srp.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235
  1. package user
  2. import (
  3. "context"
  4. "database/sql"
  5. "errors"
  6. "github.com/ente-io/museum/ente"
  7. "github.com/ente-io/museum/pkg/utils/auth"
  8. "github.com/ente-io/stacktrace"
  9. "github.com/gin-gonic/gin"
  10. "github.com/google/uuid"
  11. "github.com/kong/go-srp"
  12. "github.com/sirupsen/logrus"
  13. "net/http"
  14. )
  15. const Srp4096Params = 4096
  16. func (c *UserController) SetupSRP(context *gin.Context, userID int64, req ente.SetupSRPRequest) (*ente.SetupSRPResponse, error) {
  17. srpB, sessionID, err := c.createAndInsertSRPSession(context, req.SrpUserID, req.SRPVerifier, req.SRPA)
  18. if err != nil {
  19. return nil, stacktrace.Propagate(err, "")
  20. }
  21. setupID, err := c.UserAuthRepo.InsertTempSRPSetup(context, req, userID, sessionID)
  22. if err != nil {
  23. return nil, stacktrace.Propagate(err, "failed to add entry in setup table")
  24. }
  25. return &ente.SetupSRPResponse{
  26. SetupID: *setupID,
  27. SRPB: *srpB,
  28. }, nil
  29. }
  30. func (c *UserController) CompleteSRPSetup(context *gin.Context, req ente.CompleteSRPSetupRequest) (*ente.CompleteSRPSetupResponse, error) {
  31. userID := auth.GetUserID(context.Request.Header)
  32. setup, err := c.UserAuthRepo.GetTempSRPSetupEntity(context, req.SetupID)
  33. if err != nil {
  34. return nil, stacktrace.Propagate(err, "")
  35. }
  36. srpM2, err := c.verifySRPSession(context, setup.Verifier, setup.SessionID, req.SRPM1)
  37. if err != nil {
  38. return nil, err
  39. }
  40. err = c.UserAuthRepo.InsertSRPAuth(context, userID, setup.SRPUserID, setup.Verifier, setup.Salt)
  41. if err != nil {
  42. return nil, stacktrace.Propagate(err, "failed to add entry in srp auth")
  43. }
  44. return &ente.CompleteSRPSetupResponse{
  45. SetupID: req.SetupID,
  46. SRPM2: *srpM2,
  47. }, nil
  48. }
  49. // UpdateSrpAndKeyAttributes updates the SRP and keys attributes if the SRP setup is successfully done
  50. func (c *UserController) UpdateSrpAndKeyAttributes(context *gin.Context,
  51. userID int64,
  52. req ente.UpdateSRPAndKeysRequest,
  53. shouldClearTokens bool,
  54. ) (*ente.UpdateSRPSetupResponse, error) {
  55. setup, err := c.UserAuthRepo.GetTempSRPSetupEntity(context, req.SetupID)
  56. if err != nil {
  57. return nil, stacktrace.Propagate(err, "")
  58. }
  59. srpM2, err := c.verifySRPSession(context, setup.Verifier, setup.SessionID, req.SRPM1)
  60. if err != nil {
  61. return nil, err
  62. }
  63. err = c.UserAuthRepo.InsertOrUpdateSRPAuthAndKeyAttr(context, userID, req, setup)
  64. if err != nil {
  65. return nil, stacktrace.Propagate(err, "failed to add entry in srp auth")
  66. }
  67. if shouldClearTokens {
  68. token := auth.GetToken(context)
  69. err = c.UserAuthRepo.RemoveAllOtherTokens(userID, token)
  70. if err != nil {
  71. return nil, err
  72. }
  73. } else {
  74. logrus.WithField("user_id", userID).Info("not clearing tokens")
  75. }
  76. return &ente.UpdateSRPSetupResponse{
  77. SetupID: req.SetupID,
  78. SRPM2: *srpM2,
  79. }, nil
  80. }
  81. func (c *UserController) GetSRPAttributes(context *gin.Context, email string) (*ente.GetSRPAttributesResponse, error) {
  82. userID, err := c.UserRepo.GetUserIDWithEmail(email)
  83. if err != nil {
  84. if errors.Is(err, sql.ErrNoRows) {
  85. return nil, stacktrace.Propagate(ente.ErrNotFound, "user does not exist")
  86. } else {
  87. return nil, stacktrace.Propagate(err, "failed to get user")
  88. }
  89. }
  90. srpAttributes, err := c.UserAuthRepo.GetSRPAttributes(userID)
  91. if err != nil {
  92. return nil, stacktrace.Propagate(err, "")
  93. }
  94. return srpAttributes, nil
  95. }
  96. func (c *UserController) CreateSrpSession(context *gin.Context, req ente.CreateSRPSessionRequest) (*ente.CreateSRPSessionResponse, error) {
  97. srpAuthEntity, err := c.UserAuthRepo.GetSRPAuthEntityBySRPUserID(context, req.SRPUserID)
  98. if err != nil {
  99. return nil, err
  100. }
  101. isEmailMFAEnabled, err := c.UserAuthRepo.IsEmailMFAEnabled(context, srpAuthEntity.UserID)
