mirror of
https://github.com/Yubico/yubikey-val.git
synced 2024-11-29 09:24:12 +01:00
Improve checking of OTPs.
This commit is contained in:
parent
ede3f44960
commit
0fd6a2b7d0
18
common.php
18
common.php
@ -2,7 +2,7 @@
|
||||
define('S_OK', 'OK');
|
||||
define('S_BAD_OTP', 'BAD_OTP');
|
||||
define('S_REPLAYED_OTP', 'REPLAYED_OTP');
|
||||
define('S_PHISHED_OTP', 'PHISHED_OTP');
|
||||
define('S_DELAYED_OTP', 'DELAYED_OTP');
|
||||
define('S_BAD_SIGNATURE', 'BAD_SIGNATURE');
|
||||
define('S_MISSING_PARAMETER', 'MISSING_PARAMETER');
|
||||
define('S_NO_SUCH_CLIENT', 'NO_SUCH_CLIENT');
|
||||
@ -54,6 +54,7 @@ mysql_select_db($baseParams['__DB_NAME__'], $conn)
|
||||
|
||||
function query($q) {
|
||||
global $conn;
|
||||
debug('Query: '.$q);
|
||||
$result = mysql_query($q, $conn);
|
||||
if (!$result) {
|
||||
$err = "Invalid query -- $q -- ";
|
||||
@ -67,19 +68,18 @@ function mysql_quote($value) {
|
||||
return "'" . mysql_real_escape_string($value) . "'";
|
||||
}
|
||||
|
||||
function truncate($s, $max) {
|
||||
return (strlen($s) > $max) ? substr($s, 0, $max-3).'...' : $s;
|
||||
}
|
||||
|
||||
function debug($msg, $exit = false) {
|
||||
global $trace;
|
||||
if ($trace) {
|
||||
if (is_array($msg)) {
|
||||
//print_r($msg);
|
||||
} else {
|
||||
echo '<p>Debug> ' . $msg;
|
||||
$str = "";
|
||||
foreach($msg as $key => $value){
|
||||
$str .= " $key=$value";
|
||||
}
|
||||
echo "\n";
|
||||
} else {
|
||||
$str = ' ' . $msg;
|
||||
}
|
||||
echo '<p>Debug>' . $str . "\n";
|
||||
}
|
||||
if ($exit) {
|
||||
die('<font color=red><h4>Exit</h4></font>');
|
||||
|
126
verify.php
126
verify.php
@ -80,112 +80,77 @@ $key16 = ModHex :: Decode($k);
|
||||
//// Decode OTP from input
|
||||
//
|
||||
debug('OTP validation req:');
|
||||
$decoded_token = Yubikey :: Decode($otp, $key16);
|
||||
debug($decoded_token);
|
||||
if (!is_array($decoded_token)) {
|
||||
$otpinfo = Yubikey :: Decode($otp, $key16);
|
||||
debug($otpinfo);
|
||||
if (!is_array($otpinfo)) {
|
||||
sendResp(S_BAD_OTP, $otp);
|
||||
exit;
|
||||
}
|
||||
|
||||
//// Check the session counter
|
||||
//
|
||||
$sessionCounter = $decoded_token["session_counter"]; // From the req
|
||||
$sessionCounter = $otpinfo["session_counter"]; // From the req
|
||||
$seenSessionCounter = $ad['counter']; // From DB
|
||||
$scDiff = $seenSessionCounter - $sessionCounter;
|
||||
if ($scDiff > 0) {
|
||||
debug("Replayed session counter=" . $sessionCounter . ', seen=' . $seenSessionCounter);
|
||||
if ($sessionCounter < $seenSessionCounter) {
|
||||
debug("Replay, session counter, seen=" . $seenSessionCounter .
|
||||
" this=" . $sessionCounter);
|
||||
sendResp(S_REPLAYED_OTP);
|
||||
exit;
|
||||
} else {
|
||||
debug("Session counter OK (" . $sessionCounter . ")");
|
||||
debug("Session counter OK, seen=" . $seenSessionCounter .
|
||||
" this=" . $sessionCounter);
|
||||
}
|
||||
|
||||
//// Check the session use
|
||||
//
|
||||
$sessionUse = $decoded_token["session_use"]; // From the req
|
||||
$sessionUse = $otpinfo["session_use"]; // From the req
|
||||
$seenSessionUse = $ad['sessionUse']; // From DB
|
||||
$sucDiff = $seenSessionUse - $sessionUse;
|
||||
if ($sucDiff > 0) {
|
||||
debug("Replayed session use=" . $sessionUse . ', seen=' . $seenSessionUse);
|
||||
if ($sessionCounter == $seenSessionCounter && $sessionUse <= $seenSessionUse) {
|
||||
debug("Replay, session use, seen=" . $seenSessionUse .
|
||||
' this=' . $sessionUse);
|
||||
sendResp(S_REPLAYED_OTP);
|
||||
exit;
|
||||
} else {
|
||||
debug("Session counter OK (" . $sessionCounter . ")");
|
||||
debug("Session use OK, seen=" . $seenSessionUse .
