mirror of
https://github.com/bitwarden/server.git
synced 2025-04-05 21:18:13 -05:00
U2F (#1304)
* Delete U2F tokens alongside WebAuthn * Bring back u2f apis
This commit is contained in:
parent
f0baf7e6a4
commit
ce4f025a0c
@ -220,6 +220,48 @@ namespace Bit.Api.Controllers
|
|||||||
return response;
|
return response;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
[HttpPost("get-u2f")]
|
||||||
|
public async Task<TwoFactorU2fResponseModel> GetU2f([FromBody]TwoFactorRequestModel model)
|
||||||
|
{
|
||||||
|
var user = await CheckAsync(model.MasterPasswordHash, true);
|
||||||
|
var response = new TwoFactorU2fResponseModel(user);
|
||||||
|
return response;
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPost("get-u2f-challenge")]
|
||||||
|
public async Task<TwoFactorU2fResponseModel.ChallengeModel> GetU2fChallenge(
|
||||||
|
[FromBody]TwoFactorRequestModel model)
|
||||||
|
{
|
||||||
|
var user = await CheckAsync(model.MasterPasswordHash, true);
|
||||||
|
var reg = await _userService.StartU2fRegistrationAsync(user);
|
||||||
|
var challenge = new TwoFactorU2fResponseModel.ChallengeModel(user, reg);
|
||||||
|
return challenge;
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpPut("u2f")]
|
||||||
|
[HttpPost("u2f")]
|
||||||
|
public async Task<TwoFactorU2fResponseModel> PutU2f([FromBody]TwoFactorU2fRequestModel model)
|
||||||
|
{
|
||||||
|
var user = await CheckAsync(model.MasterPasswordHash, true);
|
||||||
|
var success = await _userService.CompleteU2fRegistrationAsync(
|
||||||
|
user, model.Id.Value, model.Name, model.DeviceResponse);
|
||||||
|
if (!success)
|
||||||
|
{
|
||||||
|
throw new BadRequestException("Unable to complete U2F key registration.");
|
||||||
|
}
|
||||||
|
var response = new TwoFactorU2fResponseModel(user);
|
||||||
|
return response;
|
||||||
|
}
|
||||||
|
|
||||||
|
[HttpDelete("u2f")]
|
||||||
|
public async Task<TwoFactorU2fResponseModel> DeleteU2f([FromBody]TwoFactorU2fDeleteRequestModel model)
|
||||||
|
{
|
||||||
|
var user = await CheckAsync(model.MasterPasswordHash, true);
|
||||||
|
await _userService.DeleteU2fKeyAsync(user, model.Id.Value);
|
||||||
|
var response = new TwoFactorU2fResponseModel(user);
|
||||||
|
return response;
|
||||||
|
}
|
||||||
|
|
||||||
[HttpPost("get-webauthn")]
|
[HttpPost("get-webauthn")]
|
||||||
public async Task<TwoFactorWebAuthnResponseModel> GetWebAuthn([FromBody]TwoFactorRequestModel model)
|
public async Task<TwoFactorWebAuthnResponseModel> GetWebAuthn([FromBody]TwoFactorRequestModel model)
|
||||||
{
|
{
|
||||||
|
@ -224,6 +224,27 @@ namespace Bit.Core.Models.Api
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public class TwoFactorU2fRequestModel : TwoFactorU2fDeleteRequestModel
|
||||||
|
{
|
||||||
|
[Required]
|
||||||
|
public string DeviceResponse { get; set; }
|
||||||
|
public string Name { get; set; }
|
||||||
|
}
|
||||||
|
|
||||||
|
public class TwoFactorU2fDeleteRequestModel : TwoFactorRequestModel, IValidatableObject
|
||||||
|
{
|
||||||
|
[Required]
|
||||||
|
public int? Id { get; set; }
|
||||||
|
|
||||||
|
public IEnumerable<ValidationResult> Validate(ValidationContext validationContext)
|
||||||
|
{
|
||||||
|
if (!Id.HasValue || Id < 0 || Id > 5)
|
||||||
|
{
|
||||||
|
yield return new ValidationResult("Invalid Key Id", new string[] { nameof(Id) });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
public class TwoFactorWebAuthnRequestModel : TwoFactorWebAuthnDeleteRequestModel
|
public class TwoFactorWebAuthnRequestModel : TwoFactorWebAuthnDeleteRequestModel
|
||||||
{
|
{
|
||||||
[Required]
|
[Required]
|
||||||
|
@ -0,0 +1,59 @@
|
|||||||
|
using System;
|
||||||
|
using Bit.Core.Models.Table;
|
||||||
|
using Bit.Core.Models.Business;
