security.php 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627
  1. <?php
  2. /* Copyright (C) 2013-2022 Laurent Destailleur <eldy@users.sourceforge.net>
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 3 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. */
  17. /**
  18. * \file htdocs/admin/system/security.php
  19. * \brief Page to show Security information
  20. */
  21. // Load Dolibarr environment
  22. require '../../main.inc.php';
  23. require_once DOL_DOCUMENT_ROOT.'/core/lib/memory.lib.php';
  24. require_once DOL_DOCUMENT_ROOT.'/core/lib/date.lib.php';
  25. require_once DOL_DOCUMENT_ROOT.'/core/lib/files.lib.php';
  26. require_once DOL_DOCUMENT_ROOT.'/core/lib/geturl.lib.php';
  27. require_once DOL_DOCUMENT_ROOT.'/core/lib/functions2.lib.php';
  28. require_once DOL_DOCUMENT_ROOT.'/core/lib/security2.lib.php';
  29. require_once DOL_DOCUMENT_ROOT.'/core/class/events.class.php';
  30. // Load translation files required by the page
  31. $langs->loadLangs(array("install", "other", "admin", "errors"));
  32. if (!$user->admin) {
  33. accessforbidden();
  34. }
  35. if (GETPOST('action', 'aZ09') == 'donothing') {
  36. exit;
  37. }
  38. $execmethod = getDolGlobalInt('MAIN_EXEC_USE_POPEN', 1);
  39. /*
  40. * View
  41. */
  42. llxHeader();
  43. print load_fiche_titre($langs->trans("Security"), '', 'title_setup');
  44. print '<span class="opacitymedium">'.$langs->trans("YouMayFindSecurityAdviceHere", 'hhttps://wiki.dolibarr.org/index.php/Security_information').'</span>';
  45. print ' &nbsp; &nbsp; ';
  46. print '<a href="'.$_SERVER["PHP_SELF"].'">';
  47. print img_picto($langs->trans("Reload"), 'refresh').' ';
  48. print $langs->trans("Reload");
  49. print '</a>';
  50. print '<br>';
  51. print '<br>';
  52. print load_fiche_titre($langs->trans("PHPSetup"), '', 'folder');
  53. // Get version of PHP
  54. $phpversion = version_php();
  55. print "<strong>PHP</strong>: ".$langs->trans("Version").": ".$phpversion;
  56. if (function_exists('php_ini_loaded_file')) {
  57. $inipath = php_ini_loaded_file();
  58. print " - <strong>INI</strong>: ".$inipath;
  59. }
  60. print "<br>\n";
  61. // Get version of web server
  62. print "<br><strong>Web server - ".$langs->trans("Version")."</strong>: ".$_SERVER["SERVER_SOFTWARE"]."<br>\n";
  63. print '<strong>'.$langs->trans("DataRootServer")."</strong>: ".DOL_DATA_ROOT."<br>\n";
  64. // Web user group by default
  65. $labeluser = dol_getwebuser('user');
  66. $labelgroup = dol_getwebuser('group');
  67. if ($labeluser && $labelgroup) {
  68. print '<strong>'.$langs->trans("WebUserGroup")." (env vars)</strong> : ".$labeluser.':'.$labelgroup;
  69. if (function_exists('posix_geteuid') && function_exists('posix_getpwuid')) {
  70. $arrayofinfoofuser = posix_getpwuid(posix_geteuid());
  71. print ' <span class="opacitymedium">(POSIX '.$arrayofinfoofuser['name'].':'.$arrayofinfoofuser['gecos'].':'.$arrayofinfoofuser['dir'].':'.$arrayofinfoofuser['shell'].')</span><br>'."\n";
  72. }
  73. }
  74. // Web user group real (detected by 'id' external command)
  75. if (function_exists('exec')) {
  76. $arrayout = array(); $varout = 0;
  77. exec('id', $arrayout, $varout);
  78. if (empty($varout)) { // Test command is ok. Work only on Linux OS.
