From 1a263f389b8c07742397e87749f4ceccaeafbe62 Mon Sep 17 00:00:00 2001
From: Olav Morken <olav.morken@uninett.no>
Date: Fri, 28 Oct 2011 08:17:18 +0000
Subject: [PATCH] Add support for hashed passwords & add authcrypt:Hash
 authsource.

Thanks to Dyonisius Visser for implementing this.

git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@2962 44740490-163a-0410-bde0-09ae8108e29a
---
 bin/pwgen.php                                 | 48 ++++++++++
 config-templates/authsources.php              | 11 +++
 config-templates/config.php                   |  1 +
 lib/SimpleSAML/Utils/Crypto.php               | 83 ++++++++++++++++
 modules/authcrypt/default-disable             |  3 +
 modules/authcrypt/lib/Auth/Source/Hash.php    | 95 +++++++++++++++++++
 .../core/lib/Auth/Source/AdminPassword.php    |  2 +-
 www/auth/login-admin.php                      |  2 +-
 8 files changed, 243 insertions(+), 2 deletions(-)
 create mode 100755 bin/pwgen.php
 create mode 100644 lib/SimpleSAML/Utils/Crypto.php
 create mode 100644 modules/authcrypt/default-disable
 create mode 100644 modules/authcrypt/lib/Auth/Source/Hash.php

diff --git a/bin/pwgen.php b/bin/pwgen.php
new file mode 100755
index 000000000..31a8eb9b5
--- /dev/null
+++ b/bin/pwgen.php
@@ -0,0 +1,48 @@
+#!/usr/bin/env php
+<?php
+/*
+ * $Id$
+ * Interactive script to generate password hashes.
+ *
+ */
+
+
+/* This is the base directory of the simpleSAMLphp installation. */
+$baseDir = dirname(dirname(__FILE__));
+
+/* Add library autoloader. */
+require_once($baseDir . '/lib/_autoload.php');
+
+
+echo "Enter password: ";
+$password = trim(fgets(STDIN));
+
+if(empty($password)) {
+	echo "Need at least one character for a password\n";
+	exit(1);
+}
+
+$table = '';
+foreach (array_chunk(hash_algos(), 6) as $chunk) {
+	foreach($chunk as $algo) {
+		$table .= sprintf('%-13s', $algo);
+	}
+	$table .= "\n";
+}
+
+echo "The following hashing algorithms are available:\n" . $table . "\n";
+echo "Which one do you want? [sha256] ";
+$algo = trim(fgets(STDIN));
+if(empty($algo)) {
+	$algo = 'sha256';
+}
+
+if(!in_array(strtolower($algo), hash_algos())) {
+	echo "Hashing algorithm '$algo' is not supported\n";
+	exit(1);
+}
+
+echo "Do you want to use a salt? (yes/no) [yes] ";
+$s = (trim(fgets(STDIN)) == 'no') ? '' : 'S';
+
+echo "\n  " . SimpleSAML_Utils_Crypto::pwHash($password, strtoupper( $s . $algo ) ). "\n\n";
diff --git a/config-templates/authsources.php b/config-templates/authsources.php
index 38848f390..72b14a75c 100644
--- a/config-templates/authsources.php
+++ b/config-templates/authsources.php
@@ -63,6 +63,17 @@ $config = array(
 	),
 	*/
 
