lam/lam/lib/2factor.inc
2025-10-02 21:17:50 +02:00

1402 lines
44 KiB
PHP

<?php
namespace LAM\LIB\TWO_FACTOR;
use DateInterval;
use DateTime;
use Duo\DuoUniversal\Client;
use Duo\DuoUniversal\DuoException;
use Exception;
use Facile\OpenIDClient\Client\ClientBuilder;
use Facile\OpenIDClient\Client\ClientInterface;
use Facile\OpenIDClient\Client\Metadata\ClientMetadata;
use Facile\OpenIDClient\Issuer\IssuerBuilder;
use GuzzleHttp\Psr7\ServerRequest;
use htmlResponsiveRow;
use LAM\LOGIN\WEBAUTHN\WebauthnManager;
use LAM_INTERFACE;
use SelfServiceLoginHandler;
use selfServiceProfile;
use LAMConfig;
use htmlImage;
use htmlButton;
use htmlJavaScript;
use htmlStatusMessage;
use htmlOutputText;
use htmlDiv;
use LAMException;
use Webauthn\PublicKeyCredentialCreationOptions;
/*
This code is part of LDAP Account Manager (http://www.ldap-account-manager.org/)
Copyright (C) 2017 - 2025 Roland Gruber
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
/**
* 2-factor authentication
*
* @package two_factor
* @author Roland Gruber
*/
interface TwoFactorProvider {
/**
* Returns a list of serial numbers of the user's tokens.
*
* @param string $user user name
* @param string $password password
* @return string[] serials
* @throws Exception error getting serials
*/
public function getSerials($user, $password);
/**
* Verifies if the provided 2nd factor is valid.
*
* @param string $user user name
* @param string $password password
* @param string $serial serial number of token
* @param string $twoFactorInput input for 2nd factor
* @return bool true if verified and false if verification failed
* @throws Exception error during check
*/
public function verify2ndFactor($user, $password, $serial, $twoFactorInput);
/**
* Returns if the service has a custom input form.
* In this case the token field is not displayed.
*
* @return bool has custom input form
*/
public function hasCustomInputForm();
/**
* Adds the custom input fields to the form.
*
* @param htmlResponsiveRow $row row where to add the input fields
* @param string $userDn user DN
*/
public function addCustomInput(&$row, $userDn);
/**
* Returns if the submit button should be shown.
*
* @return bool show submit button
*/
public function isShowSubmitButton();
/**
* Returns if the provider supports to remember the device.
*
* @return bool device remembering supported
*/
public function supportsToRememberDevice(): bool;
}
/**
* Base class for 2-factor authentication providers.
*
* @author Roland Gruber
*/
abstract class BaseProvider implements TwoFactorProvider {
protected $config;
/**
* {@inheritDoc}
* @see TwoFactorProvider::hasCustomInputForm
*/
public function hasCustomInputForm() {
return false;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::addCustomInput
*/
public function addCustomInput(&$row, $userDn) {
// must be filled by subclass if used
}
/**
* Returns the value of the user attribute in LDAP.
*
* @param string $userDn user DN
* @return string|null user name
*/
protected function getLoginAttributeValue($userDn) {
$attrName = $this->config->twoFactorAuthenticationSerialAttributeName;
$handle = getLDAPServerHandle();
$userData = ldapGetDN($userDn, [$attrName], $handle);
if (empty($userData[$attrName])) {
logNewMessage(LOG_DEBUG, getDefaultLDAPErrorString($handle));
return null;
}
if (is_array($userData[$attrName])) {
return $userData[$attrName][0];
}
return $userData[$attrName];
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::isShowSubmitButton
*/
public function isShowSubmitButton() {
return true;
}
}
/**
* Provider for privacyIDEA.
*/
class PrivacyIDEAProvider extends BaseProvider {
/**
* Constructor.
*
* @param TwoFactorConfiguration $config configuration
*/
public function __construct(&$config) {
$this->config = $config;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::getSerials
*/
public function getSerials($user, $password) {
logNewMessage(LOG_DEBUG, 'PrivacyIDEAProvider: Getting serials for ' . $user);
$loginAttribute = $this->getLoginAttributeValue($user);
$token = $this->authenticate($loginAttribute, $password);
return $this->getSerialsForUser($loginAttribute, $token);
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::verify2ndFactor
*/
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
logNewMessage(LOG_DEBUG, 'PrivacyIDEAProvider: Checking 2nd factor for ' . $user);
$loginAttribute = $this->getLoginAttributeValue($user);
$token = $this->authenticate($loginAttribute, $password);
return $this->verify($token, $serial, $twoFactorInput);
}
/**
* Authenticates against the server
*
* @param string $user user name
* @param string $password password
* @return string token
* @throws Exception error during authentication
*/
private function authenticate($user, $password) {
$curl = $this->getCurl();
$url = $this->config->twoFactorAuthenticationURL . "/auth";
curl_setopt($curl, CURLOPT_URL, $url);
$header = ['Accept: application/json'];
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
$options = [
'username' => $user,
'password' => $password,
];
curl_setopt($curl, CURLOPT_POSTFIELDS, $options);
$json = curl_exec($curl);
curl_close($curl);
if (empty($json)) {
throw new Exception("Unable to get server response from $url.");
}
$output = json_decode($json);
if (empty($output) || !isset($output->result) || !isset($output->result->status)) {
throw new Exception("Unable to get json from $url.");
}
$status = $output->result->status;
if ($status != 1) {
$errCode = $output->result->error->code ?? '';
$errMessage = $output->result->error->message ?? '';
throw new Exception("Unable to login: " . $errCode . ' ' . $errMessage);
}
if (!isset($output->result->value) || !isset($output->result->value->token)) {
throw new Exception("Unable to get token.");
}
return $output->result->value->token;
}
/**
* Returns the curl object.
