security.php 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694
  1. <?php
  2. /* Copyright (C) 2013-2022 Laurent Destailleur <eldy@users.sourceforge.net>
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 3 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. */
  17. /**
  18. * \file htdocs/admin/system/security.php
  19. * \brief Page to show Security information
  20. */
  21. // Load Dolibarr environment
  22. require '../../main.inc.php';
  23. require_once DOL_DOCUMENT_ROOT.'/core/lib/memory.lib.php';
  24. require_once DOL_DOCUMENT_ROOT.'/core/lib/date.lib.php';
  25. require_once DOL_DOCUMENT_ROOT.'/core/lib/files.lib.php';
  26. require_once DOL_DOCUMENT_ROOT.'/core/lib/geturl.lib.php';
  27. require_once DOL_DOCUMENT_ROOT.'/core/lib/functions2.lib.php';
  28. require_once DOL_DOCUMENT_ROOT.'/core/lib/security2.lib.php';
  29. require_once DOL_DOCUMENT_ROOT.'/core/class/events.class.php';
  30. // Load translation files required by the page
  31. $langs->loadLangs(array("install", "other", "admin", "errors"));
  32. if (!$user->admin) {
  33. accessforbidden();
  34. }
  35. if (GETPOST('action', 'aZ09') == 'donothing') {
  36. exit;
  37. }
  38. $execmethod = getDolGlobalInt('MAIN_EXEC_USE_POPEN', 1);
  39. /*
  40. * View
  41. */
  42. llxHeader();
  43. print load_fiche_titre($langs->trans("Security"), '', 'title_setup');
  44. print '<span class="opacitymedium">'.$langs->trans("YouMayFindSecurityAdviceHere", 'hhttps://wiki.dolibarr.org/index.php/Security_information').'</span>';
  45. print ' &nbsp; &nbsp; ';
  46. print '<a href="'.$_SERVER["PHP_SELF"].'">';
  47. print img_picto($langs->trans("Reload"), 'refresh').' ';
  48. print $langs->trans("Reload");
  49. print '</a>';
  50. print '<br>';
  51. print '<br>';
  52. print load_fiche_titre($langs->trans("PHPSetup"), '', 'folder');
  53. // Get version of PHP
  54. $phpversion = version_php();
  55. print "<strong>PHP</strong>: ".$langs->trans("Version").": ".$phpversion;
  56. if (function_exists('php_ini_loaded_file')) {
  57. $inipath = php_ini_loaded_file();
  58. print " - <strong>INI</strong>: ".$inipath;
  59. }
  60. print "<br>\n";
  61. // Get version of web server
  62. print "<br><strong>Web server - ".$langs->trans("Version")."</strong>: ".$_SERVER["SERVER_SOFTWARE"]."<br>\n";
  63. print '<strong>'.$langs->trans("DataRootServer")."</strong>: ".DOL_DATA_ROOT."<br>\n";
  64. // Web user group by default
  65. $labeluser = dol_getwebuser('user');
  66. $labelgroup = dol_getwebuser('group');
  67. if ($labeluser && $labelgroup) {
  68. print '<strong>'.$langs->trans("WebUserGroup")." (env vars)</strong> : ".$labeluser.':'.$labelgroup;
  69. if (function_exists('posix_geteuid') && function_exists('posix_getpwuid')) {
  70. $arrayofinfoofuser = posix_getpwuid(posix_geteuid());
  71. print ' <span class="opacitymedium">(POSIX '.$arrayofinfoofuser['name'].':'.$arrayofinfoofuser['gecos'].':'.$arrayofinfoofuser['dir'].':'.$arrayofinfoofuser['shell'].')</span><br>'."\n";
  72. }
  73. }
  74. // Web user group real (detected by 'id' external command)
  75. if (function_exists('exec')) {
  76. $arrayout = array(); $varout = 0;
  77. exec('id', $arrayout, $varout);
  78. if (empty($varout)) { // Test command is ok. Work only on Linux OS.
