add stats and kill http calls
This commit is contained in:
		
							parent
							
								
									24406ca0f4
								
							
						
					
					
						commit
						f73b2c117a
					
				
							
								
								
									
										107
									
								
								httpd.go
									
									
									
									
									
								
							
							
						
						
									
										107
									
								
								httpd.go
									
									
									
									
									
								
							@ -8,21 +8,48 @@ import (
 | 
				
			|||||||
	"encoding/json"
 | 
						"encoding/json"
 | 
				
			||||||
	"fmt"
 | 
						"fmt"
 | 
				
			||||||
	"io"
 | 
						"io"
 | 
				
			||||||
 | 
						"io/ioutil"
 | 
				
			||||||
	"log"
 | 
						"log"
 | 
				
			||||||
	"net/http"
 | 
						"net/http"
 | 
				
			||||||
	"os"
 | 
						"os"
 | 
				
			||||||
 | 
						"strings"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					type jsonInput struct {
 | 
				
			||||||
 | 
						Action string          `json:"action"`
 | 
				
			||||||
 | 
						Params jsonInputParams `json:"params"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					type jsonInputParams struct {
 | 
				
			||||||
 | 
						Id      int    `json:"id"`
 | 
				
			||||||
 | 
						Session string `json:"session"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
type HttpServer struct {
 | 
					type HttpServer struct {
 | 
				
			||||||
	Port          string
 | 
						Port          string
 | 
				
			||||||
	ovpn          *OpenVpnMgt
 | 
						ovpn          *OpenVpnMgt
 | 
				
			||||||
	key           string
 | 
						key           string
 | 
				
			||||||
	cert          string
 | 
						cert          string
 | 
				
			||||||
 | 
						minProfile    string
 | 
				
			||||||
 | 
						neededProfile string
 | 
				
			||||||
	certPool      *x509.CertPool
 | 
						certPool      *x509.CertPool
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func parseJsonQuery(r *http.Request) (*jsonInput, error) {
 | 
				
			||||||
 | 
						var in jsonInput
 | 
				
			||||||
 | 
						body, err := ioutil.ReadAll(r.Body)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if err = json.Unmarshal(body, &in); err !=
 | 
				
			||||||
 | 
							nil {
 | 
				
			||||||
 | 
							return nil, err
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return &in, nil
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (h *HttpServer) handler(w http.ResponseWriter, r *http.Request) {
 | 
					func (h *HttpServer) handler(w http.ResponseWriter, r *http.Request) {
 | 
				
			||||||
	fmt.Fprintf(w, "Hi there, I love %s!", r.URL.Path[1:])
 | 
						fmt.Fprintf(w, "nothing here\n")
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (h *HttpServer) versionHandler(w http.ResponseWriter, r *http.Request) {
 | 
					func (h *HttpServer) versionHandler(w http.ResponseWriter, r *http.Request) {
 | 
				
			||||||
@ -50,15 +77,91 @@ func (h *HttpServer) helpHandler(w http.ResponseWriter, r *http.Request) {
 | 
				
			|||||||
	fmt.Fprintf(w, "%s", jsonStr)
 | 
						fmt.Fprintf(w, "%s", jsonStr)
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func NewHTTPServer(port, key, cert, ca string, s *OpenVpnMgt) {
 | 
					func (h *HttpServer) ajaxHandler(w http.ResponseWriter, r *http.Request) {
 | 
				
			||||||
 | 
						var sslUsage = []x509.ExtKeyUsage{x509.ExtKeyUsageAny}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// deactivate if there is no https auth
 | 
				
			||||||
 | 
						if h.key == "" || h.cert == "" || h.certPool == nil {
 | 
				
			||||||
 | 
							http.Error(w, "No security, deactivated", 403)
 | 
				
			||||||
 | 
							return
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// add CORS headers
 | 
				
			||||||
 | 
						w.Header().Set("Access-Control-Allow-Origin", r.Header.Get("Origin"))
 | 
				
			||||||
 | 
						w.Header().Set("Access-Control-Allow-Methods", "POST")
 | 
				
			||||||
 | 
						w.Header().Set("Access-Control-Allow-Credentials", "true")
 | 
				
			||||||
 | 
						w.Header().Set("Access-Control-Allow-Headers", "content-type, accept, origin, user-agent, Accept-Encoding")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// stop here if the method is OPTIONS, to allow CORS to work
 | 
				
