2019-11-01 10:03:06 +00:00
|
|
|
<?php
|
|
|
|
class Auth_Internal extends Plugin implements IAuthModule {
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
private $host;
|
2012-12-27 11:14:44 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
function about() {
|
|
|
|
return array(1.0,
|
|
|
|
"Authenticates against internal tt-rss database",
|
|
|
|
"fox",
|
|
|
|
true);
|
|
|
|
}
|
2012-12-27 11:14:44 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
/* @var PluginHost $host */
|
|
|
|
function init($host) {
|
|
|
|
$this->host = $host;
|
|
|
|
$this->pdo = Db::pdo();
|
2012-12-27 11:14:44 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$host->add_hook($host::HOOK_AUTH_USER, $this);
|
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
function authenticate($login, $password, $service = '') {
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$pwd_hash1 = encrypt_password($password);
|
|
|
|
$pwd_hash2 = encrypt_password($password, $login);
|
|
|
|
$otp = $_REQUEST["otp"];
|
2012-09-03 14:33:46 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if (get_schema_version() > 96) {
|
2013-04-17 17:19:00 +00:00
|
|
|
|
2017-12-02 21:18:08 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT otp_enabled,salt FROM ttrss_users WHERE
|
|
|
|
login = ?");
|
|
|
|
$sth->execute([$login]);
|
2012-09-03 18:32:24 +00:00
|
|
|
|
2017-12-02 21:18:08 +00:00
|
|
|
if ($row = $sth->fetch()) {
|
2013-04-17 17:19:00 +00:00
|
|
|
|
2018-06-20 19:15:10 +00:00
|
|
|
$base32 = new \OTPHP\Base32();
|
2012-09-03 18:32:24 +00:00
|
|
|
|
2017-12-02 21:18:08 +00:00
|
|
|
$otp_enabled = $row['otp_enabled'];
|
2019-11-01 07:34:31 +00:00
|
|
|
$secret = $base32->encode(mb_substr(sha1($row["salt"]), 0, 12), false);
|
2012-09-03 18:32:24 +00:00
|
|
|
|
|
|
|
$topt = new \OTPHP\TOTP($secret);
|
|
|
|
$otp_check = $topt->now();
|
|
|
|
|
|
|
|
if ($otp_enabled) {
|
2019-11-01 10:03:06 +00:00
|
|
|
|
|
|
|
// only allow app password checking if OTP is enabled
|
|
|
|
if ($service && get_schema_version() > 138) {
|
|
|
|
return $this->check_app_password($login, $password, $service);
|
|
|
|
}
|
|
|
|
|
2012-09-03 18:32:24 +00:00
|
|
|
if ($otp) {
|
|
|
|
if ($otp != $otp_check) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else {
|
2012-09-10 15:18:44 +00:00
|
|
|
$return = urlencode($_REQUEST["return"]);
|
2019-02-23 10:49:40 +00:00
|
|
|
?>
|
|
|
|
<!DOCTYPE html>
|
|
|
|
<html>
|
2017-12-07 08:34:17 +00:00
|
|
|
<head>
|
|
|
|
<title>Tiny Tiny RSS</title>
|
|
|
|
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
|
|
|
|
</head>
|
2017-12-03 10:25:34 +00:00
|
|
|
<?php echo stylesheet_tag("css/default.css") ?>
|
2019-02-19 17:17:13 +00:00
|
|
|
<body class="ttrss_utility otp">
|
|
|
|
<h1><?php echo __("Authentication") ?></h1>
|
|
|
|
<div class="content">
|
2012-09-10 15:18:44 +00:00
|
|
|
<form action="public.php?return=<?php echo $return ?>"
|
2013-04-16 17:15:41 +00:00
|
|
|
method="POST" class="otpform">
|
2012-09-10 15:18:44 +00:00
|
|
|
<input type="hidden" name="op" value="login">
|
2012-09-03 18:32:24 +00:00
|
|
|
<input type="hidden" name="login" value="<?php echo htmlspecialchars($login) ?>">
|
|
|
|
<input type="hidden" name="password" value="<?php echo htmlspecialchars($password) ?>">
|
2014-05-03 18:37:08 +00:00
|
|
|
<input type="hidden" name="bw_limit" value="<?php echo htmlspecialchars($_POST["bw_limit"]) ?>">
|
|
|
|
<input type="hidden" name="remember_me" value="<?php echo htmlspecialchars($_POST["remember_me"]) ?>">
|
|
|
|
<input type="hidden" name="profile" value="<?php echo htmlspecialchars($_POST["profile"]) ?>">
|
2012-09-03 18:32:24 +00:00
|
|
|
|
2019-02-19 17:17:13 +00:00
|
|
|
<fieldset>
|
|
|
|
<label><?php echo __("Please enter your one time password:") ?></label>
|
|
|
|
<input autocomplete="off" size="6" name="otp" value=""/>
|
|
|
|
<input type="submit" value="Continue"/>
|
|
|
|
</fieldset>
|
2013-04-16 17:15:41 +00:00
|
|
|
</form></div>
|
2012-09-04 08:08:50 +00:00
|
|
|
<script type="text/javascript">
|
|
|
|
document.forms[0].otp.focus();
|
|
|
|
</script>
|
2012-09-03 18:32:24 +00:00
|
|
