functions.inc.php 53 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
  5. }
  6. function hasDomainAccess($username, $role, $domain) {
  7. global $pdo;
  8. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  9. return false;
  10. }
  11. if (empty($domain) || !is_valid_domain_name($domain)) {
  12. return false;
  13. }
  14. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  15. return false;
  16. }
  17. try {
  18. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  19. WHERE (
  20. `active`='1'
  21. AND `username` = :username
  22. AND (`domain` = :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2))
  23. )
  24. OR 'admin' = :role");
  25. $stmt->execute(array(':username' => $username, ':domain1' => $domain, ':domain2' => $domain, ':role' => $role));
  26. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  27. }
  28. catch(PDOException $e) {
  29. $_SESSION['return'] = array(
  30. 'type' => 'danger',
  31. 'msg' => 'MySQL: '.$e
  32. );
  33. return false;
  34. }
  35. if (!empty($num_results)) {
  36. return true;
  37. }
  38. return false;
  39. }
  40. function hasMailboxObjectAccess($username, $role, $object) {
  41. global $pdo;
  42. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  43. return false;
  44. }
  45. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  46. return false;
  47. }
  48. if ($username == $object) {
  49. return true;
  50. }
  51. try {
  52. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :object");
  53. $stmt->execute(array(':object' => $object));
  54. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  55. if (isset($row['domain']) && hasDomainAccess($username, $role, $row['domain'])) {
  56. return true;
  57. }
  58. }
  59. catch(PDOException $e) {
  60. error_log($e);
  61. return false;
  62. }
  63. return false;
  64. }
  65. function verify_ssha256($hash, $password) {
  66. // Remove tag if any
  67. $hash = ltrim($hash, '{SSHA256}');
  68. // Decode hash
  69. $dhash = base64_decode($hash);
  70. // Get first 32 bytes of binary which equals a SHA256 hash
  71. $ohash = substr($dhash, 0, 32);
  72. // Remove SHA256 hash from decoded hash to get original salt string
  73. $osalt = str_replace($ohash, '', $dhash);
  74. // Check single salted SHA256 hash against extracted hash
  75. if (hash('sha256', $password . $osalt, true) == $ohash) {
  76. return true;
  77. }
  78. else {
  79. return false;
  80. }
  81. }
  82. function doveadm_authenticate($hash, $algorithm, $password) {
  83. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  84. $pipes = array();
  85. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  86. if (is_resource($process)) {
  87. fputs($pipes[0], $password);
  88. fclose($pipes[0]);
  89. while ($f = fgets($pipes[1])) {
  90. if (preg_match('/(verified)/', $f)) {
  91. proc_close($process);
  92. return true;
  93. }
  94. return false;
  95. }
  96. fclose($pipes[1]);
  97. while ($f = fgets($pipes[2])) {
  98. proc_close($process);
  99. return false;
  100. }
  101. fclose($pipes[2]);
  102. proc_close($process);
  103. }
  104. return false;
  105. }
  106. function check_login($user, $pass) {
  107. global $pdo;
  108. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  109. return false;
  110. }
  111. $user = strtolower(trim($user));
  112. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  113. WHERE `superadmin` = '1'
  114. AND `username` = :user");
  115. $stmt->execute(array(':user' => $user));
  116. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  117. foreach ($rows as $row) {
  118. if (verify_ssha256($row['password'], $pass)) {
  119. if (get_tfa($user)['name'] != "none") {
  120. $_SESSION['pending_mailcow_cc_username'] = $user;
  121. $_SESSION['pending_mailcow_cc_role'] = "admin";
  122. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  123. unset($_SESSION['ldelay']);
  124. return "pending";
  125. }
  126. else {
  127. unset($_SESSION['ldelay']);
  128. return "admin";
  129. }
  130. }
  131. }
  132. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  133. WHERE `superadmin` = '0'
  134. AND `active`='1'
  135. AND `username` = :user");
  136. $stmt->execute(array(':user' => $user));
  137. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  138. foreach ($rows as $row) {
  139. if (verify_ssha256($row['password'], $pass) !== false) {
  140. if (get_tfa($user)['name'] != "none") {
  141. $_SESSION['pending_mailcow_cc_username'] = $user;
  142. $_SESSION['pending_mailcow_cc_role'] = "domainadmin";
  143. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  144. unset($_SESSION['ldelay']);
  145. return "pending";
  146. }
  147. else {
  148. unset($_SESSION['ldelay']);
  149. $stmt = $pdo->prepare("UPDATE `tfa` SET `active`='1' WHERE `username` = :user");
  150. $stmt->execute(array(':user' => $user));
  151. return "domainadmin";
  152. }
  153. }
  154. }
  155. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  156. WHERE `kind` NOT REGEXP 'location|thing|group'
  157. AND `active`='1'
  158. AND `username` = :user");
  159. $stmt->execute(array(':user' => $user));
  160. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  161. foreach ($rows as $row) {
  162. if (verify_ssha256($row['password'], $pass) !== false) {
  163. unset($_SESSION['ldelay']);
  164. return "user";
  165. }
  166. }
  167. if (!isset($_SESSION['ldelay'])) {
  168. $_SESSION['ldelay'] = "0";
  169. }
  170. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  171. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  172. error_log("Mailcow UI: Invalid password for " . $user . " by " . $_SERVER['REMOTE_ADDR']);
  173. }
  174. sleep($_SESSION['ldelay']);
  175. }
  176. function formatBytes($size, $precision = 2) {
  177. if(!is_numeric($size)) {
  178. return "0";
  179. }
  180. $base = log($size, 1024);
  181. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  182. if ($size == "0") {
  183. return "0";
  184. }
  185. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  186. }
  187. function edit_admin_account($postarray) {
  188. global $lang;
  189. global $pdo;
  190. if ($_SESSION['mailcow_cc_role'] != "admin") {
  191. $_SESSION['return'] = array(
  192. 'type' => 'danger',
  193. 'msg' => sprintf($lang['danger']['access_denied'])
  194. );
  195. return false;
  196. }
  197. $username_now = $_SESSION['mailcow_cc_username'];
  198. $username = $postarray['admin_user'];
  199. $password = $postarray['admin_pass'];
  200. $password2 = $postarray['admin_pass2'];
  201. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  202. $_SESSION['return'] = array(
  203. 'type' => 'danger',
  204. 'msg' => sprintf($lang['danger']['username_invalid'])
  205. );
  206. return false;
  207. }
  208. if (!empty($password) && !empty($password2)) {
  209. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  210. $_SESSION['return'] = array(