			||||||
 | 
						if r.Method == "OPTIONS" {
 | 
				
			||||||
 | 
							return
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// stop here if the method is OPTIONS, to allow CORS to work
 | 
				
			||||||
 | 
						if r.Method != "POST" {
 | 
				
			||||||
 | 
							http.Error(w, "post only", 405)
 | 
				
			||||||
 | 
							return
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// ssl auth
 | 
				
			||||||
 | 
						if len(r.TLS.PeerCertificates) == 0 {
 | 
				
			||||||
 | 
							log.Println(len(r.TLS.PeerCertificates))
 | 
				
			||||||
 | 
							http.Error(w, "Need certificate", 403)
 | 
				
			||||||
 | 
							return
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						opts := x509.VerifyOptions{Roots: h.certPool, KeyUsages: sslUsage}
 | 
				
			||||||
 | 
						if _, err := r.TLS.PeerCertificates[0].Verify(opts); err != nil {
 | 
				
			||||||
 | 
							http.Error(w, "Bad certificate", 403)
 | 
				
			||||||
 | 
							return
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						profile, _ := h.ovpn.AuthLoop(h.minProfile,
 | 
				
			||||||
 | 
							strings.Replace(r.TLS.PeerCertificates[0].Subject.CommonName, " ", "", -1), "", false)
 | 
				
			||||||
 | 
						if profile != h.neededProfile {
 | 
				
			||||||
 | 
							http.Error(w, fmt.Sprintf("You need the %s profile", h.neededProfile), 403)
 | 
				
			||||||
 | 
							return
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						req, err := parseJsonQuery(r)
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							log.Println(err)
 | 
				
			||||||
 | 
							http.Error(w, "Invalid request", 500)
 | 
				
			||||||
 | 
							return
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						switch req.Action {
 | 
				
			||||||
 | 
						case "stats":
 | 
				
			||||||
 | 
							jsonStr, err := json.Marshal(h.ovpn.Stats())
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								fmt.Fprintf(w, "Error : %s", err)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							fmt.Fprintf(w, "%s", jsonStr)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						case "kill":
 | 
				
			||||||
 | 
							if err := h.ovpn.Kill(req.Params.Session, req.Params.Id); err != nil {
 | 
				
			||||||
 | 
								http.Error(w, fmt.Sprintf("%s", err), 500)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						default:
 | 
				
			||||||
 | 
							http.Error(w, "Invalid request", 500)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func NewHTTPServer(port, key, cert, ca, minProfile, neededProfile string, s *OpenVpnMgt) {
 | 
				
			||||||
	h := &HttpServer{
 | 
						h := &HttpServer{
 | 
				
			||||||
		Port:          port,
 | 
							Port:          port,
 | 
				
			||||||
		ovpn:          s,
 | 
							ovpn:          s,
 | 
				
			||||||
		key:           key,
 | 
							key:           key,
 | 
				
			||||||
		cert:          cert,
 | 
							cert:          cert,
 | 
				
			||||||
 | 
							minProfile:    minProfile,
 | 
				
			||||||
 | 
							neededProfile: neededProfile,
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	http.HandleFunc("/help", h.helpHandler)
 | 
						http.HandleFunc("/help", h.helpHandler)
 | 
				
			||||||
 | 
						http.HandleFunc("/ajax", h.ajaxHandler)
 | 
				
			||||||
	http.HandleFunc("/version", h.versionHandler)
 | 
						http.HandleFunc("/version", h.versionHandler)
 | 
				
			||||||
	http.HandleFunc("/", h.handler)
 | 
						http.HandleFunc("/", h.handler)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
				
			|||||||
							
								
								
									
										56
									
								
								ldap.go
									
									
									
									
									
								
							
							
						
						
									
										56
									
								
								ldap.go
									
									
									
									
									
