functions.inc.php 52 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657
  1. <?php
  2. function hash_password($password) {
  3. $salt_str = bin2hex(openssl_random_pseudo_bytes(8));
  4. return "{SSHA256}".base64_encode(hash('sha256', $password . $salt_str, true) . $salt_str);
  5. }
  6. function hasDomainAccess($username, $role, $domain) {
  7. global $pdo;
  8. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  9. return false;
  10. }
  11. if (empty($domain) || !is_valid_domain_name($domain)) {
  12. return false;
  13. }
  14. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  15. return false;
  16. }
  17. try {
  18. $stmt = $pdo->prepare("SELECT `domain` FROM `domain_admins`
  19. WHERE (
  20. `active`='1'
  21. AND `username` = :username
  22. AND (`domain` = :domain1 OR `domain` = (SELECT `target_domain` FROM `alias_domain` WHERE `alias_domain` = :domain2))
  23. )
  24. OR 'admin' = :role");
  25. $stmt->execute(array(':username' => $username, ':domain1' => $domain, ':domain2' => $domain, ':role' => $role));
  26. $num_results = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  27. }
  28. catch(PDOException $e) {
  29. $_SESSION['return'] = array(
  30. 'type' => 'danger',
  31. 'msg' => 'MySQL: '.$e
  32. );
  33. return false;
  34. }
  35. if (!empty($num_results)) {
  36. return true;
  37. }
  38. return false;
  39. }
  40. function hasMailboxObjectAccess($username, $role, $object) {
  41. global $pdo;
  42. if (!filter_var($username, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  43. return false;
  44. }
  45. if ($role != 'admin' && $role != 'domainadmin' && $role != 'user') {
  46. return false;
  47. }
  48. if ($username == $object) {
  49. return true;
  50. }
  51. try {
  52. $stmt = $pdo->prepare("SELECT `domain` FROM `mailbox` WHERE `username` = :object");
  53. $stmt->execute(array(':object' => $object));
  54. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  55. if (isset($row['domain']) && hasDomainAccess($username, $role, $row['domain'])) {
  56. return true;
  57. }
  58. }
  59. catch(PDOException $e) {
  60. error_log($e);
  61. return false;
  62. }
  63. return false;
  64. }
  65. function verify_ssha256($hash, $password) {
  66. // Remove tag if any
  67. $hash = ltrim($hash, '{SSHA256}');
  68. // Decode hash
  69. $dhash = base64_decode($hash);
  70. // Get first 32 bytes of binary which equals a SHA256 hash
  71. $ohash = substr($dhash, 0, 32);
  72. // Remove SHA256 hash from decoded hash to get original salt string
  73. $osalt = str_replace($ohash, '', $dhash);
  74. // Check single salted SHA256 hash against extracted hash
  75. if (hash('sha256', $password . $osalt, true) == $ohash) {
  76. return true;
  77. }
  78. else {
  79. return false;
  80. }
  81. }
  82. function doveadm_authenticate($hash, $algorithm, $password) {
  83. $descr = array(0 => array('pipe', 'r'), 1 => array('pipe', 'w'), 2 => array('pipe', 'w'));
  84. $pipes = array();
  85. $process = proc_open("/usr/bin/doveadm pw -s ".$algorithm." -t '".$hash."'", $descr, $pipes);
  86. if (is_resource($process)) {
  87. fputs($pipes[0], $password);
  88. fclose($pipes[0]);
  89. while ($f = fgets($pipes[1])) {
  90. if (preg_match('/(verified)/', $f)) {
  91. proc_close($process);
  92. return true;
  93. }
  94. return false;
  95. }
  96. fclose($pipes[1]);
  97. while ($f = fgets($pipes[2])) {
  98. proc_close($process);
  99. return false;
  100. }
  101. fclose($pipes[2]);
  102. proc_close($process);
  103. }
  104. return false;
  105. }
  106. function check_login($user, $pass) {
  107. global $pdo;
  108. if (!filter_var($user, FILTER_VALIDATE_EMAIL) && !ctype_alnum(str_replace(array('_', '.', '-'), '', $user))) {
  109. return false;
  110. }
  111. $user = strtolower(trim($user));
  112. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  113. WHERE `superadmin` = '1'
  114. AND `username` = :user");
  115. $stmt->execute(array(':user' => $user));
  116. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  117. foreach ($rows as $row) {
  118. if (verify_ssha256($row['password'], $pass)) {
  119. if (get_tfa($user)['name'] != "none") {
  120. $_SESSION['pending_mailcow_cc_username'] = $user;
  121. $_SESSION['pending_mailcow_cc_role'] = "admin";
  122. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  123. unset($_SESSION['ldelay']);
  124. return "pending";
  125. }
  126. else {
  127. unset($_SESSION['ldelay']);
  128. return "admin";
  129. }
  130. }
  131. }
  132. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  133. WHERE `superadmin` = '0'
  134. AND `active`='1'
  135. AND `username` = :user");
  136. $stmt->execute(array(':user' => $user));
  137. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  138. foreach ($rows as $row) {
  139. if (verify_ssha256($row['password'], $pass) !== false) {
  140. if (get_tfa($user)['name'] != "none") {
  141. $_SESSION['pending_mailcow_cc_username'] = $user;
  142. $_SESSION['pending_mailcow_cc_role'] = "domainadmin";
  143. $_SESSION['pending_tfa_method'] = get_tfa($user)['name'];
  144. unset($_SESSION['ldelay']);
  145. return "pending";
  146. }
  147. else {
  148. unset($_SESSION['ldelay']);
  149. $stmt = $pdo->prepare("UPDATE `tfa` SET `active`='1' WHERE `username` = :user");
  150. $stmt->execute(array(':user' => $user));
  151. return "domainadmin";
  152. }
  153. }
  154. }
  155. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  156. WHERE `kind` NOT REGEXP 'location|thing|group'
  157. AND `active`='1'
  158. AND `username` = :user");
  159. $stmt->execute(array(':user' => $user));
  160. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  161. foreach ($rows as $row) {
  162. if (verify_ssha256($row['password'], $pass) !== false) {
  163. unset($_SESSION['ldelay']);
  164. return "user";
  165. }
  166. }
  167. if (!isset($_SESSION['ldelay'])) {
  168. $_SESSION['ldelay'] = "0";
  169. }
  170. elseif (!isset($_SESSION['mailcow_cc_username'])) {
  171. $_SESSION['ldelay'] = $_SESSION['ldelay']+0.5;
  172. }
  173. sleep($_SESSION['ldelay']);
  174. }
  175. function formatBytes($size, $precision = 2) {
  176. if(!is_numeric($size)) {
  177. return "0";
  178. }
  179. $base = log($size, 1024);
  180. $suffixes = array(' Byte', ' KiB', ' MiB', ' GiB', ' TiB');
  181. if ($size == "0") {
  182. return "0";
  183. }
  184. return round(pow(1024, $base - floor($base)), $precision) . $suffixes[floor($base)];
  185. }
  186. function edit_admin_account($postarray) {
  187. global $lang;
  188. global $pdo;
  189. if ($_SESSION['mailcow_cc_role'] != "admin") {
  190. $_SESSION['return'] = array(
  191. 'type' => 'danger',
  192. 'msg' => sprintf($lang['danger']['access_denied'])
  193. );
  194. return false;
  195. }
  196. $username = $postarray['admin_user'];
  197. $username_now = $_SESSION['mailcow_cc_username'];
  198. $password = $postarray['admin_pass'];
  199. $password2 = $postarray['admin_pass2'];
  200. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  201. $_SESSION['return'] = array(