  211. 'type' => 'danger',
  212. 'msg' => sprintf($lang['danger']['password_complexity'])
  213. );
  214. return false;
  215. }
  216. if ($password != $password2) {
  217. $_SESSION['return'] = array(
  218. 'type' => 'danger',
  219. 'msg' => sprintf($lang['danger']['password_mismatch'])
  220. );
  221. return false;
  222. }
  223. $password_hashed = hash_password($password);
  224. try {
  225. $stmt = $pdo->prepare("UPDATE `admin` SET
  226. `password` = :password_hashed,
  227. `username` = :username1
  228. WHERE `username` = :username2");
  229. $stmt->execute(array(
  230. ':password_hashed' => $password_hashed,
  231. ':username1' => $username,
  232. ':username2' => $username_now
  233. ));
  234. }
  235. catch (PDOException $e) {
  236. $_SESSION['return'] = array(
  237. 'type' => 'danger',
  238. 'msg' => 'MySQL: '.$e
  239. );
  240. return false;
  241. }
  242. }
  243. else {
  244. try {
  245. $stmt = $pdo->prepare("UPDATE `admin` SET
  246. `username` = :username1
  247. WHERE `username` = :username2");
  248. $stmt->execute(array(
  249. ':username1' => $username,
  250. ':username2' => $username_now
  251. ));
  252. }
  253. catch (PDOException $e) {
  254. $_SESSION['return'] = array(
  255. 'type' => 'danger',
  256. 'msg' => 'MySQL: '.$e
  257. );
  258. return false;
  259. }
  260. }
  261. try {
  262. $stmt = $pdo->prepare("UPDATE `domain_admins` SET `domain` = 'ALL', `username` = :username1 WHERE `username` = :username2");
  263. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  264. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username1 WHERE `username` = :username2");
  265. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  266. }
  267. catch (PDOException $e) {
  268. $_SESSION['return'] = array(
  269. 'type' => 'danger',
  270. 'msg' => 'MySQL: '.$e
  271. );
  272. return false;
  273. }
  274. $_SESSION['mailcow_cc_username'] = $username;
  275. $_SESSION['return'] = array(
  276. 'type' => 'success',
  277. 'msg' => sprintf($lang['success']['admin_modified'])
  278. );
  279. }
  280. function edit_user_account($postarray) {
  281. global $lang;
  282. global $pdo;
  283. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  284. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  285. $_SESSION['return'] = array(
  286. 'type' => 'danger',
  287. 'msg' => sprintf($lang['danger']['access_denied'])
  288. );
  289. return false;
  290. }
  291. else {
  292. $username = $postarray['username'];
  293. }
  294. }
  295. else {
  296. $username = $_SESSION['mailcow_cc_username'];
  297. }
  298. $password_old = $postarray['user_old_pass'];
  299. if (isset($postarray['user_new_pass']) && isset($postarray['user_new_pass2'])) {
  300. $password_new = $postarray['user_new_pass'];
  301. $password_new2 = $postarray['user_new_pass2'];
  302. }
  303. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  304. WHERE `kind` NOT REGEXP 'location|thing|group'
  305. AND `username` = :user");
  306. $stmt->execute(array(':user' => $username));
  307. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  308. if (!verify_ssha256($row['password'], $password_old)) {
  309. $_SESSION['return'] = array(
  310. 'type' => 'danger',
  311. 'msg' => sprintf($lang['danger']['access_denied'])
  312. );
  313. return false;
  314. }
  315. if (isset($password_new) && isset($password_new2)) {
  316. if (!empty($password_new2) && !empty($password_new)) {
  317. if ($password_new2 != $password_new) {
  318. $_SESSION['return'] = array(
  319. 'type' => 'danger',
  320. 'msg' => sprintf($lang['danger']['password_mismatch'])
  321. );
  322. return false;
  323. }
  324. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  325. $_SESSION['return'] = array(
  326. 'type' => 'danger',
  327. 'msg' => sprintf($lang['danger']['password_complexity'])
  328. );
  329. return false;
  330. }
  331. $password_hashed = hash_password($password_new);
  332. try {
  333. $stmt = $pdo->prepare("UPDATE `mailbox` SET `password` = :password_hashed WHERE `username` = :username");
  334. $stmt->execute(array(
  335. ':password_hashed' => $password_hashed,
  336. ':username' => $username
  337. ));
  338. }
  339. catch (PDOException $e) {
  340. $_SESSION['return'] = array(
  341. 'type' => 'danger',
  342. 'msg' => 'MySQL: '.$e
  343. );
  344. return false;
  345. }
  346. }
  347. }
  348. $_SESSION['return'] = array(
  349. 'type' => 'success',
  350. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  351. );
  352. }
  353. function user_get_alias_details($username) {
  354. global $lang;
  355. global $pdo;
  356. if ($_SESSION['mailcow_cc_role'] == "user") {
  357. $username = $_SESSION['mailcow_cc_username'];
  358. }
  359. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  360. return false;
  361. }
  362. try {
  363. $data['address'] = $username;
  364. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') AS `aliases` FROM `alias`
  365. WHERE `goto` REGEXP :username_goto
  366. AND `address` NOT LIKE '@%'
  367. AND `address` != :username_address");
  368. $stmt->execute(array(':username_goto' => '(^|,)'.$username.'($|,)', ':username_address' => $username));
  369. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  370. while ($row = array_shift($run)) {
  371. $data['aliases'] = $row['aliases'];
  372. }
  373. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(local_part, '@', alias_domain SEPARATOR ', '), '&#10008;') AS `ad_alias` FROM `mailbox`
  374. LEFT OUTER JOIN `alias_domain` on `target_domain` = `domain`
  375. WHERE `username` = :username ;");
  376. $stmt->execute(array(':username' => $username));
  377. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  378. while ($row = array_shift($run)) {
  379. $data['ad_alias'] = $row['ad_alias'];
  380. }
  381. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` NOT LIKE '@%';");
  382. $stmt->execute(array(':username' => $username));
  383. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  384. while ($row = array_shift($run)) {
  385. $data['aliases_also_send_as'] = $row['send_as'];
  386. }
  387. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` LIKE '@%';");
  388. $stmt->execute(array(':username' => $username));
  389. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  390. while ($row = array_shift($run)) {
  391. $data['aliases_send_as_all'] = $row['send_as'];
  392. }
  393. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') as `address` FROM `alias` WHERE `goto` REGEXP :username AND `address` LIKE '@%';");
  394. $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)'));
  395. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  396. while ($row = array_shift($run)) {
  397. $data['is_catch_all'] = $row['address'];
  398. }
  399. return $data;
  400. }
  401. catch(PDOException $e) {