								
							@ -6,6 +6,7 @@ import (
 | 
				
			|||||||
	"fmt"
 | 
						"fmt"
 | 
				
			||||||
	"log"
 | 
						"log"
 | 
				
			||||||
	"net"
 | 
						"net"
 | 
				
			||||||
 | 
						"regexp"
 | 
				
			||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@ -43,6 +44,61 @@ func (l *ldapConfig) addIPRange(s string) error {
 | 
				
			|||||||
	return nil
 | 
						return nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// auth loop. Try all auth profiles from startProfile
 | 
				
			||||||
 | 
					// return the last possible profile and the mail if we found a mail like login
 | 
				
			||||||
 | 
					func (s *OpenVpnMgt) AuthLoop(startProfile, user, pass string, overridePwdCheck bool) (string, string) {
 | 
				
			||||||
 | 
						login := []string{user}
 | 
				
			||||||
 | 
						profile := startProfile
 | 
				
			||||||
 | 
						mail := ""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						re := regexp.MustCompile("^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+.[a-zA-Z0-9-.]+$")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for {
 | 
				
			||||||
 | 
							if re.MatchString(login[0]) && mail == "" {
 | 
				
			||||||
 | 
								mail = login[0]
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							n := profile
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							for k, ldap := range s.ldap {
 | 
				
			||||||
 | 
								if ldap.upgradeFrom != profile {
 | 
				
			||||||
 | 
									continue
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								err, userOk, passOk, secondary := ldap.Auth(login, pass)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// if there is an error, try the other configurations
 | 
				
			||||||
 | 
								if err != nil {
 | 
				
			||||||
 | 
									log.Printf("user %s not validated as %s\n", user, k)
 | 
				
			||||||
 | 
									continue
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// we did find a valid User
 | 
				
			||||||
 | 
								if userOk {
 | 
				
			||||||
 | 
									// the login for the new auth level is given by the current one
 | 
				
			||||||
 | 
									login = secondary
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									if passOk && profile != "" {
 | 
				
			||||||
 | 
										// it's at least the second auth level, and we have a valid
 | 
				
			||||||
 | 
										// password on 2 different auth system. It's a dupplicate
 | 
				
			||||||
 | 
										// password, let's log it
 | 
				
			||||||
 | 
										log.Printf("User %s has a dupplicate password\n", user)
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// we have either a positive auth ok a previous valid one
 | 
				
			||||||
 | 
									if passOk || profile != "" || overridePwdCheck {
 | 
				
			||||||
 | 
										profile = k
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// no profile update this turn, no need to continue
 | 
				
			||||||
 | 
							if n == profile {
 | 
				
			||||||
 | 
								break
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return profile, mail
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// override the real DialTLS function
 | 
					// override the real DialTLS function
 | 
				
			||||||
func myDialTLS(network, addr string, config *tls.Config) (*ldap.Conn, error) {
 | 
					func myDialTLS(network, addr string, config *tls.Config) (*ldap.Conn, error) {
 | 
				
			||||||
	dc, err := net.DialTimeout(network, addr, 3*time.Second)
 | 
						dc, err := net.DialTimeout(network, addr, 3*time.Second)
 | 
				
			||||||
 | 
				
			|||||||
							
								
								
									
										10
									
								
								main.go
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								main.go
									
									
									
									
									
								
							@ -86,9 +86,11 @@ func main() {
 | 
				
			|||||||
	// time to start the listeners
 | 
						// time to start the listeners
 | 
				
			||||||
	go server.Run()
 | 
						go server.Run()
 | 
				
			||||||
	NewHTTPServer(
 | 
						NewHTTPServer(
 | 
				
			||||||
		config.GetString("config.httpPort", "127.0.0.01:8080"),
 | 
							config.GetString("config.http.port", "127.0.0.01:8080"),
 | 
				
			||||||
		config.GetString("config.httpKey", ""),
 | 
							config.GetString("config.http.key", ""),
 | 
				
			||||||
		config.GetString("config.httpCert", ""),
 | 
							config.GetString("config.http.cert", ""),
 | 
				
			||||||
		config.GetString("config.httpCa", ""),
 | 
							config.GetString("config.http.ca", ""),
 | 
				
			||||||
 | 
							config.GetString("config.http.startAuth", "CORP"),
 | 
				
			||||||
 | 
							config.GetString("config.http.reqAuth", "ADMINS"),
 | 
				
			||||||
		server)
 | 
							server)
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
				
			|||||||
@ -62,10 +62,6 @@ config
 | 
				
			|||||||
            mfa:                ""
 | 
					            mfa:                ""
 | 
				
			||||||
            cert:               "optionnal"
 | 
					            cert:               "optionnal"
 | 
				
			||||||
            IPRange:            "192.168.204.1-192.168.206.254"
 | 
					            IPRange:            "192.168.204.1-192.168.206.254"
 | 
				