|
<?php
|
|
|
|
exit;
|
2012-09-03 14:53:19 +00:00
|
|
|
}
|
2012-09-03 14:33:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
// check app passwords first but allow regular password as a fallback for the time being
|
|
|
|
// if OTP is not enabled
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if ($service && get_schema_version() > 138) {
|
|
|
|
$user_id = $this->check_app_password($login, $password, $service);
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if ($user_id)
|
|
|
|
return $user_id;
|
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if (get_schema_version() > 87) {
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT salt FROM ttrss_users WHERE login = ?");
|
|
|
|
$sth->execute([$login]);
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if ($row = $sth->fetch()) {
|
|
|
|
$salt = $row['salt'];
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if ($salt == "") {
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
|
|
|
|
login = ? AND (pwd_hash = ? OR pwd_hash = ?)");
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth->execute([$login, $pwd_hash1, $pwd_hash2]);
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
// verify and upgrade password to new salt base
|
|
|
|
|
|
|
|
if ($row = $sth->fetch()) {
|
|
|
|
// upgrade password to MODE2
|
|
|
|
|
|
|
|
$user_id = $row['id'];
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
|
|
|
|
$pwd_hash = encrypt_password($password, $salt, true);
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("UPDATE ttrss_users SET
|
|
|
|
pwd_hash = ?, salt = ? WHERE login = ?");
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth->execute([$pwd_hash, $salt, $login]);
|
|
|
|
|
|
|
|
return $user_id;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
2017-12-02 21:18:08 +00:00
|
|
|
|
|
|
|
} else {
|
2019-11-01 10:03:06 +00:00
|
|
|
$pwd_hash = encrypt_password($password, $salt, true);
|
|
|
|
|
|
|
|
$sth = $this->pdo->prepare("SELECT id
|
|
|
|
FROM ttrss_users WHERE
|
|
|
|
login = ? AND pwd_hash = ?");
|
|
|
|
$sth->execute([$login, $pwd_hash]);
|
|
|
|
|
|
|
|
if ($row = $sth->fetch()) {
|
|
|
|
return $row['id'];
|
|
|
|
}
|
2017-12-02 21:18:08 +00:00
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
|
|
|
|
} else {
|
2017-12-02 21:18:08 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT id
|
2019-11-01 10:03:06 +00:00
|
|
|
FROM ttrss_users WHERE
|
|
|
|
login = ? AND (pwd_hash = ? OR pwd_hash = ?)");
|
|
|
|
|
|
|
|
$sth->execute([$login, $pwd_hash1, $pwd_hash2]);
|
2017-12-02 21:18:08 +00:00
|
|
|
|
|
|
|
if ($row = $sth->fetch()) {
|
|
|
|
return $row['id'];
|
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
}
|
|
|
|
} else {
|
2017-12-02 21:18:08 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT id
|
2019-11-01 10:03:06 +00:00
|
|
|
FROM ttrss_users WHERE
|
|
|
|
login = ? AND (pwd_hash = ? OR pwd_hash = ?)");
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2017-12-02 21:18:08 +00:00
|
|
|
$sth->execute([$login, $pwd_hash1, $pwd_hash2]);
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2017-12-02 21:18:08 +00:00
|
|
|
if ($row = $sth->fetch()) {
|
|
|
|
return $row['id'];
|
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
}
|
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
return false;
|
|
|
|
}
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
function check_password($owner_uid, $password) {
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT salt,login,otp_enabled FROM ttrss_users WHERE
|
|
|
|
id = ?");
|
|
|
|
$sth->execute([$owner_uid]);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if ($row = $sth->fetch()) {
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$salt = $row['salt'];
|
|
|
|
$login = $row['login'];
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if (!$salt) {
|
|
|
|
$password_hash1 = encrypt_password($password);
|
|
|
|
$password_hash2 = encrypt_password($password, $login);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
|
|
|
|
id = ? AND (pwd_hash = ? OR pwd_hash = ?)");
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth->execute([$owner_uid, $password_hash1, $password_hash2]);
