link_auth.go 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. package handler
  2. import (
  3. "crypto/md5"
  4. "encoding/xml"
  5. "fmt"
  6. "io"
  7. "net"
  8. "net/http"
  9. "net/http/httputil"
  10. "strings"
  11. "text/template"
  12. "github.com/bjdgyc/anylink/base"
  13. "github.com/bjdgyc/anylink/dbdata"
  14. "github.com/bjdgyc/anylink/sessdata"
  15. )
  16. var profileHash = ""
  17. func LinkAuth(w http.ResponseWriter, r *http.Request) {
  18. // TODO 调试信息输出
  19. if base.GetLogLevel() == base.LogLevelTrace {
  20. hd, _ := httputil.DumpRequest(r, true)
  21. base.Trace("LinkAuth: ", string(hd))
  22. }
  23. // 判断anyconnect客户端
  24. userAgent := strings.ToLower(r.UserAgent())
  25. xAggregateAuth := r.Header.Get("X-Aggregate-Auth")
  26. xTranscendVersion := r.Header.Get("X-Transcend-Version")
  27. if !((strings.Contains(userAgent, "anyconnect") || strings.Contains(userAgent, "openconnect") || strings.Contains(userAgent, "anylink")) &&
  28. xAggregateAuth == "1" && xTranscendVersion == "1") {
  29. w.WriteHeader(http.StatusForbidden)
  30. fmt.Fprintf(w, "error request")
  31. return
  32. }
  33. body, err := io.ReadAll(r.Body)
  34. if err != nil {
  35. w.WriteHeader(http.StatusBadRequest)
  36. return
  37. }
  38. defer r.Body.Close()
  39. cr := ClientRequest{}
  40. err = xml.Unmarshal(body, &cr)
  41. if err != nil {
  42. w.WriteHeader(http.StatusBadRequest)
  43. return
  44. }
  45. // fmt.Printf("%+v \n", cr)
  46. setCommonHeader(w)
  47. if cr.Type == "logout" {
  48. // 退出删除session信息
  49. if cr.SessionToken != "" {
  50. sessdata.DelSessByStoken(cr.SessionToken)
  51. }
  52. w.WriteHeader(http.StatusOK)
  53. return
  54. }
  55. if cr.Type == "init" {
  56. w.WriteHeader(http.StatusOK)
  57. data := RequestData{Group: cr.GroupSelect, Groups: dbdata.GetGroupNamesNormal()}
  58. tplRequest(tpl_request, w, data)
  59. return
  60. }
  61. // 登陆参数判断
  62. if cr.Type != "auth-reply" {
  63. w.WriteHeader(http.StatusBadRequest)
  64. return
  65. }
  66. // 用户活动日志
  67. ua := dbdata.UserActLog{
  68. Username: cr.Auth.Username,
  69. GroupName: cr.GroupSelect,
  70. RemoteAddr: r.RemoteAddr,
  71. Status: dbdata.UserAuthSuccess,
  72. DeviceType: cr.DeviceId.DeviceType,
  73. PlatformVersion: cr.DeviceId.PlatformVersion,
  74. }
  75. // TODO 用户密码校验
  76. err = dbdata.CheckUser(cr.Auth.Username, cr.Auth.Password, cr.GroupSelect)
  77. if err != nil {
  78. base.Warn(err)
  79. ua.Info = err.Error()
  80. ua.Status = dbdata.UserAuthFail
  81. dbdata.UserActLogIns.Add(ua, userAgent)
  82. w.WriteHeader(http.StatusOK)
  83. data := RequestData{Group: cr.GroupSelect, Groups: dbdata.GetGroupNamesNormal(), Error: "用户名或密码错误"}
  84. if base.Cfg.DisplayError {
  85. data.Error = err.Error()
  86. }
  87. tplRequest(tpl_request, w, data)
  88. return
  89. }
  90. dbdata.UserActLogIns.Add(ua, userAgent)
  91. // if !ok {
  92. // w.WriteHeader(http.StatusOK)
  93. // data := RequestData{Group: cr.GroupSelect, Groups: base.Cfg.UserGroups, Error: "请先激活用户"}
  94. // tplRequest(tpl_request, w, data)
  95. // return
