1
|
|
|
<?php |
2
|
|
|
/** |
3
|
|
|
* This file is part of the tiqr project. |
4
|
|
|
* |
5
|
|
|
* The tiqr project aims to provide an open implementation for |
6
|
|
|
* authentication using mobile devices. It was initiated by |
7
|
|
|
* SURFnet and developed by Egeniq. |
8
|
|
|
* |
9
|
|
|
* More information: http://www.tiqr.org |
10
|
|
|
* |
11
|
|
|
* @author Ivo Jansch <[email protected]> |
12
|
|
|
* |
13
|
|
|
* @package tiqr |
14
|
|
|
* |
15
|
|
|
* @license New BSD License - See LICENSE file for details. |
16
|
|
|
* |
17
|
|
|
* @copyright (C) 2010-2011 SURFnet BV |
18
|
|
|
*/ |
19
|
|
|
|
20
|
|
|
use chillerlan\QRCode\QRCode; |
21
|
|
|
use chillerlan\QRCode\QROptions; |
22
|
|
|
use Psr\Log\LoggerInterface; |
23
|
|
|
|
24
|
|
|
/** |
25
|
|
|
* The main Tiqr Service class. |
26
|
|
|
* This is the class that an application interacts with to implement authentication and enrollment using the tiqr |
27
|
|
|
* protocol, used with the tiqr.org mobile authentication apps |
28
|
|
|
* See https://tiqr.org/technical/protocol/ for a specification of the protocol |
29
|
|
|
*/ |
30
|
|
|
class Tiqr_Service |
31
|
|
|
{ |
32
|
|
|
/** |
33
|
|
|
* @internal Various variables internal to the service class |
34
|
|
|
*/ |
35
|
|
|
/** @var array */ |
36
|
|
|
protected $_options; |
37
|
|
|
|
38
|
|
|
/** @var string */ |
39
|
|
|
protected $_protocolAuth; |
40
|
|
|
/** @var string */ |
41
|
|
|
protected $_protocolEnroll; |
42
|
|
|
/** @var string */ |
43
|
|
|
protected $_identifier; |
44
|
|
|
/** @var string */ |
45
|
|
|
protected $_ocraSuite; |
46
|
|
|
/** @var string */ |
47
|
|
|
protected $_name; |
48
|
|
|
/** @var string */ |
49
|
|
|
protected $_logoUrl; |
50
|
|
|
/** @var string */ |
51
|
|
|
protected $_infoUrl; |
52
|
|
|
/** @var int */ |
53
|
|
|
protected $_protocolVersion; |
54
|
|
|
/** @var Tiqr_StateStorage_StateStorageInterface */ |
55
|
|
|
protected $_stateStorage; |
56
|
|
|
/** @var Tiqr_DeviceStorage_Abstract */ |
57
|
|
|
protected $_deviceStorage; |
58
|
|
|
/** @var Tiqr_OcraService_Interface */ |
59
|
|
|
protected $_ocraService; |
60
|
|
|
/** @var string */ |
61
|
|
|
protected $_stateStorageSalt; // The salt used for creating stable hashes for use with the StateStorage |
62
|
|
|
|
63
|
|
|
/** @var LoggerInterface */ |
64
|
|
|
private $logger; |
65
|
|
|
|
66
|
|
|
/** |
67
|
|
|
* Enrollment status codes |
68
|
|
|
*/ |
69
|
|
|
// IDLE: There is no enrollment going on in this session, or there was an error getting the enrollment status |
70
|
|
|
const ENROLLMENT_STATUS_IDLE = 1; |
71
|
|
|
// INITIALIZED: The enrollment session was started, but the tiqr client has not retrieved the metadata yet |
72
|
|
|
const ENROLLMENT_STATUS_INITIALIZED = 2; |
73
|
|
|
// RETRIEVED: The tiqr client has retrieved the metadata |
74
|
|
|
const ENROLLMENT_STATUS_RETRIEVED = 3; |
75
|
|
|
// PROCESSED: The tiqr client has sent back the tiqr authentication secret |
76
|
|
|
const ENROLLMENT_STATUS_PROCESSED = 4; |
77
|
|
|
// FINALIZED: The server has stored the authentication secret |
78
|
|
|
const ENROLLMENT_STATUS_FINALIZED = 5; |
79
|
|
|
// VALIDATED: A first successful authentication was performed |
80
|
|
|
// Note: Not currently used |
81
|
|
|
const ENROLLMENT_STATUS_VALIDATED = 6; |
82
|
|
|
|
83
|
|
|
/** |
84
|
|
|
* Prefixes for StateStorage keys |
85
|
|
|
*/ |
86
|
|
|
const PREFIX_ENROLLMENT_SECRET = 'enrollsecret'; |
87
|
|
|
const PREFIX_ENROLLMENT = 'enroll'; |
88
|
|
|
const PREFIX_CHALLENGE = 'challenge'; |
89
|
|
|
const PREFIX_ENROLLMENT_STATUS = 'enrollstatus'; |
90
|
|
|
const PREFIX_AUTHENTICATED = 'authenticated_'; |
91
|
|
|
|
92
|
|
|
/** |
93
|
|
|
* Default timeout values |
94
|
|
|
*/ |
95
|
|
|
const LOGIN_EXPIRE = 3600; // Logins timeout after an hour |
96
|
|
|
const ENROLLMENT_EXPIRE = 300; // If enrollment isn't completed within 5 minutes, we discard data |
97
|
|
|
const CHALLENGE_EXPIRE = 180; // If login is not performed within 3 minutes, we discard the challenge |
98
|
|
|
|
99
|
|
|
/** |
100
|
|
|
* Authentication result codes |
101
|
|
|
*/ |
102
|
|
|
// INVALID_REQUEST: Not currently used by the Tiqr_service |
103
|
|
|
const AUTH_RESULT_INVALID_REQUEST = 1; |
104
|
|
|
// AUTHENTICATED: The user was successfully authenticated |
105
|
|
|
const AUTH_RESULT_AUTHENTICATED = 2; |
106
|
|
|
// INVALID_RESPONSE: The response that was returned by the client was not correct |
107
|
|
|
const AUTH_RESULT_INVALID_RESPONSE = 3; |
108
|
|
|
// INVALID_CHALLENGE: The server could find the challenge in its state storage. It may have been expired or the |
109
|
|
|
// client could have sent an invalid sessionKey |
110
|
|
|
const AUTH_RESULT_INVALID_CHALLENGE = 4; |
111
|
|
|
// INVALID_USERID: The client authenticated a different user than the server expected. This error is returned when |
112
|
|
|
// the application stated an authentication session specifying the userId and later during the authentication |
113
|
|
|
// provides a different userId |
114
|
|
|
const AUTH_RESULT_INVALID_USERID = 5; |
115
|
|
|
|
116
|
|
|
/** |
117
|
|
|
* The default OCRA Suite (RFC 6287) to use for authentication in Tiqr |
118
|
|
|
* This basically calculates the HMAC-SHA1 over a buffer with: |
119
|
|
|
* - A 10 hex digit long challenge |
120
|
|
|
* - authentication session ID (32 hex digits) |
121
|
|
|
* - client secret key (64 hex digits) |
122
|
|
|
* and then from the calculated HMAC-SHA1 calculates a 6 decimal digit long response |
123
|
|
|
* |
124
|
|
|
* Refer to the included SECURITY.md for security consideration |
125
|
|
|
*/ |
126
|
|
|
const DEFAULT_OCRA_SUITE = "OCRA-1:HOTP-SHA1-6:QH10-S"; |
127
|
|
|
|
128
|
|
|
/** |
129
|
|
|
* session keys are used in multiple places during authentication and enrollment |
130
|
|
|
* and are generated by _uniqueSessionKey() using a secure pseudo-random number generator |
131
|
|
|
* SESSION_KEY_LENGTH_BYTES specifies the number of bytes of entropy in these keys. |
132
|
|
|
* The OCRA session keys are HEX encoded, so a 16 byte key (128 bits) will be 32 characters long |
133
|
|
|
*/ |
134
|
|
|
const SESSION_KEY_LENGTH_BYTES = 16; |
135
|
|
|
|
136
|
|
|
/** |
137
|
|
|
* Construct an instance of the Tiqr_Service. |
138
|
|
|
* The server is configured using an array of options. All options have |
139
|
|
|
* reasonable defaults but it's recommended to at least specify a custom |
140
|
|
|
* name and identifier and a randomly generated sessions secret. |
141
|
|
|
* If you use the Tiqr Service with your own apps, you must also specify |
142
|
|
|
* a custom auth.protocol and enroll.protocol specifier. |
143
|
|
|
* |
144
|
|
|
* The options are: |
145
|
|
|
* - auth.protocol: The protocol specifier that the server uses to communicate challenge urls to the |
146
|
|
|
* iOS/Android tiqr app. This must match the url handler configuration in the app's build |
147
|
|
|
* settings. |
148
|
|
|
* Default: "tiqr". |
149
|
|
|
* Two formats are supported: |
150
|
|
|
* 1. Custom URL scheme: Set the scheme's name. E.g. "tiqrauth". Do not add '://'. |
151
|
|
|
* This will generate authentication URLs of the form: |
152
|
|
|
* tiqrauth://<userId>@<idp_identifier>/<session_key>/<challenge>/<sp_idenitfier>/<version> |
153
|
|
|
* 2. Universal link: Set the http or https URL. E.g. "https://tiqr.org/tiqrauth/" |
154
|
|
|
* This will generate authentication URLs of the form: |
155
|
|
|
* https://tiqr.org/tiqrauth/?u=<userid>&s=<session_key>&q=<challenge/question>&i=<idp_identifier>&v=<version> |
156
|
|
|
* |
157
|
|
|
* - enroll.protocol: The protocol specifier that the server uses to start the enrollment of a new account in the |
158
|
|
|
* iOS/Android tiqr app. This must match the url handler configuration in the app's build |
159
|
|
|
* settings. |
160
|
|
|
* Default: "tiqrenroll" |
161
|
|
|
* Two formats are supported: |
162
|
|
|
* 1. Custom URL scheme: Set the protocol name. E.g. "tiqrenroll". Do not add '://'. |
163
|
|
|
* This will generate enrollment URLs of the form: |
164
|
|
|
* tiqrenroll://<metadata URL> |
165
|
|
|
* 2. Universal link: Set the http or https URL. "https://tiqr.org/tiqrenroll/" |
166
|
|
|
* This will generate enrollment URLs of the form: |
167
|
|
|
* https://eduid.nl/tiqrenroll/?metadata=<URL encoded metadata URL> |
168
|
|
|
* |
169
|
|
|
* - ocra.suite: The OCRA suite to use. Defaults to DEFAULT_OCRA_SUITE. |
170
|
|
|
* |
171
|
|
|
* - identifier: A short ASCII identifier for your service. Defaults to the SERVER_NAME of the server. This is what |
172
|
|
|
* a tiqr client will use to identify the server. |
173
|
|
|
* - name: A longer description of your service. Defaults to the SERVER_NAME of the server. A descriptive name for |
174
|
|
|
* display purposes |
175
|
|
|
* |
176
|
|
|
* - logoUrl: A full http url pointing to a logo for your service. |
177
|
|
|
* - infoUrl: An http url pointing to an info page of your service |
178
|
|
|
* |
179
|
|
|
* - ocraservice: Configuration for the OcraService to use. |
180
|
|
|
* - type: The ocra service type. (default: "tiqr") |
181
|
|
|
* - parameters depending on the ocra service. See classes inside to OcraService directory for |
182
|
|
|
* supported types and their parameters. |
183
|
|
|
* |
184
|
|
|
* - statestorage: An array with the configuration of the storage for temporary data. It has the following sub keys: |
185
|
|
|
* - type: The type of state storage. (default: "file") |
186
|
|
|
* - salt: The salt is used to hash the keys used the StateStorage |
187
|
|
|
* - parameters depending on the storage. See the classes inside the StateStorage folder for |
188
|
|
|
* supported types and their parameters. |
189
|
|
|
* |
190
|
|
|
* |
191
|
|
|
* * For sending push notifications using the Apple push notification service (APNS) |
192
|
|
|
* - apns.certificate: The location of the file with the Apple push notification client certificate and private key |
193
|
|
|
* in PEM format. |
194
|
|
|
* Defaults to ../certificates/cert.pem |
195
|
|
|
* - apns.environment: Whether to use apple's "sandbox" or "production" apns environment |
196
|
|
|
* - apns.version: Which version of the APNS protocol to use. Default: 2 |
197
|
|
|
* Version 1 is the deprecated binary APNS protocol and is no longer supported |
198
|
|
|
* Version 2: The HTTP/2 based protocol (api.push.apple.com) |
199
|
|
|
* - apns.proxy_host_url: Use a HTTP/1.1 to HTTP/2 proxy to send the apns.version 2 push notification. |
200
|
|
|
* Note: The proxy must take care of the TLS Client authentication to the APNS server |
201
|
|
|
* Note: The apns.environment will have no effect, configure this in the proxy |
202
|
|
|
* Specify the host URL as scheme + hostname. E.g.: "http://localhost" |
203
|
|
|
* - apns.proxy_host_port: Set the proxy port to use with proxy_host_url. Optional. Defaults to 443. |
204
|
|
|
* |
205
|
|
|
* * For sending push notifications to Android devices using Google's firebase cloud messaging (FCM) API |
206
|
|
|
* - firebase.projectId: String containing the FCM project ID |
207
|
|
|
* - firebase.credentialsFile: the name of the json file containing the service account key |
208
|
|
|
* |
209
|
|
|
* - devicestorage: An array with the configuration of the storage for device push notification tokens. Only |
210
|
|
|
* necessary if you use the Tiqr Service to authenticate an already known userId (e.g. when using |
211
|
|
|
* tiqr a second authentication factor AND are using a tiqr client that uses the token exchange. |
212
|
|
|
* It has the following |
213
|
|
|
* keys: |
214
|
|
|
* - type: The type of storage. (default: "dummy") |
215
|
|
|
* - parameters depending on the storage. See the classes inside the DeviceStorage folder for |
216
|
|
|
* supported types and their parameters. |
217
|
|
|
** |
218
|
|
|
* @param LoggerInterface $logger |
219
|
|
|
* @param array $options |
220
|
|
|
* @param int $version The tiqr protocol version to use (defaults to the latest) |
221
|
|
|
* @throws Exception |
222
|
|
|
*/ |
223
|
8 |
|
public function __construct(LoggerInterface $logger, array $options=array(), int $version = 2) |
224
|
|
|
{ |
225
|
8 |
|
$this->_options = $options; // Used to later get settings for Tiqr_Message_* |
226
|
8 |
|
$this->logger = $logger; |
227
|
8 |
|
$this->_protocolAuth = $options["auth.protocol"] ?? 'tiqr'; |
228
|
8 |
|
$this->_protocolEnroll = $options["enroll.protocol"] ?? 'tiqrenroll'; |
229
|
8 |
|
$this->_ocraSuite = $options["ocra.suite"] ?? self::DEFAULT_OCRA_SUITE; |
230
|
8 |
|
$this->_identifier = $options["identifier"] ?? $_SERVER["SERVER_NAME"]; |
231
|
8 |
|
$this->_name = $options["name"] ?? $_SERVER["SERVER_NAME"]; |
232
|
8 |
|
$this->_logoUrl = $options["logoUrl"] ?? ''; |
233
|
8 |
|
$this->_infoUrl = $options["infoUrl"] ?? ''; |
234
|
|
|
|
235
|
|
|
// An idea is to create getStateStorage, getDeviceStorage and getOcraService functions to create these functions |
236
|
|
|
// at the point that we actually need them. |
237
|
|
|
|
238
|
|
|
// Create StateStorage |
239
|
8 |
|
if (!isset($options["statestorage"])) { |
240
|
|
|
throw new RuntimeException('No state storage configuration is configured, please provide one'); |
241
|
|
|
} |
242
|
8 |
|
$this->_stateStorage = Tiqr_StateStorage::getStorage($options["statestorage"]["type"], $options["statestorage"], $logger); |
243
|
|
|
// Set a default salt, with the SESSION_KEY_LENGTH_BYTES (16) length keys we're using a publicly |
244
|
|
|