  402. $_SESSION['return'] = array(
  403. 'type' => 'danger',
  404. 'msg' => 'MySQL: '.$e
  405. );
  406. return false;
  407. }
  408. }
  409. function is_valid_domain_name($domain_name) {
  410. if (empty($domain_name)) {
  411. return false;
  412. }
  413. $domain_name = idn_to_ascii($domain_name);
  414. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  415. && preg_match("/^.{1,253}$/", $domain_name)
  416. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  417. }
  418. function add_domain_admin($postarray) {
  419. global $lang;
  420. global $pdo;
  421. $username = strtolower(trim($postarray['username']));
  422. $password = $postarray['password'];
  423. $password2 = $postarray['password2'];
  424. $domains = (array)$postarray['domains'];
  425. $active = intval($postarray['active']);
  426. if ($_SESSION['mailcow_cc_role'] != "admin") {
  427. $_SESSION['return'] = array(
  428. 'type' => 'danger',
  429. 'msg' => sprintf($lang['danger']['access_denied'])
  430. );
  431. return false;
  432. }
  433. if (empty($domains)) {
  434. $_SESSION['return'] = array(
  435. 'type' => 'danger',
  436. 'msg' => sprintf($lang['danger']['domain_invalid'])
  437. );
  438. return false;
  439. }
  440. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  441. $_SESSION['return'] = array(
  442. 'type' => 'danger',
  443. 'msg' => sprintf($lang['danger']['username_invalid'])
  444. );
  445. return false;
  446. }
  447. try {
  448. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  449. WHERE `username` = :username");
  450. $stmt->execute(array(':username' => $username));
  451. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  452. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  453. WHERE `username` = :username");
  454. $stmt->execute(array(':username' => $username));
  455. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  456. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  457. WHERE `username` = :username");
  458. $stmt->execute(array(':username' => $username));
  459. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  460. }
  461. catch(PDOException $e) {
  462. $_SESSION['return'] = array(
  463. 'type' => 'danger',
  464. 'msg' => 'MySQL: '.$e
  465. );
  466. return false;
  467. }
  468. foreach ($num_results as $num_results_each) {
  469. if ($num_results_each != 0) {
  470. $_SESSION['return'] = array(
  471. 'type' => 'danger',
  472. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  473. );
  474. return false;
  475. }
  476. }
  477. if (!empty($password) && !empty($password2)) {
  478. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  479. $_SESSION['return'] = array(
  480. 'type' => 'danger',
  481. 'msg' => sprintf($lang['danger']['password_complexity'])
  482. );
  483. return false;
  484. }
  485. if ($password != $password2) {
  486. $_SESSION['return'] = array(
  487. 'type' => 'danger',
  488. 'msg' => sprintf($lang['danger']['password_mismatch'])
  489. );
  490. return false;
  491. }
  492. $password_hashed = hash_password($password);
  493. foreach ($domains as $domain) {
  494. if (!is_valid_domain_name($domain)) {
  495. $_SESSION['return'] = array(
  496. 'type' => 'danger',
  497. 'msg' => sprintf($lang['danger']['domain_invalid'])
  498. );
  499. return false;
  500. }
  501. try {
  502. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  503. VALUES (:username, :domain, :created, :active)");
  504. $stmt->execute(array(
  505. ':username' => $username,
  506. ':domain' => $domain,
  507. ':created' => date('Y-m-d H:i:s'),
  508. ':active' => $active
  509. ));
  510. }
  511. catch (PDOException $e) {
  512. delete_domain_admin(array('username' => $username));
  513. $_SESSION['return'] = array(
  514. 'type' => 'danger',
  515. 'msg' => 'MySQL: '.$e
  516. );
  517. return false;
  518. }
  519. }
  520. try {
  521. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  522. VALUES (:username, :password_hashed, '0', :active)");
  523. $stmt->execute(array(
  524. ':username' => $username,
  525. ':password_hashed' => $password_hashed,
  526. ':active' => $active
  527. ));
  528. }
  529. catch (PDOException $e) {
  530. $_SESSION['return'] = array(
  531. 'type' => 'danger',
  532. 'msg' => 'MySQL: '.$e
  533. );
  534. return false;
  535. }
  536. }
  537. else {
  538. $_SESSION['return'] = array(
  539. 'type' => 'danger',
  540. 'msg' => sprintf($lang['danger']['password_empty'])
  541. );
  542. return false;
  543. }
  544. $_SESSION['return'] = array(
  545. 'type' => 'success',
  546. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  547. );
  548. }
  549. function delete_domain_admin($postarray) {
  550. global $pdo;
  551. global $lang;
  552. if ($_SESSION['mailcow_cc_role'] != "admin") {
  553. $_SESSION['return'] = array(
  554. 'type' => 'danger',
  555. 'msg' => sprintf($lang['danger']['access_denied'])
  556. );
  557. return false;
  558. }
  559. $usernames = (array)$postarray['username'];
  560. foreach ($usernames as $username) {
  561. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  562. $_SESSION['return'] = array(
  563. 'type' => 'danger',
  564. 'msg' => sprintf($lang['danger']['username_invalid'])
  565. );
  566. return false;
  567. }
  568. try {
  569. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  570. $stmt->execute(array(
  571. ':username' => $username,
  572. ));
  573. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  574. $stmt->execute(array(
  575. ':username' => $username,
  576. ));
  577. }
  578. catch (PDOException $e) {
  579. $_SESSION['return'] = array(
  580. 'type' => 'danger',
  581. 'msg' => 'MySQL: '.$e
  582. );
  583. return false;
  584. }
  585. }
  586. $_SESSION['return'] = array(
  587. 'type' => 'success',
  588. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars(implode(', ', $usernames)))
  589. );
  590. }
  591. function get_domain_admins() {
  592. global $pdo;
  593. global $lang;
  594. $domainadmins = array();
  595. if ($_SESSION['mailcow_cc_role'] != "admin") {
  596. $_SESSION['return'] = array(
  597. 'type' => 'danger',
  598. 'msg' => sprintf($lang['danger']['access_denied'])
  599. );
  600. return false;
  601. }
  602. try {
  603. $stmt = $pdo->query("SELECT DISTINCT
  604. `username`
  605. FROM `domain_admins`
  606. WHERE `username` IN (
  607. SELECT `username` FROM `admin`
  608. WHERE `superadmin`!='1'
  609. )");
  610. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  611. while ($row = array_shift($rows)) {
  612. $domainadmins[] = $row['username'];
  613. }
  614. }
  615. catch(PDOException $e) {
  616. $_SESSION['return'] = array(
  617. 'type' => 'danger',
  618. 'msg' => 'MySQL: '.$e
  619. );
  620. }
  621. return $domainadmins;
  622. }
  623. function get_domain_admin_details($domain_admin) {
  624. global $pdo;
  625. global $lang;
  626. $domainadmindata = array();
