Con Kolivas
10 years ago
26 changed files with 1630 additions and 268 deletions
@ -0,0 +1,121 @@
|
||||
<?php |
||||
# |
||||
function set_2fa($data, $user, $tfa, $ans, $err) |
||||
{ |
||||
$pg = '<h1>Two Factor Authentication Settings</h1>'; |
||||
|
||||
if ($err !== null and $err != '') |
||||
$pg .= "<span class=err>$err<br><br></span>"; |
||||
|
||||
$pg .= '<table cellpadding=20 cellspacing=0 border=1>'; |
||||
$pg .= '<tr class=dc><td><center>'; |
||||
|
||||
$pg .= makeForm('2fa'); |
||||
$pg .= '<table cellpadding=5 cellspacing=0 border=0>'; |
||||
$pg .= '<tr class=dc><td>'; |
||||
switch ($tfa) |
||||
{ |
||||
case '': |
||||
$pg .= '<tr class=dl><td>'; |
||||
$pg .= "You don't have 2FA setup yet<br><br>"; |
||||
$pg .= 'To use 2FA you need an App on your phone/tablet<br>'; |
||||
$pg .= 'The free and recommended ones that have been tested here are:<br><br>'; |
||||
$pg .= "Android: Google Play 'FreeOTP Authenticator' by Red Hat<br>"; |
||||
$pg .= "Apple: App Store 'OTP Auth' by Roland Moers<br><br>"; |
||||
$pg .= 'Click here to start setting up 2FA: '; |
||||
$pg .= '<input type=submit name=Setup value=Setup>'; |
||||
$pg .= '</td></tr>'; |
||||
break; |
||||
case 'test': |
||||
$pg .= '<tr class=dc><td>'; |
||||
$pg .= '2FA is not yet enabled.<br>'; |
||||
$pg .= 'Your 2FA key has been created but needs testing.<br><br>'; |
||||
if (isset($ans['2fa_key'])) |
||||
{ |
||||
$key = $ans['2fa_key']; |
||||
$sfainfo = $ans['2fa_issuer'].': '.$ans['2fa_auth'].' '. |
||||
$ans['2fa_hash'].' '.$ans['2fa_time'].'s'; |
||||
$who = substr($user, 0, 8); |
||||
$sfaurl = 'otpauth://'.$ans['2fa_auth'].'/'.$ans['2fa_issuer']. |
||||
':'.htmlspecialchars($who).'?secret='.$ans['2fa_key']. |
||||
'&algorithm='.$ans['2fa_hash'].'&issuer='.$ans['2fa_issuer']; |
||||
} |
||||
else |
||||
{ |
||||
$key = 'unavailable'; |
||||
$sfainfo = 'unavailable'; |
||||
$sfaurl = 'unavailable'; |
||||
} |
||||
$pg .= "Your 2FA Secret Key is: $key<br>"; |
||||
$pg .= "2FA Settings are $sfainfo<br><br>"; |
||||
$pg .= "2FA URL is <a href='$sfaurl'>Click</a><br><br>"; |
||||
$pg .= '2FA Value: <input name=Value value="" size=10> '; |
||||
$pg .= '<input type=submit name=Test value=Test>'; |
||||
$pg .= '</td></tr>'; |
||||
break; |
||||
case 'ok': |
||||
$pg .= '<tr class=dc><td>'; |
||||
$pg .= '2FA is enabled on your account.<br><br>'; |
||||
$pg .= 'If you wish to replace your Secret Key with a new one:<br><br>'; |
||||
$pg .= 'Current 2FA Value: <input name=Value value="" size=10> '; |
||||
$pg .= '<input type=submit name=New value=New><span class=st1>*</span><br><br>'; |
||||
$pg .= '<span class=st1>*</span>WARNING: replacing the Secret Key will disable 2FA<br>'; |
||||
$pg .= 'until you successfully test the new key.<br><br>'; |
||||
$pg .= '</td></tr>'; |
||||
break; |
||||
} |
||||
|
||||
$pg .= '</table></form>'; |
||||
|
||||
$pg .= '</center></td></tr>'; |
||||
$pg .= '</table>'; |
||||
|
||||
return $pg; |
||||
} |
||||
# |
||||
function do2fa($data, $user) |
||||
{ |
||||
$err = ''; |
||||
$setup = getparam('Setup', false); |
||||
if ($setup === 'Setup') |
||||
{ |
||||
// rand() included as part of the entropy |
||||
$ans = get2fa($user, 'setup', rand(1073741824,2147483647), 0); |
||||
} |
