2021-03-26 22:48:26 +01:00
|
|
|
#include <atomic>
|
|
|
|
#include <openssl/evp.h>
|
2021-03-26 22:50:55 +01:00
|
|
|
#include <mutex>
|
2021-03-26 22:48:26 +01:00
|
|
|
#include "utils.h"
|
|
|
|
#include "authenticator.h"
|
|
|
|
#include "logger.h"
|
|
|
|
struct LoginFail
|
|
|
|
{
|
|
|
|
std::mutex mutex;
|
|
|
|
std::atomic<unsigned int> count;
|
|
|
|
time_t lastfail;
|
|
|
|
};
|
|
|
|
|
|
|
|
static std::map<std::string, LoginFail> loginFails;
|
|
|
|
|
|
|
|
Authenticator::Authenticator(UserDao &userDao)
|
|
|
|
{
|
|
|
|
this->userDao = &userDao;
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: make failure counter configurable
|
|
|
|
bool Authenticator::isBanned(std::string ip)
|
|
|
|
{
|
|
|
|
if(utils::hasKey(loginFails, ip))
|
|
|
|
{
|
|
|
|
LoginFail &fl = loginFails[ip];
|
|
|
|
std::lock_guard<std::mutex> lock(fl.mutex);
|
|
|
|
return fl.count > 5 && (time(nullptr) - fl.lastfail) < 1200;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Authenticator::incFailureCount(std::string ip)
|
|
|
|
{
|
|
|
|
LoginFail &fl = loginFails[ip];
|
|
|
|
fl.count += 1;
|
|
|
|
fl.lastfail = time(nullptr);
|
|
|
|
}
|
|
|
|
|
2021-04-18 12:35:42 +02:00
|
|
|
std::vector<char> Authenticator::pbkdf5(std::string password, const std::vector<char> &salt) const
|
2021-03-26 22:48:26 +01:00
|
|
|
{
|
|
|
|
unsigned char hash[32];
|
|
|
|
const EVP_MD *sha256 = EVP_sha256();
|
|
|
|
const unsigned char *rawsalt = reinterpret_cast<const unsigned char *>(salt.data());
|
2021-09-25 19:28:37 +02:00
|
|
|
int ret =
|
|
|
|
PKCS5_PBKDF2_HMAC(password.c_str(), password.size(), rawsalt, salt.size(), 300000, sha256, sizeof(hash), hash);
|
2021-03-26 22:48:26 +01:00
|
|
|
if(ret != 1)
|
|
|
|
{
|
|
|
|
Logger::error() << "Authenticator: pbkdf5: Failed to create hash";
|
2021-09-25 19:28:37 +02:00
|
|
|
return {};
|
2021-03-26 22:48:26 +01:00
|
|
|
}
|
|
|
|
std::vector<char> result;
|
|
|
|
|
|
|
|
for(size_t i = 0; i < sizeof(hash); i++)
|
|
|
|
{
|
|
|
|
|
|
|
|
result.push_back(static_cast<char>(hash[i]));
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::variant<User, AuthenticationError> Authenticator::authenticate(std::string username, std::string password)
|
|
|
|
{
|
|
|
|
std::optional<User> user = userDao->find(username);
|
|
|
|
if(user)
|
|
|
|
{
|
|
|
|
if(user->enabled)
|
|
|
|
{
|
|
|
|
auto hashresult = pbkdf5(password, user.value().salt);
|
|
|
|
if(hashresult.size() == 0)
|
|
|
|
{
|
|
|
|
return AuthenticationError::GeneralError;
|
|
|
|
}
|
|
|
|
// TODO: timing attack (even though practical relevancy questionable)
|
|
|
|
if(hashresult == user.value().password)
|
|
|
|
{
|
|
|
|
return user.value();
|
|
|
|
}
|
|
|
|
return AuthenticationError::PasswordNotMatch;
|
|
|
|
}
|
|
|
|
return AuthenticationError::UserDisabled;
|
|
|
|
}
|
|
|
|
return AuthenticationError::UserNotFound;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::variant<User, AuthenticationError> Authenticator::authenticate(std::string username, std::string password,
|
|
|
|
std::string ip)
|
|
|
|
{
|
|
|
|
if(isBanned(ip))
|
|
|
|
{
|
|
|
|
return AuthenticationError::BannedIP;
|
|
|
|
}
|
|
|
|
std::variant<User, AuthenticationError> authresult = authenticate(username, password);
|
|
|
|
if(std::holds_alternative<AuthenticationError>(authresult))
|
|
|
|
{
|
|
|
|
AuthenticationError error = std::get<AuthenticationError>(authresult);
|
|
|
|
if(error == AuthenticationError::PasswordNotMatch)
|
|
|
|
{
|
|
|
|
incFailureCount(ip);
|
|
|
|
}
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
return std::get<User>(authresult);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<char> Authenticator::hash(std::string password, const std::vector<char> &salt)
|
|
|
|
{
|
|
|
|
return this->pbkdf5(password, salt);
|
|
|
|
}
|