  627. if (isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "admin") {
  628. return false;
  629. }
  630. if (!isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  631. return false;
  632. }
  633. (!isset($domain_admin)) ? $domain_admin = $_SESSION['mailcow_cc_username'] : null;
  634. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $domain_admin))) {
  635. return false;
  636. }
  637. try {
  638. $stmt = $pdo->prepare("SELECT
  639. `tfa`.`active` AS `tfa_active_int`,
  640. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  641. `domain_admins`.`username`,
  642. `domain_admins`.`created`,
  643. `domain_admins`.`active` AS `active_int`,
  644. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  645. FROM `domain_admins`
  646. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  647. WHERE `domain_admins`.`username`= :domain_admin");
  648. $stmt->execute(array(
  649. ':domain_admin' => $domain_admin
  650. ));
  651. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  652. if (empty($row)) {
  653. return false;
  654. }
  655. $domainadmindata['username'] = $row['username'];
  656. $domainadmindata['tfa_active'] = $row['tfa_active'];
  657. $domainadmindata['active'] = $row['active'];
  658. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  659. $domainadmindata['active_int'] = $row['active_int'];
  660. $domainadmindata['modified'] = $row['created'];
  661. // GET SELECTED
  662. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  663. WHERE `domain` IN (
  664. SELECT `domain` FROM `domain_admins`
  665. WHERE `username`= :domain_admin)");
  666. $stmt->execute(array(':domain_admin' => $domain_admin));
  667. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  668. while($row = array_shift($rows)) {
  669. $domainadmindata['selected_domains'][] = $row['domain'];
  670. }
  671. // GET UNSELECTED
  672. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  673. WHERE `domain` NOT IN (
  674. SELECT `domain` FROM `domain_admins`
  675. WHERE `username`= :domain_admin)");
  676. $stmt->execute(array(':domain_admin' => $domain_admin));
  677. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  678. while($row = array_shift($rows)) {
  679. $domainadmindata['unselected_domains'][] = $row['domain'];
  680. }
  681. if (!isset($domainadmindata['unselected_domains'])) {
  682. $domainadmindata['unselected_domains'] = "";
  683. }
  684. }
  685. catch(PDOException $e) {
  686. $_SESSION['return'] = array(
  687. 'type' => 'danger',
  688. 'msg' => 'MySQL: '.$e
  689. );
  690. }
  691. return $domainadmindata;
  692. }
  693. function set_tfa($postarray) {
  694. global $lang;
  695. global $pdo;
  696. global $yubi;
  697. global $u2f;
  698. global $tfa;
  699. if ($_SESSION['mailcow_cc_role'] != "domainadmin" &&
  700. $_SESSION['mailcow_cc_role'] != "admin") {
  701. $_SESSION['return'] = array(
  702. 'type' => 'danger',
  703. 'msg' => sprintf($lang['danger']['access_denied'])
  704. );
  705. return false;
  706. }
  707. $username = $_SESSION['mailcow_cc_username'];
  708. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  709. WHERE `username` = :user");
  710. $stmt->execute(array(':user' => $username));
  711. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  712. if (!verify_ssha256($row['password'], $postarray["confirm_password"])) {
  713. $_SESSION['return'] = array(
  714. 'type' => 'danger',
  715. 'msg' => sprintf($lang['danger']['access_denied'])
  716. );
  717. return false;
  718. }
  719. switch ($postarray["tfa_method"]) {
  720. case "yubi_otp":
  721. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  722. $yubico_id = $postarray['yubico_id'];
  723. $yubico_key = $postarray['yubico_key'];
  724. $yubi = new Auth_Yubico($yubico_id, $yubico_key);
  725. if (!$yubi) {
  726. $_SESSION['return'] = array(
  727. 'type' => 'danger',
  728. 'msg' => sprintf($lang['danger']['access_denied'])
  729. );
  730. return false;
  731. }
  732. if (!ctype_alnum($postarray["otp_token"]) || strlen($postarray["otp_token"]) != 44) {
  733. $_SESSION['return'] = array(
  734. 'type' => 'danger',
  735. 'msg' => sprintf($lang['danger']['tfa_token_invalid'])
  736. );
  737. return false;
  738. }
  739. $yauth = $yubi->verify($postarray["otp_token"]);
  740. if (PEAR::isError($yauth)) {
  741. $_SESSION['return'] = array(
  742. 'type' => 'danger',
  743. 'msg' => 'Yubico API: ' . $yauth->getMessage()
  744. );
  745. return false;
  746. }
  747. try {
  748. // We could also do a modhex translation here
  749. $yubico_modhex_id = substr($postarray["otp_token"], 0, 12);
  750. $stmt = $pdo->prepare("DELETE FROM `tfa`
  751. WHERE `username` = :username
  752. AND (`authmech` != 'yubi_otp')
  753. OR (`authmech` = 'yubi_otp' AND `secret` LIKE :modhex)");
  754. $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id));
  755. $stmt = $pdo->prepare("INSERT INTO `tfa` (`key_id`, `username`, `authmech`, `active`, `secret`) VALUES
  756. (:key_id, :username, 'yubi_otp', '1', :secret)");
  757. $stmt->execute(array(':key_id' => $key_id, ':username' => $username, ':secret' => $yubico_id . ':' . $yubico_key . ':' . $yubico_modhex_id));
  758. }
  759. catch (PDOException $e) {
  760. $_SESSION['return'] = array(
  761. 'type' => 'danger',
  762. 'msg' => 'MySQL: '.$e
  763. );
  764. return false;
  765. }
  766. $_SESSION['return'] = array(
  767. 'type' => 'success',
  768. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  769. );
  770. break;
  771. case "u2f":
  772. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  773. try {
  774. $reg = $u2f->doRegister(json_decode($_SESSION['regReq']), json_decode($postarray['token']));
  775. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `authmech` != 'u2f'");
  776. $stmt->execute(array(':username' => $username));
  777. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `keyHandle`, `publicKey`, `certificate`, `counter`, `active`) VALUES (?, ?, 'u2f', ?, ?, ?, ?, '1')");
  778. $stmt->execute(array($username, $key_id, $reg->keyHandle, $reg->publicKey, $reg->certificate, $reg->counter));
  779. $_SESSION['return'] = array(
  780. 'type' => 'success',
  781. 'msg' => sprintf($lang['success']['object_modified'], $username)
  782. );
  783. $_SESSION['regReq'] = null;
  784. }
  785. catch (Exception $e) {
  786. $_SESSION['return'] = array(
  787. 'type' => 'danger',
  788. 'msg' => "U2F: " . $e->getMessage()
  789. );
  790. $_SESSION['regReq'] = null;
  791. return false;
  792. }
  793. break;
  794. case "totp":
  795. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  796. if ($tfa->verifyCode($_POST['totp_secret'], $_POST['totp_confirm_token']) === true) {
  797. try {
  798. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  799. $stmt->execute(array(':username' => $username));
