diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c indefero/src/IDF/Form/UserAccount.php --- a/indefero/src/IDF/Form/UserAccount.php Sat Aug 03 23:08:28 2013 -0500 +++ b/indefero/src/IDF/Form/UserAccount.php Sat Aug 10 20:58:59 2013 -0500 @@ -172,8 +172,25 @@ 'initial' => '', 'help_text' => __('You will get an email to confirm that you own the address you specify.'), )); + $otp = ""; + if ($user_data->otpkey != "") + $otp = Pluf_Utils::convBase($this->user->otpkey, '0123456789abcdef', 'abcdefghijklmnopqrstuvwxyz234567'); + $this->fields['otpkey'] = new Pluf_Form_Field_Varchar( + array('required' => false, + 'label' => __('Add a OTP Key'), + //'initial' => (!empty($user_data->otpkey)) ? : "", + //'initial' => (string)(!empty($user_data->otpkey)), + 'initial' => $otp, + 'help_text' => __('Key must be in base32 for generated QRcode and import into Google Authenticator.'), + 'widget_attrs' => array( + 'maxlength' => 50, + 'size' => 32, + ), + )); } + + private function send_validation_mail($new_email, $secondary_mail=false) { if ($secondary_mail) { @@ -243,6 +260,8 @@ } if ($commit) { + if ($this->cleaned_data["otpkey"] != "") + $this->user->otpkey = Pluf_Utils::convBase($this->cleaned_data["otpkey"], 'abcdefghijklmnopqrstuvwxyz234567', '0123456789abcdef'); $this->user->update(); // FIXME: go the extra mile and check the input lengths for diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c indefero/src/IDF/Plugin/SyncMercurial.php --- a/indefero/src/IDF/Plugin/SyncMercurial.php Sat Aug 03 23:08:28 2013 -0500 +++ b/indefero/src/IDF/Plugin/SyncMercurial.php Sat Aug 10 20:58:59 2013 -0500 @@ -231,6 +231,8 @@ $fcontent .= 'shortname).'>'."\n"; $fcontent .= 'AuthType Basic'."\n"; $fcontent .= 'AuthName "Restricted"'."\n"; + $fcontent .= 'AuthExternal otpauth\n'; + $fcontent .= 'AuthBasicProvider external\n'; $fcontent .= sprintf('AuthUserFile %s', Pluf::f('idf_plugin_syncmercurial_passwd_file'))."\n"; $fcontent .= sprintf('Require user %s', $user)."\n"; $fcontent .= ''."\n\n"; diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c indefero/src/IDF/templates/idf/user/myaccount.html --- a/indefero/src/IDF/templates/idf/user/myaccount.html Sat Aug 03 23:08:28 2013 -0500 +++ b/indefero/src/IDF/templates/idf/user/myaccount.html Sat Aug 10 20:58:59 2013 -0500 @@ -100,6 +100,16 @@ {$form.f.public_key.help_text} + + {$form.f.otpkey.labelTag}: + {if $form.f.otpkey.errors}{$form.f.otpkey.fieldErrors}{/if} + {$form.f.otpkey|unsafe} Generate
+ {$form.f.otpkey.help_text} +
+
+
+ + {trans "Secondary Emails"} {$form.f.secondary_mail.labelTag}: @@ -153,8 +163,10 @@

{trans 'The extra password is used to access some of the external systems and the API key is used to interact with this website using a program.'}

{/block} -{block javascript} {/block} diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c pluf/src/Pluf/User.php --- a/pluf/src/Pluf/User.php Sat Aug 03 23:08:28 2013 -0500 +++ b/pluf/src/Pluf/User.php Sat Aug 10 20:58:59 2013 -0500 @@ -21,6 +21,8 @@ # # ***** END LICENSE BLOCK ***** */ +require_once dirname(__FILE__).'/thirdparty/otp/otphp.php'; + /** * User Model. */ @@ -155,6 +157,14 @@ 'verbose' => __('last login'), 'editable' => false, ), + 'otpkey' => + array( + 'type' => 'Pluf_DB_Field_Varchar', + 'blank' => true, + 'size' => 50, + 'verbose' => __('OTP Key for user'), + 'help_text' => __('OTP Key used for authentication against repos.') + ), ); $this->_a['idx'] = array( 'login_idx' => @@ -237,9 +247,7 @@ { //$salt = Pluf_Utils::getRandomString(5); //$this->password = 'sha1:'.$salt.':'.sha1($salt.$password); - //$this->password = sha1($password); - //file_put_contents("/tmp/test", $password); - $this->password = base64_encode(sha1($password, TRUE)); + $this->password = base64_encode(sha1($password, TRUE)); return true; } @@ -254,10 +262,24 @@ if ($this->password == '') { return false; } - if ($this->password == base64_encode(sha1($password, TRUE))) - return true; - else - return false; + if ($this->otpkey == "") + { + if ($this->password == base64_encode(sha1($password, TRUE))) + return true; + else + return false; + } else { + $otp = substr($password, 0, 6); + $pass = substr($password, 6); + $totp = new \OTPHP\TOTP(strtoupper($this->otpkey)); + if ($totp->verify($otp) && $this->password == base64_encode(sha1($pass, TRUE))) + { + return true; + } else { + return false; + } + + } /*list($algo, $salt, $hash) = explode(':', $this->password); if ($hash == $algo($salt.