  79. print '<strong>'.$langs->trans("WebUserGroup")." (real, 'id' command)</strong> : ".join(',', $arrayout)."<br>\n";
  80. }
  81. }
  82. print '<br>';
  83. print "<strong>PHP session.use_strict_mode</strong> = ".(ini_get('session.use_strict_mode') ? '' : img_warning().' ').(ini_get('session.use_strict_mode') ? ini_get('session.use_strict_mode') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", '1').")</span><br>\n";
  84. print "<strong>PHP session.use_only_cookies</strong> = ".(ini_get('session.use_only_cookies') ? '' : img_warning().' ').(ini_get('session.use_only_cookies') ? ini_get('session.use_only_cookies') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", '1').")</span><br>\n";
  85. print "<strong>PHP session.cookie_httponly</strong> = ".(ini_get('session.cookie_httponly') ? '' : img_warning().' ').(ini_get('session.cookie_httponly') ? ini_get('session.cookie_httponly') : '').' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", '1').")</span><br>\n";
  86. print "<strong>PHP session.cookie_samesite</strong> = ".(ini_get('session.cookie_samesite') ? ini_get('session.cookie_samesite') : 'None');
  87. if (!ini_get('session.cookie_samesite') || ini_get('session.cookie_samesite') == 'Lax') {
  88. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", 'Lax').")</span>";
  89. } elseif (ini_get('session.cookie_samesite') == 'Strict') {
  90. print ' &nbsp; '.img_warning().' <span class="opacitymedium">'.$langs->trans("WarningPaypalPaymentNotCompatibleWithStrict")."</span>";
  91. }
  92. print "<br>\n";
  93. print "<strong>PHP open_basedir</strong> = ".(ini_get('open_basedir') ? ini_get('open_basedir') : yn(0).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("ARestrictedPath").', '.$langs->transnoentitiesnoconv("Example").': '.$_SERVER["DOCUMENT_ROOT"].','.DOL_DATA_ROOT).')</span>')."<br>\n";
  94. print "<strong>PHP short_open_tag</strong> = ".((empty(ini_get('short_open_tag')) || ini_get('short_open_tag') == 'Off') ? yn(0) : img_warning().' '.yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("No")).')</span>'."<br>\n";
  95. print "<strong>PHP allow_url_fopen</strong> = ".(ini_get('allow_url_fopen') ? img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' '.ini_get('allow_url_fopen') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("No")).")</span><br>\n";
  96. print "<strong>PHP allow_url_include</strong> = ".(ini_get('allow_url_include') ? img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' '.ini_get('allow_url_include') : yn(0)).' &nbsp; <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("No")).")</span><br>\n";
  97. //print "<strong>PHP safe_mode</strong> = ".(ini_get('safe_mode') ? ini_get('safe_mode') : yn(0)).' &nbsp; <span class="opacitymedium">'.$langs->trans("Deprecated")." (removed in PHP 5.4)</span><br>\n";
  98. print "<strong>PHP disable_functions</strong> = ";
  99. $arrayoffunctionsdisabled = explode(',', ini_get('disable_functions'));
  100. $arrayoffunctionstodisable = explode(',', 'pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals');
  101. if ($execmethod == 1) {
  102. $arrayoffunctionstodisable2 = explode(',', 'passthru,shell_exec,system,proc_open,popen');
  103. $functiontokeep = 'exec';
  104. } else {
  105. $arrayoffunctionstodisable2 = explode(',', 'exec,passthru,shell_exec,system,proc_open');
  106. $functiontokeep = 'popen';
  107. }
  108. $i = 0;
  109. foreach ($arrayoffunctionsdisabled as $functionkey) {
  110. if ($i > 0) {
  111. print ', ';
  112. }
  113. print '<span class="opacitymedium">'.$functionkey.'</span>';
  114. $i++;
  115. }
  116. print "<br>\n";
  117. $todisabletext = '';
  118. $i = 0;
  119. foreach ($arrayoffunctionstodisable as $functiontodisable) {
  120. if (! in_array($functiontodisable, $arrayoffunctionsdisabled)) {
  121. if ($i > 0) {
  122. $todisabletext .= ', ';
  123. }
  124. $todisabletext .= img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' <span class="opacitymedium">'.$functiontodisable.'</span>';
  125. $i++;
  126. }
  127. }
  128. if ($todisabletext) {
  129. print $langs->trans("YouShouldDisablePHPFunctions").': '.$todisabletext;
  130. print '<br>';
  131. }
  132. $todisabletext = '';