  202. 'type' => 'danger',
  203. 'msg' => sprintf($lang['danger']['username_invalid'])
  204. );
  205. return false;
  206. }
  207. if (!empty($password) && !empty($password2)) {
  208. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  209. $_SESSION['return'] = array(
  210. 'type' => 'danger',
  211. 'msg' => sprintf($lang['danger']['password_complexity'])
  212. );
  213. return false;
  214. }
  215. if ($password != $password2) {
  216. $_SESSION['return'] = array(
  217. 'type' => 'danger',
  218. 'msg' => sprintf($lang['danger']['password_mismatch'])
  219. );
  220. return false;
  221. }
  222. $password_hashed = hash_password($password);
  223. try {
  224. $stmt = $pdo->prepare("UPDATE `admin` SET
  225. `password` = :password_hashed,
  226. `username` = :username1
  227. WHERE `username` = :username2");
  228. $stmt->execute(array(
  229. ':password_hashed' => $password_hashed,
  230. ':username1' => $username,
  231. ':username2' => $username_now
  232. ));
  233. }
  234. catch (PDOException $e) {
  235. $_SESSION['return'] = array(
  236. 'type' => 'danger',
  237. 'msg' => 'MySQL: '.$e
  238. );
  239. return false;
  240. }
  241. }
  242. else {
  243. try {
  244. $stmt = $pdo->prepare("UPDATE `admin` SET
  245. `username` = :username1
  246. WHERE `username` = :username2");
  247. $stmt->execute(array(
  248. ':username1' => $username,
  249. ':username2' => $username_now
  250. ));
  251. }
  252. catch (PDOException $e) {
  253. $_SESSION['return'] = array(
  254. 'type' => 'danger',
  255. 'msg' => 'MySQL: '.$e
  256. );
  257. return false;
  258. }
  259. }
  260. try {
  261. $stmt = $pdo->prepare("UPDATE `domain_admins` SET `domain` = 'ALL', `username` = :username1 WHERE `username` = :username2");
  262. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  263. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username1 WHERE `username` = :username2");
  264. $stmt->execute(array(':username1' => $username, ':username2' => $username_now));
  265. }
  266. catch (PDOException $e) {
  267. $_SESSION['return'] = array(
  268. 'type' => 'danger',
  269. 'msg' => 'MySQL: '.$e
  270. );
  271. return false;
  272. }
  273. $_SESSION['mailcow_cc_username'] = $username;
  274. $_SESSION['return'] = array(
  275. 'type' => 'success',
  276. 'msg' => sprintf($lang['success']['admin_modified'])
  277. );
  278. }
  279. function edit_user_account($postarray) {
  280. global $lang;
  281. global $pdo;
  282. if (isset($postarray['username']) && filter_var($postarray['username'], FILTER_VALIDATE_EMAIL)) {
  283. if (!hasMailboxObjectAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $postarray['username'])) {
  284. $_SESSION['return'] = array(
  285. 'type' => 'danger',
  286. 'msg' => sprintf($lang['danger']['access_denied'])
  287. );
  288. return false;
  289. }
  290. else {
  291. $username = $postarray['username'];
  292. }
  293. }
  294. else {
  295. $username = $_SESSION['mailcow_cc_username'];
  296. }
  297. $password_old = $postarray['user_old_pass'];
  298. if (isset($postarray['user_new_pass']) && isset($postarray['user_new_pass2'])) {
  299. $password_new = $postarray['user_new_pass'];
  300. $password_new2 = $postarray['user_new_pass2'];
  301. }
  302. $stmt = $pdo->prepare("SELECT `password` FROM `mailbox`
  303. WHERE `kind` NOT REGEXP 'location|thing|group'
  304. AND `username` = :user");
  305. $stmt->execute(array(':user' => $username));
  306. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  307. if (!verify_ssha256($row['password'], $password_old)) {
  308. $_SESSION['return'] = array(
  309. 'type' => 'danger',
  310. 'msg' => sprintf($lang['danger']['access_denied'])
  311. );
  312. return false;
  313. }
  314. if (isset($password_new) && isset($password_new2)) {
  315. if (!empty($password_new2) && !empty($password_new)) {
  316. if ($password_new2 != $password_new) {
  317. $_SESSION['return'] = array(
  318. 'type' => 'danger',
  319. 'msg' => sprintf($lang['danger']['password_mismatch'])
  320. );
  321. return false;
  322. }
  323. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  324. $_SESSION['return'] = array(
  325. 'type' => 'danger',
  326. 'msg' => sprintf($lang['danger']['password_complexity'])
  327. );
  328. return false;
  329. }
  330. $password_hashed = hash_password($password_new);
  331. try {
  332. $stmt = $pdo->prepare("UPDATE `mailbox` SET `password` = :password_hashed WHERE `username` = :username");
  333. $stmt->execute(array(
  334. ':password_hashed' => $password_hashed,
  335. ':username' => $username
  336. ));
  337. }
  338. catch (PDOException $e) {
  339. $_SESSION['return'] = array(
  340. 'type' => 'danger',
  341. 'msg' => 'MySQL: '.$e
  342. );
  343. return false;
  344. }
  345. }
  346. }
  347. $_SESSION['return'] = array(
  348. 'type' => 'success',
  349. 'msg' => sprintf($lang['success']['mailbox_modified'], htmlspecialchars($username))
  350. );
  351. }
  352. function user_get_alias_details($username) {
  353. global $lang;
  354. global $pdo;
  355. if ($_SESSION['mailcow_cc_role'] == "user") {
  356. $username = $_SESSION['mailcow_cc_username'];
  357. }
  358. if (!filter_var($username, FILTER_VALIDATE_EMAIL)) {
  359. return false;
  360. }
  361. try {
  362. $data['address'] = $username;
  363. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') AS `aliases` FROM `alias`
  364. WHERE `goto` REGEXP :username_goto
  365. AND `address` NOT LIKE '@%'
  366. AND `address` != :username_address");
  367. $stmt->execute(array(':username_goto' => '(^|,)'.$username.'($|,)', ':username_address' => $username));
  368. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  369. while ($row = array_shift($run)) {
  370. $data['aliases'] = $row['aliases'];
  371. }
  372. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(local_part, '@', alias_domain SEPARATOR ', '), '&#10008;') AS `ad_alias` FROM `mailbox`
  373. LEFT OUTER JOIN `alias_domain` on `target_domain` = `domain`
  374. WHERE `username` = :username ;");
  375. $stmt->execute(array(':username' => $username));
  376. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  377. while ($row = array_shift($run)) {
  378. $data['ad_alias'] = $row['ad_alias'];
  379. }
  380. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` NOT LIKE '@%';");
  381. $stmt->execute(array(':username' => $username));
  382. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  383. while ($row = array_shift($run)) {
  384. $data['aliases_also_send_as'] = $row['send_as'];
  385. }
  386. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`send_as` SEPARATOR ', '), '&#10008;') AS `send_as` FROM `sender_acl` WHERE `logged_in_as` = :username AND `send_as` LIKE '@%';");
  387. $stmt->execute(array(':username' => $username));
  388. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  389. while ($row = array_shift($run)) {
  390. $data['aliases_send_as_all'] = $row['send_as'];
  391. }
