diff --git a/src/Core/Entities/User.cs b/src/Core/Entities/User.cs index ae7435b33b..94ec645586 100644 --- a/src/Core/Entities/User.cs +++ b/src/Core/Entities/User.cs @@ -139,6 +139,11 @@ namespace Bit.Core.Entities _twoFactorProviders = providers; } + public void ClearTwoFactorProviders() + { + SetTwoFactorProviders(new Dictionary()); + } + public TwoFactorProvider GetTwoFactorProvider(TwoFactorProviderType provider) { var providers = GetTwoFactorProviders(); diff --git a/src/Core/IdentityServer/BaseRequestValidator.cs b/src/Core/IdentityServer/BaseRequestValidator.cs index 8503f78c8d..c7e1595985 100644 --- a/src/Core/IdentityServer/BaseRequestValidator.cs +++ b/src/Core/IdentityServer/BaseRequestValidator.cs @@ -94,19 +94,24 @@ namespace Bit.Core.IdentityServer return; } - var twoFactorRequirement = await RequiresTwoFactorAsync(user, request.GrantType); - if (twoFactorRequirement.Item1) + var (isTwoFactorRequired, requires2FABecauseNewDevice, twoFactorOrganization) = await RequiresTwoFactorAsync(user, request); + if (isTwoFactorRequired) { // Just defaulting it var twoFactorProviderType = TwoFactorProviderType.Authenticator; if (!twoFactorRequest || !Enum.TryParse(twoFactorProvider, out twoFactorProviderType)) { - await BuildTwoFactorResultAsync(user, twoFactorRequirement.Item2, context); + await BuildTwoFactorResultAsync(user, twoFactorOrganization, context, requires2FABecauseNewDevice); return; } - var verified = await VerifyTwoFactor(user, twoFactorRequirement.Item2, + BeforeVerifyTwoFactor(user, twoFactorProviderType, requires2FABecauseNewDevice); + + var verified = await VerifyTwoFactor(user, twoFactorOrganization, twoFactorProviderType, twoFactorToken); + + AfterVerifyTwoFactor(user, twoFactorProviderType, requires2FABecauseNewDevice); + if (!verified && twoFactorProviderType != TwoFactorProviderType.Remember) { await UpdateFailedAuthDetailsAsync(user, true, unknownDevice); @@ -117,7 +122,7 @@ namespace Bit.Core.IdentityServer { // Delay for brute force. await Task.Delay(2000); - await BuildTwoFactorResultAsync(user, twoFactorRequirement.Item2, context); + await BuildTwoFactorResultAsync(user, twoFactorOrganization, context, requires2FABecauseNewDevice); return; } } @@ -188,7 +193,7 @@ namespace Bit.Core.IdentityServer await SetSuccessResult(context, user, claims, customResponse); } - protected async Task BuildTwoFactorResultAsync(User user, Organization organization, T context) + protected async Task BuildTwoFactorResultAsync(User user, Organization organization, T context, bool requires2FABecauseNewDevice) { var providerKeys = new List(); var providers = new Dictionary>(); @@ -213,8 +218,23 @@ namespace Bit.Core.IdentityServer if (!enabledProviders.Any()) { - await BuildErrorResultAsync("No two-step providers enabled.", false, context, user); - return; + if (!requires2FABecauseNewDevice) + { + await BuildErrorResultAsync("No two-step providers enabled.", false, context, user); + return; + } + + var emailProvider = new TwoFactorProvider + { + MetaData = new Dictionary { ["Email"] = user.Email.ToLowerInvariant() }, + Enabled = true + }; + enabledProviders.Add(new KeyValuePair( + TwoFactorProviderType.Email, emailProvider)); + user.SetTwoFactorProviders(new Dictionary + { + [TwoFactorProviderType.Email] = emailProvider + }); } foreach (var provider in enabledProviders) @@ -234,7 +254,7 @@ namespace Bit.Core.IdentityServer if (enabledProviders.Count() == 1 && enabledProviders.First().Key == TwoFactorProviderType.Email) { // Send email now if this is their only 2FA method - await _userService.SendTwoFactorEmailAsync(user); + await _userService.SendTwoFactorEmailAsync(user, requires2FABecauseNewDevice); } } @@ -270,12 +290,12 @@ namespace Bit.Core.IdentityServer protected abstract void SetErrorResult(T context, Dictionary customResponse); - private async Task> RequiresTwoFactorAsync(User user, string grantType) + private async Task> RequiresTwoFactorAsync(User user, ValidatedTokenRequest request) { - if (grantType == "client_credentials") + if (request.GrantType == "client_credentials") { // Do not require MFA for api key logins - return new Tuple(false, null); + return new Tuple(false, false, null); } var individualRequired = _userManager.SupportsUserTwoFactor && @@ -297,7 +317,15 @@ namespace Bit.Core.IdentityServer } } - return new Tuple(individualRequired || firstEnabledOrg != null, firstEnabledOrg); + var requires2FA = individualRequired || firstEnabledOrg != null; + var requires2FABecauseNewDevice = !requires2FA + && user.EmailVerified + && request.GrantType != "authorization_code" + && await IsNewDeviceAndNotTheFirstOneAsync(user, request); + + requires2FA = requires2FA || requires2FABecauseNewDevice; + + return new Tuple(requires2FA, requires2FABecauseNewDevice, firstEnabledOrg); } private async Task IsValidAuthTypeAsync(User user, string grantType) @@ -375,6 +403,33 @@ namespace Bit.Core.IdentityServer }; } + private void BeforeVerifyTwoFactor(User user, TwoFactorProviderType type, bool requires2FABecauseNewDevice) + { + if (type == TwoFactorProviderType.Email + && + requires2FABecauseNewDevice) + { + user.SetTwoFactorProviders(new Dictionary + { + [TwoFactorProviderType.Email] = new TwoFactorProvider + { + MetaData = new Dictionary { ["Email"] = user.Email.ToLowerInvariant() }, + Enabled = true + } + }); + } + } + + private void AfterVerifyTwoFactor(User user, TwoFactorProviderType type, bool requires2FABecauseNewDevice) + { + if (type == TwoFactorProviderType.Email + && + requires2FABecauseNewDevice) + { + user.ClearTwoFactorProviders(); + } + } + private async Task VerifyTwoFactor(User user, Organization organization, TwoFactorProviderType type, string token) { @@ -480,6 +535,23 @@ namespace Bit.Core.IdentityServer return await _deviceRepository.GetByIdentifierAsync(GetDeviceFromRequest(request).Identifier, user.Id); } + + protected async Task IsNewDeviceAndNotTheFirstOneAsync(User user, ValidatedTokenRequest request) + { + if (user == null) + { + return default; + } + + var devices = await _deviceRepository.GetManyByUserIdAsync(user.Id); + if (!devices.Any()) + { + return false; + } + + return !devices.Any(d => d.Identifier == GetDeviceFromRequest(request)?.Identifier); + } + private async Task SaveDeviceAsync(User user, ValidatedTokenRequest request) { var device = GetDeviceFromRequest(request); diff --git a/src/Core/MailTemplates/Handlebars/NewDeviceLoginTwoFactorEmail.html.hbs b/src/Core/MailTemplates/Handlebars/NewDeviceLoginTwoFactorEmail.html.hbs new file mode 100644 index 0000000000..d44380b577 --- /dev/null +++ b/src/Core/MailTemplates/Handlebars/NewDeviceLoginTwoFactorEmail.html.hbs @@ -0,0 +1,19 @@ +{{#>FullHtmlLayout}} + + + + + + + + + + +
+ Your two-step verification code is: {{Token}} +
+ Use this code to complete logging in with Bitwarden. +
+ This email was sent because you are logging in from a device we don’t recognize. If you did not request this code, you may want to change your master password. You can view our tips for selecting a secure master password here. +
+{{/FullHtmlLayout}} diff --git a/src/Core/MailTemplates/Handlebars/NewDeviceLoginTwoFactorEmail.text.hbs b/src/Core/MailTemplates/Handlebars/NewDeviceLoginTwoFactorEmail.text.hbs new file mode 100644 index 0000000000..94a0f4a09a --- /dev/null +++ b/src/Core/MailTemplates/Handlebars/NewDeviceLoginTwoFactorEmail.text.hbs @@ -0,0 +1,7 @@ +{{#>BasicTextLayout}} +Your two-step verification code is: {{Token}} + +Use this code to complete logging in with Bitwarden. + +This email was sent because you are logging in from a device we don’t recognize. If you did not request this code, you may want to change your master password (https://bitwarden.com/help/master-password/#change-master-password). You can view our tips for selecting a secure master password here (https://bitwarden.com/blog/picking-the-right-password-for-your-password-manager/). +{{/BasicTextLayout}} \ No newline at end of file diff --git a/src/Core/Services/IMailService.cs b/src/Core/Services/IMailService.cs index 32cc3fffb8..875df10ca4 100644 --- a/src/Core/Services/IMailService.cs +++ b/src/Core/Services/IMailService.cs @@ -16,6 +16,7 @@ namespace Bit.Core.Services Task SendChangeEmailAlreadyExistsEmailAsync(string fromEmail, string toEmail); Task SendChangeEmailEmailAsync(string newEmailAddress, string token); Task SendTwoFactorEmailAsync(string