functions.inc.php 44 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
  5. }
  6. function hasDomainAccess($username, $role, $domain) {
  7. global $pdo;
  8. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  9. return false;
  10. }
  11. if (empty($domain) || !is_valid_domain_name($domain)) {
  12. return false;
  13. }
  14. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  15. return false;
  16. }
  17. try {
  18. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  19. WHERE (
  20. `active`='1'
  21. AND `username` = :username
  22. AND (`domain` = :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2))
  23. )
  24. OR 'admin' = :role");
  25. $stmt->execute(array(':username' => $username, ':domain1' => $domain, ':domain2' => $domain, ':role' => $role));
  26. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  27. }
  28. catch(PDOException $e) {
  29. $_SESSION['return'] = array(
  30. 'type' => 'danger',
  31. 'msg' => 'MySQL: '.$e
  32. );
  33. return false;
  34. }
  35. if (!empty($num_results)) {
  36. return true;
  37. }
  38. return false;
  39. }
  40. function hasMailboxObjectAccess($username, $role, $object) {
  41. global $pdo;
  42. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  43. return false;
  44. }
  45. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  46. return false;
  47. }
  48. if ($username == $object) {
  49. return true;
  50. }
  51. try {
  52. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :object");
  53. $stmt->execute(array(':object' => $object));
  54. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  55. if (isset($row['domain']) && hasDomainAccess($username, $role, $row['domain'])) {
  56. return true;
  57. }
  58. }
  59. catch(PDOException $e) {
  60. error_log($e);
  61. return false;
  62. }
  63. return false;
  64. }
  65. function verify_ssha256($hash, $password) {
  66. // Remove tag if any
  67. $hash = ltrim($hash, '{SSHA256}');
  68. // Decode hash
  69. $dhash = base64_decode($hash);
  70. // Get first 32 bytes of binary which equals a SHA256 hash
  71. $ohash = substr($dhash, 0, 32);
  72. // Remove SHA256 hash from decoded hash to get original salt string
  73. $osalt = str_replace($ohash, '', $dhash);
  74. // Check single salted SHA256 hash against extracted hash
  75. if (hash('sha256', $password . $osalt, true) == $ohash) {
  76. return true;
  77. }
  78. else {
  79. return false;
  80. }
  81. }
  82. function doveadm_authenticate($hash, $algorithm, $password) {
  83. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  84. $pipes = array();
  85. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  86. if (is_resource($process)) {
  87. fputs($pipes[0], $password);
  88. fclose($pipes[0]);
  89. while ($f = fgets($pipes[1])) {
  90. if (preg_match('/(verified)/', $f)) {
  91. proc_close($process);
  92. return true;
  93. }
  94. return false;
  95. }
  96. fclose($pipes[1]);
  97. while ($f = fgets($pipes[2])) {
  98. proc_close($process);
  99. return false;
  100. }
  101. fclose($pipes[2]);
  102. proc_close($process);
  103. }
  104. return false;
  105. }
  106. function check_login($user, $pass) {
  107. global $pdo;
  108. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  109. return false;
  110. }
  111. $user = strtolower(trim($user));
  112. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  113. WHERE `superadmin` = '1'
  114. AND `username` = :user");
  115. $stmt->execute(array(':user' => $user));
  116. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  117. foreach ($rows as $row) {
  118. if (verify_ssha256($row['password'], $pass)) {
  119. if (get_tfa($user)['name'] != "none") {
  120. $_SESSION['pending_mailcow_cc_username'] = $user;
  121. $_SESSION['pending_mailcow_cc_role'] = "admin";
  122. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  123. unset($_SESSION['ldelay']);
  124. return "pending";
  125. }
  126. else {
  127. unset($_SESSION['ldelay']);
  128. return "admin";
  129. }
  130. }
  131. }
  132. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  133. WHERE `superadmin` = '0'
  134. AND `active`='1'
  135. AND `username` = :user");
  136. $stmt->execute(array(':user' => $user));
  137. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  138. foreach ($rows as $row) {
  139. if (verify_ssha256($row['password'], $pass) !== false) {
  140. if (get_tfa($user)['name'] != "none") {
  141. $_SESSION['pending_mailcow_cc_username'] = $user;
  142. $_SESSION['pending_mailcow_cc_role'] = "domainadmin";
  143. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  144. unset($_SESSION['ldelay']);
  145. return "pending";
  146. }
  147. else {
  148. unset($_SESSION['ldelay']);
  149. $stmt = $pdo->prepare("UPDATE `tfa` SET `active`='1' WHERE `username` = :user");
  150. $stmt->execute(array(':user' => $user));
  151. return "domainadmin";
  152. }
  153. }
  154. }
  155. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  156. WHERE `kind` NOT REGEXP 'location|thing|group'
  157. AND `active`='1'
  158. AND `username` = :user");
  159. $stmt->execute(array(':user' => $user));
  160. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  161. foreach ($rows as $row) {
  162. if (verify_ssha256($row['password'], $pass) !== false) {
  163. unset($_SESSION['ldelay']);
  164. return "user";
  165. }
  166. }
  167. if (!isset($_SESSION['ldelay'])) {
  168. $_SESSION['ldelay'] = "0";
  169. }
  170. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  171. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  172. error_log("Mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  173. }
