add reuse check on update MFA (#28304)

This commit is contained in:
Julien Tant 2024-09-27 08:35:36 -07:00 committed by GitHub
parent f97cd9ea5b
commit d1cad8c692
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 71 additions and 32 deletions

View File

@ -85,27 +85,25 @@ func (m *MFA) GenerateSecret(siteURL, userEmail, userID string) (string, []byte,
// Activate set the mfa as active and store it with the StoreActive function provided // Activate set the mfa as active and store it with the StoreActive function provided
func (m *MFA) Activate(userMfaSecret, userID string, token string) error { func (m *MFA) Activate(userMfaSecret, userID string, token string) error {
otpConfig := &dgoogauth.OTPConfig{ usedTs, err := m.store.GetMfaUsedTimestamps(userID)
Secret: userMfaSecret,
WindowSize: 3,
HotpCounter: 0,
}
trimmedToken := strings.TrimSpace(token)
ok, err := otpConfig.Authenticate(trimmedToken)
if err != nil { if err != nil {
return errors.Wrap(err, "unable to parse the token") return errors.Wrap(err, "unable to retrieve the DisallowReuse slice")
} }
if !ok { otpConfig, err := m.authenticate(userMfaSecret, usedTs, token)
return InvalidToken if err != nil {
return errors.Wrap(err, "unable to authenticate the token")
} }
if err := m.store.UpdateMfaActive(userID, true); err != nil { if err = m.store.UpdateMfaActive(userID, true); err != nil {
return errors.Wrap(err, "unable to store mfa active") return errors.Wrap(err, "unable to store mfa active")
} }
err = m.store.StoreMfaUsedTimestamps(userID, otpConfig.DisallowReuse)
if err != nil {
return errors.Wrap(err, "unable to store the DisallowReuse slice")
}
return nil return nil
} }
@ -129,21 +127,14 @@ func (m *MFA) ValidateToken(user *model.User, token string) (bool, error) {
return false, errors.Wrap(err, "unable to retrieve the DisallowReuse slice") return false, errors.Wrap(err, "unable to retrieve the DisallowReuse slice")
} }
otpConfig := &dgoogauth.OTPConfig{ otpConfig, err := m.authenticate(user.MfaSecret, usedTs, token)
Secret: user.MfaSecret,
WindowSize: 3,
HotpCounter: 0,
DisallowReuse: usedTs,
}
trimmedToken := strings.TrimSpace(token)
ok, err := otpConfig.Authenticate(trimmedToken)
if err != nil { if err != nil {
if err == InvalidToken {
return false, nil
}
return false, errors.Wrap(err, "unable to parse the token") return false, errors.Wrap(err, "unable to parse the token")
} }
if !ok {
return false, nil
}
err = m.store.StoreMfaUsedTimestamps(user.Id, otpConfig.DisallowReuse) err = m.store.StoreMfaUsedTimestamps(user.Id, otpConfig.DisallowReuse)
if err != nil { if err != nil {
@ -152,3 +143,24 @@ func (m *MFA) ValidateToken(user *model.User, token string) (bool, error) {
return true, nil return true, nil
} }
func (*MFA) authenticate(userMfaSecret string, usedTs []int, token string) (*dgoogauth.OTPConfig, error) {
trimmedToken := strings.TrimSpace(token)
otpConfig := &dgoogauth.OTPConfig{
Secret: userMfaSecret,
WindowSize: 3,
HotpCounter: 0,
DisallowReuse: usedTs,
}
ok, err := otpConfig.Authenticate(trimmedToken)
if err != nil {
return nil, errors.Wrap(err, "unable to parse the token")
}
if !ok {
return nil, InvalidToken
}
return otpConfig, nil
}

View File

@ -77,19 +77,26 @@ func TestActivate(t *testing.T) {
token := dgoogauth.ComputeCode(userMfaSecret, time.Now().UTC().Unix()/30) token := dgoogauth.ComputeCode(userMfaSecret, time.Now().UTC().Unix()/30)
t.Run("fail on wrongly formatted token", func(t *testing.T) { t.Run("fail on wrongly formatted token", func(t *testing.T) {
err := New(nil).Activate(userMfaSecret, userID, "invalid-token") storeMock := mocks.UserStore{}
storeMock.On("GetMfaUsedTimestamps", userID).Return([]int{}, nil).Once()
err := New(&storeMock).Activate(userMfaSecret, userID, "invalid-token")
require.Error(t, err) require.Error(t, err)
require.Contains(t, err.Error(), "unable to parse the token") require.Contains(t, err.Error(), "unable to parse the token")
}) })
t.Run("fail on invalid token", func(t *testing.T) { t.Run("fail on invalid token", func(t *testing.T) {
err := New(nil).Activate(userMfaSecret, userID, "000000") storeMock := mocks.UserStore{}
storeMock.On("GetMfaUsedTimestamps", userID).Return([]int{}, nil).Once()
err := New(&storeMock).Activate(userMfaSecret, userID, "000000")
require.Error(t, err) require.Error(t, err)
require.Contains(t, err.Error(), "invalid mfa token") require.Contains(t, err.Error(), "invalid mfa token")
}) })
t.Run("fail on store action fail", func(t *testing.T) { t.Run("fail on store action fail", func(t *testing.T) {
storeMock := mocks.UserStore{} storeMock := mocks.UserStore{}
storeMock.On("GetMfaUsedTimestamps", userID).Return([]int{}, nil).Once()
storeMock.On("UpdateMfaActive", userID, true).Return(func(userId string, active bool) error { storeMock.On("UpdateMfaActive", userID, true).Return(func(userId string, active bool) error {
return errors.New("failed to update mfa active") return errors.New("failed to update mfa active")
}) })
@ -100,14 +107,34 @@ func TestActivate(t *testing.T) {
}) })
t.Run("Successful activate", func(t *testing.T) { t.Run("Successful activate", func(t *testing.T) {
storeMock := mocks.UserStore{} userID := model.NewId()
storeMock.On("UpdateMfaActive", userID, true).Return(func(userId string, active bool) error { secret := newRandomBase32String(mfaSecretSize)
return nil
})
err := New(&storeMock).Activate(userMfaSecret, userID, fmt.Sprintf("%06d", token)) t0 := time.Now().UTC().Unix() / 30
code := fmt.Sprintf("%06d", dgoogauth.ComputeCode(secret, t0))
usMock := mocks.UserStore{}
usMock.On("GetMfaUsedTimestamps", userID).Return([]int{}, nil).Once()
usMock.On("UpdateMfaActive", userID, true).Return(nil).Once()
usMock.On("StoreMfaUsedTimestamps", userID, mock.AnythingOfType("[]int")).Return(nil).Once()
err := New(&usMock).Activate(secret, userID, code)
require.NoError(t, err) require.NoError(t, err)
}) })
t.Run("disallow reuse of totp", func(t *testing.T) {
userID := model.NewId()
secret := newRandomBase32String(mfaSecretSize)
t0 := time.Now().UTC().Unix() / 30
code := fmt.Sprintf("%06d", dgoogauth.ComputeCode(secret, t0))
usMock := mocks.UserStore{}
usMock.On("GetMfaUsedTimestamps", userID).Return([]int{int(t0)}, nil).Once()
err := New(&usMock).Activate(secret, userID, code)
require.Error(t, err)
})
} }
func TestDeactivate(t *testing.T) { func TestDeactivate(t *testing.T) {