*
* @return object curl handle
* @throws Exception error during curl creation
*/
private function getCurl() {
$curl = curl_init();
if ($this->config->twoFactorAuthenticationInsecure) {
curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 0);
}
curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
return $curl;
}
/**
* Returns the serial numbers of the user.
*
* @param string $user user name
* @param string $token login token
* @return string[] serials
* @throws Exception error during serial reading
*/
private function getSerialsForUser($user, $token) {
$curl = $this->getCurl();
$url = $this->config->twoFactorAuthenticationURL . "/token/?user=" . $user;
curl_setopt($curl, CURLOPT_URL, $url);
$header = ['Authorization: ' . $token, 'Accept: application/json'];
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
$json = curl_exec($curl);
curl_close($curl);
if (empty($json)) {
throw new Exception("Unable to get server response from $url.");
}
$output = json_decode($json);
if (empty($output) || !isset($output->result) || !isset($output->result->status)) {
throw new Exception("Unable to get json from $url.");
}
$status = $output->result->status;
if (($status != 1) || !isset($output->result->value) || !isset($output->result->value->tokens)) {
$errCode = $output->result->error->code ?? '';
$errMessage = $output->result->error->message ?? '';
throw new Exception("Unable to get serials: " . $errCode . ' ' . $errMessage);
}
$serials = [];
foreach ($output->result->value->tokens as $tokenEntry) {
if (!isset($tokenEntry->active) || ($tokenEntry->active != 1) || !isset($tokenEntry->serial)) {
continue;
}
$serials[] = $tokenEntry->serial;
}
return $serials;
}
/**
* Verifies if the given 2nd factor input is valid.
*
* @param string $token login token
* @param string $serial serial number
* @param string $twoFactorInput 2factor pin + password
*/
private function verify($token, $serial, $twoFactorInput) {
$curl = $this->getCurl();
$url = $this->config->twoFactorAuthenticationURL . "/validate/check";
curl_setopt($curl, CURLOPT_URL, $url);
$options = [
'pass' => $twoFactorInput,
'serial' => $serial,
];
curl_setopt($curl, CURLOPT_POSTFIELDS, $options);
$header = ['Authorization: ' . $token, 'Accept: application/json'];
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
$json = curl_exec($curl);
curl_close($curl);
$output = json_decode($json);
if (empty($output) || !isset($output->result) || !isset($output->result->status) || !isset($output->result->value)) {
throw new Exception("Unable to get json from $url.");
}
$status = $output->result->status;
$value = $output->result->value;
if (($status == 'true') && ($value == 'true')) {
return true;
}
logNewMessage(LOG_DEBUG, "Unable to verify token: " . print_r($output, true));
return false;
}
/**
* @inheritDoc
*/
public function supportsToRememberDevice(): bool {
return $this->config->twoFactorAllowToRememberDevice;
}
}
/**
* Authentication via YubiKeys.
*
* @author Roland Gruber
*/
class YubicoProvider extends BaseProvider {
/**
* Constructor.
*
* @param TwoFactorConfiguration $config configuration
*/
public function __construct(&$config) {
$this->config = $config;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::getSerials
*/
public function getSerials($user, $password) {
$keyAttributeName = strtolower($this->config->twoFactorAuthenticationSerialAttributeName);
if (isset($_SESSION['selfService_clientDN'])) {
$loginDn = lamDecrypt($_SESSION['selfService_clientDN'], 'SelfService');
}
else {
$loginDn = $_SESSION['ldap']->getUserName();
}
$handle = getLDAPServerHandle();
$ldapData = ldapGetDN($loginDn, [$keyAttributeName], $handle);
if (empty($ldapData[$keyAttributeName])) {
return [];
}
return [implode(', ', $ldapData[$keyAttributeName])];
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::verify2ndFactor
*/
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
include_once(__DIR__ . "/3rdParty/yubico/Yubico.php");
$serialData = $this->getSerials($user, $password);
if (empty($serialData)) {
return false;
}
$serials = explode(', ', $serialData[0]);
$serialMatched = false;
foreach ($serials as $serial) {
if (str_starts_with($twoFactorInput, $serial)) {
$serialMatched = true;
break;
}
}
if (!$serialMatched) {
throw new Exception(_('YubiKey id does not match allowed list of key ids.'));
}
$urls = $this->config->twoFactorAuthenticationURL;
shuffle($urls);
$httpsverify = !$this->config->twoFactorAuthenticationInsecure;
$clientId = $this->config->twoFactorAuthenticationClientId;
$secretKey = $this->config->twoFactorAuthenticationSecretKey;
foreach ($urls as $url) {
try {
$auth = new \Auth_Yubico($clientId, $secretKey, $url, $httpsverify);
$auth->verify($twoFactorInput);
return true;
}
catch (LAMException $e) {
logNewMessage(LOG_DEBUG, 'Unable to verify 2FA: ' . $e->getMessage());
}
}
return false;
}
/**
* @inheritDoc
*/
public function supportsToRememberDevice(): bool {
return $this->config->twoFactorAllowToRememberDevice;
}
}
/**
* Provider for DUO.
