config->twoFactorAuthenticationSerialAttributeName; $userData = ldapGetDN($userDn, array($attrName)); if (empty($userData[$attrName])) { return null; } if (is_array($userData[$attrName])) { return $userData[$attrName][0]; } return $userData[$attrName]; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::isShowSubmitButton() */ public function isShowSubmitButton() { return true; } } /** * Provider for privacyIDEA. */ class PrivacyIDEAProvider extends BaseProvider { /** * Constructor. * * @param TwoFactorConfiguration $config configuration */ public function __construct(&$config) { $this->config = $config; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::getSerials() */ public function getSerials($user, $password) { logNewMessage(LOG_DEBUG, 'PrivacyIDEAProvider: Getting serials for ' . $user); $loginAttribute = $this->getLoginAttributeValue($user); $token = $this->authenticate($loginAttribute, $password); return $this->getSerialsForUser($loginAttribute, $token); } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::verify2ndFactor() */ public function verify2ndFactor($user, $password, $serial, $twoFactorInput) { logNewMessage(LOG_DEBUG, 'PrivacyIDEAProvider: Checking 2nd factor for ' . $user); $loginAttribute = $this->getLoginAttributeValue($user); $token = $this->authenticate($loginAttribute, $password); return $this->verify($token, $serial, $twoFactorInput); } /** * Authenticates against the server * * @param string $user user name * @param string $password password * @return string token * @throws \Exception error during authentication */ private function authenticate($user, $password) { $curl = $this->getCurl(); $url = $this->config->twoFactorAuthenticationURL . "/auth"; curl_setopt($curl, CURLOPT_URL, $url); $header = array('Accept: application/json'); curl_setopt($curl, CURLOPT_HTTPHEADER, $header); $options = array( 'username' => $user, 'password' => $password, ); curl_setopt($curl, CURLOPT_POSTFIELDS, $options); $json = curl_exec($curl); curl_close($curl); if (empty($json)) { throw new \Exception("Unable to get server response from $url."); } $output = json_decode($json); if (empty($output) || !isset($output->result) || !isset($output->result->status)) { throw new \Exception("Unable to get json from $url."); } $status = $output->result->status; if ($status != 1) { $errCode = isset($output->result->error) && isset($output->result->error->code) ? $output->result->error->code : ''; $errMessage = isset($output->result->error) && isset($output->result->error->message) ? $output->result->error->message : ''; throw new \Exception("Unable to login: " . $errCode . ' ' . $errMessage); } if (!isset($output->result->value) || !isset($output->result->value->token)) { throw new \Exception("Unable to get token."); } return $output->result->value->token; } /** * Returns the curl object. * * @return object curl handle * @throws \Exception error during curl creation */ private function getCurl() { $curl = curl_init(); if ($this->config->twoFactorAuthenticationInsecure) { curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 0); } curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); return $curl; } /** * Returns the serial numbers of the user. * * @param string $user user name * @param string $token login token * @return string[] serials * @throws \Exception error during serial reading */ private function getSerialsForUser($user, $token) { $curl = $this->getCurl(); $url = $this->config->twoFactorAuthenticationURL . "/token/?user=" . $user; curl_setopt($curl, CURLOPT_URL, $url); $header = array('Authorization: ' . $token, 'Accept: application/json'); curl_setopt($curl, CURLOPT_HTTPHEADER, $header); $json = curl_exec($curl); curl_close($curl); if (empty($json)) { throw new \Exception("Unable to get server response from $url."); } $output = json_decode($json); if (empty($output) || !isset($output->result) || !isset($output->result->status)) { throw new \Exception("Unable to get json from $url."); } $status = $output->result->status; if (($status != 1) || !isset($output->result->value) || !isset($output->result->value->tokens)) { $errCode = isset($output->result->error) && isset($output->result->error->code) ? $output->result->error->code : ''; $errMessage = isset($output->result->error) && isset($output->result->error->message) ? $output->result->error->message : ''; throw new \Exception("Unable to get serials: " . $errCode . ' ' . $errMessage); } $serials = array(); foreach ($output->result->value->tokens as $tokenEntry) { if (!isset($tokenEntry->active) || ($tokenEntry->active != 1) || !isset($tokenEntry->serial)) { continue; } $serials[] = $tokenEntry->serial; } return $serials; } /** * Verifies if the given 2nd factor input is valid. * * @param string $token login token * @param string $serial serial number * @param string $twoFactorInput 2factor pin + password */ private function verify($token, $serial, $twoFactorInput) { $curl = $this->getCurl(); $url = $this->config->twoFactorAuthenticationURL . "/validate/check"; curl_setopt($curl, CURLOPT_URL, $url); $options = array( 'pass' => $twoFactorInput, 'serial' => $serial, ); curl_setopt($curl, CURLOPT_POSTFIELDS, $options); $header = array('Authorization: ' . $token, 'Accept: application/json'); curl_setopt($curl, CURLOPT_HTTPHEADER, $header); $json = curl_exec($curl); curl_close($curl); $output = json_decode($json); if (empty($output) || !isset($output->result) || !isset($output->result->status) || !isset($output->result->value)) { throw new \Exception("Unable to get json from $url."); } $status = $output->result->status; $value = $output->result->value; if (($status == 'true') && ($value == 'true')) { return true; } logNewMessage(LOG_DEBUG, "Unable to verify token: " . print_r($output, true)); return false; } } /** * Authentication via YubiKeys. * * @author Roland Gruber */ class YubicoProvider extends BaseProvider { /** * Constructor. * * @param TwoFactorConfiguration $config configuration */ public function __construct(&$config) { $this->config = $config; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::getSerials() */ public function getSerials($user, $password) { $keyAttributeName = strtolower($this->config->twoFactorAuthenticationSerialAttributeName); if (isset($_SESSION['selfService_clientDN'])) { $loginDn = lamDecrypt($_SESSION['selfService_clientDN'], 'SelfService'); } else { $loginDn = $_SESSION['ldap']->getUserName(); } $handle = getLDAPServerHandle(); $ldapData = ldapGetDN($loginDn, array($keyAttributeName), $handle); if (empty($ldapData[$keyAttributeName])) { return array(); } return array(implode(', ', $ldapData[$keyAttributeName])); } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::verify2ndFactor() */ public function verify2ndFactor($user, $password, $serial, $twoFactorInput) { include_once(__DIR__ . "/3rdParty/yubico/Yubico.php"); $serialData = $this->getSerials($user, $password); if (empty($serialData)) { return false; } $serials = explode(', ', $serialData[0]); $serialMatched = false; foreach ($serials as $serial) { if (strpos($twoFactorInput, $serial) === 0) { $serialMatched = true; break; } } if (!$serialMatched) { throw new \Exception(_('YubiKey id does not match allowed list of key ids.')); } $urls = $this->config->twoFactorAuthenticationURL; shuffle($urls); $httpsverify = !$this->config->twoFactorAuthenticationInsecure; $clientId = $this->config->twoFactorAuthenticationClientId; $secretKey = $this->config->twoFactorAuthenticationSecretKey; foreach ($urls as $url) { try { $auth = new \Auth_Yubico($clientId, $secretKey, $url, $httpsverify); $auth->verify($twoFactorInput); return true; } catch (LAMException $e) { logNewMessage(LOG_DEBUG, 'Unable to verify 2FA: ' . $e->getMessage()); } } return false; } } /** * Provider for DUO. */ class DuoProvider extends BaseProvider { /** * Constructor. * * @param TwoFactorConfiguration $config configuration */ public function __construct(&$config) { $this->config = $config; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::getSerials() */ public function getSerials($user, $password) { return array('DUO'); } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::isShowSubmitButton() */ public function isShowSubmitButton() { return false; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::hasCustomInputForm() */ public function hasCustomInputForm() { return true; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\BaseProvider::addCustomInput() */ public function addCustomInput(&$row, $userDn) { $loginAttribute = $this->getLoginAttributeValue($userDn); $aKey = $this->getAKey(); include_once(__DIR__ . "/3rdParty/duo/Web.php"); $signedRequest = \Duo\Web::signRequest($this->config->twoFactorAuthenticationClientId, $this->config->twoFactorAuthenticationSecretKey, $aKey, $loginAttribute); if ($this->config->isSelfService) { $row->add(new htmlScript("../lib/extra/duo/Duo-Web-v2.js", false, false), 12); } else { $row->add(new htmlScript("lib/extra/duo/Duo-Web-v2.js", false, false), 12); } $iframe = new htmlIframe('duo_iframe'); $iframe->addDataAttribute('host', $this->config->twoFactorAuthenticationURL); $iframe->addDataAttribute('sig-request', $signedRequest); $row->add($iframe, 12); } /** * Returns the aKey. * * @return String aKey */ private function getAKey() { if (empty($_SESSION['duo_akey'])) { $_SESSION['duo_akey'] = generateRandomPassword(40); } return $_SESSION['duo_akey']; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::verify2ndFactor() */ public function verify2ndFactor($user, $password, $serial, $twoFactorInput) { logNewMessage(LOG_DEBUG, 'DuoProvider: Checking 2nd factor for ' . $user); $loginAttribute = $this->getLoginAttributeValue($user); $response = $_POST['sig_response']; include_once(__DIR__ . "/3rdParty/duo/Web.php"); $result = \Duo\Web::verifyResponse( $this->config->twoFactorAuthenticationClientId, $this->config->twoFactorAuthenticationSecretKey, $this->getAKey(), $response); if ($result === $loginAttribute) { return true; } logNewMessage(LOG_ERR, 'DUO authentication failed'); return false; } } /** * Provider for Webauthn. */ class WebauthnProvider extends BaseProvider { /** * Constructor. * * @param TwoFactorConfiguration $config configuration */ public function __construct($config) { $this->config = $config; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::getSerials() */ public function getSerials($user, $password) { return array('WEBAUTHN'); } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::isShowSubmitButton() */ public function isShowSubmitButton() { return false; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::hasCustomInputForm() */ public function hasCustomInputForm() { return true; } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\BaseProvider::addCustomInput() */ public function addCustomInput(&$row, $userDn) { if (version_compare(phpversion(), '7.2.0') < 0) { $row->add(new htmlStatusMessage('ERROR', 'Webauthn requires PHP 7.2.'), 12); return; } if (!extension_loaded('PDO')) { $row->add(new htmlStatusMessage('ERROR', 'Webauthn requires the PDO extension for PHP.'), 12); return; } $pdoDrivers = \PDO::getAvailableDrivers(); if (!in_array('sqlite', $pdoDrivers)) { $row->add(new htmlStatusMessage('ERROR', 'Webauthn requires the sqlite PDO driver for PHP.'), 12); return; } include_once __DIR__ . '/webauthn.inc'; $webauthnManager = $this->getWebauthnManager(); $hasTokens = $webauthnManager->isRegistered($userDn); if ($hasTokens) { $row->add(new htmlStatusMessage('INFO', _('Please authenticate with your security device.')), 12); } else { $row->add(new htmlStatusMessage('INFO', _('Please register a security device.')), 12); } $row->addVerticalSpacer('2rem'); $pathPrefix = $this->config->isSelfService ? '../' : ''; $selfServiceParam = $this->config->isSelfService ? 