| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573 |
- <?php
- /* vim: set expandtab sw=4 ts=4 sts=4: */
- /**
- * Server config checks management
- *
- * @package PhpMyAdmin
- */
- /**
- * Performs various compatibility, security and consistency checks on current config
- *
- * Outputs results to message list, must be called between PMA_messagesBegin()
- * and PMA_messagesEnd()
- *
- * @package PhpMyAdmin
- */
- class ServerConfigChecks
- {
- /**
- * @var ConfigFile configurations being checked
- */
- protected $cfg;
- /**
- * Constructor.
- *
- * @param ConfigFile $cfg Configuration
- */
- public function __construct(ConfigFile $cfg)
- {
- $this->cfg = $cfg;
- }
- /**
- * Perform config checks
- *
- * @return void
- */
- public function performConfigChecks()
- {
- $blowfishSecret = $this->cfg->get('blowfish_secret');
- $blowfishSecretSet = false;
- $cookieAuthUsed = false;
- list(
- $sAllowArbitraryServerWarn, $sBlowfishSecretMsg,
- $sBZipDumpWarn, $sDirectoryNotice, $sForceSSLNotice,
- $sGZipDumpWarn, $sLoginCookieValidityWarn,
- $sLoginCookieValidityWarn2, $sLoginCookieValidityWarn3,
- $sSecurityInfoMsg, $sSrvAuthCfgMsg, $sZipDumpExportWarn,
- $sZipDumpImportWarn
- ) = self::defineMessages();
- list($cookieAuthUsed, $blowfishSecret, $blowfishSecretSet)
- = $this->performConfigChecksServers(
- $cookieAuthUsed, $blowfishSecret, $sSrvAuthCfgMsg,
- $sSecurityInfoMsg, $blowfishSecretSet
- );
- $this->performConfigChecksCookieAuthUsed(
- $cookieAuthUsed, $blowfishSecretSet, $sBlowfishSecretMsg,
- $blowfishSecret
- );
- //
- // $cfg['ForceSSL']
- // should be enabled if possible
- //
- if (!$this->cfg->getValue('ForceSSL')) {
- PMA_messagesSet(
- 'notice',
- 'ForceSSL',
- PMA_lang(PMA_langName('ForceSSL')),
- PMA_lang($sForceSSLNotice)
- );
- }
- //
- // $cfg['AllowArbitraryServer']
- // should be disabled
- //
- if ($this->cfg->getValue('AllowArbitraryServer')) {
- PMA_messagesSet(
- 'notice',
- 'AllowArbitraryServer',
- PMA_lang(PMA_langName('AllowArbitraryServer')),
- PMA_lang($sAllowArbitraryServerWarn)
- );
- }
- $this->performConfigChecksLoginCookie(
- $sLoginCookieValidityWarn, $sLoginCookieValidityWarn2,
- $sLoginCookieValidityWarn3
- );
- //
- // $cfg['SaveDir']
- // should not be world-accessible
- //
- if ($this->cfg->getValue('SaveDir') != '') {
- PMA_messagesSet(
- 'notice',
- 'SaveDir',
- PMA_lang(PMA_langName('SaveDir')),
- PMA_lang($sDirectoryNotice)
- );
- }
- //
- // $cfg['TempDir']
- // should not be world-accessible
- //
- if ($this->cfg->getValue('TempDir') != '') {
- PMA_messagesSet(
- 'notice',
- 'TempDir',
- PMA_lang(PMA_langName('TempDir')),
- PMA_lang($sDirectoryNotice)
- );
- }
- $this->performConfigChecksZips(
- $sGZipDumpWarn, $sBZipDumpWarn, $sZipDumpImportWarn,
- $sZipDumpExportWarn
- );
- }
- /**
- * Check config of servers
- *
- * @param boolean $cookieAuthUsed Cookie auth is used
- * @param string $blowfishSecret Blowfish secret
- * @param string $sServerAuthCfgMsg Message for server auth config
- * @param string $sSecurityInfoMsg Message for security information
- * @param boolean $blowfishSecretSet Blowfish secret set
- *
- * @return array
- */
- protected function performConfigChecksServers(
- $cookieAuthUsed, $blowfishSecret, $sServerAuthCfgMsg,
- $sSecurityInfoMsg, $blowfishSecretSet
- ) {
- $serverCnt = $this->cfg->getServerCount();
- for ($i = 1; $i <= $serverCnt; $i++) {
- $cookieAuthServer
- = ($this->cfg->getValue("Servers/$i/auth_type") == 'cookie');
- $cookieAuthUsed |= $cookieAuthServer;
- $serverName = $this->performConfigChecksServersGetServerName(
- $this->cfg->getServerName($i), $i
- );
- $serverName = htmlspecialchars($serverName);
- list($blowfishSecret, $blowfishSecretSet)
- = $this->performConfigChecksServersSetBlowfishSecret(
- $blowfishSecret, $cookieAuthServer, $blowfishSecretSet
- );
- //
- // $cfg['Servers'][$i]['ssl']
- // should be enabled if possible
- //
- if (!$this->cfg->getValue("Servers/$i/ssl")) {
- $title = PMA_lang(PMA_langName('Servers/1/ssl')) . " ($serverName)";
- PMA_messagesSet(
- 'notice',
- "Servers/$i/ssl",
- $title,
- __('You should use SSL connections if your database server supports it.')