*/
class DuoProvider extends BaseProvider {
/**
* Constructor.
*
* @param TwoFactorConfiguration $config configuration
*/
public function __construct(&$config) {
$this->config = $config;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::getSerials
*/
public function getSerials($user, $password) {
return ['DUO'];
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::isShowSubmitButton
*/
public function isShowSubmitButton() {
return false;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::hasCustomInputForm
*/
public function hasCustomInputForm() {
return true;
}
/**
* {@inheritDoc}
* @see BaseProvider::addCustomInput
*/
public function addCustomInput(&$row, $userDn) {
$pathPrefix = ($this->config->interface === LAM_INTERFACE::SELF_SERVICE) ? '../' : '';
$row->add(new htmlImage($pathPrefix . '../graphics/duo.png'));
if (!empty($_GET['duo_code'])) {
// authentication is verified
return;
}
// authentication not started, provide redirect URL
if (empty($_GET['duoRedirect'])) {
$jsBlock = '
document.addEventListener("DOMContentLoaded", function(event) {
var currentLocation = window.location.href;
if (currentLocation.includes("?")) {
currentLocation = currentLocation.substring(0, currentLocation.indexOf("?"));
}
if (currentLocation.includes("#")) {
currentLocation = currentLocation.substring(0, currentLocation.indexOf("#"));
}
var targetUrl = currentLocation + "?duoRedirect=" + currentLocation;
window.location.href = targetUrl;
});
';
$row->add(new htmlJavaScript($jsBlock));
}
// start authentication
else {
include_once __DIR__ . '/3rdParty/composer/autoload.php';
try {
$duoClient = new Client(
$this->config->twoFactorAuthenticationClientId,
$this->config->twoFactorAuthenticationSecretKey,
$this->config->twoFactorAuthenticationURL,
$_GET['duoRedirect']
);
$duoClient->healthCheck();
$state = $duoClient->generateState();
$_SESSION['duo_state'] = $state;
$_SESSION['duo_redirect'] = $_GET['duoRedirect'];
$loginAttribute = $this->getLoginAttributeValue($userDn);
$redirectUrl = $duoClient->createAuthUrl($loginAttribute, $state);
$jsBlock = '
document.addEventListener("DOMContentLoaded", function(event) {
window.location.href = "' . $redirectUrl . '";
});
';
$row->add(new htmlJavaScript($jsBlock));
}
catch (DuoException $e) {
$row->add(new htmlStatusMessage('ERROR', _('Duo connection failed'), $e->getMessage()));
}
}
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::verify2ndFactor
*/
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
logNewMessage(LOG_DEBUG, 'DuoProvider: Checking 2nd factor for ' . $user);
$loginAttribute = $this->getLoginAttributeValue($user);
$state = $_GET['state'];
$code = $_GET['duo_code'];
if ($state !== $_SESSION['duo_state']) {
logNewMessage(LOG_ERR, 'DUO state does not match');
return false;
}
include_once __DIR__ . '/3rdParty/composer/autoload.php';
try {
$duoClient = new Client(
$this->config->twoFactorAuthenticationClientId,
$this->config->twoFactorAuthenticationSecretKey,
$this->config->twoFactorAuthenticationURL,
$_SESSION['duo_redirect']
);
$duoResult = $duoClient->exchangeAuthorizationCodeFor2FAResult($code, $loginAttribute);
logNewMessage(LOG_DEBUG, print_r($duoResult, true));
return true;
}
catch (DuoException $e) {
logNewMessage(LOG_ERR, 'DUO error: ' . $e->getMessage());
return false;
}
}
/**
* @inheritDoc
*/
public function supportsToRememberDevice(): bool {
return false;
}
}
/**
* Provider for Okta.
*/
class OktaProvider extends BaseProvider {
private $verificationFailed = false;
/**
* Constructor.