// known salt already gives excellent protection. |
245
|
7 |
|
$this->_stateStorageSalt = $options["statestorage"]['salt'] ?? '8xwk2pFd'; |
246
|
|
|
|
247
|
|
|
// Create DeviceStorage - required when using Push Notification with a token exchange |
248
|
7 |
|
if (isset($options["devicestorage"])) { |
249
|
6 |
|
$this->_deviceStorage = Tiqr_DeviceStorage::getStorage($options["devicestorage"]["type"], $options["devicestorage"], $logger); |
250
|
|
|
} else { |
251
|
1 |
|
$this->_deviceStorage = Tiqr_DeviceStorage::getStorage('dummy', array(), $logger); |
252
|
|
|
} |
253
|
|
|
|
254
|
|
|
// Set Tiqr protocol version, only version 2 is currently supported |
255
|
7 |
|
if ($version !== 2) { |
256
|
|
|
throw new Exception("Unsupported protocol version '$version'"); |
257
|
|
|
} |
258
|
7 |
|
$this->_protocolVersion = $version; |
259
|
|
|
|
260
|
|
|
// Create OcraService |
261
|
|
|
// Library versions before 3.0 (confusingly) used the usersecretstorage key for this configuration |
262
|
|
|
// and used 'tiqr' as type when no type explicitly set to oathserviceclient was configured |
263
|
7 |
|
if (isset($options['ocraservice']) && $options['ocraservice']['type'] != 'tiqr') { |
264
|
|
|
$options['ocraservice']['ocra.suite'] = $this->_ocraSuite; |
265
|
|
|
$this->_ocraService = Tiqr_OcraService::getOcraService($options['ocraservice']['type'], $options['ocraservice'], $logger); |
266
|
|
|
} |
267
|
|
|
else { // Create default ocraservice |
268
|
7 |
|
$this->_ocraService = Tiqr_OcraService::getOcraService('tiqr', array('ocra.suite' => $this->_ocraSuite), $logger); |
269
|
|
|
} |
270
|
|
|
} |
271
|
|
|
|
272
|
|
|
/** |
273
|
|
|
* Get the identifier of the service. |
274
|
|
|
* @return String identifier |
275
|
|
|
*/ |
276
|
4 |
|
public function getIdentifier(): string |
277
|
|
|
{ |
278
|
4 |
|
return $this->_identifier; |
279
|
|
|
} |
280
|
|
|
|
281
|
|
|
/** |
282
|
|
|
* Generate an authentication challenge QR image in PNG format and send it directly to |
283
|
|
|
* the PHP output buffer |
284
|
|
|
* |
285
|
|
|
* You are responsible for sending the "Content-type: image/png" HTTP header when sending this output to a |
286
|
|
|
* webbrowser, e.g.: header('Content-type: image/png') |
287
|
|
|
* |
288
|
|
|
* @param String $sessionKey The sessionKey identifying this auth session (typically returned by startAuthenticationSession) |
289
|
|
|
* @throws Exception |
290
|
|
|
* |
291
|
|
|
* @see generateAuthURL |
292
|
|
|
* |
293
|
|
|
*/ |
294
|
|
|
public function generateAuthQR(string $sessionKey): void |
295
|
|
|
{ |
296
|
|
|
$challengeUrl = $this->_getChallengeUrl($sessionKey); |
297
|
|
|
|
298
|
|
|
$this->generateQR($challengeUrl); |
299
|
|
|
} |
300
|
|
|
|
301
|
|
|
/** |
302
|
|
|
* Generate a QR image in PNG format and send it directly to |
303
|
|
|
* the PHP output buffer |
304
|
|
|
* |
305
|
|
|
* You are responsible for sending the "Content-type: image/png" HTTP header when sending this output to a |
306
|
|
|
* webbrowser, e.g.: header('Content-type: image/png') |
307
|
|
|
* |
308
|
|
|
* @param String $s The string to be encoded in the QR image |
309
|
|
|
*/ |
310
|
|
|
public function generateQR(string $s): void |
311
|
|
|
{ |
312
|
|
|
try { |
313
|
|
|
$options = new QROptions; |
314
|
|
|
$options->imageBase64 = false; // output raw image instead of base64 data URI |
315
|
|
|
$options->eccLevel = QRCode::ECC_L; |
316
|
|
|
$options->outputType = QRCode::OUTPUT_IMAGE_PNG; |
317
|
|
|
$options->scale = 5; |
318
|
|
|
|
319
|
|
|
echo (new QRCode($options))->render($s); |
320
|
|
|
} catch (Exception $e) { |
321
|
|
|
$this->logger->error( |
322
|
|
|
"Error generating QR code", |
323
|
|
|
array('exception' =>$e) |
324
|
|
|
); |
325
|
|
|
throw $e; |
326
|
|
|
} |
327
|
|
|
} |
328
|
|
|
|
329
|
|
|
/** |
330
|
|
|
* Send a push notification to a user containing an authentication challenge |
331
|
|
|
* @param String $sessionKey The session key identifying this authentication session |
332
|
|
|
* @param String $notificationType Notification type returned by the tiqr client: APNS, GCM, FCM, APNS_DIRECT or FCM_DIRECT |
333
|
|
|
* @param String $notificationAddress Notification address, e.g. device token, phone number etc. |
334
|
|
|
** |
335
|
|
|
* @throws Exception |
336
|
|
|
*/ |
337
|
|
|
public function sendAuthNotification(string $sessionKey, string $notificationType, string $notificationAddress): void |
338
|
|
|
{ |
339
|
|
|
$message = NULL; |
340
|
|
|
try { |
341
|
|
|
switch ($notificationType) { |
342
|
|
|
case 'APNS': |
343
|
|
|
case 'APNS_DIRECT': |
344
|
|
|
$apns_version = $this->_options['apns.version'] ?? 2; |
345
|
|
|
if ($apns_version !=2) |
346
|
|
|
throw new InvalidArgumentException("Unsupported APNS version '$apns_version'"); |
347
|
|
|
$message = new Tiqr_Message_APNS2($this->_options, $this->logger); |
348
|
|
|
break; |
349
|
|
|
|
350
|
|
|
case 'GCM': |
351
|
|
|
case 'FCM': |
352
|
|
|
case 'FCM_DIRECT': |
353
|
|
|
$message = new Tiqr_Message_FCM($this->_options, $this->logger); |
354
|
|
|
break; |
355
|
|
|
|
356
|
|
|
default: |
357
|
|
|
throw new InvalidArgumentException("Unsupported notification type '$notificationType'"); |
358
|
|
|
} |
359
|
|
|
|
360
|
|
|
// Authentication timeout in seconds to send as payload in the push notification to the client. The Tiqr client |
361
|
|
|
// can use this value to stop offering the authentication to the user. |
362
|
|
|
// Use CHALLENGE_EXPIRE - 30 seconds as the maximum timeout to send to the client. This gives the user 30 seconds |
363
|
|
|
// before the authentication session expires at the server. Never send an authenticationTimeout of less than 30 seconds. |
364
|
|
|
$authenticationTimeout = max( 30, self::CHALLENGE_EXPIRE - 30); |
365
|
|
|
|
366
|
|
|
$this->logger->info(sprintf('Creating and sending a %s push notification', $notificationType)); |
367
|
|
|
$message->setId(time()); |
368
|
|
|
$message->setText("Please authenticate for " . $this->_name); |
369
|
|
|
$message->setAddress($notificationAddress); |
370
|
|
|
$message->setCustomProperty('challenge', $this->_getChallengeUrl($sessionKey)); |
371
|
|
|
$message->setCustomProperty('authenticationTimeout', $authenticationTimeout); |
372
|
|
|
$message->send(); |
373
|
|
|
} catch (Exception $e) { |
374
|
|
|
$this->logger->error( |
375
|
|
|
sprintf('Sending "%s" push notification to address "%s" failed', $notificationType, $notificationAddress), |
376
|
|
|
array('exception' =>$e) |
377
|
|
|
); |
378
|
|
|
throw $e; |
379
|
|
|
} |
380
|
|
|
} |
381
|
|
|
|
382
|
|
|
/** |
383
|
|
|
* Generate an authentication challenge URL. |
384
|
|
|
* This URL can be used to link directly to the authentication |
385
|