|
||||||
|
using Bit.Core.Enums;
|
||||||
|
using System.Collections.Generic;
|
||||||
|
using System.Linq;
|
||||||
|
|
||||||
|
namespace Bit.Core.Models.Api
|
||||||
|
{
|
||||||
|
public class TwoFactorU2fResponseModel : ResponseModel
|
||||||
|
{
|
||||||
|
public TwoFactorU2fResponseModel(User user)
|
||||||
|
: base("twoFactorU2f")
|
||||||
|
{
|
||||||
|
if (user == null)
|
||||||
|
{
|
||||||
|
throw new ArgumentNullException(nameof(user));
|
||||||
|
}
|
||||||
|
|
||||||
|
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.U2f);
|
||||||
|
Enabled = provider?.Enabled ?? false;
|
||||||
|
Keys = provider?.MetaData?.Select(k => new KeyModel(k.Key,
|
||||||
|
new TwoFactorProvider.U2fMetaData((dynamic)k.Value)));
|
||||||
|
}
|
||||||
|
|
||||||
|
public bool Enabled { get; set; }
|
||||||
|
public IEnumerable<KeyModel> Keys { get; set; }
|
||||||
|
|
||||||
|
public class KeyModel
|
||||||
|
{
|
||||||
|
public KeyModel(string id, TwoFactorProvider.U2fMetaData data)
|
||||||
|
{
|
||||||
|
Name = data.Name;
|
||||||
|
Id = Convert.ToInt32(id.Replace("Key", string.Empty));
|
||||||
|
Compromised = data.Compromised;
|
||||||
|
}
|
||||||
|
|
||||||
|
public string Name { get; set; }
|
||||||
|
public int Id { get; set; }
|
||||||
|
public bool Compromised { get; set; }
|
||||||
|
}
|
||||||
|
|
||||||
|
public class ChallengeModel
|
||||||
|
{
|
||||||
|
public ChallengeModel(User user, U2fRegistration registration)
|
||||||
|
{
|
||||||
|
UserId = user.Id.ToString();
|
||||||
|
AppId = registration.AppId;
|
||||||
|
Challenge = registration.Challenge;
|
||||||
|
Version = registration.Version;
|
||||||
|
}
|
||||||
|
|
||||||
|
public string UserId { get; set; }
|
||||||
|
public string AppId { get; set; }
|
||||||
|
public string Challenge { get; set; }
|
||||||
|
public string Version { get; set; }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
9
src/Core/Models/Business/U2fRegistration.cs
Normal file
9
src/Core/Models/Business/U2fRegistration.cs
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
namespace Bit.Core.Models.Business
|
||||||
|
{
|
||||||
|
public class U2fRegistration
|
||||||
|
{
|
||||||
|
public string AppId { get; set; }
|
||||||
|
public string Challenge { get; set; }
|
||||||
|
public string Version { get; set; }
|
||||||
|
}
|
||||||
|
}
|
@ -24,6 +24,9 @@ namespace Bit.Core.Services
|
|||||||
Task SendMasterPasswordHintAsync(string email);
|
Task SendMasterPasswordHintAsync(string email);
|
||||||
Task SendTwoFactorEmailAsync(User user);
|
Task SendTwoFactorEmailAsync(User user);
|
||||||
Task<bool> VerifyTwoFactorEmailAsync(User user, string token);
|
Task<bool> VerifyTwoFactorEmailAsync(User user, string token);
|
||||||
|
Task<U2fRegistration> StartU2fRegistrationAsync(User user);
|
||||||
|
Task<bool> DeleteU2fKeyAsync(User user, int id);
|
||||||
|
Task<bool> CompleteU2fRegistrationAsync(User user, int id, string name, string deviceResponse);
|
||||||
Task<CredentialCreateOptions> StartWebAuthnRegistrationAsync(User user);
|
Task<CredentialCreateOptions> StartWebAuthnRegistrationAsync(User user);
|
||||||
Task<bool> DeleteWebAuthnKeyAsync(User user, int id);
|
Task<bool> DeleteWebAuthnKeyAsync(User user, int id);
|
||||||
Task<bool> CompleteWebAuthRegistrationAsync(User user, int value, string name, AuthenticatorAttestationRawResponse attestationResponse);
|
Task<bool> CompleteWebAuthRegistrationAsync(User user, int value, string name, AuthenticatorAttestationRawResponse attestationResponse);
|
||||||
|
@ -18,6 +18,7 @@ using Bit.Core.Context;
|
|||||||
using Bit.Core.Exceptions;
|
using Bit.Core.Exceptions;
|
||||||
using Bit.Core.Utilities;
|
using Bit.Core.Utilities;
|
||||||
using Bit.Core.Settings;