*
* @param TwoFactorConfiguration $config configuration
*/
public function __construct(&$config) {
$this->config = $config;
if (empty($this->config->twoFactorAuthenticationSerialAttributeName)) {
$this->config->twoFactorAuthenticationSerialAttributeName = 'mail';
}
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::getSerials
*/
public function getSerials($user, $password) {
return ['OKTA'];
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::isShowSubmitButton
*/
public function isShowSubmitButton() {
return false;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::hasCustomInputForm
*/
public function hasCustomInputForm() {
return true;
}
/**
* {@inheritDoc}
* @throws LAMException error building custom input
* @see BaseProvider::addCustomInput
*/
public function addCustomInput(&$row, $userDn) {
if (($this->config->loginHandler === null) || !$this->config->loginHandler->managesAuthentication()) {
$loginAttribute = $this->getLoginAttributeValue($userDn);
if (empty($loginAttribute)) {
throw new LAMException('Unable to read login attribute from ' . $userDn);
}
}
if ($this->verificationFailed) {
return;
}
$pathPrefix = ($this->config->interface === LAM_INTERFACE::SELF_SERVICE) ? '../' : '';
$row->add(new htmlImage($pathPrefix . '../graphics/okta.png'));
$_SESSION['okta_state'] = bin2hex(random_bytes(10));
$_SESSION['okta_code_verifier'] = bin2hex(random_bytes(50));
$hash = hash('sha256', $_SESSION['okta_code_verifier'], true);
$codeChallenge = rtrim(strtr(base64_encode($hash), '+/', '-_'), '=');
$jsBlock = '
document.addEventListener("DOMContentLoaded", function(event) {
if (window.location.href.indexOf("code=") < 0) {
var currentLocation = window.location.href;
if (currentLocation.includes("#")) {
currentLocation = currentLocation.substring(0, currentLocation.indexOf("#"));
}
window.location.href = "' . $this->config->twoFactorAuthenticationURL
. '/oauth2/default/v1/authorize?code_challenge_method=S256&response_type=code&scope=openid email profile&client_id='
. $this->config->twoFactorAuthenticationClientId
. '&code_challenge=' . $codeChallenge
. '&state=' . $_SESSION['okta_state']
. '&redirect_uri=" + currentLocation
}
});
';
$row->add(new htmlJavaScript($jsBlock));
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::verify2ndFactor
*/
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
$this->verificationFailed = true;
logNewMessage(LOG_DEBUG, 'OktaProvider: Checking 2nd factor for ' . $user);
if (empty($_GET['state']) || ($_GET['state'] !== $_SESSION['okta_state'])) {
logNewMessage(LOG_ERR, 'Okta state does not match.');
return false;
}
if (!empty($_GET['error'])) {
logNewMessage(LOG_ERR, 'Okta reported an error: ' . $_GET['error']);
return false;
}
$code = $_GET['code'];
if (empty($code)) {
logNewMessage(LOG_DEBUG, 'No code provided for 2FA verification.');
return false;
}
$accessCode = $this->getAccessCode($code);
if (empty($accessCode)) {
logNewMessage(LOG_DEBUG, 'No access code readable for Okta 2FA verification.');
return false;
}
try {
$claims = json_decode(base64_decode(explode('.', $accessCode)[1]), true);
logNewMessage(LOG_DEBUG, 'Okta claims: ' . print_r($claims, true));
$oktaUser = $claims['sub'];
if (($this->config->loginHandler !== null) && $this->config->loginHandler->managesAuthentication()) {
$this->config->loginHandler->authorize2FaUser($oktaUser);
}
else {
$loginAttribute = $this->getLoginAttributeValue($user);
if ($loginAttribute !== $oktaUser) {
logNewMessage(LOG_ERR, 'User name ' . $loginAttribute . ' does not match claim sub: ' . $oktaUser);
return false;
}
}
$this->verificationFailed = false;
return true;
}
catch (Exception $e) {
logNewMessage(LOG_ERR, 'Unable to validate access code - ' . $e->getMessage());
}
return false;
}
/**
* Reads the access code using code.
*
* @param string $code code parameter from request
* @return string|null access token
*/
private function getAccessCode($code) {
$curl = curl_init();
curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
$url = $this->config->twoFactorAuthenticationURL . '/oauth2/default/v1/token';
curl_setopt($curl, CURLOPT_URL, $url);
curl_setopt($curl, CURLOPT_POST, true);
$callingUrl = getCallingURL();
$callingUrl = substr($callingUrl, 0, strpos($callingUrl, '?'));
logNewMessage(LOG_DEBUG, 'Get Okta access code.');
curl_setopt($curl, CURLOPT_POSTFIELDS, http_build_query([
'grant_type' => 'authorization_code',
'code' => $code,
'code_verifier' => $_SESSION['okta_code_verifier'],
'redirect_uri' => $callingUrl,
'client_id' => $this->config->twoFactorAuthenticationClientId,
'client_secret' => $this->config->twoFactorAuthenticationSecretKey
]));
curl_setopt($curl, CURLOPT_HTTPHEADER, [
'accept: application/json',
'content-type: application/x-www-form-urlencoded',
]);
$results = curl_exec($curl);
$returnCode = curl_errno($curl);
logNewMessage(LOG_DEBUG, 'Okta responded with ' . $returnCode . ': ' . $results);
curl_close($curl);
if ($returnCode !== 0) {
logNewMessage(LOG_ERR, 'Error calling Okta ' . $url
. '. ' . $returnCode);
return null;
}
$jsonData = json_decode($results, true);
if (empty($jsonData['access_token'])) {
return null;
}
return $jsonData['access_token'];
}
/**
* @inheritDoc
*/
public function supportsToRememberDevice(): bool {
return false;
}
}
/**
* Provider for OpenId.
*/
class OpenIdProvider extends BaseProvider {
private $verificationFailed = false;
/**
* Constructor.
