2006-09-23 15:57:16 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Created on Sep 19, 2006
|
|
|
|
|
*
|
|
|
|
|
* API for MediaWiki 1.8+
|
|
|
|
|
*
|
2007-05-27 23:50:24 +00:00
|
|
|
* Copyright (C) 2006-2007 Yuri Astrakhan <Firstname><Lastname>@gmail.com,
|
|
|
|
|
* Daniel Cannon (cannon dot danielc at gmail dot com)
|
2006-09-23 15:57:16 +00:00
|
|
|
*
|
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
|
* 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
if (!defined('MEDIAWIKI')) {
|
|
|
|
|
// Eclipse helper - will be ignored in production
|
2006-10-01 02:02:13 +00:00
|
|
|
require_once ('ApiBase.php');
|
2006-09-23 15:57:16 +00:00
|
|
|
}
|
|
|
|
|
|
2007-04-20 08:55:14 +00:00
|
|
|
/**
|
2007-05-27 23:50:24 +00:00
|
|
|
* Unit to authenticate log-in attempts to the current wiki.
|
|
|
|
|
*
|
2007-04-20 08:55:14 +00:00
|
|
|
* @addtogroup API
|
|
|
|
|
*/
|
2006-09-23 15:57:16 +00:00
|
|
|
class ApiLogin extends ApiBase {
|
2007-05-27 23:50:24 +00:00
|
|
|
|
|
|
|
|
/**
|
2007-08-09 09:53:05 +00:00
|
|
|
* Time (in seconds) a user must wait after submitting
|
2007-05-27 23:50:24 +00:00
|
|
|
* a bad login (will be multiplied by the THROTTLE_FACTOR for each bad attempt)
|
|
|
|
|
*/
|
2007-11-18 05:42:08 +00:00
|
|
|
const THROTTLE_TIME = 5;
|
2007-05-27 23:50:24 +00:00
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* The factor by which the wait-time in between authentication
|
|
|
|
|
* attempts is increased every failed attempt.
|
|
|
|
|
*/
|
2007-08-09 09:53:05 +00:00
|
|
|
const THROTTLE_FACTOR = 2;
|
2007-05-27 23:50:24 +00:00
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* The maximum number of failed logins after which the wait increase stops.
|
|
|
|
|
*/
|
|
|
|
|
const THOTTLE_MAX_COUNT = 10;
|
|
|
|
|
|
2006-09-23 15:57:16 +00:00
|
|
|
public function __construct($main, $action) {
|
2006-10-03 05:41:55 +00:00
|
|
|
parent :: __construct($main, $action, 'lg');
|
2006-09-23 15:57:16 +00:00
|
|
|
}
|
|
|
|
|
|
2007-05-27 23:50:24 +00:00
|
|
|
/**
|
|
|
|
|
* Executes the log-in attempt using the parameters passed. If
|
|
|
|
|
* the log-in succeeeds, it attaches a cookie to the session
|
|
|
|
|
* and outputs the user id, username, and session token. If a
|
|
|
|
|
* log-in fails, as the result of a bad password, a nonexistant
|
|
|
|
|
* user, or any other reason, the host is cached with an expiry
|
|
|
|
|
* and no log-in attempts will be accepted until that expiry
|
|
|
|
|
* is reached. The expiry is $this->mLoginThrottle.
