-
-
Notifications
You must be signed in to change notification settings - Fork 406
/
auth_2fa.php
169 lines (143 loc) · 5.91 KB
/
auth_2fa.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
<?php
/*
+-------------------------------------------------------------------------+
| Copyright (C) 2004-2024 The Cacti Group |
| |
| This program is free software; you can redistribute it and/or |
| modify it under the terms of the GNU General Public License |
| as published by the Free Software Foundation; either version 2 |
| of the License, or (at your option) any later version. |
| |
| This program is distributed in the hope that it will be useful, |
| but WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| GNU General Public License for more details. |
+-------------------------------------------------------------------------+
| Cacti: The Complete RRDtool-based Graphing Solution |
+-------------------------------------------------------------------------+
| This code is designed, written, and maintained by the Cacti Group. See |
| about.php and/or the AUTHORS file for specific developer information. |
+-------------------------------------------------------------------------+
| http://www.cacti.net/ |
+-------------------------------------------------------------------------+
*/
include(__DIR__ . '/include/global.php');
/* set default action */
set_default_action();
if (!isset($_SESSION[SESS_USER_ID])) {
header('Location: logout.php');
exit;
}
$user = db_fetch_row_prepared('SELECT id, username, tfa_enabled, tfa_secret, login_opts
FROM user_auth
WHERE id = ?',
array($_SESSION[SESS_USER_ID]));
$message = '';
$tfaMins = intval(read_config_option('secpass_mfatime'));
if ($tfaMins <= 0) {
$tfaMins = 60;
}
$tfaBase = intval(floor((time() / (60 * $tfaMins))));
$tfaTime = time() - $tfaBase;
// See if we have no 2FA time set, and if so, lets try and get it from the cookie
if (empty($_SESSION[SESS_USER_2FA]) && isset($_COOKIE[session_name() . '_otp'])) {
list($tfaCookieTime, $tfaCookeHash) = explode(':', $_COOKIE[session_name() . '_otp']);
if ($tfaCookieTime && $tfaCookeHash === hash_hmac('sha1', $user['username'] . ':' . $tfaMins . ':' . $tfaCookieTime . ':' . $_SERVER['HTTP_USER_AGENT'], $user['tfa_secret'])) {
$_SESSION[SESS_USER_2FA] = $tfaCookieTime;
}
}
// Is the current session 2FA time expired?
if (!empty($_SESSION[SESS_USER_2FA]) && $_SESSION[SESS_USER_2FA] < $tfaTime) {
// Yes, lets unset the session variable and recheck
unset($_SESSION[SESS_USER_2FA]);
}
// Are we being asked to login with a 2FA token?
if (get_nfilter_request_var('action') == 'login_2fa') {
/* Auth token from Form */
$token = get_nfilter_request_var('token');
if (cacti_sizeof($user)) {
if (empty($user['tfa_enabled'])) {
cacti_log("DEBUG: User '" . $user['username'] . "' attempting to verify 2fa token, but not 2fa enabled", false, 'AUTH', POLLER_VERBOSITY_DEBUG);
$_SESSION[SESS_USER_2FA] = true;
} else {
cacti_log("DEBUG: User '" . $user['username'] . "' attempting to verify 2fa token", false, 'AUTH', POLLER_VERBOSITY_DEBUG);
$g = new \Sonata\GoogleAuthenticator\GoogleAuthenticator();
if ($g->checkCode($user['tfa_secret'], $token)) {
$_SESSION[SESS_USER_2FA] = time();
// About using the user agent: It's easy to fake it, but it increases the barrier for stealing and reusing cookies nevertheless
// and it doesn't do any harm (except that it's invalid after a browser upgrade, but that may be even intended)
$cookie = $_SESSION[SESS_USER_2FA] .':'.hash_hmac('sha1', $user['username'].':'. $tfaMins . ':' . $_SESSION[SESS_USER_2FA] .':'.$_SERVER['HTTP_USER_AGENT'], $user['tfa_secret']);
cacti_cookie_set(session_name() . '_otp', $cookie, time() + (30 * 24 * 3600));
} else {
$_SESSION[SESS_USER_2FA] = false;
}
}
} else {
$_SESSION[SESS_USER_2FA] = time();
}
/* Process the user */
if ($_SESSION[SESS_USER_2FA]) {
if (isset($user['tfa_enabled'])) {
cacti_log("LOGIN: User '" . $user['username'] . "' 2FA Authenticated", false, 'AUTH');
$client_addr = get_client_addr('');
db_execute_prepared('INSERT IGNORE INTO user_log
(username, user_id, result, ip, time)
VALUES (?, ?, 2, ?, NOW())',
array($user['username'], $user['id'], $client_addr));
}
} else {
/* BAD token */
cacti_log("DEBUG: User '" . $user['username'] . "' failed to verify 2fa token", false, 'AUTH', POLLER_VERBOSITY_DEBUG);
db_execute_prepared('INSERT IGNORE INTO user_log
(username, user_id, result, ip, time)
VALUES (?, 0, 3, ?, NOW())',
array($user['username'], get_client_addr('')));
$message = __('Failed to verify token');
}
}
if (empty($user['tfa_enabled'])) {
$_SESSION[SESS_USER_2FA] = true;
}
if (!empty($_SESSION[SESS_USER_2FA])) {
auth_login_redirect($user['login_opts']);
exit;
}
if (api_plugin_hook_function('custom_2fa_login', OPER_MODE_NATIVE) == OPER_MODE_RESKIN) {
return;
}
$selectedTheme = get_selected_theme();
html_auth_header('login_2fa', __('2nd Factor Authentication'), __('2FA Verification'), __('Enter your token'),
array(
'username' => $user['username'],
'action' => get_nfilter_request_var('action')
)
);
?>
<tr>
<td>
<label for='login_token'><?php print __('Token');?></label>
</td>
<td>
<input type='textbox' class='ui-state-default ui-corner-all' id='login_token' name='token' placeholder='<?php print __('Token');?>'>
</td>
</tr>
<tr>
<td> </td>
<td>
<span class='textError'><?php print $message; ?></span>
</td>
</tr>
<tr>
<td> </td>
<td>
<input type='submit' class='ui-button ui-corner-all ui-widget' value='<?php print __esc('Verify');?>'>
</td>
</tr>
<?php
html_auth_footer('login_2fa', $message, "
<script>
$(function() {
$('#login_token').focus();
});
</script>
");