1
0

api_mfa.go 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299
  1. // Copyright (C) 2019-2023 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package httpd
  15. import (
  16. "errors"
  17. "fmt"
  18. "net/http"
  19. "strings"
  20. "github.com/go-chi/render"
  21. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  22. "github.com/drakkan/sftpgo/v2/internal/kms"
  23. "github.com/drakkan/sftpgo/v2/internal/mfa"
  24. "github.com/drakkan/sftpgo/v2/internal/util"
  25. )
  26. var (
  27. errRecoveryCodeForbidden = errors.New("recovery codes are not available with two-factor authentication disabled")
  28. )
  29. type generateTOTPRequest struct {
  30. ConfigName string `json:"config_name"`
  31. }
  32. type generateTOTPResponse struct {
  33. ConfigName string `json:"config_name"`
  34. Issuer string `json:"issuer"`
  35. Secret string `json:"secret"`
  36. QRCode []byte `json:"qr_code"`
  37. }
  38. type validateTOTPRequest struct {
  39. ConfigName string `json:"config_name"`
  40. Passcode string `json:"passcode"`
  41. Secret string `json:"secret"`
  42. }
  43. type recoveryCode struct {
  44. Code string `json:"code"`
  45. Used bool `json:"used"`
  46. }
  47. func getTOTPConfigs(w http.ResponseWriter, r *http.Request) {
  48. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  49. render.JSON(w, r, mfa.GetAvailableTOTPConfigs())
  50. }
  51. func generateTOTPSecret(w http.ResponseWriter, r *http.Request) {
  52. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  53. claims, err := getTokenClaims(r)
  54. if err != nil || claims.Username == "" {
  55. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  56. return
  57. }
  58. var accountName string
  59. if claims.hasUserAudience() {
  60. accountName = fmt.Sprintf("User %q", claims.Username)
  61. } else {
  62. accountName = fmt.Sprintf("Admin %q", claims.Username)
  63. }
  64. var req generateTOTPRequest
  65. err = render.DecodeJSON(r.Body, &req)
  66. if err != nil {
  67. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  68. return
  69. }
  70. configName, issuer, secret, qrCode, err := mfa.GenerateTOTPSecret(req.ConfigName, accountName)
  71. if err != nil {
  72. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  73. return
  74. }
  75. render.JSON(w, r, generateTOTPResponse{
  76. ConfigName: configName,
  77. Issuer: issuer,
  78. Secret: secret,
  79. QRCode: qrCode,
  80. })
  81. }
  82. func saveTOTPConfig(w http.ResponseWriter, r *http.Request) {
  83. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  84. claims, err := getTokenClaims(r)
  85. if err != nil || claims.Username == "" {
  86. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  87. return
  88. }
  89. recoveryCodes := make([]dataprovider.RecoveryCode, 0, 12)
  90. for i := 0; i < 12; i++ {
  91. code := getNewRecoveryCode()
  92. recoveryCodes = append(recoveryCodes, dataprovider.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  93. }
  94. if claims.hasUserAudience() {
  95. if err := saveUserTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  96. sendAPIResponse(w, r, err, "", getRespStatus(err))
  97. return
  98. }
  99. if claims.MustSetTwoFactorAuth {
  100. // force logout
  101. defer func() {
  102. c := jwtTokenClaims{}
  103. c.removeCookie(w, r, webBaseClientPath)
  104. }()
  105. }
  106. } else {
  107. if err := saveAdminTOTPConfig(claims.Username, r, recoveryCodes); err != nil {
  108. sendAPIResponse(w, r, err, "", getRespStatus(err))
  109. return
  110. }
  111. }
  112. sendAPIResponse(w, r, nil, "TOTP configuration saved", http.StatusOK)
  113. }
  114. func validateTOTPPasscode(w http.ResponseWriter, r *http.Request) {
  115. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  116. var req validateTOTPRequest
  117. err := render.DecodeJSON(r.Body, &req)
  118. if err != nil {
  119. sendAPIResponse(w, r, err, "", http.StatusBadRequest)
  120. return
  121. }
  122. match, err := mfa.ValidateTOTPPasscode(req.ConfigName, req.Passcode, req.Secret)
  123. if !match || err != nil {
  124. sendAPIResponse(w, r, err, "Invalid passcode", http.StatusBadRequest)
  125. return
  126. }
  127. sendAPIResponse(w, r, nil, "Passcode successfully validated", http.StatusOK)
  128. }
  129. func getRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  130. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  131. claims, err := getTokenClaims(r)
  132. if err != nil || claims.Username == "" {
  133. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  134. return
  135. }
  136. recoveryCodes := make([]recoveryCode, 0, 12)
  137. var accountRecoveryCodes []dataprovider.RecoveryCode
  138. if claims.hasUserAudience() {
  139. user, err := dataprovider.UserExists(claims.Username, "")
  140. if err != nil {
  141. sendAPIResponse(w, r, err, "", getRespStatus(err))
  142. return
  143. }
  144. if !user.Filters.TOTPConfig.Enabled {
  145. sendAPIResponse(w, r, errRecoveryCodeForbidden, "", http.StatusForbidden)
  146. return
  147. }
  148. accountRecoveryCodes = user.Filters.RecoveryCodes
  149. } else {
  150. admin, err := dataprovider.AdminExists(claims.Username)
  151. if err != nil {
  152. sendAPIResponse(w, r, err, "", getRespStatus(err))
  153. return
  154. }
  155. if !admin.Filters.TOTPConfig.Enabled {
  156. sendAPIResponse(w, r, errRecoveryCodeForbidden, "", http.StatusForbidden)
  157. return
  158. }
  159. accountRecoveryCodes = admin.Filters.RecoveryCodes
  160. }
  161. for _, code := range accountRecoveryCodes {
  162. if err := code.Secret.Decrypt(); err != nil {
  163. sendAPIResponse(w, r, err, "Unable to decrypt recovery codes", getRespStatus(err))
  164. return
  165. }
  166. recoveryCodes = append(recoveryCodes, recoveryCode{
  167. Code: code.Secret.GetPayload(),
  168. Used: code.Used,
  169. })
  170. }
  171. render.JSON(w, r, recoveryCodes)
  172. }
  173. func generateRecoveryCodes(w http.ResponseWriter, r *http.Request) {
  174. r.Body = http.MaxBytesReader(w, r.Body, maxRequestSize)
  175. claims, err := getTokenClaims(r)
  176. if err != nil || claims.Username == "" {
  177. sendAPIResponse(w, r, err, "Invalid token claims", http.StatusBadRequest)
  178. return
  179. }
  180. recoveryCodes := make([]string, 0, 12)
  181. accountRecoveryCodes := make([]dataprovider.RecoveryCode, 0, 12)
  182. for i := 0; i < 12; i++ {
  183. code := getNewRecoveryCode()
  184. recoveryCodes = append(recoveryCodes, code)
  185. accountRecoveryCodes = append(accountRecoveryCodes, dataprovider.RecoveryCode{Secret: kms.NewPlainSecret(code)})
  186. }
  187. if claims.hasUserAudience() {
  188. user, err := dataprovider.UserExists(claims.Username, "")
  189. if err != nil {
  190. sendAPIResponse(w, r, err, "", getRespStatus(err))
  191. return
  192. }
  193. if !user.Filters.TOTPConfig.Enabled {
  194. sendAPIResponse(w, r, errRecoveryCodeForbidden, "", http.StatusForbidden)
  195. return
  196. }
  197. user.Filters.RecoveryCodes = accountRecoveryCodes
