auth.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275
  1. package auth
  2. // package for authenticating websockets
  3. // we use a homespun jwt knock-off because no tls on lan
  4. // authentication adds you to the AuthenticatedClients map
  5. // broadcasts get sent to members of this map
  6. import (
  7. // "crypto/rand"
  8. "crypto/sha512"
  9. // "encoding/base64"
  10. "encoding/hex"
  11. "encoding/json"
  12. "fmt"
  13. "goseg/config"
  14. "goseg/structs"
  15. "net"
  16. "net/http"
  17. "strings"
  18. "sync"
  19. "time"
  20. "github.com/gorilla/websocket"
  21. fernet "github.com/fernet/fernet-go"
  22. )
  23. var (
  24. // maps a websocket conn to a tokenid
  25. // tokenid's can be referenced from the global conf
  26. AuthenticatedClients = struct {
  27. Conns map[string]*websocket.Conn
  28. sync.RWMutex
  29. }{
  30. Conns: make(map[string]*websocket.Conn),
  31. }
  32. UnauthClients = struct {
  33. Conns map[string]*websocket.Conn
  34. sync.RWMutex
  35. }{
  36. Conns: make(map[string]*websocket.Conn),
  37. }
  38. )
  39. // check if websocket-token pair is auth'd
  40. func WsIsAuthenticated(conn *websocket.Conn, token string) bool {
  41. AuthenticatedClients.RLock()
  42. defer AuthenticatedClients.RUnlock()
  43. if AuthenticatedClients.Conns[token] == conn {
  44. return true
  45. } else {
  46. return false
  47. }
  48. }
  49. // quick check if websocket is authed at all for unauth broadcast (not for actual auth)
  50. func WsAuthCheck(conn *websocket.Conn) bool {
  51. AuthenticatedClients.RLock()
  52. defer AuthenticatedClients.RUnlock()
  53. for _, con := range AuthenticatedClients.Conns {
  54. if con == conn {
  55. config.Logger.Info("Client in auth map")
  56. return true
  57. }
  58. }
  59. config.Logger.Info("Client not in auth map")
  60. return false
  61. }
  62. // this takes a bool for auth/unauth -- also persists to config
  63. func AddToAuthMap(conn *websocket.Conn, token map[string]string, authed bool) error {
  64. tokenStr := token["token"]
  65. tokenId := token["id"]
  66. hashed := sha512.Sum512([]byte(tokenStr))
  67. hash := hex.EncodeToString(hashed[:])
  68. if authed {
  69. AuthenticatedClients.Lock()
  70. AuthenticatedClients.Conns[tokenId] = conn
  71. AuthenticatedClients.Unlock()
  72. UnauthClients.Lock()
  73. if _, ok := UnauthClients.Conns[tokenId]; ok {
  74. delete(UnauthClients.Conns, tokenId)
  75. }
  76. UnauthClients.Unlock()
  77. } else {
  78. UnauthClients.Lock()
  79. UnauthClients.Conns[tokenId] = conn
  80. UnauthClients.Unlock()
  81. AuthenticatedClients.Lock()
  82. if _, ok := AuthenticatedClients.Conns[tokenId]; ok {
  83. delete(AuthenticatedClients.Conns, tokenId)
  84. }
  85. AuthenticatedClients.Unlock()
  86. }
  87. now := time.Now().Format("2006-01-02_15:04:05")
  88. err := AddSession(tokenId, hash, now, authed)
  89. if err != nil {
  90. return err
  91. }
  92. return nil
  93. }
  94. // check the validity of the token
  95. func CheckToken(token map[string]string, conn *websocket.Conn, r *http.Request, setup bool) bool {
  96. // great you have token. we see if valid.
  97. if token["token"] == "" {
  98. return false
  99. }
  100. config.Logger.Info(fmt.Sprintf("Checking token %s",token["id"]))
  101. conf := config.Conf()
  102. key := conf.KeyFile
  103. res, err := KeyfileDecrypt(token["token"], key)
  104. if err != nil {
  105. config.Logger.Warn("Invalid token provided")
  106. return false
  107. } else {
  108. // so you decrypt. now we see the useragent and ip.
  109. var ip string
  110. if forwarded := r.Header.Get("X-Forwarded-For"); forwarded != "" {
  111. ip = strings.Split(forwarded, ",")[0]
  112. } else {
  113. ip, _, _ = net.SplitHostPort(r.RemoteAddr)
  114. }
  115. userAgent := r.Header.Get("User-Agent")
  116. hashed := sha512.Sum512([]byte(token["token"]))
  117. hash := hex.EncodeToString(hashed[:])
  118. // you in auth map?
  119. if WsIsAuthenticated(conn, hash) {
  120. if ip == res["ip"] && userAgent == res["user_agent"] {
  121. config.Logger.Info("Token authenticated")
  122. return true
  123. } else {
  124. config.Logger.Warn("Token doesn't match session!")