  96. // }
  97. // 创建新的session信息
  98. sess := sessdata.NewSession("")
  99. sess.Username = cr.Auth.Username
  100. sess.Group = cr.GroupSelect
  101. oriMac := cr.MacAddressList.MacAddress
  102. sess.UniqueIdGlobal = cr.DeviceId.UniqueIdGlobal
  103. sess.UserAgent = userAgent
  104. sess.DeviceType = ua.DeviceType
  105. sess.PlatformVersion = ua.PlatformVersion
  106. sess.RemoteAddr = r.RemoteAddr
  107. // 获取客户端mac地址
  108. sess.UniqueMac = true
  109. macHw, err := net.ParseMAC(oriMac)
  110. if err != nil {
  111. var sum [16]byte
  112. if sess.UniqueIdGlobal != "" {
  113. sum = md5.Sum([]byte(sess.UniqueIdGlobal))
  114. } else {
  115. sum = md5.Sum([]byte(sess.Token))
  116. sess.UniqueMac = false
  117. }
  118. macHw = sum[0:5] // 5个byte
  119. macHw = append([]byte{0x02}, macHw...)
  120. sess.MacAddr = macHw.String()
  121. }
  122. sess.MacHw = macHw
  123. // 统一macAddr的格式
  124. sess.MacAddr = macHw.String()
  125. other := &dbdata.SettingOther{}
  126. _ = dbdata.SettingGet(other)
  127. rd := RequestData{SessionId: sess.Sid, SessionToken: sess.Sid + "@" + sess.Token,
  128. Banner: other.Banner, ProfileHash: profileHash}
  129. w.WriteHeader(http.StatusOK)
  130. tplRequest(tpl_complete, w, rd)
  131. base.Debug("login", cr.Auth.Username, userAgent)
  132. }
  133. const (
  134. tpl_request = iota
  135. tpl_complete
  136. )
  137. func tplRequest(typ int, w io.Writer, data RequestData) {
  138. if typ == tpl_request {
  139. t, _ := template.New("auth_request").Parse(auth_request)
  140. _ = t.Execute(w, data)
  141. return
  142. }
  143. if strings.Contains(data.Banner, "\n") {
  144. // 替换xml文件的换行符
  145. data.Banner = strings.ReplaceAll(data.Banner, "\n", "
")
  146. }
  147. t, _ := template.New("auth_complete").Parse(auth_complete)
  148. _ = t.Execute(w, data)
  149. }
  150. // 设置输出信息
  151. type RequestData struct {
  152. Groups []string
  153. Group string
  154. Error string
  155. // complete
  156. SessionId string
  157. SessionToken string
  158. Banner string
  159. ProfileHash string
  160. }
  161. var auth_request = `<?xml version="1.0" encoding="UTF-8"?>
  162. <config-auth client="vpn" type="auth-request" aggregate-auth-version="2">
  163. <opaque is-for="sg">
  164. <tunnel-group>{{.Group}}</tunnel-group>
  165. <group-alias>{{.Group}}</group-alias>
  166. <aggauth-handle>168179266</aggauth-handle>
  167. <config-hash>1595829378234</config-hash>
  168. <auth-method>multiple-cert</auth-method>
  169. <auth-method>single-sign-on-v2</auth-method>
  170. </opaque>
  171. <auth id="main">
  172. <title>Login</title>
  173. <message>请输入你的用户名和密码</message>
  174. <banner></banner>
  175. {{if .Error}}
  176. <error id="88" param1="{{.Error}}" param2="">登陆失败: %s</error>
  177. {{end}}
  178. <form>
  179. <input type="text" name="username" label="Username:"></input>
  180. <input type="password" name="password" label="Password:"></input>
  181. <select name="group_list" label="GROUP:">
  182. {{range $v := .Groups}}
  183. <option {{if eq $v $.Group}} selected="true"{{end}}>{{$v}}</option>
  184. {{end}}
