177 lines
4.9 KiB
PHP
177 lines
4.9 KiB
PHP
|
<?php
|
||
|
namespace Duo;
|
||
|
|
||
|
/*
|
||
|
* https://duo.com/docs/duoweb
|
||
|
*/
|
||
|
|
||
|
class Web
|
||
|
{
|
||
|
const DUO_PREFIX = "TX";
|
||
|
const APP_PREFIX = "APP";
|
||
|
const AUTH_PREFIX = "AUTH";
|
||
|
|
||
|
const DUO_EXPIRE = 300;
|
||
|
const APP_EXPIRE = 3600;
|
||
|
const INIT_EXPIRE = 300;
|
||
|
|
||
|
const IKEY_LEN = 20;
|
||
|
const SKEY_LEN = 40;
|
||
|
const AKEY_LEN = 40; // if this changes you have to change ERR_AKEY
|
||
|
|
||
|
const ERR_USER = 'ERR|The username specified is invalid.';
|
||
|
const ERR_IKEY = 'ERR|The Duo integration key specified is invalid.';
|
||
|
const ERR_SKEY = 'ERR|The Duo secret key specified is invalid.';
|
||
|
const ERR_AKEY = 'ERR|The application secret key specified must be at least 40 characters.';
|
||
|
|
||
|
const LIBRARY_NAME = 'duo_php';
|
||
|
const VERSION = '1.0.0';
|
||
|
|
||
|
private static function signVals($key, $vals, $prefix, $expire, $time = null, $algo = "sha1")
|
||
|
{
|
||
|
$exp = ($time ? $time : time()) + $expire;
|
||
|
$val = $vals . '|' . $exp;
|
||
|
$b64 = base64_encode($val);
|
||
|
$cookie = $prefix . '|' . $b64;
|
||
|
|
||
|
$sig = hash_hmac($algo, $cookie, $key);
|
||
|
return $cookie . '|' . $sig;
|
||
|
}
|
||
|
|
||
|
private static function parseVals($key, $val, $prefix, $ikey, $time = null, $algo = "sha1")
|
||
|
{
|
||
|
$ts = ($time ? $time : time());
|
||
|
|
||
|
$parts = explode('|', $val);
|
||
|
if (count($parts) !== 3) {
|
||
|
return null;
|
||
|
}
|
||
|
list($u_prefix, $u_b64, $u_sig) = $parts;
|
||
|
|
||
|
$sig = hash_hmac($algo, $u_prefix . '|' . $u_b64, $key);
|
||
|
if (hash_hmac($algo, $sig, $key) !== hash_hmac($algo, $u_sig, $key)) {
|
||
|
return null;
|
||
|
}
|
||
|
|
||
|
if ($u_prefix !== $prefix) {
|
||
|
return null;
|
||
|
}
|
||
|
|
||
|
$cookie_parts = explode('|', base64_decode($u_b64));
|
||
|
if (count($cookie_parts) !== 3) {
|
||
|
return null;
|
||
|
}
|
||
|
list($user, $u_ikey, $exp) = $cookie_parts;
|
||
|
|
||
|
if ($u_ikey !== $ikey) {
|
||
|
return null;
|
||
|
}
|
||
|
if ($ts >= intval($exp)) {
|
||
|
return null;
|
||
|
}
|
||
|
|
||
|
return $user;
|
||
|
}
|
||
|
|
||
|
public static function signRequest($ikey, $skey, $akey, $username, $time = null)
|
||
|
{
|
||
|
if (!isset($username) || strlen($username) === 0) {
|
||
|
return self::ERR_USER;
|
||
|
}
|
||
|
if (strpos($username, '|') !== false) {
|
||
|
return self::ERR_USER;
|
||
|
}
|
||
|
if (!isset($ikey) || strlen($ikey) !== self::IKEY_LEN) {
|
||
|
return self::ERR_IKEY;
|
||
|
}
|
||
|
if (!isset($skey) || strlen($skey) !== self::SKEY_LEN) {
|
||
|
return self::ERR_SKEY;
|
||
|
}
|
||
|
if (!isset($akey) || strlen($akey) < self::AKEY_LEN) {
|
||
|
return self::ERR_AKEY;
|
||
|
}
|
||
|
|
||
|
$vals = $username . '|' . $ikey;
|
||
|
|
||
|
$duo_sig = self::signVals($skey, $vals, self::DUO_PREFIX, self::DUO_EXPIRE, $time);
|
||
|
$app_sig = self::signVals($akey, $vals, self::APP_PREFIX, self::APP_EXPIRE, $time);
|
||
|
|
||
|
return $duo_sig . ':' . $app_sig;
|
||
|
}
|
||
|
|
||
|
public static function verifyResponse($ikey, $skey, $akey, $sig_response, $time = null)
|
||
|
{
|
||
|
list($auth_sig, $app_sig) = explode(':', $sig_response);
|
||
|
|
||
|
$auth_user = self::parseVals($skey, $auth_sig, self::AUTH_PREFIX, $ikey, $time);
|
||
|
$app_user = self::parseVals($akey, $app_sig, self::APP_PREFIX, $ikey, $time);
|
||
|
|
||
|
if ($auth_user !== $app_user) {
|
||
|
return null;
|
||
|
}
|
||
|
|
||
|
return $auth_user;
|
||
|
}
|
||
|
|
||
|
public static function initAuth($client, $ikey, $akey, $username, $enroll_only = false)
|
||
|
{
|
||
|
if (!isset($username) || strlen($username) === 0) {
|
||
|
return self::ERR_USER;
|
||
|
}
|
||
|
if (strpos($username, '|') !== false) {
|
||
|
return self::ERR_USER;
|
||
|
}
|
||
|
if (!isset($ikey) || strlen($ikey) !== self::IKEY_LEN) {
|
||
|
return self::ERR_IKEY;
|
||
|
}
|
||
|
if (!isset($akey) || strlen($akey) < self::AKEY_LEN) {
|
||
|
return self::ERR_AKEY;
|
||
|
}
|
||
|
|
||
|
$blob = $username . '|' . $ikey;
|
||
|
$signed_blob = self::signVals(
|
||
|
$akey,
|
||
|
$blob,
|
||
|
self::APP_PREFIX,
|
||
|
self::APP_EXPIRE,
|
||
|
null,
|
||
|
'sha512'
|
||
|
);
|
||
|
$expire = time() + self::INIT_EXPIRE;
|
||
|
$client_version = self::LIBRARY_NAME . '/' . self::VERSION;
|
||
|
|
||
|
$response = $client->init(
|
||
|
$username,
|
||
|
$signed_blob,
|
||
|
$expire,
|
||
|
$client_version,
|
||
|
$enroll_only
|
||
|
);
|
||
|
|
||
|
return $response['response']['response']['txid'];
|
||
|
}
|
||
|
|
||
|
public static function verifyAuth($client, $ikey, $akey, $response_txid)
|
||
|
{
|
||
|
$response = $client->auth_response($response_txid);
|
||
|
|
||
|
$username = $response['response']['response']['uname'];
|
||
|
$signed_blob = $response['response']['response']['app_blob'];
|
||
|
|
||
|
$parsed_user = self::parseVals(
|
||
|
$akey,
|
||
|
$signed_blob,
|
||
|
self::APP_PREFIX,
|
||
|
$ikey,
|
||
|
null,
|
||
|
'sha512'
|
||
|
);
|
||
|
|
||
|
if ($username !== $parsed_user) {
|
||
|
return null;
|
||
|
}
|
||
|
|
||
|
return $username;
|
||
|
}
|
||
|
}
|