  392. $stmt = $pdo->prepare("SELECT IFNULL(GROUP_CONCAT(`address` SEPARATOR ', '), '&#10008;') as `address` FROM `alias` WHERE `goto` REGEXP :username AND `address` LIKE '@%';");
  393. $stmt->execute(array(':username' => '(^|,)'.$username.'($|,)'));
  394. $run = $stmt->fetchAll(PDO::FETCH_ASSOC);
  395. while ($row = array_shift($run)) {
  396. $data['is_catch_all'] = $row['address'];
  397. }
  398. return $data;
  399. }
  400. catch(PDOException $e) {
  401. $_SESSION['return'] = array(
  402. 'type' => 'danger',
  403. 'msg' => 'MySQL: '.$e
  404. );
  405. return false;
  406. }
  407. }
  408. function is_valid_domain_name($domain_name) {
  409. if (empty($domain_name)) {
  410. return false;
  411. }
  412. $domain_name = idn_to_ascii($domain_name);
  413. return (preg_match("/^([a-z\d](-*[a-z\d])*)(\.([a-z\d](-*[a-z\d])*))*$/i", $domain_name)
  414. && preg_match("/^.{1,253}$/", $domain_name)
  415. && preg_match("/^[^\.]{1,63}(\.[^\.]{1,63})*$/", $domain_name));
  416. }
  417. function add_domain_admin($postarray) {
  418. global $lang;
  419. global $pdo;
  420. $username = strtolower(trim($postarray['username']));
  421. $password = $postarray['password'];
  422. $password2 = $postarray['password2'];
  423. $active = intval($postarray['active']);
  424. if ($_SESSION['mailcow_cc_role'] != "admin") {
  425. $_SESSION['return'] = array(
  426. 'type' => 'danger',
  427. 'msg' => sprintf($lang['danger']['access_denied'])
  428. );
  429. return false;
  430. }
  431. if (empty($postarray['domain'])) {
  432. $_SESSION['return'] = array(
  433. 'type' => 'danger',
  434. 'msg' => sprintf($lang['danger']['domain_invalid'])
  435. );
  436. return false;
  437. }
  438. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username)) || empty ($username)) {
  439. $_SESSION['return'] = array(
  440. 'type' => 'danger',
  441. 'msg' => sprintf($lang['danger']['username_invalid'])
  442. );
  443. return false;
  444. }
  445. try {
  446. $stmt = $pdo->prepare("SELECT `username` FROM `mailbox`
  447. WHERE `username` = :username");
  448. $stmt->execute(array(':username' => $username));
  449. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  450. $stmt = $pdo->prepare("SELECT `username` FROM `admin`
  451. WHERE `username` = :username");
  452. $stmt->execute(array(':username' => $username));
  453. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  454. $stmt = $pdo->prepare("SELECT `username` FROM `domain_admins`
  455. WHERE `username` = :username");
  456. $stmt->execute(array(':username' => $username));
  457. $num_results[] = count($stmt->fetchAll(PDO::FETCH_ASSOC));
  458. }
  459. catch(PDOException $e) {
  460. $_SESSION['return'] = array(
  461. 'type' => 'danger',
  462. 'msg' => 'MySQL: '.$e
  463. );
  464. return false;
  465. }
  466. foreach ($num_results as $num_results_each) {
  467. if ($num_results_each != 0) {
  468. $_SESSION['return'] = array(
  469. 'type' => 'danger',
  470. 'msg' => sprintf($lang['danger']['object_exists'], htmlspecialchars($username))
  471. );
  472. return false;
  473. }
  474. }
  475. if (!empty($password) && !empty($password2)) {
  476. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  477. $_SESSION['return'] = array(
  478. 'type' => 'danger',
  479. 'msg' => sprintf($lang['danger']['password_complexity'])
  480. );
  481. return false;
  482. }
  483. if ($password != $password2) {
  484. $_SESSION['return'] = array(
  485. 'type' => 'danger',
  486. 'msg' => sprintf($lang['danger']['password_mismatch'])
  487. );
  488. return false;
  489. }
  490. $password_hashed = hash_password($password);
  491. foreach ($postarray['domain'] as $domain) {
  492. if (!is_valid_domain_name($domain)) {
  493. $_SESSION['return'] = array(
  494. 'type' => 'danger',
  495. 'msg' => sprintf($lang['danger']['domain_invalid'])
  496. );
  497. return false;
  498. }
  499. try {
  500. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  501. VALUES (:username, :domain, :created, :active)");
  502. $stmt->execute(array(
  503. ':username' => $username,
  504. ':domain' => $domain,
  505. ':created' => date('Y-m-d H:i:s'),
  506. ':active' => $active
  507. ));
  508. }
  509. catch (PDOException $e) {
  510. delete_domain_admin(array('username' => $username));
  511. $_SESSION['return'] = array(
  512. 'type' => 'danger',
  513. 'msg' => 'MySQL: '.$e
  514. );
  515. return false;
  516. }
  517. }
  518. try {
  519. $stmt = $pdo->prepare("INSERT INTO `admin` (`username`, `password`, `superadmin`, `active`)
  520. VALUES (:username, :password_hashed, '0', :active)");
  521. $stmt->execute(array(
  522. ':username' => $username,
  523. ':password_hashed' => $password_hashed,
  524. ':active' => $active
  525. ));
  526. }
  527. catch (PDOException $e) {
  528. $_SESSION['return'] = array(
  529. 'type' => 'danger',
  530. 'msg' => 'MySQL: '.$e
  531. );
  532. return false;
  533. }
  534. }
  535. else {
  536. $_SESSION['return'] = array(
  537. 'type' => 'danger',
  538. 'msg' => sprintf($lang['danger']['password_empty'])
  539. );
  540. return false;
  541. }
  542. $_SESSION['return'] = array(
  543. 'type' => 'success',
  544. 'msg' => sprintf($lang['success']['domain_admin_added'], htmlspecialchars($username))
  545. );
  546. }
  547. function delete_domain_admin($postarray) {
  548. global $pdo;
  549. global $lang;
  550. if ($_SESSION['mailcow_cc_role'] != "admin") {
  551. $_SESSION['return'] = array(
  552. 'type' => 'danger',
  553. 'msg' => sprintf($lang['danger']['access_denied'])
  554. );
  555. return false;
  556. }
  557. $username = $postarray['username'];
  558. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  559. $_SESSION['return'] = array(
  560. 'type' => 'danger',
  561. 'msg' => sprintf($lang['danger']['username_invalid'])
  562. );
  563. return false;
  564. }
  565. try {
  566. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  567. $stmt->execute(array(
  568. ':username' => $username,
  569. ));
  570. $stmt = $pdo->prepare("DELETE FROM `admin` WHERE `username` = :username");
  571. $stmt->execute(array(
  572. ':username' => $username,
  573. ));
  574. }
  575. catch (PDOException $e) {
  576. $_SESSION['return'] = array(
  577. 'type' => 'danger',
  578. 'msg' => 'MySQL: '.$e
  579. );
  580. return false;
  581. }
  582. $_SESSION['return'] = array(
  583. 'type' => 'success',
  584. 'msg' => sprintf($lang['success']['domain_admin_removed'], htmlspecialchars($username))
  585. );
  586. }
  587. function get_domain_admins() {
  588. global $pdo;
  589. global $lang;
  590. $domainadmins = array();
  591. if ($_SESSION['mailcow_cc_role'] != "admin") {
  592. $_SESSION['return'] = array(
  593. 'type' => 'danger',
  594. 'msg' => sprintf($lang['danger']['access_denied'])
  595. );
  596. return false;
  597. }
  598. try {
  599. $stmt = $pdo->query("SELECT DISTINCT
  600. `username`
  601. FROM `domain_admins`
  602. WHERE `username` IN (
  603. SELECT `username` FROM `admin`
  604. WHERE `superadmin`!='1'