  800. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `secret`, `active`) VALUES (?, ?, 'totp', ?, '1')");
  801. $stmt->execute(array($username, $key_id, $_POST['totp_secret']));
  802. }
  803. catch (PDOException $e) {
  804. $_SESSION['return'] = array(
  805. 'type' => 'danger',
  806. 'msg' => 'MySQL: '.$e
  807. );
  808. return false;
  809. }
  810. $_SESSION['return'] = array(
  811. 'type' => 'success',
  812. 'msg' => sprintf($lang['success']['object_modified'], $username)
  813. );
  814. }
  815. else {
  816. $_SESSION['return'] = array(
  817. 'type' => 'danger',
  818. 'msg' => 'TOTP verification failed'
  819. );
  820. }
  821. break;
  822. case "none":
  823. try {
  824. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  825. $stmt->execute(array(':username' => $username));
  826. }
  827. catch (PDOException $e) {
  828. $_SESSION['return'] = array(
  829. 'type' => 'danger',
  830. 'msg' => 'MySQL: '.$e
  831. );
  832. return false;
  833. }
  834. $_SESSION['return'] = array(
  835. 'type' => 'success',
  836. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  837. );
  838. break;
  839. }
  840. }
  841. function unset_tfa_key($postarray) {
  842. // Can only unset own keys
  843. // Needs at least one key left
  844. global $pdo;
  845. global $lang;
  846. $id = intval($postarray['unset_tfa_key']);
  847. if ($_SESSION['mailcow_cc_role'] != "domainadmin" &&
  848. $_SESSION['mailcow_cc_role'] != "admin") {
  849. $_SESSION['return'] = array(
  850. 'type' => 'danger',
  851. 'msg' => sprintf($lang['danger']['access_denied'])
  852. );
  853. return false;
  854. }
  855. $username = $_SESSION['mailcow_cc_username'];
  856. try {
  857. if (!is_numeric($id)) {
  858. $_SESSION['return'] = array(
  859. 'type' => 'danger',
  860. 'msg' => sprintf($lang['danger']['access_denied'])
  861. );
  862. return false;
  863. }
  864. $stmt = $pdo->prepare("SELECT COUNT(*) AS `keys` FROM `tfa`
  865. WHERE `username` = :username AND `active` = '1'");
  866. $stmt->execute(array(':username' => $username));
  867. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  868. if ($row['keys'] == "1") {
  869. $_SESSION['return'] = array(
  870. 'type' => 'danger',
  871. 'msg' => sprintf($lang['danger']['last_key'])
  872. );
  873. return false;
  874. }
  875. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `id` = :id");
  876. $stmt->execute(array(':username' => $username, ':id' => $id));
  877. $_SESSION['return'] = array(
  878. 'type' => 'success',
  879. 'msg' => sprintf($lang['success']['object_modified'], $username)
  880. );
  881. }
  882. catch (PDOException $e) {
  883. $_SESSION['return'] = array(
  884. 'type' => 'danger',
  885. 'msg' => 'MySQL: '.$e
  886. );
  887. return false;
  888. }
  889. }
  890. function get_tfa($username = null) {
  891. global $pdo;
  892. if (isset($_SESSION['mailcow_cc_username'])) {
  893. $username = $_SESSION['mailcow_cc_username'];
  894. }
  895. elseif (empty($username)) {
  896. return false;
  897. }
  898. $stmt = $pdo->prepare("SELECT * FROM `tfa`
  899. WHERE `username` = :username AND `active` = '1'");
  900. $stmt->execute(array(':username' => $username));
  901. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  902. switch ($row["authmech"]) {
  903. case "yubi_otp":
  904. $data['name'] = "yubi_otp";
  905. $data['pretty'] = "Yubico OTP";
  906. $stmt = $pdo->prepare("SELECT `id`, `key_id`, RIGHT(`secret`, 12) AS 'modhex' FROM `tfa` WHERE `authmech` = 'yubi_otp' AND `username` = :username");
  907. $stmt->execute(array(
  908. ':username' => $username,
  909. ));
  910. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  911. while($row = array_shift($rows)) {
  912. $data['additional'][] = $row;
  913. }
  914. return $data;
  915. break;
  916. case "u2f":
  917. $data['name'] = "u2f";
  918. $data['pretty'] = "Fido U2F";
  919. $stmt = $pdo->prepare("SELECT `id`, `key_id` FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = :username");
  920. $stmt->execute(array(
  921. ':username' => $username,
  922. ));
  923. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  924. while($row = array_shift($rows)) {
  925. $data['additional'][] = $row;
  926. }
  927. return $data;
  928. break;
  929. case "hotp":
  930. $data['name'] = "hotp";
  931. $data['pretty'] = "HMAC-based OTP";
  932. return $data;
  933. break;
  934. case "totp":
  935. $data['name'] = "totp";
  936. $data['pretty'] = "Time-based OTP";
  937. $stmt = $pdo->prepare("SELECT `id`, `key_id`, `secret` FROM `tfa` WHERE `authmech` = 'totp' AND `username` = :username");
  938. $stmt->execute(array(
  939. ':username' => $username,
  940. ));
  941. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  942. while($row = array_shift($rows)) {
  943. $data['additional'][] = $row;
  944. }
  945. return $data;
  946. break;
  947. default:
  948. $data['name'] = 'none';
  949. $data['pretty'] = "-";
  950. return $data;
  951. break;
  952. }
  953. }
  954. function verify_tfa_login($username, $token) {
  955. global $pdo;
  956. global $lang;
  957. global $yubi;
  958. global $u2f;
  959. global $tfa;
  960. $stmt = $pdo->prepare("SELECT `authmech` FROM `tfa`
  961. WHERE `username` = :username AND `active` = '1'");
  962. $stmt->execute(array(':username' => $username));
  963. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  964. switch ($row["authmech"]) {
  965. case "yubi_otp":
  966. if (!ctype_alnum($token) || strlen($token) != 44) {
  967. return false;
  968. }
  969. $yubico_modhex_id = substr($token, 0, 12);
  970. $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa`
  971. WHERE `username` = :username
  972. AND `authmech` = 'yubi_otp'
  973. AND `active`='1'
  974. AND `secret` LIKE :modhex");
  975. $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id));
  976. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  977. $yubico_auth = explode(':', $row['secret']);
  978. $yubi = new Auth_Yubico($yubico_auth[0], $yubico_auth[1]);
  979. $yauth = $yubi->verify($token);
  980. if (PEAR::isError($yauth)) {
  981. $_SESSION['return'] = array(
  982. 'type' => 'danger',
  983. 'msg' => 'Yubico Authentication error: ' . $yauth->getMessage()
  984. );
  985. return false;
  986. }
  987. else {
  988. $_SESSION['tfa_id'] = $row['id'];
  989. return true;
  990. }
  991. return false;
  992. break;
  993. case "u2f":
  994. try {
  995. $reg = $u2f->doAuthenticate(json_decode($_SESSION['authReq']), get_u2f_registrations($username), json_decode($token));
  996. $stmt = $pdo->prepare("UPDATE `tfa` SET `counter` = ? WHERE `id` = ?");
  997. $stmt->execute(array($reg->counter, $reg->id));
  998. $_SESSION['tfa_id'] = $reg->id;
  999. $_SESSION['authReq'] = null;
  1000. return true;
  1001. }
  1002. catch (Exception $e) {
  1003. $_SESSION['return'] = array(
  1004. 'type' => 'danger',
  1005. 'msg' => "U2F: " . $e->getMessage()
