2016-03-31 04:23:48 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Utility class for various OATH functions
|
|
|
|
*
|
|
|
|
* @ingroup Extensions
|
|
|
|
*/
|
|
|
|
class OATHAuthUtils {
|
2016-11-15 23:13:59 +00:00
|
|
|
/**
|
|
|
|
* Check whether OATH two-factor authentication is enabled for a given user.
|
|
|
|
* This is a stable method that does not change and can be used in other extensions.
|
|
|
|
* @param User $user
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function isEnabledFor( User $user ) {
|
|
|
|
$oathUser = OATHAuthHooks::getOATHUserRepository()->findByUser( $user );
|
|
|
|
return $oathUser && $oathUser->getKey();
|
|
|
|
}
|
2016-03-31 04:23:48 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Encrypt an aray of variables to put into the user's session. We use this
|
|
|
|
* when storing the user's password in their session. We can use json as the
|
|
|
|
* serialization format because $plaintextVars is an array of strings.
|
2016-09-16 23:18:35 +00:00
|
|
|
* @param array $plaintextVars array of user input strings
|
|
|
|
* @param int $userId, passed to key derivation functions so each user uses
|
2016-03-31 04:23:48 +00:00
|
|
|
* distinct encryption and hmac keys
|
|
|
|
* @return string encrypted data packet
|
|
|
|
*/
|
|
|
|
public static function encryptSessionData( array $plaintextVars, $userId ) {
|
|
|
|
$keyMaterial = self::getKeyMaterials();
|
|
|
|
$keys = self::getUserKeys( $keyMaterial, $userId );
|
|
|
|
return self::seal( json_encode( $plaintextVars ), $keys['encrypt'], $keys['hmac'] );
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypt an encrypted packet, generated with encryptSessionData
|
2016-09-16 23:18:35 +00:00
|
|
|
* @param string $ciphertext Encrypted data packet
|
|
|
|
* @param string|int $userId
|
2016-03-31 04:23:48 +00:00
|
|
|
* @return array of strings
|
|
|
|
*/
|
|
|
|
public static function decryptSessionData( $ciphertext, $userId ) {
|
|
|
|
$keyMaterial = self::getKeyMaterials();
|
|
|
|
$keys = self::getUserKeys( $keyMaterial, $userId );
|
|
|
|
return json_decode( self::unseal( $ciphertext, $keys['encrypt'], $keys['hmac'] ), true );
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the base secret for this wiki, used to derive all of the encryption
|
|
|
|
* keys. When $wgOATHAuthSecret is rotated, users who are part way through the
|
|
|
|
* two-step login will get an exception, and have to re-start the login.
|
|
|
|
* @return array $keys
|
|
|
|
*/
|
|
|
|
private static function getKeyMaterials() {
|
|
|
|
global $wgOATHAuthSecret, $wgSecretKey;
|
|
|
|
return $wgOATHAuthSecret ?: $wgSecretKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Generate encryption and hmac keys, unique to this user, based on a single
|
|
|
|
* wiki secret. Use a moderate pbkdf2 work factor in case we ever leak keys.
|
2016-09-30 21:13:57 +00:00
|
|
|
* @param string $secret
|
|
|
|
* @param string|int $userid
|
2016-03-31 04:23:48 +00:00
|
|
|
* @return array including key for encryption and integrity checking
|
|
|
|
*/
|
|
|
|
private static function getUserKeys( $secret, $userid ) {
|
|
|
|
$keymats = hash_pbkdf2( 'sha256', $secret, "oath-$userid", 10001, 64, true );
|
2016-09-16 23:18:35 +00:00
|
|
|
return [
|
2016-03-31 04:23:48 +00:00
|
|
|
'encrypt' => substr( $keymats, 0, 32 ),
|
|
|
|
'hmac' => substr( $keymats, 32, 32 ),
|
2016-09-16 23:18:35 +00:00
|
|
|
];
|
2016-03-31 04:23:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Actually encrypt the data, using a new random IV, and prepend the hmac
|
|
|
|
* of the encrypted data + IV, using a separate hmac key.
|
2016-09-30 21:13:57 +00:00
|
|
|
* @param string $data
|
|
|
|
* @param string $encKey
|
|
|
|
* @param string $hmacKey
|
2016-09-16 23:18:35 +00:00
|
|
|
* @return string $hmac.$iv.$ciphertext, each component b64 encoded
|
2016-03-31 04:23:48 +00:00
|
|
|
*/
|
|
|
|
private static function seal( $data, $encKey, $hmacKey ) {
|
|
|
|
$iv = MWCryptRand::generate( 16, true );
|
|
|
|
$ciphertext = openssl_encrypt(
|
|
|
|
$data,
|
|
|
|
'aes-256-ctr',
|
|
|
|
$encKey,
|
|
|
|
OPENSSL_RAW_DATA,
|
|
|
|
$iv
|
|
|
|
);
|
|
|
|
$sealed = base64_encode( $iv ) . '.' . base64_encode( $ciphertext );
|
|
|
|
$hmac = hash_hmac( 'sha256', $sealed, $hmacKey, true );
|
|
|
|
return base64_encode( $hmac ) . '.' . $sealed;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Decrypt data sealed using seal(). First checks the hmac to prevent various
|
|
|
|
* attacks.
|
2016-09-30 21:13:57 +00:00
|
|
|
* @param string $encrypted
|
|
|
|
* @param string $encKey
|
|
|
|
* @param string $hmacKey
|
2016-09-16 23:18:35 +00:00
|
|
|
* @return string plaintext
|
|
|
|
* @throws Exception
|
2016-03-31 04:23:48 +00:00
|
|
|
*/
|
|
|
|
private static function unseal( $encrypted, $encKey, $hmacKey ) {
|
|
|
|
$pieces = explode( '.', $encrypted );
|
|
|
|
if ( count( $pieces ) !== 3 ) {
|
|
|
|
throw new InvalidArgumentException( 'Invalid sealed-secret format' );
|
|
|
|
}
|
|
|
|
|
|
|
|
list( $hmac, $iv, $ciphertext ) = $pieces;
|
|
|
|
$integCalc = hash_hmac( 'sha256', $iv . '.' . $ciphertext, $hmacKey, true );
|
|
|
|
if ( !hash_equals( $integCalc, base64_decode( $hmac ) ) ) {
|
|
|
|
throw new Exception( 'Sealed secret has been tampered with, aborting.' );
|
|
|
|
}
|
|
|
|
|
|
|
|
return openssl_decrypt(
|
|
|
|
base64_decode( $ciphertext ),
|
|
|
|
'aes-256-ctr',
|
|
|
|
$encKey,
|
|
|
|
OPENSSL_RAW_DATA,
|
|
|
|
base64_decode( $iv )
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|