Alternative implementation of passing totp to the legacy Minecraft authorization protocol to not break the yggdrasil's protocol [deploy]

This commit is contained in:
ErickSkrauch 2021-03-08 22:21:10 +01:00
parent 9a3534ea2b
commit 7a80c44cab
No known key found for this signature in database
GPG Key ID: 669339FCBB30EE0E
3 changed files with 65 additions and 26 deletions

View File

@ -29,11 +29,6 @@ class AuthenticationForm extends ApiForm {
*/ */
public $password; public $password;
/**
* @var string
*/
public $totp;
/** /**
* @var string * @var string
*/ */
@ -47,7 +42,6 @@ class AuthenticationForm extends ApiForm {
public function rules(): array { public function rules(): array {
return [ return [
[['username', 'password', 'clientToken'], RequiredValidator::class], [['username', 'password', 'clientToken'], RequiredValidator::class],
[['totp'], 'string'],
[['clientToken'], ClientTokenValidator::class], [['clientToken'], ClientTokenValidator::class],
[['requestUser'], 'boolean'], [['requestUser'], 'boolean'],
]; ];
@ -68,17 +62,31 @@ class AuthenticationForm extends ApiForm {
// so we keep such behavior // so we keep such behavior
$attribute = strpos($this->username, '@') === false ? 'nickname' : 'email'; $attribute = strpos($this->username, '@') === false ? 'nickname' : 'email';
$password = $this->password;
$totp = null;
if (preg_match('/.{8,}:(\d{6})$/', $password, $matches) === 1) {
$totp = $matches[1];
$password = mb_substr($password, 0, -7); // :123456 - 7 chars
}
login:
$loginForm = new LoginForm(); $loginForm = new LoginForm();
$loginForm->login = $this->username; $loginForm->login = $this->username;
$loginForm->password = $this->password; $loginForm->password = $password;
$loginForm->totp = $this->totp; $loginForm->totp = $totp;
if (!$loginForm->validate() || $loginForm->getAccount()->status === Account::STATUS_DELETED) {
$errors = $loginForm->getFirstErrors();
if (isset($errors['totp'])) {
Authserver::error("User with login = '{$this->username}' protected by two factor auth.");
throw new ForbiddenOperationException('Account protected with two factor auth.');
}
$isValid = $loginForm->validate();
// Handle case when user's password matches the template for totp via password
if (!$isValid && $totp !== null && $loginForm->getFirstError('password') === E::PASSWORD_INCORRECT) {
$password = "{$password}:{$totp}";
$totp = null;
goto login;
}
if (!$isValid || $loginForm->getAccount()->status === Account::STATUS_DELETED) {
$errors = $loginForm->getFirstErrors();
if (isset($errors['login'])) { if (isset($errors['login'])) {
if ($errors['login'] === E::ACCOUNT_BANNED) { if ($errors['login'] === E::ACCOUNT_BANNED) {
Authserver::error("User with login = '{$this->username}' is banned"); Authserver::error("User with login = '{$this->username}' is banned");
@ -88,9 +96,14 @@ class AuthenticationForm extends ApiForm {
Authserver::error("Cannot find user by login = '{$this->username}'"); Authserver::error("Cannot find user by login = '{$this->username}'");
} elseif (isset($errors['password'])) { } elseif (isset($errors['password'])) {
Authserver::error("User with login = '{$this->username}' passed wrong password."); Authserver::error("User with login = '{$this->username}' passed wrong password.");
} } elseif (isset($errors['totp'])) {
if ($errors['totp'] === E::TOTP_REQUIRED) {
Authserver::error("User with login = '{$this->username}' protected by two factor auth.");
throw new ForbiddenOperationException('Account protected with two factor auth.');
}
// TODO: эта логика дублируется с логикой в SignoutForm Authserver::error("User with login = '{$this->username}' passed wrong totp token");
}
throw new ForbiddenOperationException("Invalid credentials. Invalid {$attribute} or password."); throw new ForbiddenOperationException("Invalid credentials. Invalid {$attribute} or password.");
} }

View File

@ -95,8 +95,7 @@ class AuthorizationCest {
public function byEmailWithEnabledTwoFactorAuthAndCorrectToken(FunctionalTester $I) { public function byEmailWithEnabledTwoFactorAuthAndCorrectToken(FunctionalTester $I) {
$I->sendPOST('/api/authserver/authentication/authenticate', [ $I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'otp@gmail.com', 'username' => 'otp@gmail.com',
'password' => 'password_0', 'password' => 'password_0:' . TOTP::create('BBBB')->now(),
'totp' => TOTP::create('BBBB')->now(),
'clientToken' => Uuid::uuid4()->toString(), 'clientToken' => Uuid::uuid4()->toString(),
]); ]);
$I->canSeeResponseCodeIs(200); $I->canSeeResponseCodeIs(200);