  174. sleep($_SESSION['ldelay']);
  175. }
  176. function formatBytes($size, $precision = 2) {
  177. if(!is_numeric($size)) {
  178. return "0";
  179. }
  180. $base = log($size, 1024);
  181. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  182. if ($size == "0") {
  183. return "0";
  184. }
  185. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  186. }
  187. function edit_admin_account($postarray) {
  188. global $lang;
  189. global $pdo;
  190. if ($_SESSION['mailcow_cc_role'] != "admin") {
  191. $_SESSION['return'] = array(
  192. 'type' => 'danger',
  193. 'msg' => sprintf($lang['danger']['access_denied'])
  194. );
  195. return false;
  196. }
  197. $username_now = $_SESSION['mailcow_cc_username'];
  198. $username = $postarray['admin_user'];
  199. $password = $postarray['admin_pass'];
  200. $password2 = $postarray['admin_pass2'];
  201. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  202. $_SESSION['return'] = array(
  203. 'type' => 'danger',
  204. 'msg' => sprintf($lang['danger']['username_invalid'])
  205. );
  206. return false;
  207. }
  208. if (!empty($password) && !empty($password2)) {
  209. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  210. $_SESSION['return'] = array(
  211. 'type' => 'danger',
  212. 'msg' => sprintf($lang['danger']['password_complexity'])
  213. );
  214. return false;
  215. }
  216. if ($password != $password2) {
  217. $_SESSION['return'] = array(
  218. 'type' => 'danger',
  219. 'msg' => sprintf($lang['danger']['password_mismatch'])
  220. );
  221. return false;
  222. }
  223. $password_hashed = hash_password($password);
  224. try {
  225. $stmt = $pdo->prepare("UPDATE `admin` SET
  226. `password` = :password_hashed,
  227. `username` = :username1
  228. WHERE `username` = :username2");
  229. $stmt->execute(array(
  230. ':password_hashed' => $password_hashed,
  231. ':username1' => $username,
  232. ':username2' => $username_now
  233. ));
  234. }
  235. catch (PDOException $e) {
  236. $_SESSION['return'] = array(
  237. 'type' => 'danger',
  238. 'msg' => 'MySQL: '.$e
  239. );
  240. return false;
  241. }
  242. }
  243. else {
  244. try {
  245. $stmt = $pdo->prepare("UPDATE `admin` SET
  246. `username` = :username1
  247. WHERE `username` = :username2");
  248. $stmt->execute(array(
  249. ':username1' => $username,
  250. ':username2' => $username_now
  251. ));
  252. }
  253. catch (PDOException $e) {
  254. $_SESSION['return'] = array(
  255. 'type' => 'danger',
  256. 'msg' => 'MySQL: '.$e
  257. );
  258. return false;
  259. }
  260. }
  261. try {
  262. $stmt = $pdo->prepare("UPDATE `domain_admins` SET `domain` = 'ALL', `username` = :username1 WHERE `username` = :username2");
  263. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  264. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username1 WHERE `username` = :username2");
  265. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  266. }
  267. catch (PDOException $e) {
  268. $_SESSION['return'] = array(
  269. 'type' => 'danger',
  270. 'msg' => 'MySQL: '.$e
  271. );
  272. return false;
  273. }
  274. $_SESSION['mailcow_cc_username'] = $username;
  275. $_SESSION['return'] = array(
  276. 'type' => 'success',
  277. 'msg' => sprintf($lang['success']['admin_modified'])
  278. );
  279. }
  280. function edit_user_account($postarray) {
  281. global $lang;
  282. global $pdo;
  283. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  284. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  285. $_SESSION['return'] = array(
  286. 'type' => 'danger',
  287. 'msg' => sprintf($lang['danger']['access_denied'])
  288. );
  289. return false;
  290. }
  291. else {
  292. $username = $postarray['username'];
  293. }
  294. }
  295. else {
  296. $username = $_SESSION['mailcow_cc_username'];
  297. }
  298. $password_old = $postarray['user_old_pass'];
  299. if (isset($postarray['user_new_pass']) && isset($postarray['user_new_pass2'])) {
  300. $password_new = $postarray['user_new_pass'];
  301. $password_new2 = $postarray['user_new_pass2'];
  302. }
  303. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  304. WHERE `kind` NOT REGEXP 'location|thing|group'
  305. AND `username` = :user");
  306. $stmt->execute(array(':user' => $username));
  307. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  308. if (!verify_ssha256($row['password'], $password_old)) {
  309. $_SESSION['return'] = array(
  310. 'type' => 'danger',
  311. 'msg' => sprintf($lang['danger']['access_denied'])
  312. );
  313. return false;
  314. }
  315. if (isset($password_new) && isset($password_new2)) {
  316. if (!empty($password_new2) && !empty($password_new)) {
  317. if ($password_new2 != $password_new) {
  318. $_SESSION['return'] = array(
  319. 'type' => 'danger',
  320. 'msg' => sprintf($lang['danger']['password_mismatch'])
  321. );
  322. return false;
  323. }
  324. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  325. $_SESSION['return'] = array(
  326. 'type' => 'danger',
  327. 'msg' => sprintf($lang['danger']['password_complexity'])
  328. );
  329. return false;
  330. }
  331. $password_hashed = hash_password($password_new);
  332. try {
  333. $stmt = $pdo->prepare("UPDATE `mailbox` SET `password` = :password_hashed WHERE `username` = :username");
  334. $stmt->execute(array(
  335. ':password_hashed' => $password_hashed,
  336. ':username' => $username
  337. ));
  338. }
  339. catch (PDOException $e) {
  340. $_SESSION['return'] = array(
  341. 'type' => 'danger',
  342. 'msg' => 'MySQL: '.$e
  343. );
  344. return false;
  345. }
  346. }
  347. }