|
|
|
|
|
*
|
|
|
|
|
* @access public
|
|
|
|
|
*/
|
2006-09-27 05:13:48 +00:00
|
|
|
public function execute() {
|
2006-10-03 05:41:55 +00:00
|
|
|
$name = $password = $domain = null;
|
2006-09-27 05:13:48 +00:00
|
|
|
extract($this->extractRequestParams());
|
2006-09-23 15:57:16 +00:00
|
|
|
|
2006-09-26 06:37:26 +00:00
|
|
|
$result = array ();
|
|
|
|
|
|
2007-05-28 06:59:19 +00:00
|
|
|
// Make sure noone is trying to guess the password brut-force
|
2007-05-27 23:50:24 +00:00
|
|
|
$nextLoginIn = $this->getNextLoginTimeout();
|
|
|
|
|
if ($nextLoginIn > 0) {
|
|
|
|
|
$result['result'] = 'NeedToWait';
|
|
|
|
|
$result['details'] = "Please wait $nextLoginIn seconds before next log-in attempt";
|
|
|
|
|
$result['wait'] = $nextLoginIn;
|
|
|
|
|
$this->getResult()->addValue(null, 'login', $result);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2007-05-28 06:59:19 +00:00
|
|
|
$params = new FauxRequest(array (
|
|
|
|
|
'wpName' => $name,
|
|
|
|
|
'wpPassword' => $password,
|
|
|
|
|
'wpDomain' => $domain,
|
|
|
|
|
'wpRemember' => ''
|
|
|
|
|
));
|
|
|
|
|
|
2007-12-04 08:35:26 +00:00
|
|
|
// Init session if necessary
|
|
|
|
|
if( session_id() == '' ) {
|
|
|
|
|
wfSetupSession();
|
|
|
|
|
}
|
|
|
|
|
|
2006-09-23 15:57:16 +00:00
|
|
|
$loginForm = new LoginForm($params);
|
2006-09-26 06:37:26 +00:00
|
|
|
switch ($loginForm->authenticateUserData()) {
|
2006-10-01 04:38:31 +00:00
|
|
|
case LoginForm :: SUCCESS :
|
2007-10-08 18:00:17 +00:00
|
|
|
global $wgUser, $wgCookiePrefix;
|
2006-10-01 04:38:31 +00:00
|
|
|
|
|
|
|
|
$wgUser->setOption('rememberpassword', 1);
|
|
|
|
|
$wgUser->setCookies();
|
|
|
|
|
|
2006-09-23 15:57:16 +00:00
|
|
|
$result['result'] = 'Success';
|
|
|
|
|
$result['lguserid'] = $_SESSION['wsUserID'];
|
|
|
|
|
$result['lgusername'] = $_SESSION['wsUserName'];
|
|
|
|
|
$result['lgtoken'] = $_SESSION['wsToken'];
|
2007-10-08 18:00:17 +00:00
|
|
|
$result['cookieprefix'] = $wgCookiePrefix;
|
2007-12-03 18:50:53 +00:00
|
|
|
$result['sessionid'] = session_id();
|
2006-09-23 15:57:16 +00:00
|
|
|
break;
|
|
|
|
|
|
2006-10-01 04:38:31 +00:00
|
|
|
case LoginForm :: NO_NAME :
|
|
|
|
|
$result['result'] = 'NoName';
|
2006-09-23 15:57:16 +00:00
|
|
|
break;
|
2006-10-01 04:38:31 +00:00
|
|
|
case LoginForm :: ILLEGAL :
|
|
|
|
|
$result['result'] = 'Illegal';
|
2006-09-23 15:57:16 +00:00
|
|
|
break;
|
2006-10-01 04:38:31 +00:00
|
|
|
case LoginForm :: WRONG_PLUGIN_PASS :
|
|
|
|
|
$result['result'] = 'WrongPluginPass';
|
2006-09-23 15:57:16 +00:00
|
|
|
break;
|
2006-10-01 04:38:31 +00:00
|
|
|
case LoginForm :: NOT_EXISTS :
|
|
|
|
|
$result['result'] = 'NotExists';
|
2006-09-23 15:57:16 +00:00
|
|
|
break;
|
2006-10-01 04:38:31 +00:00
|
|
|
case LoginForm :: WRONG_PASS :
|
|
|
|
|
$result['result'] = 'WrongPass';
|
2006-09-23 15:57:16 +00:00
|
|
|
break;
|
2006-10-01 04:38:31 +00:00
|
|
|
case LoginForm :: EMPTY_PASS :
|
|
|
|
|
$result['result'] = 'EmptyPass';
|
2006-09-23 15:57:16 +00:00
|
|
|
break;
|