*
* @param TwoFactorConfiguration $config configuration
*/
public function __construct(&$config) {
$this->config = $config;
if (empty($this->config->twoFactorAuthenticationSerialAttributeName)) {
$this->config->twoFactorAuthenticationSerialAttributeName = 'uid';
}
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::getSerials
*/
public function getSerials($user, $password) {
return ['OpenID'];
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::isShowSubmitButton
*/
public function isShowSubmitButton() {
return false;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::hasCustomInputForm
*/
public function hasCustomInputForm() {
return true;
}
/**
* {@inheritDoc}
* @throws LAMException error building custom input
* @see BaseProvider::addCustomInput
*/
public function addCustomInput(&$row, $userDn) {
$loginAttribute = '';
if (($this->config->loginHandler === null) || !$this->config->loginHandler->managesAuthentication()) {
$loginAttribute = $this->getLoginAttributeValue($userDn);
if (empty($loginAttribute)) {
throw new LAMException('Unable to read login attribute from ' . $userDn);
}
}
if ($this->verificationFailed) {
return;
}
$content = new htmlResponsiveRow();
$pathPrefix = ($this->config->interface === LAM_INTERFACE::SELF_SERVICE) ? '../' : '';
$row->add(new htmlImage($pathPrefix . '../graphics/openid.png'));
include_once __DIR__ . '/3rdParty/composer/autoload.php';
try {
$client = $this->getOpenIdClient();
$authorizationService = $this->getAuthorizationService();
$redirectAuthorizationUri = $authorizationService->getAuthorizationUri(
$client,
['login_hint' => $loginAttribute]
);
$jsBlock = '
document.addEventListener("DOMContentLoaded", function(event) {
var currentLocation = window.location.href;
if (currentLocation.includes("?")) {
currentLocation = currentLocation.substring(0, currentLocation.indexOf("?"));
}
if (currentLocation.includes("#")) {
currentLocation = currentLocation.substring(0, currentLocation.indexOf("#"));
}
if (window.location.href.indexOf("code=") > 0) {
var targetUrl = window.location.href + "&redirect_uri=" + currentLocation;
window.location.href = targetUrl;
}
else {
window.location.href = "' . $redirectAuthorizationUri . '&redirect_uri=" + currentLocation
}
});
';
$content->add(new htmlJavaScript($jsBlock));
}
catch (Exception $e) {
$content->add(new htmlStatusMessage('ERROR', _('OpenID connection failed'), $e->getMessage()));
}
$row->add($content);
}
/**
* Returns the client object.
*
* @return ClientInterface client
*/
private function getOpenIdClient(): ClientInterface {
$issuer = (new IssuerBuilder())->build($this->config->twoFactorAuthenticationURL . '/.well-known/openid-configuration');
$meta = [
'client_id' => $this->config->twoFactorAuthenticationClientId,
'client_secret' => $this->config->twoFactorAuthenticationSecretKey,
'token_endpoint_auth_method' => 'client_secret_basic',
];
if (!empty($_GET['redirect_uri'])) {
$meta['redirect_uri'] = $_GET['redirect_uri'];
}
$clientMetadata = ClientMetadata::fromArray($meta);
return (new ClientBuilder())
->setIssuer($issuer)
->setClientMetadata($clientMetadata)
->build();
}
/**
* Returns the authorization service.
*
* @return \Facile\OpenIDClient\Service\AuthorizationService service
*/
private function getAuthorizationService(): \Facile\OpenIDClient\Service\AuthorizationService {
return (new \Facile\OpenIDClient\Service\Builder\AuthorizationServiceBuilder())->build();
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::verify2ndFactor
*/
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
$this->verificationFailed = true;
logNewMessage(LOG_DEBUG, 'OpenIdProvider: Checking 2nd factor for ' . $user);
$code = $_GET['code'];
if (empty($code)) {
logNewMessage(LOG_DEBUG, 'No code provided for 2FA verification.');
return false;
}
include_once __DIR__ . '/3rdParty/composer/autoload.php';
$client = $this->getOpenIdClient();
$authorizationService = $this->getAuthorizationService();
$serverRequest = ServerRequest::fromGlobals();
try {
$callbackParams = $authorizationService->getCallbackParams($serverRequest, $client);
$tokenSet = $authorizationService->callback($client, $callbackParams, $_GET['redirect_uri']);
$claims = $tokenSet->claims();
logNewMessage(LOG_DEBUG, print_r($claims, true));
$openIdUser = $claims['preferred_username'];
if (($this->config->loginHandler !== null) && $this->config->loginHandler->managesAuthentication()) {
$this->config->loginHandler->authorize2FaUser($openIdUser);
}
else {
$loginAttribute = $this->getLoginAttributeValue($user);
if ($loginAttribute !== $openIdUser) {
logNewMessage(LOG_ERR, 'User name ' . $loginAttribute . ' does not match claim preferred_username: ' . $openIdUser);
return false;
}
}
$this->verificationFailed = false;
return true;
}
catch (Exception $e) {
logNewMessage(LOG_ERR, 'Unable to validate JWT - ' . $e->getMessage());
}
return false;
}
/**
* @inheritDoc
*/
public function supportsToRememberDevice(): bool {
return false;
}
}
/**
* Provider for Webauthn.
*/
class WebauthnProvider extends BaseProvider {
/**
* Constructor.