  348. $_SESSION['return'] = array(
  349. 'type' => 'success',
  350. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  351. );
  352. }
  353. function user_get_alias_details($username) {
  354. global $lang;
  355. global $pdo;
  356. if ($_SESSION['mailcow_cc_role'] == "user") {
  357. $username = $_SESSION['mailcow_cc_username'];
  358. }
  359. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  360. return false;
  361. }
  362. try {
  363. $data['address'] = $username;
  364. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') AS `aliases` FROM `alias`
  365. WHERE `goto` REGEXP :username_goto
  366. AND `address` NOT LIKE '@%'
  367. AND `address` != :username_address");
  368. $stmt->execute(array(':username_goto' => '(^|,)'.$username.'($|,)', ':username_address' => $username));
  369. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  370. while ($row = array_shift($run)) {
  371. $data['aliases'] = $row['aliases'];
  372. }
  373. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(local_part, '@', alias_domain SEPARATOR ', '), '&#10008;') AS `ad_alias` FROM `mailbox`
  374. LEFT OUTER JOIN `alias_domain` on `target_domain` = `domain`
  375. WHERE `username` = :username ;");
  376. $stmt->execute(array(':username' => $username));
  377. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  378. while ($row = array_shift($run)) {
  379. $data['ad_alias'] = $row['ad_alias'];
  380. }
  381. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` NOT LIKE '@%';");
  382. $stmt->execute(array(':username' => $username));
  383. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  384. while ($row = array_shift($run)) {
  385. $data['aliases_also_send_as'] = $row['send_as'];
  386. }
  387. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` LIKE '@%';");
  388. $stmt->execute(array(':username' => $username));
  389. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  390. while ($row = array_shift($run)) {
  391. $data['aliases_send_as_all'] = $row['send_as'];
  392. }
  393. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') as `address` FROM `alias` WHERE `goto` REGEXP :username AND `address` LIKE '@%';");
  394. $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)'));
  395. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  396. while ($row = array_shift($run)) {
  397. $data['is_catch_all'] = $row['address'];
  398. }
  399. return $data;
  400. }
  401. catch(PDOException $e) {
  402. $_SESSION['return'] = array(
  403. 'type' => 'danger',
  404. 'msg' => 'MySQL: '.$e
  405. );
  406. return false;
  407. }
  408. }
  409. function is_valid_domain_name($domain_name) {
  410. if (empty($domain_name)) {
  411. return false;
  412. }
  413. $domain_name = idn_to_ascii($domain_name);
  414. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  415. && preg_match("/^.{1,253}$/", $domain_name)
  416. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  417. }
  418. function add_domain_admin($postarray) {
  419. global $lang;
  420. global $pdo;
  421. $username = strtolower(trim($postarray['username']));
  422. $password = $postarray['password'];
  423. $password2 = $postarray['password2'];
  424. $domains = (array)$postarray['domains'];
  425. $active = intval($postarray['active']);
  426. if ($_SESSION['mailcow_cc_role'] != "admin") {
  427. $_SESSION['return'] = array(
  428. 'type' => 'danger',
  429. 'msg' => sprintf($lang['danger']['access_denied'])
  430. );
  431. return false;
  432. }
  433. if (empty($domains)) {
  434. $_SESSION['return'] = array(
  435. 'type' => 'danger',
  436. 'msg' => sprintf($lang['danger']['domain_invalid'])
  437. );
  438. return false;
  439. }
  440. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  441. $_SESSION['return'] = array(
  442. 'type' => 'danger',
  443. 'msg' => sprintf($lang['danger']['username_invalid'])
  444. );
  445. return false;
  446. }
  447. try {
  448. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  449. WHERE `username` = :username");
  450. $stmt->execute(array(':username' => $username));
  451. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  452. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  453. WHERE `username` = :username");
  454. $stmt->execute(array(':username' => $username));
  455. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  456. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  457. WHERE `username` = :username");
  458. $stmt->execute(array(':username' => $username));
  459. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  460. }
  461. catch(PDOException $e) {
  462. $_SESSION['return'] = array(
  463. 'type' => 'danger',
  464. 'msg' => 'MySQL: '.$e
  465. );
  466. return false;
  467. }
  468. foreach ($num_results as $num_results_each) {
  469. if ($num_results_each != 0) {
  470. $_SESSION['return'] = array(
  471. 'type' => 'danger',
  472. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  473. );
  474. return false;
  475. }
  476. }
  477. if (!empty($password) && !empty($password2)) {
  478. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  479. $_SESSION['return'] = array(
  480. 'type' => 'danger',
  481. 'msg' => sprintf($lang['danger']['password_complexity'])
  482. );
  483. return false;
  484. }
  485. if ($password != $password2) {
  486. $_SESSION['return'] = array(
  487. 'type' => 'danger',
  488. 'msg' => sprintf($lang['danger']['password_mismatch'])
  489. );
  490. return false;
  491. }
  492. $password_hashed = hash_password($password);
  493. foreach ($domains as $domain) {
  494. if (!is_valid_domain_name($domain)) {
  495. $_SESSION['return'] = array(
