to the form or to repeat a previously generated token, in case of various forms in a same page)
* - easyly secure sensitive actions adding admin password in your form (just add , auto_restrict will exit if password is not correct)
* - secure post and get data
* - add function to ask password for sensitive/superadmin actions...
*
*
*
* Verrouille l'accès à une page
* Il suffit d'inclure ce fichier pour bloquer l'accès...
* gestion de l'expiration de session,
* gestion de la connexion et de la déconnexion.
* gestion des différences entre le domaine referer et le domaine sur lequel le script est hébergé (si différent -> pas ok)
* gestion du bannissement des adresses ip en cas de bruteforcing ou de referer anormal
* gestion des tokens de sécurisation à ajouter aux forms en une commande ; le script se charge seul de vérifier le token
* génération aléatoire de la clé de cryptage
* sécurisation par mot de passe sur les actions sensibles (il suffit d'ajouter à un formulaire pour qu'auto_restrict bloque en cas de mauvais mot de passe)
*
* Améliorations eventuelles:
* ajouter un fichier log de connexion
*
*
* ajout 4.2 :
* ajout du statut (superadmin/admin/user) et de la langue (pour bozon)
* ajout 4.1 :
* ajout du double check de passe et du changement de mdp
* ajout 4.0 :
* ajout du support multi utilisateur
*/
@session_start();
# ------------------------------------------------------------------
# default config: initialisation
# ------------------------------------------------------------------
# you can modify this config before the include('auto_restrict.php');
if (!isset($auto_restrict['error_msg'])){ $auto_restrict['error_msg']='Erreur - impossible de se connecter.';}# utilisé si on ne veut pas rediriger
if (!isset($auto_restrict['cookie_name'])){ $auto_restrict['cookie_name']='BoZoN';}# nom du cookie
if (!isset($auto_restrict['session_expiration_delay'])){ $auto_restrict['session_expiration_delay']=90;}#minutes
if (!isset($auto_restrict['cookie_expiration_delay'])){ $auto_restrict['cookie_expiration_delay']=365;}#days
if (!isset($auto_restrict['IP_banned_expiration_delay'])){ $auto_restrict['IP_banned_expiration_delay']=90;}#seconds
if (!isset($auto_restrict['max_security_issues_before_ban'])){ $auto_restrict['max_security_issues_before_ban']=5;}
if (!isset($auto_restrict['just_die_on_errors'])){ $auto_restrict['just_die_on_errors']=true;}# end script immediately instead of include loginform in case of user not logged;
if (!isset($auto_restrict['just_die_if_not_logged'])){ $auto_restrict['just_die_if_not_logged']=false;}# end script immediately instead of include loginform in case of banished ip or referer problem;
if (!isset($auto_restrict['tokens_expiration_delay'])){ $auto_restrict['tokens_expiration_delay']=7200;}#seconds
if (!isset($auto_restrict['kill_tokens_after_use'])){ $auto_restrict['kill_tokens_after_use']=false;}#false to allow the token to survive after it was used (for a form with multiple submits, like a preview button)
if (!isset($auto_restrict['use_GET_tokens_too'])){ $auto_restrict['use_GET_tokens_too']=true;}
if (!isset($auto_restrict['use_ban_IP_on_token_errors'])){ $auto_restrict['use_ban_IP_on_token_errors']=false;}
if (!isset($auto_restrict['redirect_error'])){ $auto_restrict['redirect_error']='index.php';}# si précisé, pas de message d'erreur
if (!isset($auto_restrict['redirect_success'])){ $auto_restrict['redirect_success']='index.php?p=admin&token='.returnToken();}
if (!isset($auto_restrict['domain'])){ $auto_restrict['domain']=$_SERVER['SERVER_NAME'];}
if (!isset($auto_restrict['POST_striptags'])){ $auto_restrict['POST_striptags']=false;}# if true, all $_POST data will be strip_taged
if (!isset($auto_restrict['GET_striptags'])){ $auto_restrict['GET_striptags']=false;}# if true, all $_GET data will be strip_taged
