friendica/mod/dfrn_notify.php

321 lines
9.6 KiB
PHP
Raw Normal View History

2010-07-05 05:45:56 +02:00
<?php
require_once('library/simplepie/simplepie.inc');
2010-07-19 05:49:10 +02:00
require_once('include/items.php');
2011-06-14 04:06:49 +02:00
require_once('include/event.php');
require_once('library/defuse/php-encryption-1.2.1/Crypto.php');
2011-06-14 04:06:49 +02:00
2010-07-16 10:26:42 +02:00
function dfrn_notify_post(&$a) {
logger(__function__, LOGGER_TRACE);
2010-12-01 03:32:34 +01:00
$dfrn_id = ((x($_POST,'dfrn_id')) ? notags(trim($_POST['dfrn_id'])) : '');
$dfrn_version = ((x($_POST,'dfrn_version')) ? (float) $_POST['dfrn_version'] : 2.0);
$challenge = ((x($_POST,'challenge')) ? notags(trim($_POST['challenge'])) : '');
$data = ((x($_POST,'data')) ? $_POST['data'] : '');
$key = ((x($_POST,'key')) ? $_POST['key'] : '');
$rino_remote = ((x($_POST,'rino')) ? intval($_POST['rino']) : 0);
2011-01-25 12:57:10 +01:00
$dissolve = ((x($_POST,'dissolve')) ? intval($_POST['dissolve']) : 0);
2011-04-11 03:38:55 +02:00
$perm = ((x($_POST,'perm')) ? notags(trim($_POST['perm'])) : 'r');
2012-03-15 04:36:23 +01:00
$ssl_policy = ((x($_POST,'ssl_policy')) ? notags(trim($_POST['ssl_policy'])): 'none');
$page = ((x($_POST,'page')) ? intval($_POST['page']) : 0);
2011-04-11 03:38:55 +02:00
2012-05-30 07:57:15 +02:00
$forum = (($page == 1) ? 1 : 0);
$prv = (($page == 2) ? 1 : 0);
2011-04-11 03:38:55 +02:00
$writable = (-1);
if($dfrn_version >= 2.21) {
$writable = (($perm === 'rw') ? 1 : 0);
}
2010-09-13 06:25:37 +02:00
$direction = (-1);
if(strpos($dfrn_id,':') == 1) {
$direction = intval(substr($dfrn_id,0,1));
$dfrn_id = substr($dfrn_id,2);
}
2010-07-05 05:45:56 +02:00
$r = q("SELECT * FROM `challenge` WHERE `dfrn-id` = '%s' AND `challenge` = '%s' LIMIT 1",
dbesc($dfrn_id),
dbesc($challenge)
);
2010-11-24 00:55:11 +01:00
if(! count($r)) {
logger('dfrn_notify: could not match challenge to dfrn_id ' . $dfrn_id . ' challenge=' . $challenge);
2010-07-05 05:45:56 +02:00
xml_status(3);
2010-11-24 00:55:11 +01:00
}
2010-07-05 05:45:56 +02:00
2013-11-02 10:49:44 +01:00
$r = q("DELETE FROM `challenge` WHERE `dfrn-id` = '%s' AND `challenge` = '%s'",
2010-07-05 05:45:56 +02:00
dbesc($dfrn_id),
dbesc($challenge)
);
2010-07-16 10:26:42 +02:00
// find the local user who owns this relationship.
2010-09-13 06:25:37 +02:00
$sql_extra = '';
switch($direction) {
case (-1):
$sql_extra = sprintf(" AND ( `issued-id` = '%s' OR `dfrn-id` = '%s' ) ", dbesc($dfrn_id), dbesc($dfrn_id));
2010-09-13 06:25:37 +02:00
break;
case 0:
$sql_extra = sprintf(" AND `issued-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
break;
case 1:
$sql_extra = sprintf(" AND `dfrn-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
break;
default:
xml_status(3);
break; // NOTREACHED
}
2013-11-02 10:49:44 +01:00
// be careful - $importer will contain both the contact information for the contact
// sending us the post, and also the user information for the person receiving it.
// since they are mixed together, it is easy to get them confused.
2010-09-13 06:25:37 +02:00
2013-11-02 10:49:44 +01:00
$r = q("SELECT `contact`.*, `contact`.`uid` AS `importer_uid`,
`contact`.`pubkey` AS `cpubkey`,
`contact`.`prvkey` AS `cprvkey`,
`contact`.`thumb` AS `thumb`,
`contact`.`url` as `url`,
`contact`.`name` as `senderName`,
2013-11-02 10:49:44 +01:00
`user`.*
FROM `contact`
LEFT JOIN `user` ON `contact`.`uid` = `user`.`uid`
WHERE `contact`.`blocked` = 0 AND `contact`.`pending` = 0
AND `user`.`nickname` = '%s' AND `user`.`account_expired` = 0 AND `user`.`account_removed` = 0 $sql_extra LIMIT 1",
dbesc($a->argv[1])
2010-07-16 10:26:42 +02:00
);
2010-08-17 07:05:04 +02:00
2010-07-28 07:32:21 +02:00
if(! count($r)) {
2010-11-24 00:55:11 +01:00
logger('dfrn_notify: contact not found for dfrn_id ' . $dfrn_id);
2010-07-16 10:26:42 +02:00
xml_status(3);
//NOTREACHED
2010-07-28 07:32:21 +02:00
}
2010-07-16 10:26:42 +02:00
2013-11-02 10:49:44 +01:00
// $importer in this case contains the contact record for the remote contact joined with the user record of our user.
2011-01-25 12:57:10 +01:00
2010-07-16 10:26:42 +02:00
$importer = $r[0];
2012-05-30 07:57:15 +02:00
if((($writable != (-1)) && ($writable != $importer['writable'])) || ($importer['forum'] != $forum) || ($importer['prv'] != $prv)) {
2013-11-02 10:49:44 +01:00
q("UPDATE `contact` SET `writable` = %d, forum = %d, prv = %d WHERE `id` = %d",
intval(($writable == (-1)) ? $importer['writable'] : $writable),
2012-05-30 07:57:15 +02:00
intval($forum),
intval($prv),
2011-04-11 04:29:21 +02:00
intval($importer['id'])
);
if($writable != (-1))
$importer['writable'] = $writable;
$importer['forum'] = $page;
2011-04-11 04:29:21 +02:00
}
2012-03-15 04:36:23 +01:00
// if contact's ssl policy changed, update our links
2012-03-15 04:36:23 +01:00
fix_contact_ssl_policy($importer,$ssl_policy);
2012-03-29 02:21:56 +02:00
2010-11-24 00:55:11 +01:00
logger('dfrn_notify: received notify from ' . $importer['name'] . ' for ' . $importer['username']);
logger('dfrn_notify: data: ' . $data, LOGGER_DATA);
if($dissolve == 1) {
/**
* Relationship is dissolved permanently
*/
2013-11-02 10:49:44 +01:00
require_once('include/Contact.php');
contact_remove($importer['id']);
logger('relationship dissolved : ' . $importer['name'] . ' dissolved ' . $importer['username']);
xml_status(0);
}
2012-03-29 02:21:56 +02:00
// If we are setup as a soapbox we aren't accepting input from this person
if($importer['page-flags'] == PAGE_SOAPBOX)
xml_status(0);
2010-12-01 03:32:34 +01:00
if(strlen($key)) {
$rawkey = hex2bin(trim($key));
logger('rino: md5 raw key: ' . md5($rawkey));
$final_key = '';
2011-02-02 07:45:46 +01:00
if($dfrn_version >= 2.1) {
if((($importer['duplex']) && strlen($importer['cprvkey'])) || (! strlen($importer['cpubkey']))) {
openssl_private_decrypt($rawkey,$final_key,$importer['cprvkey']);
}
else {
openssl_public_decrypt($rawkey,$final_key,$importer['cpubkey']);
}
2010-12-01 03:32:34 +01:00
}
else {
if((($importer['duplex']) && strlen($importer['cpubkey'])) || (! strlen($importer['cprvkey']))) {
openssl_public_decrypt($rawkey,$final_key,$importer['cpubkey']);
}
else {
openssl_private_decrypt($rawkey,$final_key,$importer['cprvkey']);
}
2010-12-01 03:32:34 +01:00
}
#logger('rino: received key : ' . $final_key);
switch($rino_remote) {
case 0:
case 1:
// we got a key. old code send only the key, without RINO version.
// we assume RINO 1 if key and no RINO version
$data = aes_decrypt(hex2bin($data),$final_key);
break;
case 2:
try {
$data = Crypto::decrypt(hex2bin($data),$final_key);
} catch (InvalidCiphertext $ex) { // VERY IMPORTANT
// Either:
// 1. The ciphertext was modified by the attacker,
// 2. The key is wrong, or
// 3. $ciphertext is not a valid ciphertext or was corrupted.
// Assume the worst.
logger('The ciphertext has been tampered with!');
xml_status(0,'The ciphertext has been tampered with!');
} catch (Ex\CryptoTestFailed $ex) {
logger('Cannot safely perform dencryption');
xml_status(0,'CryptoTestFailed');
} catch (Ex\CannotPerformOperation $ex) {
logger('Cannot safely perform decryption');
xml_status(0,'Cannot safely perform decryption');
}
break;
default:
logger("rino: invalid sent verision '$rino_remote'");
xml_status(0);
}
2010-12-01 03:32:34 +01:00
logger('rino: decrypted data: ' . $data, LOGGER_DATA);
}
2011-01-25 12:57:10 +01:00
2011-10-07 04:10:57 +02:00
$ret = local_delivery($importer,$data);
xml_status($ret);
2010-07-16 10:26:42 +02:00
// NOTREACHED
2010-07-05 05:45:56 +02:00
}
function dfrn_notify_content(&$a) {
if(x($_GET,'dfrn_id')) {
2010-09-13 06:25:37 +02:00
// initial communication from external contact, $direction is their direction.
// If this is a duplex communication, ours will be the opposite.
