Merge pull request #6908 from annando/sig-auth

Enable remote authentication with HTTP Signatures
This commit is contained in:
Hypolite Petovan 2019-03-19 08:28:13 -04:00 committed by GitHub
commit d0c0f0345c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 66 additions and 26 deletions

View File

@ -12,7 +12,9 @@ use Friendica\Core\Config\Cache\ConfigCacheLoader;
use Friendica\Core\Config\Cache\IConfigCache; use Friendica\Core\Config\Cache\IConfigCache;
use Friendica\Core\Config\Configuration; use Friendica\Core\Config\Configuration;
use Friendica\Database\DBA; use Friendica\Database\DBA;
use Friendica\Model\Profile;
use Friendica\Network\HTTPException\InternalServerErrorException; use Friendica\Network\HTTPException\InternalServerErrorException;
use Friendica\Util\HTTPSignature;
use Friendica\Util\Profiler; use Friendica\Util\Profiler;
use Psr\Log\LoggerInterface; use Psr\Log\LoggerInterface;
@ -1143,6 +1145,13 @@ class App
Core\Worker::executeIfIdle(); Core\Worker::executeIfIdle();
} }
if ($this->getMode()->isNormal()) {
$requester = HTTPSignature::getSigner('', $_SERVER);
if (!empty($requester)) {
Profile::addVisitorCookieForHandle($requester);
}
}
// ZRL // ZRL
if (!empty($_GET['zrl']) && $this->getMode()->isNormal()) { if (!empty($_GET['zrl']) && $this->getMode()->isNormal()) {
$this->query_string = Model\Profile::stripZrls($this->query_string); $this->query_string = Model\Profile::stripZrls($this->query_string);

View File

@ -1082,6 +1082,51 @@ class Profile
} }
} }
/**
* Set the visitor cookies (see remote_user()) for the given handle
*
* @param string $handle Visitor handle
* @return array Visitor contact array
*/
public static function addVisitorCookieForHandle($handle)
{
$a = \get_app();
// Try to find the public contact entry of the visitor.
$cid = Contact::getIdForURL($handle);
if (!$cid) {
Logger::log('unable to finger ' . $handle, Logger::DEBUG);
return [];
}
$visitor = DBA::selectFirst('contact', [], ['id' => $cid]);
// Authenticate the visitor.
$_SESSION['authenticated'] = 1;
$_SESSION['visitor_id'] = $visitor['id'];
$_SESSION['visitor_handle'] = $visitor['addr'];
$_SESSION['visitor_home'] = $visitor['url'];
$_SESSION['my_url'] = $visitor['url'];
/// @todo replace this and the query for this variable with some cleaner functionality
$_SESSION['remote'] = [];
$remote_contacts = DBA::select('contact', ['id', 'uid'], ['nurl' => $visitor['nurl'], 'rel' => [Contact::FOLLOWER, Contact::FRIEND]]);
while ($contact = DBA::fetch($remote_contacts)) {
if (($contact['uid'] == 0) || Contact::isBlockedByUser($visitor['id'], $contact['uid'])) {
continue;
}
$_SESSION['remote'][] = ['cid' => $contact['id'], 'uid' => $contact['uid'], 'url' => $visitor['url']];
}
$a->contact = $visitor;
Logger::info('Authenticated visitor', ['url' => $visitor['url']]);
return $visitor;
}
/** /**
* OpenWebAuth authentication. * OpenWebAuth authentication.
* *
@ -1106,33 +1151,11 @@ class Profile
return; return;
} }
// Try to find the public contact entry of the visitor. $visitor = self::addVisitorCookieForHandle($visitor_handle);
$cid = Contact::getIdForURL($visitor_handle); if (empty($visitor)) {
if(!$cid) {
Logger::log('owt: unable to finger ' . $visitor_handle, Logger::DEBUG);
return; return;
} }
$visitor = DBA::selectFirst('contact', [], ['id' => $cid]);
// Authenticate the visitor.
$_SESSION['authenticated'] = 1;
$_SESSION['visitor_id'] = $visitor['id'];
$_SESSION['visitor_handle'] = $visitor['addr'];
$_SESSION['visitor_home'] = $visitor['url'];
$_SESSION['my_url'] = $visitor['url'];
/// @todo replace this and the query for this variable with some cleaner functionality
$_SESSION['remote'] = [];
$remote_contacts = DBA::select('contact', ['id', 'uid'], ['nurl' => $visitor['nurl'], 'rel' => [Contact::FOLLOWER, Contact::FRIEND]]);
while ($contact = DBA::fetch($remote_contacts)) {
if (($contact['uid'] == 0) || Contact::isBlockedByUser($visitor['id'], $contact['uid'])) {
continue;
}
$_SESSION['remote'][] = ['cid' => $contact['id'], 'uid' => $contact['uid'], 'url' => $visitor['url']];
}
$arr = [ $arr = [
'visitor' => $visitor, 'visitor' => $visitor,
'url' => $a->query_string 'url' => $a->query_string

View File

@ -45,9 +45,6 @@ class Photo extends BaseModule
exit; exit;
} }
/// @todo Add Authentication to enable fetching of non public content
// $requester = HTTPSignature::getSigner('', $_SERVER);
$customsize = 0; $customsize = 0;
$photo = false; $photo = false;
switch($a->argc) { switch($a->argc) {

View File

@ -488,8 +488,10 @@ class HTTPSignature
return false; return false;
} }
$hasGoodSignedContent = false;
// Check the digest when it is part of the signed data // Check the digest when it is part of the signed data
if (in_array('digest', $sig_block['headers'])) { if (!empty($content) && in_array('digest', $sig_block['headers'])) {
$digest = explode('=', $headers['digest'], 2); $digest = explode('=', $headers['digest'], 2);
if ($digest[0] === 'SHA-256') { if ($digest[0] === 'SHA-256') {
$hashalg = 'sha256'; $hashalg = 'sha256';
@ -503,6 +505,8 @@ class HTTPSignature
if (!empty($hashalg) && base64_encode(hash($hashalg, $content, true)) != $digest[1]) { if (!empty($hashalg) && base64_encode(hash($hashalg, $content, true)) != $digest[1]) {
return false; return false;
} }
$hasGoodSignedContent = true;
} }
// Check if the signed date field is in an acceptable range // Check if the signed date field is in an acceptable range
@ -512,6 +516,7 @@ class HTTPSignature
Logger::log("Header date '" . $headers['date'] . "' is with " . $diff . " seconds out of the 300 second frame. The signature is invalid."); Logger::log("Header date '" . $headers['date'] . "' is with " . $diff . " seconds out of the 300 second frame. The signature is invalid.");
return false; return false;
} }
$hasGoodSignedContent = true;
} }
// Check the content-length when it is part of the signed data // Check the content-length when it is part of the signed data
@ -521,6 +526,12 @@ class HTTPSignature
} }
} }
// Ensure that the authentication had been done with some content
// Without this check someone could authenticate with fakeable data
if (!$hasGoodSignedContent) {
return false;
}
return $key['url']; return $key['url'];
} }