  79. print '<strong>'.$langs->trans("WebUserGroup")." (real, 'id' command)</strong> : ".join(',', $arrayout)."<br>\n";
  80. }
  81. }
  82. print '<br>';
  83. print "<strong>PHP session.use_strict_mode</strong> = ".(ini_get('session.use_strict_mode') ? '' : img_warning().' ').(ini_get('session.use_strict_mode') ? ini_get('session.use_strict_mode') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", '1').")</span><br>\n";
  84. print "<strong>PHP session.use_only_cookies</strong> = ".(ini_get('session.use_only_cookies') ? '' : img_warning().' ').(ini_get('session.use_only_cookies') ? ini_get('session.use_only_cookies') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", '1').")</span><br>\n";
  85. print "<strong>PHP session.cookie_httponly</strong> = ".(ini_get('session.cookie_httponly') ? '' : img_warning().' ').(ini_get('session.cookie_httponly') ? ini_get('session.cookie_httponly') : '').' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", '1').")</span><br>\n";
  86. print "<strong>PHP session.cookie_samesite</strong> = ".(ini_get('session.cookie_samesite') ? ini_get('session.cookie_samesite') : 'None');
  87. if (!ini_get('session.cookie_samesite') || ini_get('session.cookie_samesite') == 'Lax') {
  88. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", 'Lax').")</span>";
  89. } elseif (ini_get('session.cookie_samesite') == 'Strict') {
  90. print ' &nbsp; '.img_warning().' <span class="opacitymedium">'.$langs->trans("WarningPaypalPaymentNotCompatibleWithStrict")."</span>";
  91. }
  92. print "<br>\n";
  93. print "<strong>PHP open_basedir</strong> = ".(ini_get('open_basedir') ? ini_get('open_basedir') : yn(0).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("ARestrictedPath").', '.$langs->transnoentitiesnoconv("Example").': '.$_SERVER["DOCUMENT_ROOT"].','.DOL_DATA_ROOT).')</span>')."<br>\n";
  94. print "<strong>PHP short_open_tag</strong> = ".((empty(ini_get('short_open_tag')) || ini_get('short_open_tag') == 'Off') ? yn(0) : img_warning().' '.yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("No")).')</span>'."<br>\n";
  95. print "<strong>PHP allow_url_fopen</strong> = ".(ini_get('allow_url_fopen') ? img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' '.ini_get('allow_url_fopen') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("No")).")</span><br>\n";
  96. print "<strong>PHP allow_url_include</strong> = ".(ini_get('allow_url_include') ? img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' '.ini_get('allow_url_include') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("No")).")</span><br>\n";
  97. //print "<strong>PHP safe_mode</strong> = ".(ini_get('safe_mode') ? ini_get('safe_mode') : yn(0)).' &nbsp; <span class="opacitymedium">'.$langs->trans("Deprecated")." (removed in PHP 5.4)</span><br>\n";
  98. print "<strong>PHP disable_functions</strong> = ";
  99. $arrayoffunctionsdisabled = explode(',', ini_get('disable_functions'));
  100. $arrayoffunctionstodisable = explode(',', 'pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals');
  101. if ($execmethod == 1) {
  102. $arrayoffunctionstodisable2 = explode(',', 'passthru,shell_exec,system,proc_open,popen');
  103. $functiontokeep = 'exec';
  104. } else {
  105. $arrayoffunctionstodisable2 = explode(',', 'exec,passthru,shell_exec,system,proc_open');
  106. $functiontokeep = 'popen';
  107. }
  108. $i = 0;
  109. foreach ($arrayoffunctionsdisabled as $functionkey) {
  110. if ($i > 0) {
  111. print ', ';
  112. }
  113. print '<span class="opacitymedium">'.$functionkey.'</span>';
  114. $i++;
  115. }
  116. print "<br>\n";
  117. $todisabletext = '';
  118. $i = 0;
  119. foreach ($arrayoffunctionstodisable as $functiontodisable) {
  120. if (! in_array($functiontodisable, $arrayoffunctionsdisabled)) {
  121. if ($i > 0) {
  122. $todisabletext .= ', ';
  123. }
  124. $todisabletext .= img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' <span class="opacitymedium">'.$functiontodisable.'</span>';
  125. $i++;
  126. }
  127. }
  128. if ($todisabletext) {
  129. print $langs->trans("YouShouldDisablePHPFunctions").': '.$todisabletext;
  130. print '<br>';
  131. }
  132. $todisabletext = '';
  133. $i = 0;
  134. foreach ($arrayoffunctionstodisable2 as $functiontodisable) {
  135. if (! in_array($functiontodisable, $arrayoffunctionsdisabled)) {
  136. if ($i > 0) {
  137. $todisabletext .= ', ';
  138. }
  139. $todisabletext .= img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' <span class="opacitymedium">'.$functiontodisable.'</span>';
  140. $i++;
  141. }
  142. }
  143. if ($todisabletext) {
  144. print $langs->trans("IfCLINotRequiredYouShouldDisablePHPFunctions").': '.$todisabletext;