  133. $i = 0;
  134. foreach ($arrayoffunctionstodisable2 as $functiontodisable) {
  135. if (! in_array($functiontodisable, $arrayoffunctionsdisabled)) {
  136. if ($i > 0) {
  137. $todisabletext .= ', ';
  138. }
  139. $todisabletext .= img_picto($langs->trans("YouShouldSetThisToOff"), 'warning').' <span class="opacitymedium">'.$functiontodisable.'</span>';
  140. $i++;
  141. }
  142. }
  143. if ($todisabletext) {
  144. print $langs->trans("IfCLINotRequiredYouShouldDisablePHPFunctions").': '.$todisabletext;
  145. print '<br>';
  146. }
  147. print $langs->trans("PHPFunctionsRequiredForCLI").': ';
  148. if (in_array($functiontokeep, $arrayoffunctionsdisabled)) {
  149. print img_picto($langs->trans("PHPFunctionsRequiredForCLI"), 'warning');
  150. }
  151. print '<span class="opacitymedium">'.$functiontokeep.'</span>';
  152. print '<br>';
  153. print '<br>';
  154. // XDebug
  155. print '<strong>'.$langs->trans("XDebug").'</strong>: ';
  156. $test = !function_exists('xdebug_is_enabled') && !extension_loaded('xdebug');
  157. if ($test) {
  158. print img_picto('', 'tick.png').' '.$langs->trans("NotInstalled").' - '.$langs->trans("NotRiskOfLeakWithThis");
  159. } else {
  160. print img_picto('', 'warning').' '.$langs->trans("ModuleActivatedMayExposeInformation", $langs->transnoentities("XDebug"));
  161. print ' - '.$langs->trans("MoreInformation").' <a href="'.DOL_URL_ROOT.'/admin/system/xdebug.php">XDebug admin page</a>';
  162. }
  163. print '<br>';
  164. // OS Permissions
  165. print '<br>';
  166. print '<br>';
  167. print '<br>';
  168. print load_fiche_titre($langs->trans("OSSetup").' - '.$langs->trans("PermissionsOnFiles"), '', 'folder');
  169. print '<strong>'.$langs->trans("PermissionsOnFilesInWebRoot").'</strong>: ';
  170. $arrayoffilesinroot = dol_dir_list(DOL_DOCUMENT_ROOT, 'all', 1, '', array('\/custom'), 'name', SORT_ASC, 4, 1, '', 1);
  171. $fileswithwritepermission = array();
  172. foreach ($arrayoffilesinroot as $fileinroot) {
  173. // Test if there is at least one write permission file. If yes, add the entry into array $fileswithwritepermission
  174. if (isset($fileinroot['perm']) && ($fileinroot['perm'] & 0222)) {
  175. $fileswithwritepermission[] = $fileinroot['relativename'];
  176. }
  177. }
  178. if (empty($fileswithwritepermission)) {
  179. print img_picto('', 'tick').' '.$langs->trans("NoWritableFilesFoundIntoRootDir");
  180. } else {
  181. print img_warning().' '.$langs->trans("SomeFilesOrDirInRootAreWritable");
  182. print '<br>'.$langs->trans("Example").': ';
  183. $i = 0;
  184. foreach ($fileswithwritepermission as $filewithwritepermission) {
  185. if ($i > 0) {
  186. print ', ';
  187. }
  188. print '<span class="opacitymedium">'.$filewithwritepermission.'</span>';
  189. if ($i > 20) {
  190. print ' ...';
  191. break;
  192. }
  193. $i++;
  194. }
  195. }
  196. print '<br>';
  197. print '<br>';
  198. print '<strong>'.$langs->trans("PermissionsOnFile", $conffile).'</strong>: '; // $conffile is defined into filefunc.inc.php
  199. $perms = fileperms($dolibarr_main_document_root.'/'.$conffile);
  200. if ($perms) {
  201. if (($perms & 0x0004) || ($perms & 0x0002)) {
  202. print img_warning().' '.$langs->trans("ConfFileIsReadableOrWritableByAnyUsers");
  203. // Web user group by default
  204. $labeluser = dol_getwebuser('user');
  205. $labelgroup = dol_getwebuser('group');
  206. print ' '.$langs->trans("User").': '.$labeluser.':'.$labelgroup;
  207. if (function_exists('posix_geteuid') && function_exists('posix_getpwuid')) {
  208. $arrayofinfoofuser = posix_getpwuid(posix_geteuid());
  209. print ' <span class="opacitymedium">(POSIX '.$arrayofinfoofuser['name'].':'.$arrayofinfoofuser['gecos'].':'.$arrayofinfoofuser['dir'].':'.$arrayofinfoofuser['shell'].')</span>';
  210. }
  211. } else {
  212. print img_picto('', 'tick');
  213. }
  214. } else {
  215. print img_warning().' '.$langs->trans("FailedToReadFile", $conffile);
  216. }
  217. print '<br>';
  218. print '<br>';
  219. $installlock = DOL_DATA_ROOT.'/install.lock';
  220. print '<strong>'.$langs->trans("DolibarrSetup").'</strong>: ';
  221. if (file_exists($installlock)) {