'true' : 'false'; $row->add(new htmlImage($pathPrefix . '../graphics/webauthn.svg'), 12); $row->addVerticalSpacer('1rem'); $registerButton = new htmlButton('register_webauthn', _('Register new key')); $registerButton->setCSSClasses(array('fullwidth hidden')); $row->add($registerButton, 12); $loginButton = new htmlButton('login_webauthn', _('Login')); $loginButton->setCSSClasses(array('fullwidth hidden')); $row->add($loginButton, 12); $errorMessage = new htmlStatusMessage('ERROR', '', _('This service requires a browser with "WebAuthn" support.')); $row->add(new htmlDiv(null, $errorMessage, array('hidden webauthn-error')), 12); if ($this->config->twoFactorAuthenticationOptional === true) { if (!$hasTokens) { $skipButton = new htmlButton('skip_webauthn', _('Skip')); $skipButton->setCSSClasses(array('fullwidth')); $row->add($skipButton, 12); } } $errorMessageDiv = new htmlDiv('generic-webauthn-error', new htmlOutputText('')); $errorMessageDiv->addDataAttribute('button', _('Ok')); $errorMessageDiv->addDataAttribute('title', _('Webauthn failed')); $row->add($errorMessageDiv, 12); $row->add(new htmlJavaScript('window.lam.webauthn.start(\'' . $pathPrefix . '\', ' . $selfServiceParam . ');'), 0); } /** * Returns the webauthn manager. * * @return WebauthnManager manager */ public function getWebauthnManager() { return new WebauthnManager(); } /** * {@inheritDoc} * @see \LAM\LIB\TWO_FACTOR\TwoFactorProvider::verify2ndFactor() */ public function verify2ndFactor($user, $password, $serial, $twoFactorInput) { logNewMessage(LOG_DEBUG, 'WebauthnProvider: Checking 2nd factor for ' . $user); include_once __DIR__ . '/webauthn.inc'; $webauthnManager = $this->getWebauthnManager(); if (!empty($_SESSION['ldap'])) { $userDn = $_SESSION['ldap']->getUserName(); } else { $userDn = lamDecrypt($_SESSION['selfService_clientDN'], 'SelfService'); } $hasTokens = $webauthnManager->isRegistered($userDn); if (!$hasTokens) { if ($this->config->twoFactorAuthenticationOptional && !$webauthnManager->isRegistered($user) && ($_POST['sig_response'] === 'skip')) { logNewMessage(LOG_DEBUG, 'Skipped 2FA for ' . $user . ' as no devices are registered and 2FA is optional.'); return true; } $response = base64_decode($_POST['sig_response']); $registrationObject = PublicKeyCredentialCreationOptions::createFromString($_SESSION['webauthn_registration']); return $webauthnManager->storeNewRegistration($registrationObject, $response); } else { logNewMessage(LOG_DEBUG, 'Checking webauthn response of ' . $userDn); $response = base64_decode($_POST['sig_response']); return $webauthnManager->isValidAuthentication($response, $userDn); } } } /** * Returns the correct 2 factor provider. */ class TwoFactorProviderService { /** 2factor authentication disabled */ const TWO_FACTOR_NONE = 'none'; /** 2factor authentication via privacyIDEA */ const TWO_FACTOR_PRIVACYIDEA = 'privacyidea'; /** 2factor authentication via YubiKey */ const TWO_FACTOR_YUBICO = 'yubico'; /** 2factor authentication via DUO */ const TWO_FACTOR_DUO = 'duo'; /** 2factor authentication via webauthn */ const TWO_FACTOR_WEBAUTHN = 'webauthn'; private $config; /** * Constructor. * * @param selfServiceProfile|LAMConfig $configObj profile */ public function __construct(&$configObj) { if ($configObj instanceof selfServiceProfile) { $this->config = $this->getConfigSelfService($configObj); } else { $this->config = $this->getConfigAdmin($configObj); } } /** * Returns the provider for the given type. * * @param string $type authentication type * @return TwoFactorProvider provider * @throws \Exception unable to get provider */ public function getProvider() { if ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA) { return new PrivacyIDEAProvider($this->config); } elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) { return new YubicoProvider($this->config); } elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_DUO) { return new DuoProvider($this->config); } elseif ($this->config->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_WEBAUTHN) { return new WebauthnProvider($this->config); } throw new \Exception('Invalid provider: ' . $this->config->twoFactorAuthentication); } /** * Returns the configuration from self service. * * @param