  1006. );
  1007. $_SESSION['regReq'] = null;
  1008. return false;
  1009. }
  1010. return false;
  1011. break;
  1012. case "hotp":
  1013. return false;
  1014. break;
  1015. case "totp":
  1016. try {
  1017. $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa`
  1018. WHERE `username` = :username
  1019. AND `authmech` = 'totp'
  1020. AND `active`='1'");
  1021. $stmt->execute(array(':username' => $username));
  1022. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1023. if ($tfa->verifyCode($row['secret'], $_POST['token']) === true) {
  1024. $_SESSION['tfa_id'] = $row['id'];
  1025. return true;
  1026. }
  1027. return false;
  1028. }
  1029. catch (PDOException $e) {
  1030. $_SESSION['return'] = array(
  1031. 'type' => 'danger',
  1032. 'msg' => 'MySQL: '.$e
  1033. );
  1034. return false;
  1035. }
  1036. break;
  1037. default:
  1038. return false;
  1039. break;
  1040. }
  1041. return false;
  1042. }
  1043. function edit_domain_admin($postarray) {
  1044. global $lang;
  1045. global $pdo;
  1046. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1047. $_SESSION['return'] = array(
  1048. 'type' => 'danger',
  1049. 'msg' => sprintf($lang['danger']['access_denied'])
  1050. );
  1051. return false;
  1052. }
  1053. // Administrator
  1054. if ($_SESSION['mailcow_cc_role'] == "admin") {
  1055. if (!is_array($postarray['username'])) {
  1056. $usernames = array();
  1057. $usernames[] = $postarray['username'];
  1058. }
  1059. else {
  1060. $usernames = $postarray['username'];
  1061. }
  1062. foreach ($usernames as $username) {
  1063. $is_now = get_domain_admin_details($username);
  1064. $domains = (isset($postarray['domains'])) ? (array)$postarray['domains'] : null;
  1065. if (!empty($is_now)) {
  1066. $active = (isset($postarray['active'])) ? $postarray['active'] : $is_now['active_int'];
  1067. $domains = (!empty($domains)) ? $domains : $is_now['selected_domains'];
  1068. $username_new = (!empty($postarray['username_new'])) ? $postarray['username_new'] : $is_now['username'];
  1069. }
  1070. else {
  1071. $_SESSION['return'] = array(
  1072. 'type' => 'danger',
  1073. 'msg' => sprintf($lang['danger']['access_denied'])
  1074. );
  1075. return false;
  1076. }
  1077. $password = $postarray['password'];
  1078. $password2 = $postarray['password2'];
  1079. if (!empty($domains)) {
  1080. foreach ($domains as $domain) {
  1081. if (!is_valid_domain_name($domain)) {
  1082. $_SESSION['return'] = array(
  1083. 'type' => 'danger',
  1084. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1085. );
  1086. return false;
  1087. }
  1088. }
  1089. }
  1090. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username_new))) {
  1091. $_SESSION['return'] = array(
  1092. 'type' => 'danger',
  1093. 'msg' => sprintf($lang['danger']['username_invalid'])
  1094. );
  1095. return false;
  1096. }
  1097. if ($username_new != $username) {
  1098. if (!empty(get_domain_admin_details($username_new)['username'])) {
  1099. $_SESSION['return'] = array(
  1100. 'type' => 'danger',
  1101. 'msg' => sprintf($lang['danger']['username_invalid'])
  1102. );
  1103. return false;
  1104. }
  1105. }
  1106. try {
  1107. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1108. $stmt->execute(array(
  1109. ':username' => $username,
  1110. ));
  1111. }
  1112. catch (PDOException $e) {
  1113. $_SESSION['return'] = array(
  1114. 'type' => 'danger',
  1115. 'msg' => 'MySQL: '.$e
  1116. );
  1117. return false;
  1118. }
  1119. if (!empty($domains)) {
  1120. foreach ($domains as $domain) {
  1121. try {
  1122. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1123. VALUES (:username_new, :domain, :created, :active)");
  1124. $stmt->execute(array(
  1125. ':username_new' => $username_new,
  1126. ':domain' => $domain,
  1127. ':created' => date('Y-m-d H:i:s'),
  1128. ':active' => $active
  1129. ));
  1130. }
  1131. catch (PDOException $e) {
  1132. $_SESSION['return'] = array(
  1133. 'type' => 'danger',
  1134. 'msg' => 'MySQL: '.$e
  1135. );
  1136. return false;
  1137. }
  1138. }
  1139. }
  1140. if (!empty($password) && !empty($password2)) {
  1141. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  1142. $_SESSION['return'] = array(
  1143. 'type' => 'danger',
  1144. 'msg' => sprintf($lang['danger']['password_complexity'])
  1145. );
  1146. return false;
  1147. }
  1148. if ($password != $password2) {
  1149. $_SESSION['return'] = array(
  1150. 'type' => 'danger',
  1151. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1152. );
  1153. return false;
  1154. }
  1155. $password_hashed = hash_password($password);
  1156. try {
  1157. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active, `password` = :password_hashed WHERE `username` = :username");
  1158. $stmt->execute(array(
  1159. ':password_hashed' => $password_hashed,
  1160. ':username_new' => $username_new,
  1161. ':username' => $username,
  1162. ':active' => $active
  1163. ));
  1164. if (isset($postarray['disable_tfa'])) {
  1165. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  1166. $stmt->execute(array(':username' => $username));
  1167. }
  1168. else {
  1169. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  1170. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  1171. }
  1172. }
  1173. catch (PDOException $e) {
  1174. $_SESSION['return'] = array(
  1175. 'type' => 'danger',
  1176. 'msg' => 'MySQL: '.$e
  1177. );
  1178. return false;
  1179. }
  1180. }
  1181. else {
  1182. try {
  1183. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username_new, `active` = :active WHERE `username` = :username");
  1184. $stmt->execute(array(
  1185. ':username_new' => $username_new,
  1186. ':username' => $username,
  1187. ':active' => $active
  1188. ));
  1189. if (isset($postarray['disable_tfa'])) {
  1190. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  1191. $stmt->execute(array(':username' => $username));
  1192. }
  1193. else {
  1194. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username_new WHERE `username` = :username");
  1195. $stmt->execute(array(':username_new' => $username_new, ':username' => $username));
  1196. }
  1197. }
  1198. catch (PDOException $e) {
  1199. $_SESSION['return'] = array(
  1200. 'type' => 'danger',
  1201. 'msg' => 'MySQL: '.$e
  1202. );
  1203. return false;
  1204. }
  1205. }
  1206. }
  1207. $_SESSION['return'] = array(
  1208. 'type' => 'success',
  1209. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars(implode(', ', $usernames)))
  1210. );
  1211. }
  1212. // Domain administrator
  1213. // Can only edit itself
  1214. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  1215. $username = $_SESSION['mailcow_cc_username'];
  1216. $password_old = $postarray['user_old_pass'];
  1217. $password_new = $postarray['user_new_pass'];
