diff -r d109af008343 -r 6212d849ab08 yubikey/corelib.php --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/yubikey/corelib.php Fri Jun 30 17:49:12 2017 -0400 @@ -0,0 +1,300 @@ +'; + $html .= ''; + if ( $value ) + { + $html .= '' . $lang->get('yubiauth_ctl_status_enrolled') . ''; + $atext = $lang->get('yubiauth_ctl_btn_change_key'); + $classadd = ' abutton_green'; + } + else + { + $html .= '' . $lang->get('yubiauth_ctl_status_empty') . ''; + $atext = $lang->get('yubiauth_ctl_btn_enroll'); + $classadd = ''; + } + + $html .= ' '; + if ( !empty($value) ) + $html .= htmlspecialchars(substr($value, 0, 12)); + $html .= ' '; + + $html .= ' ' . $atext . ''; + if ( $value ) + { + $html .= ' ' + . $lang->get('yubiauth_ctl_btn_clear') . + ''; + } + + return $html; +} + +function yubikey_validate_otp($otp) +{ + $api_key = getConfig('yubikey_api_key'); + $api_id = getConfig('yubikey_api_key_id'); + // Don't require an API key or user ID to be installed if we're using local YMS + if ( !(getConfig('yubikey_use_local_yms', 0) && defined('YMS_INSTALLED')) && (!$api_key || !$api_id) ) + { + return array( + 'success' => false, + 'error' => 'missing_api_key' + ); + } + if ( !preg_match('/^[cbdefghijklnrtuv]{44}$/', $otp) ) + { + return array( + 'success' => false, + 'error' => 'otp_invalid_chars' + ); + } + // are we using local YMS? + if ( getConfig('yubikey_use_local_yms', 0) && defined('YMS_INSTALLED') ) + { + $result = yms_validate_otp($otp, $api_id); + if ( $result == 'OK' ) + { + return array( + 'success' => true + ); + } + else + { + return array( + 'success' => false, + 'error' => strtolower("response_{$result}") + ); + } + } + // make HTTP request + require_once( ENANO_ROOT . '/includes/http.php' ); + $auth_url = getConfig('yubikey_auth_server', YK_DEFAULT_VERIFY_URL); + $auth_url = preg_replace('#^https?://#i', '', $auth_url); + if ( !preg_match('#^(\[?[a-z0-9-:]+(?:\.[a-z0-9-:]+\]?)*)(?::([0-9]+))?(/.*)$#U', $auth_url, $match) ) + { + return array( + 'success' => false, + 'error' => 'invalid_auth_url' + ); + } + $auth_server =& $match[1]; + $auth_port = ( !empty($match[2]) ) ? intval($match[2]) : 80; + $auth_uri =& $match[3]; + try + { + $req = new Request_HTTP($auth_server, $auth_uri, 'GET', $auth_port); + $req->add_get('id', strval($api_id)); + $req->add_get('otp', $otp); + $req->add_get('h', yubikey_sign($req->parms_get)); + + $response = $req->get_response_body(); + } + catch ( Exception $e ) + { + return array( + 'success' => false, + 'error' => 'http_failed', + 'http_error' => $e->getMessage() + ); + } + + if ( $req->response_code != HTTP_OK ) + { + return array( + 'success' => false, + 'error' => 'http_response_error' + ); + } + $response = trim($response); + if ( !preg_match_all('/^([a-z0-9_]+)=(.*?)\r?$/m', $response, $matches) ) + { + return array( + 'success' => false, + 'error' => 'malformed_response' + ); + } + $response = array(); + foreach ( $matches[0] as $i => $_ ) + { + $response[$matches[1][$i]] = $matches[2][$i]; + } + // make sure we have a status + if ( !isset($response['status']) ) + { + return array( + 'success' => false, + 'error' => 'response_missing_status' + ); + } + // verify response signature + // MISSING_PARAMETER is the ONLY situation under which an unsigned response is acceptable + if ( $response['status'] !