View File

@ -6,12 +6,13 @@ namespace codeception\api\unit\modules\authserver\models;
use api\modules\authserver\exceptions\ForbiddenOperationException; use api\modules\authserver\exceptions\ForbiddenOperationException;
use api\modules\authserver\models\AuthenticationForm; use api\modules\authserver\models\AuthenticationForm;
use api\tests\unit\TestCase; use api\tests\unit\TestCase;
use common\models\Account;
use common\models\OauthClient; use common\models\OauthClient;
use common\models\OauthSession; use common\models\OauthSession;
use common\tests\fixtures\AccountFixture; use common\tests\fixtures\AccountFixture;
use common\tests\fixtures\OauthClientFixture; use common\tests\fixtures\OauthClientFixture;
use OTPHP\TOTP; use OTPHP\TOTP;
use Ramsey\Uuid\Uuid; use function Ramsey\Uuid\v4 as uuid4;
class AuthenticationFormTest extends TestCase { class AuthenticationFormTest extends TestCase {
@ -26,7 +27,7 @@ class AuthenticationFormTest extends TestCase {
$authForm = new AuthenticationForm(); $authForm = new AuthenticationForm();
$authForm->username = 'admin'; $authForm->username = 'admin';
$authForm->password = 'password_0'; $authForm->password = 'password_0';
$authForm->clientToken = Uuid::uuid4()->toString(); $authForm->clientToken = uuid4();
$result = $authForm->authenticate()->getResponseData(); $result = $authForm->authenticate()->getResponseData();
$this->assertMatchesRegularExpression('/^[\w=-]+\.[\w=-]+\.[\w=-]+$/', $result['accessToken']); $this->assertMatchesRegularExpression('/^[\w=-]+\.[\w=-]+\.[\w=-]+$/', $result['accessToken']);
$this->assertSame($authForm->clientToken, $result['clientToken']); $this->assertSame($authForm->clientToken, $result['clientToken']);
@ -55,9 +56,29 @@ class AuthenticationFormTest extends TestCase {
public function testAuthenticateByValidCredentialsWith2FA() { public function testAuthenticateByValidCredentialsWith2FA() {
$authForm = new AuthenticationForm(); $authForm = new AuthenticationForm();
$authForm->username = 'otp@gmail.com'; $authForm->username = 'otp@gmail.com';
$authForm->password = 'password_0'; $authForm->password = 'password_0:' . TOTP::create('BBBB')->now();
$authForm->totp = TOTP::create('BBBB')->now(); $authForm->clientToken = uuid4();
$authForm->clientToken = Uuid::uuid4()->toString();
// Just ensure that there is no exception
$this->expectNotToPerformAssertions();
$authForm->authenticate();
}
/**
* This is a special case which ensures that if the user has a password that looks like
* a two-factor code passed in the password field, than he can still log in into his account
*/
public function testAuthenticateEdgyCaseFor2FA() {
/** @var Account $account */
$account = Account::findOne(['email' => 'admin@ely.by']);
$account->setPassword('password_0:123456');
$account->save();
$authForm = new AuthenticationForm();
$authForm->username = 'admin@ely.by';
$authForm->password = 'password_0:123456';
$authForm->clientToken = uuid4();
// Just ensure that there is no exception // Just ensure that there is no exception
$this->expectNotToPerformAssertions(); $this->expectNotToPerformAssertions();
@ -68,14 +89,19 @@ class AuthenticationFormTest extends TestCase {
/** /**
* @dataProvider getInvalidCredentialsCases * @dataProvider getInvalidCredentialsCases
*/ */
public function testAuthenticateByWrongNicknamePass(string $expectedExceptionMessage, string $login, string $password) { public function testAuthenticateByWrongCredentials(
string $expectedExceptionMessage,
string $login,
string $password,
string $totp = null
) {
$this->expectException(ForbiddenOperationException::class); $this->expectException(ForbiddenOperationException::class);
$this->expectExceptionMessage($expectedExceptionMessage); $this->expectExceptionMessage($expectedExceptionMessage);
$authForm = new AuthenticationForm(); $authForm = new AuthenticationForm();
$authForm->username = $login; $authForm->username = $login;
$authForm->password = $password; $authForm->password = $password . ($totp ? ":{$totp}" : '');
$authForm->clientToken = Uuid::uuid4()->toString(); $authForm->clientToken = uuid4();
$authForm->authenticate(); $authForm->authenticate();
} }
@ -84,6 +110,7 @@ class AuthenticationFormTest extends TestCase {
yield ['Invalid credentials. Invalid email or password.', 'wrong-email@ely.by', 'wrong-password']; yield ['Invalid credentials. Invalid email or password.', 'wrong-email@ely.by', 'wrong-password'];
yield ['This account has been suspended.', 'Banned', 'password_0']; yield ['This account has been suspended.', 'Banned', 'password_0'];
yield ['Account protected with two factor auth.', 'AccountWithEnabledOtp', 'password_0']; yield ['Account protected with two factor auth.', 'AccountWithEnabledOtp', 'password_0'];
yield ['Invalid credentials. Invalid nickname or password.', 'AccountWithEnabledOtp', 'password_0', '123456'];
} }
} }