| @@ -194,6 +194,8 @@ var migrations = []Migration{ | |||||
| NewMigration("move team units to team_unit table", moveTeamUnitsToTeamUnitTable), | NewMigration("move team units to team_unit table", moveTeamUnitsToTeamUnitTable), | ||||
| // v70 -> v71 | // v70 -> v71 | ||||
| NewMigration("add issue_dependencies", addIssueDependencies), | NewMigration("add issue_dependencies", addIssueDependencies), | ||||
| // v70 -> v71 | |||||
| NewMigration("protect each scratch token", addScratchHash), | |||||
| } | } | ||||
| // Migrate database to current version | // Migrate database to current version | ||||
| @@ -0,0 +1,88 @@ | |||||
| // Copyright 2018 The Gitea Authors. All rights reserved. | |||||
| // Use of this source code is governed by a MIT-style | |||||
| // license that can be found in the LICENSE file. | |||||
| package migrations | |||||
| import ( | |||||
| "crypto/sha256" | |||||
| "fmt" | |||||
| "github.com/go-xorm/xorm" | |||||
| "golang.org/x/crypto/pbkdf2" | |||||
| "code.gitea.io/gitea/modules/generate" | |||||
| "code.gitea.io/gitea/modules/util" | |||||
| ) | |||||
| func addScratchHash(x *xorm.Engine) error { | |||||
| // TwoFactor see models/twofactor.go | |||||
| type TwoFactor struct { | |||||
| ID int64 `xorm:"pk autoincr"` | |||||
| UID int64 `xorm:"UNIQUE"` | |||||
| Secret string | |||||
| ScratchToken string | |||||
| ScratchSalt string | |||||
| ScratchHash string | |||||
| LastUsedPasscode string `xorm:"VARCHAR(10)"` | |||||
| CreatedUnix util.TimeStamp `xorm:"INDEX created"` | |||||
| UpdatedUnix util.TimeStamp `xorm:"INDEX updated"` | |||||
| } | |||||
| if err := x.Sync2(new(TwoFactor)); err != nil { | |||||
| return fmt.Errorf("Sync2: %v", err) | |||||
| } | |||||
| sess := x.NewSession() | |||||
| defer sess.Close() | |||||
| if err := sess.Begin(); err != nil { | |||||
| return err | |||||
| } | |||||
| // transform all tokens to hashes | |||||
| const batchSize = 100 | |||||
| for start := 0; ; start += batchSize { | |||||
| tfas := make([]*TwoFactor, 0, batchSize) | |||||
| if err := x.Limit(batchSize, start).Find(&tfas); err != nil { | |||||
| return err | |||||
| } | |||||
| if len(tfas) == 0 { | |||||
| break | |||||
| } | |||||
| for _, tfa := range tfas { | |||||
| // generate salt | |||||
| salt, err := generate.GetRandomString(10) | |||||
| if err != nil { | |||||
| return err | |||||
| } | |||||
| tfa.ScratchSalt = salt | |||||
| tfa.ScratchHash = hashToken(tfa.ScratchToken, salt) | |||||
| if _, err := sess.ID(tfa.ID).Cols("scratch_salt, scratch_hash").Update(tfa); err != nil { | |||||
| return fmt.Errorf("couldn't add in scratch_hash and scratch_salt: %v", err) | |||||
| } | |||||
| } | |||||
| } | |||||
| // Commit and begin new transaction for dropping columns | |||||
| if err := sess.Commit(); err != nil { | |||||
| return err | |||||
| } | |||||
| if err := sess.Begin(); err != nil { | |||||
| return err | |||||
| } | |||||
| if err := dropTableColumns(sess, "two_factor", "scratch_token"); err != nil { | |||||
| return err | |||||
| } | |||||
| return sess.Commit() | |||||
| } | |||||
| func hashToken(token, salt string) string { | |||||