|
|
* application, for example to create a link in a mobile website on the |
386
|
|
|
* same device as where the application is installed |
387
|
|
|
* |
388
|
|
|
* Opening the URL in the authentication application start the authentication |
389
|
|
|
* of a previously enrolled account. |
390
|
|
|
* |
391
|
|
|
* You can encode this URL in a QR code to scan it in the Tiqr app using you own |
392
|
|
|
* QR code library, or use generateQR() |
393
|
|
|
* |
394
|
|
|
* |
395
|
|
|
* @param String $sessionKey The session key identifying this authentication session |
396
|
|
|
* |
397
|
|
|
* @return string Authentication URL for the tiqr client |
398
|
|
|
* @throws Exception |
399
|
|
|
* |
400
|
|
|
* @see Tiqr_Service::generateQR() |
401
|
|
|
*/ |
402
|
3 |
|
public function generateAuthURL(string $sessionKey): string |
403
|
|
|
{ |
404
|
3 |
|
$challengeUrl = $this->_getChallengeUrl($sessionKey); |
405
|
|
|
|
406
|
3 |
|
return $challengeUrl; |
407
|
|
|
} |
408
|
|
|
|
409
|
|
|
/** |
410
|
|
|
* Start an authentication session. This generates a challenge for this |
411
|
|
|
* session and stores it in memory. The returned sessionKey should be used |
412
|
|
|
* throughout the authentication process. |
413
|
|
|
* |
414
|
|
|
* @param String $userId The userId of the user to authenticate (optional), if this is left empty the |
415
|
|
|
* the client decides |
416
|
|
|
* @param String $sessionId The session id the application uses to identify its user sessions; |
417
|
|
|
* (optional defaults to the php session id). |
418
|
|
|
* This sessionId can later be used to get the authenticated user from the application |
419
|
|
|
* using getAuthenticatedUser(), or to clear the authentication state using logout() |
420
|
|
|
* @param String $spIdentifier If SP and IDP are 2 different things, pass the url/identifier of the SP the user is logging into. |
421
|
|
|
* For setups where IDP==SP, just leave this blank. |
422
|
|
|
* @return string The authentication sessionKey |
423
|
|
|
* @throws Exception when starting the authentication session failed |
424
|
|
|
*/ |
425
|
3 |
|
public function startAuthenticationSession(string $userId="", string $sessionId="", string $spIdentifier=""): string |
426
|
|
|
{ |
427
|
3 |
|
if ($sessionId=="") { |
428
|
2 |
|
$sessionId = session_id(); |
429
|
|
|
} |
430
|
|
|
|
431
|
3 |
|
if ($spIdentifier=="") { |
432
|
3 |
|
$spIdentifier = $this->_identifier; |
433
|
|
|
} |
434
|
|
|
|
435
|
3 |
|
$sessionKey = $this->_uniqueSessionKey(); |
436
|
3 |
|
$challenge = $this->_ocraService->generateChallenge(); |
437
|
|
|
|
438
|
3 |
|
$data = array("sessionId"=>$sessionId, "challenge"=>$challenge, "spIdentifier" => $spIdentifier); |
439
|
|
|
|
440
|
3 |
|
if ($userId!="") { |
441
|
2 |
|
$data["userId"] = $userId; |
442
|
|
|
} |
443
|
|
|
|
444
|
3 |
|
$this->_setStateValue(self::PREFIX_CHALLENGE, $sessionKey, $data, self::CHALLENGE_EXPIRE); |
445
|
|
|
|
446
|
3 |
|
return $sessionKey; |
447
|
|
|
} |
448
|
|
|
|
449
|
|
|
/** |
450
|
|
|
* Start an enrollment session. This can either be the enrollment of a new |
451
|
|
|
* user or of an existing user, there is no difference from Tiqr's point |
452
|
|
|
* of view. |
453
|
|
|
* |
454
|
|
|
* The call returns the temporary enrollmentKey that the phone needs to |
455
|
|
|
* retrieve the metadata; you must therefor embed this key in the metadata |
456
|
|
|
* URL that you communicate to the phone. |
457
|
|
|
* |
458
|
|
|
* @param String $userId The user's id |
459
|
|
|
* @param String $displayName The user's full name |
460
|
|
|
* @param String $sessionId The application's session identifier (defaults to php session) |
461
|
|
|
* @return String The enrollment key |
462
|
|
|
* @throws Exception when start the enrollement session failed |
463
|
|
|
*/ |
464
|
2 |
|
public function startEnrollmentSession(string $userId, string $displayName, string $sessionId=""): string |
465
|
|
|
{ |
466
|
2 |
|
if ($sessionId=="") { |
467
|
1 |
|
$sessionId = session_id(); |
468
|
|
|
} |
469
|
2 |
|
$enrollmentKey = $this->_uniqueSessionKey(); |
470
|
2 |
|
$data = [ |
471
|
2 |
|
"userId" => $userId, |
472
|
2 |
|
"displayName" => $displayName, |
473
|
2 |
|
"sessionId" => $sessionId |
474
|
2 |
|
]; |
475
|
2 |
|
$this->_setStateValue(self::PREFIX_ENROLLMENT, $enrollmentKey, $data, self::ENROLLMENT_EXPIRE); |
476
|
2 |
|
$this->_setEnrollmentStatus($sessionId, self::ENROLLMENT_STATUS_INITIALIZED); |
477
|
|
|
|
478
|
2 |
|
return $enrollmentKey; |
479
|
|
|
} |
480
|
|
|
|
481
|
|
|
/** |
482
|
|
|
* Reset an existing enrollment session. (start over) |
483
|
|
|
* @param string $sessionId The application's session identifier (defaults to php session) |
484
|
|
|
* @throws Exception when resetting the session failed |
485
|
|
|
*/ |
486
|
|
|
public function resetEnrollmentSession(string $sessionId=""): void |
487
|
|
|
{ |
488
|
|
|
if ($sessionId=="") { |
489
|
|
|
$sessionId = session_id(); |
490
|
|
|
} |
491
|
|
|
|
492
|
|
|
$this->_setEnrollmentStatus($sessionId, self::ENROLLMENT_STATUS_IDLE); |
493
|
|
|
} |
494
|
|
|
|
495
|
|
|
/** |
496
|
|
|
* Remove enrollment data based on the enrollment key (which is |
497
|
|
|
* encoded in the enrollment QR code). |
498
|
|
|
* |
499
|
|
|
* @param string $enrollmentKey returned by startEnrollmentSession |
500
|
|
|
* @throws Exception when clearing the enrollment state failed |
501
|
|
|
*/ |
502
|
|
|
public function clearEnrollmentState(string $enrollmentKey): void |
503
|
|
|
{ |
504
|
|
|
$value = $this->_getStateValue(self::PREFIX_ENROLLMENT, $enrollmentKey); |
505
|
|
|
if (is_array($value) && array_key_exists('sessionId', $value)) { |
506
|
|
|
// Reset the enrollment session (used for polling the status of the enrollment) |
507
|
|
|
$this->resetEnrollmentSession($value['sessionId']); |
508
|
|
|
} |
509
|
|
|
// Remove the enrollment data for a specific enrollment key |
510
|
|
|
$this->_unsetStateValue(self::PREFIX_ENROLLMENT, $enrollmentKey); |
511
|
|
|
} |
512
|
|
|
|
513
|
|
|
/** |
514
|
|
|
* Retrieve the enrollment status of an enrollment session. |
515
|
|
|
* |
516
|
|
|
* @param String $sessionId the application's session identifier |
517
|
|
|
* (defaults to php session) |
518
|
|
|
* @return int Enrollment status. |
519
|
|
|
* @see Tiqr_Service for a definitation of the enrollment status codes |
520
|
|
|
* |
521
|
|
|
* @throws Exception when an error communicating with the state storage backend was detected |
522
|
|
|
*/ |
523
|
1 |
|
public function getEnrollmentStatus(string $sessionId=""): int |
524
|
|
|
{ |
525
|
1 |
|
if ($sessionId=="") { |
526
|
|
|
$sessionId = session_id(); |
527
|
|
|
} |
528
|
1 |
|
$status = $this->_getStateValue(self::PREFIX_ENROLLMENT_STATUS, $sessionId); |