2006-09-26 06:37:26 +00:00
|
|
|
default :
|
2006-10-01 20:17:16 +00:00
|
|
|
ApiBase :: dieDebug(__METHOD__, 'Unhandled case value');
|
2006-09-23 15:57:16 +00:00
|
|
|
}
|
2006-09-26 06:37:26 +00:00
|
|
|
|
2007-05-27 23:50:24 +00:00
|
|
|
if ($result['result'] != 'Success') {
|
|
|
|
|
$result['wait'] = $this->cacheBadLogin();
|
2007-11-18 05:46:44 +00:00
|
|
|
$result['details'] = "Please wait " . self::THROTTLE_TIME . " seconds before next log-in attempt";
|
2007-05-27 23:50:24 +00:00
|
|
|
}
|
|
|
|
|
// if we were allowed to try to login, memcache is fine
|
|
|
|
|
|
2006-10-01 02:02:13 +00:00
|
|
|
$this->getResult()->addValue(null, 'login', $result);
|
2006-09-23 15:57:16 +00:00
|
|
|
}
|
|
|
|
|
|
2007-05-27 23:50:24 +00:00
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Caches a bad-login attempt associated with the host and with an
|
|
|
|
|
* expiry of $this->mLoginThrottle. These are cached by a key
|
|
|
|
|
* separate from that used by the captcha system--as such, logging
|
|
|
|
|
* in through the standard interface will get you a legal session
|
|
|
|
|
* and cookies to prove it, but will not remove this entry.
|
|
|
|
|
*
|
|
|
|
|
* Returns the number of seconds until next login attempt will be allowed.
|
|
|
|
|
*
|
|
|
|
|
* @access private
|
|
|
|
|
*/
|
|
|
|
|
private function cacheBadLogin() {
|
|
|
|
|
global $wgMemc;
|
|
|
|
|
|
|
|
|
|
$key = $this->getMemCacheKey();
|
2007-07-25 01:46:50 +00:00
|
|
|
$val = $wgMemc->get( $key );
|
2007-05-27 23:50:24 +00:00
|
|
|
|
|
|
|
|
$val['lastReqTime'] = time();
|
|
|
|
|
if (!isset($val['count'])) {
|
|
|
|
|
$val['count'] = 1;
|
|
|
|
|
} else {
|
|
|
|
|
$val['count'] = 1 + $val['count'];
|
|
|
|
|
}
|
|
|
|
|
|
2007-08-09 09:53:05 +00:00
|
|
|
$delay = ApiLogin::calculateDelay($val['count']);
|
2007-05-27 23:50:24 +00:00
|
|
|
|
|
|
|
|
$wgMemc->delete($key);
|
2007-08-09 09:53:05 +00:00
|
|
|
// Cache expiration should be the maximum timeout - to prevent a "try and wait" attack
|
|
|
|
|
$wgMemc->add( $key, $val, ApiLogin::calculateDelay(ApiLogin::THOTTLE_MAX_COUNT) );
|
2007-05-27 23:50:24 +00:00
|
|
|
|
|
|
|
|
return $delay;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* How much time the client must wait before it will be
|
|
|
|
|
* allowed to try to log-in next.
|
|
|
|
|
* The return value is 0 if no wait is required.
|
|
|
|
|
*/
|
|
|
|
|
private function getNextLoginTimeout() {
|
|
|
|
|
global $wgMemc;
|
|
|
|
|
|
|
|
|
|
$val = $wgMemc->get($this->getMemCacheKey());
|
|
|
|
|
|
2007-08-09 09:53:05 +00:00
|
|
|
$elapse = (time() - $val['lastReqTime']); // in seconds
|
|
|
|
|
$canRetryIn = ApiLogin::calculateDelay($val['count']) - $elapse;
|
2007-05-27 23:50:24 +00:00
|
|
|
|
2007-05-28 06:59:19 +00:00
|
|
|
return $canRetryIn < 0 ? 0 : $canRetryIn;
|
2007-05-27 23:50:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Based on the number of previously attempted logins, returns
|
|
|
|
|
* the delay (in seconds) when the next login attempt will be allowed.
