ttrss/plugins/auth_internal/init.php

330 lines
8.6 KiB
PHP
Raw Normal View History

2019-11-01 12:25:40 +00:00
<?php
class Auth_Internal extends Auth_Base {
2017-12-02 21:18:08 +00:00
2019-11-01 12:25:40 +00:00
private $host;
2019-11-01 12:25:40 +00:00
function about() {
return array(1.0,
"Authenticates against internal tt-rss database",
"fox",
true);
}
2019-11-01 12:25:40 +00:00
/* @var PluginHost $host */
function init($host) {
$this->host = $host;
2019-11-01 12:25:40 +00:00
$host->add_hook($host::HOOK_AUTH_USER, $this);
}
2019-11-01 12:25:40 +00:00
function authenticate($login, $password, $service = '') {
2019-11-01 12:25:40 +00:00
$pwd_hash1 = encrypt_password($password);
$pwd_hash2 = encrypt_password($password, $login);
$otp = (int) ($_REQUEST["otp"] ?? 0);
// don't bother with null/null logins for auth_external etc
if ($login && get_schema_version() > 96) {
$user_id = UserHelper::find_user_by_login($login);
if ($user_id && UserHelper::is_otp_enabled($user_id)) {
// only allow app passwords for service logins if OTP is enabled
if ($service && get_schema_version() > 138) {
return $this->check_app_password($login, $password, $service);
}
if ($otp) {
/*$base32 = new \OTPHP\Base32();
$secret = $base32->encode(mb_substr(sha1($row["salt"]), 0, 12), false);
$secret_legacy = $base32->encode(sha1($row["salt"]));
$totp = new \OTPHP\TOTP($secret);
$otp_check = $totp->now();
$totp_legacy = new \OTPHP\TOTP($secret_legacy);
$otp_check_legacy = $totp_legacy->now();
if ($otp !== $otp_check && $otp !== $otp_check_legacy) {
return false;
} */
if (UserHelper::check_otp($user_id, $otp))
return $user_id;
else
return false;
} else {
$return = urlencode($_REQUEST["return"]);
?>
<!DOCTYPE html>
<html>
<head>
<title>Tiny Tiny RSS</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<?php foreach (["lib/dojo/dojo.js",
"lib/dojo/tt-rss-layer.js",
"js/common.js",
"js/utility.js"] as $jsfile) {
echo javascript_tag($jsfile);
} ?>
<style type="text/css">
@media (prefers-color-scheme: dark) {
body {
background : #303030;
}
}
body.css_loading * {
display : none;
}
</style>
<script type="text/javascript">
require({cache:{}});
const UtilityApp = {
init: function() {
require(['dojo/parser', "dojo/ready", 'dijit/form/Button', 'dijit/form/Form',
'dijit/form/TextBox','dijit/form/ValidationTextBox'],function(parser, ready){
ready(function() {
parser.parse();
dijit.byId("otp").focus();
});
});
},
};
</script>
</head>
<body class="flat ttrss_utility otp css_loading">
<h1><?= __("Authentication") ?></h1>
<div class="content">
<form dojoType="dijit.form.Form" action="public.php?return=<?= $return ?>" method="post" class="otpform">
<?php foreach (["login", "password", "bw_limit", "safe_mode", "remember_me", "profile"] as $key) {
print \Controls\hidden_tag($key, $_POST[$key] ?? "");
} ?>
<?= \Controls\hidden_tag("op", "login") ?>
<fieldset>
<label><?= __("Please enter your one time password:") ?></label>
<input id="otp" dojoType="dijit.form.ValidationTextBox" required="1" autocomplete="off" size="6" name="otp" value=""/>
<?= \Controls\submit_tag(__("Continue")) ?>
</fieldset>
</form>
</div>
</body>
</html>
<?php
exit;
}
}
2019-11-01 12:25:40 +00:00
}
// service logins: check app passwords first but allow regular password
// as a fallback if OTP is not enabled