529
|
1 |
|
if (is_null($status)) return self::ENROLLMENT_STATUS_IDLE; |
530
|
1 |
|
return $status; |
531
|
|
|
} |
532
|
|
|
|
533
|
|
|
/** |
534
|
|
|
* Generate an enrollment QR code in PNG format and send it to the PHP |
535
|
|
|
* output buffer |
536
|
|
|
* |
537
|
|
|
* You are responsible for sending the "Content-type: image/png" HTTP header, e.g.: |
538
|
|
|
* header('Content-type: image/png') |
539
|
|
|
* |
540
|
|
|
* @param String $metadataUrl The URL you provide to the phone to retrieve |
541
|
|
|
* metadata. This URL must contain the enrollmentKey |
542
|
|
|
* provided by startEnrollmentSession (you can choose |
543
|
|
|
* the variable name as you are responsible yourself |
544
|
|
|
* for retrieving this from the request and passing it |
545
|
|
|
* on to the Tiqr server. |
546
|
|
|
* @throws Exception |
547
|
|
|
* @see Tiqr_Service::generateEnrollString() |
548
|
|
|
* |
549
|
|
|
*/ |
550
|
|
|
public function generateEnrollmentQR(string $metadataUrl): void |
551
|
|
|
{ |
552
|
|
|
$enrollmentString = $this->_getEnrollString($metadataUrl); |
553
|
|
|
|
554
|
|
|
$this->generateQR($enrollmentString); |
555
|
|
|
} |
556
|
|
|
|
557
|
|
|
/** |
558
|
|
|
* Generate an enrollment URL |
559
|
|
|
* |
560
|
|
|
* This URL can be used to link directly to the authentication |
561
|
|
|
* application, for example to create a link in a mobile website on the |
562
|
|
|
* same device as where the application is installed |
563
|
|
|
* |
564
|
|
|
* Opening an enrollment url starts the enrollment process in the |
565
|
|
|
* authentication application (e.g. the Tiqr client) |
566
|
|
|
* |
567
|
|
|
* You can encode this URL in a QR code to scan it in the Tiqr app using you own |
568
|
|
|
* QR code library, or use generateQR() |
569
|
|
|
* |
570
|
|
|
* @return string: The enrollment URL |
571
|
|
|
* |
572
|
|
|
* @see Tiqr_Service::generateQR() |
573
|
|
|
*/ |
574
|
2 |
|
public function generateEnrollString(string $metadataUrl): string |
575
|
|
|
{ |
576
|
2 |
|
return $this->_getEnrollString($metadataUrl); |
577
|
|
|
} |
578
|
|
|
|
579
|
|
|
/** |
580
|
|
|
* Retrieve the metadata for an enrollment session. |
581
|
|
|
* |
582
|
|
|
* When the phone calls the url that you have passed to |
583
|
|
|
* generateEnrollmentQR, you must provide it with the output |
584
|
|
|
* of this function. (Don't forget to json_encode the output.) |
585
|
|
|
* |
586
|
|
|
* Note, you can call this function only once, as the enrollment session |
587
|
|
|
* data will be destroyed as soon as it is retrieved. |
588
|
|
|
* |
589
|
|
|
* When successful the enrollment status will be set to ENROLLMENT_STATUS_RETRIEVED |
590
|
|
|
* |
591
|
|
|
* @param String $enrollmentKey The enrollmentKey that the phone has posted along with its request. |
592
|
|
|
* @param String $authenticationUrl The url you provide to the phone to post authentication responses |
593
|
|
|
* @param String $enrollmentUrl The url you provide to the phone to post the generated user secret. You must include |
594
|
|
|
* a temporary enrollment secret in this URL to make this process secure. |
595
|
|
|
* Use getEnrollmentSecret() to get this secret |
596
|
|
|
* @return array An array of metadata that the phone needs to complete |
597
|
|
|
* enrollment. You must encode it in JSON before you send |
598
|
|
|
* it to the phone. |
599
|
|
|
* @throws Exception when generating the metadata failed |
600
|
|
|
*/ |
601
|
1 |
|
public function getEnrollmentMetadata(string $enrollmentKey, string $authenticationUrl, string $enrollmentUrl): array |
602
|
|
|
{ |
603
|
1 |
|
$data = $this->_getStateValue(self::PREFIX_ENROLLMENT, $enrollmentKey); |
604
|
1 |
|
if (!is_array($data)) { |
605
|
1 |
|
$this->logger->error('Unable to find enrollment metadata in state storage'); |
606
|
1 |
|
throw new Exception('Unable to find enrollment metadata in state storage'); |
607
|
|
|
} |
608
|
|
|
|
609
|
1 |
|
$metadata = array("service"=> |
610
|
1 |
|
array("displayName" => $this->_name, |
611
|
1 |
|
"identifier" => $this->_identifier, |
612
|
1 |
|
"logoUrl" => $this->_logoUrl, |
613
|
1 |
|
"infoUrl" => $this->_infoUrl, |
614
|
1 |
|
"authenticationUrl" => $authenticationUrl, |
615
|
1 |
|
"ocraSuite" => $this->_ocraSuite, |
616
|
1 |
|
"enrollmentUrl" => $enrollmentUrl |
617
|
1 |
|
), |
618
|
1 |
|
"identity"=> |
619
|
1 |
|
array("identifier" =>$data["userId"], |
620
|
1 |
|
"displayName"=>$data["displayName"])); |
621
|
|
|
|
622
|
1 |
|
$this->_unsetStateValue(self::PREFIX_ENROLLMENT, $enrollmentKey); |
623
|
|
|
|
624
|
1 |
|
$this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_RETRIEVED); |
625
|
1 |
|
return $metadata; |
626
|
|
|
} |
627
|
|
|
|
628
|
|
|
/** |
629
|
|
|
* Get a temporary enrollment secret to be able to securely post a user |
630
|
|
|
* secret. |
631
|
|
|
* |
632
|
|
|
* In the last step of the enrollment process the phone will send the OCRA user secret. |
633
|
|
|
* This is the shared secret is used in the authentication process. To prevent an |
634
|
|
|
* attacker from impersonating a user during enrollment and post a user secret that is known to the attacker, |
635
|
|
|
* a temporary enrollment secret is added to the metadata. This secret must be included in the enrollmentUrl that is |
636
|
|
|
* passed to the getMetadata function so that when the client sends the OCRA user secret to the server this |
637
|
|
|
* enrollment secret is included. The server uses the enrollment secret to authenticate the client, and will |
638
|
|
|
* allow only one submission of a user secret for one enrollment secret. |
639
|
|
|
* |
640
|
|
|
* You MUST use validateEnrollmentSecret() to validate enrollment secret that the client sends before accepting |
641
|
|
|
* the associated OCRA client secret |
642
|
|
|
* |
643
|
|
|
* @param String $enrollmentKey The enrollmentKey generated by startEnrollmentSession() at the start of the |
644
|
|
|
* enrollment process. |
645
|
|
|
* @return String The enrollment secret |
646
|
|
|
* @throws Exception when generating the enrollment secret failed |
647
|
|
|
*/ |
648
|
1 |
|
public function getEnrollmentSecret(string $enrollmentKey): string |
649
|
|
|
{ |
650
|
1 |
|
$data = $this->_getStateValue(self::PREFIX_ENROLLMENT, $enrollmentKey); |
651
|
1 |
|
if (!is_array($data)) { |
652
|
|
|
$this->logger->error('getEnrollmentSecret: enrollment key not found'); |
653
|
|
|
throw new RuntimeException('enrollment key not found'); |
654
|
|
|
} |
655
|
1 |
|
$userId = $data["userId"] ?? NULL; |
656
|
1 |
|
$sessionId = $data["sessionId"] ?? NULL; |
657
|
1 |
|
if (!is_string($userId) || !(is_string($sessionId))) { |
658
|
|
|