  145. print '<br>';
  146. }
  147. print $langs->trans("PHPFunctionsRequiredForCLI").': ';
  148. if (in_array($functiontokeep, $arrayoffunctionsdisabled)) {
  149. print img_picto($langs->trans("PHPFunctionsRequiredForCLI"), 'warning');
  150. }
  151. print '<span class="opacitymedium">'.$functiontokeep.'</span>';
  152. print '<br>';
  153. print '<br>';
  154. // XDebug
  155. print '<strong>'.$langs->trans("XDebug").'</strong>: ';
  156. $test = !function_exists('xdebug_is_enabled') && !extension_loaded('xdebug');
  157. if ($test) {
  158. print img_picto('', 'tick').' '.$langs->trans("NotInstalled").' - '.$langs->trans("NotRiskOfLeakWithThis");
  159. } else {
  160. print img_picto('', 'warning').' '.$langs->trans("ModuleActivatedMayExposeInformation", $langs->transnoentities("XDebug"));
  161. print ' - '.$langs->trans("MoreInformation").' <a href="'.DOL_URL_ROOT.'/admin/system/xdebug.php">XDebug admin page</a>';
  162. }
  163. print '<br>';
  164. // OS Permissions
  165. print '<br>';
  166. print '<br>';
  167. print '<br>';
  168. print load_fiche_titre($langs->trans("OSSetup").' - '.$langs->trans("PermissionsOnFiles"), '', 'folder');
  169. print '<strong>'.$langs->trans("PermissionsOnFilesInWebRoot").'</strong>: ';
  170. $arrayoffilesinroot = dol_dir_list(DOL_DOCUMENT_ROOT, 'all', 1, '', array('\/custom'), 'name', SORT_ASC, 4, 1, '', 1);
  171. $fileswithwritepermission = array();
  172. foreach ($arrayoffilesinroot as $fileinroot) {
  173. // Test if there is at least one write permission file. If yes, add the entry into array $fileswithwritepermission
  174. if (isset($fileinroot['perm']) && ($fileinroot['perm'] & 0222)) {
  175. $fileswithwritepermission[] = $fileinroot['relativename'];
  176. }
  177. }
  178. if (empty($fileswithwritepermission)) {
  179. print img_picto('', 'tick').' '.$langs->trans("NoWritableFilesFoundIntoRootDir");
  180. } else {
  181. print img_warning().' '.$langs->trans("SomeFilesOrDirInRootAreWritable");
  182. print '<br>'.$langs->trans("Example").': ';
  183. $i = 0;
  184. foreach ($fileswithwritepermission as $filewithwritepermission) {
  185. if ($i > 0) {
  186. print ', ';
  187. }
  188. print '<span class="opacitymedium">'.$filewithwritepermission.'</span>';
  189. if ($i > 20) {
  190. print ' ...';
  191. break;
  192. }
  193. $i++;
  194. }
  195. }
  196. print '<br>';
  197. print '<br>';
  198. print '<strong>'.$langs->trans("PermissionsOnFile", $conffile).'</strong>: '; // $conffile is defined into filefunc.inc.php
  199. $perms = fileperms($dolibarr_main_document_root.'/'.$conffile);
  200. if ($perms) {
  201. if (($perms & 0x0004) || ($perms & 0x0002)) {
  202. print img_warning().' '.$langs->trans("ConfFileIsReadableOrWritableByAnyUsers");
  203. // Web user group by default
  204. $labeluser = dol_getwebuser('user');
  205. $labelgroup = dol_getwebuser('group');
  206. print ' '.$langs->trans("User").': '.$labeluser.':'.$labelgroup;
  207. if (function_exists('posix_geteuid') && function_exists('posix_getpwuid')) {
  208. $arrayofinfoofuser = posix_getpwuid(posix_geteuid());
  209. print ' <span class="opacitymedium">(POSIX '.$arrayofinfoofuser['name'].':'.$arrayofinfoofuser['gecos'].':'.$arrayofinfoofuser['dir'].':'.$arrayofinfoofuser['shell'].')</span>';
  210. }
  211. } else {
  212. print img_picto('', 'tick');
  213. }
  214. } else {
  215. print img_warning().' '.$langs->trans("FailedToReadFile", $conffile);
  216. }
  217. print '<br>';
  218. print '<br>';
  219. $installlock = DOL_DATA_ROOT.'/install.lock';
  220. $upgradeunlock = DOL_DATA_ROOT.'/upgrade.unlock';
  221. $installmoduleslock = DOL_DATA_ROOT.'/installmodules.lock';
  222. // Is install (upgrade) locked
  223. print '<strong>'.$langs->trans("DolibarrSetup").'</strong>: ';
  224. if (file_exists($installlock)) {
  225. if (file_exists($upgradeunlock)) {
  226. print img_picto('', 'tick').' '.$langs->trans("InstallLockedBy", $installlock);
  227. } else {
  228. print img_picto('', 'tick').' '.$langs->trans("InstallAndUpgradeLockedBy", $installlock);
  229. }
  230. } else {
  231. print img_warning().' '.$langs->trans("WarningLockFileDoesNotExists", DOL_DATA_ROOT);
  232. }
  233. print '<br>';
  234. // Is upgrade unlocked
  235. if (file_exists($installlock)) { // If install not locked, no need to show this.
  236. if (file_exists($upgradeunlock)) {
  237. print '<strong>'.$langs->trans("DolibarrUpgrade").'</strong>: ';
  238. print img_warning().' '.$langs->trans("UpgradeHasBeenUnlocked", $upgradeunlock);
  239. print '<br>';
  240. }
  241. }
  242. // Is addon install locked ?