  222. print img_picto('', 'tick').' '.$langs->trans("InstallAndUpgradeLockedBy", $installlock);
  223. } else {
  224. print img_warning().' '.$langs->trans("WarningLockFileDoesNotExists", DOL_DATA_ROOT);
  225. }
  226. print '<br>';
  227. // File conf.php
  228. print '<br>';
  229. print '<br>';
  230. print '<br>';
  231. print load_fiche_titre($langs->trans("ConfigurationFile").' ('.$conffile.')', '', 'folder');
  232. print '<strong>$dolibarr_main_prod</strong>: '.($dolibarr_main_prod ? $dolibarr_main_prod : '0');
  233. if (empty($dolibarr_main_prod)) {
  234. print ' &nbsp; '.img_picto('', 'warning').' '.$langs->trans("IfYouAreOnAProductionSetThis", 1);
  235. }
  236. print '<br>';
  237. print '<strong>$dolibarr_nocsrfcheck</strong>: '.(empty($dolibarr_nocsrfcheck) ? '0' : $dolibarr_nocsrfcheck);
  238. if (!empty($dolibarr_nocsrfcheck)) {
  239. print ' &nbsp; '.img_picto('', 'warning').' '.$langs->trans("IfYouAreOnAProductionSetThis", 0);
  240. } else {
  241. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 0)</span>';
  242. }
  243. print '<br>';
  244. print '<strong>$dolibarr_main_restrict_ip</strong>: ';
  245. if (empty($dolibarr_main_restrict_ip)) {
  246. print $langs->trans("None");
  247. //print ' <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("IPsOfUsers")).')</span>';
  248. } else {
  249. print $dolibarr_main_restrict_ip;
  250. }
  251. print '<br>';
  252. print '<strong>$dolibarr_main_restrict_os_commands</strong>: ';
  253. if (empty($dolibarr_main_restrict_os_commands)) {
  254. print $langs->trans("None");
  255. } else {
  256. print $dolibarr_main_restrict_os_commands;
  257. }
  258. print ' <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", 'mysqldump, mysql, pg_dump, pgrestore').')</span>';
  259. print '<br>';
  260. if (empty($conf->global->SECURITY_DISABLE_TEST_ON_OBFUSCATED_CONF)) {
  261. print '<strong>$dolibarr_main_db_pass</strong>: ';
  262. if (!empty($dolibarr_main_db_pass) && empty($dolibarr_main_db_encrypted_pass)) {
  263. print img_picto('', 'warning').' '.$langs->trans("DatabasePasswordNotObfuscated").' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("SetOptionTo", $langs->transnoentitiesnoconv("MainDbPasswordFileConfEncrypted"), yn(1)).')</span>';
  264. //print ' <span class="opacitymedium">('.$langs->trans("RecommendedValueIs", $langs->transnoentitiesnoconv("IPsOfUsers")).')</span>';
  265. } else {
  266. print img_picto('', 'tick').' '.$langs->trans("DatabasePasswordObfuscated");
  267. }
  268. print '<br>';
  269. }
  270. // Menu Home - Setup - Security
  271. print '<br>';
  272. print '<br>';
  273. print '<br>';
  274. print load_fiche_titre($langs->trans("Menu").' '.$langs->trans("SecuritySetup"), '', 'folder');
  275. print '<strong>'.$langs->trans("UseCaptchaCode").'</strong>: ';
  276. print empty($conf->global->MAIN_SECURITY_ENABLECAPTCHA) ? '' : img_picto('', 'tick').' ';
  277. print yn(empty($conf->global->MAIN_SECURITY_ENABLECAPTCHA) ? 0 : 1);
  278. print '<br>';
  279. print '<br>';
  280. $sessiontimeout = ini_get("session.gc_maxlifetime");
  281. if (empty($conf->global->MAIN_SESSION_TIMEOUT)) {
  282. $conf->global->MAIN_SESSION_TIMEOUT = $sessiontimeout;
  283. }
  284. print '<strong>'.$langs->trans("SessionTimeOut").'</strong>';
  285. if (ini_get("session.gc_probability") == 0) {
  286. print $form->textwithpicto('', $langs->trans("SessionsPurgedByExternalSystem", ini_get("session.gc_maxlifetime")));
  287. } else {
  288. print $form->textwithpicto('', $langs->trans("SessionExplanation", ini_get("session.gc_probability"), ini_get("session.gc_divisor"), ini_get("session.gc_maxlifetime")));
  289. }
  290. print ': '.getDolGlobalInt('MAIN_SESSION_TIMEOUT').' '.strtolower($langs->trans("Seconds"));
  291. print '<br><br>';
  292. print '<strong>'.$langs->trans("MaxNumberOfImagesInGetPost").'</strong>: ';
  293. print getDolGlobalInt('MAIN_SECURITY_MAX_IMG_IN_HTML_CONTENT').' '.strtolower($langs->trans("Images"));
  294. print '<br><br>';
  295. print '<strong>'.$langs->trans("MaxNumberOfPostOnPublicPagesByIP").'</strong>: ';
  296. print getDolGlobalInt('MAIN_SECURITY_MAX_POST_ON_PUBLIC_PAGES_BY_IP_ADDRESS', 200).' '.strtolower($langs->trans("Posts"));