throw new RuntimeException('getEnrollmentSecret: invalid enrollment data'); |
659
|
|
|
} |
660
|
1 |
|
$enrollmentData = [ |
661
|
1 |
|
"userId" => $userId, |
662
|
1 |
|
"sessionId" => $sessionId |
663
|
1 |
|
]; |
664
|
1 |
|
$enrollmentSecret = $this->_uniqueSessionKey(); |
665
|
1 |
|
$this->_setStateValue( |
666
|
1 |
|
self::PREFIX_ENROLLMENT_SECRET, |
667
|
1 |
|
$enrollmentSecret, |
668
|
1 |
|
$enrollmentData, |
669
|
1 |
|
self::ENROLLMENT_EXPIRE |
670
|
1 |
|
); |
671
|
1 |
|
return $enrollmentSecret; |
672
|
|
|
} |
673
|
|
|
|
674
|
|
|
/** |
675
|
|
|
* Validate if an enrollmentSecret that was passed from the phone is valid. |
676
|
|
|
* |
677
|
|
|
* Note: After validating the enrollmentSecret you must call finalizeEnrollment() to |
678
|
|
|
* invalidate the enrollment secret. |
679
|
|
|
* |
680
|
|
|
* When successful the enrollment state will be set to ENROLLMENT_STATUS_PROCESSED |
681
|
|
|
* |
682
|
|
|
* @param string $enrollmentSecret The enrollmentSecret that the phone posted; it must match |
683
|
|
|
* the enrollmentSecret that was generated using |
684
|
|
|
* getEnrollmentSecret earlier in the process and that the phone |
685
|
|
|
* received as part of the metadata. |
686
|
|
|
* Note that this is not the OCRA user secret that the Phone posts to the server |
687
|
|
|
* @return string The userid of the user that was being enrolled if the enrollment secret is valid. The application |
688
|
|
|
* should use this userid to store the OCRA user secret that the phone posted. |
689
|
|
|
* |
690
|
|
|
* @throws Exception when the validation failed |
691
|
|
|
*/ |
692
|
1 |
|
public function validateEnrollmentSecret(string $enrollmentSecret): string |
693
|
|
|
{ |
694
|
|
|
try { |
695
|
1 |
|
$data = $this->_getStateValue(self::PREFIX_ENROLLMENT_SECRET, $enrollmentSecret); |
696
|
1 |
|
if (NULL === $data) { |
697
|
1 |
|
throw new RuntimeException('Enrollment secret not found'); |
698
|
|
|
} |
699
|
1 |
|
if ( !is_array($data) || !is_string($data["userId"] ?? NULL)) { |
700
|
|
|
throw new RuntimeException('Invalid enrollment data'); |
701
|
|
|
} |
702
|
|
|
|
703
|
|
|
// Secret is valid, application may accept the user secret. |
704
|
1 |
|
$this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_PROCESSED); |
705
|
1 |
|
return $data["userId"]; |
706
|
1 |
|
} catch (Exception $e) { |
707
|
1 |
|
$this->logger->error('Validation of enrollment secret failed', array('exception' => $e)); |
708
|
1 |
|
throw $e; |
709
|
|
|
} |
710
|
|
|
} |
711
|
|
|
|
712
|
|
|
/** |
713
|
|
|
* Finalize the enrollment process. |
714
|
|
|
* |
715
|
|
|
* Invalidates $enrollmentSecret |
716
|
|
|
* |
717
|
|
|
* Call this after validateEnrollmentSecret |
718
|
|
|
* When successfull the enrollment state will be set to ENROLLMENT_STATUS_FINALIZED |
719
|
|
|
* |
720
|
|
|
* @param String The enrollment secret that was posted by the phone. This is the same secret used in the call to |
721
|
|
|
* validateEnrollmentSecret() |
722
|
|
|
* @return bool true when finalize was successful, false otherwise |
723
|
|
|
* |
724
|
|
|
* Does not throw |
725
|
|
|
*/ |
726
|
1 |
|
public function finalizeEnrollment(string $enrollmentSecret): bool |
727
|
|
|
{ |
728
|
|
|
try { |
729
|
1 |
|
$data = $this->_getStateValue(self::PREFIX_ENROLLMENT_SECRET, $enrollmentSecret); |
730
|
1 |
|
if (NULL === $data) { |
731
|
1 |
|
throw new RuntimeException('Enrollment secret not found'); |
732
|
|
|
} |
733
|
1 |
|
if (is_array($data)) { |
734
|
|
|
// Enrollment is finalized, destroy our session data. |
735
|
1 |
|
$this->_unsetStateValue(self::PREFIX_ENROLLMENT_SECRET, $enrollmentSecret); |
736
|
1 |
|
$this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_FINALIZED); |
737
|
|
|
} else { |
738
|
|
|
$this->logger->error( |
739
|
|
|
'Enrollment status is not finalized, enrollmentsecret was not found in state storage. ' . |
740
|
|
|
'Warning! the method will still return "true" as a result.' |
741
|
|
|
); |
742
|
|
|
} |
743
|
1 |
|
return true; |
744
|
1 |
|
} catch (Exception $e) { |
745
|
|
|
// Cleanup failed |
746
|
1 |
|
$this->logger->warning('finalizeEnrollment failed', array('exception' => $e)); |
747
|
|
|
} |
748
|
1 |
|
return false; |
749
|
|
|
} |
750
|
|
|
|
751
|
|
|
/** |
752
|
|
|
* Authenticate a user. |
753
|
|
|
* This method should be called when the phone (tiqr client) posts a response to an |
754
|
|
|
* authentication challenge to the server. This method will validate the response and |
755
|
|
|
* returns one of the self::AUTH_RESULT_* codes to indicate success or error |
756
|
|
|
* |
757
|
|
|
* When the authentication was successful the user's session is marked as authenticated. |
758
|
|
|
* This essentially logs the user in. Use getauthenticateduser() and logout() with the |
759
|
|
|
* application's session sessionID to respectively get the authenticated user and clear |
760
|
|
|
* the authentication state. |
761
|
|
|
* |
762
|
|
|
* SECURITY CONSIDERATIONS |
763
|
|
|
* |
764
|
|
|
* Read the included SECURITY.md for important security considerations about: |
765
|
|
|
* |
766
|
|
|
* * PIN guessing: The application must implement protections against response guessing and PIN guessing attacks. |
767
|
|
|
* This means that the application must check whether this function returns |
768
|
|
|
* AUTH_RESULT_INVALID_RESPONSE and handle that case appropriately. |
769
|
|
|
* |
770
|
|
|
* * Response guessing: When using the default OCRA suite the response is six digits long. This makes it feasible |
771
|
|
|
* for an attacker to try all responses in a brute force attack. The application must take |
772
|
|
|
* this into account by handing AUTH_RESULT_INVALID_RESPONSE |
773
|
|
|
* |
774
|
|
|
* |
775
|
|
|
* The other error results and exceptions mean that the response could not be validated on the server and should |
776
|
|
|
* therefore not reveal anything useful to the client. |
777
|
|
|
* |
778
|
|
|
* The UserStorage class supports (temporarily) locking a user account. It is the responsibility of the application |
779
|
|
|
* to implement these and other security measures. |
780
|
|
|
* |
781
|
|
|
* @param String $userId The userid of the user that should be authenticated, as sent in the POST back by the tiqr |
782
|
|
|
* client. If $userId does not match the optional userId in startAuthenticationSession() |
783
|
|
|
* AUTH_RESULT_INVALID_USERID is returned |
784
|
|
|
* @param String $userSecret The OCRA user secret that the application previously stored for $userId using |
785
|
|
|
* e.g. a Tiqr_UserSecretStorage |
786
|
|
|
* Leave empty when using a OcraService that does not require a user secret |
787
|
|
|
* @param String $sessionKey The authentication session key that was returned by startAuthenticationSession() |