$dfrn_id = notags(trim($_GET['dfrn_id']));
$dfrn_version = (float) $_GET['dfrn_version'];
$type = "";
$last_update = "";
2010-11-24 00:55:11 +01:00
logger('dfrn_notify: new notification dfrn_id=' . $dfrn_id);
2010-09-13 06:25:37 +02:00
$direction = (-1);
if(strpos($dfrn_id,':') == 1) {
$direction = intval(substr($dfrn_id,0,1));
$dfrn_id = substr($dfrn_id,2);
}
2010-07-05 05:45:56 +02:00
$hash = random_string();
$status = 0;
$r = q("DELETE FROM `challenge` WHERE `expire` < " . intval(time()));
$r = q("INSERT INTO `challenge` ( `challenge`, `dfrn-id`, `expire` , `type`, `last_update` )
VALUES( '%s', '%s', %d, '%s', '%s' ) ",
2010-07-05 05:45:56 +02:00
dbesc($hash),
2010-09-13 06:25:37 +02:00
dbesc($dfrn_id),
intval(time() + 90 ),
dbesc($type),
dbesc($last_update)
2010-07-05 05:45:56 +02:00
);
2011-09-19 12:30:59 +02:00
logger('dfrn_notify: challenge=' . $hash, LOGGER_DEBUG );
2010-09-13 06:25:37 +02:00
$sql_extra = '';
switch($direction) {
case (-1):
$sql_extra = sprintf(" AND ( `issued-id` = '%s' OR `dfrn-id` = '%s' ) ", dbesc($dfrn_id), dbesc($dfrn_id));
2010-09-13 06:25:37 +02:00
$my_id = $dfrn_id;
break;
case 0:
$sql_extra = sprintf(" AND `issued-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
$my_id = '1:' . $dfrn_id;
break;
case 1:
$sql_extra = sprintf(" AND `dfrn-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
$my_id = '0:' . $dfrn_id;
break;
default:
$status = 1;
break; // NOTREACHED
}
2013-11-02 10:49:44 +01:00
$r = q("SELECT `contact`.*, `user`.`nickname`, `user`.`page-flags` FROM `contact` LEFT JOIN `user` ON `user`.`uid` = `contact`.`uid`
WHERE `contact`.`blocked` = 0 AND `contact`.`pending` = 0 AND `user`.`nickname` = '%s'
AND `user`.`account_expired` = 0 AND `user`.`account_removed` = 0 $sql_extra LIMIT 1",
dbesc($a->argv[1])
);
2010-09-13 06:25:37 +02:00
2010-09-02 09:31:11 +02:00
if(! count($r))
2010-07-05 05:45:56 +02:00
$status = 1;
$challenge = '';
$encrypted_id = '';
2010-09-13 06:25:37 +02:00
$id_str = $my_id . '.' . mt_rand(1000,9999);
2011-09-20 06:24:16 +02:00
$prv_key = trim($r[0]['prvkey']);
$pub_key = trim($r[0]['pubkey']);
$dplx = intval($r[0]['duplex']);
if((($dplx) && (strlen($prv_key))) || ((strlen($prv_key)) && (!(strlen($pub_key))))) {
openssl_private_encrypt($hash,$challenge,$prv_key);
openssl_private_encrypt($id_str,$encrypted_id,$prv_key);
}
2011-09-21 14:43:26 +02:00
elseif(strlen($pub_key)) {
2011-09-20 06:24:16 +02:00
openssl_public_encrypt($hash,$challenge,$pub_key);
openssl_public_encrypt($id_str,$encrypted_id,$pub_key);
}
2011-09-21 14:43:26 +02:00
else
$status = 1;
2010-09-02 09:31:11 +02:00
$challenge = bin2hex($challenge);
$encrypted_id = bin2hex($encrypted_id);
$rino = get_config('system','rino_encrypt');
2010-12-01 22:39:00 +01:00
if(! $rino){
2010-12-01 22:39:00 +01:00
$rino = 0;
} else {
$rino = 2;
}
2012-03-29 02:21:56 +02:00
if((($r[0]['rel']) && ($r[0]['rel'] != CONTACT_IS_SHARING)) || ($r[0]['page-flags'] == PAGE_COMMUNITY)) {
$perm = 'rw';
}
else {
$perm = 'r';
}
2010-12-01 22:39:00 +01:00
header("Content-type: text/xml");
2013-11-02 10:49:44 +01:00
echo '<?xml version="1.0" encoding="UTF-8"?>' . "\r\n"
. '<dfrn_notify>' . "\r\n"
. "\t" . '<status>' . $status . '</status>' . "\r\n"
. "\t" . '<dfrn_version>' . DFRN_PROTOCOL_VERSION . '</dfrn_version>' . "\r\n"
2012-03-29 02:21:56 +02:00
. "\t" . '<rino>' . $rino . '</rino>' . "\r\n"
2013-11-02 10:49:44 +01:00
. "\t" . '<perm>' . $perm . '</perm>' . "\r\n"
. "\t" . '<dfrn_id>' . $encrypted_id . '</dfrn_id>' . "\r\n"
. "\t" . '<challenge>' . $challenge . '</challenge>' . "\r\n"
. '</dfrn_notify>' . "\r\n" ;
killme();
2010-07-05 05:45:56 +02:00
}
}