2019-11-01 12:25:40 +00:00
if ($service && get_schema_version() > 138) {
$user_id = $this->check_app_password($login, $password, $service);
2019-11-01 12:25:40 +00:00
if ($user_id)
return $user_id;
}
2019-11-01 12:25:40 +00:00
if (get_schema_version() > 87) {
$sth = $this->pdo->prepare("SELECT salt FROM ttrss_users WHERE LOWER(login) = LOWER(?)");
2019-11-01 12:25:40 +00:00
$sth->execute([$login]);
2019-11-01 12:25:40 +00:00
if ($row = $sth->fetch()) {
$salt = $row['salt'];
2019-11-01 12:25:40 +00:00
if ($salt == "") {
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
LOWER(login) = LOWER(?) AND (pwd_hash = ? OR pwd_hash = ?)");
2019-11-01 12:25:40 +00:00
$sth->execute([$login, $pwd_hash1, $pwd_hash2]);
2019-11-01 12:25:40 +00:00
// verify and upgrade password to new salt base
2019-11-01 12:25:40 +00:00
if ($row = $sth->fetch()) {
// upgrade password to MODE2
2017-12-02 21:18:08 +00:00
2019-11-01 12:25:40 +00:00
$user_id = $row['id'];
2019-11-01 12:25:40 +00:00
$salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
$pwd_hash = encrypt_password($password, $salt, true);
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("UPDATE ttrss_users SET
pwd_hash = ?, salt = ? WHERE LOWER(login) = LOWER(?)");
2019-11-01 12:25:40 +00:00
$sth->execute([$pwd_hash, $salt, $login]);
2019-11-01 12:25:40 +00:00
return $user_id;
2017-12-02 21:18:08 +00:00
} else {
2019-11-01 12:25:40 +00:00
return false;
2017-12-02 21:18:08 +00:00
}
} else {
2019-11-01 12:25:40 +00:00
$pwd_hash = encrypt_password($password, $salt, true);
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("SELECT id
FROM ttrss_users WHERE
LOWER(login) = LOWER(?) AND pwd_hash = ?");
2019-11-01 12:25:40 +00:00
$sth->execute([$login, $pwd_hash]);
2017-12-02 21:18:08 +00:00
if ($row = $sth->fetch()) {
return $row['id'];
}
}
2019-11-01 12:25:40 +00:00
} else {
2017-12-02 21:18:08 +00:00
$sth = $this->pdo->prepare("SELECT id
2019-11-01 12:25:40 +00:00
FROM ttrss_users WHERE
LOWER(login) = LOWER(?) AND (pwd_hash = ? OR pwd_hash = ?)");
2017-12-02 21:18:08 +00:00
$sth->execute([$login, $pwd_hash1, $pwd_hash2]);
2017-12-02 21:18:08 +00:00
if ($row = $sth->fetch()) {
return $row['id'];
}
}
2019-11-01 12:25:40 +00:00
} else {
$sth = $this->pdo->prepare("SELECT id
FROM ttrss_users WHERE
LOWER(login) = LOWER(?) AND (pwd_hash = ? OR pwd_hash = ?)");
2019-11-01 12:25:40 +00:00
$sth->execute([$login, $pwd_hash1, $pwd_hash2]);
2019-11-01 12:25:40 +00:00
if ($row = $sth->fetch()) {
return $row['id'];
}
}
2019-11-01 12:25:40 +00:00
return false;
}
function check_password($owner_uid, $password, $service = '') {
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("SELECT salt,login,otp_enabled FROM ttrss_users WHERE
id = ?");
$sth->execute([$owner_uid]);
2019-11-01 12:25:40 +00:00
if ($row = $sth->fetch()) {
2019-11-01 12:25:40 +00:00
$salt = $row['salt'];
$login = $row['login'];
// check app password only if service is specified
if ($service && get_schema_version() > 138) {
return $this->check_app_password($login, $password, $service);
}
2019-11-01 12:25:40 +00:00
if (!$salt) {
$password_hash1 = encrypt_password($password);
$password_hash2 = encrypt_password($password, $login);
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