  198. if err := dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr), user.Role); err != nil {
  199. sendAPIResponse(w, r, err, "", getRespStatus(err))
  200. return
  201. }
  202. } else {
  203. admin, err := dataprovider.AdminExists(claims.Username)
  204. if err != nil {
  205. sendAPIResponse(w, r, err, "", getRespStatus(err))
  206. return
  207. }
  208. if !admin.Filters.TOTPConfig.Enabled {
  209. sendAPIResponse(w, r, errRecoveryCodeForbidden, "", http.StatusForbidden)
  210. return
  211. }
  212. admin.Filters.RecoveryCodes = accountRecoveryCodes
  213. if err := dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr), admin.Role); err != nil {
  214. sendAPIResponse(w, r, err, "", getRespStatus(err))
  215. return
  216. }
  217. }
  218. render.JSON(w, r, recoveryCodes)
  219. }
  220. func getNewRecoveryCode() string {
  221. return fmt.Sprintf("RC-%v", strings.ToUpper(util.GenerateUniqueID()))
  222. }
  223. func saveUserTOTPConfig(username string, r *http.Request, recoveryCodes []dataprovider.RecoveryCode) error {
  224. user, err := dataprovider.UserExists(username, "")
  225. if err != nil {
  226. return err
  227. }
  228. currentTOTPSecret := user.Filters.TOTPConfig.Secret
  229. user.Filters.TOTPConfig.Secret = nil
  230. err = render.DecodeJSON(r.Body, &user.Filters.TOTPConfig)
  231. if err != nil {
  232. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  233. }
  234. if !user.Filters.TOTPConfig.Enabled && len(user.Filters.TwoFactorAuthProtocols) > 0 {
  235. return util.NewValidationError("two-factor authentication must be enabled")
  236. }
  237. for _, p := range user.Filters.TwoFactorAuthProtocols {
  238. if !util.Contains(user.Filters.TOTPConfig.Protocols, p) {
  239. return util.NewValidationError(fmt.Sprintf("totp: the following protocols are required: %q",
  240. strings.Join(user.Filters.TwoFactorAuthProtocols, ", ")))
  241. }
  242. }
  243. if user.Filters.TOTPConfig.Secret == nil || !user.Filters.TOTPConfig.Secret.IsPlain() {
  244. user.Filters.TOTPConfig.Secret = currentTOTPSecret
  245. }
  246. if user.Filters.TOTPConfig.Enabled {
  247. if user.CountUnusedRecoveryCodes() < 5 && user.Filters.TOTPConfig.Enabled {
  248. user.Filters.RecoveryCodes = recoveryCodes
  249. }
  250. } else {
  251. user.Filters.RecoveryCodes = nil
  252. }
  253. return dataprovider.UpdateUser(&user, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr), user.Role)
  254. }
  255. func saveAdminTOTPConfig(username string, r *http.Request, recoveryCodes []dataprovider.RecoveryCode) error {
  256. admin, err := dataprovider.AdminExists(username)
  257. if err != nil {
  258. return err
  259. }
  260. currentTOTPSecret := admin.Filters.TOTPConfig.Secret
  261. admin.Filters.TOTPConfig.Secret = nil
  262. err = render.DecodeJSON(r.Body, &admin.Filters.TOTPConfig)
  263. if err != nil {
  264. return util.NewValidationError(fmt.Sprintf("unable to decode JSON body: %v", err))
  265. }
  266. if admin.Filters.TOTPConfig.Enabled {
  267. if admin.CountUnusedRecoveryCodes() < 5 && admin.Filters.TOTPConfig.Enabled {
  268. admin.Filters.RecoveryCodes = recoveryCodes
  269. }
  270. } else {
  271. admin.Filters.RecoveryCodes = nil
  272. }
  273. if admin.Filters.TOTPConfig.Secret == nil || !admin.Filters.TOTPConfig.Secret.IsPlain() {
  274. admin.Filters.TOTPConfig.Secret = currentTOTPSecret
  275. }
  276. return dataprovider.UpdateAdmin(&admin, dataprovider.ActionExecutorSelf, util.GetIPFromRemoteAddress(r.RemoteAddr), admin.Role)
  277. }