  496. 'type' => 'danger',
  497. 'msg' => sprintf($lang['danger']['domain_invalid'])
  498. );
  499. return false;
  500. }
  501. try {
  502. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  503. VALUES (:username, :domain, :created, :active)");
  504. $stmt->execute(array(
  505. ':username' => $username,
  506. ':domain' => $domain,
  507. ':created' => date('Y-m-d H:i:s'),
  508. ':active' => $active
  509. ));
  510. }
  511. catch (PDOException $e) {
  512. delete_domain_admin(array('username' => $username));
  513. $_SESSION['return'] = array(
  514. 'type' => 'danger',
  515. 'msg' => 'MySQL: '.$e
  516. );
  517. return false;
  518. }
  519. }
  520. try {
  521. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  522. VALUES (:username, :password_hashed, '0', :active)");
  523. $stmt->execute(array(
  524. ':username' => $username,
  525. ':password_hashed' => $password_hashed,
  526. ':active' => $active
  527. ));
  528. }
  529. catch (PDOException $e) {
  530. $_SESSION['return'] = array(
  531. 'type' => 'danger',
  532. 'msg' => 'MySQL: '.$e
  533. );
  534. return false;
  535. }
  536. }
  537. else {
  538. $_SESSION['return'] = array(
  539. 'type' => 'danger',
  540. 'msg' => sprintf($lang['danger']['password_empty'])
  541. );
  542. return false;
  543. }
  544. $_SESSION['return'] = array(
  545. 'type' => 'success',
  546. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  547. );
  548. }
  549. function delete_domain_admin($postarray) {
  550. global $pdo;
  551. global $lang;
  552. if ($_SESSION['mailcow_cc_role'] != "admin") {
  553. $_SESSION['return'] = array(
  554. 'type' => 'danger',
  555. 'msg' => sprintf($lang['danger']['access_denied'])
  556. );
  557. return false;
  558. }
  559. $usernames = (array)$postarray['username'];
  560. foreach ($usernames as $username) {
  561. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  562. $_SESSION['return'] = array(
  563. 'type' => 'danger',
  564. 'msg' => sprintf($lang['danger']['username_invalid'])
  565. );
  566. return false;
  567. }
  568. try {
  569. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  570. $stmt->execute(array(
  571. ':username' => $username,
  572. ));
  573. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  574. $stmt->execute(array(
  575. ':username' => $username,
  576. ));
  577. }
  578. catch (PDOException $e) {
  579. $_SESSION['return'] = array(
  580. 'type' => 'danger',
  581. 'msg' => 'MySQL: '.$e
  582. );
  583. return false;
  584. }
  585. }
  586. $_SESSION['return'] = array(
  587. 'type' => 'success',
  588. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars(implode(', ', $usernames)))
  589. );
  590. }
  591. function get_domain_admins() {
  592. global $pdo;
  593. global $lang;
  594. $domainadmins = array();
  595. if ($_SESSION['mailcow_cc_role'] != "admin") {
  596. $_SESSION['return'] = array(
  597. 'type' => 'danger',
  598. 'msg' => sprintf($lang['danger']['access_denied'])
  599. );
  600. return false;
  601. }
  602. try {
  603. $stmt = $pdo->query("SELECT DISTINCT
  604. `username`
  605. FROM `domain_admins`
  606. WHERE `username` IN (
  607. SELECT `username` FROM `admin`
  608. WHERE `superadmin`!='1'
  609. )");
  610. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  611. while ($row = array_shift($rows)) {
  612. $domainadmins[] = $row['username'];
  613. }
  614. }
  615. catch(PDOException $e) {
  616. $_SESSION['return'] = array(
  617. 'type' => 'danger',
  618. 'msg' => 'MySQL: '.$e
  619. );
  620. }
  621. return $domainadmins;
  622. }
  623. function get_domain_admin_details($domain_admin) {
  624. global $pdo;
  625. global $lang;
  626. $domainadmindata = array();
  627. if (isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "admin") {
  628. return false;
  629. }
  630. if (!isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  631. return false;
  632. }
  633. (!isset($domain_admin)) ? $domain_admin = $_SESSION['mailcow_cc_username'] : null;
  634. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $domain_admin))) {
  635. return false;
  636. }
  637. try {
  638. $stmt = $pdo->prepare("SELECT
  639. `tfa`.`active` AS `tfa_active_int`,
  640. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  641. `domain_admins`.`username`,
  642. `domain_admins`.`created`,
  643. `domain_admins`.`active` AS `active_int`,
  644. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  645. FROM `domain_admins`
  646. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  647. WHERE `domain_admins`.`username`= :domain_admin");
  648. $stmt->execute(array(
  649. ':domain_admin' => $domain_admin
  650. ));
  651. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  652. if (empty($row)) {
  653. return false;
  654. }
  655. $domainadmindata['username'] = $row['username'];
  656. $domainadmindata['tfa_active'] = $row['tfa_active'];
  657. $domainadmindata['active'] = $row['active'];
  658. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  659. $domainadmindata['active_int'] = $row['active_int'];
  660. $domainadmindata['modified'] = $row['created'];
  661. // GET SELECTED
  662. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  663. WHERE `domain` IN (
  664. SELECT `domain` FROM `domain_admins`
  665. WHERE `username`= :domain_admin)");
  666. $stmt->execute(array(':domain_admin' => $domain_admin));
  667. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  668. while($row = array_shift($rows)) {
  669. $domainadmindata['selected_domains'][] = $row['domain'];
  670. }
  671. // GET UNSELECTED
  672. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  673. WHERE `domain` NOT IN (