  297. print '<br><br>';
  298. print '<strong>'.$langs->trans("MaxNumberOfAttachementOnForms").'</strong>: ';
  299. print getDolGlobalInt("MAIN_SECURITY_MAX_ATTACHMENT_ON_FORMS", 10).' '.strtolower($langs->trans("Files"));
  300. print '<br><br>';
  301. print '<strong>'.$langs->trans("DoNotStoreClearPassword").'</strong>: ';
  302. print empty($conf->global->DATABASE_PWD_ENCRYPTED) ? '' : img_picto('', 'tick').' ';
  303. print yn(empty($conf->global->DATABASE_PWD_ENCRYPTED) ? 0 : 1);
  304. if (empty($conf->global->DATABASE_PWD_ENCRYPTED)) {
  305. print ' <span class="opacitymedium">('.$langs->trans("Recommended").' '.yn(1).')</span>';
  306. }
  307. print '<br>';
  308. print '<br>';
  309. /* Already into section conf file */
  310. /*
  311. $usepassinconfencrypted = 0;
  312. global $dolibarr_main_db_pass, $dolibarr_main_db_encrypted_pass;
  313. if (preg_match('/crypted:/i', $dolibarr_main_db_pass) || !empty($dolibarr_main_db_encrypted_pass)) {
  314. $usepassinconfencrypted = 1;
  315. }
  316. print '<strong>'.$langs->trans("MainDbPasswordFileConfEncrypted").'</strong>: ';
  317. print $usepassinconfencrypted ? img_picto('', 'tick').' ' : img_warning().' ';
  318. print yn($usepassinconfencrypted);
  319. if (empty($usepassinconfencrypted)) {
  320. print ' <span class="opacitymedium">('.$langs->trans("Recommended").' '.yn(1).')</span>';
  321. }
  322. print '<br>';
  323. print '<br>';
  324. */
  325. /* Password length
  326. // Stored into $tabconf[0] if module generator is "Perso" or specific to the module generator.
  327. $tabConf = explode(";", getDolGlobalString('USER_PASSWORD_PATTERN'));
  328. print '<strong>'.$langs->trans("PasswordLength").'</strong>: ';
  329. print empty($conf->global->DATABASE_PWD_ENCRYPTED) ? '' : img_picto('', 'tick').' ';
  330. print yn(empty($conf->global->DATABASE_PWD_ENCRYPTED) ? 0 : 1);
  331. if (empty($conf->global->DATABASE_PWD_ENCRYPTED)) {
  332. print ' <span class="opacitymedium">('.$langs->trans("Recommended").' '.yn(1).')</span>';
  333. }
  334. print '<br>';
  335. print '<br>';
  336. */
  337. print '<strong>'.$langs->trans("AntivirusEnabledOnUpload").'</strong>: ';
  338. print empty($conf->global->MAIN_ANTIVIRUS_COMMAND) ? img_warning().' ' : img_picto('', 'tick').' ';
  339. print yn(empty($conf->global->MAIN_ANTIVIRUS_COMMAND) ? 0 : 1);
  340. if (empty($conf->global->MAIN_ANTIVIRUS_COMMAND)) {
  341. print ' - <span class="opacitymedium">'.$langs->trans("Recommended").': '.$langs->trans("DefinedAPathForAntivirusCommandIntoSetup", $langs->transnoentitiesnoconv("Home")." - ".$langs->transnoentitiesnoconv("Setup")." - ".$langs->transnoentitiesnoconv("Security")).'</span>';
  342. } else {
  343. print ' &nbsp; - '.$conf->global->MAIN_ANTIVIRUS_COMMAND;
  344. if (defined('MAIN_ANTIVIRUS_COMMAND') && !defined('MAIN_ANTIVIRUS_BYPASS_COMMAND_AND_PARAM')) {
  345. print ' - <span class="opacitymedium">'.$langs->trans("ValueIsForcedBySystem").'</span>';
  346. }
  347. }
  348. print '<br>';
  349. print '<br>';
  350. $umask = getDolGlobalString('MAIN_UMASK');
  351. print '<strong>'.$langs->trans("UMask").'</strong>: ';
  352. if (! in_array($umask, array('600', '660', '0600', '0660'))) {
  353. print img_warning().' ';
  354. }
  355. print $umask;
  356. if (! in_array($umask, array('600', '660', '0600', '0660'))) {
  357. print ' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 0600 | 0660)</span>';
  358. }
  359. print '<br>';
  360. print '<br>';
  361. $securityevent = new Events($db);
  362. $eventstolog = $securityevent->eventstolog;
  363. print '<strong>'.$langs->trans("AuditedSecurityEvents").'</strong>: ';
  364. $out = '';
  365. if (!empty($eventstolog) && is_array($eventstolog)) {
  366. // Loop on each event type
  367. $i = 0;
  368. foreach ($eventstolog as $key => $arr) {
  369. if ($arr['id']) {
  370. $key = 'MAIN_LOGEVENTS_'.$arr['id'];
  371. $value = empty($conf->global->$key) ? '' : $conf->global->$key;
  372. if ($value) {
  373. if ($i > 0) {
  374. $out .= ', ';
  375. }
  376. $out .= '<span class="opacitymedium">'.$key.'</span>';
  377. $i++;
  378. }
  379. }
  380. }
  381. print $out;
  382. }
  383. if (empty($out)) {