|
|
|
|
|
*/
|
2007-08-09 09:53:05 +00:00
|
|
|
private static function calculateDelay($count) {
|
2007-05-27 23:50:24 +00:00
|
|
|
// Defensive programming
|
2007-08-09 09:53:05 +00:00
|
|
|
$count = intval($count);
|
2007-05-27 23:50:24 +00:00
|
|
|
$count = $count < 1 ? 1 : $count;
|
|
|
|
|
$count = $count > self::THOTTLE_MAX_COUNT ? self::THOTTLE_MAX_COUNT : $count;
|
|
|
|
|
|
|
|
|
|
return self::THROTTLE_TIME + self::THROTTLE_TIME * ($count - 1) * self::THROTTLE_FACTOR;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Internal cache key for badlogin checks. Robbed from the
|
|
|
|
|
* ConfirmEdit extension and modified to use a key unique to the
|
|
|
|
|
* API login.3
|
|
|
|
|
*
|
|
|
|
|
* @return string
|
|
|
|
|
* @access private
|
|
|
|
|
*/
|
|
|
|
|
private function getMemCacheKey() {
|
|
|
|
|
return wfMemcKey( 'apilogin', 'badlogin', 'ip', wfGetIP() );
|
|
|
|
|
}
|
2008-01-18 20:43:59 +00:00
|
|
|
|
|
|
|
|
public function mustBePosted() { return true; }
|
2007-05-27 23:50:24 +00:00
|
|
|
|
2008-01-28 19:05:26 +00:00
|
|
|
public function getAllowedParams() {
|
2006-09-23 15:57:16 +00:00
|
|
|
return array (
|
2006-10-17 02:11:29 +00:00
|
|
|
'name' => null,
|
|
|
|
|
'password' => null,
|
2006-10-03 05:41:55 +00:00
|
|
|
'domain' => null
|
2006-09-23 15:57:16 +00:00
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
2008-01-28 19:05:26 +00:00
|
|
|
public function getParamDescription() {
|
2006-09-23 15:57:16 +00:00
|
|
|
return array (
|
2006-10-03 05:41:55 +00:00
|
|
|
'name' => 'User Name',
|
|
|
|
|
'password' => 'Password',
|
|
|
|
|
'domain' => 'Domain (optional)'
|
2006-09-23 15:57:16 +00:00
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
2008-01-28 19:05:26 +00:00
|
|
|
public function getDescription() {
|
2006-09-26 06:37:26 +00:00
|
|
|
return array (
|
2007-07-06 02:19:56 +00:00
|
|
|
'This module is used to login and get the authentication tokens. ',
|
|
|
|
|
'In the event of a successful log-in, a cookie will be attached',
|
|
|
|
|
'to your session. In the event of a failed log-in, you will not ',
|
2008-03-16 19:08:30 +00:00
|
|
|
'be able to attempt another log-in through this method for 5 seconds.',
|
2007-07-06 02:19:56 +00:00
|
|
|
'This is to prevent password guessing by automated password crackers.'
|
2006-09-26 06:37:26 +00:00
|
|
|
);
|
2006-09-23 15:57:16 +00:00
|
|
|
}
|
2006-10-03 05:41:55 +00:00
|
|
|
|
|
|
|
|
protected function getExamples() {
|
|
|
|
|
return array(
|
|
|
|
|
'api.php?action=login&lgname=user&lgpassword=password'
|
|
|
|
|
);
|
|
|
|
|
}
|
2006-10-01 21:20:55 +00:00
|
|
|
|
|
|
|
|
public function getVersion() {
|
|
|
|
|
return __CLASS__ . ': $Id$';
|
|
|
|
|
}
|
2006-09-23 15:57:16 +00:00
|
|
|
}
|
2007-06-29 01:19:14 +00:00
|
|
|
|