Copyright (C) 2008-2015 All Rights Reserved. Contributor(s): Mark J Crane Luis Daniel Lucio Quiroz */ include "root.php"; require_once "resources/require.php"; openlog("fusion-provisioning", LOG_PID | LOG_PERROR, LOG_LOCAL0); //set default variables $dir_count = 0; $file_count = 0; $row_count = 0; $tmp_array = ''; $device_template = ''; //define PHP variables from the HTTP values $mac = check_str($_REQUEST['mac']); $file = check_str($_REQUEST['file']); //if (strlen(check_str($_REQUEST['template'])) > 0) { // $device_template = check_str($_REQUEST['template']); //} //check alternate MAC source if (empty($mac)){ //set the http user agent //$_SERVER['HTTP_USER_AGENT'] = "Yealink SIP-T38G 38.70.0.125 00:15:65:00:00:00"; //Yealink: 17 digit mac appended to the user agent, so check for a space exactly 17 digits before the end. if (strtolower(substr($_SERVER['HTTP_USER_AGENT'],0,7)) == "yealink") { $mac = substr($_SERVER['HTTP_USER_AGENT'],-17); $mac = preg_replace("#[^a-fA-F0-9./]#", "", $mac); } } //prepare the mac address //normalize the mac address to lower case $mac = strtolower($mac); //replace all non hexadecimal values and validate the mac address $mac = preg_replace("#[^a-fA-F0-9./]#", "", $mac); if (strlen($mac) != 12) { echo "invalid mac address"; exit; } //get the domain_name and domain_uuid if ($_SESSION['provision']['http_domain_filter']['text'] == "false") { //get the domain_uuid $sql = "SELECT domain_uuid FROM v_devices "; $sql .= "WHERE device_mac_address = '".$mac."' "; $prep_statement = $db->prepare($sql); $prep_statement->execute(); $result = $prep_statement->fetchAll(PDO::FETCH_NAMED); foreach($result as $row) { $domain_uuid = $row["domain_uuid"]; } unset($result, $prep_statement); //get the domain name $domain_name = $_SESSION['domains'][$domain_uuid]['domain_name']; } else { //get the domain_name //$domain_array = explode(":", $_SERVER["HTTP_HOST"]); //$domain_name = $domain_array[0]; //get the domain_uuid $sql = "SELECT * FROM v_domains "; $sql .= "WHERE domain_name = '".$domain_name."' "; $prep_statement = $db->prepare($sql); $prep_statement->execute(); $result = $prep_statement->fetchAll(PDO::FETCH_NAMED); foreach($result as $row) { $domain_uuid = $row["domain_uuid"]; } unset($result, $prep_statement); } //build the provision array foreach($_SESSION['provision'] as $key=>$val) { if (strlen($val['var']) > 0) { $value = $val['var']; } if (strlen($val['text']) > 0) { $value = $val['text']; } $provision[$key] = $value; unset($value); } //check if provisioning has been enabled if ($provision["enabled"] != "true") { echo "access denied 1"; exit; } //send a request to a remote server to validate the MAC address and secret if (strlen($_SERVER['auth_server']) > 0) { $result = send_http_request($_SERVER['auth_server'], 'mac='.check_str($_REQUEST['mac']).'&secret='.check_str($_REQUEST['secret'])); if ($result == "false") { echo "access denied 2"; exit; } } //use the mac address to get the vendor $device_vendor = device::get_vendor($mac); //keep backwards compatibility if (strlen($_SESSION['provision']["cidr"]["text"]) > 0) { $_SESSION['provision']["cidr"][] = $_SESSION['provision']["cidr"]["text"]; } //check the cidr range if (is_array($_SESSION['provision']["cidr"])) { $found = false; foreach($_SESSION['provision']["cidr"] as $cidr) { if (check_cidr($cidr, $_SERVER['REMOTE_ADDR'])) { $found = true; break; } } if (!$found) { echo "access denied 3"; exit; } } //Digest or Basic $sql_device = "select device_template from v_devices where device_mac_address='$mac' and device_provision_enable='true'"; $prep_statement_device = $db->prepare($sql_device); $prep_statement_device->execute(); $result_device = $prep_statement_device->fetchAll(PDO::FETCH_NAMED); foreach($result_device as $row_device) { $device_template = $row_device["device_template"]; } unset($result_device, $prep_statement_device); syslog(LOG_INFO, "template: $device_template"); switch ($device_template){ case "linksys/spa2102": case "linksys/spa3102": case "linksys/spa921": case "linksys/spa942": case "cisco/spa112": case "cisco/spa502g": case "cisco/spa504g": case "cisco/spa509g": case "cisco/spa301": case "cisco/spa514g": case "cisco/spa512g": case "cisco/spa501g": case "cisco/spa525g": case "cisco/spa508g": case "cisco/spa122": case "cisco/spa303": syslog(LOG_INFO, "using digest authentication"); if (strlen($provision["http_auth_username"]) > 0 && strlen($provision["http_auth_password"]) > 0) { if (empty($_SERVER['PHP_AUTH_DIGEST'])) { header('HTTP/1.1 401 Unauthorized'); header('WWW-Authenticate: Digest realm="'.