  674. SELECT `domain` FROM `domain_admins`
  675. WHERE `username`= :domain_admin)");
  676. $stmt->execute(array(':domain_admin' => $domain_admin));
  677. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  678. while($row = array_shift($rows)) {
  679. $domainadmindata['unselected_domains'][] = $row['domain'];
  680. }
  681. if (!isset($domainadmindata['unselected_domains'])) {
  682. $domainadmindata['unselected_domains'] = "";
  683. }
  684. }
  685. catch(PDOException $e) {
  686. $_SESSION['return'] = array(
  687. 'type' => 'danger',
  688. 'msg' => 'MySQL: '.$e
  689. );
  690. }
  691. return $domainadmindata;
  692. }
  693. function set_tfa($postarray) {
  694. global $lang;
  695. global $pdo;
  696. global $yubi;
  697. global $u2f;
  698. global $tfa;
  699. if ($_SESSION['mailcow_cc_role'] != "domainadmin" &&
  700. $_SESSION['mailcow_cc_role'] != "admin") {
  701. $_SESSION['return'] = array(
  702. 'type' => 'danger',
  703. 'msg' => sprintf($lang['danger']['access_denied'])
  704. );
  705. return false;
  706. }
  707. $username = $_SESSION['mailcow_cc_username'];
  708. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  709. WHERE `username` = :user");
  710. $stmt->execute(array(':user' => $username));
  711. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  712. if (!verify_ssha256($row['password'], $postarray["confirm_password"])) {
  713. $_SESSION['return'] = array(
  714. 'type' => 'danger',
  715. 'msg' => sprintf($lang['danger']['access_denied'])
  716. );
  717. return false;
  718. }
  719. switch ($postarray["tfa_method"]) {
  720. case "yubi_otp":
  721. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  722. $yubico_id = $postarray['yubico_id'];
  723. $yubico_key = $postarray['yubico_key'];
  724. $yubi = new Auth_Yubico($yubico_id, $yubico_key);
  725. if (!$yubi) {
  726. $_SESSION['return'] = array(
  727. 'type' => 'danger',
  728. 'msg' => sprintf($lang['danger']['access_denied'])
  729. );
  730. return false;
  731. }
  732. if (!ctype_alnum($postarray["otp_token"]) || strlen($postarray["otp_token"]) != 44) {
  733. $_SESSION['return'] = array(
  734. 'type' => 'danger',
  735. 'msg' => sprintf($lang['danger']['tfa_token_invalid'])
  736. );
  737. return false;
  738. }
  739. $yauth = $yubi->verify($postarray["otp_token"]);
  740. if (PEAR::isError($yauth)) {
  741. $_SESSION['return'] = array(
  742. 'type' => 'danger',
  743. 'msg' => 'Yubico API: ' . $yauth->getMessage()
  744. );
  745. return false;
  746. }
  747. try {
  748. // We could also do a modhex translation here
  749. $yubico_modhex_id = substr($postarray["otp_token"], 0, 12);
  750. $stmt = $pdo->prepare("DELETE FROM `tfa`
  751. WHERE `username` = :username
  752. AND (`authmech` != 'yubi_otp')
  753. OR (`authmech` = 'yubi_otp' AND `secret` LIKE :modhex)");
  754. $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id));
  755. $stmt = $pdo->prepare("INSERT INTO `tfa` (`key_id`, `username`, `authmech`, `active`, `secret`) VALUES
  756. (:key_id, :username, 'yubi_otp', '1', :secret)");
  757. $stmt->execute(array(':key_id' => $key_id, ':username' => $username, ':secret' => $yubico_id . ':' . $yubico_key . ':' . $yubico_modhex_id));
  758. }
  759. catch (PDOException $e) {
  760. $_SESSION['return'] = array(
  761. 'type' => 'danger',
  762. 'msg' => 'MySQL: '.$e
  763. );
  764. return false;
  765. }
  766. $_SESSION['return'] = array(
  767. 'type' => 'success',
  768. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  769. );
  770. break;
  771. case "u2f":
  772. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  773. try {
  774. $reg = $u2f->doRegister(json_decode($_SESSION['regReq']), json_decode($postarray['token']));
  775. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `authmech` != 'u2f'");
  776. $stmt->execute(array(':username' => $username));
  777. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `keyHandle`, `publicKey`, `certificate`, `counter`, `active`) VALUES (?, ?, 'u2f', ?, ?, ?, ?, '1')");
  778. $stmt->execute(array($username, $key_id, $reg->keyHandle, $reg->publicKey, $reg->certificate, $reg->counter));
  779. $_SESSION['return'] = array(
  780. 'type' => 'success',
  781. 'msg' => sprintf($lang['success']['object_modified'], $username)
  782. );
  783. $_SESSION['regReq'] = null;
  784. }
  785. catch (Exception $e) {
  786. $_SESSION['return'] = array(
  787. 'type' => 'danger',
  788. 'msg' => "U2F: " . $e->getMessage()
  789. );
  790. $_SESSION['regReq'] = null;
  791. return false;
  792. }
  793. break;
  794. case "totp":
  795. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  796. if ($tfa->verifyCode($_POST['totp_secret'], $_POST['totp_confirm_token']) === true) {
  797. try {
  798. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  799. $stmt->execute(array(':username' => $username));
  800. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `secret`, `active`) VALUES (?, ?, 'totp', ?, '1')");
  801. $stmt->execute(array($username, $key_id, $_POST['totp_secret']));
  802. }
  803. catch (PDOException $e) {
  804. $_SESSION['return'] = array(
  805. 'type' => 'danger',
  806. 'msg' => 'MySQL: '.$e
  807. );
  808. return false;
  809. }
  810. $_SESSION['return'] = array(
  811. 'type' => 'success',
  812. 'msg' => sprintf($lang['success']['object_modified'], $username)
  813. );
  814. }
  815. else {
  816. $_SESSION['return'] = array(
  817. 'type' => 'danger',
  818. 'msg' => 'TOTP verification failed'
  819. );
  820. }
  821. break;
  822. case "none":
  823. try {
