123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223 |
- <?php
- class Auth_Internal extends Plugin implements IAuthModule {
- private $host;
- function about() {
- return array(1.0,
- "Authenticates against internal tt-rss database",
- "fox",
- true);
- }
- /* @var PluginHost $host */
- function init($host) {
- $this->host = $host;
- $this->pdo = Db::pdo();
- $host->add_hook($host::HOOK_AUTH_USER, $this);
- }
- function authenticate($login, $password) {
- $pwd_hash1 = encrypt_password($password);
- $pwd_hash2 = encrypt_password($password, $login);
- $otp = $_REQUEST["otp"];
- if (get_schema_version() > 96) {
- if (!defined('AUTH_DISABLE_OTP') || !AUTH_DISABLE_OTP) {
- $sth = $this->pdo->prepare("SELECT otp_enabled,salt FROM ttrss_users WHERE
- login = ?");
- $sth->execute([$login]);
- if ($row = $sth->fetch()) {
- require_once "lib/otphp/vendor/base32.php";
- require_once "lib/otphp/lib/otp.php";
- require_once "lib/otphp/lib/totp.php";
- $base32 = new Base32();
- $otp_enabled = $row['otp_enabled'];
- $secret = $base32->encode(sha1($row['salt']));
- $topt = new \OTPHP\TOTP($secret);
- $otp_check = $topt->now();
- if ($otp_enabled) {
- if ($otp) {
- if ($otp != $otp_check) {
- return false;
- }
- } else {
- $return = urlencode($_REQUEST["return"]);
- ?><html>
- <head>
- <title>Tiny Tiny RSS</title>
- <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
- </head>
- <?php echo stylesheet_tag("css/default.css") ?>
- <body class="ttrss_utility otp"><div class="content">
- <form action="public.php?return=<?php echo $return ?>"
- method="POST" class="otpform">
- <input type="hidden" name="op" value="login">
- <input type="hidden" name="login" value="<?php echo htmlspecialchars($login) ?>">
- <input type="hidden" name="password" value="<?php echo htmlspecialchars($password) ?>">
- <input type="hidden" name="bw_limit" value="<?php echo htmlspecialchars($_POST["bw_limit"]) ?>">
- <input type="hidden" name="remember_me" value="<?php echo htmlspecialchars($_POST["remember_me"]) ?>">
- <input type="hidden" name="profile" value="<?php echo htmlspecialchars($_POST["profile"]) ?>">
- <label><?php echo __("Please enter your one time password:") ?></label>
- <input autocomplete="off" size="6" name="otp" value=""/>
- <input type="submit" value="Continue"/>
- </form></div>
- <script type="text/javascript">
- document.forms[0].otp.focus();
- </script>
- <?php
- exit;
- }
- }
- }
- }
- }
- if (get_schema_version() > 87) {
- $sth = $this->pdo->prepare("SELECT salt FROM ttrss_users WHERE login = ?");
- $sth->execute([$login]);
- if ($row = $sth->fetch()) {
- $salt = $row['salt'];
- if ($salt == "") {
- $sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
- login = ? AND (pwd_hash = ? OR pwd_hash = ?)");
- $sth->execute([$login, $pwd_hash1, $pwd_hash2]);
- // verify and upgrade password to new salt base
- if ($row = $sth->fetch()) {
- // upgrade password to MODE2
- $user_id = $row['id'];
- $salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
- $pwd_hash = encrypt_password($password, $salt, true);
- $sth = $this->pdo->prepare("UPDATE ttrss_users SET
- pwd_hash = ?, salt = ? WHERE login = ?");
- $sth->execute([$pwd_hash, $salt, $login]);
- return $user_id;
- } else {
- return false;
- }
- } else {
- $pwd_hash = encrypt_password($password, $salt, true);
- $sth = $this->pdo->prepare("SELECT id
- FROM ttrss_users WHERE
- login = ? AND pwd_hash = ?");
- $sth->execute([$login, $pwd_hash]);
- if ($row = $sth->fetch()) {
- return $row['id'];
- }
- }
- } else {
- $sth = $this->pdo->prepare("SELECT id
- FROM ttrss_users WHERE
- login = ? AND (pwd_hash = ? OR pwd_hash = ?)");
- $sth->execute([$login, $pwd_hash1, $pwd_hash2]);
- if ($row = $sth->fetch()) {
- return $row['id'];
- }
- }
- } else {
- $sth = $this->pdo->prepare("SELECT id
- FROM ttrss_users WHERE
- login = ? AND (pwd_hash = ? OR pwd_hash = ?)");
- $sth->execute([$login, $pwd_hash1, $pwd_hash2]);
- if ($row = $sth->fetch()) {
- return $row['id'];
- }
- }
- return false;
- }
- function check_password($owner_uid, $password) {
- $sth = $this->pdo->prepare("SELECT salt,login FROM ttrss_users WHERE
- id = ?");
- $sth->execute([$owner_uid]);
- if ($row = $sth->fetch()) {
- $salt = $row['salt'];
- $login = $row['login'];
- if (!$salt) {
- $password_hash1 = encrypt_password($password);
- $password_hash2 = encrypt_password($password, $login);
- $sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
- id = ? AND (pwd_hash = ? OR pwd_hash = ?)");
- $sth->execute([$owner_uid, $password_hash1, $password_hash2]);
- return $sth->fetch();
- } else {
- $password_hash = encrypt_password($password, $salt, true);
- $sth = $this->pdo->prepare("SELECT id FROM ttrss_users WHERE
- id = ? AND pwd_hash = ?");
- $sth->execute([$owner_uid, $password_hash]);
- return $sth->fetch();
- }
- }
- return false;
- }
- function change_password($owner_uid, $old_password, $new_password) {
- if ($this->check_password($owner_uid, $old_password)) {
- $new_salt = substr(bin2hex(get_random_bytes(125)), 0, 250);
- $new_password_hash = encrypt_password($new_password, $new_salt, true);
- $sth = $this->pdo->prepare("UPDATE ttrss_users SET
- pwd_hash = ?, salt = ?, otp_enabled = false
- WHERE id = ?");
- $sth->execute([$new_password_hash, $new_salt, $owner_uid]);
- $_SESSION["pwd_hash"] = $new_password_hash;
- return __("Password has been changed.");
- } else {
- return "ERROR: ".__('Old password is incorrect.');
- }
- }
- function api_version() {
- return 2;
- }
- }
- ?>
|