selfServiceProfile $profile profile * @return TwoFactorConfiguration configuration */ private function getConfigSelfService(&$profile) { $tfConfig = new TwoFactorConfiguration(); $tfConfig->isSelfService = true; $tfConfig->twoFactorAuthentication = $profile->twoFactorAuthentication; $tfConfig->twoFactorAuthenticationInsecure = $profile->twoFactorAuthenticationInsecure; $tfConfig->twoFactorAuthenticationOptional = $profile->twoFactorAuthenticationOptional; if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) { $tfConfig->twoFactorAuthenticationURL = explode("\r\n", $profile->twoFactorAuthenticationURL); } else { $tfConfig->twoFactorAuthenticationURL = $profile->twoFactorAuthenticationURL; } $tfConfig->twoFactorAuthenticationClientId = $profile->twoFactorAuthenticationClientId; $tfConfig->twoFactorAuthenticationSecretKey = $profile->twoFactorAuthenticationSecretKey; if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) { $moduleSettings = $profile->moduleSettings; if (!empty($moduleSettings['yubiKeyUser_attributeName'][0])) { $tfConfig->twoFactorAuthenticationSerialAttributeName = $moduleSettings['yubiKeyUser_attributeName'][0]; } else { $tfConfig->twoFactorAuthenticationSerialAttributeName = 'yubiKeyId'; } } if (($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA) || ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_DUO)) { $attrName = $profile->twoFactorAuthenticationAttribute; if (empty($attrName)) { $attrName = 'uid'; } $tfConfig->twoFactorAuthenticationSerialAttributeName = strtolower($attrName); } return $tfConfig; } /** * Returns the configuration for admin interface. * * @param LAMConfig $conf configuration * @return TwoFactorConfiguration configuration */ private function getConfigAdmin($conf) { $tfConfig = new TwoFactorConfiguration(); $tfConfig->isSelfService = false; $tfConfig->twoFactorAuthentication = $conf->getTwoFactorAuthentication(); $tfConfig->twoFactorAuthenticationInsecure = $conf->getTwoFactorAuthenticationInsecure(); $tfConfig->twoFactorAuthenticationOptional = $conf->getTwoFactorAuthenticationOptional(); if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) { $tfConfig->twoFactorAuthenticationURL = explode("\r\n", $conf->getTwoFactorAuthenticationURL()); } else { $tfConfig->twoFactorAuthenticationURL = $conf->getTwoFactorAuthenticationURL(); } $tfConfig->twoFactorAuthenticationClientId = $conf->getTwoFactorAuthenticationClientId(); $tfConfig->twoFactorAuthenticationSecretKey = $conf->getTwoFactorAuthenticationSecretKey(); if ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_YUBICO) { $moduleSettings = $conf->get_moduleSettings(); if (!empty($moduleSettings['yubiKeyUser_attributeName'][0])) { $tfConfig->twoFactorAuthenticationSerialAttributeName = $moduleSettings['yubiKeyUser_attributeName'][0]; } else { $tfConfig->twoFactorAuthenticationSerialAttributeName = 'yubiKeyId'; } } if (($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_PRIVACYIDEA) || ($tfConfig->twoFactorAuthentication == TwoFactorProviderService::TWO_FACTOR_DUO)) { $tfConfig->twoFactorAuthenticationSerialAttributeName = strtolower($conf->getTwoFactorAuthenticationAttribute()); } return $tfConfig; } } /** * Configuration settings for 2-factor authentication. * * @author Roland Gruber */ class TwoFactorConfiguration { /** * @var bool is self service */ public $isSelfService = false; /** * @var string provider id */ public $twoFactorAuthentication = null; /** * @var string|array service URL(s) */ public $twoFactorAuthenticationURL = null; /** * @var disable certificate check */ public $twoFactorAuthenticationInsecure = false; /** * @var client ID for API access */ public $twoFactorAuthenticationClientId = null; /** * @var secret key for API access */ public $twoFactorAuthenticationSecretKey = null; /** * @var LDAP attribute name that stores the token serials */ public $twoFactorAuthenticationSerialAttributeName = null; /** * @var bool 2FA is optional */ public $twoFactorAuthenticationOptional = false; }