788
|
|
|
* If the session key cannot be found in the StateStorage AUTH_RESULT_INVALID_CHALLENGE |
789
|
|
|
* is returned |
790
|
|
|
* @param String $response The response to the challenge that the tiqr client posted back to the server |
791
|
|
|
* |
792
|
|
|
* @return Int The result of the authentication. This is one of the AUTH_RESULT_* constants of the Tiqr_Server class. |
793
|
|
|
* @throws Exception when there was an error during the authentication process |
794
|
|
|
*/ |
795
|
1 |
|
public function authenticate(string $userId, string $userSecret, string $sessionKey, string $response): int |
796
|
|
|
{ |
797
|
|
|
try { |
798
|
1 |
|
$state = $this->_getStateValue(self::PREFIX_CHALLENGE, $sessionKey); |
799
|
1 |
|
if (is_null($state)) { |
800
|
1 |
|
$this->logger->notice('The auth challenge could not be found in the state storage'); |
801
|
1 |
|
return self::AUTH_RESULT_INVALID_CHALLENGE; |
802
|
|
|
} |
803
|
|
|
} catch (Exception $e) { |
804
|
|
|
$this->logger->error('Error looking up challenge in state storage', array('exception' => $e)); |
805
|
|
|
throw $e; |
806
|
|
|
} |
807
|
|
|
|
808
|
1 |
|
$sessionId = $state["sessionId"] ?? NULL; // Application's sessionId |
809
|
1 |
|
$challenge = $state["challenge"] ?? NULL; // The challenge we sent to the Tiqr client |
810
|
1 |
|
if (!is_string($sessionId) || (!is_string($challenge)) ) { |
811
|
|
|
throw new RuntimeException('Invalid state for state storage'); |
812
|
|
|
} |
813
|
|
|
|
814
|
|
|
// The user ID is optional, it is set when the application requested authentication of a specific userId |
815
|
|
|
// instead of letting the client decide |
816
|
1 |
|
$challengeUserId = $state["userId"] ?? NULL; |
817
|
|
|
|
818
|
|
|
// If the application requested a specific userId, verify that that is that userId that we're now authenticating |
819
|
1 |
|
if ($challengeUserId!==NULL && ($userId !== $challengeUserId)) { |
820
|
1 |
|
$this->logger->error( |
821
|
1 |
|
sprintf('Authentication failed: the requested userId "%s" does not match userId "%s" that is being authenticated', |
822
|
1 |
|
$challengeUserId, $userId) |
823
|
1 |
|
); |
824
|
1 |
|
return self::AUTH_RESULT_INVALID_USERID; // requested and actual userId do not match |
825
|
|
|
} |
826
|
|
|
|
827
|
|
|
try { |
828
|
1 |
|
$equal = $this->_ocraService->verifyResponse($response, $userId, $userSecret, $challenge, $sessionKey); |
829
|
|
|
} catch (Exception $e) { |
830
|
|
|
$this->logger->error(sprintf('Error verifying OCRA response for user "%s"', $userId), array('exception' => $e)); |
831
|
|
|
throw $e; |
832
|
|
|
} |
833
|
|
|
|
834
|
1 |
|
if ($equal) { |
835
|
|
|
// Set application session as authenticated |
836
|
1 |
|
$this->_setStateValue(self::PREFIX_AUTHENTICATED, $sessionId, $userId, self::LOGIN_EXPIRE); |
837
|
1 |
|
$this->logger->notice(sprintf('Authenticated user "%s" in session "%s"', $userId, $sessionId)); |
838
|
|
|
|
839
|
|
|
// Cleanup challenge |
840
|
|
|
// Future authentication attempts with this sessionKey will get a AUTH_RESULT_INVALID_CHALLENGE |
841
|
|
|
// This QR code / push notification cannot be used again |
842
|
|
|
// Cleaning up only after successful authentication enables the user to retry authentication after e.g. an |
843
|
|
|
// invalid response |
844
|
|
|
try { |
845
|
1 |
|
$this->_unsetStateValue(self::PREFIX_CHALLENGE, $sessionKey); // May throw |
846
|
|
|
} catch (Exception $e) { |
847
|
|
|
// Only log error |
848
|
|
|
$this->logger->warning('Could not delete authentication session key', array('error' => $e)); |
849
|
|
|
} |
850
|
|
|
|
851
|
1 |
|
return self::AUTH_RESULT_AUTHENTICATED; |
852
|
|
|
} |
853
|
1 |
|
$this->logger->error('Authentication failed: invalid response'); |
854
|
1 |
|
return self::AUTH_RESULT_INVALID_RESPONSE; |
855
|
|
|
} |
856
|
|
|
|
857
|
|
|
/** |
858
|
|
|
* Log the user out. |
859
|
|
|
* It is not an error is the $sessionId does not exists, or when the $sessionId has expired |
860
|
|
|
* |
861
|
|
|
* @param String $sessionId The application's session identifier (defaults |
862
|
|
|
* to the php session). |
863
|
|
|
* This is the application's sessionId that was provided to startAuthenticationSession() |
864
|
|
|
* |
865
|
|
|
* @throws Exception when there was an error communicating with the storage backed |
866
|
|
|
*/ |
867
|
1 |
|
public function logout(string $sessionId=""): void |
868
|
|
|
{ |
869
|
1 |
|
if ($sessionId=="") { |
870
|
|
|
$sessionId = session_id(); |
871
|
|
|
} |
872
|
|
|
|
873
|
1 |
|
$this->_unsetStateValue(self::PREFIX_AUTHENTICATED, $sessionId); |
874
|
|
|
} |
875
|
|
|
|
876
|
|
|
/** |
877
|
|
|
* Exchange a notificationToken for a deviceToken. |
878
|
|
|
* |
879
|
|
|
* During enrollment, the phone will post a notificationAddress that can be |
880
|
|
|
* used to send notifications. To actually send the notification, |
881
|
|
|
* this address should be converted to the real device address. |
882
|
|
|
* |
883
|
|
|
* @param String $notificationType The notification type. |
884
|
|
|
* @param String $notificationAddress The address that was stored during enrollment. |
885
|
|
|
* |
886
|
|
|
* @return String|bool The device address that can be used to send a notification. |
887
|
|
|
* false on error |
888
|
|
|
*/ |
889
|
|
|
public function translateNotificationAddress(string $notificationType, string $notificationAddress) |
890
|
|
|
{ |
891
|
|
|
if ($notificationType == 'APNS' || $notificationType == 'FCM' || $notificationType == 'GCM') { |
892
|
|
|
return $this->_deviceStorage->getDeviceToken($notificationAddress); |
893
|
|
|
} else { |
894
|
|
|
return $notificationAddress; |
895
|
|
|
} |
896
|
|
|
} |
897
|
|
|
|
898
|
|
|
/** |
899
|
|
|
* Retrieve the currently logged in user. |
900
|
|
|
* @param String $sessionId The application's session identifier (defaults |
901
|
|
|
* to the php session). |
902
|
|
|
* This is the application's sessionId that was provided to startAuthenticationSession() |
903
|
|
|
* @return string|NULL The userId of the authenticated user, |
904
|
|
|
* NULL if no user is logged in |
905
|
|
|
* NULL if the user's login state could not be determined |
906
|
|
|
* |
907
|
|
|
* Does not throw |
908
|
|
|
*/ |
909
|
1 |
|
public function getAuthenticatedUser(string $sessionId=""): ?string |
910
|
|
|
{ |
911
|
1 |
|
if ($sessionId=="") { |
912
|
|
|
$this->logger->debug('Using the PHP session id, as no session id was provided'); |
913
|
|
|
$sessionId = session_id(); |
914
|
|
|
} |
915
|
|
|
|
916
|
|
|
try { |
917
|
1 |
|
return $this->_getStateValue("authenticated_", $sessionId); |
918
|
|
|
} |
919
|
|
|
catch (Exception $e) { |
920
|
|
|
