2012-08-08 13:51:54 +01:00
|
|
|
<?php
|
2020-07-25 17:42:46 +01:00
|
|
|
// This file is part of GNU social - https://www.gnu.org/software/social
|
|
|
|
//
|
|
|
|
// GNU social is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// GNU social is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with GNU social. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2012-08-08 13:51:54 +01:00
|
|
|
/**
|
2020-07-25 18:16:21 +01:00
|
|
|
* Module to use password_hash() for user password hashes
|
2012-08-08 13:51:54 +01:00
|
|
|
*
|
2019-08-12 15:03:30 +01:00
|
|
|
* @category Module
|
2013-10-17 15:32:53 +01:00
|
|
|
* @package GNUsocial
|
2012-08-08 13:51:54 +01:00
|
|
|
* @author Mikael Nordfeldth <mmn@hethane.se>
|
|
|
|
* @copyright 2012 StatusNet, Inc.
|
2013-10-17 15:32:53 +01:00
|
|
|
* @copyright 2013 Free Software Foundation, Inc http://www.fsf.org
|
2020-07-25 17:42:46 +01:00
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
2012-08-08 13:51:54 +01:00
|
|
|
*/
|
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
defined('GNUSOCIAL') || die;
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2020-07-25 18:16:21 +01:00
|
|
|
if (version_compare(PHP_VERSION, '7.4.0', '<')) {
|
|
|
|
function password_algos(): array
|
|
|
|
{
|
|
|
|
$algos = [PASSWORD_BCRYPT];
|
|
|
|
defined('PASSWORD_ARGON2I') && $algos[] = PASSWORD_ARGON2I;
|
|
|
|
defined('PASSWORD_ARGON2ID') && $algos[] = PASSWORD_ARGON2ID;
|
|
|
|
return $algos;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-12 15:03:30 +01:00
|
|
|
class AuthCryptModule extends AuthenticationModule
|
2012-08-08 13:51:54 +01:00
|
|
|
{
|
2019-10-30 23:52:14 +00:00
|
|
|
const MODULE_VERSION = '2.0.0';
|
2020-07-25 18:16:21 +01:00
|
|
|
protected $algorithm = PASSWORD_DEFAULT;
|
|
|
|
protected $algorithm_options = [];
|
2020-07-25 17:42:46 +01:00
|
|
|
protected $overwrite = true; // if true, password change means overwrite with crypt()
|
2020-07-25 18:16:21 +01:00
|
|
|
protected $statusnet = true; // if true, also check StatusNet-style password hash
|
2013-10-17 15:32:53 +01:00
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
public $provider_name = 'crypt'; // not actually used
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
// FUNCTIONALITY
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2020-07-25 18:16:21 +01:00
|
|
|
public function onInitializePlugin()
|
|
|
|
{
|
|
|
|
if (!in_array($this->algorithm, password_algos())) {
|
|
|
|
common_log(
|
|
|
|
LOG_ERR,
|
|
|
|
"Unsupported password hashing algorithm: {$this->algorithm}"
|
|
|
|
);
|
|
|
|
$this->algorithm = PASSWORD_DEFAULT;
|
|
|
|
}
|
|
|
|
// Make "'cost' = 12" the default option, but only if bcrypt
|
|
|
|
if ($this->algorithm === PASSWORD_BCRYPT
|
|
|
|
&& !array_key_exists('cost', $this->algorithm_options)) {
|
|
|
|
$this->algorithm_options['cost'] = 12;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
public function checkPassword($username, $password)
|
2013-10-17 15:32:53 +01:00
|
|
|
{
|
2015-02-25 23:45:17 +00:00
|
|
|
$username = Nickname::normalize($username);
|
|
|
|
|
2013-10-17 15:32:53 +01:00
|
|
|
$user = User::getKV('nickname', $username);
|
|
|
|
if (!($user instanceof User)) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2020-07-25 18:16:21 +01:00
|
|
|
$match = false;
|
2013-10-17 15:32:53 +01:00
|
|
|
|
2020-07-25 18:16:21 +01:00
|
|
|
if (password_verify($password, $user->password)) {
|
|
|
|
$match = true;
|
|
|
|
} elseif ($this->statusnet) {
|
|
|
|
// Check StatusNet hash, for backwards compatibility and migration
|
|
|
|
// Check size outside regex to take out entries of a differing size faster
|
|
|
|
if (strlen($user->password) === 32
|
|
|
|
&& preg_match('/^[a-f0-9]$/D', $user->password)) {
|
|
|
|
$match = hash_equals(
|
|
|
|
$user->password,
|
|
|
|
hash('md5', $password . $user->id)
|
|
|
|
);
|
2013-10-17 15:32:53 +01:00
|
|
|
}
|
2012-08-08 13:51:54 +01:00
|
|
|
}
|
|
|
|
|
2020-07-25 18:16:21 +01:00
|
|
|
// Update password hash entry if it doesn't match current settings
|
|
|
|
if ($this->overwrite
|
|
|
|
&& $match
|
|
|
|
&& password_needs_rehash($user->password, $this->algorithm, $this->algorithm_options)) {
|
|
|
|
$this->changePassword($user->nickname, null, $password);
|
2018-03-19 03:21:03 +00:00
|
|
|
}
|
|
|
|
|
2020-07-25 18:16:21 +01:00
|
|
|
return $match ? $user : false;
|
2012-08-08 13:51:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// $oldpassword is already verified when calling this function... shouldn't this be private?!