  1218. $password_new2 = $postarray['user_new_pass2'];
  1219. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  1220. WHERE `username` = :user");
  1221. $stmt->execute(array(':user' => $username));
  1222. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1223. if (!verify_ssha256($row['password'], $password_old)) {
  1224. $_SESSION['return'] = array(
  1225. 'type' => 'danger',
  1226. 'msg' => sprintf($lang['danger']['access_denied'])
  1227. );
  1228. return false;
  1229. }
  1230. if (!empty($password_new2) && !empty($password_new)) {
  1231. if ($password_new2 != $password_new) {
  1232. $_SESSION['return'] = array(
  1233. 'type' => 'danger',
  1234. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1235. );
  1236. return false;
  1237. }
  1238. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  1239. $_SESSION['return'] = array(
  1240. 'type' => 'danger',
  1241. 'msg' => sprintf($lang['danger']['password_complexity'])
  1242. );
  1243. return false;
  1244. }
  1245. $password_hashed = hash_password($password_new);
  1246. try {
  1247. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  1248. $stmt->execute(array(
  1249. ':password_hashed' => $password_hashed,
  1250. ':username' => $username
  1251. ));
  1252. }
  1253. catch (PDOException $e) {
  1254. $_SESSION['return'] = array(
  1255. 'type' => 'danger',
  1256. 'msg' => 'MySQL: '.$e
  1257. );
  1258. return false;
  1259. }
  1260. }
  1261. $_SESSION['return'] = array(
  1262. 'type' => 'success',
  1263. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1264. );
  1265. }
  1266. }
  1267. function get_admin_details() {
  1268. // No parameter to be given, only one admin should exist
  1269. global $pdo;
  1270. global $lang;
  1271. $data = array();
  1272. if ($_SESSION['mailcow_cc_role'] != 'admin') {
  1273. return false;
  1274. }
  1275. try {
  1276. $stmt = $pdo->prepare("SELECT `username`, `modified`, `created` FROM `admin` WHERE `superadmin`='1' AND active='1'");
  1277. $stmt->execute();
  1278. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  1279. }
  1280. catch(PDOException $e) {
  1281. $_SESSION['return'] = array(
  1282. 'type' => 'danger',
  1283. 'msg' => 'MySQL: '.$e
  1284. );
  1285. }
  1286. return $data;
  1287. }
  1288. function dkim_add_key($postarray) {
  1289. global $lang;
  1290. global $pdo;
  1291. global $redis;
  1292. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1293. $_SESSION['return'] = array(
  1294. 'type' => 'danger',
  1295. 'msg' => sprintf($lang['danger']['access_denied'])
  1296. );
  1297. return false;
  1298. }
  1299. // if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1300. // $_SESSION['return'] = array(
  1301. // 'type' => 'danger',
  1302. // 'msg' => sprintf($lang['danger']['access_denied'])
  1303. // );
  1304. // return false;
  1305. // }
  1306. $key_length = intval($postarray['key_size']);
  1307. $dkim_selector = (isset($postarray['dkim_selector'])) ? $postarray['dkim_selector'] : 'dkim';
  1308. $domain = $postarray['domain'];
  1309. if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
  1310. $_SESSION['return'] = array(
  1311. 'type' => 'danger',
  1312. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1313. );
  1314. return false;
  1315. }
  1316. if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim')) ||
  1317. $redis->hGet('DKIM_PUB_KEYS', $domain)) {
  1318. $_SESSION['return'] = array(
  1319. 'type' => 'danger',
  1320. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1321. );
  1322. return false;
  1323. }
  1324. if (!ctype_alnum($dkim_selector)) {
  1325. $_SESSION['return'] = array(
  1326. 'type' => 'danger',
  1327. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1328. );
  1329. return false;
  1330. }
  1331. $config = array(
  1332. "digest_alg" => "sha256",
  1333. "private_key_bits" => $key_length,
  1334. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  1335. );
  1336. if ($keypair_ressource = openssl_pkey_new($config)) {
  1337. $key_details = openssl_pkey_get_details($keypair_ressource);
  1338. $pubKey = implode(array_slice(
  1339. array_filter(
  1340. explode(PHP_EOL, $key_details['key'])
  1341. ), 1, -1)
  1342. );
  1343. // Save public key and selector to redis
  1344. try {
  1345. $redis->hSet('DKIM_PUB_KEYS', $domain, $pubKey);
  1346. $redis->hSet('DKIM_SELECTORS', $domain, $dkim_selector);
  1347. }
  1348. catch (RedisException $e) {
  1349. $_SESSION['return'] = array(
  1350. 'type' => 'danger',
  1351. 'msg' => 'Redis: '.$e
  1352. );
  1353. return false;
  1354. }
  1355. // Export private key and save private key to redis
  1356. openssl_pkey_export($keypair_ressource, $privKey);
  1357. if (isset($privKey) && !empty($privKey)) {
  1358. try {
  1359. $redis->hSet('DKIM_PRIV_KEYS', $dkim_selector . '.' . $domain, trim($privKey));
  1360. }
  1361. catch (RedisException $e) {
  1362. $_SESSION['return'] = array(
  1363. 'type' => 'danger',
  1364. 'msg' => 'Redis: '.$e
  1365. );
  1366. return false;
  1367. }
  1368. }
  1369. $_SESSION['return'] = array(
  1370. 'type' => 'success',
  1371. 'msg' => sprintf($lang['success']['dkim_added'])
  1372. );
  1373. return true;
  1374. }
  1375. else {
  1376. $_SESSION['return'] = array(
  1377. 'type' => 'danger',
  1378. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1379. );
  1380. return false;
  1381. }
  1382. }
  1383. function dkim_get_key_details($domain) {
  1384. global $redis;
  1385. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1386. return false;
  1387. }
  1388. $data = array();
  1389. if ($redis_dkim_key_data = $redis->hGet('DKIM_PUB_KEYS', $domain)) {
  1390. $data['pubkey'] = $redis_dkim_key_data;
  1391. $data['length'] = (strlen($data['pubkey']) < 391) ? 1024 : 2048;
  1392. $data['dkim_txt'] = 'v=DKIM1;k=rsa;t=s;s=email;p=' . $redis_dkim_key_data;
  1393. $data['dkim_selector'] = $redis->hGet('DKIM_SELECTORS', $domain);
  1394. }
  1395. return $data;
  1396. }
  1397. function dkim_get_blind_keys() {
  1398. global $redis;
  1399. global $lang;
  1400. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1401. return false;
  1402. }
  1403. $domains = array();
  1404. foreach ($redis->hKeys('DKIM_PUB_KEYS') as $redis_dkim_domain) {
  1405. $domains[] = $redis_dkim_domain;
  1406. }
  1407. return array_diff($domains, array_merge(mailbox('get', 'domains'), mailbox('get', 'alias_domains')));
  1408. }
  1409. function dkim_delete_key($postarray) {
  1410. global $redis;
  1411. global $lang;
  1412. if (!is_array($postarray['domains'])) {
  1413. $domains = array();
  1414. $domains[] = $postarray['domains'];
  1415. }
  1416. else {
  1417. $domains = $postarray['domains'];
  1418. }
  1419. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1420. $_SESSION['return'] = array(
  1421. 'type' => 'danger',
