X-Git-Url: https://git.proxmox.com/?p=pve-access-control.git;a=blobdiff_plain;f=PVE%2FAccessControl.pm;h=2b7044e2393039aab16dad482e76b0cfd6c29b76;hp=5a74a8e5f7855b61c14f7767b347b278b97ba2e6;hb=25167526055b657bc677e66126cd0c0c9f40f46a;hpb=1abc2c0aeea26040cda69d40e43a7791f77e400c diff --git a/PVE/AccessControl.pm b/PVE/AccessControl.pm index 5a74a8e..2b7044e 100644 --- a/PVE/AccessControl.pm +++ b/PVE/AccessControl.pm @@ -6,6 +6,7 @@ use Encode; use Crypt::OpenSSL::Random; use Crypt::OpenSSL::RSA; use Net::SSLeay; +use Net::IP; use MIME::Base64; use Digest::SHA; use Digest::HMAC_SHA1; @@ -317,6 +318,7 @@ sub remote_viewer_config { my $cacert = PVE::Tools::file_get_contents("/etc/pve/pve-root-ca.pem", 8192); $cacert =~ s/\n/\\n/g; + $proxy = "[$proxy]" if Net::IP::ip_is_ipv6($proxy); my $config = { 'secure-attention' => "Ctrl+Alt+Ins", 'toggle-fullscreen' => "Shift+F11", @@ -356,8 +358,6 @@ sub check_user_enabled { return 1 if $data->{enable}; - return 1 if $username eq 'root@pam'; # root is always enabled - die "user '$username' is disabled\n" if !$noerr; return undef; @@ -378,7 +378,7 @@ sub verify_one_time_pw { yubico_verify_otp($otp, $keys, $tfa_cfg->{url}, $tfa_cfg->{id}, $tfa_cfg->{key}, $proxy); } elsif ($type eq 'oath') { my $keys = $usercfg->{users}->{$username}->{keys}; - oath_verify_otp($otp, $keys); + oath_verify_otp($otp, $keys, $tfa_cfg->{step}, $tfa_cfg->{digits}); } else { die "unknown tfa type '$type'\n"; } @@ -695,10 +695,10 @@ sub userconfig_force_defaults { $cfg->{roles}->{$r} = $special_roles->{$r}; } - # fixme: remove 'root' group (not required)? - - # add root user - $cfg->{users}->{'root@pam'}->{enable} = 1; + # add root user if not exists + if (!$cfg->{users}->{'root@pam'}) { + $cfg->{users}->{'root@pam'}->{enable} = 1; + } } sub parse_user_config { @@ -1229,12 +1229,13 @@ sub yubico_verify_otp { } sub oath_verify_otp { - my ($otp, $keys) = @_; + my ($otp, $keys, $step, $digits) = @_; die "oath: missing password\n" if !defined($otp); die "oath: no associated oath keys\n" if $keys =~ m/^\s+$/; - my $step = 30; + $step = 30 if !$step; + $digits = 6 if !$digits; my $found; @@ -1242,7 +1243,6 @@ sub oath_verify_otp { my $line = shift; if ($line =~ m/^\d{6}$/) { - print "GOT:$line\n"; $found = 1 if $otp eq $line; } }; @@ -1250,7 +1250,7 @@ sub oath_verify_otp { foreach my $k (PVE::Tools::split_list($keys)) { # Note: we generate 3 values to allow small time drift my $now = localtime(time() - $step); - my $cmd = ['oathtool', '--totp', '-N', $now, '-s', $step, '-w', '2', '-b', $k]; + my $cmd = ['oathtool', '--totp', '--digits', $digits, '-N', $now, '-s', $step, '-w', '2', '-b', $k]; eval { run_command($cmd, outfunc => $parser, errfunc => sub {}); }; last if $found; }