if (!isset($auto_restrict['root'])){ $auto_restrict['root']='.';}
if (!isset($auto_restrict['path_from_root'])){ $auto_restrict['path_from_root']='';}
if (!isset($auto_restrict['add_remove_user_admin_only'])){ $auto_restrict['add_remove_user_admin_only']=true;}# only admin can add or remove a user (admin is the first user)
if (!empty($_SERVER['HTTP_REFERER'])){ $auto_restrict['referer']=returndomain($_SERVER['HTTP_REFERER']);}else{$auto_restrict['referer']='';}
$auto_restrict['path_to_my_folder']=$auto_restrict['root'].$auto_restrict['path_from_root'].'/';
$auto_restrict['path_to_files']=$auto_restrict['path_to_my_folder'].$default_private;
# ------------------------------------------------------------------
# secure $_POST & $_GET data
# ------------------------------------------------------------------
if ($auto_restrict['POST_striptags']){$_POST=array_map('strip_tags',$_POST);}
if ($auto_restrict['GET_striptags']){$_GET=array_map('strip_tags',$_GET);}
# ------------------------------------------------------------------
# create cookie token folder
# ------------------------------------------------------------------
if (!is_dir($auto_restrict['path_to_files'])){mkdir($auto_restrict['path_to_files'],0700);chmod($auto_restrict['path_to_files'],0700);}
if (!is_dir($auto_restrict['path_to_files'])){echo '
auto_restrict error: cannot create the '.$auto_restrict['path_to_files'].' folder
auto_restrict error: token folder is not writeable
';}
elseif (!is_file($auto_restrict['path_to_files'].'/.htaccess')){file_put_contents($auto_restrict['path_to_files'].'/.htaccess', 'deny from all');}
# ------------------------------------------------------------------
# checks auto_restrict's data file : include or create
# ------------------------------------------------------------------
if(file_exists($auto_restrict['path_to_files'].'/auto_restrict_data.php')){
include($auto_restrict['path_to_files'].'/auto_restrict_data.php');
}else{
$auto_restrict['system_salt']=generate_salt(512);
$ret="\n";
file_put_contents($auto_restrict['path_to_files'].'/auto_restrict_data.php', '');
}
# ------------------------------------------------------------------
# checks auto_restrict's users file : include or redirect to login page if no $_POST
# ------------------------------------------------------------------
if(file_exists($auto_restrict['path_to_files'].'/auto_restrict_users.php')){
# if file exists, include it
include($auto_restrict['path_to_files'].'/auto_restrict_users.php');
complete_if_needed();
}else if(!isset($_POST['pass'])){
# problem with files during a session
if (isset($_SESSION['login'])){
session_destroy();
}
# or redirect to login form
safe_redirect('index.php?p=login');
exit;
}
# ------------------------------------------------------------------
# Sets a global token to use it later
# ------------------------------------------------------------------
define('TOKEN',returnToken());
# ------------------------------------------------------------------
# New user request: add it, save and return to login page
# ------------------------------------------------------------------
if(!empty($_POST['pass'])&&!empty($_POST['confirm'])&&isset($_POST['creation'])&&!empty($_POST['login'])&&empty($_POST['admin_password'])){
if (!isset($auto_restrict['users'])){$auto_restrict['users']=array();}
$index=count($auto_restrict['users']);
$login=strip_tags($_POST['login']);
if (login_exists($login)){safe_redirect('index.php?p=login&newuser&error=1&token='.returnToken());}
if ($_POST['pass']!=$_POST['confirm']){safe_redirect('index.php?p=login&newuser&error=3&token='.returnToken());}
$auto_restrict['users'][$index]['login'] = $login;
$auto_restrict['users'][$index]['encryption_key'] = md5(uniqid('', true));
$auto_restrict['users'][$index]['salt'] = generate_salt(512);