  243. print '<strong>'.$langs->trans("DolibarrAddonInstall").'</strong>: ';
  244. if (file_exists($installmoduleslock)) {
  245. print img_picto('', 'tick').' '.$langs->trans("InstallAndUpgradeLockedBy", $installmoduleslock);
  246. } else {
  247. print $langs->trans("InstallOfAddonIsNotBlocked", DOL_DATA_ROOT);
  248. }
  249. print '<br>';
  250. // File conf.php
  251. print '<br>';
  252. print '<br>';
  253. print '<br>';
  254. print load_fiche_titre($langs->trans("ConfigurationFile").' ('.$conffile.')', '', 'folder');
  255. print '<strong>$dolibarr_main_prod</strong>: '.($dolibarr_main_prod ? $dolibarr_main_prod : '0');
  256. if (empty($dolibarr_main_prod)) {
  257. print ' &nbsp; '.img_picto('', 'warning').' '.$langs->trans("IfYouAreOnAProductionSetThis", 1);
  258. }
  259. print '<br>';
  260. print '<strong>$dolibarr_nocsrfcheck</strong>: '.(empty($dolibarr_nocsrfcheck) ? '0' : $dolibarr_nocsrfcheck);
  261. if (!empty($dolibarr_nocsrfcheck)) {
  262. print ' &nbsp; '.img_picto('', 'warning').' '.$langs->trans("IfYouAreOnAProductionSetThis", 0);
  263. } else {
  264. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 0)</span>';
  265. }
  266. print '<br>';
  267. print '<strong>$dolibarr_main_restrict_ip</strong>: ';
  268. if (empty($dolibarr_main_restrict_ip)) {
  269. print $langs->trans("None");
  270. //print ' <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("IPsOfUsers")).')</span>';
  271. } else {
  272. print $dolibarr_main_restrict_ip;
  273. }
  274. print '<br>';
  275. print '<strong>$dolibarr_main_restrict_os_commands</strong>: ';
  276. if (empty($dolibarr_main_restrict_os_commands)) {
  277. print $langs->trans("None");
  278. } else {
  279. print $dolibarr_main_restrict_os_commands;
  280. }
  281. print ' <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", 'mysqldump, mysql, pg_dump, pgrestore, clamdscan').')</span>';
  282. print '<br>';
  283. if (empty($conf->global->SECURITY_DISABLE_TEST_ON_OBFUSCATED_CONF)) {
  284. print '<strong>$dolibarr_main_db_pass</strong>: ';
  285. if (!empty($dolibarr_main_db_pass) && empty($dolibarr_main_db_encrypted_pass)) {
  286. print img_picto('', 'warning').' '.$langs->trans("DatabasePasswordNotObfuscated").' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("SetOptionTo", $langs->transnoentitiesnoconv("MainDbPasswordFileConfEncrypted"), yn(1)).')</span>';
  287. //print ' <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("IPsOfUsers")).')</span>';
  288. } else {
  289. print img_picto('', 'tick').' '.$langs->trans("DatabasePasswordObfuscated");
  290. }
  291. print '<br>';
  292. }
  293. // Menu Home - Setup - Security
  294. print '<br>';
  295. print '<br>';
  296. print '<br>';
  297. print load_fiche_titre($langs->trans("Menu").' '.$langs->trans("SecuritySetup"), '', 'folder');
  298. print '<strong>'.$langs->trans("UseCaptchaCode").'</strong>: ';
  299. print empty($conf->global->MAIN_SECURITY_ENABLECAPTCHA) ? '' : img_picto('', 'tick').' ';
  300. print yn(empty($conf->global->MAIN_SECURITY_ENABLECAPTCHA) ? 0 : 1);
  301. print '<br>';
  302. print '<br>';
  303. $sessiontimeout = ini_get("session.gc_maxlifetime");
  304. if (empty($conf->global->MAIN_SESSION_TIMEOUT)) {
  305. $conf->global->MAIN_SESSION_TIMEOUT = $sessiontimeout;
  306. }
  307. print '<strong>'.$langs->trans("SessionTimeOut").'</strong>';
  308. if (ini_get("session.gc_probability") == 0) {
  309. print $form->textwithpicto('', $langs->trans("SessionsPurgedByExternalSystem", ini_get("session.gc_maxlifetime")));
  310. } else {
  311. print $form->textwithpicto('', $langs->trans("SessionExplanation", ini_get("session.gc_probability"), ini_get("session.gc_divisor"), ini_get("session.gc_maxlifetime")));
  312. }
  313. print ': '.getDolGlobalInt('MAIN_SESSION_TIMEOUT').' '.strtolower($langs->trans("Seconds"));
  314. print '<br><br>';
  315. print '<strong>'.$langs->trans("MaxNumberOfImagesInGetPost").'</strong>: ';
  316. print getDolGlobalInt('MAIN_SECURITY_MAX_IMG_IN_HTML_CONTENT').' '.strtolower($langs->trans("Images"));
  317. print '<br><br>';
  318. print '<strong>'.$langs->trans("MaxNumberOfPostOnPublicPagesByIP").'</strong>: ';
  319. print getDolGlobalInt('MAIN_SECURITY_MAX_POST_ON_PUBLIC_PAGES_BY_IP_ADDRESS', 200).' '.strtolower($langs->trans("Posts"));
  320. print '<br><br>';
  321. print '<strong>'.$langs->trans("MaxNumberOfAttachementOnForms").'</strong>: ';
  322. print getDolGlobalInt("MAIN_SECURITY_MAX_ATTACHMENT_ON_FORMS", 10).' '.strtolower($langs->trans("Files"));
  323. print '<br><br>';
  324. print '<strong>'.$langs->trans("DoNotStoreClearPassword").'</strong>: ';
  325. print empty($conf->global->DATABASE_PWD_ENCRYPTED) ? '' : img_picto('', 'tick').' ';
  326. print yn(empty($conf->global->DATABASE_PWD_ENCRYPTED) ? 0 : 1);
  327. if (empty($conf->global->DATABASE_PWD_ENCRYPTED)) {
  328. print ' <span class="opacitymedium">('.$langs->trans("Recommended").' '.yn(1).')</span>';
  329. }
  330. print '<br>';
  331. print '<br>';
  332. /* Already into section conf file */
  333. /*
  334. $usepassinconfencrypted = 0;
  335. global $dolibarr_main_db_pass, $dolibarr_main_db_encrypted_pass;
  336. if (preg_match('/crypted:/i', $dolibarr_main_db_pass) || !empty($dolibarr_main_db_encrypted_pass)) {
  337. $usepassinconfencrypted = 1;
  338. }
  339. print '<strong>'.$langs->trans("MainDbPasswordFileConfEncrypted").'</strong>: ';
  340. print $usepassinconfencrypted ? img_picto('', 'tick').' ' : img_warning().' ';
  341. print yn($usepassinconfencrypted);
  342. if (empty($usepassinconfencrypted)) {
  343. print ' <span class="opacitymedium">('.$langs->trans("Recommended").' '.yn(1).')</span>';
  344. }
  345. print '<br>';
  346. print '<br>';
  347. */
  348. /* Password length
  349. // Stored into $tabconf[0] if module generator is "Perso" or specific to the module generator.
