2019-11-01 12:25:40 +00:00
|
|
|
<?php
|
2021-02-08 16:11:31 +00:00
|
|
|
class Auth_Internal extends Auth_Base {
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
private $host;
|
2012-12-27 11:14:44 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
function about() {
|
2021-03-01 09:11:42 +00:00
|
|
|
return array(null,
|
2019-11-01 12:25:40 +00:00
|
|
|
"Authenticates against internal tt-rss database",
|
|
|
|
"fox",
|
|
|
|
true);
|
|
|
|
}
|
2012-12-27 11:14:44 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
/* @var PluginHost $host */
|
|
|
|
function init($host) {
|
|
|
|
$this->host = $host;
|
2012-12-27 11:14:44 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
$host->add_hook($host::HOOK_AUTH_USER, $this);
|
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
function authenticate($login, $password, $service = '') {
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2021-02-05 21:12:15 +00:00
|
|
|
$otp = (int) ($_REQUEST["otp"] ?? 0);
|
2012-09-03 14:33:46 +00:00
|
|
|
|
2021-02-26 16:16:17 +00:00
|
|
|
// don't bother with null/null logins for auth_external etc
|
|
|
|
if ($login && get_schema_version() > 96) {
|
|
|
|
|
|
|
|
$user_id = UserHelper::find_user_by_login($login);
|
|
|
|
|
|
|
|
if ($user_id && UserHelper::is_otp_enabled($user_id)) {
|
|
|
|
|
|
|
|
// only allow app passwords for service logins if OTP is enabled
|
|
|
|
if ($service && get_schema_version() > 138) {
|
|
|
|
return $this->check_app_password($login, $password, $service);
|
2012-09-03 14:33:46 +00:00
|
|
|
}
|
2021-02-26 16:16:17 +00:00
|
|
|
|
|
|
|
if ($otp) {
|
|
|
|
|
|
|
|
/*$base32 = new \OTPHP\Base32();
|
|
|
|
|
|
|
|
$secret = $base32->encode(mb_substr(sha1($row["salt"]), 0, 12), false);
|
|
|
|
$secret_legacy = $base32->encode(sha1($row["salt"]));
|
|
|
|
|
|
|
|
$totp = new \OTPHP\TOTP($secret);
|
|
|
|
$otp_check = $totp->now();
|
|
|
|
|
|
|
|
$totp_legacy = new \OTPHP\TOTP($secret_legacy);
|
|
|
|
$otp_check_legacy = $totp_legacy->now();
|
|
|
|
|
|
|
|
if ($otp !== $otp_check && $otp !== $otp_check_legacy) {
|
|
|
|
return false;
|
|
|
|
} */
|
|
|
|
|
2021-03-12 04:32:15 +00:00
|
|
|
if ($this->check_password($user_id, $password) && UserHelper::check_otp($user_id, $otp))
|
2021-02-26 16:16:17 +00:00
|
|
|
return $user_id;
|
|
|
|
else
|
|
|
|
return false;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
$return = urlencode($_REQUEST["return"]);
|
|
|
|
?>
|
|
|
|
<!DOCTYPE html>
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<title>Tiny Tiny RSS</title>
|
|
|
|
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
|
2021-02-28 11:18:23 +00:00
|
|
|
<?php foreach (["lib/dojo/dojo.js",
|
|
|
|
"lib/dojo/tt-rss-layer.js",
|
|
|
|
"js/common.js",
|
|
|
|
"js/utility.js"] as $jsfile) {
|
|
|
|
echo javascript_tag($jsfile);
|
|
|
|
} ?>
|
|
|
|
<style type="text/css">
|
|
|
|
@media (prefers-color-scheme: dark) {
|
|
|
|
body {
|
|
|
|
background : #303030;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
body.css_loading * {
|
|
|
|
display : none;
|
|
|
|
}
|
|
|
|
</style>
|
|
|
|
|
|
|
|
<script type="text/javascript">
|
|
|
|
require({cache:{}});
|
|
|
|
|
|
|
|
const UtilityApp = {
|
|
|
|
init: function() {
|
|
|
|
require(['dojo/parser', "dojo/ready", 'dijit/form/Button', 'dijit/form/Form',
|
|
|
|
'dijit/form/TextBox','dijit/form/ValidationTextBox'],function(parser, ready){
|
|
|
|
ready(function() {
|
|
|
|
parser.parse();
|
|
|
|
dijit.byId("otp").focus();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
},
|
|
|
|
};
|
|
|
|
</script>
|
|
|
|
</head>
|
|
|
|
<body class="flat ttrss_utility otp css_loading">
|
|
|
|
<h1><?= __("Authentication") ?></h1>
|
|
|
|
<div class="content">
|
2021-03-04 10:40:54 +00:00
|
|
|
<form dojoType="dijit.form.Form" action="public.php?return=<?= urlencode(with_trailing_slash($return)) ?>" method="post" class="otpform">
|
2021-02-28 11:18:23 +00:00
|
|
|
|
|
|
|
<?php foreach (["login", "password", "bw_limit", "safe_mode", "remember_me", "profile"] as $key) {
|
|
|
|
print \Controls\hidden_tag($key, $_POST[$key] ?? "");
|
|
|
|
} ?>
|
|
|
|
|
|
|
|
<?= \Controls\hidden_tag("op", "login") ?>
|
|
|
|
|
|
|
|
<fieldset>
|
|
|
|
<label><?= __("Please enter your one time password:") ?></label>
