LDAPAccountManager/lam/lib/3rdParty/duo/Web.php

177 lines
4.9 KiB
PHP

<?php
namespace Duo;
/*
* https://duo.com/docs/duoweb
*/
class Web
{
const DUO_PREFIX = "TX";
const APP_PREFIX = "APP";
const AUTH_PREFIX = "AUTH";
const DUO_EXPIRE = 300;
const APP_EXPIRE = 3600;
const INIT_EXPIRE = 300;
const IKEY_LEN = 20;
const SKEY_LEN = 40;
const AKEY_LEN = 40; // if this changes you have to change ERR_AKEY
const ERR_USER = 'ERR|The username specified is invalid.';
const ERR_IKEY = 'ERR|The Duo integration key specified is invalid.';
const ERR_SKEY = 'ERR|The Duo secret key specified is invalid.';
const ERR_AKEY = 'ERR|The application secret key specified must be at least 40 characters.';
const LIBRARY_NAME = 'duo_php';
const VERSION = '1.0.0';
private static function signVals($key, $vals, $prefix, $expire, $time = null, $algo = "sha1")
{
$exp = ($time ? $time : time()) + $expire;
$val = $vals . '|' . $exp;
$b64 = base64_encode($val);
$cookie = $prefix . '|' . $b64;
$sig = hash_hmac($algo, $cookie, $key);
return $cookie . '|' . $sig;
}
private static function parseVals($key, $val, $prefix, $ikey, $time = null, $algo = "sha1")
{
$ts = ($time ? $time : time());
$parts = explode('|', $val);
if (count($parts) !== 3) {
return null;
}
list($u_prefix, $u_b64, $u_sig) = $parts;
$sig = hash_hmac($algo, $u_prefix . '|' . $u_b64, $key);
if (hash_hmac($algo, $sig, $key) !== hash_hmac($algo, $u_sig, $key)) {
return null;
}
if ($u_prefix !== $prefix) {
return null;
}
$cookie_parts = explode('|', base64_decode($u_b64));
if (count($cookie_parts) !== 3) {
return null;
}
list($user, $u_ikey, $exp) = $cookie_parts;
if ($u_ikey !== $ikey) {
return null;
}
if ($ts >= intval($exp)) {
return null;
}
return $user;
}
public static function signRequest($ikey, $skey, $akey, $username, $time = null)
{
if (!isset($username) || strlen($username) === 0) {
return self::ERR_USER;
}
if (strpos($username, '|') !== false) {
return self::ERR_USER;
}
if (!isset($ikey) || strlen($ikey) !== self::IKEY_LEN) {
return self::ERR_IKEY;
}
if (!isset($skey) || strlen($skey) !== self::SKEY_LEN) {
return self::ERR_SKEY;
}
if (!isset($akey) || strlen($akey) < self::AKEY_LEN) {
return self::ERR_AKEY;
}
$vals = $username . '|' . $ikey;
$duo_sig = self::signVals($skey, $vals, self::DUO_PREFIX, self::DUO_EXPIRE, $time);
$app_sig = self::signVals($akey, $vals, self::APP_PREFIX, self::APP_EXPIRE, $time);
return $duo_sig . ':' . $app_sig;
}
public static function verifyResponse($ikey, $skey, $akey, $sig_response, $time = null)
{
list($auth_sig, $app_sig) = explode(':', $sig_response);
$auth_user = self::parseVals($skey, $auth_sig, self::AUTH_PREFIX, $ikey, $time);
$app_user = self::parseVals($akey, $app_sig, self::APP_PREFIX, $ikey, $time);
if ($auth_user !== $app_user) {
return null;
}
return $auth_user;
}
public static function initAuth($client, $ikey, $akey, $username, $enroll_only = false)
{
if (!isset($username) || strlen($username) === 0) {
return self::ERR_USER;
}
if (strpos($username, '|') !== false) {
return self::ERR_USER;
}
if (!isset($ikey) || strlen($ikey) !== self::IKEY_LEN) {
return self::ERR_IKEY;
}
if (!isset($akey) || strlen($akey) < self::AKEY_LEN) {
return self::ERR_AKEY;
}
$blob = $username . '|' . $ikey;
$signed_blob = self::signVals(
$akey,
$blob,
self::APP_PREFIX,
self::APP_EXPIRE,
null,
'sha512'
);
$expire = time() + self::INIT_EXPIRE;
$client_version = self::LIBRARY_NAME . '/' . self::VERSION;
$response = $client->init(
$username,
$signed_blob,
$expire,
$client_version,
$enroll_only
);
return $response['response']['response']['txid'];
}
public static function verifyAuth($client, $ikey, $akey, $response_txid)
{
$response = $client->auth_response($response_txid);
$username = $response['response']['response']['uname'];
$signed_blob = $response['response']['response']['app_blob'];
$parsed_user = self::parseVals(
$akey,
$signed_blob,
self::APP_PREFIX,
$ikey,
null,
'sha512'
);
if ($username !== $parsed_user) {
return null;
}
return $username;
}
}