You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
131 lines
3.5 KiB
131 lines
3.5 KiB
#!/bin/bash
|
|
# info: check user password
|
|
# options: USER PASSWORD [IP] [RETURN_HASH]
|
|
#
|
|
# example: v-check-user-password admin qwerty1234
|
|
#
|
|
# This function verifies user password from file
|
|
|
|
#----------------------------------------------------------#
|
|
# Variables & Functions #
|
|
#----------------------------------------------------------#
|
|
|
|
# Argument definition
|
|
user=$1
|
|
password=$2
|
|
HIDE=2
|
|
ip46=${3-127.0.0.1}
|
|
return_hash=$4
|
|
|
|
# Includes
|
|
# shellcheck source=/etc/hestiacp/hestia.conf
|
|
source /etc/hestiacp/hestia.conf
|
|
# shellcheck source=/usr/local/hestia/func/main.sh
|
|
source $HESTIA/func/main.sh
|
|
# load config file
|
|
source_conf "$HESTIA/conf/hestia.conf"
|
|
|
|
time_n_date=$(date +'%T %F')
|
|
time=$(echo "$time_n_date" | cut -f 1 -d \ )
|
|
date=$(echo "$time_n_date" | cut -f 2 -d \ )
|
|
|
|
#----------------------------------------------------------#
|
|
# Verifications #
|
|
#----------------------------------------------------------#
|
|
|
|
check_args '2' "$#" 'USER PASSWORD [IP] [RETURN_HASH]'
|
|
is_format_valid 'user' 'ip46'
|
|
|
|
# Checking user
|
|
if [ ! -d "$HESTIA/data/users/$user" ]; then
|
|
echo "Error: password missmatch"
|
|
echo "$date $time $user $ip46 failed to login" >> $HESTIA/log/auth.log
|
|
exit 9
|
|
fi
|
|
|
|
is_password_valid
|
|
|
|
# Checking empty password
|
|
if [[ -z "$password" ]]; then
|
|
echo "Error: password missmatch"
|
|
echo "$date $time $user $ip46 failed to login" >> $HESTIA/log/auth.log
|
|
exit 9
|
|
fi
|
|
|
|
#----------------------------------------------------------#
|
|
# Action #
|
|
#----------------------------------------------------------#
|
|
|
|
# Parsing user's salt
|
|
shadow=$(grep "^$user:" /etc/shadow | cut -f 2 -d :)
|
|
|
|
if echo "$shadow" | grep -qE '^\$[0-9a-z]+\$[^\$]+\$'; then
|
|
salt=$(echo "$shadow" | cut -f 3 -d \$)
|
|
method=$(echo "$shadow" | cut -f 2 -d \$)
|
|
if [ "$method" = "y" ]; then
|
|
method="yescrypt"
|
|
elif [ "$method" -eq '1' ]; then
|
|
method='md5'
|
|
elif [ "$method" -eq '6' ]; then
|
|
method='sha-512'
|
|
else
|
|
echo "Error: password missmatch"
|
|
echo "$date $time $user $ip46 failed to login" >> $HESTIA/log/auth.log
|
|
exit 9
|
|
fi
|
|
else
|
|
salt=${shadow:0:2}
|
|
method='des'
|
|
fi
|
|
|
|
if [ -z "$salt" ]; then
|
|
echo "Error: password missmatch"
|
|
echo "$date $time $user $ip46 failed to login" >> $HESTIA/log/auth.log
|
|
exit 9
|
|
fi
|
|
|
|
if [ "$method" = "yescrypt" ]; then
|
|
if which python3 > /dev/null; then
|
|
export PASS="$password" SALT="$shadow"
|
|
hash=$(python3 -c 'import crypt, os; print(crypt.crypt(os.getenv("PASS"), os.getenv("SALT")))')
|
|
else
|
|
# Fall back to mkpasswd as fallback
|
|
hash=$(mkpasswd "$password" "$shadow")
|
|
fi
|
|
|
|
if [ $? -ne 0 ]; then
|
|
echo "Error: password missmatch"
|
|
echo "$date $time $user $ip46 failed to login" >> $HESTIA/log/auth.log
|
|
exit 9
|
|
fi
|
|
else
|
|
# Generating hash
|
|
set -o noglob
|
|
hash=$($BIN/v-generate-password-hash "$method" "$salt" <<< "$password")
|
|
if [[ -z "$hash" ]]; then
|
|
echo "Error: password missmatch"
|
|
echo "$date $time $user $ip46 failed to login" >> $HESTIA/log/auth.log
|
|
exit 9
|
|
fi
|
|
fi
|
|
|
|
# Checking hash
|
|
result=$(grep "^$user:$hash:" /etc/shadow 2> /dev/null)
|
|
if [[ -z "$result" ]]; then
|
|
echo "Error: password missmatch"
|
|
echo "$date $time $user $ip46 failed to login" >> $HESTIA/log/auth.log
|
|
exit 9
|
|
fi
|
|
|
|
#----------------------------------------------------------#
|
|
# Hestia #
|
|
#----------------------------------------------------------#
|
|
|
|
if [ -n "$return_hash" ]; then
|
|
echo $hash
|
|
fi
|
|
# Logging
|
|
echo "$date $time $user $ip46 successfully logged in" >> $HESTIA/log/auth.log
|
|
|
|
exit
|