1 | <?php |
||
2 | /****************************************************************************** |
||
3 | * Wikipedia Account Creation Assistance tool * |
||
4 | * ACC Development Team. Please see team.json for a list of contributors. * |
||
5 | * * |
||
6 | * This is free and unencumbered software released into the public domain. * |
||
7 | * Please see LICENSE.md for the full licencing statement. * |
||
8 | ******************************************************************************/ |
||
9 | |||
10 | namespace Waca\Security\CredentialProviders; |
||
11 | |||
12 | use ParagonIE\ConstantTime\Base32; |
||
13 | use Waca\DataObjects\User; |
||
14 | use Waca\Exceptions\ApplicationLogicException; |
||
15 | use Waca\Exceptions\OptimisticLockFailedException; |
||
16 | use Waca\PdoDatabase; |
||
17 | use Waca\Security\EncryptionHelper; |
||
18 | use Waca\SessionAlert; |
||
19 | use Waca\SiteConfiguration; |
||
20 | use Waca\WebRequest; |
||
21 | |||
22 | class ScratchTokenCredentialProvider extends CredentialProviderBase |
||
23 | { |
||
24 | /** @var EncryptionHelper */ |
||
25 | private $encryptionHelper; |
||
26 | /** @var array the tokens generated in the last generation round. */ |
||
27 | private $generatedTokens; |
||
28 | |||
29 | /** |
||
30 | * ScratchTokenCredentialProvider constructor. |
||
31 | * |
||
32 | * @param PdoDatabase $database |
||
33 | * @param SiteConfiguration $configuration |
||
34 | */ |
||
35 | public function __construct(PdoDatabase $database, SiteConfiguration $configuration) |
||
36 | { |
||
37 | parent::__construct($database, $configuration, 'scratch'); |
||
38 | $this->encryptionHelper = new EncryptionHelper($configuration); |
||
39 | } |
||
40 | |||
41 | /** |
||
42 | * Validates a user-provided credential |
||
43 | * |
||
44 | * @param User $user The user to test the authentication against |
||
45 | * @param string $data The raw credential data to be validated |
||
46 | * |
||
47 | * @return bool |
||
48 | * @throws ApplicationLogicException|OptimisticLockFailedException |
||
49 | */ |
||
50 | public function authenticate(User $user, $data) |
||
51 | { |
||
52 | if (is_array($data)) { |
||
0 ignored issues
–
show
introduced
by
![]() |
|||
53 | return false; |
||
54 | } |
||
55 | |||
56 | $storedData = $this->getCredentialData($user->getId()); |
||
57 | |||
58 | if ($storedData === null) { |
||
59 | throw new ApplicationLogicException('Credential data not found'); |
||
60 | } |
||
61 | |||
62 | $scratchTokens = unserialize($this->encryptionHelper->decryptData($storedData->getData())); |
||
63 | |||
64 | $usedToken = null; |
||
65 | foreach ($scratchTokens as $scratchToken) { |
||
66 | if (password_verify($data, $scratchToken)) { |
||
67 | $usedToken = $scratchToken; |
||
68 | SessionAlert::quick("Hey, it looks like you used a scratch token to log in. Would you like to change your multi-factor authentication configuration?", 'alert-warning'); |
||
69 | WebRequest::setPostLoginRedirect($this->getConfiguration()->getBaseUrl() . "/internal.php/multiFactor"); |
||
70 | break; |
||
71 | } |
||
72 | } |
||
73 | |||
74 | if ($usedToken === null) { |
||
75 | return false; |
||
76 | } |
||
77 | |||
78 | $scratchTokens = array_diff($scratchTokens, [$usedToken]); |
||
79 | |||
80 | $storedData->setData($this->encryptionHelper->encryptData(serialize($scratchTokens))); |
||
81 | $storedData->save(); |
||
82 | |||
83 | return true; |
||
84 | } |
||
85 | |||
86 | /** |
||
87 | * @param User $user The user the credential belongs to |
||
88 | * @param int $factor The factor this credential provides |
||
89 | * @param string $data Unused. |
||
90 | * |
||
91 | * @throws OptimisticLockFailedException |
||
92 | */ |
||
93 | public function setCredential(User $user, $factor, $data) |
||
94 | { |
||
95 | $plaintextScratch = array(); |
||
96 | $storedScratch = array(); |
||
97 | for ($i = 0; $i < 5; $i++) { |
||
98 | $token = Base32::encodeUpper(openssl_random_pseudo_bytes(10)); |
||
99 | $plaintextScratch[] = $token; |
||
100 | |||
101 | $storedScratch[] = password_hash( |
||
102 | $token, |
||
103 | PasswordCredentialProvider::PASSWORD_ALGO, |
||
104 | array('cost' => PasswordCredentialProvider::PASSWORD_COST) |
||
105 | ); |
||
106 | } |
||
107 | |||
108 | $storedData = $this->getCredentialData($user->getId(), null); |
||
109 | |||
110 | if ($storedData !== null) { |
||
111 | $storedData->delete(); |
||
112 | } |
||
113 | |||
114 | $storedData = $this->createNewCredential($user); |
||
115 | |||
116 | $storedData->setData($this->encryptionHelper->encryptData(serialize($storedScratch))); |
||
117 | $storedData->setFactor($factor); |
||
118 | $storedData->setVersion(1); |
||
119 | $storedData->setPriority(9); |
||
120 | |||
121 | $storedData->save(); |
||
122 | $this->generatedTokens = $plaintextScratch; |
||
123 | } |
||
124 | |||
125 | /** |
||
126 | * Gets the count of remaining valid tokens |
||
127 | * |
||
128 | * @param int $userId |
||
129 | * |
||
130 | * @return int |
||
131 | */ |
||
132 | public function getRemaining($userId) |
||
133 | { |
||
134 | $storedData = $this->getCredentialData($userId); |
||
135 | |||
136 | if ($storedData === null) { |
||
137 | return 0; |
||
138 | } |
||
139 | |||
140 | $scratchTokens = unserialize($this->encryptionHelper->decryptData($storedData->getData())); |
||
141 | |||
142 | return count($scratchTokens); |
||
143 | } |
||
144 | |||
145 | /** |
||
146 | * @return array |
||
147 | */ |
||
148 | public function getTokens() |
||
149 | { |
||
150 | if ($this->generatedTokens != null) { |
||
151 | return $this->generatedTokens; |
||
152 | } |
||
153 | |||
154 | return array(); |
||
155 | } |
||
156 | } |
||
157 |