mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 06:21:11 +00:00 
			
		
		
		
	[v1.21] [GITEA] rework long-term authentication
- The current architecture is inherently insecure, because you can construct the 'secret' cookie value with values that are available in the database. Thus provides zero protection when a database is dumped/leaked. - This patch implements a new architecture that's inspired from: [Paragonie Initiative](https://paragonie.com/blog/2015/04/secure-authentication-php-with-long-term-persistence#secure-remember-me-cookies). - Integration testing is added to ensure the new mechanism works. - Removes a setting, because it's not used anymore. (cherry picked from commiteff097448b) [GITEA] rework long-term authentication (squash) add migration Reminder: the migration is run via integration tests as explained in the commit "[DB] run all Forgejo migrations in integration tests" (cherry picked from commit4accf7443c) (cherry picked from commit 99d06e344ebc3b50bafb2ac4473dd95f057d1ddc) (cherry picked from commitd8bc98a8f0) (cherry picked from commit6404845df9)
This commit is contained in:
		
					parent
					
						
							
								0c409950f1
							
						
					
				
			
			
				commit
				
					
						72bdd4f3b9
					
				
			
		
					 17 changed files with 365 additions and 154 deletions
				
			
		|  | @ -4,16 +4,14 @@ | |||
| package context | ||||
| 
 | ||||
| import ( | ||||
| 	"crypto/sha256" | ||||
| 	"encoding/hex" | ||||
| 	"net/http" | ||||
| 	"strings" | ||||
| 
 | ||||
| 	auth_model "code.gitea.io/gitea/models/auth" | ||||
| 	user_model "code.gitea.io/gitea/models/user" | ||||
| 	"code.gitea.io/gitea/modules/setting" | ||||
| 	"code.gitea.io/gitea/modules/util" | ||||
| 	"code.gitea.io/gitea/modules/timeutil" | ||||
| 	"code.gitea.io/gitea/modules/web/middleware" | ||||
| 
 | ||||
| 	"golang.org/x/crypto/pbkdf2" | ||||
| ) | ||||
| 
 | ||||
| const CookieNameFlash = "gitea_flash" | ||||
|  | @ -46,41 +44,13 @@ func (ctx *Context) GetSiteCookie(name string) string { | |||
| 	return middleware.GetSiteCookie(ctx.Req, name) | ||||
| } | ||||
| 
 | ||||
| // GetSuperSecureCookie returns given cookie value from request header with secret string. | ||||
| func (ctx *Context) GetSuperSecureCookie(secret, name string) (string, bool) { | ||||
| 	val := ctx.GetSiteCookie(name) | ||||
| 	return ctx.CookieDecrypt(secret, val) | ||||
| } | ||||
| 
 | ||||
| // CookieDecrypt returns given value from with secret string. | ||||
| func (ctx *Context) CookieDecrypt(secret, val string) (string, bool) { | ||||
| 	if val == "" { | ||||
| 		return "", false | ||||
| 	} | ||||
| 
 | ||||
| 	text, err := hex.DecodeString(val) | ||||
| // SetLTACookie will generate a LTA token and add it as an cookie. | ||||
| func (ctx *Context) SetLTACookie(u *user_model.User) error { | ||||
| 	days := 86400 * setting.LogInRememberDays | ||||
| 	lookup, validator, err := auth_model.GenerateAuthToken(ctx, u.ID, timeutil.TimeStampNow().Add(int64(days))) | ||||
| 	if err != nil { | ||||
| 		return "", false | ||||
| 		return err | ||||
| 	} | ||||
| 
 | ||||
| 	key := pbkdf2.Key([]byte(secret), []byte(secret), 1000, 16, sha256.New) | ||||
| 	text, err = util.AESGCMDecrypt(key, text) | ||||
| 	return string(text), err == nil | ||||
| } | ||||
| 
 | ||||
| // SetSuperSecureCookie sets given cookie value to response header with secret string. | ||||
| func (ctx *Context) SetSuperSecureCookie(secret, name, value string, maxAge int) { | ||||
| 	text := ctx.CookieEncrypt(secret, value) | ||||
| 	ctx.SetSiteCookie(name, text, maxAge) | ||||
| } | ||||
| 
 | ||||
| // CookieEncrypt encrypts a given value using the provided secret | ||||
| func (ctx *Context) CookieEncrypt(secret, value string) string { | ||||
| 	key := pbkdf2.Key([]byte(secret), []byte(secret), 1000, 16, sha256.New) | ||||
| 	text, err := util.AESGCMEncrypt(key, []byte(value)) | ||||
| 	if err != nil { | ||||
| 		panic("error encrypting cookie: " + err.Error()) | ||||
| 	} | ||||
| 
 | ||||
| 	return hex.EncodeToString(text) | ||||
| 	ctx.SetSiteCookie(setting.CookieRememberName, lookup+":"+validator, days) | ||||
| 	return nil | ||||
| } | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue