api_mfa.go 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. package httpd
  2. import (
  3. "fmt"
  4. "net/http"
  5. "strings"
  6. "github.com/go-chi/render"
  7. "github.com/drakkan/sftpgo/v2/dataprovider"
  8. "github.com/drakkan/sftpgo/v2/kms"
  9. "github.com/drakkan/sftpgo/v2/mfa"
  10. "github.com/drakkan/sftpgo/v2/util"
  11. )
  12. type generateTOTPRequest struct {
  13. ConfigName string `json:"config_name"`
  14. }
  15. type generateTOTPResponse struct {
  16. ConfigName string `json:"config_name"`
  17. Issuer string `json:"issuer"`
  18. Secret string `json:"secret"`
  19. QRCode []byte `json:"qr_code"`
  20. }
  21. type validateTOTPRequest struct {
  22. ConfigName string `json:"config_name"`
  23. Passcode string `json:"passcode"`
  24. Secret string `json:"secret"`
  25. }
  26. type recoveryCode struct {
  27. Code string `json:"code"`
  28. Used bool `json:"used"`
  29. }
  30. func getTOTPConfigs(w http.ResponseWriter, r *http.Request) {
  31. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  32. render.JSON(w, r, mfa.GetAvailableTOTPConfigs())
  33. }
  34. func generateTOTPSecret(w http.ResponseWriter, r *http.Request) {
  35. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  36. claims, err := getTokenClaims(r)
  37. if err != nil || claims.Username == "" {
  38. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  39. return
  40. }
  41. var accountName string
  42. if claims.hasUserAudience() {
  43. accountName = fmt.Sprintf("User %#v", claims.Username)
  44. } else {
  45. accountName = fmt.Sprintf("Admin %#v", claims.Username)
  46. }
  47. var req generateTOTPRequest
  48. err = render.DecodeJSON(r.Body, &req)
  49. if err != nil {
  50. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  51. return
  52. }
  53. configName, issuer, secret, qrCode, err := mfa.GenerateTOTPSecret(req.ConfigName, accountName)
  54. if err != nil {
  55. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  56. return
  57. }
  58. render.JSON(w, r, generateTOTPResponse{
  59. ConfigName: configName,
  60. Issuer: issuer,
  61. Secret: secret,
  62. QRCode: qrCode,
  63. })
  64. }
  65. func saveTOTPConfig(w http.ResponseWriter, r *http.Request) {
  66. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  67. claims, err := getTokenClaims(r)
  68. if err != nil || claims.Username == "" {
  69. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  70. return
  71. }
  72. recoveryCodes := make([]dataprovider.RecoveryCode, 0, 12)
  73. for i := 0; i < 12; i++ {
  74. code := getNewRecoveryCode()
  75. recoveryCodes = append(recoveryCodes, dataprovider.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  76. }
  77. if claims.hasUserAudience() {
  78. if err := saveUserTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  79. sendAPIResponse(w, r, err, "", getRespStatus(err))
  80. return
  81. }
  82. if claims.MustSetTwoFactorAuth {
  83. // force logout
  84. defer func() {
  85. c := jwtTokenClaims{}
  86. c.removeCookie(w, r, webBaseClientPath)
  87. }()
  88. }
  89. } else {
  90. if err := saveAdminTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  91. sendAPIResponse(w, r, err, "", getRespStatus(err))
  92. return
  93. }
  94. }
  95. sendAPIResponse(w, r, nil, "TOTP configuration saved", http.StatusOK)
  96. }
  97. func validateTOTPPasscode(w http.ResponseWriter, r *http.Request) {
  98. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  99. var req validateTOTPRequest
  100. err := render.DecodeJSON(r.Body, &req)
  101. if err != nil {
  102. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  103. return
  104. }
  105. match, err := mfa.ValidateTOTPPasscode(req.ConfigName, req.Passcode, req.Secret)
  106. if !match || err != nil {
  107. sendAPIResponse(w, r, err, "Invalid passcode", http.StatusBadRequest)
  108. return
  109. }
  110. sendAPIResponse(w, r, nil, "Passcode successfully validated", http.StatusOK)
  111. }
  112. func getRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  113. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  114. claims, err := getTokenClaims(r)
  115. if err != nil || claims.Username == "" {
  116. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  117. return
  118. }
  119. recoveryCodes := make([]recoveryCode, 0, 12)
  120. var accountRecoveryCodes []dataprovider.RecoveryCode
  121. if claims.hasUserAudience() {
  122. user, err := dataprovider.UserExists(claims.Username)
  123. if err != nil {
  124. sendAPIResponse(w, r, err, "", getRespStatus(err))
  125. return
  126. }
  127. accountRecoveryCodes = user.Filters.RecoveryCodes