  605. )");
  606. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  607. while ($row = array_shift($rows)) {
  608. $domainadmins[] = $row['username'];
  609. }
  610. }
  611. catch(PDOException $e) {
  612. $_SESSION['return'] = array(
  613. 'type' => 'danger',
  614. 'msg' => 'MySQL: '.$e
  615. );
  616. }
  617. return $domainadmins;
  618. }
  619. function get_domain_admin_details($domain_admin) {
  620. global $pdo;
  621. global $lang;
  622. $domainadmindata = array();
  623. if (isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "admin") {
  624. return false;
  625. }
  626. if (!isset($domain_admin) && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  627. return false;
  628. }
  629. (!isset($domain_admin)) ? $domain_admin = $_SESSION['mailcow_cc_username'] : null;
  630. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $domain_admin))) {
  631. return false;
  632. }
  633. try {
  634. $stmt = $pdo->prepare("SELECT
  635. `tfa`.`active` AS `tfa_active_int`,
  636. CASE `tfa`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `tfa_active`,
  637. `domain_admins`.`username`,
  638. `domain_admins`.`created`,
  639. `domain_admins`.`active` AS `active_int`,
  640. CASE `domain_admins`.`active` WHEN 1 THEN '".$lang['mailbox']['yes']."' ELSE '".$lang['mailbox']['no']."' END AS `active`
  641. FROM `domain_admins`
  642. LEFT OUTER JOIN `tfa` ON `tfa`.`username`=`domain_admins`.`username`
  643. WHERE `domain_admins`.`username`= :domain_admin");
  644. $stmt->execute(array(
  645. ':domain_admin' => $domain_admin
  646. ));
  647. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  648. if (empty($row)) {
  649. return false;
  650. }
  651. $domainadmindata['username'] = $row['username'];
  652. $domainadmindata['tfa_active'] = $row['tfa_active'];
  653. $domainadmindata['active'] = $row['active'];
  654. $domainadmindata['tfa_active_int'] = $row['tfa_active_int'];
  655. $domainadmindata['active_int'] = $row['active_int'];
  656. $domainadmindata['modified'] = $row['created'];
  657. // GET SELECTED
  658. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  659. WHERE `domain` IN (
  660. SELECT `domain` FROM `domain_admins`
  661. WHERE `username`= :domain_admin)");
  662. $stmt->execute(array(':domain_admin' => $domain_admin));
  663. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  664. while($row = array_shift($rows)) {
  665. $domainadmindata['selected_domains'][] = $row['domain'];
  666. }
  667. // GET UNSELECTED
  668. $stmt = $pdo->prepare("SELECT `domain` FROM `domain`
  669. WHERE `domain` NOT IN (
  670. SELECT `domain` FROM `domain_admins`
  671. WHERE `username`= :domain_admin)");
  672. $stmt->execute(array(':domain_admin' => $domain_admin));
  673. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  674. while($row = array_shift($rows)) {
  675. $domainadmindata['unselected_domains'][] = $row['domain'];
  676. }
  677. if (!isset($domainadmindata['unselected_domains'])) {
  678. $domainadmindata['unselected_domains'] = "";
  679. }
  680. }
  681. catch(PDOException $e) {
  682. $_SESSION['return'] = array(
  683. 'type' => 'danger',
  684. 'msg' => 'MySQL: '.$e
  685. );
  686. }
  687. return $domainadmindata;
  688. }
  689. function set_tfa($postarray) {
  690. global $lang;
  691. global $pdo;
  692. global $yubi;
  693. global $u2f;
  694. global $tfa;
  695. if ($_SESSION['mailcow_cc_role'] != "domainadmin" &&
  696. $_SESSION['mailcow_cc_role'] != "admin") {
  697. $_SESSION['return'] = array(
  698. 'type' => 'danger',
  699. 'msg' => sprintf($lang['danger']['access_denied'])
  700. );
  701. return false;
  702. }
  703. $username = $_SESSION['mailcow_cc_username'];
  704. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  705. WHERE `username` = :user");
  706. $stmt->execute(array(':user' => $username));
  707. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  708. if (!verify_ssha256($row['password'], $postarray["confirm_password"])) {
  709. $_SESSION['return'] = array(
  710. 'type' => 'danger',
  711. 'msg' => sprintf($lang['danger']['access_denied'])
  712. );
  713. return false;
  714. }
  715. switch ($postarray["tfa_method"]) {
  716. case "yubi_otp":
  717. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  718. $yubico_id = $postarray['yubico_id'];
  719. $yubico_key = $postarray['yubico_key'];
  720. $yubi = new Auth_Yubico($yubico_id, $yubico_key);
  721. if (!$yubi) {
  722. $_SESSION['return'] = array(
  723. 'type' => 'danger',
  724. 'msg' => sprintf($lang['danger']['access_denied'])
  725. );
  726. return false;
  727. }
  728. if (!ctype_alnum($postarray["otp_token"]) || strlen($postarray["otp_token"]) != 44) {
  729. $_SESSION['return'] = array(
  730. 'type' => 'danger',
  731. 'msg' => sprintf($lang['danger']['tfa_token_invalid'])
  732. );
  733. return false;
  734. }
  735. $yauth = $yubi->verify($postarray["otp_token"]);
  736. if (PEAR::isError($yauth)) {
  737. $_SESSION['return'] = array(
  738. 'type' => 'danger',
  739. 'msg' => 'Yubico API: ' . $yauth->getMessage()
  740. );
  741. return false;
  742. }
  743. try {
  744. // We could also do a modhex translation here
  745. $yubico_modhex_id = substr($postarray["otp_token"], 0, 12);
  746. $stmt = $pdo->prepare("DELETE FROM `tfa`
  747. WHERE `username` = :username
  748. AND (`authmech` != 'yubi_otp')
  749. OR (`authmech` = 'yubi_otp' AND `secret` LIKE :modhex)");
  750. $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id));
  751. $stmt = $pdo->prepare("INSERT INTO `tfa` (`key_id`, `username`, `authmech`, `active`, `secret`) VALUES
  752. (:key_id, :username, 'yubi_otp', '1', :secret)");
  753. $stmt->execute(array(':key_id' => $key_id, ':username' => $username, ':secret' => $yubico_id . ':' . $yubico_key . ':' . $yubico_modhex_id));
  754. }
  755. catch (PDOException $e) {
  756. $_SESSION['return'] = array(
  757. 'type' => 'danger',
  758. 'msg' => 'MySQL: '.$e
  759. );
  760. return false;
  761. }
  762. $_SESSION['return'] = array(
  763. 'type' => 'success',
  764. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  765. );
  766. break;
  767. case "u2f":
  768. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  769. try {
  770. $reg = $u2f->doRegister(json_decode($_SESSION['regReq']), json_decode($postarray['token']));
  771. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `authmech` != 'u2f'");
  772. $stmt->execute(array(':username' => $username));
  773. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `keyHandle`, `publicKey`, `certificate`, `counter`, `active`) VALUES (?, ?, 'u2f', ?, ?, ?, ?, '1')");
  774. $stmt->execute(array($username, $key_id, $reg->keyHandle, $reg->publicKey, $reg->certificate, $reg->counter));
  775. $_SESSION['return'] = array(
  776. 'type' => 'success',
  777. 'msg' => sprintf($lang['success']['object_modified'], $username)
  778. );
  779. $_SESSION['regReq'] = null;
  780. }
  781. catch (Exception $e) {
  782. $_SESSION['return'] = array(
  783. 'type' => 'danger',