+	/*
+	'crypto-hash' => array(
+		'authcrypto:Hash',
+		// hashed version of 'verysecret', made with bin/pwgen.php
+		'professor:{SSHA256}P6FDTEEIY2EnER9a6P2GwHhI5JDrwBgjQ913oVQjBngmCtrNBUMowA==' => array(
+			'uid' => array('prof_a'),
+			'eduPersonAffiliation' => array('member', 'employee', 'board'),
+		),
+	),
+	*/
+
 	/*
 	// This authentication source serves as an example of integration with an
 	// external authentication engine. Take a look at the comment in the beginning
diff --git a/config-templates/config.php b/config-templates/config.php
index f7564126d..b9f1bfb2c 100644
--- a/config-templates/config.php
+++ b/config-templates/config.php
@@ -67,6 +67,7 @@ $config = array (
 	 * This password must be kept secret, and modified from the default value 123.
 	 * This password will give access to the installation page of simpleSAMLphp with
 	 * metadata listing and diagnostics pages.
+	 * You can also put a hash here; run "bin/pwgen.php" to generate one.
 	 */
 	'auth.adminpassword'		=> '123',
 	'admin.protectindexpage'	=> false,
diff --git a/lib/SimpleSAML/Utils/Crypto.php b/lib/SimpleSAML/Utils/Crypto.php
new file mode 100644
index 000000000..da017b91a
--- /dev/null
+++ b/lib/SimpleSAML/Utils/Crypto.php
@@ -0,0 +1,83 @@
+<?
+/**
+ * A class for crypto related functions
+ *
+ * @author Dyonisius Visser, TERENA. <visser@terena.org>
+ * @package simpleSAMLphp
+ * @version $Id$
+ */
+class SimpleSAML_Utils_Crypto {
+
+	/**
+	 * This function generates a password hash
+	 * @param $password  The unencrypted password
+	 * @param $algo      The hashing algorithm, capitals, optionally prepended with 'S' (salted)
+	 * @param $salt      Optional salt
+	 */
+	public static function pwHash($password, $algo, $salt = NULL) {
+		assert('is_string($algo)');
+		assert('is_string($password)');
+
+		if(in_array(strtolower($algo), hash_algos())) {
+			$php_algo = strtolower($algo); // 'sha256' etc
+			// LDAP compatibility
+			return '{' . preg_replace('/^SHA1$/', 'SHA', $algo) . '}'
+				.base64_encode(hash($php_algo, $password, TRUE));
+		}
+
+		// Salt
+		if(!$salt) {
+			// Default 8 byte salt, but 4 byte for LDAP SHA1 hashes
+			$bytes = ($algo == 'SSHA1') ? 4 : 8;
+			$salt = SimpleSAML_Utilities::generateRandomBytes($bytes, TRUE);
+		}
+
+		if($algo[0] == 'S' && in_array(substr(strtolower($algo),1), hash_algos())) {
+			$php_algo = substr(strtolower($algo),1); // 'sha256' etc
+			// Salted hash, with LDAP compatibility
+			return '{' . preg_replace('/^SSHA1$/', 'SSHA', $algo) . '}' .
+				base64_encode(hash($php_algo, $password.$salt, TRUE) . $salt);
+		}
+
+		throw new Exception('Hashing algoritm \'' . strtolower($algo) . '\' not supported');
+
+	}
+
+
+	/**
+	 * This function checks if a password is valid
+	 * @param $crypted  Password as appears in password file, optionally prepended with algorithm
+	 * @param $clear    Password to check
+	 */
+	public static function pwValid($crypted, $clear) {
+		assert('is_string($crypted)');
+		assert('is_string($clear)');
+
+		// Match algorithm string ('{SSHA256}', '{MD5}')
+		if(preg_match('/^{(.*?)}(.*)$/', $crypted, $matches)) {
+
+			// LDAP compatibility
+			$algo = preg_replace('/^(S?SHA)$/', '${1}1', $matches[1]);
+
+			$cryptedpw =  $matches[2];
+
+			if(in_array(strtolower($algo), hash_algos())) {
+				// Unsalted hash
+				return ( $crypted == self::pwHash($clear, $algo) );
+			}
+
+			if($algo[0] == 'S' && in_array(substr(strtolower($algo),1), hash_algos())) {
+				$php_algo = substr(strtolower($algo),1);
+				// Salted hash
+				$hash_length = strlen(hash($php_algo, 'whatever', TRUE));
+				$salt = substr(base64_decode($cryptedpw), $hash_length);
+				return ( $crypted == self::pwHash($clear, $algo, $salt) );
+			}
+
+			throw new Exception('Hashing algoritm \'' . strtolower($algo) . '\' not supported');
+
+		} else {
+			return $crypted === $clear;
+		}
+	}
+}
diff --git a/modules/authcrypt/default-disable b/modules/authcrypt/default-disable
new file mode 100644
index 000000000..fa0bd82e2
--- /dev/null
+++ b/modules/authcrypt/default-disable
@@ -0,0 +1,3 @@
+This file indicates that the default state of this module
+is disabled. To enable, create a file named enable in the
+same directory as this file.
diff --git a/modules/authcrypt/lib/Auth/Source/Hash.php b/modules/authcrypt/lib/Auth/Source/Hash.php