| tempHash := pbkdf2.Key([]byte(token), []byte(salt), 10000, 50, sha256.New) | |||||
| return fmt.Sprintf("%x", tempHash) | |||||
| } | |||||
| @@ -9,12 +9,15 @@ import ( | |||||
| "crypto/cipher" | "crypto/cipher" | ||||
| "crypto/md5" | "crypto/md5" | ||||
| "crypto/rand" | "crypto/rand" | ||||
| "crypto/sha256" | |||||
| "crypto/subtle" | "crypto/subtle" | ||||
| "encoding/base64" | "encoding/base64" | ||||
| "errors" | "errors" | ||||
| "fmt" | |||||
| "io" | "io" | ||||
| "github.com/pquerna/otp/totp" | "github.com/pquerna/otp/totp" | ||||
| "golang.org/x/crypto/pbkdf2" | |||||
| "code.gitea.io/gitea/modules/generate" | "code.gitea.io/gitea/modules/generate" | ||||
| "code.gitea.io/gitea/modules/setting" | "code.gitea.io/gitea/modules/setting" | ||||
| @@ -26,20 +29,27 @@ type TwoFactor struct { | |||||
| ID int64 `xorm:"pk autoincr"` | ID int64 `xorm:"pk autoincr"` | ||||
| UID int64 `xorm:"UNIQUE"` | UID int64 `xorm:"UNIQUE"` | ||||
| Secret string | Secret string | ||||
| ScratchToken string | |||||
| ScratchSalt string | |||||
| ScratchHash string | |||||
| LastUsedPasscode string `xorm:"VARCHAR(10)"` | LastUsedPasscode string `xorm:"VARCHAR(10)"` | ||||
| CreatedUnix util.TimeStamp `xorm:"INDEX created"` | CreatedUnix util.TimeStamp `xorm:"INDEX created"` | ||||
| UpdatedUnix util.TimeStamp `xorm:"INDEX updated"` | UpdatedUnix util.TimeStamp `xorm:"INDEX updated"` | ||||
| } | } | ||||
| // GenerateScratchToken recreates the scratch token the user is using. | // GenerateScratchToken recreates the scratch token the user is using. | ||||
| func (t *TwoFactor) GenerateScratchToken() error { | |||||
| func (t *TwoFactor) GenerateScratchToken() (string, error) { | |||||
| token, err := generate.GetRandomString(8) | token, err := generate.GetRandomString(8) | ||||
| if err != nil { | if err != nil { | ||||
| return err | |||||
| return "", err | |||||
| } | } | ||||
| t.ScratchToken = token | |||||
| return nil | |||||
| t.ScratchSalt, _ = generate.GetRandomString(10) | |||||
| t.ScratchHash = hashToken(token, t.ScratchSalt) | |||||
| return token, nil | |||||
| } | |||||
| func hashToken(token, salt string) string { | |||||
| tempHash := pbkdf2.Key([]byte(token), []byte(salt), 10000, 50, sha256.New) | |||||
| return fmt.Sprintf("%x", tempHash) | |||||
| } | } | ||||
| // VerifyScratchToken verifies if the specified scratch token is valid. | // VerifyScratchToken verifies if the specified scratch token is valid. | ||||
| @@ -47,7 +57,8 @@ func (t *TwoFactor) VerifyScratchToken(token string) bool { | |||||
| if len(token) == 0 { | if len(token) == 0 { | ||||
| return false | return false | ||||
| } | } | ||||
| return subtle.ConstantTimeCompare([]byte(token), []byte(t.ScratchToken)) == 1 | |||||
| tempHash := hashToken(token, t.ScratchSalt) | |||||
| return subtle.ConstantTimeCompare([]byte(t.ScratchHash), []byte(tempHash)) == 1 | |||||
| } | } | ||||
| func (t *TwoFactor) getEncryptionKey() []byte { | func (t *TwoFactor) getEncryptionKey() []byte { | ||||
| @@ -118,7 +129,7 @@ func aesDecrypt(key, text []byte) ([]byte, error) { | |||||