			||||||
            routes:
 | 
					 | 
				
			||||||
            [
 | 
					 | 
				
			||||||
                "10.190.32.51 255.255.255.255",
 | 
					 | 
				
			||||||
            ]
 | 
					 | 
				
			||||||
        }
 | 
					        }
 | 
				
			||||||
        ADMINS:
 | 
					        ADMINS:
 | 
				
			||||||
        {
 | 
					        {
 | 
				
			||||||
@ -82,14 +78,20 @@ config
 | 
				
			|||||||
        }
 | 
					        }
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
    openvpnPort:    "127.0.0.1:4000"
 | 
					    openvpnPort:    "127.0.0.1:4000"
 | 
				
			||||||
    httpPort:       ":8443"
 | 
					    ipRouteScript:  "/usr/local/bin/iproute"
 | 
				
			||||||
    ipRouteScript:  "./iproute"
 | 
					    http:
 | 
				
			||||||
    httpCa:         "/usr/local/share/ca-certificates/Dailymotion.crt"
 | 
					    {
 | 
				
			||||||
    httpKey:        "/etc/ssl/private/server-key.pem"
 | 
					        port:       ":8443"
 | 
				
			||||||
    httpCert:       "/etc/ssl/certs/server-bundle.pem"
 | 
					        ca:         "/usr/local/share/ca-certificates/Dailymotion.crt"
 | 
				
			||||||
 | 
					        key:        "/etc/ssl/private/server-key.pem"
 | 
				
			||||||
 | 
					        cert:       "/etc/ssl/certs/server-bundle.pem"
 | 
				
			||||||
 | 
					        startAuth:  "CORP"
 | 
				
			||||||
 | 
					        reqAuth:    "ADMINS"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    cacheDir:       "/var/run/openvpn/"
 | 
					    cacheDir:       "/var/run/openvpn/"
 | 
				
			||||||
    authCa:         "/usr/local/share/ca-certificates/Dailymotion.crt"
 | 
					    authCa:         "/usr/local/share/ca-certificates/Dailymotion.crt"
 | 
				
			||||||
    masterSecrets:  [ "********************************"]
 | 
					    masterSecrets:  [ "********************************" ]
 | 
				
			||||||
    vpnLogUrl:      "https://install.dm.gg/vpn-log.php"
 | 
					    vpnLogUrl:      "https://install.dm.gg/vpn-log.php"
 | 
				
			||||||
    mailRelay:       "mailrelay.dailymotion.com:25"
 | 
					    mailRelay:       "mailrelay.dailymotion.com:25"
 | 
				
			||||||
    mailFrom:        "engineering-infra@dailymotion.com"
 | 
					    mailFrom:        "engineering-infra@dailymotion.com"
 | 
				
			||||||
 | 
				
			|||||||
							
								
								
									
										24
									
								
								vpnserver.go
									
									
									
									
									
								
							
							
						
						
									
										24
									
								
								vpnserver.go
									
									
									
									
									
								
							@ -3,6 +3,7 @@ package main
 | 
				
			|||||||
import (
 | 
					import (
 | 
				
			||||||
	"bufio"
 | 
						"bufio"
 | 
				
			||||||
	"errors"
 | 
						"errors"
 | 
				
			||||||
 | 
						"fmt"
 | 
				
			||||||
	"io"
 | 
						"io"
 | 
				
			||||||
	"log"
 | 
						"log"
 | 
				
			||||||
	"net"
 | 
						"net"
 | 
				
			||||||
@ -117,6 +118,22 @@ func (s *OpenVpnMgt) sendCommand(msg []string, remote string) (error, []string)
 | 
				
			|||||||
	return nil, ret
 | 
						return nil, ret
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// send the list of all connected clients
 | 
				
			||||||
 | 
					func (s *OpenVpnMgt) Stats() map[string]map[int]*vpnSession {
 | 
				
			||||||
 | 
						return s.clients
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (s *OpenVpnMgt) Kill(session string, id int) error {
 | 
				
			||||||
 | 
						if _, ok := s.clients[session]; !ok {
 | 
				
			||||||
 | 
							return errors.New("unknown session")
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if _, ok := s.clients[session][id]; !ok {
 | 
				
