add_hook($host::HOOK_AUTH_USER, $this);
}
/** @param string $service */
function authenticate($login, $password, $service = '') {
$otp = (int) ($_REQUEST["otp"] ?? 0);
// don't bother with null/null logins for auth_external etc
if ($login && get_schema_version() > 96) {
$user_id = UserHelper::find_user_by_login($login);
if ($user_id && UserHelper::is_otp_enabled($user_id)) {
// only allow app passwords for service logins if OTP is enabled
if ($service && get_schema_version() > 138) {
return $this->check_app_password($login, $password, $service);
}
if ($otp) {
/*$base32 = new \OTPHP\Base32();
$secret = $base32->encode(mb_substr(sha1($row["salt"]), 0, 12), false);
$secret_legacy = $base32->encode(sha1($row["salt"]));
$totp = new \OTPHP\TOTP($secret);
$otp_check = $totp->now();
$totp_legacy = new \OTPHP\TOTP($secret_legacy);
$otp_check_legacy = $totp_legacy->now();
if ($otp !== $otp_check && $otp !== $otp_check_legacy) {
return false;
} */
if ($this->check_password($user_id, $password) && UserHelper::check_otp($user_id, $otp))
return $user_id;
else
return false;
} else {
$return = urlencode($_REQUEST["return"]);
?>
Tiny Tiny RSS
= __("Authentication") ?>
138) {
$user_id = $this->check_app_password($login, $password, $service);
if ($user_id)
return $user_id;
}
if ($login) {
$try_user_id = $this->find_user_by_login($login);
if ($try_user_id) {
return $this->check_password($try_user_id, $password);
}
}
return false;
}
function check_password(int $owner_uid, string $password, string $service = '') {
$user = ORM::for_table('ttrss_users')->find_one($owner_uid);
if ($user) {
// don't throttle app passwords
if (!$service && get_schema_version() >= 145) {
if ($user->last_auth_attempt) {
$last_auth_attempt = strtotime($user->last_auth_attempt);
if ($last_auth_attempt && time() - $last_auth_attempt < Config::get(Config::AUTH_MIN_INTERVAL)) {
Logger::log(E_USER_NOTICE, "Too many authentication attempts for {$user->login}, throttled.");
// start an empty session to deliver login error message
if (session_status() != PHP_SESSION_ACTIVE)
session_start();
$_SESSION["login_error_msg"] = __("Too many authentication attempts, throttled.");
$user->last_auth_attempt = Db::NOW();
$user->save();
return false;
}
}
$user->last_auth_attempt = Db::NOW();
$user->save();
}
$salt = $user['salt'] ?? "";
$login = $user['login'];
$pwd_hash = $user['pwd_hash'];
list ($pwd_algo, $raw_hash) = explode(":", $pwd_hash, 2);
// check app password only if service is specified
if ($service && get_schema_version() > 138) {
return $this->check_app_password($login, $password, $service);
}
$test_hash = UserHelper::hash_password($password, $salt, $pwd_algo);
if (hash_equals($pwd_hash, $test_hash)) {
if ($pwd_algo != UserHelper::HASH_ALGOS[0]) {
Logger::log(E_USER_NOTICE, "Upgrading password of user $login to " . UserHelper::HASH_ALGOS[0]);
$new_hash = UserHelper::hash_password($password, $salt, UserHelper::HASH_ALGOS[0]);
if ($new_hash) {
$usth = $this->pdo->prepare("UPDATE ttrss_users SET pwd_hash = ? WHERE id = ?");
$usth->execute([$new_hash, $owner_uid]);
}
}
return $owner_uid;
}
}
return false;
}
function change_password($owner_uid, $old_password, $new_password) {
if ($this->check_password($owner_uid, $old_password)) {
$new_salt = UserHelper::get_salt();
$new_password_hash = UserHelper::hash_password($new_password, $new_salt, UserHelper::HASH_ALGOS[0]);
$user = ORM::for_table('ttrss_users')->find_one($owner_uid);
$user->salt = $new_salt;
$user->pwd_hash = $new_password_hash;
$user->save();
if ($_SESSION["uid"] ?? 0 == $owner_uid)
$_SESSION["pwd_hash"] = $new_password_hash;
if ($user->email) {
$mailer = new Mailer();
$tpl = new Templator();
$tpl->readTemplateFromFile("password_change_template.txt");
$tpl->setVariable('LOGIN', $user->login);
$tpl->setVariable('TTRSS_HOST', Config::get(Config::SELF_URL_PATH));
$tpl->addBlock('message');
$tpl->generateOutputToString($message);
$mailer->mail(["to_name" => $user->login,
"to_address" => $user->email,
"subject" => "[tt-rss] Password change notification",
"message" => $message]);
}
return __("Password has been changed.");
} else {
return "ERROR: ".__('Old password is incorrect.');
}
}
private function check_app_password($login, $password, $service) {
$sth = $this->pdo->prepare("SELECT p.id, p.pwd_hash, u.id AS uid
FROM ttrss_app_passwords p, ttrss_users u
WHERE p.owner_uid = u.id AND LOWER(u.login) = LOWER(?) AND service = ?");
$sth->execute([$login, $service]);
while ($row = $sth->fetch()) {
list ($pwd_algo, $raw_hash, $salt) = explode(":", $row["pwd_hash"]);
$test_hash = UserHelper::hash_password($password, $salt, $pwd_algo);
if (hash_equals("$pwd_algo:$raw_hash", $test_hash)) {
$pass = ORM::for_table('ttrss_app_passwords')->find_one($row["id"]);
$pass->last_used = Db::NOW();
if ($pwd_algo != UserHelper::HASH_ALGOS[0]) {
// upgrade password to current algo
Logger::log(E_USER_NOTICE, "Upgrading app password of user $login to " . UserHelper::HASH_ALGOS[0]);
$new_hash = UserHelper::hash_password($password, $salt);
if ($new_hash) {
$pass->pwd_hash = "$new_hash:$salt";
}
}
$pass->save();
return $row['uid'];
}
}
return false;
}
function api_version() {
return 2;
}
}