  350. $tabConf = explode(";", getDolGlobalString('USER_PASSWORD_PATTERN'));
  351. print '<strong>'.$langs->trans("PasswordLength").'</strong>: ';
  352. print empty($conf->global->DATABASE_PWD_ENCRYPTED) ? '' : img_picto('', 'tick').' ';
  353. print yn(empty($conf->global->DATABASE_PWD_ENCRYPTED) ? 0 : 1);
  354. if (empty($conf->global->DATABASE_PWD_ENCRYPTED)) {
  355. print ' <span class="opacitymedium">('.$langs->trans("Recommended").' '.yn(1).')</span>';
  356. }
  357. print '<br>';
  358. print '<br>';
  359. */
  360. print '<strong>'.$langs->trans("AntivirusEnabledOnUpload").'</strong>: ';
  361. print empty($conf->global->MAIN_ANTIVIRUS_COMMAND) ? img_warning().' ' : img_picto('', 'tick').' ';
  362. print yn(empty($conf->global->MAIN_ANTIVIRUS_COMMAND) ? 0 : 1);
  363. if (empty($conf->global->MAIN_ANTIVIRUS_COMMAND)) {
  364. print ' - <span class="opacitymedium">'.$langs->trans("Recommended").': '.$langs->trans("DefinedAPathForAntivirusCommandIntoSetup", $langs->transnoentitiesnoconv("Home")." - ".$langs->transnoentitiesnoconv("Setup")." - ".$langs->transnoentitiesnoconv("Security")).'</span>';
  365. } else {
  366. print ' &nbsp; - '.$conf->global->MAIN_ANTIVIRUS_COMMAND;
  367. if (defined('MAIN_ANTIVIRUS_COMMAND') && !defined('MAIN_ANTIVIRUS_BYPASS_COMMAND_AND_PARAM')) {
  368. print ' - <span class="opacitymedium">'.$langs->trans("ValueIsForcedBySystem").'</span>';
  369. }
  370. }
  371. print '<br>';
  372. print '<br>';
  373. $umask = getDolGlobalString('MAIN_UMASK');
  374. print '<strong>'.$langs->trans("UMask").'</strong>: ';
  375. if (! in_array($umask, array('600', '660', '0600', '0660'))) {
  376. print img_warning().' ';
  377. }
  378. print $umask;
  379. if (! in_array($umask, array('600', '660', '0600', '0660'))) {
  380. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 0600 | 0660)</span>';
  381. }
  382. print '<br>';
  383. print '<br>';
  384. $securityevent = new Events($db);
  385. $eventstolog = $securityevent->eventstolog;
  386. print '<strong>'.$langs->trans("AuditedSecurityEvents").'</strong>: ';
  387. $out = '';
  388. if (!empty($eventstolog) && is_array($eventstolog)) {
  389. // Loop on each event type
  390. $i = 0;
  391. foreach ($eventstolog as $key => $arr) {
  392. if ($arr['id']) {
  393. $key = 'MAIN_LOGEVENTS_'.$arr['id'];
  394. $value = empty($conf->global->$key) ? '' : $conf->global->$key;
  395. if ($value) {
  396. if ($i > 0) {
  397. $out .= ', ';
  398. }
  399. $out .= '<span class="opacitymedium">'.$key.'</span>';
  400. $i++;
  401. }
  402. }
  403. }
  404. print $out;
  405. }
  406. if (empty($out)) {
  407. print img_warning().' '.$langs->trans("NoSecurityEventsAreAduited", $langs->transnoentities("Home").' - '.$langs->transnoentities("Setup").' - '.$langs->transnoentities("Security").' - '.$langs->transnoentities("Audit")).'<br>';
  408. }
  409. print '<br>';
  410. // Modules/Applications
  411. print '<br>';
  412. print '<br>';
  413. print '<br>';
  414. print load_fiche_titre($langs->trans("Modules"), '', 'folder');
  415. // Module log
  416. print '<strong>'.$langs->trans("Syslog").'</strong>: ';
  417. $test = isModEnabled('syslog');
  418. if (!$test) {
  419. print img_picto('', 'tick').' '.$langs->trans("NotInstalled").' - '.$langs->trans("NotRiskOfLeakWithThis");
  420. } else {
  421. if (getDolGlobalInt('SYSLOG_LEVEL') > LOG_NOTICE) {
  422. print img_picto('', 'warning').' '.$langs->trans("ModuleActivatedWithTooHighLogLevel", $langs->transnoentities("Syslog"));
  423. } else {
  424. print img_picto('', 'tick').' '.$langs->trans("ModuleSyslogActivatedButLevelNotTooVerbose", $langs->transnoentities("Syslog"), getDolGlobalInt('SYSLOG_LEVEL'));
  425. }
  426. //print ' '.$langs->trans("MoreInformation").' <a href="'.DOL_URL_ROOT.'/admin/system/xdebug.php'.'">XDebug admin page</a>';
  427. }
  428. print '<br>';
  429. print '<br>';
  430. // Module debugbar
  431. print '<strong>'.$langs->trans("DebugBar").'</strong>: ';
  432. $test = isModEnabled('debugbar');
  433. if (!$test) {