			||||||
 | 
							return errors.New("unknown session id")
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						err, msg := s.sendCommand([]string{fmt.Sprintf("client-kill %d", id)}, session)
 | 
				
			||||||
 | 
						return err
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// send the help command on all vpn servers. Kind of useless
 | 
					// send the help command on all vpn servers. Kind of useless
 | 
				
			||||||
func (s *OpenVpnMgt) Help() (error, map[string]map[string]string) {
 | 
					func (s *OpenVpnMgt) Help() (error, map[string]map[string]string) {
 | 
				
			||||||
	ret := make(map[string]map[string]string)
 | 
						ret := make(map[string]map[string]string)
 | 
				
			||||||
@ -139,7 +156,7 @@ func (s *OpenVpnMgt) Help() (error, map[string]map[string]string) {
 | 
				
			|||||||
	return nil, ret
 | 
						return nil, ret
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// send the verson command on all vpn servers. Kind of useless
 | 
					// send the version command on all vpn servers. Kind of useless
 | 
				
			||||||
func (s *OpenVpnMgt) Version() (error, map[string][]string) {
 | 
					func (s *OpenVpnMgt) Version() (error, map[string][]string) {
 | 
				
			||||||
	ret := make(map[string][]string)
 | 
						ret := make(map[string][]string)
 | 
				
			||||||
	for remote := range s.buf {
 | 
						for remote := range s.buf {
 | 
				
			||||||
@ -295,7 +312,7 @@ func (s *OpenVpnMgt) handleConn(conn net.Conn) {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// ask for statistics
 | 
						// ask for statistics
 | 
				
			||||||
	if _, err := s.buf[remote].WriteString("bytecount 10\r\n"); err != nil {
 | 
						if _, err := s.buf[remote].WriteString("bytecount 30\r\n"); err != nil {
 | 
				
			||||||
		log.Println(err)
 | 
							log.Println(err)
 | 
				
			||||||
		return
 | 
							return
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@ -334,7 +351,7 @@ func (s *OpenVpnMgt) handleConn(conn net.Conn) {
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// manage all "terminator" lines
 | 
							// manage all "terminator" lines
 | 
				
			||||||
		for _, terminator := range []string{"END", ">CLIENT:ENV,END", "SUCCESS"} {
 | 
							for _, terminator := range []string{"END", ">CLIENT:ENV,END", "SUCCESS", "ERROR"} {
 | 
				
			||||||
			if strings.HasPrefix(line, terminator) {
 | 
								if strings.HasPrefix(line, terminator) {
 | 
				
			||||||
				s.ret <- response
 | 
									s.ret <- response
 | 
				
			||||||
				response = nil
 | 
									response = nil
 | 
				
			||||||
@ -359,6 +376,7 @@ func (s *OpenVpnMgt) handleConn(conn net.Conn) {
 | 
				
			|||||||
		// new bloc for a connect event.
 | 
							// new bloc for a connect event.
 | 
				
			||||||
		// We start the receiving handler, which will wait for the Channel message
 | 
							// We start the receiving handler, which will wait for the Channel message
 | 
				
			||||||
		case strings.HasPrefix(line, ">CLIENT:ADDRESS"):
 | 
							case strings.HasPrefix(line, ">CLIENT:ADDRESS"):
 | 
				
			||||||
 | 
							case strings.HasPrefix(line, ">CLIENT:ESTABLISHED"):
 | 
				
			||||||
			go s.ClientValidated(line, remote)
 | 
								go s.ClientValidated(line, remote)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		case strings.HasPrefix(line, ">CLIENT:CONNECT"):
 | 
							case strings.HasPrefix(line, ">CLIENT:CONNECT"):
 | 
				
			||||||
 | 
				
			|||||||
@ -5,7 +5,6 @@ import (
 | 
				
			|||||||
	"encoding/json"
 | 
						"encoding/json"
 | 
				
			||||||
	"errors"
 | 
						"errors"
 | 
				
			||||||
	"fmt"
 | 
						"fmt"
 | 
				
			||||||
	"log"
 | 
					 | 
				
			||||||
	"os"
 | 
						"os"
 | 
				
			||||||
	"os/exec"
 | 
						"os/exec"
 | 
				
			||||||
	"regexp"
 | 
						"regexp"
 | 
				
			||||||
@ -117,6 +116,14 @@ func (c *vpnSession) ParseEnv(s *OpenVpnMgt, infos *[]string) error {
 | 
				
