host = $host; $host->add_hook($host::HOOK_AUTH_USER, $this); } function authenticate($login, $password, $service = '') { $otp = (int) ($_REQUEST["otp"] ?? 0); // don't bother with null/null logins for auth_external etc if ($login && get_schema_version() > 96) { $user_id = UserHelper::find_user_by_login($login); if ($user_id && UserHelper::is_otp_enabled($user_id)) { // only allow app passwords for service logins if OTP is enabled if ($service && get_schema_version() > 138) { return $this->check_app_password($login, $password, $service); } if ($otp) { /*$base32 = new \OTPHP\Base32(); $secret = $base32->encode(mb_substr(sha1($row["salt"]), 0, 12), false); $secret_legacy = $base32->encode(sha1($row["salt"])); $totp = new \OTPHP\TOTP($secret); $otp_check = $totp->now(); $totp_legacy = new \OTPHP\TOTP($secret_legacy); $otp_check_legacy = $totp_legacy->now(); if ($otp !== $otp_check && $otp !== $otp_check_legacy) { return false; } */ if ($this->check_password($user_id, $password) && UserHelper::check_otp($user_id, $otp)) return $user_id; else return false; } else { $return = urlencode($_REQUEST["return"]); ?> Tiny Tiny RSS

138) { $user_id = $this->check_app_password($login, $password, $service); if ($user_id) return $user_id; } if ($login) { $try_user_id = $this->find_user_by_login($login); if ($try_user_id) { return $this->check_password($try_user_id, $password); } } return false; } function check_password(int $owner_uid, string $password, string $service = '') { $user = ORM::for_table('ttrss_users')->find_one($owner_uid); if ($user) { // don't throttle app passwords if (!$service && get_schema_version() >= 145) { if ($user->last_auth_attempt) { $last_auth_attempt = strtotime($user->last_auth_attempt); if ($last_auth_attempt && time() - $last_auth_attempt < Config::get(Config::AUTH_MIN_INTERVAL)) { Logger::log(E_USER_NOTICE, "Too many authentication attempts for {$user->login}, throttled."); // start an empty session to deliver login error message if (session_status() != PHP_SESSION_ACTIVE) session_start(); $_SESSION["login_error_msg"] = __("Too many authentication attempts, throttled."); $user->last_auth_attempt = Db::NOW(); $user->save(); return false; } } $user->last_auth_attempt = Db::NOW(); $user->save(); } $salt = $user['salt'] ?? ""; $login = $user['login']; $pwd_hash = $user['pwd_hash']; list ($pwd_algo, $raw_hash) = explode(":", $pwd_hash, 2); // check app password only if service is specified if ($service && get_schema_version() > 138) { return $this->check_app_password($login, $password, $service); } $test_hash = UserHelper::hash_password($password, $salt, $pwd_algo); if (hash_equals($pwd_hash, $test_hash)) { if ($pwd_algo != UserHelper::HASH_ALGOS[0]) { Logger::log(E_USER_NOTICE, "Upgrading password of user $login to " . UserHelper::HASH_ALGOS[0]); $new_hash = UserHelper::hash_password($password, $salt, UserHelper::HASH_ALGOS[0]); if ($new_hash) { $usth = $this->pdo->prepare("UPDATE ttrss_users SET pwd_hash = ? WHERE id = ?"); $usth->execute([$new_hash, $owner_uid]); } } return $owner_uid; } } return false; } function change_password($owner_uid, $old_password, $new_password) { if ($this->check_password($owner_uid, $old_password)) { $new_salt = UserHelper::get_salt(); $new_password_hash = UserHelper::hash_password($new_password, $new_salt, UserHelper::HASH_ALGOS[0]); $user = ORM::for_table('ttrss_users')->find_one($owner_uid); $user->salt = $new_salt; $user->pwd_hash = $new_password_hash; $user->save(); if ($_SESSION["uid"] ?? 0 == $owner_uid) $_SESSION["pwd_hash"] = $new_password_hash; if ($user->email) { $mailer = new Mailer(); $tpl = new Templator(); $tpl->readTemplateFromFile("password_change_template.txt"); $tpl->setVariable('LOGIN', $user->login); $tpl->setVariable('TTRSS_HOST', Config::get(Config::SELF_URL_PATH)); $tpl->addBlock('message'); $tpl->generateOutputToString($message); $mailer->mail(["to_name" => $user->login, "to_address" => $user->email, "subject" => "[tt-rss] Password change notification", "message" => $message]); } return __("Password has been changed."); } else { return "ERROR: ".__('Old password is incorrect.'); } } private function check_app_password($login, $password, $service) { $sth = $this->pdo->prepare("SELECT p.id, p.pwd_hash, u.id AS uid FROM ttrss_app_passwords p, ttrss_users u WHERE p.owner_uid = u.id AND LOWER(u.login) = LOWER(?) AND service = ?"); $sth->execute([$login, $service]); while ($row = $sth->fetch()) { list ($pwd_algo, $raw_hash, $salt) = explode(":", $row["pwd_hash"]); $test_hash = UserHelper::hash_password($password, $salt, $pwd_algo); if (hash_equals("$pwd_algo:$raw_hash", $test_hash)) { $pass = ORM::for_table('ttrss_app_passwords')->find_one($row["id"]); $pass->last_used = Db::NOW(); if ($pwd_algo != UserHelper::HASH_ALGOS[0]) { // upgrade password to current algo Logger::log(E_USER_NOTICE, "Upgrading app password of user $login to " . UserHelper::HASH_ALGOS[0]); $new_hash = UserHelper::hash_password($password, $salt); if ($new_hash) { $pass->pwd_hash = "$new_hash:$salt"; } } $pass->save(); return $row['uid']; } } return false; } function api_version() { return 2; } }