  784. 'msg' => "U2F: " . $e->getMessage()
  785. );
  786. $_SESSION['regReq'] = null;
  787. return false;
  788. }
  789. break;
  790. case "totp":
  791. $key_id = (!isset($postarray["key_id"])) ? 'unidentified' : $postarray["key_id"];
  792. if ($tfa->verifyCode($_POST['totp_secret'], $_POST['totp_confirm_token']) === true) {
  793. try {
  794. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  795. $stmt->execute(array(':username' => $username));
  796. $stmt = $pdo->prepare("INSERT INTO `tfa` (`username`, `key_id`, `authmech`, `secret`, `active`) VALUES (?, ?, 'totp', ?, '1')");
  797. $stmt->execute(array($username, $key_id, $_POST['totp_secret']));
  798. }
  799. catch (PDOException $e) {
  800. $_SESSION['return'] = array(
  801. 'type' => 'danger',
  802. 'msg' => 'MySQL: '.$e
  803. );
  804. return false;
  805. }
  806. $_SESSION['return'] = array(
  807. 'type' => 'success',
  808. 'msg' => sprintf($lang['success']['object_modified'], $username)
  809. );
  810. }
  811. else {
  812. $_SESSION['return'] = array(
  813. 'type' => 'danger',
  814. 'msg' => 'TOTP verification failed'
  815. );
  816. }
  817. break;
  818. case "none":
  819. try {
  820. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username");
  821. $stmt->execute(array(':username' => $username));
  822. }
  823. catch (PDOException $e) {
  824. $_SESSION['return'] = array(
  825. 'type' => 'danger',
  826. 'msg' => 'MySQL: '.$e
  827. );
  828. return false;
  829. }
  830. $_SESSION['return'] = array(
  831. 'type' => 'success',
  832. 'msg' => sprintf($lang['success']['object_modified'], htmlspecialchars($username))
  833. );
  834. break;
  835. }
  836. }
  837. function unset_tfa_key($postarray) {
  838. // Can only unset own keys
  839. // Needs at least one key left
  840. global $pdo;
  841. global $lang;
  842. $id = intval($postarray['unset_tfa_key']);
  843. if ($_SESSION['mailcow_cc_role'] != "domainadmin" &&
  844. $_SESSION['mailcow_cc_role'] != "admin") {
  845. $_SESSION['return'] = array(
  846. 'type' => 'danger',
  847. 'msg' => sprintf($lang['danger']['access_denied'])
  848. );
  849. return false;
  850. }
  851. $username = $_SESSION['mailcow_cc_username'];
  852. try {
  853. if (!is_numeric($id)) {
  854. $_SESSION['return'] = array(
  855. 'type' => 'danger',
  856. 'msg' => sprintf($lang['danger']['access_denied'])
  857. );
  858. return false;
  859. }
  860. $stmt = $pdo->prepare("SELECT COUNT(*) AS `keys` FROM `tfa`
  861. WHERE `username` = :username AND `active` = '1'");
  862. $stmt->execute(array(':username' => $username));
  863. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  864. if ($row['keys'] == "1") {
  865. $_SESSION['return'] = array(
  866. 'type' => 'danger',
  867. 'msg' => sprintf($lang['danger']['last_key'])
  868. );
  869. return false;
  870. }
  871. $stmt = $pdo->prepare("DELETE FROM `tfa` WHERE `username` = :username AND `id` = :id");
  872. $stmt->execute(array(':username' => $username, ':id' => $id));
  873. $_SESSION['return'] = array(
  874. 'type' => 'success',
  875. 'msg' => sprintf($lang['success']['object_modified'], $username)
  876. );
  877. }
  878. catch (PDOException $e) {
  879. $_SESSION['return'] = array(
  880. 'type' => 'danger',
  881. 'msg' => 'MySQL: '.$e
  882. );
  883. return false;
  884. }
  885. }
  886. function get_tfa($username = null) {
  887. global $pdo;
  888. if (isset($_SESSION['mailcow_cc_username'])) {
  889. $username = $_SESSION['mailcow_cc_username'];
  890. }
  891. elseif (empty($username)) {
  892. return false;
  893. }
  894. $stmt = $pdo->prepare("SELECT * FROM `tfa`
  895. WHERE `username` = :username AND `active` = '1'");
  896. $stmt->execute(array(':username' => $username));
  897. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  898. switch ($row["authmech"]) {
  899. case "yubi_otp":
  900. $data['name'] = "yubi_otp";
  901. $data['pretty'] = "Yubico OTP";
  902. $stmt = $pdo->prepare("SELECT `id`, `key_id`, RIGHT(`secret`, 12) AS 'modhex' FROM `tfa` WHERE `authmech` = 'yubi_otp' AND `username` = :username");
  903. $stmt->execute(array(
  904. ':username' => $username,
  905. ));
  906. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  907. while($row = array_shift($rows)) {
  908. $data['additional'][] = $row;
  909. }
  910. return $data;
  911. break;
  912. case "u2f":
  913. $data['name'] = "u2f";
  914. $data['pretty'] = "Fido U2F";
  915. $stmt = $pdo->prepare("SELECT `id`, `key_id` FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = :username");
  916. $stmt->execute(array(
  917. ':username' => $username,
  918. ));
  919. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  920. while($row = array_shift($rows)) {
  921. $data['additional'][] = $row;
  922. }
  923. return $data;
  924. break;
  925. case "hotp":
  926. $data['name'] = "hotp";
  927. $data['pretty'] = "HMAC-based OTP";
  928. return $data;
  929. break;
  930. case "totp":
  931. $data['name'] = "totp";
  932. $data['pretty'] = "Time-based OTP";
  933. $stmt = $pdo->prepare("SELECT `id`, `key_id`, `secret` FROM `tfa` WHERE `authmech` = 'totp' AND `username` = :username");
  934. $stmt->execute(array(
  935. ':username' => $username,
  936. ));
  937. $rows = $stmt->fetchAll(PDO::FETCH_ASSOC);
  938. while($row = array_shift($rows)) {
  939. $data['additional'][] = $row;
  940. }
  941. return $data;
  942. break;
  943. default:
  944. $data['name'] = 'none';
  945. $data['pretty'] = "-";
  946. return $data;
  947. break;
  948. }
  949. }
  950. function verify_tfa_login($username, $token) {
  951. global $pdo;
  952. global $lang;
  953. global $yubi;
  954. global $u2f;
  955. global $tfa;
  956. $stmt = $pdo->prepare("SELECT `authmech` FROM `tfa`
  957. WHERE `username` = :username AND `active` = '1'");
  958. $stmt->execute(array(':username' => $username));
  959. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  960. switch ($row["authmech"]) {
  961. case "yubi_otp":
  962. if (!ctype_alnum($token) || strlen($token) != 44) {
  963. return false;
  964. }
  965. $yubico_modhex_id = substr($token, 0, 12);
  966. $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa`
  967. WHERE `username` = :username
  968. AND `authmech` = 'yubi_otp'
  969. AND `active`='1'
  970. AND `secret` LIKE :modhex");
  971. $stmt->execute(array(':username' => $username, ':modhex' => '%' . $yubico_modhex_id));
  972. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  973. $yubico_auth = explode(':', $row['secret']);
  974. $yubi = new Auth_Yubico($yubico_auth[0], $yubico_auth[1]);
  975. $yauth = $yubi->verify($token);
  976. if (PEAR::isError($yauth)) {
  977. $_SESSION['return'] = array(
  978. 'type' => 'danger',
  979. 'msg' => 'Yubico Authentication error: ' . $yauth->getMessage()
  980. );
  981. return false;
  982. }
  983. else {
  984. $_SESSION['tfa_id'] = $row['id'];
  985. return true;
  986. }
  987. return false;
  988. break;
  989. case "u2f":
  990. try {