- );
- }
- //
- // $cfg['Servers'][$i]['auth_type']
- // warn about full user credentials if 'auth_type' is 'config'
- //
- if ($this->cfg->getValue("Servers/$i/auth_type") == 'config'
- && $this->cfg->getValue("Servers/$i/user") != ''
- && $this->cfg->getValue("Servers/$i/password") != ''
- ) {
- $title = PMA_lang(PMA_langName('Servers/1/auth_type'))
- . " ($serverName)";
- PMA_messagesSet(
- 'notice',
- "Servers/$i/auth_type",
- $title,
- PMA_lang($sServerAuthCfgMsg, $i) . ' '
- . PMA_lang($sSecurityInfoMsg, $i)
- );
- }
- //
- // $cfg['Servers'][$i]['AllowRoot']
- // $cfg['Servers'][$i]['AllowNoPassword']
- // serious security flaw
- //
- if ($this->cfg->getValue("Servers/$i/AllowRoot")
- && $this->cfg->getValue("Servers/$i/AllowNoPassword")
- ) {
- $title = PMA_lang(PMA_langName('Servers/1/AllowNoPassword'))
- . " ($serverName)";
- PMA_messagesSet(
- 'notice',
- "Servers/$i/AllowNoPassword",
- $title,
- __('You allow for connecting to the server without a password.') . ' '
- . PMA_lang($sSecurityInfoMsg, $i)
- );
- }
- }
- return array($cookieAuthUsed, $blowfishSecret, $blowfishSecretSet);
- }
- /**
- * Set blowfish secret
- *
- * @param string $blowfishSecret Blowfish secret
- * @param boolean $cookieAuthServer Cookie auth is used
- * @param boolean $blowfishSecretSet Blowfish secret set
- *
- * @return array
- */
- protected function performConfigChecksServersSetBlowfishSecret(
- $blowfishSecret, $cookieAuthServer, $blowfishSecretSet
- ) {
- if ($cookieAuthServer && $blowfishSecret === null) {
- $blowfishSecret = uniqid('', true);
- $blowfishSecretSet = true;
- $this->cfg->set('blowfish_secret', $blowfishSecret);
- return array($blowfishSecret, $blowfishSecretSet);
- }
- return array($blowfishSecret, $blowfishSecretSet);
- }
- /**
- * Define server name
- *
- * @param string $serverName Server name
- * @param int $serverId Server id
- *
- * @return string Server name
- */
- protected function performConfigChecksServersGetServerName(
- $serverName, $serverId
- ) {
- if ($serverName == 'localhost') {
- $serverName .= " [$serverId]";
- return $serverName;
- }
- return $serverName;
- }
- /**
- * Perform config checks for zip part.