  434. print img_picto('', 'tick').' '.$langs->trans("NotInstalled").' - '.$langs->trans("NotRiskOfLeakWithThis");
  435. } else {
  436. print img_picto('', 'error').' '.$langs->trans("ModuleActivatedDoNotUseInProduction", $langs->transnoentities("DebugBar"));
  437. //print ' '.$langs->trans("MoreInformation").' <a href="'.DOL_URL_ROOT.'/admin/system/xdebug.php'.'">XDebug admin page</a>';
  438. }
  439. print '<br>';
  440. print '<br>';
  441. // Modules for Payments
  442. $test = isModEnabled('stripe');
  443. if ($test) {
  444. print '<strong>'.$langs->trans("Stripe").'</strong>: ';
  445. if (!getDolGlobalString('PAYMENT_SECURITY_TOKEN_UNIQUE')) {
  446. print img_picto('', 'error').' '.$langs->trans("OptionXShouldBeEnabledInModuleY", $langs->transnoentities("SecurityTokenIsUnique"), $langs->transnoentities("Stripe"));
  447. } else {
  448. print img_picto('', 'tick').' '.$langs->trans("OptionXIsCorrectlyEnabledInModuleY", $langs->transnoentities("SecurityTokenIsUnique"), $langs->transnoentities("Stripe"));
  449. }
  450. print '<br>';
  451. } else {
  452. $test = isModEnabled('paypal');
  453. if ($test) {
  454. print '<strong>'.$langs->trans("Paypal").'</strong>: ';
  455. if (!getDolGlobalString('PAYMENT_SECURITY_TOKEN_UNIQUE')) {
  456. print img_picto('', 'error').' '.$langs->trans("OptionXShouldBeEnabledInModuleY", $langs->transnoentities("SecurityTokenIsUnique"), $langs->transnoentities("Paypal"));
  457. } else {
  458. print img_picto('', 'tick').' '.$langs->trans("OptionXIsCorrectlyEnabledInModuleY", $langs->transnoentities("SecurityTokenIsUnique"), $langs->transnoentities("Paypal"));
  459. }
  460. print '<br>';
  461. }
  462. }
  463. // APIs
  464. print '<br>';
  465. print '<br>';
  466. print '<br>';
  467. print load_fiche_titre($langs->trans("API"), '', 'folder');
  468. if (!isModEnabled('api') && !isModEnabled('webservices')) {
  469. print $langs->trans("APIsAreNotEnabled");
  470. } else {
  471. if (isModEnabled('webservices')) {
  472. print $langs->trans('YouEnableDeprecatedWSAPIsUseRESTAPIsInstead')."<br>\n";
  473. print '<br>';
  474. }
  475. if (isModEnabled('api')) {
  476. print '<strong>API_ENDPOINT_RULES</strong> = '.getDolGlobalString('API_ENDPOINT_RULES', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Example").': login:0,users:0,setup:1,status:1,tickets:1,...)</span>')."<br>\n";
  477. print '<br>';
  478. }
  479. }
  480. print '<br><br>';
  481. print '<br>';
  482. print load_fiche_titre($langs->trans("OtherSetup"), '', 'folder');
  483. print '<strong>MAIN_ALLOW_SVG_FILES_AS_IMAGES</strong> = '.getDolGlobalString('MAIN_ALLOW_SVG_FILES_AS_IMAGES', '0').' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 0)</span><br>';
  484. print '<br>';
  485. print '<strong>MAIN_ALWAYS_CREATE_LOCK_AFTER_LAST_UPGRADE</strong> = '.getDolGlobalString('MAIN_ALWAYS_CREATE_LOCK_AFTER_LAST_UPGRADE', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 1)</span><br>';
  486. print '<br>';
  487. //print '<strong>'.$langs->trans("PasswordEncryption").'</strong>: ';
  488. print '<strong>MAIN_SECURITY_HASH_ALGO</strong> = '.getDolGlobalString('MAIN_SECURITY_HASH_ALGO', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>')." &nbsp; ";
  489. if (empty($conf->global->MAIN_SECURITY_HASH_ALGO)) {
  490. print '<span class="opacitymedium"> &nbsp; &nbsp; If unset: \'md5\'</span>';
  491. }
  492. if ($conf->global->MAIN_SECURITY_HASH_ALGO != 'password_hash') {
  493. print '<br><strong>MAIN_SECURITY_SALT</strong> = '.getDolGlobalString('MAIN_SECURITY_SALT', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').'<br>';
  494. } else {
  495. print '<span class="opacitymedium">('.$langs->trans("Recommended").': password_hash)</span>';
  496. print '<br>';
  497. }
  498. if ($conf->global->MAIN_SECURITY_HASH_ALGO != 'password_hash') {
  499. print '<div class="info">The recommanded value for MAIN_SECURITY_HASH_ALGO is now \'password_hash\' but setting it now will make ALL existing passwords of all users not valid, so update is not possible.<br>';
  500. print 'If you really want to switch, you must:<br>';