$this->logger->error('getAuthenticatedUser failed', array('exception'=>$e)); |
921
|
|
|
return NULL; |
922
|
|
|
} |
923
|
|
|
} |
924
|
|
|
|
925
|
|
|
/** |
926
|
|
|
* Generate a authentication challenge URL |
927
|
|
|
* @param String $sessionKey The authentication sessionKey |
928
|
|
|
* |
929
|
|
|
* @return string AuthenticationURL |
930
|
|
|
* @throws Exception |
931
|
|
|
*/ |
932
|
3 |
|
protected function _getChallengeUrl(string $sessionKey): string |
933
|
|
|
{ |
934
|
|
|
// Lookup the authentication session data and use this to generate the application specific |
935
|
|
|
// authentication URL |
936
|
|
|
// The are two formats see: https://tiqr.org/technical/protocol/ |
937
|
|
|
// We probably just generated the challenge and stored it in the StateStorage |
938
|
|
|
// We can save a roundtrip to the storage backend here by reusing this information |
939
|
|
|
|
940
|
3 |
|
$state = $this->_getStateValue(self::PREFIX_CHALLENGE, $sessionKey); |
941
|
3 |
|
if (is_null($state)) { |
942
|
|
|
$this->logger->error( |
943
|
|
|
sprintf( |
944
|
|
|
'Cannot get session key "%s"', |
945
|
|
|
$sessionKey |
946
|
|
|
) |
947
|
|
|
); |
948
|
|
|
throw new Exception('Cannot find sessionkey'); |
949
|
|
|
} |
950
|
|
|
|
951
|
3 |
|
$userId = $state["userId"] ?? NULL; |
952
|
3 |
|
$challenge = $state["challenge"] ?? ''; |
953
|
3 |
|
$spIdentifier = $state["spIdentifier"] ?? ''; |
954
|
|
|
|
955
|
3 |
|
if ( (strpos($this->_protocolAuth, 'https://') === 0) || (strpos($this->_protocolAuth, 'http://') === 0) ) { |
956
|
|
|
// Create universal Link |
957
|
2 |
|
$parameters=array(); |
958
|
2 |
|
if (!is_null($userId)) { |
959
|
1 |
|
$parameters[]='u='.urlencode($userId); |
960
|
|
|
} |
961
|
2 |
|
$parameters[]='s='.urlencode($sessionKey); |
962
|
2 |
|
$parameters[]='q='.urlencode($challenge); |
963
|
2 |
|
$parameters[]='i='.urlencode($this->getIdentifier()); |
964
|
2 |
|
$parameters[]='v='.urlencode($this->_protocolVersion); |
965
|
2 |
|
return $this->_protocolAuth.'?'.implode('&', $parameters); |
966
|
|
|
} |
967
|
|
|
|
968
|
|
|
// Create custom URL scheme |
969
|
|
|
// Last bit is the spIdentifier |
970
|
1 |
|
return $this->_protocolAuth."://".(!is_null($userId)?urlencode($userId).'@':'').$this->getIdentifier()."/".$sessionKey."/".$challenge."/".urlencode($spIdentifier)."/".$this->_protocolVersion; |
971
|
|
|
} |
972
|
|
|
|
973
|
|
|
/** |
974
|
|
|
* Generate an enrollment string |
975
|
|
|
* @param String $metadataUrl The URL you provide to the phone to retrieve metadata. |
976
|
|
|
*/ |
977
|
2 |
|
protected function _getEnrollString(string $metadataUrl): string |
978
|
|
|
{ |
979
|
|
|
// The are two formats see: https://tiqr.org/technical/protocol/ |
980
|
|
|
|
981
|
2 |
|
if ( (strpos($this->_protocolEnroll, 'https://') === 0) || (strpos($this->_protocolEnroll, 'http://') === 0) ) { |
982
|
|
|
// Create universal Link |
983
|
1 |
|
return $this->_protocolEnroll.'?metadata='.urlencode($metadataUrl); |
984
|
|
|
} |
985
|
|
|
|
986
|
|
|
// Create custom URL scheme |
987
|
1 |
|
return $this->_protocolEnroll."://".$metadataUrl; |
988
|
|
|
} |
989
|
|
|
|
990
|
|
|
/** |
991
|
|
|
* Generate a unique secure pseudo-random value to be used as session key in the |
992
|
|
|
* tiqr protocol. These keys are sent to the tiqr client during enrollment and authentication |
993
|
|
|
* And are used in the server as part of key for data in StateStorage |
994
|
|
|
* @return String The session key as HEX encoded string |
995
|
|
|
* @throws Exception When the key could not be generated |
996
|
|
|
*/ |
997
|
5 |
|
protected function _uniqueSessionKey(): string |
998
|
|
|
{ |
999
|
|
|
|
1000
|
5 |
|
return bin2hex( Tiqr_Random::randomBytes(self::SESSION_KEY_LENGTH_BYTES) ); |
1001
|
|
|
} |
1002
|
|
|
|
1003
|
|
|
/** |
1004
|
|
|
* Internal function to set the enrollment status of a session. |
1005
|
|
|
* @param String $sessionId The sessionId to set the status for |
1006
|
|
|
* @param int $status The new enrollment status (one of the |
1007
|
|
|
* self::ENROLLMENT_STATUS_* constants) |
1008
|
|
|
* @throws Exception when updating the status fails |
1009
|
|
|
*/ |
1010
|
2 |
|
protected function _setEnrollmentStatus(string $sessionId, int $status): void |
1011
|
|
|
{ |
1012
|
2 |
|
if (($status < 1) || ($status > 6)) { |
1013
|
|
|
// Must be one of the self::ENROLLMENT_STATUS_* constants |
1014
|
|
|
throw new InvalidArgumentException('Invalid enrollment status'); |
1015
|
|
|
} |
1016
|
2 |
|
$this->_setStateValue(self::PREFIX_ENROLLMENT_STATUS, $sessionId, $status, self::ENROLLMENT_EXPIRE); |
1017
|
|
|
} |
1018
|
|
|
|
1019
|
|
|
/** Store a value in StateStorage |
1020
|
|
|
* @param string $key_prefix |
1021
|
|
|
* @param string $key |
1022
|
|
|
* @param mixed $value |
1023
|
|
|
* @param int $expire |
1024
|
|
|
* @return void |
1025
|
|
|
* @throws Exception |
1026
|
|
|
* |
1027
|
|
|
* @see Tiqr_StateStorage_StateStorageInterface::setValue() |
1028
|
|
|
*/ |
1029
|
5 |
|
protected function _setStateValue(string $key_prefix, string $key, $value, int $expire): void { |
1030
|
5 |
|
$this->_stateStorage->setValue( |
1031
|
5 |
|
$key_prefix . $this->_hashKey($key), |
1032
|
5 |
|
$value, |
1033
|
5 |
|
$expire |
1034
|
5 |
|
); |
1035
|
|
|
} |
1036
|
|
|
|
1037
|
|
|
/** Get a value from StateStorage |
1038
|
|
|
* @param string $key_prefix |
1039
|
|
|
* @param string $key |
1040
|
|
|
* @return mixed |
1041
|
|
|
* @throws Exception |
1042
|
|
|
* |
1043
|
|
|
* @see Tiqr_StateStorage_StateStorageInterface::getValue() |
1044
|
|
|
*/ |
1045
|
|
|
|
1046
|
4 |
|
protected function _getStateValue(string $key_prefix, string $key) { |
1047
|
4 |
|
return $this->_stateStorage->getValue( |
1048
|
4 |
|
$key_prefix . $this->_hashKey($key) |
1049
|
4 |
|
); |
1050
|
|
|
} |
1051
|
|
|
|
1052
|
|
|
/** Remove a key and its value from StateStorage |
1053
|
|
|
* @param string $key_prefix |
1054
|
|
|
* @param string $key |
1055
|
|
|
* @return void |
1056
|
|
|
* @throws Exception |
1057
|
|
|
* |
1058
|
|
|
* @see Tiqr_StateStorage_StateStorageInterface::unsetValue() |
1059
|
|
|
*/ |
1060
|
2 |
|
protected function _unsetStateValue(string $key_prefix, string $key): void { |
1061
|
2 |
|
$this->_stateStorage->unsetValue( |
1062
|
2 |
|
$key_prefix . $this->_hashKey($key) |
1063
|
2 |
|
); |
1064
|
|
|
} |
1065
|
|
|
|
1066
|
|
|
/** |
1067
|
|
|
* Create a stable hash of a $key. Used to improve the security of stored keys |
1068
|
|
|
* @param string $key |
1069
|
|
|
* @return string hashed $key |
1070
|
|
|
*/ |
1071
|
5 |
|
protected function _hashKey(string $key): string |
1072
|
|
|
{ |
1073
|
5 |
|
return hash_hmac('sha256', $key, $this->_stateStorageSalt); |
1074
|
|
|
} |
1075
|
|
|
} |
1076
|
|
|
|