| // NewTwoFactor creates a new two-factor authentication token. | // NewTwoFactor creates a new two-factor authentication token. | ||||
| func NewTwoFactor(t *TwoFactor) error { | func NewTwoFactor(t *TwoFactor) error { | ||||
| err := t.GenerateScratchToken() | |||||
| _, err := t.GenerateScratchToken() | |||||
| if err != nil { | if err != nil { | ||||
| return err | return err | ||||
| } | } | ||||
| @@ -306,7 +306,11 @@ func TwoFactorScratchPost(ctx *context.Context, form auth.TwoFactorScratchAuthFo | |||||
| // Validate the passcode with the stored TOTP secret. | // Validate the passcode with the stored TOTP secret. | ||||
| if twofa.VerifyScratchToken(form.Token) { | if twofa.VerifyScratchToken(form.Token) { | ||||
| // Invalidate the scratch token. | // Invalidate the scratch token. | ||||
| twofa.ScratchToken = "" | |||||
| _, err = twofa.GenerateScratchToken() | |||||
| if err != nil { | |||||
| ctx.ServerError("UserSignIn", err) | |||||
| return | |||||
| } | |||||
| if err = models.UpdateTwoFactor(twofa); err != nil { | if err = models.UpdateTwoFactor(twofa); err != nil { | ||||
| ctx.ServerError("UserSignIn", err) | ctx.ServerError("UserSignIn", err) | ||||
| return | return | ||||
| @@ -32,7 +32,8 @@ func RegenerateScratchTwoFactor(ctx *context.Context) { | |||||
| return | return | ||||
| } | } | ||||
| if err = t.GenerateScratchToken(); err != nil { | |||||
| token, err := t.GenerateScratchToken() | |||||
| if err != nil { | |||||
| ctx.ServerError("SettingsTwoFactor", err) | ctx.ServerError("SettingsTwoFactor", err) | ||||
| return | return | ||||
| } | } | ||||
| @@ -42,7 +43,7 @@ func RegenerateScratchTwoFactor(ctx *context.Context) { | |||||
| return | return | ||||
| } | } | ||||
| ctx.Flash.Success(ctx.Tr("settings.twofa_scratch_token_regenerated", t.ScratchToken)) | |||||
| ctx.Flash.Success(ctx.Tr("settings.twofa_scratch_token_regenerated", token)) | |||||
| ctx.Redirect(setting.AppSubURL + "/user/settings/security") | ctx.Redirect(setting.AppSubURL + "/user/settings/security") | ||||
| } | } | ||||
| @@ -170,7 +171,7 @@ func EnrollTwoFactorPost(ctx *context.Context, form auth.TwoFactorAuthForm) { | |||||
| ctx.ServerError("SettingsTwoFactor", err) | ctx.ServerError("SettingsTwoFactor", err) | ||||
| return | return | ||||
| } | } | ||||
| err = t.GenerateScratchToken() | |||||
| token, err := t.GenerateScratchToken() | |||||
| if err != nil { | if err != nil { | ||||
| ctx.ServerError("SettingsTwoFactor", err) | ctx.ServerError("SettingsTwoFactor", err) | ||||
| return | return | ||||
| @@ -183,6 +184,6 @@ func EnrollTwoFactorPost(ctx *context.Context, form auth.TwoFactorAuthForm) { | |||||
| ctx.Session.Delete("twofaSecret") | ctx.Session.Delete("twofaSecret") | ||||
| ctx.Session.Delete("twofaUri") | ctx.Session.Delete("twofaUri") | ||||
| ctx.Flash.Success(ctx.Tr("settings.twofa_enrolled", t.ScratchToken)) | |||||
| ctx.Flash.Success(ctx.Tr("settings.twofa_enrolled", token)) | |||||
| ctx.Redirect(setting.AppSubURL + "/user/settings/security") | ctx.Redirect(setting.AppSubURL + "/user/settings/security") | ||||
| } | } | ||||