  501. print '- Go on home - setup - other and add constant MAIN_SECURITY_HASH_ALGO to value \'password_hash\'<br>';
  502. print '- In same session, WITHOUT LOGGING OUT, go into your admin user record and set a new password<br>';
  503. print '- You can now logout and login with this new password. You must now reset password of all other users.<br>';
  504. print '</div><br>';
  505. }
  506. print '<br>';
  507. print '<strong>MAIN_SECURITY_ANTI_SSRF_SERVER_IP</strong> = '.getDolGlobalString('MAIN_SECURITY_ANTI_SSRF_SERVER_IP', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span> &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': List of static IPs of server separated with coma - '.$langs->trans("Note").': common loopback ip like 127.*.*.*, [::1] are already added)</span>')."<br>";
  508. print '<br>';
  509. print '<strong>MAIN_SECURITY_CSRF_WITH_TOKEN</strong> = '.getDolGlobalString('MAIN_SECURITY_CSRF_WITH_TOKEN', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 2)</span>'."<br>";
  510. print '<br>';
  511. print '<br>';
  512. print '<br>';
  513. print load_fiche_titre($langs->trans("OtherSetup").' ('.$langs->trans("Experimental").')', '', 'folder');
  514. print '<strong>MAIN_EXEC_USE_POPEN</strong> = ';
  515. if (empty($conf->global->MAIN_EXEC_USE_POPEN)) {
  516. print '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>';
  517. } else {
  518. print $conf->global->MAIN_EXEC_USE_POPEN;
  519. }
  520. if ($execmethod == 1) {
  521. print '<span class="opacitymedium"> &nbsp; &nbsp; "exec" PHP method will be used for shell commands';
  522. print ' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 1)';
  523. print '</span>';
  524. }
  525. if ($execmethod == 2) {
  526. print '<span class="opacitymedium"> &nbsp; &nbsp; "popen" PHP method will be used for shell commands';
  527. print ' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 1)';
  528. print '</span>';
  529. }
  530. print '<br>';
  531. print '<br>';
  532. print '<strong>MAIN_SECURITY_MAXFILESIZE_DOWNLOADED</strong> = '.getDolGlobalString('MAIN_SECURITY_MAXFILESIZE_DOWNLOADED', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': 100000000)</span>')."<br>";
  533. print '<br>';
  534. print '<strong>MAIN_RESTRICTHTML_ONLY_VALID_HTML</strong> = '.getDolGlobalString('MAIN_RESTRICTHTML_ONLY_VALID_HTML', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': 1)</span>')."<br>";
  535. print '<br>';
  536. print '<strong>MAIN_RESTRICTHTML_REMOVE_ALSO_BAD_ATTRIBUTES</strong> = '.getDolGlobalString('MAIN_RESTRICTHTML_REMOVE_ALSO_BAD_ATTRIBUTES', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': 1)</span>')."<br>";
  537. print '<br>';
  538. print '<strong>MAIN_DISALLOW_EXT_URL_INTO_DESCRIPTIONS</strong> = '.getDolGlobalString('MAIN_DISALLOW_EXT_URL_INTO_DESCRIPTIONS', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 0)</span>')."<br>";
  539. print '<br>';
  540. print '<strong>MAIN_ALLOW_SVG_FILES_AS_EXTERNAL_LINKS</strong> = '.getDolGlobalString('MAIN_ALLOW_SVG_FILES_AS_EXTERNAL_LINKS', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 0)</span>')."<br>";
  541. print '<br>';
  542. // MAIN_ALLOW_LOCAL_LINKS_AS_EXTERNAL_LINKS
  543. print '<strong>MAIN_SECURITY_CSRF_TOKEN_RENEWAL_ON_EACH_CALL</strong> = '.getDolGlobalString('MAIN_SECURITY_CSRF_TOKEN_RENEWAL_ON_EACH_CALL', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 0)</span>')."<br>";
  544. print '<br>';
  545. print '<strong>MAIN_DOCUMENT_IS_OUTSIDE_WEBROOT_SO_NOEXE_NOT_REQUIRED</strong> = '.getDolGlobalString('MAIN_DOCUMENT_IS_OUTSIDE_WEBROOT_SO_NOEXE_NOT_REQUIRED', '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 0)</span>')."<br>";
  546. print '<br>';
  547. $examplecsprule = "frame-ancestors 'self'; img-src * data:; font-src *; default-src 'self' 'unsafe-inline' 'unsafe-eval' *.paypal.com *.stripe.com *.google.com *.googleapis.com *.google-analytics.com *.googletagmanager.com;";
  548. print '<strong>MAIN_SECURITY_FORCECSPRO</strong> = '.getDolGlobalString('MAIN_SECURITY_FORCECSPRO', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").': "'.$examplecsprule.'")</span><br>';