  185. </select>
  186. </form>
  187. </auth>
  188. </config-auth>
  189. `
  190. var auth_complete = `<?xml version="1.0" encoding="UTF-8"?>
  191. <config-auth client="vpn" type="complete" aggregate-auth-version="2">
  192. <session-id>{{.SessionId}}</session-id>
  193. <session-token>{{.SessionToken}}</session-token>
  194. <auth id="success">
  195. <banner>{{.Banner}}</banner>
  196. <message id="0" param1="" param2=""></message>
  197. </auth>
  198. <capabilities>
  199. <crypto-supported>ssl-dhe</crypto-supported>
  200. </capabilities>
  201. <config client="vpn" type="private">
  202. <vpn-base-config>
  203. <server-cert-hash>240B97A685B2BFA66AD699B90AAC49EA66495D69</server-cert-hash>
  204. </vpn-base-config>
  205. <opaque is-for="vpn-client"></opaque>
  206. <vpn-profile-manifest>
  207. <vpn rev="1.0">
  208. <file type="profile" service-type="user">
  209. <uri>/profile.xml</uri>
  210. <hash type="sha1">{{.ProfileHash}}</hash>
  211. </file>
  212. </vpn>
  213. </vpn-profile-manifest>
  214. </config>
  215. </config-auth>
  216. `
  217. // var auth_profile = `<?xml version="1.0" encoding="UTF-8"?>
  218. // <AnyConnectProfile xmlns="http://schemas.xmlsoap.org/encoding/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://schemas.xmlsoap.org/encoding/ AnyConnectProfile.xsd">
  219. // <ClientInitialization>
  220. // <UseStartBeforeLogon UserControllable="false">false</UseStartBeforeLogon>
  221. // <StrictCertificateTrust>false</StrictCertificateTrust>
  222. // <RestrictPreferenceCaching>false</RestrictPreferenceCaching>
  223. // <RestrictTunnelProtocols>IPSec</RestrictTunnelProtocols>
  224. // <BypassDownloader>true</BypassDownloader>
  225. // <WindowsVPNEstablishment>AllowRemoteUsers</WindowsVPNEstablishment>
  226. // <CertEnrollmentPin>pinAllowed</CertEnrollmentPin>
  227. // <CertificateMatch>
  228. // <KeyUsage>
  229. // <MatchKey>Digital_Signature</MatchKey>
  230. // </KeyUsage>
  231. // <ExtendedKeyUsage>
  232. // <ExtendedMatchKey>ClientAuth</ExtendedMatchKey>
  233. // </ExtendedKeyUsage>
  234. // </CertificateMatch>
  235. // <BackupServerList>
  236. // <HostAddress>localhost</HostAddress>
  237. // </BackupServerList>
  238. // </ClientInitialization>
  239. // <ServerList>
  240. // <HostEntry>
  241. // <HostName>VPN Server</HostName>
  242. // <HostAddress>localhost</HostAddress>
  243. // </HostEntry>
  244. // </ServerList>
  245. //
  246. // </AnyConnectProfile>
  247. // `
  248. var ds_domains_xml = `
  249. <?xml version="1.0" encoding="UTF-8"?>
  250. <config-auth client="vpn" type="complete" aggregate-auth-version="2">
  251. <config client="vpn" type="private">
  252. <opaque is-for="vpn-client">
  253. <custom-attr>
  254. {{if .DsExcludeDomains}}
  255. <dynamic-split-exclude-domains><![CDATA[{{.DsExcludeDomains}},]]></dynamic-split-exclude-domains>
  256. {{else if .DsIncludeDomains}}
  257. <dynamic-split-include-domains><![CDATA[{{.DsIncludeDomains}}]]></dynamic-split-include-domains>
  258. {{end}}
  259. </custom-attr>
  260. </opaque>
  261. </config>
  262. </config-auth>
  263. `