|
2020-07-25 17:42:46 +01:00
|
|
|
public function changePassword($username, $oldpassword, $newpassword)
|
2013-10-17 15:32:53 +01:00
|
|
|
{
|
2015-02-25 23:45:17 +00:00
|
|
|
$username = Nickname::normalize($username);
|
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
if (!$this->overwrite) {
|
2012-08-08 13:51:54 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-08-18 12:04:58 +01:00
|
|
|
$user = User::getKV('nickname', $username);
|
2012-08-08 13:51:54 +01:00
|
|
|
if (empty($user)) {
|
|
|
|
return false;
|
|
|
|
}
|
2020-07-25 17:42:46 +01:00
|
|
|
$original = clone $user;
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2013-10-17 15:32:53 +01:00
|
|
|
$user->password = $this->hashPassword($newpassword, $user->getProfile());
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
return $user->validate() === true && $user->update($original);
|
2012-08-08 13:51:54 +01:00
|
|
|
}
|
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
public function hashPassword($password, ?Profile $profile = null)
|
2013-10-17 15:32:53 +01:00
|
|
|
{
|
2020-07-25 18:16:21 +01:00
|
|
|
return password_hash($password, $this->algorithm, $this->algorithm_options);
|
2013-10-17 15:32:53 +01:00
|
|
|
}
|
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
// EVENTS
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2015-07-17 00:47:43 +01:00
|
|
|
public function onStartChangePassword(Profile $target, $oldpassword, $newpassword)
|
2013-10-17 15:32:53 +01:00
|
|
|
{
|
2015-07-17 00:47:43 +01:00
|
|
|
if (!$this->checkPassword($target->getNickname(), $oldpassword)) {
|
2012-08-08 13:51:54 +01:00
|
|
|
// if we ARE in overwrite mode, test password with common_check_user
|
2015-07-17 00:47:43 +01:00
|
|
|
if (!$this->overwrite || !common_check_user($target->getNickname(), $oldpassword)) {
|
2012-08-08 13:51:54 +01:00
|
|
|
// either we're not in overwrite mode, or the password was incorrect
|
|
|
|
return !$this->authoritative;
|
|
|
|
}
|
|
|
|
// oldpassword was apparently ok
|
|
|
|
}
|
2015-07-17 00:47:43 +01:00
|
|
|
$changed = $this->changePassword($target->getNickname(), $oldpassword, $newpassword);
|
2012-08-08 13:51:54 +01:00
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
return !$changed && empty($this->authoritative);
|
2012-08-08 13:51:54 +01:00
|
|
|
}
|
|
|
|
|
2013-10-17 15:32:53 +01:00
|
|
|
public function onStartCheckPassword($nickname, $password, &$authenticatedUser)
|
|
|
|
{
|
2012-08-08 13:51:54 +01:00
|
|
|
$authenticatedUser = $this->checkPassword($nickname, $password);
|
2013-10-17 15:32:53 +01:00
|
|
|
// if we failed, only return false to stop plugin execution if we're authoritative
|
2020-07-25 17:42:46 +01:00
|
|
|
return !($authenticatedUser instanceof User) && empty($this->authoritative);
|
2012-08-08 13:51:54 +01:00
|
|
|
}
|
|
|
|
|
2020-07-25 17:42:46 +01:00
|
|
|
public function onStartHashPassword(&$hashed, $password, ?Profile $profile = null)
|
2013-10-17 15:32:53 +01:00
|
|
|
{
|
|
|
|
$hashed = $this->hashPassword($password, $profile);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function onCheckSchema()
|
|
|
|
{
|
2019-08-12 15:03:30 +01:00
|
|
|
// we only use the User database, so default AuthenticationModule stuff can be ignored
|
2012-08-08 13:51:54 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-10-17 15:32:53 +01:00
|
|
|
public function onUserDeleteRelated($user, &$tables)
|
|
|
|
{
|
2012-08-08 13:51:54 +01:00
|
|
|
// not using User_username table, so no need to add it here.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-08-12 15:03:30 +01:00
|
|
|
public function onModuleVersion(array &$versions): bool
|
2012-08-08 13:51:54 +01:00
|
|
|
{
|
2020-07-25 17:42:46 +01:00
|
|
|
$versions[] = [
|
|
|
|
'name' => 'AuthCrypt',
|
|
|
|
'version' => self::MODULE_VERSION,
|
|
|
|
'author' => 'Mikael Nordfeldth',
|
|
|
|
'homepage' => GNUSOCIAL_ENGINE_REPO_URL . 'tree/master/plugins/AuthCrypt',
|
|
|
|
'rawdescription' => // TRANS: Module description.
|
|
|
|
_m('Authentication and password hashing with crypt()')
|
|
|
|
];
|
2012-08-08 13:51:54 +01:00
|
|
|
return true;
|
|
|
|
}
|
2020-05-04 11:42:13 +01:00
|
|
|
}
|