== 'MISSING_PARAMETER' ) + { + if ( !isset($response['h']) ) + { + return array( + 'success' => false, + 'error' => 'response_missing_sig' + ); + } + if ( yubikey_sign($response) !== $response['h'] ) + { + return array( + 'success' => false, + 'error' => 'response_invalid_sig' + ); + } + } + if ( $response['status'] === 'OK' ) + { + if ( yubikey_verify_timestamp($response['t']) ) + { + return array( + 'success' => true + ); + } + else + { + return array( + 'success' => false, + 'error' => 'timestamp_check_failed' + ); + } + } + else + { + return array( + 'success' => false, + 'error' => strtolower("response_{$response['status']}") + ); + } +} + +function yubikey_sign($arr, $use_api_key = false) +{ + static $api_key = false; + + ksort($arr); + + if ( !$use_api_key ) + { + if ( !$api_key ) + { + $api_key = getConfig('yubikey_api_key'); + $api_key = hexencode(base64_decode($api_key), '', ''); + } + $use_api_key = $api_key; + } + /* + else + { + $use_api_key = hexencode(base64_decode($use_api_key), '', ''); + } + */ + + foreach ( array('h', 'title', 'auth', 'do') as $key ) + { + if ( isset($arr[$key]) ) + unset($arr[$key]); + } + + $req = array(); + foreach ( $arr as $key => $val ) + { + $req[] = "$key=$val"; + } + $req = implode('&', $req); + + $sig = hmac_sha1($req, $use_api_key); + $sig = hexdecode($sig); + $sig = base64_encode($sig); + + return $sig; +} + +/** + * Validate the timestamp returned in a Yubico API response. Borrowed from Drupal and backported for friendliness with earlier versions of PHP. + * @param string Yubico timestamp + * @return bool True if valid, false otherwise + */ + +function yubikey_verify_timestamp($timestamp) +{ + $tolerance = intval(getConfig('yubikey_api_ts_tolerance', 150)); + + $now = time(); + $timestamp_seconds = yk_strtotime($timestamp); + + if ( !$timestamp || !$now || !$timestamp_seconds ) + { + return false; + } + + if ( ( $timestamp_seconds + $tolerance ) > $now && ( $timestamp_seconds - $tolerance ) < $now ) + { + return true; + } + + return false; +} + +function yk_strtotime($timestamp) +{ + if ( !preg_match('/^([0-9]{4})-([0-9]{2})-([0-9]{2})T([0-9]{2}):([0-9]{2}):([0-9]{2})(?:Z[0-9]+)?$/', $timestamp, $match) ) + return 0; + + $hour = intval($match[4]); + $minute = intval($match[5]); + $second = intval($match[6]); + $month = intval($match[2]); + $day = intval($match[3]); + $year = intval($match[1]); + + return gmmktime($hour, $minute, $second, $month, $day, $year); +} + +$plugins->attachHook('compile_template', 'yubikey_attach_headers($this);'); + +function yubikey_attach_headers(&$template) +{ + global $db, $session, $paths, $template, $plugins; // Common objects + + if ( getConfig('yubikey_enable', '1') != '1' ) + return true; + + $template->add_header(''); + $template->add_header(''); + // config option for all users have yubikey + $user_flags = 0; + $yk_enabled = 0; + if ( $session->user_logged_in ) + { + $q = $db->sql_query('SELECT COUNT(y.yubi_uid) > 0, u.user_yubikey_flags FROM ' . table_prefix . "yubikey AS y LEFT JOIN " . table_prefix . "users AS u ON ( u.user_id = y.user_id ) WHERE y.user_id = {$session->user_id} GROUP BY u.user_id, u.user_yubikey_flags;"); + if ( !$q ) + $db->_die(); + + list($yk_enabled, $user_flags) = $db->fetchrow_num(); + $db->free_result(); + } + $yk_enabled = intval($yk_enabled); + $user_flags = intval($user_flags); + + $template->add_header(''); +} +