  125. return false
  126. }
  127. } else {
  128. config.Logger.Warn("Token isn't an authenticated session")
  129. return false
  130. }
  131. }
  132. return false
  133. }
  134. // create a new session token
  135. func CreateToken(conn *websocket.Conn, r *http.Request, setup bool) (map[string]string, error) {
  136. // extract conn info
  137. var ip string
  138. if forwarded := r.Header.Get("X-Forwarded-For"); forwarded != "" {
  139. ip = strings.Split(forwarded, ",")[0]
  140. } else {
  141. ip, _, _ = net.SplitHostPort(r.RemoteAddr)
  142. }
  143. userAgent := r.Header.Get("User-Agent")
  144. conf := config.Conf()
  145. now := time.Now().Format("2006-01-02_15:04:05")
  146. // generate random strings for id, secret, and padding
  147. id := config.RandString(32)
  148. secret := config.RandString(128)
  149. padding := config.RandString(32)
  150. contents := map[string]string{
  151. "id": id,
  152. "ip": ip,
  153. "user_agent": userAgent,
  154. "secret": secret,
  155. "padding": padding,
  156. "authorized": fmt.Sprintf("%v", setup),
  157. "created": now,
  158. }
  159. // encrypt the contents
  160. key := conf.KeyFile
  161. encryptedText, err := KeyfileEncrypt(contents, key)
  162. if err != nil {
  163. config.Logger.Error(fmt.Sprintf("failed to encrypt token: %v", err))
  164. return nil, fmt.Errorf("failed to encrypt token: %v", err)
  165. }
  166. token := map[string]string{
  167. "id": id,
  168. "token": encryptedText,
  169. }
  170. // Update sessions in the system's configuration
  171. AddToAuthMap(conn, token, setup)
  172. return token, nil
  173. }
  174. // take session details and add to SysConfig
  175. func AddSession(tokenID string, hash string, created string, authorized bool) error {
  176. session := structs.SessionInfo{
  177. Hash: hash,
  178. Created: created,
  179. }
  180. if authorized {
  181. update := map[string]interface{}{
  182. "Sessions": map[string]interface{}{
  183. "Authorized": map[string]structs.SessionInfo{
  184. tokenID: session,
  185. },
  186. },
  187. }
  188. if err := config.UpdateConf(update); err != nil {
  189. return fmt.Errorf("Error adding session: %v", err)
  190. }
  191. if err := config.RemoveSession(tokenID, false); err != nil {
  192. return fmt.Errorf("Error removing session: %v", err)
  193. }
  194. } else {
  195. update := map[string]interface{}{
  196. "Sessions": map[string]interface{}{
  197. "Unauthorized": map[string]structs.SessionInfo{
  198. tokenID: session,
  199. },
  200. },
  201. }
  202. if err := config.UpdateConf(update); err != nil {
  203. return fmt.Errorf("Error adding session: %v", err)
  204. }
  205. if err := config.RemoveSession(tokenID, true); err != nil {
  206. return fmt.Errorf("Error removing session: %v", err)
  207. }
  208. }
  209. return nil
  210. }
  211. // encrypt the contents using stored keyfile val
  212. func KeyfileEncrypt(contents map[string]string, keyStr string) (string, error) {
  213. contentBytes, err := json.Marshal(contents)
  214. if err != nil {
  215. return "", err
  216. }
  217. key, err := fernet.DecodeKey(keyStr)
  218. if err != nil {
  219. return "", err
  220. }
  221. tok, err := fernet.EncryptAndSign(contentBytes, key)
  222. if err != nil {
  223. return "", err
  224. }
  225. return string(tok), nil
  226. }
  227. func KeyfileDecrypt(tokenStr string, keyStr string) (map[string]string, error) {
  228. key, err := fernet.DecodeKey(keyStr)
  229. if err != nil {
  230. return nil, err
  231. }
  232. decrypted := fernet.VerifyAndDecrypt([]byte(tokenStr), 60*time.Second, []*fernet.Key{key})
  233. if decrypted == nil {
  234. return nil, fmt.Errorf("verification or decryption failed")
  235. }
  236. var contents map[string]string
  237. err = json.Unmarshal(decrypted, &contents)
  238. if err != nil {
  239. return nil, err
  240. }
  241. return contents, nil
  242. }
  243. // salted sha512
  244. func Hasher(password string) string {
  245. conf := config.Conf()
  246. salt := conf.Salt
  247. toHash := salt + password
  248. res := sha512.Sum512([]byte(toHash))
  249. return hex.EncodeToString(res[:])
  250. }
  251. // check if pw matches sysconfig
  252. func AuthenticateLogin(password string) bool {
  253. conf := config.Conf()
  254. hash := Hasher(password)
  255. if hash == conf.PwHash {
  256. return true
  257. } else {
  258. config.Logger.Warn(fmt.Sprintf("debug: failed pw hash: %v", hash))
  259. return false
  260. }
  261. }