- *
- * @param string $sGZipDumpWarning Gzip dump warning
- * @param string $sBZipDumpWarning Bzip dump warning
- * @param string $sZipDumpImportWarn Zip dump import warning
- * @param string $sZipDumpExportWarn Zip dump export warning
- *
- * @return void
- */
- protected function performConfigChecksZips(
- $sGZipDumpWarning, $sBZipDumpWarning, $sZipDumpImportWarn,
- $sZipDumpExportWarn
- ) {
- $this->performConfigChecksServerGZipdump($sGZipDumpWarning);
- $this->performConfigChecksServerBZipdump($sBZipDumpWarning);
- $this->performConfigChecksServersZipdump(
- $sZipDumpImportWarn, $sZipDumpExportWarn
- );
- }
- /**
- * Perform config checks for zip part.
- *
- * @param string $sZipDumpImportWarn Zip dump import warning
- * @param string $sZipDumpExportWarn Zip dump export warning
- *
- * @return void
- */
- protected function performConfigChecksServersZipdump(
- $sZipDumpImportWarn, $sZipDumpExportWarn
- ) {
- //
- // $cfg['ZipDump']
- // requires zip_open in import
- //
- if ($this->cfg->getValue('ZipDump') && !@function_exists('zip_open')) {
- PMA_messagesSet(
- 'error',
- 'ZipDump_import',
- PMA_lang(PMA_langName('ZipDump')),
- PMA_lang($sZipDumpImportWarn, 'zip_open')
- );
- }
- //
- // $cfg['ZipDump']
- // requires gzcompress in export
- //
- if ($this->cfg->getValue('ZipDump') && !@function_exists('gzcompress')) {
- PMA_messagesSet(
- 'error',
- 'ZipDump_export',
- PMA_lang(PMA_langName('ZipDump')),
- PMA_lang($sZipDumpExportWarn, 'gzcompress')
- );
- }
- }
- /**
- * Check config of servers
- *
- * @param boolean $cookieAuthUsed Cookie auth is used
- * @param boolean $blowfishSecretSet Blowfish secret set
- * @param string $sBlowfishSecretMsg Blowfish secret message
- * @param string $blowfishSecret Blowfish secret
- *
- * @return array
- */
- protected function performConfigChecksCookieAuthUsed(
- $cookieAuthUsed, $blowfishSecretSet, $sBlowfishSecretMsg,
- $blowfishSecret
- ) {
- //
- // $cfg['blowfish_secret']
- // it's required for 'cookie' authentication
- //
- if ($cookieAuthUsed) {
- if ($blowfishSecretSet) {
- // 'cookie' auth used, blowfish_secret was generated
- PMA_messagesSet(
- 'notice',
- 'blowfish_secret_created',
- PMA_lang(PMA_langName('blowfish_secret')),
- PMA_lang($sBlowfishSecretMsg)
- );
- } else {
- $blowfishWarnings = array();
- // check length
- if (strlen($blowfishSecret) < 8) {
- // too short key
- $blowfishWarnings[] = __('Key is too short, it should have at least 8 characters.');
- }
- // check used characters
- $hasDigits = (bool)preg_match('/\d/', $blowfishSecret);
- $hasChars = (bool)preg_match('/\S/', $blowfishSecret);
- $hasNonword = (bool)preg_match('/\W/', $blowfishSecret);
- if (!$hasDigits || !$hasChars || !$hasNonword) {
- $blowfishWarnings[] = PMA_lang(__('Key should contain letters, numbers [em]and[/em] special characters.'));
- }
- if (!empty($blowfishWarnings)) {
- PMA_messagesSet(
- 'error',
- 'blowfish_warnings' . count($blowfishWarnings),
- PMA_lang(PMA_langName('blowfish_secret')),
- implode('<br />', $blowfishWarnings)
- );
- }
- }
- }
- }
- /**
- * Define all messages
- *
- * @return array
- */
- protected static function defineMessages()
- {
- $sAllowArbitraryServerWarn = __('This %soption%s should be disabled as it allows attackers to bruteforce login to any MySQL server. If you feel this is necessary, use %strusted proxies list%s. However, IP-based protection may not be reliable if your IP belongs to an ISP where thousands of users, including you, are connected to.');
- $sAllowArbitraryServerWarn = sprintf(
