init.php 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196
  1. <?php
  2. class Auth_Internal extends Plugin implements IAuthModule {
  3. private $host;
  4. function about() {
  5. return array(1.0,
  6. "Authenticates against internal tt-rss database",
  7. "fox",
  8. true);
  9. }
  10. function init($host) {
  11. $this->host = $host;
  12. $host->add_hook($host::HOOK_AUTH_USER, $this);
  13. }
  14. function authenticate($login, $password) {
  15. $pwd_hash1 = encrypt_password($password);
  16. $pwd_hash2 = encrypt_password($password, $login);
  17. $login = db_escape_string($login);
  18. $otp = db_escape_string($_REQUEST["otp"]);
  19. if (get_schema_version() > 96) {
  20. if (!defined('AUTH_DISABLE_OTP') || !AUTH_DISABLE_OTP) {
  21. $result = db_query("SELECT otp_enabled,salt FROM ttrss_users WHERE
  22. login = '$login'");
  23. if (db_num_rows($result) > 0) {
  24. require_once "lib/otphp/vendor/base32.php";
  25. require_once "lib/otphp/lib/otp.php";
  26. require_once "lib/otphp/lib/totp.php";
  27. $base32 = new Base32();
  28. $otp_enabled = sql_bool_to_bool(db_fetch_result($result, 0, "otp_enabled"));
  29. $secret = $base32->encode(sha1(db_fetch_result($result, 0, "salt")));
  30. $topt = new \OTPHP\TOTP($secret);
  31. $otp_check = $topt->now();
  32. if ($otp_enabled) {
  33. if ($otp) {
  34. if ($otp != $otp_check) {
  35. return false;
  36. }
  37. } else {
  38. $return = urlencode($_REQUEST["return"]);
  39. ?><html>
  40. <head><title>Tiny Tiny RSS</title></head>
  41. <?php stylesheet_tag("css/utility.css") ?>
  42. <body class="otp"><div class="content">
  43. <form action="public.php?return=<?php echo $return ?>"
  44. method="POST" class="otpform">
  45. <input type="hidden" name="op" value="login">
  46. <input type="hidden" name="login" value="<?php echo htmlspecialchars($login) ?>">
  47. <input type="hidden" name="password" value="<?php echo htmlspecialchars($password) ?>">
  48. <label><?php echo __("Please enter your one time password:") ?></label>
  49. <input autocomplete="off" size="6" name="otp" value=""/>
  50. <input type="submit" value="Continue"/>
  51. </form></div>
  52. <script type="text/javascript">
  53. document.forms[0].otp.focus();
  54. </script>
  55. <?php
  56. exit;
  57. }
  58. }
  59. }
  60. }
  61. }
  62. if (get_schema_version() > 87) {
  63. $result = db_query("SELECT salt FROM ttrss_users WHERE
  64. login = '$login'");
  65. if (db_num_rows($result) != 1) {
  66. return false;
  67. }
  68. $salt = db_fetch_result($result, 0, "salt");
  69. if ($salt == "") {
  70. $query = "SELECT id
  71. FROM ttrss_users WHERE
  72. login = '$login' AND (pwd_hash = '$pwd_hash1' OR
  73. pwd_hash = '$pwd_hash2')";
  74. // verify and upgrade password to new salt base
  75. $result = db_query($query);
  76. if (db_num_rows($result) == 1) {
  77. // upgrade password to MODE2
  78. $salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
  79. $pwd_hash = encrypt_password($password, $salt, true);
  80. db_query("UPDATE ttrss_users SET
  81. pwd_hash = '$pwd_hash', salt = '$salt' WHERE login = '$login'");
  82. $query = "SELECT id
  83. FROM ttrss_users WHERE
  84. login = '$login' AND pwd_hash = '$pwd_hash'";
  85. } else {
  86. return false;
  87. }
  88. } else {
  89. $pwd_hash = encrypt_password($password, $salt, true);
  90. $query = "SELECT id
  91. FROM ttrss_users WHERE
  92. login = '$login' AND pwd_hash = '$pwd_hash'";
  93. }
  94. } else {
  95. $query = "SELECT id
  96. FROM ttrss_users WHERE
  97. login = '$login' AND (pwd_hash = '$pwd_hash1' OR
  98. pwd_hash = '$pwd_hash2')";
  99. }
  100. $result = db_query($query);
  101. if (db_num_rows($result) == 1) {
  102. return db_fetch_result($result, 0, "id");
  103. }
  104. return false;
  105. }
  106. function check_password($owner_uid, $password) {
  107. $owner_uid = db_escape_string($owner_uid);
  108. $result = db_query("SELECT salt,login FROM ttrss_users WHERE
  109. id = '$owner_uid'");
  110. $salt = db_fetch_result($result, 0, "salt");
  111. $login = db_fetch_result($result, 0, "login");
  112. if (!$salt) {
  113. $password_hash1 = encrypt_password($password);
  114. $password_hash2 = encrypt_password($password, $login);
  115. $query = "SELECT id FROM ttrss_users WHERE
  116. id = '$owner_uid' AND (pwd_hash = '$password_hash1' OR
  117. pwd_hash = '$password_hash2')";
  118. } else {
  119. $password_hash = encrypt_password($password, $salt, true);
  120. $query = "SELECT id FROM ttrss_users WHERE
  121. id = '$owner_uid' AND pwd_hash = '$password_hash'";
  122. }
  123. $result = db_query($query);
  124. return db_num_rows($result) != 0;
  125. }
  126. function change_password($owner_uid, $old_password, $new_password) {
  127. $owner_uid = db_escape_string($owner_uid);
  128. if ($this->check_password($owner_uid, $old_password)) {
  129. $new_salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
  130. $new_password_hash = encrypt_password($new_password, $new_salt, true);
  131. db_query("UPDATE ttrss_users SET
  132. pwd_hash = '$new_password_hash', salt = '$new_salt', otp_enabled = false
  133. WHERE id = '$owner_uid'");
  134. $_SESSION["pwd_hash"] = $new_password_hash;
  135. return __("Password has been changed.");
  136. } else {
  137. return "ERROR: ".__('Old password is incorrect.');
  138. }
  139. }
  140. function api_version() {
  141. return 2;
  142. }
  143. }
  144. ?>