. * * @category Plugin * @package GNUsocial * @author Mikael Nordfeldth * @copyright 2012 StatusNet, Inc. * @copyright 2013 Free Software Foundation, Inc http://www.fsf.org * @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0 * @link http://www.gnu.org/software/social/ */ if (!defined('GNUSOCIAL')) { exit(1); } class AuthCryptPlugin extends AuthenticationPlugin { const PLUGIN_VERSION = '2.0.0'; protected $hash = '$6$'; // defaults to SHA512, i.e. '$6$', in onInitializePlugin() protected $statusnet = true; // if true, also check StatusNet style password hash protected $overwrite = true; // if true, password change means overwrite with crypt() public $provider_name = 'password_hash'; // not actually used /* * FUNCTIONALITY */ function checkPassword($username, $password) { $username = Nickname::normalize($username); $user = User::getKV('nickname', $username); if (!($user instanceof User)) { return false; } // Timing safe password verification on supported PHP versions if (function_exists('password_verify')) { if (password_verify($password, $user->password)) { return $user; } } // crypt understands what the salt part of $user->password is if ($user->password === crypt($password, $user->password)) { // and update password hash entry to password_hash() compatible if ($this->overwrite && function_exists('password_hash')) { $this->changePassword($user->nickname, null, $password); } return $user; } // If we check StatusNet hash, for backwards compatibility and migration if ($this->statusnet && $user->password === md5($password . $user->id)) { // and update password hash entry to crypt() compatible if ($this->overwrite && function_exists('password_hash')) { $this->changePassword($user->nickname, null, $password); } return $user; } return false; } protected function cryptSalt($len=CRYPT_SALT_LENGTH) { $chars = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; $salt = ''; for ($i=0; $i<$len; $i++) { $salt .= $chars{mt_rand(0, strlen($chars)-1)}; } return $salt; } // $oldpassword is already verified when calling this function... shouldn't this be private?! function changePassword($username, $oldpassword, $newpassword) { $username = Nickname::normalize($username); if (!$this->password_changeable) { return false; } $user = User::getKV('nickname', $username); if (empty($user)) { return false; } $original = clone($user); $user->password = $this->hashPassword($newpassword, $user->getProfile()); return (true === $user->validate() && $user->update($original)); } public function hashPassword($password, Profile $profile=null) { if(function_exists('password_hash')) { // Use the modern password hashing algorithm // http://php.net/manual/en/function.password-hash.php // Uses PASSWORD_BCRYPT by default, with PASSWORD_ARGON2I being the next possible default in future versions return password_hash($password, PASSWORD_DEFAULT); } else { // Fallback to previous hashing function if phpversion() < 5.5 // A new, unique salt per new record stored... return crypt($password, $this->hash . self::cryptSalt()); } } /* * EVENTS */ public function onStartChangePassword(Profile $target, $oldpassword, $newpassword) { if (!$this->checkPassword($target->getNickname(), $oldpassword)) { // if we ARE in overwrite mode, test password with common_check_user if (!$this->overwrite || !common_check_user($target->getNickname(), $oldpassword)) { // either we're not in overwrite mode, or the password was incorrect return !$this->authoritative; } // oldpassword was apparently ok } $changed = $this->changePassword($target->getNickname(), $oldpassword, $newpassword); return (!$changed && empty($this->authoritative)); } public function onStartCheckPassword($nickname, $password, &$authenticatedUser) { $authenticatedUser = $this->checkPassword($nickname, $password); // if we failed, only return false to stop plugin execution if we're authoritative return (!($authenticatedUser instanceof User) && empty($this->authoritative)); } public function onStartHashPassword(&$hashed, $password, Profile $profile=null) { $hashed = $this->hashPassword($password, $profile); return false; } public function onCheckSchema() { // we only use the User database, so default AuthenticationPlugin stuff can be ignored return true; } public function onUserDeleteRelated($user, &$tables) { // not using User_username table, so no need to add it here. return true; } public function onPluginVersion(array &$versions) { $versions[] = array('name' => 'AuthCrypt', 'version' => self::PLUGIN_VERSION, 'author' => 'Mikael Nordfeldth', 'homepage' => 'https://git.gnu.io/gnu/gnu-social/tree/master/plugins/AuthCrypt', 'rawdescription' => // TRANS: Plugin description. _m('Authentication and password hashing with crypt()')); return true; } }