  384. print img_warning().' '.$langs->trans("NoSecurityEventsAreAduited", $langs->transnoentities("Home").' - '.$langs->transnoentities("Setup").' - '.$langs->transnoentities("Security").' - '.$langs->transnoentities("Audit")).'<br>';
  385. }
  386. print '<br>';
  387. // Modules/Applications
  388. print '<br>';
  389. print '<br>';
  390. print '<br>';
  391. print load_fiche_titre($langs->trans("Modules"), '', 'folder');
  392. // Module log
  393. print '<strong>'.$langs->trans("Syslog").'</strong>: ';
  394. $test = empty($conf->syslog->enabled);
  395. if ($test) {
  396. print img_picto('', 'tick.png').' '.$langs->trans("NotInstalled").' - '.$langs->trans("NotRiskOfLeakWithThis");
  397. } else {
  398. if ($conf->global->SYSLOG_LEVEL > LOG_NOTICE) {
  399. print img_picto('', 'warning').' '.$langs->trans("ModuleActivatedWithTooHighLogLevel", $langs->transnoentities("Syslog"));
  400. } else {
  401. print img_picto('', 'tick.png').' '.$langs->trans("ModuleSyslogActivatedButLevelNotTooVerbose", $langs->transnoentities("Syslog"), $conf->global->SYSLOG_LEVEL);
  402. }
  403. //print ' '.$langs->trans("MoreInformation").' <a href="'.DOL_URL_ROOT.'/admin/system/xdebug.php'.'">XDebug admin page</a>';
  404. }
  405. print '<br>';
  406. // Module debugbar
  407. print '<strong>'.$langs->trans("DebugBar").'</strong>: ';
  408. $test = empty($conf->debugbar->enabled);
  409. if ($test) {
  410. print img_picto('', 'tick.png').' '.$langs->trans("NotInstalled").' - '.$langs->trans("NotRiskOfLeakWithThis");
  411. } else {
  412. print img_picto('', 'error').' '.$langs->trans("ModuleActivatedDoNotUseInProduction", $langs->transnoentities("DebugBar"));
  413. //print ' '.$langs->trans("MoreInformation").' <a href="'.DOL_URL_ROOT.'/admin/system/xdebug.php'.'">XDebug admin page</a>';
  414. }
  415. print '<br>';
  416. // APIs
  417. print '<br>';
  418. print '<br>';
  419. print '<br>';
  420. print load_fiche_titre($langs->trans("API"), '', 'folder');
  421. if (empty($conf->api->enabled) && empty($conf->webservices->enabled)) {
  422. print $langs->trans("APIsAreNotEnabled");
  423. } else {
  424. if (!empty($conf->webservices->enabled)) {
  425. print $langs->trans('YouEnableDeprecatedWSAPIsUseRESTAPIsInstead')."<br>\n";
  426. print '<br>';
  427. }
  428. if (!empty($conf->api->enabled)) {
  429. print '<strong>API_ENDPOINT_RULES</strong> = '.(empty($conf->global->API_ENDPOINT_RULES) ? '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Example").': login:0,users:0,setup:1,status:1,tickets:1,...)</span>' : $conf->global->API_ENDPOINT_RULES)."<br>\n";
  430. print '<br>';
  431. }
  432. }
  433. print '<br><br>';
  434. print '<br>';
  435. print load_fiche_titre($langs->trans("OtherSetup"), '', 'folder');
  436. print '<strong>MAIN_ALLOW_SVG_FILES_AS_IMAGES</strong> = '.(empty($conf->global->MAIN_ALLOW_SVG_FILES_AS_IMAGES) ? '0' : $conf->global->MAIN_ALLOW_SVG_FILES_AS_IMAGES).' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 0)</span><br>';
  437. print '<br>';
  438. print '<strong>MAIN_ALWAYS_CREATE_LOCK_AFTER_LAST_UPGRADE</strong> = '.(empty($conf->global->MAIN_ALWAYS_CREATE_LOCK_AFTER_LAST_UPGRADE) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->MAIN_ALWAYS_CREATE_LOCK_AFTER_LAST_UPGRADE).' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': 1)</span><br>';
  439. print '<br>';
  440. //print '<strong>'.$langs->trans("PasswordEncryption").'</strong>: ';
  441. print '<strong>MAIN_SECURITY_HASH_ALGO</strong> = '.(empty($conf->global->MAIN_SECURITY_HASH_ALGO) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->MAIN_SECURITY_HASH_ALGO)." &nbsp; ";
  442. if (empty($conf->global->MAIN_SECURITY_HASH_ALGO)) {
  443. print '<span class="opacitymedium"> &nbsp; &nbsp; If unset: \'md5\'</span>';
  444. }
  445. if ($conf->global->MAIN_SECURITY_HASH_ALGO != 'password_hash') {
  446. print '<br><strong>MAIN_SECURITY_SALT</strong> = '.(empty($conf->global->MAIN_SECURITY_SALT) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->MAIN_SECURITY_SALT).'<br>';
  447. } else {
  448. print '<span class="opacitymedium">('.$langs->trans("Recommended").': password_hash)</span>';
  449. print '<br>';
  450. }