|
||||
' this=' . $sessionUse);
|
||||
}
|
||||
|
||||
updateDB($ad['id'], $otpinfo['session_counter'], $otpinfo['session_use'],
|
||||
$otpinfo['high'], $otpinfo['low']);
|
||||
|
||||
//// Check the time stamp
|
||||
//
|
||||
if ($scDiff == 0) { // Same use session, check time stamp diff
|
||||
$ts = $decoded_token['timestamp'];
|
||||
if ($sessionCounter == $seenSessionCounter && $sessionUse > $seenSessionUse) {
|
||||
$ts = $otpinfo['timestamp'];
|
||||
$seenTs = ($ad['high'] << 16) + $ad['low'];
|
||||
$tsDiff = $ts - $seenTs;
|
||||
if ($tsDiff <= 0) {
|
||||
debug("Replayed time stamp=" . $ts . ', seen=' . $seenTs);
|
||||
sendResp(S_REPLAYED_OTP);
|
||||
exit;
|
||||
} else {
|
||||
updDB($ad['id'], $decoded_token, $client);
|
||||
$tsDelta = $tsDiff * TS_SEC;
|
||||
debug("Timestamp OK (" . $ts . ") delta count=" . $tsDiff .
|
||||
'-> delta secs=' . $tsDelta);
|
||||
}
|
||||
|
||||
//// Check the real time
|
||||
//
|
||||
|
||||
if ($ad['chk_time']) {
|
||||
$lastTime = strtotime($ad['accessed']);
|
||||
debug('Last accessed: '.$ad['accessed'].', '.$lastTime.', '.date("F j, Y, g:i a", $lastTime));
|
||||
$elapsed = time() - $lastTime;
|
||||
debug('Elapsed time from last validation: ' . $elapsed . ' secs');
|
||||
$now = time();
|
||||
$elapsed = $now - $lastTime;
|
||||
$deviation = abs($elapsed - $tsDelta);
|
||||
$percent = truncate(100*$deviation/$elapsed, 8) . '%';
|
||||
debug("Key time deviation vs. elapsed time=".$deviation.' secs ('.
|
||||
$percent.')');
|
||||
$percent = round(100*$deviation/$elapsed);
|
||||
debug("Timestamp seen=" . $seenTs . " this=" . $ts .
|
||||
" delta=" . $tsDiff . ' secs=' . $tsDelta .
|
||||
' accessed=' . $lastTime .' (' . $ad['accessed'] . ') now='
|
||||
. $now . ' (' . strftime("%Y-%m-%d %H:%M:%S", $now)
|
||||
. ') elapsed=' . $elapsed .
|
||||
' deviation=' . $deviation . ' secs or '.
|
||||
$percent . '%');
|
||||
if ($deviation > TS_TOLERANCE * $elapsed) {
|
||||
debug("Is the OTP generated from a real crypto key?");
|
||||
sendResp(S_PHISHED_OTP);
|
||||
debug("OTP failed phishing test");
|
||||
if ($ad['chk_time']) {
|
||||
sendResp(S_DELAYED_OTP);
|
||||
exit;
|
||||
}
|
||||
}
|
||||
} // End check time stamp
|
||||
|
||||
//// Check the high counter
|
||||
//
|
||||
//$hi = $decoded_token["high"]; // From the req
|
||||
//$seenHi = $ad['high']; // From DB
|
||||
//$hiDiff = $seenHi - $hi;
|
||||
//if ($scDiff == 0 && $hiDiff > 0) {
|
||||
// debug("Replayed hi counter=".$hi.', seen='.$seenHi);
|
||||
// sendResp(S_REPLAYED_OTP);
|
||||
// exit;
|
||||
//} else {
|
||||
// debug("Hi counter OK (".$hi.")");
|
||||
//}
|
||||
|
||||
//// Check the low counter
|
||||
//
|
||||
//$lo = $decoded_token["low"]; // From the req
|
||||
//$seenLo = $ad['low']; // From DB
|
||||
//$loDiff = $seenLo - $lo;
|
||||
//if ($scDiff == 0 && $hiDiff == 0 && $loDiff >= 0) {
|
||||
// debug("Replayed low counter=".$lo.', seen='.$seenLo);
|
||||
// sendResp(S_REPLAYED_OTP);
|
||||
// exit;
|
||||
//} else {
|
||||
// debug("Lo counter OK (".$lo.")");
|
||||
//}
|
||||
|
||||
//// Update the DB only upon validation success
|
||||
//
|
||||
if (updDB($ad['id'], $decoded_token, $client)) {
|
||||
debug('Validation database updated');
|
||||
sendResp(S_OK);
|
||||
} else {
|
||||
debug('Failed to update validation database');
|
||||
sendResp(S_BACKEND_ERROR);
|
||||
}
|
||||
|
||||
sendResp(S_OK);
|
||||
|
||||
//////////////////////////
|
||||
// Functions
|
||||
//////////////////////////
|
||||
@ -212,21 +177,14 @@ function sendResp($status, $info = null) {
|
||||
|
||||
} // End sendResp
|
||||
|
||||
function updDB($keyid, $new, $client) {
|
||||
function updateDB($id, $session_counter, $session_use, $ts_high, $ts_low) {
|
||||
$stmt = 'UPDATE yubikeys SET ' .
|
||||
'accessed=NOW(),' .
|
||||
'counter=' . $new['session_counter'] . ',' .
|
||||
'sessionUse=' . $new['session_use'] . ',' .
|
||||
'low=' . $new['low'] . ',' .
|
||||
'high=' . $new['high'] .
|
||||
' WHERE id=' . $keyid;
|
||||
if (!query($stmt)) {
|
||||
$err = 'Failed to update validation data of key: ' . $keyid . ' by ' . $stmt;
|
||||
debug($err);
|
||||
writeLog($err);
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
'counter=' . $session_counter . ',' .
|
||||
'sessionUse=' . $session_use . ',' .
|
||||
'low=' . $ts_low . ',' .
|
||||
'high=' . $ts_high .
|
||||
' WHERE id=' . $id;
|
||||
query($stmt);
|
||||
}
|
||||
?>
|
||||
|
Loading…
Reference in New Issue
Block a user