init.php 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. <?php
  2. class Auth_Internal extends Plugin implements IAuthModule {
  3. private $link;
  4. private $host;
  5. function about() {
  6. return array(1.0,
  7. "Authenticates against internal tt-rss database",
  8. "fox",
  9. true);
  10. }
  11. function init($host) {
  12. $this->link = $host->get_link();
  13. $this->host = $host;
  14. $host->add_hook($host::HOOK_AUTH_USER, $this);
  15. }
  16. function authenticate($login, $password) {
  17. $pwd_hash1 = encrypt_password($password);
  18. $pwd_hash2 = encrypt_password($password, $login);
  19. $login = db_escape_string($this->link, $login);
  20. $otp = db_escape_string($this->link, $_REQUEST["otp"]);
  21. if (get_schema_version($this->link) > 96) {
  22. if (!defined('AUTH_DISABLE_OTP') || !AUTH_DISABLE_OTP) {
  23. $result = db_query($this->link, "SELECT otp_enabled,salt FROM ttrss_users WHERE
  24. login = '$login'");
  25. if (db_num_rows($result) > 0) {
  26. require_once "lib/otphp/vendor/base32.php";
  27. require_once "lib/otphp/lib/otp.php";
  28. require_once "lib/otphp/lib/totp.php";
  29. $base32 = new Base32();
  30. $otp_enabled = sql_bool_to_bool(db_fetch_result($result, 0, "otp_enabled"));
  31. $secret = $base32->encode(sha1(db_fetch_result($result, 0, "salt")));
  32. $topt = new \OTPHP\TOTP($secret);
  33. $otp_check = $topt->now();
  34. if ($otp_enabled) {
  35. if ($otp) {
  36. if ($otp != $otp_check) {
  37. return false;
  38. }
  39. } else {
  40. $return = urlencode($_REQUEST["return"]);
  41. ?><html>
  42. <head><title>Tiny Tiny RSS</title></head>
  43. <body>
  44. <form action="public.php?return=<?php echo $return ?>"
  45. method="POST">
  46. <input type="hidden" name="op" value="login">
  47. <input type="hidden" name="login" value="<?php echo htmlspecialchars($login) ?>">
  48. <input type="hidden" name="password" value="<?php echo htmlspecialchars($password) ?>">
  49. <label><?php echo __("Please enter your one time password:") ?></label>
  50. <input type="password" size="6" name="otp"/>
  51. <input type="submit" value="Continue"/>
  52. </form>
  53. <script type="text/javascript">
  54. document.forms[0].otp.focus();
  55. </script>
  56. <?php
  57. exit;
  58. }
  59. }
  60. }
  61. }
  62. }
  63. if (get_schema_version($this->link) > 87) {
  64. $result = db_query($this->link, "SELECT salt FROM ttrss_users WHERE
  65. login = '$login'");
  66. if (db_num_rows($result) != 1) {
  67. return false;
  68. }
  69. $salt = db_fetch_result($result, 0, "salt");
  70. if ($salt == "") {
  71. $query = "SELECT id
  72. FROM ttrss_users WHERE
  73. login = '$login' AND (pwd_hash = '$pwd_hash1' OR
  74. pwd_hash = '$pwd_hash2')";
  75. // verify and upgrade password to new salt base
  76. $result = db_query($this->link, $query);
  77. if (db_num_rows($result) == 1) {
  78. // upgrade password to MODE2
  79. $salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
  80. $pwd_hash = encrypt_password($password, $salt, true);
  81. db_query($this->link, "UPDATE ttrss_users SET
  82. pwd_hash = '$pwd_hash', salt = '$salt' WHERE login = '$login'");
  83. $query = "SELECT id
  84. FROM ttrss_users WHERE
  85. login = '$login' AND pwd_hash = '$pwd_hash'";
  86. } else {
  87. return false;
  88. }
  89. } else {
  90. $pwd_hash = encrypt_password($password, $salt, true);
  91. $query = "SELECT id
  92. FROM ttrss_users WHERE
  93. login = '$login' AND pwd_hash = '$pwd_hash'";
  94. }
  95. } else {
  96. $query = "SELECT id
  97. FROM ttrss_users WHERE
  98. login = '$login' AND (pwd_hash = '$pwd_hash1' OR
  99. pwd_hash = '$pwd_hash2')";
  100. }
  101. $result = db_query($this->link, $query);
  102. if (db_num_rows($result) == 1) {
  103. return db_fetch_result($result, 0, "id");
  104. }
  105. return false;
  106. }
  107. function check_password($owner_uid, $password) {
  108. $owner_uid = db_escape_string($this->link, $owner_uid);
  109. $result = db_query($this->link, "SELECT salt,login FROM ttrss_users WHERE
  110. id = '$owner_uid'");
  111. $salt = db_fetch_result($result, 0, "salt");
  112. $login = db_fetch_result($result, 0, "login");
  113. if (!$salt) {
  114. $password_hash1 = encrypt_password($password);
  115. $password_hash2 = encrypt_password($password, $login);
  116. $query = "SELECT id FROM ttrss_users WHERE
  117. id = '$owner_uid' AND (pwd_hash = '$password_hash1' OR
  118. pwd_hash = '$password_hash2')";
  119. } else {
  120. $password_hash = encrypt_password($password, $salt, true);
  121. $query = "SELECT id FROM ttrss_users WHERE
  122. id = '$owner_uid' AND pwd_hash = '$password_hash'";
  123. }
  124. $result = db_query($this->link, $query);
  125. return db_num_rows($result) != 0;
  126. }
  127. function change_password($owner_uid, $old_password, $new_password) {
  128. $owner_uid = db_escape_string($this->link, $owner_uid);
  129. if ($this->check_password($owner_uid, $old_password)) {
  130. $new_salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
  131. $new_password_hash = encrypt_password($new_password, $new_salt, true);
  132. db_query($this->link, "UPDATE ttrss_users SET
  133. pwd_hash = '$new_password_hash', salt = '$new_salt', otp_enabled = false
  134. WHERE id = '$owner_uid'");
  135. $_SESSION["pwd_hash"] = $new_password_hash;
  136. return __("Password has been changed.");
  137. } else {
  138. return "ERROR: ".__('Old password is incorrect.');
  139. }
  140. }
  141. }
  142. ?>