||||
else |
||||
{ |
||||
$value = getparam('Value', false); |
||||
|
||||
$test = getparam('Test', false); |
||||
if ($test === 'Test' and $value !== null) |
||||
$ans = get2fa($user, 'test', 0, $value); |
||||
else |
||||
{ |
||||
$nw = getparam('New', false); |
||||
if ($nw === 'New' and $value !== null) |
||||
$ans = get2fa($user, 'new', rand(1073741824,2147483647), $value); |
||||
else |
||||
$ans = get2fa($user, '', 0, 0); |
||||
} |
||||
} |
||||
if ($ans['STATUS'] != 'ok') |
||||
$err = 'DBERR'; |
||||
else |
||||
{ |
||||
if (isset($ans['2fa_error'])) |
||||
$err = $ans['2fa_error']; |
||||
} |
||||
if (!isset($ans['2fa_status'])) |
||||
$tfa = null; |
||||
else |
||||
$tfa = $ans['2fa_status']; |
||||
$pg = set_2fa($data, $user, $tfa, $ans, $err); |
||||
return $pg; |
||||
} |
||||
# |
||||
function show_2fa($info, $page, $menu, $name, $user) |
||||
{ |
||||
gopage($info, NULL, 'do2fa', $page, $menu, $name, $user); |
||||
} |
||||
# |
||||
?> |
@ -0,0 +1,38 @@
|
||||
SET SESSION AUTHORIZATION 'postgres'; |
||||
|
||||
BEGIN transaction; |
||||
|
||||
DO $$ |
||||
DECLARE ver TEXT; |
||||
BEGIN |
||||
|
||||
UPDATE version set version='1.0.1' where vlock=1 and version='1.0.0'; |
||||
|
||||
IF found THEN |
||||
RETURN; |
||||
END IF; |
||||
|
||||
SELECT version into ver from version |
||||
WHERE vlock=1; |
||||
|
||||
RAISE EXCEPTION 'Wrong DB version - expect "1.0.0" - found "%"', ver; |
||||
|
||||
END $$; |
||||
|
||||
ALTER TABLE ONLY users |
||||
ADD COLUMN userdata text DEFAULT ''::text NOT NULL, |
||||
ADD COLUMN userbits bigint NOT NULL DEFAULT 0; |
||||
|
||||
ALTER TABLE ONLY users |
||||
ALTER COLUMN userbits DROP DEFAULT; |
||||
|
||||
-- match based on ckdb_data.c like_address() |
||||
UPDATE users set userbits=1 where username ~ '[13][A-HJ-NP-Za-km-z1-9]{15,}'; |
||||
|
||||
ALTER TABLE ONLY workers |
||||
ADD COLUMN workerbits bigint NOT NULL DEFAULT 0; |
||||
|
||||
ALTER TABLE ONLY workers |
||||
ALTER COLUMN workerbits DROP DEFAULT; |
||||
|
||||
END transaction; |
@ -0,0 +1,239 @@
|
||||
/*
|
||||
* Copyright 2015 Andrew Smith |
||||
* |
||||
* This program is free software; you can redistribute it and/or modify it |
||||
* under the terms of the GNU General Public License as published by the Free |
||||
* Software Foundation; either version 3 of the License, or (at your option) |
||||
* any later version. See COPYING for more details. |
||||
*/ |
||||
|
||||
#include <openssl/x509.h> |
||||
#include <openssl/hmac.h> |
||||
#include "ckdb.h" |
||||
|
||||
#if (SHA256SIZBIN != SHA256_DIGEST_LENGTH) |
||||
#error "SHA256SIZBIN must = OpenSSL SHA256_DIGEST_LENGTH" |
||||
#endif |
||||
|
||||
static char b32code[] = { |
||||
'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', |
||||
'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', |
||||
'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', |
||||
'Y', 'Z', '2', '3', '4', '5', '6', '7' |
||||
}; |
||||
|
||||
#define ASSERT32(condition) __maybe_unused static char b32code_length_must_be_32[(condition)?1:-1] |
||||
ASSERT32(sizeof(b32code) == 32); |
||||
|
||||
// bin is bigendian, return buf is bigendian
|
||||
char *_tob32(USERS *users, unsigned char *bin, size_t len, char *name, |
||||