|
using Bit.Core.Settings;
|
||||||
|
using U2F.Core.Exceptions;
|
||||||
using System.IO;
|
using System.IO;
|
||||||
using Newtonsoft.Json;
|
using Newtonsoft.Json;
|
||||||
using Microsoft.AspNetCore.DataProtection;
|
using Microsoft.AspNetCore.DataProtection;
|
||||||
@ -35,6 +36,7 @@ namespace Bit.Core.Services
|
|||||||
private readonly ICipherRepository _cipherRepository;
|
private readonly ICipherRepository _cipherRepository;
|
||||||
private readonly IOrganizationUserRepository _organizationUserRepository;
|
private readonly IOrganizationUserRepository _organizationUserRepository;
|
||||||
private readonly IOrganizationRepository _organizationRepository;
|
private readonly IOrganizationRepository _organizationRepository;
|
||||||
|
private readonly IU2fRepository _u2fRepository;
|
||||||
private readonly IMailService _mailService;
|
private readonly IMailService _mailService;
|
||||||
private readonly IPushNotificationService _pushService;
|
private readonly IPushNotificationService _pushService;
|
||||||
private readonly IdentityErrorDescriber _identityErrorDescriber;
|
private readonly IdentityErrorDescriber _identityErrorDescriber;
|
||||||
@ -58,6 +60,7 @@ namespace Bit.Core.Services
|
|||||||
ICipherRepository cipherRepository,
|
ICipherRepository cipherRepository,
|
||||||
IOrganizationUserRepository organizationUserRepository,
|
IOrganizationUserRepository organizationUserRepository,
|
||||||
IOrganizationRepository organizationRepository,
|
IOrganizationRepository organizationRepository,
|
||||||
|
IU2fRepository u2fRepository,
|
||||||
IMailService mailService,
|
IMailService mailService,
|
||||||
IPushNotificationService pushService,
|
IPushNotificationService pushService,
|
||||||
IUserStore<User> store,
|
IUserStore<User> store,
|
||||||
@ -95,6 +98,7 @@ namespace Bit.Core.Services
|
|||||||
_cipherRepository = cipherRepository;
|
_cipherRepository = cipherRepository;
|
||||||
_organizationUserRepository = organizationUserRepository;
|
_organizationUserRepository = organizationUserRepository;
|
||||||
_organizationRepository = organizationRepository;
|
_organizationRepository = organizationRepository;
|
||||||
|
_u2fRepository = u2fRepository;
|
||||||
_mailService = mailService;
|
_mailService = mailService;
|
||||||
_pushService = pushService;
|
_pushService = pushService;
|
||||||
_identityOptions = optionsAccessor?.Value ?? new IdentityOptions();
|
_identityOptions = optionsAccessor?.Value ?? new IdentityOptions();
|
||||||
@ -363,6 +367,133 @@ namespace Bit.Core.Services
|
|||||||
"2faEmail:" + email, token);
|
"2faEmail:" + email, token);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public async Task<U2fRegistration> StartU2fRegistrationAsync(User user)
|
||||||
|
{
|
||||||
|
await _u2fRepository.DeleteManyByUserIdAsync(user.Id);
|
||||||
|
var reg = U2fLib.StartRegistration(CoreHelpers.U2fAppIdUrl(_globalSettings));
|
||||||
|
await _u2fRepository.CreateAsync(new U2f
|
||||||
|
{
|
||||||
|
AppId = reg.AppId,
|
||||||
|
Challenge = reg.Challenge,
|
||||||
|
Version = reg.Version,
|
||||||
|
UserId = user.Id,
|
||||||
|
CreationDate = DateTime.UtcNow
|
||||||
|
});
|
||||||
|
|
||||||
|
return new U2fRegistration
|
||||||
|
{
|
||||||
|
AppId = reg.AppId,
|
||||||
|
Challenge = reg.Challenge,
|
||||||
|
Version = reg.Version
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<bool> CompleteU2fRegistrationAsync(User user, int id, string name, string deviceResponse)
|
||||||
|
{
|
||||||
|
if (string.IsNullOrWhiteSpace(deviceResponse))
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
var challenges = await _u2fRepository.GetManyByUserIdAsync(user.Id);
|
||||||
|
if (!challenges?.Any() ?? true)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