  549. print '<br>';
  550. $examplecsprule = "frame-ancestors 'self'; img-src * data:; font-src *; default-src 'self' 'unsafe-inline' 'unsafe-eval' *.paypal.com *.stripe.com *.google.com *.googleapis.com *.google-analytics.com *.googletagmanager.com;";
  551. print '<strong>MAIN_SECURITY_FORCECSP</strong> = '.getDolGlobalString('MAIN_SECURITY_FORCECSP', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").': "'.$examplecsprule.'")</span><br>';
  552. print '<br>';
  553. print '<strong>MAIN_SECURITY_FORCERP</strong> = '.getDolGlobalString('MAIN_SECURITY_FORCERP', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or")." \"same-origin\" so browser doesn't send any referrer when going into another web site domain)</span><br>";
  554. print '<br>';
  555. print '<strong>WEBSITE_MAIN_SECURITY_FORCECSPRO</strong> = '.getDolGlobalString('WEBSITE_MAIN_SECURITY_FORCECSPRO', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>');
  556. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"frame-ancestors 'self'; default-src 'self' 'unsafe-inline'; style-src https://cdnjs.cloudflare.com *.googleapis.com; script-src *.transifex.com *.google-analytics.com *.googletagmanager.com; object-src https://youtube.com; frame-src https://youtube.com; img-src * data:;\")</span><br>";
  557. print '<br>';
  558. print '<strong>WEBSITE_MAIN_SECURITY_FORCECSP</strong> = '.getDolGlobalString('WEBSITE_MAIN_SECURITY_FORCECSP', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>');
  559. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"frame-ancestors 'self'; default-src 'self' 'unsafe-inline'; style-src https://cdnjs.cloudflare.com *.googleapis.com; script-src *.transifex.com *.google-analytics.com *.googletagmanager.com; object-src https://youtube.com; frame-src https://youtube.com; img-src * data:;\")</span><br>";
  560. print '<br>';
  561. print '<strong>WEBSITE_MAIN_SECURITY_FORCERP</strong> = '.getDolGlobalString('WEBSITE_MAIN_SECURITY_FORCERP', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or")." \"strict-origin-when-cross-origin\")</span><br>";
  562. print '<br>';
  563. print '<strong>WEBSITE_MAIN_SECURITY_FORCESTS</strong> = '.getDolGlobalString('>WEBSITE_MAIN_SECURITY_FORCESTS', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"max-age=31536000; includeSubDomains\")</span><br>";
  564. print '<br>';
  565. print '<strong>WEBSITE_MAIN_SECURITY_FORCEPP</strong> = '.getDolGlobalString('WEBSITE_MAIN_SECURITY_FORCEPP', '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>').' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"camera: 'none'; microphone: 'none';\")</span><br>";
  566. print '<br>';
  567. print '<br>';
  568. print load_fiche_titre($langs->trans("LimitsAndMitigation"), '', 'folder');
  569. print '<span class="opacitymedium">';
  570. print 'For a higher security, we also recommend to implement limits and mitigation on number of endpoints per minutes for the following URL'."<br>";
  571. print '</span>';
  572. print '<br>';
  573. $urlexamplebase = 'https://github.com/Dolibarr/dolibarr/blob/develop/dev/setup/fail2ban/filter.d/';
  574. print '- Login process (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'web-dolibarr-rulesbruteforce.conf">fail2ban example on GitHub</a>)<br>';
  575. print '- '.DOL_URL_ROOT.'/passwordforgotten.php (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'web-dolibarr-rulespassforgotten.conf">fail2ban example on GitHub</a>)<br>';
  576. print '- '.DOL_URL_ROOT.'/public/* (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'web-dolibarr-limitpublic.conf">fail2ban example on GitHub</a>)<br>';
  577. print '<br>';
  578. $urlexamplebase = 'https://github.com/Dolibarr/dolibarr/blob/develop/dev/setup/apache/';
  579. print '- You can also protect the application using a HTTP Basic authentication layer (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'virtualhost">apache2 virtualhost example on GitHub</a>)<br>';
  580. // End of page
  581. llxFooter();
  582. $db->close();