  991. $reg = $u2f->doAuthenticate(json_decode($_SESSION['authReq']), get_u2f_registrations($username), json_decode($token));
  992. $stmt = $pdo->prepare("UPDATE `tfa` SET `counter` = ? WHERE `id` = ?");
  993. $stmt->execute(array($reg->counter, $reg->id));
  994. $_SESSION['tfa_id'] = $reg->id;
  995. $_SESSION['authReq'] = null;
  996. return true;
  997. }
  998. catch (Exception $e) {
  999. $_SESSION['return'] = array(
  1000. 'type' => 'danger',
  1001. 'msg' => "U2F: " . $e->getMessage()
  1002. );
  1003. $_SESSION['regReq'] = null;
  1004. return false;
  1005. }
  1006. return false;
  1007. break;
  1008. case "hotp":
  1009. return false;
  1010. break;
  1011. case "totp":
  1012. try {
  1013. $stmt = $pdo->prepare("SELECT `id`, `secret` FROM `tfa`
  1014. WHERE `username` = :username
  1015. AND `authmech` = 'totp'
  1016. AND `active`='1'");
  1017. $stmt->execute(array(':username' => $username));
  1018. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1019. if ($tfa->verifyCode($row['secret'], $_POST['token']) === true) {
  1020. $_SESSION['tfa_id'] = $row['id'];
  1021. return true;
  1022. }
  1023. return false;
  1024. }
  1025. catch (PDOException $e) {
  1026. $_SESSION['return'] = array(
  1027. 'type' => 'danger',
  1028. 'msg' => 'MySQL: '.$e
  1029. );
  1030. return false;
  1031. }
  1032. break;
  1033. default:
  1034. return false;
  1035. break;
  1036. }
  1037. return false;
  1038. }
  1039. function edit_domain_admin($postarray) {
  1040. global $lang;
  1041. global $pdo;
  1042. if ($_SESSION['mailcow_cc_role'] != "admin" && $_SESSION['mailcow_cc_role'] != "domainadmin") {
  1043. $_SESSION['return'] = array(
  1044. 'type' => 'danger',
  1045. 'msg' => sprintf($lang['danger']['access_denied'])
  1046. );
  1047. return false;
  1048. }
  1049. // Administrator
  1050. if ($_SESSION['mailcow_cc_role'] == "admin") {
  1051. $username = $postarray['username'];
  1052. $username_now = $postarray['username_now'];
  1053. $password = $postarray['password'];
  1054. $password2 = $postarray['password2'];
  1055. $active = intval($postarray['active']);
  1056. if(isset($postarray['domain'])) {
  1057. foreach ($postarray['domain'] as $domain) {
  1058. if (!is_valid_domain_name($domain)) {
  1059. $_SESSION['return'] = array(
  1060. 'type' => 'danger',
  1061. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1062. );
  1063. return false;
  1064. }
  1065. }
  1066. }
  1067. if (empty($postarray['domain'])) {
  1068. $_SESSION['return'] = array(
  1069. 'type' => 'danger',
  1070. 'msg' => sprintf($lang['danger']['domain_invalid'])
  1071. );
  1072. return false;
  1073. }
  1074. if (!ctype_alnum(str_replace(array('_', '.', '-'), '', $username))) {
  1075. $_SESSION['return'] = array(
  1076. 'type' => 'danger',
  1077. 'msg' => sprintf($lang['danger']['username_invalid'])
  1078. );
  1079. return false;
  1080. }
  1081. if ($username != $username_now) {
  1082. if (empty(get_domain_admin_details($username_now)['username']) || !empty(get_domain_admin_details($username)['username'])) {
  1083. $_SESSION['return'] = array(
  1084. 'type' => 'danger',
  1085. 'msg' => sprintf($lang['danger']['username_invalid'])
  1086. );
  1087. return false;
  1088. }
  1089. }
  1090. try {
  1091. $stmt = $pdo->prepare("DELETE FROM `domain_admins` WHERE `username` = :username");
  1092. $stmt->execute(array(
  1093. ':username' => $username_now,
  1094. ));
  1095. }
  1096. catch (PDOException $e) {
  1097. $_SESSION['return'] = array(
  1098. 'type' => 'danger',
  1099. 'msg' => 'MySQL: '.$e
  1100. );
  1101. return false;
  1102. }
  1103. if (isset($postarray['domain'])) {
  1104. foreach ($postarray['domain'] as $domain) {
  1105. try {
  1106. $stmt = $pdo->prepare("INSERT INTO `domain_admins` (`username`, `domain`, `created`, `active`)
  1107. VALUES (:username, :domain, :created, :active)");
  1108. $stmt->execute(array(
  1109. ':username' => $username,
  1110. ':domain' => $domain,
  1111. ':created' => date('Y-m-d H:i:s'),
  1112. ':active' => $active
  1113. ));
  1114. }
  1115. catch (PDOException $e) {
  1116. $_SESSION['return'] = array(
  1117. 'type' => 'danger',
  1118. 'msg' => 'MySQL: '.$e
  1119. );
  1120. return false;
  1121. }
  1122. }
  1123. }
  1124. if (!empty($password) && !empty($password2)) {
  1125. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password)) {
  1126. $_SESSION['return'] = array(
  1127. 'type' => 'danger',
  1128. 'msg' => sprintf($lang['danger']['password_complexity'])
  1129. );
  1130. return false;
  1131. }
  1132. if ($password != $password2) {
  1133. $_SESSION['return'] = array(
  1134. 'type' => 'danger',
  1135. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1136. );
  1137. return false;
  1138. }
  1139. $password_hashed = hash_password($password);
  1140. try {
  1141. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username1, `active` = :active, `password` = :password_hashed WHERE `username` = :username2");
  1142. $stmt->execute(array(
  1143. ':password_hashed' => $password_hashed,
  1144. ':username1' => $username,
  1145. ':username2' => $username_now,
  1146. ':active' => $active
  1147. ));
  1148. if (isset($postarray['disable_tfa'])) {
  1149. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  1150. $stmt->execute(array(':username' => $username_now));
  1151. }
  1152. else {
  1153. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username WHERE `username` = :username_now");
  1154. $stmt->execute(array(':username' => $username, ':username_now' => $username_now));
  1155. }
  1156. }
  1157. catch (PDOException $e) {
  1158. $_SESSION['return'] = array(
  1159. 'type' => 'danger',
  1160. 'msg' => 'MySQL: '.$e
  1161. );
  1162. return false;
  1163. }
  1164. }
  1165. else {
  1166. try {
  1167. $stmt = $pdo->prepare("UPDATE `admin` SET `username` = :username1, `active` = :active WHERE `username` = :username2");
  1168. $stmt->execute(array(
  1169. ':username1' => $username,
  1170. ':username2' => $username_now,
  1171. ':active' => $active
  1172. ));
  1173. if (isset($postarray['disable_tfa'])) {
  1174. $stmt = $pdo->prepare("UPDATE `tfa` SET `active` = '0' WHERE `username` = :username");
  1175. $stmt->execute(array(':username' => $username));
  1176. }
  1177. else {
  1178. $stmt = $pdo->prepare("UPDATE `tfa` SET `username` = :username WHERE `username` = :username_now");
  1179. $stmt->execute(array(':username' => $username, ':username_now' => $username_now));
  1180. }
  1181. }
  1182. catch (PDOException $e) {
  1183. $_SESSION['return'] = array(
  1184. 'type' => 'danger',
  1185. 'msg' => 'MySQL: '.$e
  1186. );
  1187. return false;
  1188. }
  1189. }
  1190. $_SESSION['return'] = array(
  1191. 'type' => 'success',
  1192. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1193. );
  1194. }
  1195. // Domain administrator
  1196. // Can only edit itself
  1197. elseif ($_SESSION['mailcow_cc_role'] == "domainadmin") {
  1198. $username = $_SESSION['mailcow_cc_username'];