|
|
|
|
<input id="otp" dojoType="dijit.form.ValidationTextBox" required="1" autocomplete="off" size="6" name="otp" value=""/>
|
|
|
|
<?= \Controls\submit_tag(__("Continue")) ?>
|
|
|
|
</fieldset>
|
|
|
|
</form>
|
|
|
|
</div>
|
|
|
|
</body>
|
|
|
|
</html>
|
2021-02-26 16:16:17 +00:00
|
|
|
<?php
|
|
|
|
exit;
|
|
|
|
}
|
2012-09-03 14:33:46 +00:00
|
|
|
}
|
2019-11-01 12:25:40 +00:00
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2021-02-26 16:16:17 +00:00
|
|
|
// service logins: check app passwords first but allow regular password
|
|
|
|
// as a fallback if OTP is not enabled
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
if ($service && get_schema_version() > 138) {
|
|
|
|
$user_id = $this->check_app_password($login, $password, $service);
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
if ($user_id)
|
|
|
|
return $user_id;
|
|
|
|
}
|
2012-08-16 11:30:35 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
if ($login) {
|
|
|
|
$try_user_id = $this->find_user_by_login($login);
|
2019-11-01 12:25:40 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
if ($try_user_id) {
|
|
|
|
return $this->check_password($try_user_id, $password);
|
2019-11-01 12:25:40 +00:00
|
|
|
}
|
2019-11-01 10:03:06 +00:00
|
|
|
}
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
return false;
|
|
|
|
}
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
function check_password(int $owner_uid, string $password, string $service = '') {
|
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
$user = ORM::for_table('ttrss_users')->find_one($owner_uid);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
if ($user) {
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-12 06:35:01 +00:00
|
|
|
// don't throttle app passwords
|
|
|
|
if (!$service && get_schema_version() >= 145) {
|
|
|
|
|
|
|
|
if ($user->last_auth_attempt) {
|
|
|
|
$last_auth_attempt = strtotime($user->last_auth_attempt);
|
|
|
|
|
|
|
|
if ($last_auth_attempt && time() - $last_auth_attempt < Config::get(Config::AUTH_MIN_INTERVAL)) {
|
|
|
|
Logger::log(E_USER_NOTICE, "Too many authentication attempts for {$user->login}, throttled.");
|
|
|
|
|
|
|
|
// start an empty session to deliver login error message
|
|
|
|
if (session_status() != PHP_SESSION_ACTIVE)
|
|
|
|
session_start();
|
|
|
|
|
|
|
|
$_SESSION["login_error_msg"] = "Too many authentication attempts, throttled.";
|
|
|
|
|
|
|
|
$user->last_auth_attempt = Db::NOW();
|
|
|
|
$user->save();
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$user->last_auth_attempt = Db::NOW();
|
|
|
|
$user->save();
|
|
|
|
}
|
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
$salt = $user['salt'] ?? "";
|
|
|
|
$login = $user['login'];
|
|
|
|
$pwd_hash = $user['pwd_hash'];
|
2021-03-01 12:24:18 +00:00
|
|
|
|
|
|
|
list ($pwd_algo, $raw_hash) = explode(":", $pwd_hash, 2);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-02-08 16:11:31 +00:00
|
|
|
// check app password only if service is specified
|
|
|
|
if ($service && get_schema_version() > 138) {
|
|
|
|
return $this->check_app_password($login, $password, $service);
|
|
|
|
}
|
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
$test_hash = UserHelper::hash_password($password, $salt, $pwd_algo);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
if (hash_equals($pwd_hash, $test_hash)) {
|
|
|
|
if ($pwd_algo != UserHelper::HASH_ALGOS[0]) {
|
|
|
|
Logger::log(E_USER_NOTICE, "Upgrading password of user $login to " . UserHelper::HASH_ALGOS[0]);
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
$new_hash = UserHelper::hash_password($password, $salt, UserHelper::HASH_ALGOS[0]);
|
2017-12-02 21:18:08 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
if ($new_hash) {
|
|
|
|
$usth = $this->pdo->prepare("UPDATE ttrss_users SET pwd_hash = ? WHERE id = ?");
|
|
|
|
$usth->execute([$new_hash, $owner_uid]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $owner_uid;
|
2019-11-01 12:25:40 +00:00
|
|
|
}
|
2017-12-02 21:18:08 +00:00
|
|
|
}
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
return false;
|
|
|
|
}
|
2012-09-04 08:39:33 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
function change_password($owner_uid, $old_password, $new_password) {