  451. if ($conf->global->MAIN_SECURITY_HASH_ALGO != 'password_hash') {
  452. print '<div class="info">The recommanded value for MAIN_SECURITY_HASH_ALGO is now \'password_hash\' but setting it now will make ALL existing passwords of all users not valid, so update is not possible.<br>';
  453. print 'If you really want to switch, you must:<br>';
  454. print '- Go on home - setup - other and add constant MAIN_SECURITY_HASH_ALGO to value \'password_hash\'<br>';
  455. print '- In same session, WITHOUT LOGGING OUT, go into your admin user record and set a new password<br>';
  456. print '- You can now logout and login with this new password. You must now reset password of all other users.<br>';
  457. print '</div><br>';
  458. }
  459. print '<br>';
  460. print '<strong>MAIN_SECURITY_ANTI_SSRF_SERVER_IP</strong> = '.(empty($conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span> &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': List of static IPs of server separated with coma - '.$langs->trans("Note").': common loopback ip like 127.*.*.*, [::1] are already added)</span>' : $conf->global->MAIN_SECURITY_ANTI_SSRF_SERVER_IP)."<br>";
  461. print '<br>';
  462. print '<strong>MAIN_SECURITY_CSRF_WITH_TOKEN</strong> = '.(empty($conf->global->MAIN_SECURITY_CSRF_WITH_TOKEN) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->MAIN_SECURITY_CSRF_WITH_TOKEN).' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 2)</span>'."<br>";
  463. print '<br>';
  464. print '<br>';
  465. print '<br>';
  466. print load_fiche_titre($langs->trans("OtherSetup").' ('.$langs->trans("Experimental").')', '', 'folder');
  467. print '<strong>MAIN_EXEC_USE_POPEN</strong> = ';
  468. if (empty($conf->global->MAIN_EXEC_USE_POPEN)) {
  469. print '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>';
  470. } else {
  471. print $conf->global->MAIN_EXEC_USE_POPEN;
  472. }
  473. if ($execmethod == 1) {
  474. print '<span class="opacitymedium"> &nbsp; &nbsp; "exec" PHP method will be used for shell commands';
  475. print ' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 1)';
  476. print '</span>';
  477. }
  478. if ($execmethod == 2) {
  479. print '<span class="opacitymedium"> &nbsp; &nbsp; "popen" PHP method will be used for shell commands';
  480. print ' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 1)';
  481. print '</span>';
  482. }
  483. print '<br>';
  484. print '<br>';
  485. print '<strong>MAIN_RESTRICTHTML_ONLY_VALID_HTML</strong> = '.(empty($conf->global->MAIN_RESTRICTHTML_ONLY_VALID_HTML) ? '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': 1)</span>' : $conf->global->MAIN_RESTRICTHTML_ONLY_VALID_HTML)."<br>";
  486. print '<br>';
  487. print '<strong>MAIN_RESTRICTHTML_REMOVE_ALSO_BAD_ATTRIBUTES</strong> = '.(empty($conf->global->MAIN_RESTRICTHTML_REMOVE_ALSO_BAD_ATTRIBUTES) ? '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': 1)</span>' : $conf->global->MAIN_RESTRICTHTML_REMOVE_ALSO_BAD_ATTRIBUTES)."<br>";
  488. print '<br>';
  489. print '<strong>MAIN_SECURITY_CSRF_TOKEN_RENEWAL_ON_EACH_CALL</strong> = '.(empty($conf->global->MAIN_SECURITY_CSRF_TOKEN_RENEWAL_ON_EACH_CALL) ? '<span class="opacitymedium">'.$langs->trans("Undefined").' &nbsp; ('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or").' 0)</span>' : $conf->global->MAIN_SECURITY_CSRF_TOKEN_RENEWAL_ON_EACH_CALL)."<br>";
  490. print '<br>';
  491. $examplecsprule = "frame-ancestors 'self'; img-src * data:; font-src *; default-src 'self' 'unsafe-inline' 'unsafe-eval' *.paypal.com *.stripe.com *.google.com *.googleapis.com *.google-analytics.com *.googletagmanager.com;";
  492. print '<strong>MAIN_SECURITY_FORCECSPRO</strong> = '.(empty($conf->global->MAIN_SECURITY_FORCECSPRO) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->MAIN_SECURITY_FORCECSPRO).' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").': "'.$examplecsprule.'")</span><br>';
  493. print '<br>';
  494. $examplecsprule = "frame-ancestors 'self'; img-src * data:; font-src *; default-src 'self' 'unsafe-inline' 'unsafe-eval' *.paypal.com *.stripe.com *.google.com *.googleapis.com *.google-analytics.com *.googletagmanager.com;";