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
return $sth->fetch();
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
} else {
|
|
|
|
$password_hash = encrypt_password($password, $salt, true);
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
|
|
|
|
id = ? AND pwd_hash = ?");
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth->execute([$owner_uid, $password_hash]);
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
return $sth->fetch();
|
|
|
|
}
|
2017-12-02 21:18:08 +00:00
|
|
|
}
|
2019-11-01 10:03:06 +00:00
|
|
|
|
|
|
|
return false;
|
2017-12-02 21:18:08 +00:00
|
|
|
}
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
function change_password($owner_uid, $old_password, $new_password) {
|
2012-09-04 08:39:33 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if ($this->check_password($owner_uid, $old_password)) {
|
2012-09-04 08:39:33 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$new_salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
|
|
|
|
$new_password_hash = encrypt_password($new_password, $new_salt, true);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("UPDATE ttrss_users SET
|
|
|
|
pwd_hash = ?, salt = ?, otp_enabled = false
|
|
|
|
WHERE id = ?");
|
|
|
|
$sth->execute([$new_password_hash, $new_salt, $owner_uid]);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$_SESSION["pwd_hash"] = $new_password_hash;
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT email, login FROM ttrss_users WHERE id = ?");
|
|
|
|
$sth->execute([$owner_uid]);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
if ($row = $sth->fetch()) {
|
|
|
|
$mailer = new Mailer();
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
require_once "lib/MiniTemplator.class.php";
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$tpl = new MiniTemplator;
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$tpl->readTemplateFromFile("templates/password_change_template.txt");
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$tpl->setVariable('LOGIN', $row["login"]);
|
|
|
|
$tpl->setVariable('TTRSS_HOST', SELF_URL_PATH);
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$tpl->addBlock('message');
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$tpl->generateOutputToString($message);
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
$mailer->mail(["to_name" => $row["login"],
|
|
|
|
"to_address" => $row["email"],
|
|
|
|
"subject" => "[tt-rss] Password change notification",
|
|
|
|
"message" => $message]);
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
}
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
return __("Password has been changed.");
|
|
|
|
} else {
|
|
|
|
return "ERROR: ".__('Old password is incorrect.');
|
2019-10-09 06:04:51 +00:00
|
|
|
}
|
2019-11-01 10:03:06 +00:00
|
|
|
}
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
private function check_app_password($login, $password, $service) {
|
2019-11-01 12:03:57 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT p.id, p.pwd_hash, u.id AS uid
|
|
|
|
FROM ttrss_app_passwords p, ttrss_users u
|
|
|
|
WHERE p.owner_uid = u.id AND u.login = ? AND service = ?");
|
|
|
|
$sth->execute([$login, $service]);
|
|
|
|
|
|
|
|
while ($row = $sth->fetch()) {
|
|
|
|
list ($algo, $hash, $salt) = explode(":", $row["pwd_hash"]);
|
|
|
|
|
|
|
|
if ($algo == "SSHA-512") {
|
|
|
|
$test_hash = hash('sha512', $salt . $password);
|
|
|
|
|
|
|
|
if ($test_hash == $hash) {
|
|
|
|
$usth = $this->pdo->prepare("UPDATE ttrss_app_passwords SET last_used = NOW() WHERE id = ?");
|
|
|
|
$usth->execute([$row['id']]);
|
|
|
|
|
|
|
|
return $row['uid'];
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
user_error("Got unknown algo of app password for user $login: $algo");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
return false;
|
2012-08-16 14:21:35 +00:00
|
|
|
}
|
2013-04-19 13:31:56 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
function api_version() {
|
|
|
|
return 2;
|
|
|
|
}
|
2013-04-19 13:31:56 +00:00
|
|
|
|
2019-11-01 10:03:06 +00:00
|
|
|
}
|