api_mfa.go 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "fmt"
  17. "net/http"
  18. "strings"
  19. "github.com/go-chi/render"
  20. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  21. "github.com/drakkan/sftpgo/v2/internal/kms"
  22. "github.com/drakkan/sftpgo/v2/internal/mfa"
  23. "github.com/drakkan/sftpgo/v2/internal/util"
  24. )
  25. type generateTOTPRequest struct {
  26. ConfigName string `json:"config_name"`
  27. }
  28. type generateTOTPResponse struct {
  29. ConfigName string `json:"config_name"`
  30. Issuer string `json:"issuer"`
  31. Secret string `json:"secret"`
  32. QRCode []byte `json:"qr_code"`
  33. }
  34. type validateTOTPRequest struct {
  35. ConfigName string `json:"config_name"`
  36. Passcode string `json:"passcode"`
  37. Secret string `json:"secret"`
  38. }
  39. type recoveryCode struct {
  40. Code string `json:"code"`
  41. Used bool `json:"used"`
  42. }
  43. func getTOTPConfigs(w http.ResponseWriter, r *http.Request) {
  44. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  45. render.JSON(w, r, mfa.GetAvailableTOTPConfigs())
  46. }
  47. func generateTOTPSecret(w http.ResponseWriter, r *http.Request) {
  48. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  49. claims, err := getTokenClaims(r)
  50. if err != nil || claims.Username == "" {
  51. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  52. return
  53. }
  54. var accountName string
  55. if claims.hasUserAudience() {
  56. accountName = fmt.Sprintf("User %#v", claims.Username)
  57. } else {
  58. accountName = fmt.Sprintf("Admin %#v", claims.Username)
  59. }
  60. var req generateTOTPRequest
  61. err = render.DecodeJSON(r.Body, &req)
  62. if err != nil {
  63. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  64. return
  65. }
  66. configName, issuer, secret, qrCode, err := mfa.GenerateTOTPSecret(req.ConfigName, accountName)
  67. if err != nil {
  68. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  69. return
  70. }
  71. render.JSON(w, r, generateTOTPResponse{
  72. ConfigName: configName,
  73. Issuer: issuer,
  74. Secret: secret,
  75. QRCode: qrCode,
  76. })
  77. }
  78. func saveTOTPConfig(w http.ResponseWriter, r *http.Request) {
  79. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  80. claims, err := getTokenClaims(r)
  81. if err != nil || claims.Username == "" {
  82. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  83. return
  84. }
  85. recoveryCodes := make([]dataprovider.RecoveryCode, 0, 12)
  86. for i := 0; i < 12; i++ {
  87. code := getNewRecoveryCode()
  88. recoveryCodes = append(recoveryCodes, dataprovider.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  89. }
  90. if claims.hasUserAudience() {
  91. if err := saveUserTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  92. sendAPIResponse(w, r, err, "", getRespStatus(err))
  93. return
  94. }
  95. if claims.MustSetTwoFactorAuth {
  96. // force logout
  97. defer func() {
  98. c := jwtTokenClaims{}
  99. c.removeCookie(w, r, webBaseClientPath)
  100. }()
  101. }
  102. } else {
  103. if err := saveAdminTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  104. sendAPIResponse(w, r, err, "", getRespStatus(err))
  105. return
  106. }
  107. }
  108. sendAPIResponse(w, r, nil, "TOTP configuration saved", http.StatusOK)
  109. }
  110. func validateTOTPPasscode(w http.ResponseWriter, r *http.Request) {
  111. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  112. var req validateTOTPRequest
  113. err := render.DecodeJSON(r.Body, &req)
  114. if err != nil {
  115. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  116. return
  117. }
  118. match, err := mfa.ValidateTOTPPasscode(req.ConfigName, req.Passcode, req.Secret)
  119. if !match || err != nil {
  120. sendAPIResponse(w, r, err, "Invalid passcode", http.StatusBadRequest)
  121. return
  122. }
  123. sendAPIResponse(w, r, nil, "Passcode successfully validated", http.StatusOK)
  124. }
  125. func getRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  126. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  127. claims, err := getTokenClaims(r)
  128. if err != nil || claims.Username == "" {
  129. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  130. return
  131. }
  132. recoveryCodes := make([]recoveryCode, 0, 12)
  133. var accountRecoveryCodes []dataprovider.RecoveryCode
  134. if claims.hasUserAudience() {
  135. user, err := dataprovider.UserExists(claims.Username)
  136. if err != nil {
  137. sendAPIResponse(w, r, err, "", getRespStatus(err))
  138. return
  139. }