  495. print '<strong>MAIN_SECURITY_FORCECSP</strong> = '.(empty($conf->global->MAIN_SECURITY_FORCECSP) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->MAIN_SECURITY_FORCECSP).' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").': "'.$examplecsprule.'")</span><br>';
  496. print '<br>';
  497. print '<strong>MAIN_SECURITY_FORCERP</strong> = '.(empty($conf->global->MAIN_SECURITY_FORCERP) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->MAIN_SECURITY_FORCERP).' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or")." \"same-origin\" so browser doesn't send any referrer when going into another web site domain)</span><br>";
  498. print '<br>';
  499. print '<strong>WEBSITE_MAIN_SECURITY_FORCECSPRO</strong> = '.(empty($conf->global->WEBSITE_MAIN_SECURITY_FORCECSPRO) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->WEBSITE_MAIN_SECURITY_FORCECSPRO).' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"frame-ancestors 'self'; default-src 'self' 'unsafe-inline'; style-src https://cdnjs.cloudflare.com *.googleapis.com; script-src *.transifex.com *.googletagmanager.com; object-src https://youtube.com; frame-src https://youtube.com; img-src * data:;\")</span><br>";
  500. print '<br>';
  501. print '<strong>WEBSITE_MAIN_SECURITY_FORCECSP</strong> = '.(empty($conf->global->WEBSITE_MAIN_SECURITY_FORCECSP) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->WEBSITE_MAIN_SECURITY_FORCECSP).' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"frame-ancestors 'self'; default-src 'self' 'unsafe-inline'; style-src https://cdnjs.cloudflare.com *.googleapis.com; script-src *.transifex.com *.googletagmanager.com; object-src https://youtube.com; frame-src https://youtube.com; img-src * data:;\")</span><br>";
  502. print '<br>';
  503. print '<strong>WEBSITE_MAIN_SECURITY_FORCERP</strong> = '.(empty($conf->global->WEBSITE_MAIN_SECURITY_FORCERP) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->WEBSITE_MAIN_SECURITY_FORCERP).' &nbsp; <span class="opacitymedium">('.$langs->trans("Recommended").': '.$langs->trans("Undefined").' '.$langs->trans("or")." \"strict-origin-when-cross-origin\")</span><br>";
  504. print '<br>';
  505. print '<strong>WEBSITE_MAIN_SECURITY_FORCESTS</strong> = '.(empty($conf->global->WEBSITE_MAIN_SECURITY_FORCESTS) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->WEBSITE_MAIN_SECURITY_FORCESTS).' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"max-age=31536000; includeSubDomains\")</span><br>";
  506. print '<br>';
  507. print '<strong>WEBSITE_MAIN_SECURITY_FORCEPP</strong> = '.(empty($conf->global->WEBSITE_MAIN_SECURITY_FORCEPP) ? '<span class="opacitymedium">'.$langs->trans("Undefined").'</span>' : $conf->global->WEBSITE_MAIN_SECURITY_FORCEPP).' &nbsp; <span class="opacitymedium">('.$langs->trans("Example").": \"camera: 'none'; microphone: 'none';\")</span><br>";
  508. print '<br>';
  509. print '<br>';
  510. print load_fiche_titre($langs->trans("LimitsAndMitigation"), '', 'folder');
  511. print '<span class="opacitymedium">';
  512. print 'For a higher security, we also recommend to implement limits and mitigation on number of endpoints per minutes for the following URL'."<br>";
  513. print '</span>';
  514. print '<br>';
  515. $urlexamplebase = 'https://github.com/Dolibarr/dolibarr/blob/develop/dev/setup/fail2ban/filter.d/';
  516. print '- Login process (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'web-dolibarr-rulesbruteforce.conf">fail2ban example on GitHub</a>)<br>';
  517. print '- '.DOL_URL_ROOT.'/passwordforgotten.php (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'web-dolibarr-rulespassforgotten.conf">fail2ban example on GitHub</a>)<br>';
  518. print '- '.DOL_URL_ROOT.'/public/* (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'web-dolibarr-limitpublic.conf">fail2ban example on GitHub</a>)<br>';
  519. print '<br>';
  520. $urlexamplebase = 'https://github.com/Dolibarr/dolibarr/blob/develop/dev/setup/apache/';
  521. print '- You can also protect the application using a HTTP Basic authentication layer (see <a target="_blank" rel="noopener" href="'.$urlexamplebase.'virtualhost">apache2 virtualhost example on GitHub</a>)<br>';
  522. // End of page
  523. llxFooter();
  524. $db->close();