using System.ComponentModel.DataAnnotations; using System.Reflection; using Bit.Core; using Bit.Core.Context; using Bit.Core.Entities; using Bit.Core.Enums; using Bit.Core.Models.Api; using Bit.Core.Repositories; using Bit.Core.Services; using Bit.Core.Settings; using Bit.Identity.IdentityServer.Enums; using Duende.IdentityServer.Validation; using Microsoft.Extensions.Caching.Distributed; namespace Bit.Identity.IdentityServer.RequestValidators; public class DeviceValidator( IDeviceService deviceService, IDeviceRepository deviceRepository, GlobalSettings globalSettings, IMailService mailService, ICurrentContext currentContext, IUserService userService, IDistributedCache distributedCache, ILogger logger, IFeatureService featureService) : IDeviceValidator { private readonly IDeviceService _deviceService = deviceService; private readonly IDeviceRepository _deviceRepository = deviceRepository; private readonly GlobalSettings _globalSettings = globalSettings; private readonly IMailService _mailService = mailService; private readonly ICurrentContext _currentContext = currentContext; private readonly IUserService _userService = userService; private readonly IDistributedCache distributedCache = distributedCache; private readonly ILogger _logger = logger; private readonly IFeatureService _featureService = featureService; public async Task ValidateRequestDeviceAsync(ValidatedTokenRequest request, CustomValidatorRequestContext context) { // Parse device from request and return early if no device information is provided var requestDevice = context.Device ?? GetDeviceFromRequest(request); // If context.Device and request device information are null then return error // backwards compatibility -- check if user is null // PM-13340: Null user check happens in the HandleNewDeviceVerificationAsync method and can be removed from here if (requestDevice == null || context.User == null) { (context.ValidationErrorResult, context.CustomResponse) = BuildDeviceErrorResult(DeviceValidationResultType.NoDeviceInformationProvided); return false; } // if not a new device request then check if the device is known if (!NewDeviceOtpRequest(request)) { var knownDevice = await GetKnownDeviceAsync(context.User, requestDevice); // if the device is know then we return the device fetched from the database // returning the database device is important for TDE if (knownDevice != null) { context.KnownDevice = true; context.Device = knownDevice; return true; } } // We have established that the device is unknown at this point; begin new device verification // PM-13340: remove feature flag if (_featureService.IsEnabled(FeatureFlagKeys.NewDeviceVerification) && request.GrantType == "password" && request.Raw["AuthRequest"] == null && !context.TwoFactorRequired && !context.SsoRequired && _globalSettings.EnableNewDeviceVerification) { var validationResult = await HandleNewDeviceVerificationAsync(context.User, request); if (validationResult != DeviceValidationResultType.Success) { (context.ValidationErrorResult, context.CustomResponse) = BuildDeviceErrorResult(validationResult); if (validationResult == DeviceValidationResultType.NewDeviceVerificationRequired) { await _userService.SendNewDeviceVerificationEmailAsync(context.User); } return false; } } // At this point we have established either new device verification is not required or the NewDeviceOtp is valid, // so we save the device to the database and proceed with authentication requestDevice.UserId = context.User.Id; await _deviceService.SaveAsync(requestDevice); context.Device = requestDevice; if (!_globalSettings.DisableEmailNewDevice) { await SendNewDeviceLoginEmail(context.User, requestDevice); } return true; } /// /// Checks the if the requesting deice requires new device verification otherwise saves the device to the database /// /// user attempting to authenticate /// The Request is used to check for the NewDeviceOtp and for the raw device data /// returns deviceValidationResultType private async Task HandleNewDeviceVerificationAsync(User user, ValidatedRequest request) { // currently unreachable due to backward compatibility // PM-13340: will address this if (user == null) { return DeviceValidationResultType.InvalidUser; } // Has the User opted out of new device verification if (!user.VerifyDevices) { return DeviceValidationResultType.Success; } // User is newly registered, so don't require new device verification var createdSpan = DateTime.UtcNow - user.CreationDate; if (createdSpan < TimeSpan.FromHours(24)) { return DeviceValidationResultType.Success; } // CS exception flow // Check cache for user information var cacheKey = string.Format(AuthConstants.NewDeviceVerificationExceptionCacheKeyFormat, user.Id.ToString()); var cacheValue = await distributedCache.GetAsync(cacheKey); if (cacheValue != null) { // if found in cache return success result and remove from cache await distributedCache.RemoveAsync(cacheKey); _logger.LogInformation("New