var registerResponse = BaseModel.FromJson<RegisterResponse>(deviceResponse);
|
||||||
|
|
||||||
|
try
|
||||||
|
{
|
||||||
|
var challenge = challenges.OrderBy(i => i.Id).Last(i => i.KeyHandle == null);
|
||||||
|
var startedReg = new StartedRegistration(challenge.Challenge, challenge.AppId);
|
||||||
|
var reg = U2fLib.FinishRegistration(startedReg, registerResponse);
|
||||||
|
|
||||||
|
await _u2fRepository.DeleteManyByUserIdAsync(user.Id);
|
||||||
|
|
||||||
|
// Add device
|
||||||
|
var providers = user.GetTwoFactorProviders();
|
||||||
|
if (providers == null)
|
||||||
|
{
|
||||||
|
providers = new Dictionary<TwoFactorProviderType, TwoFactorProvider>();
|
||||||
|
}
|
||||||
|
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.U2f);
|
||||||
|
if (provider == null)
|
||||||
|
{
|
||||||
|
provider = new TwoFactorProvider();
|
||||||
|
}
|
||||||
|
if (provider.MetaData == null)
|
||||||
|
{
|
||||||
|
provider.MetaData = new Dictionary<string, object>();
|
||||||
|
}
|
||||||
|
|
||||||
|
if (provider.MetaData.Count >= 5)
|
||||||
|
{
|
||||||
|
// Can only register up to 5 keys
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
var keyId = $"Key{id}";
|
||||||
|
if (provider.MetaData.ContainsKey(keyId))
|
||||||
|
{
|
||||||
|
provider.MetaData.Remove(keyId);
|
||||||
|
}
|
||||||
|
|
||||||
|
provider.Enabled = true;
|
||||||
|
provider.MetaData.Add(keyId, new TwoFactorProvider.U2fMetaData
|
||||||
|
{
|
||||||
|
Name = name,
|
||||||
|
KeyHandle = reg.KeyHandle == null ? null : Utils.ByteArrayToBase64String(reg.KeyHandle),
|
||||||
|
PublicKey = reg.PublicKey == null ? null : Utils.ByteArrayToBase64String(reg.PublicKey),
|
||||||
|
Certificate = reg.AttestationCert == null ? null : Utils.ByteArrayToBase64String(reg.AttestationCert),
|
||||||
|
Compromised = false,
|
||||||
|
Counter = reg.Counter
|
||||||
|
});
|
||||||
|
|
||||||
|
if (providers.ContainsKey(TwoFactorProviderType.U2f))
|
||||||
|
{
|
||||||
|
providers.Remove(TwoFactorProviderType.U2f);
|
||||||
|
}
|
||||||
|
|
||||||
|
providers.Add(TwoFactorProviderType.U2f, provider);
|
||||||
|
user.SetTwoFactorProviders(providers);
|
||||||
|
await UpdateTwoFactorProviderAsync(user, TwoFactorProviderType.U2f);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
catch (U2fException e)
|
||||||
|
{
|
||||||
|
Logger.LogError(e, "Complete U2F registration error.");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public async Task<bool> DeleteU2fKeyAsync(User user, int id)
|
||||||
|
{
|
||||||
|
var providers = user.GetTwoFactorProviders();
|
||||||
|
if (providers == null)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
var keyName = $"Key{id}";
|
||||||
|
var provider = user.GetTwoFactorProvider(TwoFactorProviderType.U2f);
|
||||||
|
if (!provider?.MetaData?.ContainsKey(keyName) ?? true)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (provider.MetaData.Count < 2)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
provider.MetaData.Remove(keyName);
|
||||||
|
providers[TwoFactorProviderType.U2f] = provider;
|
||||||
|
user.SetTwoFactorProviders(providers);
|
||||||
|
await UpdateTwoFactorProviderAsync(user, TwoFactorProviderType.U2f);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
public async Task<CredentialCreateOptions> StartWebAuthnRegistrationAsync(User user)
|
public async Task<CredentialCreateOptions> StartWebAuthnRegistrationAsync(User user)
|
||||||
{
|
{
|
||||||
var providers = user.GetTwoFactorProviders();
|
var providers = user.GetTwoFactorProviders();
|
||||||
@ -464,6 +595,25 @@ namespace Bit.Core.Services
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Delete U2F token is this is a migrated WebAuthn token.