*
* @param TwoFactorConfiguration $config configuration
*/
public function __construct($config) {
$this->config = $config;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::getSerials
*/
public function getSerials($user, $password) {
return ['WEBAUTHN'];
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::isShowSubmitButton
*/
public function isShowSubmitButton() {
return false;
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::hasCustomInputForm
*/
public function hasCustomInputForm() {
return true;
}
/**
* {@inheritDoc}
* @see BaseProvider::addCustomInput
*/
public function addCustomInput(&$row, $userDn) {
if (!extension_loaded('PDO')) {
$row->add(new htmlStatusMessage('ERROR', 'WebAuthn requires the PDO extension for PHP.'));
return;
}
$pdoDrivers = \PDO::getAvailableDrivers();
if (!in_array('sqlite', $pdoDrivers)) {
$row->add(new htmlStatusMessage('ERROR', 'WebAuthn requires the sqlite PDO driver for PHP.'));
return;
}
include_once __DIR__ . '/webauthn.inc';
$webauthnManager = $this->getWebauthnManager();
$hasTokens = $webauthnManager->isRegistered($userDn);
if ($hasTokens) {
$row->add(new htmlStatusMessage('INFO', _('Please authenticate with your security device.')));
}
else {
$row->add(new htmlStatusMessage('INFO', _('Please register a security device.')));
}
$row->addVerticalSpacer('2rem');
$pathPrefix = ($this->config->interface === LAM_INTERFACE::SELF_SERVICE) ? '../' : '';
$selfServiceParam = ($this->config->interface === LAM_INTERFACE::SELF_SERVICE) ? 'selfservice=true' : '';
$row->add(new htmlImage($pathPrefix . '../graphics/webauthn.svg', '50%'));
$row->addVerticalSpacer('1rem');
$errorMessage = new htmlStatusMessage('ERROR', '', _('This service requires a browser with "WebAuthn" support.'));
$row->add(new htmlDiv(null, $errorMessage, ['hidden webauthn-error']));
if (($this->config->twoFactorAuthenticationOptional === true) && !$hasTokens) {
$registerButton = new htmlButton('register_webauthn', _('Register new key'));
$registerButton->setType('button');
$registerButton->setCSSClasses(['fullwidth']);
$row->add($registerButton);
$skipButton = new htmlButton('skip_webauthn', _('Skip'));
$skipButton->setCSSClasses(['fullwidth']);
$row->add($skipButton);
}
$errorMessageDiv = new htmlDiv('generic-webauthn-error', new htmlOutputText(''));
$errorMessageDiv->addDataAttribute('button', _('Ok'));
$errorMessageDiv->addDataAttribute('title', _('WebAuthn failed'));
$row->add($errorMessageDiv);
$row->add(new htmlJavaScript('window.lam.webauthn.start(\'' . $pathPrefix . '\', \'' . $selfServiceParam . '\',' .
' \'' . _('Do you want to set a name for this device?') . '\', \'' . _('Name') . '\',' .
' \'' . _('Ok') . '\', \'' . _('Cancel') . '\');'), 0);
}
/**
* Returns the webauthn manager.
*
* @return WebauthnManager manager
*/
public function getWebauthnManager() {
return new WebauthnManager();
}
/**
* {@inheritDoc}
* @see TwoFactorProvider::verify2ndFactor
*/
public function verify2ndFactor($user, $password, $serial, $twoFactorInput) {
logNewMessage(LOG_DEBUG, 'WebauthnProvider: Checking 2nd factor for ' . $user);
include_once __DIR__ . '/webauthn.inc';
$webauthnManager = $this->getWebauthnManager();
if (!empty($_SESSION['ldap'])) {
$userDn = $_SESSION['ldap']->getUserName();
}
else {
$userDn = lamDecrypt($_SESSION['selfService_clientDN'], 'SelfService');
}
$hasTokens = $webauthnManager->isRegistered($userDn);
if (!$hasTokens) {
if ($this->config->twoFactorAuthenticationOptional && !$webauthnManager->isRegistered($user) && ($_POST['sig_response'] === 'skip')) {
logNewMessage(LOG_DEBUG, 'Skipped 2FA for ' . $user . ' as no devices are registered and 2FA is optional.');
return true;
}
$response = base64_decode($_POST['sig_response']);
$registrationObject = PublicKeyCredentialCreationOptions::createFromString($_SESSION['webauthn_registration']);
if (!$webauthnManager->storeNewRegistration($registrationObject, $response)) {
return false;
}
if (!empty($_POST['newName'])) {
$deviceList = $webauthnManager->getDatabase()->findAllForUserDn($userDn);
$webauthnManager->getDatabase()->updateDeviceName($userDn, base64_encode($deviceList[0]->getPublicKeyCredentialId()), $_POST['newName']);
}
return true;
}
else {
logNewMessage(LOG_DEBUG, 'Checking WebAuthn response of ' . $userDn);
$response = base64_decode($_POST['sig_response']);
return $webauthnManager->isValidAuthentication($response, $userDn);
}
}
/**
* @inheritDoc
*/
public function supportsToRememberDevice(): bool {
return $this->config->twoFactorAllowToRememberDevice;
}
}
/**
* Returns the correct 2 factor provider.
*/
class TwoFactorProviderService {
/** 2factor authentication disabled */
public const TWO_FACTOR_NONE = 'none';
/** 2factor authentication via privacyIDEA */
public const TWO_FACTOR_PRIVACYIDEA = 'privacyidea';
/** 2factor authentication via YubiKey */
public const TWO_FACTOR_YUBICO = 'yubico';
/** 2factor authentication via DUO */
public const TWO_FACTOR_DUO = 'duo';
/** 2factor authentication via webauthn */
public const TWO_FACTOR_WEBAUTHN = 'webauthn';
/** 2factor authentication via Okta */
public const TWO_FACTOR_OKTA = 'okta';
/** 2factor authentication via OpenId */
public const TWO_FACTOR_OPENID = 'openid';
/** date format when remembering devices */
private const DEVICE_REMEMBER_DATE_FORMAT = 'Y-m-d H:i:s';
private TwoFactorConfiguration $config;
/**
* Constructor.
*
* @param selfServiceProfile|LAMConfig $configObj profile
*/
public function __construct(selfServiceProfile|LAMConfig $configObj) {
if ($configObj instanceof selfServiceProfile) {
$this->config = $this->getConfigSelfService($configObj);
}
else {
$this->config = $this->getConfigAdmin($configObj);
}
}
/**
* Returns the provider for the given type.