  824. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  825. $stmt->execute(array(':username' => $username));
  826. }
  827. catch (PDOException $e) {
  828. $_SESSION['return'] = array(
  829. 'type' => 'danger',
  830. 'msg' => 'MySQL: '.$e
  831. );
  832. return false;
  833. }
  834. $_SESSION['return'] = array(
  835. 'type' => 'success',
  836. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  837. );
  838. break;
  839. }
  840. }
  841. function unset_tfa_key($postarray) {
  842. // Can only unset own keys
  843. // Needs at least one key left
  844. global $pdo;
  845. global $lang;
  846. $id = intval($postarray['unset_tfa_key']);
  847. if ($_SESSION['mailcow_cc_role'] != "domainadmin" &&
  848. $_SESSION['mailcow_cc_role'] != "admin") {
  849. $_SESSION['return'] = array(
  850. 'type' => 'danger',
  851. 'msg' => sprintf($lang['danger']['access_denied'])
  852. );
  853. return false;
  854. }
  855. $username = $_SESSION['mailcow_cc_username'];
  856. try {
  857. if (!is_numeric($id)) {
  858. $_SESSION['return'] = array(
  859. 'type' => 'danger',
  860. 'msg' => sprintf($lang['danger']['access_denied'])
  861. );
  862. return false;
  863. }
  864. $stmt = $pdo->prepare("SELECT COUNT(*) AS `keys` FROM `tfa`
  865. WHERE `username` = :username AND `active` = '1'");
  866. $stmt->execute(array(':username' => $username));
  867. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  868. if ($row['keys'] == "1") {
  869. $_SESSION['return'] = array(
  870. 'type' => 'danger',
  871. 'msg' => sprintf($lang['danger']['last_key'])
  872. );
  873. return false;
  874. }
  875. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `id` = :id");
  876. $stmt->execute(array(':username' => $username, ':id' => $id));
  877. $_SESSION['return'] = array(
  878. 'type' => 'success',
  879. 'msg' => sprintf($lang['success']['object_modified'], $username)
  880. );
  881. }
  882. catch (PDOException $e) {
  883. $_SESSION['return'] = array(
  884. 'type' => 'danger',
  885. 'msg' => 'MySQL: '.$e
  886. );
  887. return false;
  888. }
  889. }
  890. function get_tfa($username = null) {
  891. global $pdo;
  892. if (isset($_SESSION['mailcow_cc_username'])) {
  893. $username = $_SESSION['mailcow_cc_username'];
  894. }
  895. elseif (empty($username)) {
  896. return false;
  897. }
  898. $stmt = $pdo->prepare("SELECT * FROM `tfa`
  899. WHERE `username` = :username AND `active` = '1'");
  900. $stmt->execute(array(':username' => $username));
  901. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  902. switch ($row["authmech"]) {
  903. case "yubi_otp":
  904. $data['name'] = "yubi_otp";
  905. $data['pretty'] = "Yubico OTP";
  906. $stmt = $pdo->prepare("SELECT `id`, `key_id`, RIGHT(`secret`, 12) AS 'modhex' FROM `tfa` WHERE `authmech` = 'yubi_otp' AND `username` = :username");
  907. $stmt->execute(array(
  908. ':username' => $username,
  909. ));
  910. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  911. while($row = array_shift($rows)) {
  912. $data['additional'][] = $row;
  913. }
  914. return $data;
  915. break;
  916. case "u2f":
  917. $data['name'] = "u2f";
  918. $data['pretty'] = "Fido U2F";
  919. $stmt = $pdo->prepare("SELECT `id`, `key_id` FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = :username");
  920. $stmt->execute(array(
  921. ':username' => $username,
  922. ));
  923. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  924. while($row = array_shift($rows)) {
  925. $data['additional'][] = $row;
  926. }
  927. return $data;
  928. break;
  929. case "hotp":
  930. $data['name'] = "hotp";
  931. $data['pretty'] = "HMAC-based OTP";
  932. return $data;
  933. break;
  934. case "totp":
  935. $data['name'] = "totp";
  936. $data['pretty'] = "Time-based OTP";
  937. $stmt = $pdo->prepare("SELECT `id`, `key_id`, `secret` FROM `tfa` WHERE `authmech` = 'totp' AND `username` = :username");
  938. $stmt->execute(array(
  939. ':username' => $username,
  940. ));
  941. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  942. while($row = array_shift($rows)) {
  943. $data['additional'][] = $row;
  944. }
  945. return $data;
  946. break;
  947. default:
  948. $data['name'] = 'none';
  949. $data['pretty'] = "-";
  950. return $data;
  951. break;
  952. }
  953. }
  954. function verify_tfa_login($username, $token) {
  955. global $pdo;
  956. global $lang;
  957. global $yubi;
  958. global $u2f;
  959. global $tfa;
  960. $stmt = $pdo->prepare("SELECT `authmech` FROM `tfa`
  961. WHERE `username` = :username AND `active` = '1'");
  962. $stmt->execute(array(':username' => $username));
  963. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  964. switch ($row["authmech"]) {
  965. case "yubi_otp":
  966. if (!ctype_alnum($token) || strlen($token) != 44) {
  967. return false;
  968. }
  969. $yubico_modhex_id = substr($token, 0, 12);
  970. $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa`
  971. WHERE `username` = :username
  972. AND `authmech` = 'yubi_otp'
  973. AND `active`='1'
  974. AND `secret` LIKE :modhex");
  975. $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id));
  976. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  977. $yubico_auth = explode(':', $row['secret']);
  978. $yubi = new Auth_Yubico($yubico_auth[0], $yubico_auth[1]);
  979. $yauth = $yubi->verify($token);
  980. if (PEAR::isError($yauth)) {
  981. $_SESSION['return'] = array(
  982. 'type' => 'danger',
  983. 'msg' => 'Yubico Authentication error: ' . $yauth->getMessage()
  984. );
  985. return false;
  986. }
  987. else {
  988. $_SESSION['tfa_id'] = $row['id'];
  989. return true;
  990. }
  991. return false;