$password)) { return true; diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c pluf/src/Pluf/Utils.php --- a/pluf/src/Pluf/Utils.php Sat Aug 03 23:08:28 2013 -0500 +++ b/pluf/src/Pluf/Utils.php Sat Aug 10 20:58:59 2013 -0500 @@ -71,6 +71,37 @@ return $string; } + static public function convBase($numberInput, $fromBaseInput, $toBaseInput) + { + if ($fromBaseInput==$toBaseInput) return $numberInput; + $fromBase = str_split($fromBaseInput,1); + $toBase = str_split($toBaseInput,1); + $number = str_split($numberInput,1); + $fromLen=strlen($fromBaseInput); + $toLen=strlen($toBaseInput); + $numberLen=strlen($numberInput); + $retval=''; + if ($toBaseInput == '0123456789') + { + $retval=0; + for ($i = 1;$i <= $numberLen; $i++) + $retval = bcadd($retval, bcmul(array_search($number[$i-1], $fromBase),bcpow($fromLen,$numberLen-$i))); + return $retval; + } + if ($fromBaseInput != '0123456789') + $base10=Pluf_Utils::convBase($numberInput, $fromBaseInput, '0123456789'); + else + $base10 = $numberInput; + if ($base10generateOTP($count); + } + + + /** + * Verify if a password is valid for a specific counter value + * + * @param integer $otp the one-time password + * @param integer $counter the counter value + * @return bool true if the counter is valid, false otherwise + */ + public function verify($otp, $counter) { + return ($otp == $this->at($counter)); + } + + /** + * Returns the uri for a specific secret for hotp method. + * Can be encoded as a image for simple configuration in + * Google Authenticator. + * + * @param string $name the name of the account / profile + * @param integer $initial_count the initial counter + * @return string the uri for the hmac secret + */ + public function provisioning_uri($name, $initial_count) { + return "otpauth://hotp/".urlencode($name)."?secret={$this->secret}&counter=$initial_count"; + } + } + +} \ No newline at end of file diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c pluf/src/Pluf/thirdparty/otp/otp.php --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/pluf/src/Pluf/thirdparty/otp/otp.php Sat Aug 10 20:58:59 2013 -0500 @@ -0,0 +1,120 @@ +digits = isset($opt['digits']) ? $opt['digits'] : 6; + $this->digest = isset($opt['digest']) ? $opt['digest'] : 'sha1'; + $this->secret = $secret; + } + + /** + * Generate a one-time password + * + * @param integer $input : number used to seed the hmac hash function. + * This number is usually a counter (HOTP) or calculated based on the current + * timestamp (see TOTP class). + * @return integer the one-time password + */ + public function generateOTP($input) { + $hash = hash_hmac($this->digest, $this->intToBytestring($input), $this->byteSecret()); + foreach(str_split($hash, 2) as $hex) { // stupid PHP has bin2hex but no hex2bin WTF + $hmac[] = hexdec($hex); + } + $offset = $hmac[19] & 0xf; + $code = ($hmac[$offset+0] & 0x7F) << 24 | + ($hmac[$offset + 1] & 0xFF) << 16 | + ($hmac[$offset + 2] & 0xFF) << 8 | + ($hmac[$offset + 3] & 0xFF); + return $code % pow(10, $this->digits); + } + + /** + * Returns the binary value of the base32 encoded secret + * @access private + * This method should be private but was left public for + * phpunit tests to work. + * @return binary secret key + */ + public function byteSecret() { + return \Base32::decode($this->secret); + } + + /** + * Turns an integer in a OATH bytestring + * @param integer $int + * @access private + * @return string bytestring + */ + public function intToBytestring($int) { + $result = Array(); + while($int != 0) { + $result[] = chr($int & 0xFF); + $int >>= 8; + } + return str_pad(join(array_reverse($result)), 8, "\000", STR_PAD_LEFT); + } + } +} \ No newline at end of file diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c pluf/src/Pluf/thirdparty/otp/otphp.php --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/pluf/src/Pluf/thirdparty/otp/otphp.php Sat Aug 10 20:58:59 2013 -0500 @@ -0,0 +1,26 @@ +interval = isset($opt['interval']) ? $opt['interval'] : 30; + parent::__construct($s, $opt); + } + + /** + * Get the password for a specific timestamp value + * + * @param integer $timestamp the timestamp which is timecoded