  1199. $password_old = $postarray['user_old_pass'];
  1200. $password_new = $postarray['user_new_pass'];
  1201. $password_new2 = $postarray['user_new_pass2'];
  1202. $stmt = $pdo->prepare("SELECT `password` FROM `admin`
  1203. WHERE `username` = :user");
  1204. $stmt->execute(array(':user' => $username));
  1205. $row = $stmt->fetch(PDO::FETCH_ASSOC);
  1206. if (!verify_ssha256($row['password'], $password_old)) {
  1207. $_SESSION['return'] = array(
  1208. 'type' => 'danger',
  1209. 'msg' => sprintf($lang['danger']['access_denied'])
  1210. );
  1211. return false;
  1212. }
  1213. if (!empty($password_new2) && !empty($password_new)) {
  1214. if ($password_new2 != $password_new) {
  1215. $_SESSION['return'] = array(
  1216. 'type' => 'danger',
  1217. 'msg' => sprintf($lang['danger']['password_mismatch'])
  1218. );
  1219. return false;
  1220. }
  1221. if (!preg_match('/' . $GLOBALS['PASSWD_REGEP'] . '/', $password_new)) {
  1222. $_SESSION['return'] = array(
  1223. 'type' => 'danger',
  1224. 'msg' => sprintf($lang['danger']['password_complexity'])
  1225. );
  1226. return false;
  1227. }
  1228. $password_hashed = hash_password($password_new);
  1229. try {
  1230. $stmt = $pdo->prepare("UPDATE `admin` SET `password` = :password_hashed WHERE `username` = :username");
  1231. $stmt->execute(array(
  1232. ':password_hashed' => $password_hashed,
  1233. ':username' => $username
  1234. ));
  1235. }
  1236. catch (PDOException $e) {
  1237. $_SESSION['return'] = array(
  1238. 'type' => 'danger',
  1239. 'msg' => 'MySQL: '.$e
  1240. );
  1241. return false;
  1242. }
  1243. }
  1244. $_SESSION['return'] = array(
  1245. 'type' => 'success',
  1246. 'msg' => sprintf($lang['success']['domain_admin_modified'], htmlspecialchars($username))
  1247. );
  1248. }
  1249. }
  1250. function get_admin_details() {
  1251. // No parameter to be given, only one admin should exist
  1252. global $pdo;
  1253. global $lang;
  1254. $data = array();
  1255. if ($_SESSION['mailcow_cc_role'] != 'admin') {
  1256. return false;
  1257. }
  1258. try {
  1259. $stmt = $pdo->prepare("SELECT `username`, `modified`, `created` FROM `admin` WHERE `superadmin`='1' AND active='1'");
  1260. $stmt->execute();
  1261. $data = $stmt->fetch(PDO::FETCH_ASSOC);
  1262. }
  1263. catch(PDOException $e) {
  1264. $_SESSION['return'] = array(
  1265. 'type' => 'danger',
  1266. 'msg' => 'MySQL: '.$e
  1267. );
  1268. }
  1269. return $data;
  1270. }
  1271. function dkim_add_key($postarray) {
  1272. global $lang;
  1273. global $pdo;
  1274. global $redis;
  1275. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1276. $_SESSION['return'] = array(
  1277. 'type' => 'danger',
  1278. 'msg' => sprintf($lang['danger']['access_denied'])
  1279. );
  1280. return false;
  1281. }
  1282. // if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1283. // $_SESSION['return'] = array(
  1284. // 'type' => 'danger',
  1285. // 'msg' => sprintf($lang['danger']['access_denied'])
  1286. // );
  1287. // return false;
  1288. // }
  1289. $key_length = intval($postarray['key_size']);
  1290. $dkim_selector = (isset($postarray['dkim_selector'])) ? $postarray['dkim_selector'] : 'dkim';
  1291. $domain = $postarray['domain'];
  1292. if (!is_valid_domain_name($domain) || !is_numeric($key_length)) {
  1293. $_SESSION['return'] = array(
  1294. 'type' => 'danger',
  1295. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1296. );
  1297. return false;
  1298. }
  1299. if (!empty(glob($GLOBALS['MC_DKIM_TXTS'] . '/' . $domain . '.dkim')) ||
  1300. $redis->hGet('DKIM_PUB_KEYS', $domain)) {
  1301. $_SESSION['return'] = array(
  1302. 'type' => 'danger',
  1303. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1304. );
  1305. return false;
  1306. }
  1307. if (!ctype_alnum($dkim_selector)) {
  1308. $_SESSION['return'] = array(
  1309. 'type' => 'danger',
  1310. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1311. );
  1312. return false;
  1313. }
  1314. $config = array(
  1315. "digest_alg" => "sha256",
  1316. "private_key_bits" => $key_length,
  1317. "private_key_type" => OPENSSL_KEYTYPE_RSA,
  1318. );
  1319. if ($keypair_ressource = openssl_pkey_new($config)) {
  1320. $key_details = openssl_pkey_get_details($keypair_ressource);
  1321. $pubKey = implode(array_slice(
  1322. array_filter(
  1323. explode(PHP_EOL, $key_details['key'])
  1324. ), 1, -1)
  1325. );
  1326. // Save public key and selector to redis
  1327. try {
  1328. $redis->hSet('DKIM_PUB_KEYS', $domain, $pubKey);
  1329. $redis->hSet('DKIM_SELECTORS', $domain, $dkim_selector);
  1330. }
  1331. catch (RedisException $e) {
  1332. $_SESSION['return'] = array(
  1333. 'type' => 'danger',
  1334. 'msg' => 'Redis: '.$e
  1335. );
  1336. return false;
  1337. }
  1338. // Export private key and save private key to redis
  1339. openssl_pkey_export($keypair_ressource, $privKey);
  1340. if (isset($privKey) && !empty($privKey)) {
  1341. try {
  1342. $redis->hSet('DKIM_PRIV_KEYS', $dkim_selector . '.' . $domain, trim($privKey));
  1343. }
  1344. catch (RedisException $e) {
  1345. $_SESSION['return'] = array(
  1346. 'type' => 'danger',
  1347. 'msg' => 'Redis: '.$e
  1348. );
  1349. return false;
  1350. }
  1351. }
  1352. $_SESSION['return'] = array(
  1353. 'type' => 'success',
  1354. 'msg' => sprintf($lang['success']['dkim_added'])
  1355. );
  1356. return true;
  1357. }
  1358. else {
  1359. $_SESSION['return'] = array(
  1360. 'type' => 'danger',
  1361. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1362. );
  1363. return false;
  1364. }
  1365. }
  1366. function dkim_get_key_details($domain) {
  1367. global $redis;
  1368. if (!hasDomainAccess($_SESSION['mailcow_cc_username'], $_SESSION['mailcow_cc_role'], $domain)) {
  1369. return false;
  1370. }
  1371. $data = array();
  1372. if ($redis_dkim_key_data = $redis->hGet('DKIM_PUB_KEYS', $domain)) {
  1373. $data['pubkey'] = $redis_dkim_key_data;
  1374. $data['length'] = (strlen($data['pubkey']) < 391) ? 1024 : 2048;
  1375. $data['dkim_txt'] = 'v=DKIM1;k=rsa;t=s;s=email;p=' . $redis_dkim_key_data;
  1376. $data['dkim_selector'] = $redis->hGet('DKIM_SELECTORS', $domain);
  1377. }
  1378. return $data;
  1379. }
  1380. function dkim_get_blind_keys() {
  1381. global $redis;
  1382. global $lang;
  1383. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1384. return false;
  1385. }
  1386. $domains = array();
  1387. foreach ($redis->hKeys('DKIM_PUB_KEYS') as $redis_dkim_domain) {
  1388. $domains[] = $redis_dkim_domain;
  1389. }
  1390. return array_diff($domains, array_merge(mailbox('get', 'domains'), mailbox('get', 'alias_domains')));
  1391. }
  1392. function dkim_delete_key($postarray) {
  1393. global $redis;
  1394. global $lang;
  1395. if (!is_array($postarray['domains'])) {
  1396. $domains = array();
  1397. $domains[] = $postarray['domains'];
  1398. }
  1399. else {
  1400. $domains = $postarray['domains'];
  1401. }