- $sAllowArbitraryServerWarn,
- '[a@?page=form&formset=Features#tab_Security]',
- '[/a]', '[a@?page=form&formset=Features#tab_Security]',
- '[/a]'
- );
- $sBlowfishSecretMsg = __('You didn\'t have blowfish secret set and have enabled [kbd]cookie[/kbd] authentication, so a key was automatically generated for you. It is used to encrypt cookies; you don\'t need to remember it.');
- $sBZipDumpWarning = __('%sBzip2 compression and decompression%s requires functions (%s) which are unavailable on this system.');
- $sBZipDumpWarning = sprintf(
- $sBZipDumpWarning,
- '[a@?page=form&formset=Features#tab_Import_export]',
- '[/a]', '%s'
- );
- $sDirectoryNotice = __('This value should be double checked to ensure that this directory is neither world accessible nor readable or writable by other users on your server.');
- $sForceSSLNotice = __('This %soption%s should be enabled if your web server supports it.');
- $sForceSSLNotice = sprintf(
- $sForceSSLNotice,
- '[a@?page=form&formset=Features#tab_Security]',
- '[/a]'
- );
- $sGZipDumpWarning = __('%sGZip compression and decompression%s requires functions (%s) which are unavailable on this system.');
- $sGZipDumpWarning = sprintf(
- $sGZipDumpWarning,
- '[a@?page=form&formset=Features#tab_Import_export]',
- '[/a]',
- '%s'
- );
- $sLoginCookieValidityWarn = __('%sLogin cookie validity%s greater than %ssession.gc_maxlifetime%s may cause random session invalidation (currently session.gc_maxlifetime is %d).');
- $sLoginCookieValidityWarn = sprintf(
- $sLoginCookieValidityWarn,
- '[a@?page=form&formset=Features#tab_Security]',
- '[/a]',
- '[a@' . PMA_getPHPDocLink(
- 'session.configuration.php#ini.session.gc-maxlifetime'
- ) . ']',
- '[/a]',
- ini_get('session.gc_maxlifetime')
- );
- $sLoginCookieValidityWarn2 = __('%sLogin cookie validity%s should be set to 1800 seconds (30 minutes) at most. Values larger than 1800 may pose a security risk such as impersonation.');
- $sLoginCookieValidityWarn2 = sprintf(
- $sLoginCookieValidityWarn2,
- '[a@?page=form&formset=Features#tab_Security]',
- '[/a]'
- );
- $sLoginCookieValidityWarn3 = __('If using [kbd]cookie[/kbd] authentication and %sLogin cookie store%s is not 0, %sLogin cookie validity%s must be set to a value less or equal to it.');
- $sLoginCookieValidityWarn3 = sprintf(
- $sLoginCookieValidityWarn3,
- '[a@?page=form&formset=Features#tab_Security]',
- '[/a]', '[a@?page=form&formset=Features#tab_Security]',
- '[/a]'
- );
- $sSecurityInfoMsg = __('If you feel this is necessary, use additional protection settings - %shost authentication%s settings and %strusted proxies list%s. However, IP-based protection may not be reliable if your IP belongs to an ISP where thousands of users, including you, are connected to.');
- $sSecurityInfoMsg = sprintf(
- $sSecurityInfoMsg,
- '[a@?page=servers&mode=edit&id=%1$d#tab_Server_config]',
- '[/a]',
- '[a@?page=form&formset=Features#tab_Security]',
- '[/a]'
- );
- $sServerAuthConfigMsg = __('You set the [kbd]config[/kbd] authentication type and included username and password for auto-login, which is not a desirable option for live hosts. Anyone who knows or guesses your phpMyAdmin URL can directly access your phpMyAdmin panel. Set %sauthentication type%s to [kbd]cookie[/kbd] or [kbd]http[/kbd].');
- $sServerAuthConfigMsg = sprintf(
- $sServerAuthConfigMsg,
- '[a@?page=servers&mode=edit&id=%1$d#tab_Server]',
- '[/a]'
- );
- $sZipDumpExportWarn = __('%sZip compression%s requires functions (%s) which are unavailable on this system.');