size_t olen, WHERE_FFL_ARGS) |
||||
{ |
||||
size_t osiz = (len * 8 + 4) / 5; |
||||
char *buf, *ptr, *st = NULL; |
||||
int i, j, bits, ch; |
||||
|
||||
if (osiz != olen) { |
||||
LOGEMERG("%s() of '%s' data for '%s' invalid olen=%d != osiz=%d" |
||||
WHERE_FFL, |
||||
__func__, name, safe_text_nonull(users->username), |
||||
(int)olen, (int)osiz, WHERE_FFL_PASS); |
||||
FREENULL(st); |
||||
olen = osiz; |
||||
} |
||||
|
||||
buf = malloc(olen+1); |
||||
ptr = buf + olen; |
||||
*ptr = '\0'; |
||||
i = 0; |
||||
while (--ptr >= buf) { |
||||
j = i / 8; |
||||
bits = (31 << (i % 8)); |
||||
ch = (bin[len-j-1] & bits) >> (i % 8); |
||||
if (bits > 255) |
||||
ch |= (bin[len-j-2] & (bits >> 8)) << (8 - (i % 8)); |
||||
// Shouldn't ever happen
|
||||
if (ch < 0 || ch > 31) { |
||||
char *binstr = bin2hex(bin, len); |
||||
LOGEMERG("%s() failure of '%s' data for '%s' invalid " |
||||
"ch=%d, i=%d j=%d bits=%d bin=0x%s len=%d " |
||||
"olen=%d" WHERE_FFL, |
||||
__func__, name, |
||||
safe_text_nonull(users->username), ch, i, j, |
||||
bits, binstr, (int)len, (int)olen, |
||||
WHERE_FFL_PASS); |
||||
FREENULL(st); |
||||
FREENULL(binstr); |
||||
ch = 0; |
||||
} |
||||
*ptr = b32code[ch]; |
||||
i += 5; |
||||
} |
||||
return buf; |
||||
} |
||||
|
||||
bool gen_data(__maybe_unused USERS *users, unsigned char *buf, size_t len, |
||||
int32_t entropy) |
||||
{ |
||||
unsigned char *ptr; |
||||
ssize_t ret, want, got; |
||||
int i; |
||||
|
||||
int fil = open("/dev/random", O_RDONLY); |
||||
if (fil == -1) |
||||
return false; |
||||
|
||||
want = (ssize_t)len; |
||||
got = 0; |
||||
while (got < want) { |
||||
ret = read(fil, buf+got, want-got); |
||||
if (ret < 0) { |
||||
close(fil); |
||||
return false; |
||||
} |
||||
got += ret; |
||||
} |
||||
close(fil); |
||||
|
||||
ptr = (unsigned char *)&entropy; |
||||
for (i = 0; i < (int)sizeof(entropy) && (i + sizeof(entropy)) < len; i++) |
||||
buf[i+sizeof(entropy)] ^= *(ptr + i); |
||||
|
||||
return true; |
||||
} |
||||
|
||||
K_ITEM *gen_2fa_key(K_ITEM *old_u_item, int32_t entropy, char *by, char *code, |
||||
char *inet, tv_t *cd, K_TREE *trf_root) |
||||
{ |
||||
unsigned char key[TOTPAUTH_KEYSIZE]; |
||||
K_ITEM *u_item = NULL; |
||||
USERS *old_users, *users; |
||||
bool ok; |
||||
|
||||
DATA_USERS(old_users, old_u_item); |
||||
ok = gen_data(old_users, key, sizeof(key), entropy); |
||||
if (ok) { |
||||
K_WLOCK(users_free); |
||||
u_item = k_unlink_head(users_free); |
||||
K_WUNLOCK(users_free); |
||||
DATA_USERS(users, u_item); |
||||
memcpy(users, old_users, sizeof(*users)); |
||||
if (users->userdata != EMPTY) { |
||||
users->userdata = strdup(users->userdata); |
||||
if (!users->userdata) |
||||
quithere(1, "strdup OOM"); |
||||
} |
||||
users_userdata_add_bin(users, USER_TOTPAUTH_NAME, |
||||
USER_TOTPAUTH, key, sizeof(key)); |
||||
users_userdata_add_txt(users, USER_TEST2FA_NAME, |
||||
USER_TEST2FA, "Y"); |
||||
ok = users_replace(NULL, u_item, old_u_item, by, code, inet, cd, |
||||
trf_root); |
||||
if (!ok) { |
||||
// u_item was cleaned up in user_replace()
|
||||
u_item = NULL; |
||||
} |
||||
} |
||||
return u_item; |
||||
} |
||||
|
||||
bool check_2fa(USERS *users, int32_t value) |
||||
{ |
||||