|
2012-09-04 08:39:33 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
if ($this->check_password($owner_uid, $old_password)) {
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
$new_salt = UserHelper::get_salt();
|
|
|
|
$new_password_hash = UserHelper::hash_password($new_password, $new_salt, UserHelper::HASH_ALGOS[0]);
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
$user = ORM::for_table('ttrss_users')->find_one($owner_uid);
|
|
|
|
|
|
|
|
$user->salt = $new_salt;
|
|
|
|
$user->pwd_hash = $new_password_hash;
|
|
|
|
$user->save();
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
if ($_SESSION["uid"] ?? 0 == $owner_uid)
|
|
|
|
$_SESSION["pwd_hash"] = $new_password_hash;
|
2012-08-16 14:21:35 +00:00
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
if ($user->email) {
|
2019-11-01 12:25:40 +00:00
|
|
|
$mailer = new Mailer();
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2020-03-13 11:40:35 +00:00
|
|
|
$tpl = new Templator();
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2020-03-13 11:40:35 +00:00
|
|
|
$tpl->readTemplateFromFile("password_change_template.txt");
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
$tpl->setVariable('LOGIN', $user->login);
|
2021-02-22 18:47:48 +00:00
|
|
|
$tpl->setVariable('TTRSS_HOST', Config::get(Config::SELF_URL_PATH));
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
$tpl->addBlock('message');
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
$tpl->generateOutputToString($message);
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
$mailer->mail(["to_name" => $user->login,
|
|
|
|
"to_address" => $user->email,
|
2019-11-01 12:25:40 +00:00
|
|
|
"subject" => "[tt-rss] Password change notification",
|
|
|
|
"message" => $message]);
|
2019-10-09 06:04:51 +00:00
|
|
|
|
|
|
|
}
|
2019-11-01 12:25:40 +00:00
|
|
|
|
|
|
|
return __("Password has been changed.");
|
|
|
|
} else {
|
|
|
|
return "ERROR: ".__('Old password is incorrect.');
|
2019-11-01 10:03:06 +00:00
|
|
|
}
|
2019-11-01 12:25:40 +00:00
|
|
|
}
|
2019-10-09 06:04:51 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
private function check_app_password($login, $password, $service) {
|
2020-09-17 05:46:57 +00:00
|
|
|
$sth = $this->pdo->prepare("SELECT p.id, p.pwd_hash, u.id AS uid
|
|
|
|
FROM ttrss_app_passwords p, ttrss_users u
|
2021-02-11 06:57:57 +00:00
|
|
|
WHERE p.owner_uid = u.id AND LOWER(u.login) = LOWER(?) AND service = ?");
|
2019-11-01 12:25:40 +00:00
|
|
|
$sth->execute([$login, $service]);
|
2019-11-01 12:03:57 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
while ($row = $sth->fetch()) {
|
2021-03-01 12:24:18 +00:00
|
|
|
list ($pwd_algo, $raw_hash, $salt) = explode(":", $row["pwd_hash"]);
|
|
|
|
|
|
|
|
$test_hash = UserHelper::hash_password($password, $salt, $pwd_algo);
|
|
|
|
|
|
|
|
if (hash_equals("$pwd_algo:$raw_hash", $test_hash)) {
|
2021-03-01 16:32:27 +00:00
|
|
|
$pass = ORM::for_table('ttrss_app_passwords')->find_one($row["id"]);
|
2021-03-01 20:07:20 +00:00
|
|
|
$pass->last_used = Db::NOW();
|
2019-11-01 12:03:57 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
if ($pwd_algo != UserHelper::HASH_ALGOS[0]) {
|
|
|
|
// upgrade password to current algo
|
|
|
|
Logger::log(E_USER_NOTICE, "Upgrading app password of user $login to " . UserHelper::HASH_ALGOS[0]);
|
2019-11-01 12:03:57 +00:00
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
$new_hash = UserHelper::hash_password($password, $salt);
|
2019-11-01 12:03:57 +00:00
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
if ($new_hash) {
|
2021-03-01 16:32:27 +00:00
|
|
|
$pass->pwd_hash = "$new_hash:$salt";
|
2021-03-01 12:24:18 +00:00
|
|
|
}
|
2019-11-01 12:03:57 +00:00
|
|
|
}
|
2021-03-01 12:24:18 +00:00
|
|
|
|
2021-03-01 16:32:27 +00:00
|
|
|
$pass->save();
|
|
|
|
|
2021-03-01 12:24:18 +00:00
|
|
|
return $row['uid'];
|
2019-11-01 12:03:57 +00:00
|
|
|
}
|
2012-08-16 14:21:35 +00:00
|
|
|
}
|
2013-04-19 13:31:56 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
return false;
|
|
|
|
}
|
2013-04-19 13:31:56 +00:00
|
|
|
|
2019-11-01 12:25:40 +00:00
|
|
|
function api_version() {
|
|
|
|
return 2;
|
2019-11-01 10:03:06 +00:00
|
|
|
}
|
2019-11-01 12:25:40 +00:00
|
|
|
|
|
|
|
}
|