email, string token); + Task SendNewDeviceLoginTwoFactorEmailAsync(string email, string token); Task SendNoMasterPasswordHintEmailAsync(string email); Task SendMasterPasswordHintEmailAsync(string email, string hint); Task SendOrganizationInviteEmailAsync(string organizationName, bool orgCanSponsor, OrganizationUser orgUser, ExpiringToken token); diff --git a/src/Core/Services/IUserService.cs b/src/Core/Services/IUserService.cs index c4b562411a..f2b2da5f9b 100644 --- a/src/Core/Services/IUserService.cs +++ b/src/Core/Services/IUserService.cs @@ -22,7 +22,7 @@ namespace Bit.Core.Services Task RegisterUserAsync(User user, string masterPassword, string token, Guid? orgUserId); Task RegisterUserAsync(User user); Task SendMasterPasswordHintAsync(string email); - Task SendTwoFactorEmailAsync(User user); + Task SendTwoFactorEmailAsync(User user, bool isBecauseNewDeviceLogin = false); Task VerifyTwoFactorEmailAsync(User user, string token); Task StartWebAuthnRegistrationAsync(User user); Task DeleteWebAuthnKeyAsync(User user, int id); diff --git a/src/Core/Services/Implementations/HandlebarsMailService.cs b/src/Core/Services/Implementations/HandlebarsMailService.cs index d75cf150d9..dca7a032b5 100644 --- a/src/Core/Services/Implementations/HandlebarsMailService.cs +++ b/src/Core/Services/Implementations/HandlebarsMailService.cs @@ -119,6 +119,21 @@ namespace Bit.Core.Services await _mailDeliveryService.SendEmailAsync(message); } + public async Task SendNewDeviceLoginTwoFactorEmailAsync(string email, string token) + { + var message = CreateDefaultMessage("New Device Login Verification Code", email); + var model = new EmailTokenViewModel + { + Token = token, + WebVaultUrl = _globalSettings.BaseServiceUri.VaultWithHash, + SiteName = _globalSettings.SiteName + }; + await AddMessageContentAsync(message, "NewDeviceLoginTwoFactorEmail", model); + message.MetaData.Add("SendGridBypassListManagement", true); + message.Category = "TwoFactorEmail"; + await _mailDeliveryService.SendEmailAsync(message); + } + public async Task SendMasterPasswordHintEmailAsync(string email, string hint) { var message = CreateDefaultMessage("Your Master Password Hint", email); diff --git a/src/Core/Services/Implementations/UserService.cs b/src/Core/Services/Implementations/UserService.cs index eaa536c01f..0401a19f50 100644 --- a/src/Core/Services/Implementations/UserService.cs +++ b/src/Core/Services/Implementations/UserService.cs @@ -346,7 +346,7 @@ namespace Bit.Core.Services await _mailService.SendMasterPasswordHintEmailAsync(email, user.MasterPasswordHint); } - public async Task SendTwoFactorEmailAsync(User user) + public async Task SendTwoFactorEmailAsync(User user, bool isBecauseNewDeviceLogin = false) { var provider = user.GetTwoFactorProvider(TwoFactorProviderType.Email); if (provider == null || provider.MetaData == null || !provider.MetaData.ContainsKey("Email")) @@ -357,7 +357,15 @@ namespace Bit.Core.Services var email = ((string)provider.MetaData["Email"]).ToLowerInvariant(); var token = await base.GenerateUserTokenAsync(user, TokenOptions.DefaultEmailProvider, "2faEmail:" + email); - await _mailService.SendTwoFactorEmailAsync(email, token); + + if (isBecauseNewDeviceLogin) + { + await _mailService.SendNewDeviceLoginTwoFactorEmailAsync(email, token); + } + else + { + await _mailService.SendTwoFactorEmailAsync(email, token); + } } public async Task VerifyTwoFactorEmailAsync(User user, string token) diff --git a/src/Core/Services/NoopImplementations/NoopMailService.cs b/src/Core/Services/NoopImplementations/NoopMailService.cs index 2eeb704656..61d99b6a70 100644 --- a/src/Core/Services/NoopImplementations/NoopMailService.cs +++ b/src/Core/Services/NoopImplementations/NoopMailService.cs @@ -75,6 +75,11 @@ namespace Bit.Core.Services return Task.FromResult(0); } + public Task SendNewDeviceLoginTwoFactorEmailAsync(string email, string token) + { + return Task.CompletedTask; + } + public Task SendWelcomeEmailAsync(User user) { return Task.FromResult(0); diff --git a/test/Core.Test/Services/UserServiceTests.cs b/test/Core.Test/Services/UserServiceTests.cs index 1a45fde14d..7237c865f0 100644 --- a/test/Core.Test/Services/UserServiceTests.cs +++ b/test/Core.Test/Services/UserServiceTests.cs @@ -3,21 +3,17 @@ using System.Collections.Generic; using System.IO; using System.Text.Json; using System.Threading.Tasks; -using Bit.Core.Context; using Bit.Core.Entities; +using Bit.Core.Enums; +using Bit.Core.Models; using Bit.Core.Models.Business; -using Bit.Core.Repositories; using Bit.Core.Services; -using Bit.Core.Settings; using Bit.Test.Common.AutoFixture; using Bit.Test.Common.AutoFixture.Attributes; using Bit.Test.Common.Helpers; -using Fido2NetLib; -using Microsoft.AspNetCore.DataProtection; using Microsoft.AspNetCore.Identity; -using Microsoft.Extensions.Logging; -using Microsoft.Extensions.Options; using NSubstitute; +using NSubstitute.ReceivedExtensions; using Xunit; namespace Bit.Core.Test.Services @@ -60,5 +56,105 @@ namespace Bit.Core.Test.Services var versionProp = AssertHelper.AssertJsonProperty(root, "Version", JsonValueKind.Number); Assert.Equal(1, versionProp.GetInt32()); } + + [Theory, CustomAutoData(typeof(SutProviderCustomization))] + public async Task SendTwoFactorEmailAsync_Success(SutProvider sutProvider, User user) + { + var email = user.Email.ToLowerInvariant(); + var token = "thisisatokentocompare"; + + var userTwoFactorTokenProvider = Substitute.For>(); + userTwoFactorTokenProvider + .CanGenerateTwoFactorTokenAsync(Arg.Any>(), user) + .Returns(Task.FromResult(true)); + userTwoFactorTokenProvider + .GenerateAsync("2faEmail:" + email, Arg.Any>(), user) + .Returns(Task.FromResult(token)); + + sutProvider.Sut.RegisterTokenProvider("Email", userTwoFactorTokenProvider); + + user.SetTwoFactorProviders(new Dictionary + { + [TwoFactorProviderType.Email] = new TwoFactorProvider + { + MetaData = new Dictionary { ["Email"] = email }, + Enabled = true + } + }); + await sutProvider.Sut.SendTwoFactorEmailAsync(user); + + await sutProvider.GetDependency() + .Received(1) + .SendTwoFactorEmailAsync(email, token); + } + + [Theory, CustomAutoData(typeof(SutProviderCustomization))] + public async Task SendTwoFactorEmailBecauseNewDeviceLoginAsync_Success(SutProvider sutProvider, User user) + { + var email = user.Email.ToLowerInvariant(); + var token = "thisisatokentocompare"; + + var userTwoFactorTokenProvider = Substitute.For>(); + userTwoFactorTokenProvider + .CanGenerateTwoFactorTokenAsync(Arg.Any>(), user) + .Returns(Task.FromResult(true)); + userTwoFactorTokenProvider + .GenerateAsync("2faEmail:" + email, Arg.Any>(), user) + .Returns(Task.FromResult(token)); + + sutProvider.Sut.RegisterTokenProvider("Email", userTwoFactorTokenProvider); + + user.SetTwoFactorProviders(new Dictionary + { + [TwoFactorProviderType.Email] = new TwoFactorProvider + { + MetaData = new Dictionary { ["Email"] = email }, + Enabled = true + } + }); + await sutProvider.Sut.SendTwoFactorEmailAsync(user, true); + + await sutProvider.GetDependency() + .Received(1) + .SendNewDeviceLoginTwoFactorEmailAsync(email, token); + } + + [Theory, CustomAutoData(typeof(SutProviderCustomization))] + public async Task SendTwoFactorEmailAsync_ExceptionBecauseNoProviderOnUser(SutProvider sutProvider, User user) + { + user.TwoFactorProviders = null; + + await Assert.ThrowsAsync("No email.", () => sutProvider.Sut.SendTwoFactorEmailAsync(user)); + } + + [Theory, CustomAutoData(typeof(SutProviderCustomization))] + public async Task SendTwoFactorEmailAsync_ExceptionBecauseNoProviderMetadataOnUser(SutProvider sutProvider, User user) + { + user.SetTwoFactorProviders(new Dictionary + { + [TwoFactorProviderType.Email] = new TwoFactorProvider + { + MetaData = null, + Enabled = true + } + }); + + await Assert.ThrowsAsync("No email.", () => sutProvider.Sut.SendTwoFactorEmailAsync(user)); + } + + [Theory, CustomAutoData(typeof(SutProviderCustomization))] + public async Task SendTwoFactorEmailAsync_ExceptionBecauseNoProviderEmailMetadataOnUser(SutProvider sutProvider, User user) + { + user.SetTwoFactorProviders(new Dictionary + { + [TwoFactorProviderType.Email] = new TwoFactorProvider + { + MetaData = new Dictionary { ["qweqwe"] = user.Email.ToLowerInvariant() }, + Enabled = true + } + }); + + await Assert.ThrowsAsync("No email.", () => sutProvider.Sut.SendTwoFactorEmailAsync(user)); + } } }