$auto_restrict['users'][$index]['lang'] = $_SESSION['language'];
$auto_restrict['users'][$index]['status'] = '';
$auto_restrict['users'][$index]['pass'] = hash('sha512', $auto_restrict['users'][$index]['salt'].$_POST['pass']);
if (!save_users()){exit('
auto_restrict: problem saving users
');}
safe_redirect('index.php?p=admin&msg='.e('Account created:',false).$login.'&token='.returnToken());
exit;
}
# ------------------------------------------------------------------
# Change password request
# ------------------------------------------------------------------
if(!empty($_POST['pass'])&&!empty($_POST['confirm'])&&!empty($_POST['admin_password'])){
if ($auto_restrict['users'][$_SESSION['login']]['pass']!==hash('sha512', $auto_restrict['users'][$_SESSION['login']]['salt'].$_POST['admin_password'])){
safe_redirect('index.php?p=login&change_password&error=4&token='.returnToken());
exit;
}
if ($_POST['pass']!=$_POST['confirm']){
safe_redirect('index.php?p=login&newuser&error=3&token='.returnToken());
exit;
}
$auto_restrict['users'][$_SESSION['login']]['pass']=hash('sha512', $auto_restrict['users'][$_SESSION['login']]['salt'].$_POST['pass']);
if (save_users()){safe_redirect('index.php?p=admin&msg='.e('New password saved for ',false).$_SESSION['login'].'&token='.returnToken());}
else{safe_redirect('index.php?p=admin&msg='.e('Error saving new password for ',false).$_SESSION['login'].'&token='.returnToken());}
}
# ------------------------------------------------------------------
# load banned ip
# ------------------------------------------------------------------
if (is_file($auto_restrict['path_to_files'].'/'.$auto_restrict["banned_ip_filename"])){include($auto_restrict['path_to_files'].'/'.$auto_restrict["banned_ip_filename"]);}
# ------------------------------------------------------------------
# ------------------------------------------------------------------
# user tries to login
# ------------------------------------------------------------------
if (isset($_POST['login'])&&isset($_POST['pass'])&&empty($_POST['confirm'])&&empty($_POST['creation'])){
$ok=log_user($_POST['login'],$_POST['pass']);
if (!$ok){safe_redirect('index.php?p=login&error=2');}
elseif (isset($_POST['cookie'])){
set_cookie();
}
# ------------------------------------------------------------------
# redirect if needed
# ------------------------------------------------------------------
if (!empty($auto_restrict['redirect_success'])){
if (strpos($auto_restrict['redirect_success'], '&token=')!==false){
safe_redirect($auto_restrict['redirect_success'].'&token='.returnToken());
}else{
safe_redirect($auto_restrict['redirect_success']);
}
}
}
# ------------------------------------------------------------------
# user wants to logout (?logout $_GET var)
# ------------------------------------------------------------------
if (isset($_GET['deconnexion'])||isset($_GET['logout'])){@session_destroy();delete_cookie();exit_redirect();}
# ------------------------------------------------------------------
# ------------------------------------------------------------------
# No admin connected -> login
# ------------------------------------------------------------------
if (empty($_SESSION['id_user'])||empty($_SESSION['login'])||empty($_SESSION['expire'])){
if (!empty($_GET['p'])&&$_GET['p']!='login'){safe_redirect('index.php?p=login');}
}
# ------------------------------------------------------------------
# if here, there's no login/logout process.
# Check referrer, ip
# session duration...
# on problem, out !
# ------------------------------------------------------------------
if (!is_ok()){
@session_destroy();
if (!$auto_restrict['just_die_if_not_logged']){
safe_redirect('index.php?p=login');
} else {
echo $auto_restrict['error_msg'];
}
exit();