|
||||||
|
var entry = new TwoFactorProvider.WebAuthnData(provider.MetaData[keyName]);
|
||||||
|
if (entry?.Migrated ?? false)
|
||||||
|
{
|
||||||
|
var u2fProvider = user.GetTwoFactorProvider(TwoFactorProviderType.U2f);
|
||||||
|
if (u2fProvider?.MetaData?.ContainsKey(keyName) ?? false)
|
||||||
|
{
|
||||||
|
u2fProvider.MetaData.Remove(keyName);
|
||||||
|
if (u2fProvider.MetaData.Count > 0)
|
||||||
|
{
|
||||||
|
providers[TwoFactorProviderType.U2f] = u2fProvider;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
providers.Remove(TwoFactorProviderType.U2f);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
provider.MetaData.Remove(keyName);
|
provider.MetaData.Remove(keyName);
|
||||||
providers[TwoFactorProviderType.WebAuthn] = provider;
|
providers[TwoFactorProviderType.WebAuthn] = provider;
|
||||||
user.SetTwoFactorProviders(providers);
|
user.SetTwoFactorProviders(providers);
|
||||||
@ -719,6 +869,13 @@ namespace Bit.Core.Services
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Since the user can no longer directly manipulate U2F tokens, we should
|
||||||
|
// disable them when the user disables WebAuthn.
|
||||||
|
if (type == TwoFactorProviderType.WebAuthn)
|
||||||
|
{
|
||||||
|
providers.Remove(TwoFactorProviderType.U2f);
|
||||||
|
}
|
||||||
|
|
||||||
providers.Remove(type);
|
providers.Remove(type);
|
||||||
user.SetTwoFactorProviders(providers);
|
user.SetTwoFactorProviders(providers);
|
||||||
await SaveUserAsync(user);
|
await SaveUserAsync(user);
|
||||||
|
@ -23,6 +23,7 @@ namespace Bit.Core.Test.Services
|
|||||||
private readonly ICipherRepository _cipherRepository;
|
private readonly ICipherRepository _cipherRepository;
|
||||||
private readonly IOrganizationUserRepository _organizationUserRepository;
|
private readonly IOrganizationUserRepository _organizationUserRepository;
|
||||||
private readonly IOrganizationRepository _organizationRepository;
|
private readonly IOrganizationRepository _organizationRepository;
|
||||||
|
private readonly IU2fRepository _u2fRepository;
|
||||||
private readonly IMailService _mailService;
|
private readonly IMailService _mailService;
|
||||||
private readonly IPushNotificationService _pushService;
|
private readonly IPushNotificationService _pushService;
|
||||||
private readonly IUserStore<User> _userStore;
|
private readonly IUserStore<User> _userStore;
|
||||||
@ -52,6 +53,7 @@ namespace Bit.Core.Test.Services
|
|||||||
_cipherRepository = Substitute.For<ICipherRepository>();
|
_cipherRepository = Substitute.For<ICipherRepository>();
|
||||||
_organizationUserRepository = Substitute.For<IOrganizationUserRepository>();
|
_organizationUserRepository = Substitute.For<IOrganizationUserRepository>();
|
||||||
_organizationRepository = Substitute.For<IOrganizationRepository>();
|
_organizationRepository = Substitute.For<IOrganizationRepository>();
|
||||||
|
_u2fRepository = Substitute.For<IU2fRepository>();
|
||||||
_mailService = Substitute.For<IMailService>();
|
_mailService = Substitute.For<IMailService>();
|
||||||
_pushService = Substitute.For<IPushNotificationService>();
|
_pushService = Substitute.For<IPushNotificationService>();
|
||||||
_userStore = Substitute.For<IUserStore<User>>();
|
_userStore = Substitute.For<IUserStore<User>>();
|
||||||
@ -80,6 +82,7 @@ namespace Bit.Core.Test.Services
|
|||||||
_cipherRepository,
|
_cipherRepository,
|
||||||
_organizationUserRepository,
|
_organizationUserRepository,
|
||||||
_organizationRepository,
|
_organizationRepository,
|
||||||
|
_u2fRepository,
|
||||||
_mailService,
|
_mailService,
|
||||||
_pushService,
|
_pushService,
|
||||||
_userStore,
|
_userStore,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user