device verification exception for user {UserId} found in cache", user.Id); return DeviceValidationResultType.Success; } // parse request for NewDeviceOtp to validate var newDeviceOtp = request.Raw["NewDeviceOtp"]?.ToString(); // we only check null here since an empty OTP will be considered an incorrect OTP if (newDeviceOtp != null) { // verify the NewDeviceOtp var otpValid = await _userService.VerifyOTPAsync(user, newDeviceOtp); if (otpValid) { // In order to get here they would have to have access to their email so we verify it if it's not already if (!user.EmailVerified) { user.EmailVerified = true; await _userService.SaveUserAsync(user); } return DeviceValidationResultType.Success; } return DeviceValidationResultType.InvalidNewDeviceOtp; } // if a user has no devices they are assumed to be newly registered user which does not require new device verification var devices = await _deviceRepository.GetManyByUserIdAsync(user.Id); if (devices.Count == 0) { return DeviceValidationResultType.Success; } // if we get to here then we need to send a new device verification email return DeviceValidationResultType.NewDeviceVerificationRequired; } /// /// Sends an email whenever the user logs in from a new device. Will not send to a user who's account /// is less than 10 minutes old. We assume an account that is less than 10 minutes old is new and does /// not need an email stating they just logged in. /// /// user logging in /// current device being approved to login /// void private async Task SendNewDeviceLoginEmail(User user, Device requestDevice) { // Ensure that the user doesn't receive a "new device" email on the first login var now = DateTime.UtcNow; if (now - user.CreationDate > TimeSpan.FromMinutes(10)) { var deviceType = requestDevice.Type.GetType().GetMember(requestDevice.Type.ToString()) .FirstOrDefault()?.GetCustomAttribute()?.GetName(); await _mailService.SendNewDeviceLoggedInEmail(user.Email, deviceType, now, _currentContext.IpAddress); } } public async Task GetKnownDeviceAsync(User user, Device device) { if (user == null || device == null) { return null; } return await _deviceRepository.GetByIdentifierAsync(device.Identifier, user.Id); } public static Device GetDeviceFromRequest(ValidatedRequest request) { var deviceIdentifier = request.Raw["DeviceIdentifier"]?.ToString(); var requestDeviceType = request.Raw["DeviceType"]?.ToString(); var deviceName = request.Raw["DeviceName"]?.ToString(); var devicePushToken = request.Raw["DevicePushToken"]?.ToString(); if (string.IsNullOrWhiteSpace(deviceIdentifier) || string.IsNullOrWhiteSpace(requestDeviceType) || string.IsNullOrWhiteSpace(deviceName) || !Enum.TryParse(requestDeviceType, out DeviceType parsedDeviceType)) { return null; } return new Device { Identifier = deviceIdentifier, Name = deviceName, Type = parsedDeviceType, PushToken = string.IsNullOrWhiteSpace(devicePushToken) ? null : devicePushToken }; } /// /// Checks request for the NewDeviceOtp field to determine if a new device verification is required. /// /// /// public static bool NewDeviceOtpRequest(ValidatedRequest request) { return !string.IsNullOrEmpty(request.Raw["NewDeviceOtp"]?.ToString()); } /// /// This builds builds the error result for the various grant and token validators. The Success type is not used here. /// /// DeviceValidationResultType that is an error, success type is not used. /// validation result used by grant and token validators, and the custom response for either Grant or Token response objects. private static (Duende.IdentityServer.Validation.ValidationResult, Dictionary) BuildDeviceErrorResult(DeviceValidationResultType errorType) { var result = new Duende.IdentityServer.Validation.ValidationResult { IsError = true, Error = "device_error", }; var customResponse = new Dictionary(); switch (errorType) { /* * The ErrorMessage is brittle and is used to control the flow in the clients. Do not change them without updating the client as well. * There is a backwards compatibility issue as well: if you make a change on the clients then ensure that they are backwards * compatible. */ case DeviceValidationResultType.InvalidUser: result.ErrorDescription = "Invalid user"; customResponse.Add("ErrorModel", new ErrorResponseModel("invalid user")); break; case DeviceValidationResultType.InvalidNewDeviceOtp: result.ErrorDescription = "Invalid New Device OTP"; customResponse.Add("ErrorModel", new ErrorResponseModel("invalid new device otp")); break; case DeviceValidationResultType.NewDeviceVerificationRequired: result.ErrorDescription = "New device verification required"; customResponse.Add("ErrorModel", new ErrorResponseModel("new device verification required")); break; case DeviceValidationResultType.NoDeviceInformationProvided: result.ErrorDescription = "No device information provided"; customResponse.Add("ErrorModel", new ErrorResponseModel("no device information provided")); break; } return (result, customResponse); } }