}
# ------------------------------------------------------------------
# ------------------------------------------------------------------
# if here, there was no security problem.
# Now, if there is an admin password post data,
# it means that the submitted form is a secured one:
# check if password is correct (if not => ban ip and stop here)
# ------------------------------------------------------------------
if (isset($_POST['admin_password'])){
$pass=hash('sha512', $auto_restrict["salt"].$_POST['admin_password']);
if ($auto_restrict['pass']!=$pass){
add_banned_ip();
death('The admin password is wrong... too bad !');
}
}
# ------------------------------------------------------------------
# users list form requests
# ------------------------------------------------------------------
# Erase a user account
if (isset($_POST['user_key'])&&is_user_admin()){
foreach($_POST['user_key'] as $user_nb){
if (isset($auto_restrict['users'][$user_nb])){
unset($auto_restrict['users'][$user_nb]);
# ADDED FOR BOZON
rrmdir($_SESSION['upload_root_path'].$user_nb);
}
}
if (!empty($auto_restrict['users'])){
save_users();
# ADDED FOR BOZON
safe_redirect('index.php?p=users&token='.TOKEN.'&msg='.e('Changes saved',false));
exit;
}
else{
unlink($auto_restrict['path_to_files'].'/auto_restrict_users.php');
exit_redirect();
}
}
# ------------------------------------------------------------------
# change user status
# ------------------------------------------------------------------
if (isset($_POST['users_status'])&&is_user_admin()){
unset($_POST['users_status']);
unset($_POST['token']);
foreach($_POST as $user=>$status){
if (!empty($user)){$auto_restrict['users'][$user]['status']=$status;}
}
save_users();
# ADDED FOR BOZON
safe_redirect('index.php?p=users&token='.TOKEN.'&msg='.e('Changes saved',false));
}
# ------------------------------------------------------------------
# save user language if change BOZON CHANGE
# ------------------------------------------------------------------
if (empty($auto_restrict['users'][$_SESSION['login']]['lang'])||$_SESSION['language']!=$auto_restrict['users'][$_SESSION['login']]['lang']){
$auto_restrict['users'][$_SESSION['login']]['lang']=$_SESSION['language'];
save_users();
}
# ------------------------------------------------------------------
# crypt functions
# form http:#www.info-3000.com/phpmysql/cryptagedecryptage.php
# ------------------------------------------------------------------
function GenerationCle($Texte,$CleDEncryptage)
{
$CleDEncryptage = md5($CleDEncryptage);
$Compteur=0;
$VariableTemp = "";
for ($Ctr=0;$Ctr$user){
$data.= $ret.'# user : '.$user['login'].$ret
.'$auto_restrict["users"]["'.$user['login'].'"]["login"]='.var_export($user['login'],true).';'.$ret
.'$auto_restrict["users"]["'.$user['login'].'"]["encryption_key"]='.var_export($user['encryption_key'],true).';'.$ret
.'$auto_restrict["users"]["'.$user['login'].'"]["salt"] = '.var_export($user['salt'],true).';'.$ret
.'$auto_restrict["users"]["'.$user['login'].'"]["pass"] = '.var_export($user['pass'],true).';'.$ret
.'$auto_restrict["users"]["'.$user['login'].'"]["status"]='.var_export($user['status'],true).';'.$ret
.'$auto_restrict["users"]["'.$user['login'].'"]["lang"]='.var_export($user['lang'],true).';'.$ret;
}
$data.=$ret.'?>';
$r=file_put_contents($auto_restrict['path_to_files'].'/auto_restrict_users.php', $data);
sleep(0.5);
return $r;
}
function complete_if_needed(){
global $auto_restrict,$default_language;$save=false;
if (!$auto_restrict){return false;}
$indexes_to_check=array( # 'var' => 'default value',
'lang'=>$default_language,
);
$first=first($auto_restrict['users']);
foreach ($auto_restrict['users'] as $user=>$data){
foreach ($indexes_to_check as $index=>$default_value){
if (empty($data[$index])){
$auto_restrict['users'][$user][$index]=$default_value;$save=true;
}
if (empty($data['status'])){
$auto_restrict['users'][$user]['status']=create_status($user,$first);$save=true;
}elseif($data['status']!='superadmin'&&$data['login']==$first['login']){
$auto_restrict['users'][$user]['status']='superadmin';$save=true;# force first status to superadmin
}
}
}
if ($save){save_users();return true;}
return false;
}
function create_status($user=null,$first=''){
global $auto_restrict;
if (!$user){return false;}
if (count($auto_restrict['users'])==1){ return 'superadmin';}
elseif ($user==$first['login']){ return 'superadmin';}
else{return 'user';}
}
function login_exists($login=null){
global $auto_restrict;
if (empty($login)){return false;}
foreach ($auto_restrict['users'] as $key=>$user){
if ($user['login']==$login){return true;}
}
return false;
}
function id_user(){
$id=$_SERVER['REMOTE_ADDR'];
$id.='-'.$_SERVER['HTTP_USER_AGENT'];
$id.='-'.session_id();
return $id;
}
function is_ok(){
# check tokens, session vars, ip, referrer, cookie etc
# in case of problem, destroy session and redirect
global $auto_restrict;
$expired=false;
if (!isset($_SESSION['id_user'])){return false;}
# fatal problem
if (!checkReferer()){return death('
You are definitely NOT from here !
');}
if (!checkIP()){return death('
Hey... you were banished, fuck off !
');}
if (!checkToken()){return death('
Invalid token
');}
#
if (checkCookie()){return true;}
if ($_SESSION['expire']