new file mode 100644
index 000000000..a4e2c24b7
--- /dev/null
+++ b/modules/authcrypt/lib/Auth/Source/Hash.php
@@ -0,0 +1,95 @@
+<?php
+
+/**
+ * Authentication source for username & hashed password.
+ *
+ * This class is an authentication source which stores all username/hashes in an array,
+ * and authenticates users against this array.
+ *
+ * @author Dyonisius Visser, TERENA.
+ * @package simpleSAMLphp
+ * @version $Id$
+ */
+class sspmod_authcrypt_Auth_Source_Hash extends sspmod_core_Auth_UserPassBase {
+
+
+	/**
+	 * Our users, stored in an associative array. The key of the array is "<username>:<passwordhash>",
+	 * while the value of each element is a new array with the attributes for each user.
+	 */
+	private $users;
+
+
+	/**
+	 * Constructor for this authentication source.
+	 *
+	 * @param array $info  Information about this authentication source.
+	 * @param array $config  Configuration.
+	 */
+	public function __construct($info, $config) {
+		assert('is_array($info)');
+		assert('is_array($config)');
+
+		/* Call the parent constructor first, as required by the interface. */
+		parent::__construct($info, $config);
+
+		$this->users = array();
+
+		/* Validate and parse our configuration. */
+		foreach ($config as $userpass => $attributes) {
+			if (!is_string($userpass)) {
+				throw new Exception('Invalid <username>:<passwordhash> for authentication source ' .
+					$this->authId . ': ' . $userpass);
+			}
+
+			$userpass = explode(':', $userpass, 2);
+			if (count($userpass) !== 2) {
+				throw new Exception('Invalid <username>:<passwordhash> for authentication source ' .
+					$this->authId . ': ' . $userpass[0]);
+			}
+			$username = $userpass[0];
+			$passwordhash = $userpass[1];
+
+			try {
+				$attributes = SimpleSAML_Utilities::parseAttributes($attributes);
+			} catch(Exception $e) {
+				throw new Exception('Invalid attributes for user ' . $username .
+					' in authentication source ' . $this->authId . ': ' .
+					$e->getMessage());
+			}
+
+			$this->users[$username . ':' . $passwordhash] = $attributes;
+		}
+	}
+
+
+	/**
+	 * Attempt to log in using the given username and password.
+	 *
+	 * On a successful login, this function should return the users attributes. On failure,
+	 * it should throw an exception. If the error was caused by the user entering the wrong
+	 * username OR password, a SimpleSAML_Error_Error('WRONGUSERPASS') should be thrown.
+	 *
+	 * The username is UTF-8 encoded, and the hash is base64 encoded.
+	 *
+	 * @param string $username  The username the user wrote.
+	 * @param string $password  The password the user wrote.
+	 * @return array  Associative array with the users attributes.
+	 */
+	protected function login($username, $password) {
+		assert('is_string($username)');
+		assert('is_string($password)');
+
+		foreach($this->users as $userpass=>$attrs) {
+			if(preg_match("/^$username:(.*)$/", $userpass, $matches)) {
+				if(SimpleSAML_Utils_Crypto::pwValid($matches[1], $password)) {
+					return $this->users[$userpass];
+				} else {
+					SimpleSAML_Logger::debug('Incorrect password "' . $password . '" for user '. $username);
+				}
+			}
+		}
+		throw new SimpleSAML_Error_Error('WRONGUSERPASS');
+	}
+
+}
diff --git a/modules/core/lib/Auth/Source/AdminPassword.php b/modules/core/lib/Auth/Source/AdminPassword.php
index 69babb9f3..9bf2ad412 100644
--- a/modules/core/lib/Auth/Source/AdminPassword.php
+++ b/modules/core/lib/Auth/Source/AdminPassword.php
@@ -55,7 +55,7 @@ class sspmod_core_Auth_Source_AdminPassword extends sspmod_core_Auth_UserPassBas
 			throw new SimpleSAML_Error_Error('WRONGUSERPASS');
 		}
 
-		if ($password !== $adminPassword) {
+		if (!SimpleSAML_Utils_Crypto::pwValid($adminPassword, $password)) {
 			throw new SimpleSAML_Error_Error('WRONGUSERPASS');
 		}
 
diff --git a/www/auth/login-admin.php b/www/auth/login-admin.php
index e8845725d..f660dd941 100644
--- a/www/auth/login-admin.php
+++ b/www/auth/login-admin.php
@@ -33,7 +33,7 @@ if (isset($_POST['password'])) {
 
 	/* Validate and sanitize form data. */
 
-	if ($_POST['password'] === $correctpassword) {
+	if (SimpleSAML_Utils_Crypto::pwValid($correctpassword, $_POST['password'])) {
 		$username = 'admin';
 		$password = $_POST['password'];
 	
-- 
GitLab