- $sZipDumpExportWarn = sprintf(
- $sZipDumpExportWarn,
- '[a@?page=form&formset=Features#tab_Import_export]',
- '[/a]',
- '%s'
- );
- $sZipDumpImportWarn = __('%sZip decompression%s requires functions (%s) which are unavailable on this system.');
- $sZipDumpImportWarn = sprintf(
- $sZipDumpImportWarn,
- '[a@?page=form&formset=Features#tab_Import_export]',
- '[/a]',
- '%s'
- );
- return array(
- $sAllowArbitraryServerWarn, $sBlowfishSecretMsg, $sBZipDumpWarning,
- $sDirectoryNotice, $sForceSSLNotice, $sGZipDumpWarning,
- $sLoginCookieValidityWarn, $sLoginCookieValidityWarn2,
- $sLoginCookieValidityWarn3, $sSecurityInfoMsg, $sServerAuthConfigMsg,
- $sZipDumpExportWarn, $sZipDumpImportWarn
- );
- }
- /**
- * Check configuration for login cookie
- *
- * @param string $sLoginCookieValidityWarn Warning 1 for login cookie validity
- * @param string $sLoginCookieValidityWarn2 Warning 2 for login cookie validity
- * @param string $sLoginCookieValidityWarn3 Warning 3 for login cookie validity
- *
- * @return void
- */
- protected function performConfigChecksLoginCookie(
- $sLoginCookieValidityWarn, $sLoginCookieValidityWarn2,
- $sLoginCookieValidityWarn3
- ) {
- //
- // $cfg['LoginCookieValidity']
- // value greater than session.gc_maxlifetime will cause
- // random session invalidation after that time
- $loginCookieValidity = $this->cfg->getValue('LoginCookieValidity');
- if ($loginCookieValidity > ini_get('session.gc_maxlifetime')
- ) {
- PMA_messagesSet(
- 'error',
- 'LoginCookieValidity',
- PMA_lang(PMA_langName('LoginCookieValidity')),
- PMA_lang($sLoginCookieValidityWarn)
- );
- }
- //
- // $cfg['LoginCookieValidity']
- // should be at most 1800 (30 min)
- //
- if ($loginCookieValidity > 1800) {
- PMA_messagesSet(
- 'notice',
- 'LoginCookieValidity',
- PMA_lang(PMA_langName('LoginCookieValidity')),
- PMA_lang($sLoginCookieValidityWarn2)
- );
- }
- //
- // $cfg['LoginCookieValidity']
- // $cfg['LoginCookieStore']
- // LoginCookieValidity must be less or equal to LoginCookieStore
- //
- if (($this->cfg->getValue('LoginCookieStore') != 0)
- && ($loginCookieValidity > $this->cfg->getValue('LoginCookieStore'))
- ) {
- PMA_messagesSet(
- 'error',
- 'LoginCookieValidity',
- PMA_lang(PMA_langName('LoginCookieValidity')),
- PMA_lang($sLoginCookieValidityWarn3)
- );
- }
- }
- /**
- * Check GZipDump configuration
- *
- * @param string $sBZipDumpWarn Warning for BZipDumpWarning
- *
- * @return void
- */
- protected function performConfigChecksServerBZipdump($sBZipDumpWarn)
- {
- //
- // $cfg['BZipDump']
- // requires bzip2 functions
- //
- if ($this->cfg->getValue('BZipDump')
- && (!@function_exists('bzopen') || !@function_exists('bzcompress'))
- ) {
- $functions = @function_exists('bzopen')
- ? '' :
- 'bzopen';
- $functions .= @function_exists('bzcompress')
- ? ''
- : ($functions ? ', ' : '') . 'bzcompress';
- PMA_messagesSet(
- 'error',
- 'BZipDump',
- PMA_lang(PMA_langName('BZipDump')),
- PMA_lang($sBZipDumpWarn, $functions)
- );
- }
- }
- /**
- * Check GZipDump configuration
- *
- * @param string $sGZipDumpWarn Warning for GZipDumpWarning
- *
- * @return void
- */
- protected function performConfigChecksServerGZipdump($sGZipDumpWarn)
- {
- //
- // $cfg['GZipDump']
- // requires zlib functions
- //
- if ($this->cfg->getValue('GZipDump')
- && (@!function_exists('gzopen') || @!function_exists('gzencode'))
- ) {
- PMA_messagesSet(
- 'error',
- 'GZipDump',
- PMA_lang(PMA_langName('GZipDump')),
- PMA_lang($sGZipDumpWarn, 'gzencode')
- );
- }
- }
- }
|