(dechex(time())); } return true; } /** * Change the passwd of a certain user * * Returns a PEAR_Error if $user doesn't exist. * * @throws PEAR_Error * @access public * @return mixed true on success or PEAR_Error * @param string $user the user whose passwd should be changed * @param string $pass the new plaintext passwd */ function changePasswd($user, $pass) { if (!$this->userExists($user)) { return PEAR::raiseError( sprintf(FILE_PASSWD_E_EXISTS_NOT_STR, 'User ', $user), FILE_PASSWD_E_EXISTS_NOT ); } if (empty($pass)) { $nthash = $lmhash = 'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX'; } else { $nthash = strToUpper(bin2hex($this->msc->ntPasswordHash($pass))); $lmhash = strToUpper(bin2hex($this->msc->lmPasswordHash($pass))); } $this->_users[$user]['nthash'] = $nthash; $this->_users[$user]['lmhash'] = $lmhash; return true; } /** * Verifies a user's password * * Prefer NT-Hash instead of weak LAN-Manager-Hash * * Returns a PEAR_Error if: * o user doesn't exist * o user is disabled * * @return mixed true if passwds equal, false if they don't or PEAR_Error * @access public * @param string $user username * @param string $nthash NT-Hash in hex * @param string $lmhash LAN-Manager-Hash in hex */ function verifyEncryptedPasswd($user, $nthash, $lmhash = '') { if (!$this->userExists($user)) { return PEAR::raiseError( sprintf(FILE_PASSWD_E_EXISTS_NOT_STR, 'User ', $user), FILE_PASSWD_E_EXISTS_NOT ); } if (strstr($this->_users[$user]['flags'], 'D')) { return PEAR::raiseError("User '$user' is disabled.", 0); } if (!empty($nthash)) { return $this->_users[$user]['nthash'] === strToUpper($nthash); } if (!empty($lmhash)) { return $this->_users[$user]['lm'] === strToUpper($lmhash); } return false; } /** * Verifies an account with the given plaintext password * * Returns a PEAR_Error if: * o user doesn't exist * o user is disabled * * @throws PEAR_Error * @return mixed true if passwds equal, false if they don't or PEAR_Error * @access public * @param string $user username * @param string $pass the plaintext password */ function verifyPasswd($user, $pass) { $nthash = bin2hex($this->msc->ntPasswordHash($pass)); $lmhash = bin2hex($this->msc->lmPasswordHash($pass)); return $this->verifyEncryptedPasswd($user, $nthash, $lmhash); } /** * Apply changes and rewrite CVS passwd file * * Returns a PEAR_Error if: * o directory in which the file should reside couldn't be created * o file couldn't be opened in write mode * o file couldn't be locked exclusively * o file couldn't be unlocked * o file couldn't be closed * * @throws PEAR_Error * @access public * @return mixed true on success or PEAR_Error */ function save() { $content = ''; foreach ($this->_users as $user => $userdata) { $content .= $user . ':' . $userdata['userid'] . ':' . $userdata['lmhash'] . ':' . $userdata['nthash'] . ':' . $userdata['flags'] . ':' . $userdata['lct'] . ':' . $userdata['comment']. "\n"; } return $this->_save($content); } /** * Generate Password * * @static * @access public * @return string The crypted password. * @param string $pass The plaintext password. * @param string $mode The encryption mode to use (nt|lm). */ function generatePasswd($pass, $mode = 'nt') { $chap = &new Crypt_CHAP_MSv1; $hash = strToLower($mode) == 'nt' ? $chap->ntPasswordHash($pass) : $chap->lmPasswordHash($pass); return strToUpper(bin2hex($hash)); } /** * @ignore * @deprecated */ function generatePassword($pass, $mode = 'nt') { return File_Passwd_Smb::generatePasswd($pass, $mode); } } ?>