  992. break;
  993. case "u2f":
  994. try {
  995. $reg = $u2f->doAuthenticate(json_decode($_SESSION['authReq']), get_u2f_registrations($username), json_decode($token));
  996. $stmt = $pdo->prepare("UPDATE `tfa` SET `counter` = ? WHERE `id` = ?");
  997. $stmt->execute(array($reg->counter, $reg->id));
  998. $_SESSION['tfa_id'] = $reg->id;
  999. $_SESSION['authReq'] = null;
  1000. return true;
  1001. }
  1002. catch (Exception $e) {
  1003. $_SESSION['return'] = array(
  1004. 'type' => 'danger',
  1005. 'msg' => "U2F: " . $e->getMessage()
  1006. );
  1007. $_SESSION['regReq'] = null;
  1008. return false;
  1009. }
  1010. return false;
  1011. break;
  1012. case "hotp":
  1013. return false;
  1014. break;
  1015. case "totp":
  1016. try {
  1017. $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa`
  1018. WHERE `username` = :username
  1019. AND `authmech` = 'totp'
  1020. AND `active`='1'");
  1021. $stmt->execute(array(':username' => $username));
  1022. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1023. if ($tfa->verifyCode($row['secret'], $_POST['token']) === true) {
  1024. $_SESSION['tfa_id'] = $row['id'];
  1025. return true;
  1026. }
  1027. return false;
  1028. }
  1029. catch (PDOException $e) {
  1030. $_SESSION['return'] = array(
  1031. 'type' => 'danger',
  1032. 'msg' => 'MySQL: '.$e
  1033. );
  1034. return false;
  1035. }
  1036. break;
  1037. default:
  1038. return false;
  1039. break;
  1040. }
  1041. return false;
  1042. }
  1043. function edit_domain_admin($postarray) {
  1044. global $lang;
  1045. global $pdo;
  1046. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1047. $_SESSION['return'] = array(
  1048. 'type' => 'danger',
  1049. 'msg' => sprintf($lang['danger']['access_denied'])
  1050. );
  1051. return false;
  1052. }
  1053. // Administrator
  1054. if ($_SESSION['mailcow_cc_role'] == "admin") {
  1055. if (!is_array($postarray['username'])) {
  1056. $usernames = array();
  1057. $usernames[] = $postarray['username'];
  1058. }
  1059. else {
  1060. $usernames = $postarray['username'];
  1061. }
  1062. foreach ($usernames as $username) {
  1063. $is_now = get_domain_admin_details($username);
  1064. $domains = (isset($postarray['domains'])) ? (array)$postarray['domains'] : null;
  1065. if (!empty($is_now)) {
  1066. $active = (isset($postarray['active'])) ? $postarray['active'] : $is_now['active_int'];
  1067. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  1068. $username_new = (!empty($postarray['username_new'])) ? $postarray['username_new'] : $is_now['username'];
  1069. }
  1070. else {
  1071. $_SESSION['return'] = array(
  1072. 'type' => 'danger',
  1073. 'msg' => sprintf($lang['danger']['access_denied'])
  1074. );
  1075. return false;
  1076. }
  1077. $password = $postarray['password'];
  1078. $password2 = $postarray['password2'];
  1079. if (!empty($domains)) {
  1080. foreach ($domains as $domain) {
  1081. if (!is_valid_domain_name($domain)) {
  1082. $_SESSION['return'] = array(
  1083. 'type' => 'danger',
  1084. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1085. );
  1086. return false;
  1087. }
  1088. }
  1089. }
  1090. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  1091. $_SESSION['return'] = array(
  1092. 'type' => 'danger',
  1093. 'msg' => sprintf($lang['danger']['username_invalid'])
  1094. );
  1095. return false;
  1096. }
  1097. if ($username_new != $username) {
  1098. if (!empty(get_domain_admin_details($username_new)['username'])) {
  1099. $_SESSION['return'] = array(
  1100. 'type' => 'danger',
  1101. 'msg' => sprintf($lang['danger']['username_invalid'])
  1102. );
  1103. return false;
  1104. }
  1105. }
  1106. try {
  1107. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1108. $stmt->execute(array(
  1109. ':username' => $username,
  1110. ));
  1111. }
  1112. catch (PDOException $e) {
  1113. $_SESSION['return'] = array(
  1114. 'type' => 'danger',
  1115. 'msg' => 'MySQL: '.$e
  1116. );
  1117. return false;
  1118. }
  1119. if (!empty($domains)) {
  1120. foreach ($domains as $domain) {
  1121. try {
  1122. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1123. VALUES (:username_new, :domain, :created, :active)");
  1124. $stmt->execute(array(
  1125. ':username_new' => $username_new,
  1126. ':domain' => $domain,
  1127. ':created' => date('Y-m-d H:i:s'),
  1128. ':active' => $active
  1129. ));
  1130. }
  1131. catch (PDOException $e) {
  1132. $_SESSION['return'] = array(
  1133. 'type' => 'danger',
  1134. 'msg' => 'MySQL: '.$e
  1135. );
  1136. return false;
  1137. }
  1138. }
  1139. }
  1140. if (!empty($password) && !empty($password2)) {
  1141. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  1142. $_SESSION['return'] = array(
  1143. 'type' => 'danger',
  1144. 'msg' => sprintf($lang['danger']['password_complexity'])
  1145. );
  1146. return false;
  1147. }
  1148. if ($password != $password2) {
  1149. $_SESSION['return'] = array(
  1150. 'type' => 'danger',
  1151. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1152. );
  1153. return false;
  1154. }
  1155. $password_hashed = hash_password($password);
  1156. try {
  1157. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  1158. $stmt->execute(array(
  1159. ':password_hashed' => $password_hashed,
  1160. ':username_new' => $username_new,
  1161. ':username' => $username,
  1162. ':active' => $active
  1163. ));
  1164. if (isset($postarray['disable_tfa'])) {
  1165. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  1166. $stmt->execute(array(':username' => $username));
  1167. }
  1168. else {