id = ? AND (pwd_hash = ? OR pwd_hash = ?)");
2017-12-02 21:18:08 +00:00
2019-11-01 12:25:40 +00:00
$sth->execute([$owner_uid, $password_hash1, $password_hash2]);
2019-11-01 12:25:40 +00:00
return $sth->fetch();
2017-12-02 21:18:08 +00:00
2019-11-01 12:25:40 +00:00
} else {
$password_hash = encrypt_password($password, $salt, true);
2017-12-02 21:18:08 +00:00
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
id = ? AND pwd_hash = ?");
2017-12-02 21:18:08 +00:00
2019-11-01 12:25:40 +00:00
$sth->execute([$owner_uid, $password_hash]);
2019-11-01 12:25:40 +00:00
return $sth->fetch();
}
2017-12-02 21:18:08 +00:00
}
2019-11-01 12:25:40 +00:00
return false;
}
2019-11-01 12:25:40 +00:00
function change_password($owner_uid, $old_password, $new_password) {
2019-11-01 12:25:40 +00:00
if ($this->check_password($owner_uid, $old_password)) {
2019-11-01 12:25:40 +00:00
$new_salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
$new_password_hash = encrypt_password($new_password, $new_salt, true);
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("UPDATE ttrss_users SET
pwd_hash = ?, salt = ?, otp_enabled = false
WHERE id = ?");
$sth->execute([$new_password_hash, $new_salt, $owner_uid]);
2019-11-01 12:25:40 +00:00
$_SESSION["pwd_hash"] = $new_password_hash;
2019-11-01 12:25:40 +00:00
$sth = $this->pdo->prepare("SELECT email, login FROM ttrss_users WHERE id = ?");
$sth->execute([$owner_uid]);
2019-11-01 12:25:40 +00:00
if ($row = $sth->fetch()) {
$mailer = new Mailer();
$tpl = new Templator();
$tpl->readTemplateFromFile("password_change_template.txt");
2019-11-01 12:25:40 +00:00
$tpl->setVariable('LOGIN', $row["login"]);
2021-02-22 18:47:48 +00:00
$tpl->setVariable('TTRSS_HOST', Config::get(Config::SELF_URL_PATH));
2019-11-01 12:25:40 +00:00
$tpl->addBlock('message');
2019-11-01 12:25:40 +00:00
$tpl->generateOutputToString($message);
2019-11-01 12:25:40 +00:00
$mailer->mail(["to_name" => $row["login"],
"to_address" => $row["email"],
"subject" => "[tt-rss] Password change notification",
"message" => $message]);
}
2019-11-01 12:25:40 +00:00
return __("Password has been changed.");
} else {
return "ERROR: ".__('Old password is incorrect.');
}
2019-11-01 12:25:40 +00:00
}
2019-11-01 12:25:40 +00:00
private function check_app_password($login, $password, $service) {
$sth = $this->pdo->prepare("SELECT p.id, p.pwd_hash, u.id AS uid
FROM ttrss_app_passwords p, ttrss_users u
WHERE p.owner_uid = u.id AND LOWER(u.login) = LOWER(?) AND service = ?");
2019-11-01 12:25:40 +00:00
$sth->execute([$login, $service]);
2019-11-01 12:25:40 +00:00
while ($row = $sth->fetch()) {
list ($algo, $hash, $salt) = explode(":", $row["pwd_hash"]);
2019-11-01 12:25:40 +00:00
if ($algo == "SSHA-512") {
$test_hash = hash('sha512', $salt . $password);
2019-11-01 12:25:40 +00:00
if ($test_hash == $hash) {
$usth = $this->pdo->prepare("UPDATE ttrss_app_passwords SET last_used = NOW() WHERE id = ?");
$usth->execute([$row['id']]);
2019-11-01 12:25:40 +00:00
return $row['uid'];
}
2019-11-01 12:25:40 +00:00
} else {
user_error("Got unknown algo of app password for user $login: $algo");
}
}
2013-04-19 13:31:56 +00:00
2019-11-01 12:25:40 +00:00
return false;
}
2013-04-19 13:31:56 +00:00
2019-11-01 12:25:40 +00:00
function api_version() {
return 2;
}
2019-11-01 12:25:40 +00:00
}