			|||||||
			c.PrivIP = r.ReplaceAllString(p[1], "")
 | 
								c.PrivIP = r.ReplaceAllString(p[1], "")
 | 
				
			||||||
		case "ifconfig_local":
 | 
							case "ifconfig_local":
 | 
				
			||||||
			c.localIP = r.ReplaceAllString(p[1], "")
 | 
								c.localIP = r.ReplaceAllString(p[1], "")
 | 
				
			||||||
 | 
							case "bytes_received":
 | 
				
			||||||
 | 
								if c.BwWrite, err = strconv.Atoi(p[1]); err != nil {
 | 
				
			||||||
 | 
									break
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							case "bytes_sent":
 | 
				
			||||||
 | 
								if c.BwRead, err = strconv.Atoi(p[1]); err != nil {
 | 
				
			||||||
 | 
									break
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		case "password":
 | 
							case "password":
 | 
				
			||||||
			switch {
 | 
								switch {
 | 
				
			||||||
			case strings.HasPrefix(p[1], "CRV1"):
 | 
								case strings.HasPrefix(p[1], "CRV1"):
 | 
				
			||||||
@ -129,8 +136,7 @@ func (c *vpnSession) ParseEnv(s *OpenVpnMgt, infos *[]string) error {
 | 
				
			|||||||
				if c.otpCode == "" {
 | 
									if c.otpCode == "" {
 | 
				
			||||||
					c.otpCode = "***"
 | 
										c.otpCode = "***"
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				// don't check that password agains the ibp database
 | 
								// don't check that password against the ibp database
 | 
				
			||||||
 | 
					 | 
				
			||||||
			case strings.HasPrefix(p[1], "SCRV1"):
 | 
								case strings.HasPrefix(p[1], "SCRV1"):
 | 
				
			||||||
				split := strings.Split(p[1], ":")
 | 
									split := strings.Split(p[1], ":")
 | 
				
			||||||
				if len(split) != 3 {
 | 
									if len(split) != 3 {
 | 
				
			||||||
@ -257,52 +263,7 @@ func (c *vpnSession) auth(s *OpenVpnMgt) (error, int) {
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	c.Profile = ""
 | 
						c.Profile, c.Mail = s.AuthLoop("", c.Login, c.password, tokenPasswordOk)
 | 
				
			||||||
	login := []string{c.Login}
 | 
					 | 
				
			||||||
	pass := c.password
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	for {
 | 
					 | 
				
			||||||
		n := c.Profile
 | 
					 | 
				
			||||||
		for k, ldap := range s.ldap {
 | 
					 | 
				
			||||||
			if ldap.upgradeFrom != c.Profile {
 | 
					 | 
				
			||||||
				continue
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
			err, userOk, passOk, secondary := ldap.Auth(login, pass)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// if there is an error, try the other configurations
 | 
					 | 
				
			||||||
			if err != nil {
 | 
					 | 
				
			||||||
				c.LogPrintln(err)
 | 
					 | 
				
			||||||
				continue
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// we did find a valid User
 | 
					 | 
				
			||||||
			if userOk {
 | 
					 | 
				
			||||||
				// the login for the new auth level is given by the current one
 | 
					 | 
				
			||||||
				login = secondary
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				if c.Mail == "" {
 | 
					 | 
				
			||||||
					c.Mail = secondary[0]
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				if passOk && c.Profile != "" {
 | 
					 | 
				
			||||||
					// it's at least the second auth level, and we have a valid
 | 
					 | 
				
			||||||
					// password on 2 different auth system. It's a dupplicate
 | 
					 | 
				
			||||||
					// password, let's log it
 | 
					 | 
				
			||||||
					log.Printf("User %s has a dupplicate password\n", c.Login)
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				// we have either a positive auth ok a previous valid one
 | 
					 | 
				
			||||||
				if passOk || c.Profile != "" || tokenPasswordOk {
 | 
					 | 
				
			||||||
					c.Profile = k
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// no profile update this turn, no need to continue
 | 
					 | 
				
			||||||
		if n == c.Profile {
 | 
					 | 
				
			||||||
			break
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// no profile validated, we stop here
 | 
						// no profile validated, we stop here
 | 
				
			||||||
	if c.Profile == "" {
 | 
						if c.Profile == "" {
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user