  1169. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  1170. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  1171. }
  1172. }
  1173. catch (PDOException $e) {
  1174. $_SESSION['return'] = array(
  1175. 'type' => 'danger',
  1176. 'msg' => 'MySQL: '.$e
  1177. );
  1178. return false;
  1179. }
  1180. }
  1181. else {
  1182. try {
  1183. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  1184. $stmt->execute(array(
  1185. ':username_new' => $username_new,
  1186. ':username' => $username,
  1187. ':active' => $active
  1188. ));
  1189. if (isset($postarray['disable_tfa'])) {
  1190. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  1191. $stmt->execute(array(':username' => $username));
  1192. }
  1193. else {
  1194. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  1195. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  1196. }
  1197. }
  1198. catch (PDOException $e) {
  1199. $_SESSION['return'] = array(
  1200. 'type' => 'danger',
  1201. 'msg' => 'MySQL: '.$e
  1202. );
  1203. return false;
  1204. }
  1205. }
  1206. }
  1207. $_SESSION['return'] = array(
  1208. 'type' => 'success',
  1209. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars(implode(', ', $usernames)))
  1210. );
  1211. }
  1212. // Domain administrator
  1213. // Can only edit itself
  1214. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  1215. $username = $_SESSION['mailcow_cc_username'];
  1216. $password_old = $postarray['user_old_pass'];
  1217. $password_new = $postarray['user_new_pass'];
  1218. $password_new2 = $postarray['user_new_pass2'];
  1219. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  1220. WHERE `username` = :user");
  1221. $stmt->execute(array(':user' => $username));
  1222. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1223. if (!verify_ssha256($row['password'], $password_old)) {
  1224. $_SESSION['return'] = array(
  1225. 'type' => 'danger',
  1226. 'msg' => sprintf($lang['danger']['access_denied'])
  1227. );
  1228. return false;
  1229. }
  1230. if (!empty($password_new2) && !empty($password_new)) {
  1231. if ($password_new2 != $password_new) {
  1232. $_SESSION['return'] = array(
  1233. 'type' => 'danger',
  1234. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1235. );
  1236. return false;
  1237. }
  1238. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  1239. $_SESSION['return'] = array(
  1240. 'type' => 'danger',
  1241. 'msg' => sprintf($lang['danger']['password_complexity'])
  1242. );
  1243. return false;
  1244. }
  1245. $password_hashed = hash_password($password_new);
  1246. try {
  1247. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  1248. $stmt->execute(array(
  1249. ':password_hashed' => $password_hashed,
  1250. ':username' => $username
  1251. ));
  1252. }
  1253. catch (PDOException $e) {
  1254. $_SESSION['return'] = array(
  1255. 'type' => 'danger',
  1256. 'msg' => 'MySQL: '.$e
  1257. );
  1258. return false;
  1259. }
  1260. }
  1261. $_SESSION['return'] = array(
  1262. 'type' => 'success',
  1263. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1264. );
  1265. }
  1266. }
  1267. function get_admin_details() {
  1268. // No parameter to be given, only one admin should exist
  1269. global $pdo;
  1270. global $lang;
  1271. $data = array();
  1272. if ($_SESSION['mailcow_cc_role'] != 'admin') {
  1273. return false;
  1274. }
  1275. try {
  1276. $stmt = $pdo->prepare("SELECT `username`, `modified`, `created` FROM `admin` WHERE `superadmin`='1' AND active='1'");
  1277. $stmt->execute();
  1278. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  1279. }
  1280. catch(PDOException $e) {
  1281. $_SESSION['return'] = array(
  1282. 'type' => 'danger',
  1283. 'msg' => 'MySQL: '.$e
  1284. );
  1285. }
  1286. return $data;
  1287. }
  1288. function get_u2f_registrations($username) {
  1289. global $pdo;
  1290. $sel = $pdo->prepare("SELECT * FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = ? AND `active` = '1'");
  1291. $sel->execute(array($username));
  1292. return $sel->fetchAll(PDO::FETCH_OBJ);
  1293. }
  1294. function get_logs($container, $lines = 100) {
  1295. global $lang;
  1296. global $redis;
  1297. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1298. return false;
  1299. }
  1300. $lines = intval($lines);
  1301. if ($container == "dovecot-mailcow") {
  1302. if ($data = $redis->lRange('DOVECOT_MAILLOG', 1, $lines)) {
  1303. foreach ($data as $json_line) {
  1304. $data_array[] = json_decode($json_line, true);
  1305. }
  1306. return $data_array;
  1307. }
  1308. }
  1309. if ($container == "postfix-mailcow") {
  1310. if ($data = $redis->lRange('POSTFIX_MAILLOG', 1, $lines)) {
  1311. foreach ($data as $json_line) {
  1312. $data_array[] = json_decode($json_line, true);
  1313. }
  1314. return $data_array;
  1315. }
  1316. }
  1317. if ($container == "sogo-mailcow") {
  1318. if ($data = $redis->lRange('SOGO_LOG', 1, $lines)) {
  1319. foreach ($data as $json_line) {
  1320. $data_array[] = json_decode($json_line, true);
  1321. }
  1322. return $data_array;
  1323. }
  1324. }
  1325. if ($container == "rspamd-history") {
  1326. $curl = curl_init();
  1327. curl_setopt($curl, CURLOPT_URL,"http://rspamd-mailcow:11334/history");
  1328. curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
  1329. $history = curl_exec($curl);
  1330. if (!curl_errno($ch)) {
  1331. $data_array = json_decode($history, true);
  1332. curl_close($curl);
  1333. return $data_array['rows'];
  1334. }
  1335. curl_close($curl);
  1336. return false;
  1337. }
  1338. return false;
  1339. }
  1340. ?>