2009-02-24 22:27:28 +01:00
|
|
|
<?php
|
|
|
|
|
|
|
|
# Written by Simon Josefsson <simon@josefsson.org>.
|
2012-01-23 20:47:28 +01:00
|
|
|
# Copyright (c) 2009-2012 Yubico AB
|
2009-02-24 22:27:28 +01:00
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# Redistribution and use in source and binary forms, with or without
|
|
|
|
# modification, are permitted provided that the following conditions are
|
|
|
|
# met:
|
|
|
|
#
|
|
|
|
# * Redistributions of source code must retain the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer.
|
|
|
|
#
|
|
|
|
# * Redistributions in binary form must reproduce the above
|
|
|
|
# copyright notice, this list of conditions and the following
|
|
|
|
# disclaimer in the documentation and/or other materials provided
|
|
|
|
# with the distribution.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
2009-12-15 20:19:28 +01:00
|
|
|
require_once 'ykksm-config.php';
|
|
|
|
require_once 'ykksm-utils.php';
|
2009-02-24 22:27:28 +01:00
|
|
|
|
2009-02-25 12:06:42 +01:00
|
|
|
openlog("ykksm", LOG_PID, $logfacility)
|
2009-02-24 22:27:28 +01:00
|
|
|
or die("ERR Syslog open error\n");
|
|
|
|
|
|
|
|
$otp = $_REQUEST["otp"];
|
|
|
|
if (!$otp) {
|
|
|
|
syslog(LOG_INFO, "No OTP provided");
|
|
|
|
die("ERR No OTP provided\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!preg_match("/^([cbdefghijklnrtuv]{0,16})([cbdefghijklnrtuv]{32})$/",
|
|
|
|
$otp, $matches)) {
|
|
|
|
syslog(LOG_INFO, "Invalid OTP format: $otp");
|
|
|
|
die("ERR Invalid OTP format\n");
|
|
|
|
}
|
|
|
|
$id = $matches[1];
|
|
|
|
$modhex_ciphertext = $matches[2];
|
|
|
|
|
2009-12-02 18:30:29 +01:00
|
|
|
try {
|
|
|
|
$dbh = new PDO($db_dsn, $db_username, $db_password, $db_options);
|
|
|
|
} catch (PDOException $e) {
|
|
|
|
syslog(LOG_ERR, "Database error: " . $e->getMessage());
|
2009-02-24 22:27:28 +01:00
|
|
|
die("ERR Database error\n");
|
2009-12-02 18:30:29 +01:00
|
|
|
}
|
2009-02-24 22:27:28 +01:00
|
|
|
|
2009-12-14 17:18:38 +01:00
|
|
|
$sql = "SELECT aeskey, internalname FROM yubikeys " .
|
|
|
|
"WHERE publicname = '$id' AND active";
|
2009-12-02 18:30:29 +01:00
|
|
|
$result = $dbh->query($sql);
|
2009-02-24 22:27:28 +01:00
|
|
|
if (!$result) {
|
2009-12-02 18:30:29 +01:00
|
|
|
syslog(LOG_ERR, "Database query error. Query: " . $sql . " Error: " .
|
|
|
|
print_r ($dbh->errorInfo (), true));
|
2009-02-24 22:27:28 +01:00
|
|
|
die("ERR Database error\n");
|
2009-12-02 18:30:29 +01:00
|
|
|
}
|
2009-02-24 22:27:28 +01:00
|
|
|
|
2009-12-02 18:30:29 +01:00
|
|
|
$row = $result->fetch(PDO::FETCH_ASSOC);
|
2009-12-14 17:18:38 +01:00
|
|
|
$aeskey = $row['aeskey'];
|
|
|
|
$internalname = $row['internalname'];
|
2009-02-24 22:27:28 +01:00
|
|
|
|
2010-09-14 21:05:22 +02:00
|
|
|
if (!$aeskey) {
|
|
|
|
syslog(LOG_INFO, "Unknown yubikey: " . $otp);
|
|
|
|
die("ERR Unknown yubikey\n");
|
|
|
|
}
|
|
|
|
|
2009-02-24 22:27:28 +01:00
|
|
|
$ciphertext = modhex2hex($modhex_ciphertext);
|
2009-12-14 17:18:38 +01:00
|
|
|
$plaintext = aes128ecb_decrypt($aeskey, $ciphertext);
|
2009-02-24 22:27:28 +01:00
|
|
|
|
2009-03-18 18:23:37 +01:00
|
|
|
$uid = substr($plaintext, 0, 12);
|
2009-12-14 17:18:38 +01:00
|
|
|
if (strcmp($uid, $internalname) != 0) {
|
|
|
|
syslog(LOG_ERR, "UID error: $otp $plaintext: $uid vs $internalname");
|
2009-02-24 22:27:28 +01:00
|
|
|
die("ERR Corrupt OTP\n");;
|
|
|
|
}
|
|
|
|
|
2009-06-24 20:23:47 +02:00
|
|
|
if (!crc_is_good($plaintext)) {
|
|
|
|
syslog(LOG_ERR, "CRC error: $otp: $plaintext");
|
|
|
|
die("ERR Corrupt OTP\n");
|
|
|
|
}
|
|
|
|
|
2009-02-24 22:27:28 +01:00
|
|
|
# Mask out interesting fields
|
|
|
|
$counter = substr($plaintext, 14, 2) . substr($plaintext, 12, 2);
|
2009-03-11 02:25:19 +01:00
|
|
|
$low = substr($plaintext, 18, 2) . substr($plaintext, 16, 2);
|
|
|
|
$high = substr($plaintext, 20, 2);
|
|
|
|
$use = substr($plaintext, 22, 2);
|
2009-02-24 22:27:28 +01:00
|
|
|
|
2009-03-18 18:29:46 +01:00
|
|
|
$out = "OK counter=$counter low=$low high=$high use=$use";
|
|
|
|
|
|
|
|
syslog(LOG_INFO, "SUCCESS OTP $otp PT $plaintext $out")
|
|
|
|
or die("ERR Log error\n");
|
|
|
|
|
|
|
|
print "$out\n";
|
2009-02-24 22:27:28 +01:00
|
|
|
|
2009-12-02 18:30:29 +01:00
|
|
|
# Close database connection.
|
|
|
|
$dbh = null;
|
2009-02-24 22:27:28 +01:00
|
|
|
|
|
|
|
?>
|