  1422. 'msg' => sprintf($lang['danger']['access_denied'])
  1423. );
  1424. return false;
  1425. }
  1426. foreach ($domains as $domain) {
  1427. if (!is_valid_domain_name($domain)) {
  1428. $_SESSION['return'] = array(
  1429. 'type' => 'danger',
  1430. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1431. );
  1432. return false;
  1433. }
  1434. try {
  1435. $selector = $redis->hGet('DKIM_SELECTORS', $domain);
  1436. $redis->hDel('DKIM_PUB_KEYS', $domain);
  1437. $redis->hDel('DKIM_PRIV_KEYS', $selector . '.' . $domain);
  1438. $redis->hDel('DKIM_SELECTORS', $domain);
  1439. }
  1440. catch (RedisException $e) {
  1441. $_SESSION['return'] = array(
  1442. 'type' => 'danger',
  1443. 'msg' => 'Redis: '.$e
  1444. );
  1445. return false;
  1446. }
  1447. }
  1448. $_SESSION['return'] = array(
  1449. 'type' => 'success',
  1450. 'msg' => sprintf($lang['success']['dkim_removed'], htmlspecialchars(implode(', ', $domains)))
  1451. );
  1452. return true;
  1453. }
  1454. function get_u2f_registrations($username) {
  1455. global $pdo;
  1456. $sel = $pdo->prepare("SELECT * FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = ? AND `active` = '1'");
  1457. $sel->execute(array($username));
  1458. return $sel->fetchAll(PDO::FETCH_OBJ);
  1459. }
  1460. function get_forwarding_hosts() {
  1461. global $redis;
  1462. $data = array();
  1463. try {
  1464. $fwd_hosts = $redis->hGetAll('WHITELISTED_FWD_HOST');
  1465. if (!empty($fwd_hosts)) {
  1466. foreach ($fwd_hosts as $fwd_host => $source) {
  1467. $data[] = $fwd_host;
  1468. }
  1469. }
  1470. }
  1471. catch (RedisException $e) {
  1472. $_SESSION['return'] = array(
  1473. 'type' => 'danger',
  1474. 'msg' => 'Redis: '.$e
  1475. );
  1476. return false;
  1477. }
  1478. return $data;
  1479. }
  1480. function get_forwarding_host_details($host) {
  1481. global $redis;
  1482. $data = array();
  1483. if (!isset($host) || empty($host)) {
  1484. return false;
  1485. }
  1486. try {
  1487. if ($source = $redis->hGet('WHITELISTED_FWD_HOST', $host)) {
  1488. $data['host'] = $host;
  1489. $data['source'] = $source;
  1490. $data['keep_spam'] = ($redis->hGet('KEEP_SPAM', $host)) ? "yes" : "no";
  1491. }
  1492. }
  1493. catch (RedisException $e) {
  1494. $_SESSION['return'] = array(
  1495. 'type' => 'danger',
  1496. 'msg' => 'Redis: '.$e
  1497. );
  1498. return false;
  1499. }
  1500. return $data;
  1501. }
  1502. function add_forwarding_host($postarray) {
  1503. require_once 'spf.inc.php';
  1504. global $redis;
  1505. global $lang;
  1506. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1507. $_SESSION['return'] = array(
  1508. 'type' => 'danger',
  1509. 'msg' => sprintf($lang['danger']['access_denied'])
  1510. );
  1511. return false;
  1512. }
  1513. $source = $postarray['hostname'];
  1514. $host = trim($postarray['hostname']);
  1515. $filter_spam = $postarray['filter_spam'];
  1516. if (isset($postarray['filter_spam']) && $postarray['filter_spam'] == 1) {
  1517. $filter_spam = 1;
  1518. }
  1519. else {
  1520. $filter_spam = 0;
  1521. }
  1522. if (preg_match('/^[0-9a-fA-F:\/]+$/', $host)) { // IPv6 address
  1523. $hosts = array($host);
  1524. }
  1525. elseif (preg_match('/^[0-9\.\/]+$/', $host)) { // IPv4 address
  1526. $hosts = array($host);
  1527. }
  1528. else {
  1529. $hosts = get_outgoing_hosts_best_guess($host);
  1530. }
  1531. if (empty($hosts)) {
  1532. $_SESSION['return'] = array(
  1533. 'type' => 'danger',
  1534. 'msg' => 'Invalid host specified: '. htmlspecialchars($host)
  1535. );
  1536. return false;
  1537. }
  1538. foreach ($hosts as $host) {
  1539. try {
  1540. $redis->hSet('WHITELISTED_FWD_HOST', $host, $source);
  1541. if ($filter_spam == 0) {
  1542. $redis->hSet('KEEP_SPAM', $host, 1);
  1543. }
  1544. elseif ($redis->hGet('KEEP_SPAM', $host)) {
  1545. $redis->hDel('KEEP_SPAM', $host);
  1546. }
  1547. }
  1548. catch (RedisException $e) {
  1549. $_SESSION['return'] = array(
  1550. 'type' => 'danger',
  1551. 'msg' => 'Redis: '.$e
  1552. );
  1553. return false;
  1554. }
  1555. }
  1556. $_SESSION['return'] = array(
  1557. 'type' => 'success',
  1558. 'msg' => sprintf($lang['success']['forwarding_host_added'], htmlspecialchars(implode(', ', $hosts)))
  1559. );
  1560. }
  1561. function delete_forwarding_host($postarray) {
  1562. global $redis;
  1563. global $lang;
  1564. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1565. $_SESSION['return'] = array(
  1566. 'type' => 'danger',
  1567. 'msg' => sprintf($lang['danger']['access_denied'])
  1568. );
  1569. return false;
  1570. }
  1571. if (!is_array($postarray['forwardinghost'])) {
  1572. $hosts = array();
  1573. $hosts[] = $postarray['forwardinghost'];
  1574. }
  1575. else {
  1576. $hosts = $postarray['forwardinghost'];
  1577. }
  1578. foreach ($hosts as $host) {
  1579. try {
  1580. $redis->hDel('WHITELISTED_FWD_HOST', $host);
  1581. $redis->hDel('KEEP_SPAM', $host);
  1582. }
  1583. catch (RedisException $e) {
  1584. $_SESSION['return'] = array(
  1585. 'type' => 'danger',
  1586. 'msg' => 'Redis: '.$e
  1587. );
  1588. return false;
  1589. }
  1590. }
  1591. $_SESSION['return'] = array(
  1592. 'type' => 'success',
  1593. 'msg' => sprintf($lang['success']['forwarding_host_removed'], htmlspecialchars(implode(', ', $hosts)))
  1594. );
  1595. }
  1596. function get_logs($container, $lines = 100) {
  1597. global $lang;
  1598. global $redis;
  1599. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1600. return false;
  1601. }
  1602. $lines = intval($lines);
  1603. if ($container == "dovecot-mailcow") {
  1604. if ($data = $redis->lRange('DOVECOT_MAILLOG', 1, $lines)) {
  1605. foreach ($data as $json_line) {
  1606. $data_array[] = json_decode($json_line, true);
  1607. }
  1608. return $data_array;
  1609. }
  1610. }
  1611. if ($container == "postfix-mailcow") {
  1612. if ($data = $redis->lRange('POSTFIX_MAILLOG', 1, $lines)) {
  1613. foreach ($data as $json_line) {
  1614. $data_array[] = json_decode($json_line, true);
  1615. }
  1616. return $data_array;
  1617. }
  1618. }
  1619. if ($container == "sogo-mailcow") {
  1620. if ($data = $redis->lRange('SOGO_LOG', 1, $lines)) {
  1621. foreach ($data as $json_line) {
  1622. $data_array[] = json_decode($json_line, true);
  1623. }
  1624. return $data_array;
  1625. }
  1626. }
  1627. if ($container == "rspamd-history") {
  1628. $curl = curl_init();
  1629. curl_setopt($curl, CURLOPT_URL,"http://rspamd-mailcow:11334/history");
  1630. curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
  1631. $history = curl_exec($curl);
  1632. if (!curl_errno($ch)) {
  1633. $data_array = json_decode($history, true);
  1634. curl_close($curl);
  1635. return $data_array['rows'];
  1636. }
  1637. curl_close($curl);
  1638. return false;
  1639. }
  1640. return false;
  1641. }
  1642. ?>