char *st = NULL, *tmp1 = NULL, *tmp2 = NULL, *tmp3 = NULL; |
||||
unsigned char tim[sizeof(int64_t)], *bin, *hash; |
||||
unsigned int reslen; |
||||
size_t binlen; |
||||
HMAC_CTX ctx; |
||||
int64_t now; |
||||
int32_t otp; |
||||
int i, offset; |
||||
|
||||
now = (int64_t)time(NULL) / TOTPAUTH_TIME; |
||||
bin = users_userdata_get_bin(users, USER_TOTPAUTH_NAME, |
||||
USER_TOTPAUTH, &binlen); |
||||
if (binlen != TOTPAUTH_KEYSIZE) { |
||||
LOGERR("%s() invalid key for '%s/%s " |
||||
"len(%d) != %d", |
||||
__func__, |
||||
st = safe_text_nonull(users->username), |
||||
USER_TOTPAUTH_NAME, (int)binlen, |
||||
TOTPAUTH_KEYSIZE); |
||||
FREENULL(st); |
||||
return false; |
||||
} |
||||
for (i = 0; i < (int)sizeof(int64_t); i++) |
||||
tim[i] = (now >> 8 * ((sizeof(int64_t) - 1) - i)) & 0xff; |
||||
|
||||
LOGDEBUG("%s() '%s/%s tim=%"PRId64"=%s key=%s=%s", __func__, |
||||
st = safe_text_nonull(users->username), |
||||
USER_TOTPAUTH_NAME, now, |
||||
tmp1 = (char *)bin2hex(&tim, sizeof(tim)), |
||||
tmp2 = (char *)bin2hex(bin, TOTPAUTH_KEYSIZE), |
||||
tmp3 = tob32(users, bin, binlen,USER_TOTPAUTH_NAME, TOTPAUTH_DSP_KEYSIZE)); |
||||
FREENULL(tmp3); |
||||
FREENULL(tmp2); |
||||
FREENULL(tmp1); |
||||
FREENULL(st); |
||||
|
||||
hash = malloc(SHA256_DIGEST_LENGTH); |
||||
if (!hash) |
||||
quithere(1, "malloc OOM"); |
||||
|
||||
HMAC_CTX_init(&ctx); |
||||
HMAC_Init_ex(&ctx, bin, binlen, EVP_sha256(), NULL); |
||||
HMAC_Update(&ctx, (unsigned char *)&tim, sizeof(tim)); |
||||
HMAC_Final(&ctx, hash, &reslen); |
||||
|
||||
LOGDEBUG("%s() '%s/%s hash=%s", __func__, |
||||
st = safe_text_nonull(users->username), |
||||
USER_TOTPAUTH_NAME, |
||||
tmp1 = (char *)bin2hex(hash, SHA256_DIGEST_LENGTH)); |
||||
FREENULL(tmp1); |
||||
FREENULL(st); |
||||
|
||||
offset = hash[reslen-1] & 0xf; |
||||
|
||||
otp = ((hash[offset] & 0x7f) << 24) | ((hash[offset+1] & 0xff) << 16) | |
||||
((hash[offset+2] & 0xff) << 8) | (hash[offset+3] & 0xff); |
||||
|
||||
otp %= 1000000; |
||||
|
||||
LOGDEBUG("%s() '%s/%s offset=%d otp=%"PRId32" value=%"PRId32, |
||||
__func__, st = safe_text_nonull(users->username), |
||||
USER_TOTPAUTH_NAME, offset, otp, value); |
||||
FREENULL(st); |
||||
FREENULL(hash); |
||||
|
||||
if (otp == value) |
||||
return true; |
||||
else |
||||
return false; |
||||
} |
||||
|
||||
bool tst_2fa(K_ITEM *old_u_item, int32_t value, char *by, char *code, |
||||
char *inet, tv_t *cd, K_TREE *trf_root) |
||||
{ |
||||
K_ITEM *u_item; |
||||
USERS *old_users, *users; |
||||
bool ok; |
||||
|
||||
DATA_USERS(old_users, old_u_item); |
||||
ok = check_2fa(old_users, value); |
||||
if (ok) { |
||||
K_WLOCK(users_free); |
||||
u_item = k_unlink_head(users_free); |
||||
K_WUNLOCK(users_free); |
||||
DATA_USERS(users, u_item); |
||||
memcpy(users, old_users, sizeof(*users)); |
||||
if (users->userdata != EMPTY) { |
||||
users->userdata = strdup(users->userdata); |
||||
if (!users->userdata) |
||||
quithere(1, "strdup OOM"); |
||||
} |
||||
users_userdata_del(users, USER_TEST2FA_NAME, USER_TEST2FA); |
||||
ok = users_replace(NULL, u_item, old_u_item, by, code, inet, cd, |
||||
trf_root); |
||||
// if !ok : u_item was cleaned up in user_replace()
|
||||
} |
||||
return ok; |
||||
} |
Loading…
Reference in new issue