*
* @return TwoFactorProvider provider
* @throws Exception unable to get provider
*/
public function getProvider() {
if ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA) {
return new PrivacyIDEAProvider($this->config);
}
elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
return new YubicoProvider($this->config);
}
elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_DUO) {
return new DuoProvider($this->config);
}
elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_WEBAUTHN) {
return new WebauthnProvider($this->config);
}
elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_OKTA) {
return new OktaProvider($this->config);
}
elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_OPENID) {
return new OpenIdProvider($this->config);
}
throw new Exception('Invalid provider: ' . $this->config->twoFactorAuthentication);
}
/**
* Remembers the users device.
*
* @param string $user user name
* @throws Exception error getting provider
*/
public function rememberDevice(string $user): void {
if (!$this->getProvider()->supportsToRememberDevice()) {
logNewMessage(LOG_ERR, 'The selected 2FA provider does not support to remember devices.');
return;
}
if (empty($this->config->twoFactorRememberDevicePassword)) {
logNewMessage(LOG_ERR, 'The selected 2FA password to remember devices is empty.');
return;
}
$dataToEncrypt = [
'user' => $user,
'timestamp' => getFormattedTime(self::DEVICE_REMEMBER_DATE_FORMAT),
];
if (!empty($_SERVER['HTTP_USER_AGENT'])) {
$dataToEncrypt['userAgent'] = $_SERVER['HTTP_USER_AGENT'];
}
if (!empty($_SERVER['REMOTE_ADDR'])) {
$dataToEncrypt['clientIp'] = $_SERVER['REMOTE_ADDR'];
}
$iv = openssl_random_pseudo_bytes(16);
$encryptedData = openssl_encrypt(json_encode($dataToEncrypt), lamEncryptionAlgo(),
$this->config->twoFactorRememberDevicePassword, 0, $iv);
$data = [
'iv' => base64_encode($iv),
'data' => base64_encode($encryptedData)
];
$cookieOptions = lamDefaultCookieOptions();
$cookieOptions['expires'] = time() + intval($this->config->twoFactorRememberDeviceDuration);
$this->setCookie('lam_remember_2fa', json_encode($data), $cookieOptions);
}
/**
* Sets a cookie.
*
* @param string $name cookie name
* @param string $value cookie value
* @param array $options cookie options
*/
protected function setCookie(string $name, string $value, array $options): void {
setcookie($name, $value, $options);
}
/**
* Returns if the user has selected to save the device before.
*
* @param string $user user name
* @return bool valid remembered device
* @throws Exception error getting provider
*/
public function isValidRememberedDevice(string $user): bool {
if (!$this->getProvider()->supportsToRememberDevice()) {
logNewMessage(LOG_ERR, 'The selected 2FA provider does not support to remember devices.');
return false;
}
if (empty($this->config->twoFactorRememberDevicePassword)) {
logNewMessage(LOG_ERR, 'The selected 2FA password to remember devices is empty.');
return false;
}
if (empty($this->config->twoFactorRememberDeviceDuration)) {
logNewMessage(LOG_ERR, 'The selected 2FA remember device period is empty.');
return false;
}
if (!isset($_COOKIE['lam_remember_2fa'])) {
return false;
}
$data = json_decode($_COOKIE['lam_remember_2fa'], true);
if (($data === null) || empty($data['iv']) || empty($data['data'])) {
return false;
}
$iv = base64_decode($data['iv']);
$decryptedData = openssl_decrypt(base64_decode($data['data']), lamEncryptionAlgo(),
$this->config->twoFactorRememberDevicePassword, 0, $iv);
if ($decryptedData === false) {
return false;
}
$decryptedData = json_decode($decryptedData, true);
if (!isset($decryptedData['user'])) {
return false;
}
if ($decryptedData['user'] !== $user) {
logNewMessage(LOG_DEBUG, 'User name for remembered device does not match. ' . $user . ' - ' . $decryptedData['user']);
return false;
}
if (!empty($decryptedData['userAgent'])
&& (empty($_SERVER['HTTP_USER_AGENT']) || ($decryptedData['userAgent'] !== $_SERVER['HTTP_USER_AGENT']))) {
logNewMessage(LOG_DEBUG, 'User agent for remembered device does not match. ' . $decryptedData['user']);
return false;
}
if (!empty($decryptedData['clientIp'])
&& (empty($_SERVER['REMOTE_ADDR']) || ($decryptedData['clientIp'] !== $_SERVER['REMOTE_ADDR']))) {
logNewMessage(LOG_DEBUG, 'Client IP for remembered device does not match. ' . $decryptedData['clientIp']);
return false;
}
try {
$acceptedTime = new DateTime('now', getTimeZone());
$acceptedTime = $acceptedTime->sub(new DateInterval('PT' . $this->config->twoFactorRememberDeviceDuration . 'S'));
$deviceDate = DateTime::createFromFormat(self::DEVICE_REMEMBER_DATE_FORMAT, $decryptedData['timestamp'], getTimeZone());
if ($deviceDate > $acceptedTime) {
return true;
}
}
catch (Exception $e) {
logNewMessage(LOG_ERR, 'Unable to check remembered device of ' . $user . ': ' . $e->getMessage());
}
return false;
}
/**
* Returns the configuration from self service.