  102. if err != nil {
  103. return nil, stacktrace.Propagate(err, "")
  104. }
  105. if *isEmailMFAEnabled {
  106. return nil, stacktrace.Propagate(&ente.ApiError{
  107. Code: "EMAIL_MFA_ENABLED",
  108. Message: "Email MFA is enabled",
  109. HttpStatusCode: http.StatusConflict,
  110. }, "email mfa is enabled")
  111. }
  112. srpBBase64, sessionID, err := c.createAndInsertSRPSession(context, req.SRPUserID, srpAuthEntity.Verifier, req.SRPA)
  113. if err != nil {
  114. return nil, stacktrace.Propagate(err, "")
  115. }
  116. return &ente.CreateSRPSessionResponse{
  117. SRPB: *srpBBase64,
  118. SessionID: *sessionID,
  119. }, nil
  120. }
  121. func (c *UserController) VerifySRPSession(context *gin.Context, req ente.VerifySRPSessionRequest) (*ente.EmailAuthorizationResponse, error) {
  122. srpAuthEntity, err := c.UserAuthRepo.GetSRPAuthEntityBySRPUserID(context, req.SRPUserID)
  123. if err != nil {
  124. return nil, stacktrace.Propagate(err, "")
  125. }
  126. srpM2, err := c.verifySRPSession(context, srpAuthEntity.Verifier, req.SessionID, req.SRPM1)
  127. if err != nil {
  128. return nil, stacktrace.Propagate(err, "")
  129. }
  130. user, err := c.UserRepo.Get(srpAuthEntity.UserID)
  131. if err != nil {
  132. return nil, err
  133. }
  134. verResponse, err := c.onVerificationSuccess(context, user.Email, nil)
  135. if err != nil {
  136. return nil, stacktrace.Propagate(err, "")
  137. }
  138. verResponse.SrpM2 = srpM2
  139. return &verResponse, nil
  140. }
  141. func (c *UserController) createAndInsertSRPSession(
  142. gContext *gin.Context,
  143. srpUserID uuid.UUID,
  144. srpVerifier string,
  145. srpA string,
  146. ) (*string, *uuid.UUID, error) {
  147. serverSecret := srp.GenKey()
  148. srpParams := srp.GetParams(Srp4096Params)
  149. srpServer := srp.NewServer(srpParams, convertStringToBytes(srpVerifier), serverSecret)
  150. if srpServer == nil {
  151. return nil, nil, stacktrace.NewError("server is nil")
  152. }
  153. srpServer.SetA(convertStringToBytes(srpA))
  154. srpB := srpServer.ComputeB()
  155. if srpB == nil {
  156. return nil, nil, stacktrace.NewError("srpB is nil")
  157. }
  158. sessionID, err := c.UserAuthRepo.AddSRPSession(srpUserID, convertBytesToString(serverSecret), srpA)
  159. if err != nil {
  160. return nil, nil, stacktrace.Propagate(err, "")
  161. }
  162. srpBBase64 := convertBytesToString(srpB)
  163. return &srpBBase64, &sessionID, nil
  164. }
  165. func (c *UserController) verifySRPSession(ctx context.Context,
  166. srpVerifier string,
  167. sessionID uuid.UUID,
  168. srpM1 string,
  169. ) (*string, error) {
  170. srpSession, err := c.UserAuthRepo.GetSrpSessionEntity(ctx, sessionID)
  171. if err != nil {
  172. return nil, stacktrace.Propagate(err, "")
  173. }
  174. if srpSession.IsVerified {
  175. return nil, stacktrace.Propagate(&ente.ApiError{
  176. Code: "SESSION_ALREADY_VERIFIED",
  177. HttpStatusCode: http.StatusGone,
  178. }, "")
  179. } else if srpSession.AttemptCount >= 5 {
  180. return nil, stacktrace.Propagate(&ente.ApiError{
  181. Code: "TOO_MANY_WRONG_ATTEMPTS",
  182. HttpStatusCode: http.StatusGone,
  183. }, "")
  184. }
  185. srpParams := srp.GetParams(Srp4096Params)
  186. srpServer := srp.NewServer(srpParams, convertStringToBytes(srpVerifier), convertStringToBytes(srpSession.ServerKey))
  187. if srpServer == nil {
  188. return nil, stacktrace.NewError("server is nil")
  189. }
  190. srpServer.SetA(convertStringToBytes(srpSession.SRP_A))
  191. srpM2Bytes, err := srpServer.CheckM1(convertStringToBytes(srpM1))
  192. if err != nil {
  193. err2 := c.UserAuthRepo.IncrementSrpSessionAttemptCount(ctx, sessionID)
  194. if err2 != nil {
  195. return nil, stacktrace.Propagate(err2, "")
  196. }
  197. return nil, stacktrace.Propagate(ente.ErrInvalidPassword, "failed to verify srp session")
  198. } else {
  199. err2 := c.UserAuthRepo.SetSrpSessionVerified(ctx, sessionID)
  200. if err2 != nil {
  201. return nil, stacktrace.Propagate(err2, "")
  202. }
  203. }
  204. srpM2 := convertBytesToString(srpM2Bytes)
  205. return &srpM2, nil
  206. }