  140. accountRecoveryCodes = user.Filters.RecoveryCodes
  141. } else {
  142. admin, err := dataprovider.AdminExists(claims.Username)
  143. if err != nil {
  144. sendAPIResponse(w, r, err, "", getRespStatus(err))
  145. return
  146. }
  147. accountRecoveryCodes = admin.Filters.RecoveryCodes
  148. }
  149. for _, code := range accountRecoveryCodes {
  150. if err := code.Secret.Decrypt(); err != nil {
  151. sendAPIResponse(w, r, err, "Unable to decrypt recovery codes", getRespStatus(err))
  152. return
  153. }
  154. recoveryCodes = append(recoveryCodes, recoveryCode{
  155. Code: code.Secret.GetPayload(),
  156. Used: code.Used,
  157. })
  158. }
  159. render.JSON(w, r, recoveryCodes)
  160. }
  161. func generateRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  162. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  163. claims, err := getTokenClaims(r)
  164. if err != nil || claims.Username == "" {
  165. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  166. return
  167. }
  168. recoveryCodes := make([]string, 0, 12)
  169. accountRecoveryCodes := make([]dataprovider.RecoveryCode, 0, 12)
  170. for i := 0; i < 12; i++ {
  171. code := getNewRecoveryCode()
  172. recoveryCodes = append(recoveryCodes, code)
  173. accountRecoveryCodes = append(accountRecoveryCodes, dataprovider.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  174. }
  175. if claims.hasUserAudience() {
  176. user, err := dataprovider.UserExists(claims.Username)
  177. if err != nil {
  178. sendAPIResponse(w, r, err, "", getRespStatus(err))
  179. return
  180. }
  181. user.Filters.RecoveryCodes = accountRecoveryCodes
  182. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  183. sendAPIResponse(w, r, err, "", getRespStatus(err))
  184. return
  185. }
  186. } else {
  187. admin, err := dataprovider.AdminExists(claims.Username)
  188. if err != nil {
  189. sendAPIResponse(w, r, err, "", getRespStatus(err))
  190. return
  191. }
  192. admin.Filters.RecoveryCodes = accountRecoveryCodes
  193. if err := dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  194. sendAPIResponse(w, r, err, "", getRespStatus(err))
  195. return
  196. }
  197. }
  198. render.JSON(w, r, recoveryCodes)
  199. }
  200. func getNewRecoveryCode() string {
  201. return fmt.Sprintf("RC-%v", strings.ToUpper(util.GenerateUniqueID()))
  202. }
  203. func saveUserTOTPConfig(username string, r *http.Request, recoveryCodes []dataprovider.RecoveryCode) error {
  204. user, err := dataprovider.UserExists(username)
  205. if err != nil {
  206. return err
  207. }
  208. currentTOTPSecret := user.Filters.TOTPConfig.Secret
  209. user.Filters.TOTPConfig.Secret = nil
  210. err = render.DecodeJSON(r.Body, &user.Filters.TOTPConfig)
  211. if err != nil {
  212. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  213. }
  214. if !user.Filters.TOTPConfig.Enabled && len(user.Filters.TwoFactorAuthProtocols) > 0 {
  215. return util.NewValidationError("two-factor authentication must be enabled")
  216. }
  217. for _, p := range user.Filters.TwoFactorAuthProtocols {
  218. if !util.Contains(user.Filters.TOTPConfig.Protocols, p) {
  219. return util.NewValidationError(fmt.Sprintf("totp: the following protocols are required: %#v",
  220. strings.Join(user.Filters.TwoFactorAuthProtocols, ", ")))
  221. }
  222. }
  223. if user.Filters.TOTPConfig.Secret == nil || !user.Filters.TOTPConfig.Secret.IsPlain() {
  224. user.Filters.TOTPConfig.Secret = currentTOTPSecret
  225. }
  226. if user.CountUnusedRecoveryCodes() < 5 && user.Filters.TOTPConfig.Enabled {
  227. user.Filters.RecoveryCodes = recoveryCodes
  228. }
  229. return dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  230. }
  231. func saveAdminTOTPConfig(username string, r *http.Request, recoveryCodes []dataprovider.RecoveryCode) error {
  232. admin, err := dataprovider.AdminExists(username)
  233. if err != nil {
  234. return err
  235. }
  236. currentTOTPSecret := admin.Filters.TOTPConfig.Secret
  237. admin.Filters.TOTPConfig.Secret = nil
  238. err = render.DecodeJSON(r.Body, &admin.Filters.TOTPConfig)
  239. if err != nil {
  240. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  241. }
  242. if admin.CountUnusedRecoveryCodes() < 5 && admin.Filters.TOTPConfig.Enabled {
  243. admin.Filters.RecoveryCodes = recoveryCodes
  244. }
  245. if admin.Filters.TOTPConfig.Secret == nil || !admin.Filters.TOTPConfig.Secret.IsPlain() {
  246. admin.Filters.TOTPConfig.Secret = currentTOTPSecret
  247. }
  248. return dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  249. }