and + * used to seed the hmac hash function. + * @return integer the One Time Password + */ + public function at($timestamp) { + return $this->generateOTP($this->timecode($timestamp)); + } + + /** + * Get the password for the current timestamp value + * + * @return integer the current One Time Password + */ + public function now() { + return $this->generateOTP($this->timecode(time())); + } + + /** + * Verify if a password is valid for a specific counter value + * + * @param integer $otp the one-time password + * @param integer $timestamp the timestamp for the a given time, defaults to current time. + * @return bool true if the counter is valid, false otherwise + */ + public function verify($otp, $timestamp = null) { + if($timestamp === null) + $timestamp = time(); + return ($otp == $this->at($timestamp)); + } + + /** + * Returns the uri for a specific secret for totp method. + * Can be encoded as a image for simple configuration in + * Google Authenticator. + * + * @param string $name the name of the account / profile + * @return string the uri for the hmac secret + */ + public function provisioning_uri($name) { + return "otpauth://totp/".urlencode($name)."?secret={$this->secret}"; + } + + /** + * Transform a timestamp in a counter based on specified internal + * + * @param integer $timestamp + * @return integer the timecode + */ + protected function timecode($timestamp) { + return (int)( (((int)$timestamp * 1000) / ($this->interval * 1000))); + } + } + +} \ No newline at end of file diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c pluf/src/Pluf/thirdparty/otp/vendor/base32.php --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/pluf/src/Pluf/thirdparty/otp/vendor/base32.php Sat Aug 10 20:58:59 2013 -0500 @@ -0,0 +1,82 @@ +'0', 'B'=>'1', 'C'=>'2', 'D'=>'3', 'E'=>'4', 'F'=>'5', 'G'=>'6', 'H'=>'7', + 'I'=>'8', 'J'=>'9', 'K'=>'10', 'L'=>'11', 'M'=>'12', 'N'=>'13', 'O'=>'14', 'P'=>'15', + 'Q'=>'16', 'R'=>'17', 'S'=>'18', 'T'=>'19', 'U'=>'20', 'V'=>'21', 'W'=>'22', 'X'=>'23', + 'Y'=>'24', 'Z'=>'25', '2'=>'26', '3'=>'27', '4'=>'28', '5'=>'29', '6'=>'30', '7'=>'31' + ); + + /** + * Use padding false when encoding for urls + * + * @return base32 encoded string + * @author Bryan Ruiz + **/ + public static function encode($input, $padding = true) { + if(empty($input)) return ""; + $input = str_split($input); + $binaryString = ""; + for($i = 0; $i < count($input); $i++) { + $binaryString .= str_pad(base_convert(ord($input[$i]), 10, 2), 8, '0', STR_PAD_LEFT); + } + $fiveBitBinaryArray = str_split($binaryString, 5); + $base32 = ""; + $i=0; + while($i < count($fiveBitBinaryArray)) { + $base32 .= self::$map[base_convert(str_pad($fiveBitBinaryArray[$i], 5,'0'), 2, 10)]; + $i++; + } + if($padding && ($x = strlen($binaryString) % 40) != 0) { + if($x == 8) $base32 .= str_repeat(self::$map[32], 6); + else if($x == 16) $base32 .= str_repeat(self::$map[32], 4); + else if($x == 24) $base32 .= str_repeat(self::$map[32], 3); + else if($x == 32) $base32 .= self::$map[32]; + } + return $base32; + } + + public static function decode($input) { + if(empty($input)) return; + $paddingCharCount = substr_count($input, self::$map[32]); + $allowedValues = array(6,4,3,1,0); + if(!in_array($paddingCharCount, $allowedValues)) return false; + for($i=0; $i<4; $i++){ + if($paddingCharCount == $allowedValues[$i] && + substr($input, -($allowedValues[$i])) != str_repeat(self::$map[32], $allowedValues[$i])) return false; + } + $input = str_replace('=','', $input); + $input = str_split($input); + $binaryString = ""; + for($i=0; $i < count($input); $i = $i+8) { + $x = ""; + if(!in_array($input[$i], self::$map)) return false; + for($j=0; $j < 8; $j++) { + $x .= str_pad(base_convert(@self::$flippedMap[@$input[$i + $j]], 10, 2), 5, '0', STR_PAD_LEFT); + } + $eightBits = str_split($x, 8); + for($z = 0; $z < count($eightBits); $z++) { + $binaryString .= ( ($y = chr(base_convert($eightBits[$z], 2, 10))) || ord($y) == 48 ) ? $y:""; + } + } + return $binaryString; + } +} diff -r 306cb72cc05a0f494f3038d407a00016b475e3bc -r 41511e0127d97a0a2992a15858f25eb9ee10a01c pluf/src/Pluf/thirdparty/otp/vendor/libs.php --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/pluf/src/Pluf/thirdparty/otp/vendor/libs.php Sat Aug 10 20:58:59 2013 -0500 @@ -0,0 +1,26 @@ +