  128. } else {
  129. admin, err := dataprovider.AdminExists(claims.Username)
  130. if err != nil {
  131. sendAPIResponse(w, r, err, "", getRespStatus(err))
  132. return
  133. }
  134. accountRecoveryCodes = admin.Filters.RecoveryCodes
  135. }
  136. for _, code := range accountRecoveryCodes {
  137. if err := code.Secret.Decrypt(); err != nil {
  138. sendAPIResponse(w, r, err, "Unable to decrypt recovery codes", getRespStatus(err))
  139. return
  140. }
  141. recoveryCodes = append(recoveryCodes, recoveryCode{
  142. Code: code.Secret.GetPayload(),
  143. Used: code.Used,
  144. })
  145. }
  146. render.JSON(w, r, recoveryCodes)
  147. }
  148. func generateRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  149. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  150. claims, err := getTokenClaims(r)
  151. if err != nil || claims.Username == "" {
  152. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  153. return
  154. }
  155. recoveryCodes := make([]string, 0, 12)
  156. accountRecoveryCodes := make([]dataprovider.RecoveryCode, 0, 12)
  157. for i := 0; i < 12; i++ {
  158. code := getNewRecoveryCode()
  159. recoveryCodes = append(recoveryCodes, code)
  160. accountRecoveryCodes = append(accountRecoveryCodes, dataprovider.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  161. }
  162. if claims.hasUserAudience() {
  163. user, err := dataprovider.UserExists(claims.Username)
  164. if err != nil {
  165. sendAPIResponse(w, r, err, "", getRespStatus(err))
  166. return
  167. }
  168. user.Filters.RecoveryCodes = accountRecoveryCodes
  169. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  170. sendAPIResponse(w, r, err, "", getRespStatus(err))
  171. return
  172. }
  173. } else {
  174. admin, err := dataprovider.AdminExists(claims.Username)
  175. if err != nil {
  176. sendAPIResponse(w, r, err, "", getRespStatus(err))
  177. return
  178. }
  179. admin.Filters.RecoveryCodes = accountRecoveryCodes
  180. if err := dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr)); err != nil {
  181. sendAPIResponse(w, r, err, "", getRespStatus(err))
  182. return
  183. }
  184. }
  185. render.JSON(w, r, recoveryCodes)
  186. }
  187. func getNewRecoveryCode() string {
  188. return fmt.Sprintf("RC-%v", strings.ToUpper(util.GenerateUniqueID()))
  189. }
  190. func saveUserTOTPConfig(username string, r *http.Request, recoveryCodes []dataprovider.RecoveryCode) error {
  191. user, err := dataprovider.UserExists(username)
  192. if err != nil {
  193. return err
  194. }
  195. currentTOTPSecret := user.Filters.TOTPConfig.Secret
  196. user.Filters.TOTPConfig.Secret = nil
  197. err = render.DecodeJSON(r.Body, &user.Filters.TOTPConfig)
  198. if err != nil {
  199. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  200. }
  201. if !user.Filters.TOTPConfig.Enabled && len(user.Filters.TwoFactorAuthProtocols) > 0 {
  202. return util.NewValidationError("two-factor authentication must be enabled")
  203. }
  204. for _, p := range user.Filters.TwoFactorAuthProtocols {
  205. if !util.IsStringInSlice(p, user.Filters.TOTPConfig.Protocols) {
  206. return util.NewValidationError(fmt.Sprintf("totp: the following protocols are required: %#v",
  207. strings.Join(user.Filters.TwoFactorAuthProtocols, ", ")))
  208. }
  209. }
  210. if user.Filters.TOTPConfig.Secret == nil || !user.Filters.TOTPConfig.Secret.IsPlain() {
  211. user.Filters.TOTPConfig.Secret = currentTOTPSecret
  212. }
  213. if user.CountUnusedRecoveryCodes() < 5 && user.Filters.TOTPConfig.Enabled {
  214. user.Filters.RecoveryCodes = recoveryCodes
  215. }
  216. return dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  217. }
  218. func saveAdminTOTPConfig(username string, r *http.Request, recoveryCodes []dataprovider.RecoveryCode) error {
  219. admin, err := dataprovider.AdminExists(username)
  220. if err != nil {
  221. return err
  222. }
  223. currentTOTPSecret := admin.Filters.TOTPConfig.Secret
  224. admin.Filters.TOTPConfig.Secret = nil
  225. err = render.DecodeJSON(r.Body, &admin.Filters.TOTPConfig)
  226. if err != nil {
  227. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  228. }
  229. if admin.CountUnusedRecoveryCodes() < 5 && admin.Filters.TOTPConfig.Enabled {
  230. admin.Filters.RecoveryCodes = recoveryCodes
  231. }
  232. if admin.Filters.TOTPConfig.Secret == nil || !admin.Filters.TOTPConfig.Secret.IsPlain() {
  233. admin.Filters.TOTPConfig.Secret = currentTOTPSecret
  234. }
  235. return dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr))
  236. }