*
* @param selfServiceProfile $profile profile
* @return TwoFactorConfiguration configuration
*/
private function getConfigSelfService(&$profile): TwoFactorConfiguration {
$tfConfig = new TwoFactorConfiguration();
$tfConfig->interface = LAM_INTERFACE::SELF_SERVICE;
$tfConfig->twoFactorAuthentication = $profile->twoFactorAuthentication;
$tfConfig->twoFactorAuthenticationInsecure = $profile->twoFactorAuthenticationInsecure;
$tfConfig->twoFactorAuthenticationOptional = $profile->twoFactorAuthenticationOptional;
if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
$tfConfig->twoFactorAuthenticationURL = explode("\r\n", $profile->twoFactorAuthenticationURL);
}
else {
$tfConfig->twoFactorAuthenticationURL = $profile->twoFactorAuthenticationURL;
}
$tfConfig->twoFactorAuthenticationClientId = $profile->twoFactorAuthenticationClientId;
$tfConfig->twoFactorAuthenticationSecretKey = $profile->twoFactorAuthenticationSecretKey;
if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
$moduleSettings = $profile->moduleSettings;
if (!empty($moduleSettings['yubiKeyUser_attributeName'][0])) {
$tfConfig->twoFactorAuthenticationSerialAttributeName = $moduleSettings['yubiKeyUser_attributeName'][0];
}
else {
$tfConfig->twoFactorAuthenticationSerialAttributeName = 'yubiKeyId';
}
}
if (($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_DUO)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_OKTA)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_OPENID)) {
$attrName = $profile->twoFactorAuthenticationAttribute;
if (empty($attrName)) {
$attrName = 'uid';
}
$tfConfig->twoFactorAuthenticationSerialAttributeName = strtolower($attrName);
}
if (($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_WEBAUTHN)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO)) {
$tfConfig->twoFactorAllowToRememberDevice = ($profile->twoFactorAllowToRememberDevice === 'true');
$tfConfig->twoFactorRememberDeviceDuration = $profile->twoFactorRememberDeviceDuration;
$tfConfig->twoFactorRememberDevicePassword = $profile->twoFactorRememberDevicePassword;
}
$tfConfig->loginHandler = $profile->getLoginHandler();
return $tfConfig;
}
/**
* Returns the configuration for admin interface.
*
* @param LAMConfig $conf configuration
* @return TwoFactorConfiguration configuration
*/
private function getConfigAdmin($conf): TwoFactorConfiguration {
$tfConfig = new TwoFactorConfiguration();
$tfConfig->interface = LAM_INTERFACE::ADMIN;
$tfConfig->twoFactorAuthentication = $conf->getTwoFactorAuthentication();
$tfConfig->twoFactorAuthenticationInsecure = $conf->getTwoFactorAuthenticationInsecure();
$tfConfig->twoFactorAuthenticationOptional = $conf->getTwoFactorAuthenticationOptional();
if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
$tfConfig->twoFactorAuthenticationURL = explode("\r\n", $conf->getTwoFactorAuthenticationURL());
}
else {
$tfConfig->twoFactorAuthenticationURL = $conf->getTwoFactorAuthenticationURL();
}
$tfConfig->twoFactorAuthenticationClientId = $conf->getTwoFactorAuthenticationClientId();
$tfConfig->twoFactorAuthenticationSecretKey = $conf->getTwoFactorAuthenticationSecretKey();
if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) {
$moduleSettings = $conf->get_moduleSettings();
if (!empty($moduleSettings['yubiKeyUser_attributeName'][0])) {
$tfConfig->twoFactorAuthenticationSerialAttributeName = $moduleSettings['yubiKeyUser_attributeName'][0];
}
else {
$tfConfig->twoFactorAuthenticationSerialAttributeName = 'yubiKeyId';
}
}
if (($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_DUO)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_OKTA)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_OPENID)) {
$tfConfig->twoFactorAuthenticationSerialAttributeName = strtolower($conf->getTwoFactorAuthenticationAttribute());
}
if (($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_WEBAUTHN)
|| ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO)) {
$tfConfig->twoFactorAllowToRememberDevice = ($conf->getTwoFactorAllowToRememberDevice() === 'true');
$tfConfig->twoFactorRememberDeviceDuration = $conf->getTwoFactorRememberDeviceDuration();
$tfConfig->twoFactorRememberDevicePassword = $conf->getTwoFactorRememberDevicePassword();
}
return $tfConfig;
}
}
/**
* Configuration settings for 2-factor authentication.
*
* @author Roland Gruber
*/
class TwoFactorConfiguration {
/** LAM UI */
public LAM_INTERFACE $interface = LAM_INTERFACE::ADMIN;
/**
* @var ?string provider id
*/
public ?string $twoFactorAuthentication = null;
/**
* @var string|array service URL(s)
*/
public $twoFactorAuthenticationURL;
/**
* @var bool disable certificate check
*/
public bool $twoFactorAuthenticationInsecure = false;
/**
* @var ?string client ID for API access
*/
public ?string $twoFactorAuthenticationClientId = null;
/**
* @var ?string secret key for API access
*/
public ?string $twoFactorAuthenticationSecretKey = null;
/**
* @var ?string LDAP attribute name that stores the token serials
*/
public ?string $twoFactorAuthenticationSerialAttributeName = null;
/**
* @var bool 2FA is optional
*/
public bool $twoFactorAuthenticationOptional = false;
/**
* @var bool allow to remember 2nd factor
*/
public bool $twoFactorAllowToRememberDevice = false;
/**
* @var string duration for remembering
*/
public string $twoFactorRememberDeviceDuration = '';
/**
* @var string password for remembering
*/
public string $twoFactorRememberDevicePassword = '';
/**
* @var SelfServiceLoginHandler|null login handler
*/
public ?SelfServiceLoginHandler $loginHandler = null;
}