  1402. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1403. $_SESSION['return'] = array(
  1404. 'type' => 'danger',
  1405. 'msg' => sprintf($lang['danger']['access_denied'])
  1406. );
  1407. return false;
  1408. }
  1409. foreach ($domains as $domain) {
  1410. if (!is_valid_domain_name($domain)) {
  1411. $_SESSION['return'] = array(
  1412. 'type' => 'danger',
  1413. 'msg' => sprintf($lang['danger']['dkim_domain_or_sel_invalid'])
  1414. );
  1415. return false;
  1416. }
  1417. try {
  1418. $selector = $redis->hGet('DKIM_SELECTORS', $domain);
  1419. $redis->hDel('DKIM_PUB_KEYS', $domain);
  1420. $redis->hDel('DKIM_PRIV_KEYS', $selector . '.' . $domain);
  1421. $redis->hDel('DKIM_SELECTORS', $domain);
  1422. }
  1423. catch (RedisException $e) {
  1424. $_SESSION['return'] = array(
  1425. 'type' => 'danger',
  1426. 'msg' => 'Redis: '.$e
  1427. );
  1428. return false;
  1429. }
  1430. }
  1431. $_SESSION['return'] = array(
  1432. 'type' => 'success',
  1433. 'msg' => sprintf($lang['success']['dkim_removed'], htmlspecialchars(implode(', ', $domains)))
  1434. );
  1435. return true;
  1436. }
  1437. function get_u2f_registrations($username) {
  1438. global $pdo;
  1439. $sel = $pdo->prepare("SELECT * FROM `tfa` WHERE `authmech` = 'u2f' AND `username` = ? AND `active` = '1'");
  1440. $sel->execute(array($username));
  1441. return $sel->fetchAll(PDO::FETCH_OBJ);
  1442. }
  1443. function get_forwarding_hosts() {
  1444. global $redis;
  1445. $data = array();
  1446. try {
  1447. $fwd_hosts = $redis->hGetAll('WHITELISTED_FWD_HOST');
  1448. if (!empty($fwd_hosts)) {
  1449. foreach ($fwd_hosts as $fwd_host => $source) {
  1450. $data[] = $fwd_host;
  1451. }
  1452. }
  1453. }
  1454. catch (RedisException $e) {
  1455. $_SESSION['return'] = array(
  1456. 'type' => 'danger',
  1457. 'msg' => 'Redis: '.$e
  1458. );
  1459. return false;
  1460. }
  1461. return $data;
  1462. }
  1463. function get_forwarding_host_details($host) {
  1464. global $redis;
  1465. $data = array();
  1466. if (!isset($host) || empty($host)) {
  1467. return false;
  1468. }
  1469. try {
  1470. if ($source = $redis->hGet('WHITELISTED_FWD_HOST', $host)) {
  1471. $data['host'] = $host;
  1472. $data['source'] = $source;
  1473. $data['keep_spam'] = ($redis->hGet('KEEP_SPAM', $host)) ? "yes" : "no";
  1474. }
  1475. }
  1476. catch (RedisException $e) {
  1477. $_SESSION['return'] = array(
  1478. 'type' => 'danger',
  1479. 'msg' => 'Redis: '.$e
  1480. );
  1481. return false;
  1482. }
  1483. return $data;
  1484. }
  1485. function add_forwarding_host($postarray) {
  1486. require_once 'spf.inc.php';
  1487. global $redis;
  1488. global $lang;
  1489. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1490. $_SESSION['return'] = array(
  1491. 'type' => 'danger',
  1492. 'msg' => sprintf($lang['danger']['access_denied'])
  1493. );
  1494. return false;
  1495. }
  1496. $source = $postarray['hostname'];
  1497. $host = trim($postarray['hostname']);
  1498. $filter_spam = $postarray['filter_spam'];
  1499. if (isset($postarray['filter_spam']) && $postarray['filter_spam'] == 1) {
  1500. $filter_spam = 1;
  1501. }
  1502. else {
  1503. $filter_spam = 0;
  1504. }
  1505. if (preg_match('/^[0-9a-fA-F:\/]+$/', $host)) { // IPv6 address
  1506. $hosts = array($host);
  1507. }
  1508. elseif (preg_match('/^[0-9\.\/]+$/', $host)) { // IPv4 address
  1509. $hosts = array($host);
  1510. }
  1511. else {
  1512. $hosts = get_outgoing_hosts_best_guess($host);
  1513. }
  1514. if (empty($hosts)) {
  1515. $_SESSION['return'] = array(
  1516. 'type' => 'danger',
  1517. 'msg' => 'Invalid host specified: '. htmlspecialchars($host)
  1518. );
  1519. return false;
  1520. }
  1521. foreach ($hosts as $host) {
  1522. try {
  1523. $redis->hSet('WHITELISTED_FWD_HOST', $host, $source);
  1524. if ($filter_spam == 0) {
  1525. $redis->hSet('KEEP_SPAM', $host, 1);
  1526. }
  1527. elseif ($redis->hGet('KEEP_SPAM', $host)) {
  1528. $redis->hDel('KEEP_SPAM', $host);
  1529. }
  1530. }
  1531. catch (RedisException $e) {
  1532. $_SESSION['return'] = array(
  1533. 'type' => 'danger',
  1534. 'msg' => 'Redis: '.$e
  1535. );
  1536. return false;
  1537. }
  1538. }
  1539. $_SESSION['return'] = array(
  1540. 'type' => 'success',
  1541. 'msg' => sprintf($lang['success']['forwarding_host_added'], htmlspecialchars(implode(', ', $hosts)))
  1542. );
  1543. }
  1544. function delete_forwarding_host($postarray) {
  1545. global $redis;
  1546. global $lang;
  1547. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1548. $_SESSION['return'] = array(
  1549. 'type' => 'danger',
  1550. 'msg' => sprintf($lang['danger']['access_denied'])
  1551. );
  1552. return false;
  1553. }
  1554. if (!is_array($postarray['forwardinghost'])) {
  1555. $hosts = array();
  1556. $hosts[] = $postarray['forwardinghost'];
  1557. }
  1558. else {
  1559. $hosts = $postarray['forwardinghost'];
  1560. }
  1561. foreach ($hosts as $host) {
  1562. try {
  1563. $redis->hDel('WHITELISTED_FWD_HOST', $host);
  1564. $redis->hDel('KEEP_SPAM', $host);
  1565. }
  1566. catch (RedisException $e) {
  1567. $_SESSION['return'] = array(
  1568. 'type' => 'danger',
  1569. 'msg' => 'Redis: '.$e
  1570. );
  1571. return false;
  1572. }
  1573. }
  1574. $_SESSION['return'] = array(
  1575. 'type' => 'success',
  1576. 'msg' => sprintf($lang['success']['forwarding_host_removed'], htmlspecialchars(implode(', ', $hosts)))
  1577. );
  1578. }
  1579. function get_logs($container, $lines = 100) {
  1580. global $lang;
  1581. global $redis;
  1582. if ($_SESSION['mailcow_cc_role'] != "admin") {
  1583. return false;
  1584. }
  1585. $lines = intval($lines);
  1586. if ($container == "dovecot-mailcow") {
  1587. if ($data = $redis->lRange('DOVECOT_MAILLOG', 1, $lines)) {
  1588. foreach ($data as $json_line) {
  1589. $data_array[] = json_decode($json_line, true);
  1590. }
  1591. return $data_array;
  1592. }
  1593. }
  1594. if ($container == "postfix-mailcow") {
  1595. if ($data = $redis->lRange('POSTFIX_MAILLOG', 1, $lines)) {
  1596. foreach ($data as $json_line) {
  1597. $data_array[] = json_decode($json_line, true);
  1598. }
  1599. return $data_array;
  1600. }
  1601. }
  1602. if ($container == "sogo-mailcow") {
  1603. if ($data = $redis->lRange('SOGO_LOG', 1, $lines)) {
  1604. foreach ($data as $json_line) {
  1605. $data_array[] = json_decode($json_line, true);
  1606. }
  1607. return $data_array;
  1608. }
  1609. }
  1610. if ($container == "rspamd-history") {
  1611. $curl = curl_init();
  1612. curl_setopt($curl, CURLOPT_URL,"http://rspamd-mailcow:11334/history");
  1613. curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
  1614. $history = curl_exec($curl);
  1615. if (!curl_errno($ch)) {
  1616. $data_array = json_decode($history, true);
  1617. curl_close($curl);
  1618. return $data_array['rows'];
  1619. }
  1620. curl_close($curl);
  1621. return false;
  1622. }
  1623. return false;
  1624. }
  1625. ?>