$_SESSION['domain_name']. '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($_SESSION['domain_name']).'"'); echo 'Authorization Required'; exit; } else{ if (!($data = http_digest_parse($_SERVER['PHP_AUTH_DIGEST']))){ header('HTTP/1.1 401 Unauthorized'); header('WWW-Authenticate: Digest realm="'.$_SESSION['domain_name']. '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($_SESSION['domain_name']).'"'); echo 'Authorization Required'; exit; } $A1 = md5($provision["http_auth_username"] . ':' . $_SESSION['domain_name'] . ':' . $provision["http_auth_password"]); $A2 = md5($_SERVER['REQUEST_METHOD'].':'.$data['uri']); $valid_response = md5($A1.':'.$data['nonce'].':'.$data['nc'].':'.$data['cnonce'].':'.$data['qop'].':'.$A2); syslog(LOG_INFO, "valid_response: $valid_response"); syslog(LOG_INFO, "data[response]".$data['response']); if ($data['response'] != $valid_response){ header('HTTP/1.1 401 Unauthorized'); header('WWW-Authenticate: Digest realm="'.$_SESSION['domain_name']. '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($_SESSION['domain_name']).'"'); echo 'Authorization Required'; exit; } } } break; defaut: syslog(LOG_INFO, "using basic authentication"); //http authentication //http://www.php.net/manual/en/features.http-auth.php if (strlen($provision["http_auth_username"]) > 0 && strlen($provision["http_auth_password"]) > 0) { if (!isset($_SERVER['PHP_AUTH_USER'])) { header('WWW-Authenticate: Basic realm="'.$_SESSION['domain_name']." ".date('r').'"'); header('HTTP/1.0 401 Unauthorized'); header("Content-Type: text/plain"); echo 'Authorization Required'; exit; } else { if ($_SERVER['PHP_AUTH_USER'] == $provision["http_auth_username"] && $_SERVER['PHP_AUTH_PW'] == $provision["http_auth_password"]) { //authorized } else { //access denied header('WWW-Authenticate: Basic realm="'.$_SESSION['domain_name']." ".date('r').'"'); unset($_SERVER['PHP_AUTH_USER'],$_SERVER['PHP_AUTH_PW']); usleep(rand(1000000,3000000));//1-3 seconds. echo 'Authorization Required'; exit; } } } //if password was defined in the system -> variables page then require the password. if (strlen($provision['password']) > 0) { //deny access if the password doesn't match if ($provision['password'] != check_str($_REQUEST['password'])) { //log the failed auth attempt to the system, to be available for fail2ban. openlog('FusionPBX', LOG_NDELAY, LOG_AUTH); syslog(LOG_WARNING, '['.$_SERVER['REMOTE_ADDR']."] provision attempt bad password for ".check_str($_REQUEST['mac'])); closelog(); usleep(rand(1000000,3000000));//1-3 seconds. echo "access denied 4"; return; } } } //output template to string for header processing $prov = new provision; $prov->domain_uuid = $domain_uuid; $prov->mac = $mac; $prov->file = $file; $file_contents = $prov->render(); //deliver the customized config over HTTP/HTTPS //need to make sure content-type is correct $cfg_ext = ".cfg"; if ($device_vendor === "aastra" && strrpos($file, $cfg_ext, 0) === strlen($file) - strlen($cfg_ext)) { header("Content-Type: text/plain"); header("Content-Length: ".strlen($file_contents)); } else if ($device_vendor === "yealink") { header("Content-Type: text/plain"); header("Content-Length: ".strval(strlen($file_contents))); } else if ($device_vendor === "snom" && $device_template === "snom/m3") { $file_contents = utf8_decode($file_contents); header("Content-Type: text/plain; charset=iso-8859-1"); header("Content-Length: ".strlen($file_contents)); } else { header("Content-Type: text/xml; charset=utf-8"); header("Content-Length: ".strlen($file_contents)); } echo $file_contents; closelog(); function http_digest_parse($txt){ // protect against missing data $needed_parts = array('nonce'=>1, 'nc'=>1, 'cnonce'=>1, 'qop'=>1, 'username'=>1, 'uri'=>1, 'response'=>1); $data = array(); $keys = implode('|', array_keys($needed_parts)); preg_match_all('@(' . $keys . ')=(?:([\'"])([^\2]+?)\2|([^\s,]+))@', $txt, $matches, PREG_SET_ORDER); foreach ($matches as $m) { $data[$m[1]] = $m[3] ? $m[3] : $m[4]; unset($needed_parts[$m[1]]); } return $needed_parts ? false : $data; } ?>