2014-11-04 18:05:31 +03:00
|
|
|
<?php
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2018-01-16 22:28:22 +03:00
|
|
|
declare(strict_types=1);
|
2019-12-03 21:57:53 +03:00
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2014-11-04 18:05:31 +03:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
namespace OC\Security;
|
|
|
|
|
|
|
|
use OCP\IConfig;
|
|
|
|
use OCP\Security\IHasher;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class Hasher provides some basic hashing functions. Furthermore, it supports legacy hashes
|
|
|
|
* used by previous versions of ownCloud and helps migrating those hashes to newer ones.
|
|
|
|
*
|
|
|
|
* The hashes generated by this class are prefixed (version|hash) with a version parameter to allow possible
|
|
|
|
* updates in the future.
|
|
|
|
* Possible versions:
|
|
|
|
* - 1 (Initial version)
|
|
|
|
*
|
|
|
|
* Usage:
|
|
|
|
* // Hashing a message
|
|
|
|
* $hash = \OC::$server->getHasher()->hash('MessageToHash');
|
|
|
|
* // Verifying a message - $newHash will contain the newly calculated hash
|
|
|
|
* $newHash = null;
|
|
|
|
* var_dump(\OC::$server->getHasher()->verify('a', '86f7e437faa5a7fce15d1ddcb9eaeaea377667b8', $newHash));
|
|
|
|
* var_dump($newHash);
|
|
|
|
*
|
|
|
|
* @package OC\Security
|
|
|
|
*/
|
|
|
|
class Hasher implements IHasher {
|
|
|
|
/** @var IConfig */
|
|
|
|
private $config;
|
|
|
|
/** @var array Options passed to password_hash and password_needs_rehash */
|
2018-04-04 16:40:28 +03:00
|
|
|
private $options = [];
|
2014-11-04 18:05:31 +03:00
|
|
|
/** @var string Salt used for legacy passwords */
|
|
|
|
private $legacySalt = null;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param IConfig $config
|
|
|
|
*/
|
2017-07-23 22:03:26 +03:00
|
|
|
public function __construct(IConfig $config) {
|
2014-11-04 18:05:31 +03:00
|
|
|
$this->config = $config;
|
|
|
|
|
2020-01-21 13:58:13 +03:00
|
|
|
if (\defined('PASSWORD_ARGON2I')) {
|
|
|
|
// password_hash fails, when the minimum values are undershot.
|
|
|
|
// In this case, ignore and revert to default
|
|
|
|
if ($this->config->getSystemValueInt('hashingMemoryCost', PASSWORD_ARGON2_DEFAULT_MEMORY_COST) >= 8) {
|
|
|
|
$this->options['memory_cost'] = $this->config->getSystemValueInt('hashingMemoryCost', PASSWORD_ARGON2_DEFAULT_MEMORY_COST);
|
|
|
|
}
|
|
|
|
if ($this->config->getSystemValueInt('hashingTimeCost', PASSWORD_ARGON2_DEFAULT_MEMORY_COST) >= 1) {
|
|
|
|
$this->options['time_cost'] = $this->config->getSystemValueInt('hashingTimeCost', PASSWORD_ARGON2_DEFAULT_TIME_COST);
|
|
|
|
}
|
|
|
|
if ($this->config->getSystemValueInt('hashingThreads', PASSWORD_ARGON2_DEFAULT_MEMORY_COST) >= 1) {
|
|
|
|
$this->options['threads'] = $this->config->getSystemValueInt('hashingThreads', PASSWORD_ARGON2_DEFAULT_THREADS);
|
|
|
|
}
|
|
|
|
}
|
2020-01-20 20:11:00 +03:00
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
$hashingCost = $this->config->getSystemValue('hashingCost', null);
|
2018-01-16 22:28:22 +03:00
|
|
|
if(!\is_null($hashingCost)) {
|
2014-11-04 18:05:31 +03:00
|
|
|
$this->options['cost'] = $hashingCost;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Hashes a message using PHP's `password_hash` functionality.
|
|
|
|
* Please note that the size of the returned string is not guaranteed
|
|
|
|
* and can be up to 255 characters.
|
|
|
|
*
|
|
|
|
* @param string $message Message to generate hash from
|
|
|
|
* @return string Hash of the message with appended version parameter
|
|
|
|
*/
|
2018-01-16 22:28:22 +03:00
|
|
|
public function hash(string $message): string {
|
2020-01-29 23:39:58 +03:00
|
|
|
$alg = $this->getPrefferedAlgorithm();
|
|
|
|
|
2020-02-05 22:34:51 +03:00
|
|
|
if (\defined('PASSWORD_ARGON2ID') && $alg === PASSWORD_ARGON2ID) {
|
|
|
|
return 3 . '|' . password_hash($message, PASSWORD_ARGON2ID, $this->options);
|
|
|
|
}
|
|
|
|
|
2020-01-29 23:39:58 +03:00
|
|
|
if (\defined('PASSWORD_ARGON2I') && $alg === PASSWORD_ARGON2I) {
|
2018-04-04 16:40:28 +03:00
|
|
|
return 2 . '|' . password_hash($message, PASSWORD_ARGON2I, $this->options);
|
|
|
|
}
|
2020-01-29 23:39:58 +03:00
|
|
|
|
|
|
|
return 1 . '|' . password_hash($message, PASSWORD_BCRYPT, $this->options);
|
2014-11-04 18:05:31 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get the version and hash from a prefixedHash
|
|
|
|
* @param string $prefixedHash
|
|
|
|
* @return null|array Null if the hash is not prefixed, otherwise array('version' => 1, 'hash' => 'foo')
|
|
|
|
*/
|
2018-01-16 22:28:22 +03:00
|
|
|
protected function splitHash(string $prefixedHash) {
|
2014-11-04 18:05:31 +03:00
|
|
|
$explodedString = explode('|', $prefixedHash, 2);
|
2018-01-16 22:28:22 +03:00
|
|
|
if(\count($explodedString) === 2) {
|
2014-11-04 18:05:31 +03:00
|
|
|
if((int)$explodedString[0] > 0) {
|
2018-04-04 16:40:28 +03:00
|
|
|
return ['version' => (int)$explodedString[0], 'hash' => $explodedString[1]];
|
2014-11-04 18:05:31 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Verify legacy hashes
|
|
|
|
* @param string $message Message to verify
|
|
|
|
* @param string $hash Assumed hash of the message
|
|
|
|
* @param null|string &$newHash Reference will contain the updated hash
|
|
|
|
* @return bool Whether $hash is a valid hash of $message
|
|
|
|
*/
|
2018-01-16 22:28:22 +03:00
|
|
|
protected function legacyHashVerify($message, $hash, &$newHash = null): bool {
|
2014-11-04 18:05:31 +03:00
|
|
|
if(empty($this->legacySalt)) {
|
|
|
|
$this->legacySalt = $this->config->getSystemValue('passwordsalt', '');
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify whether it matches a legacy PHPass or SHA1 string
|
2018-01-16 22:28:22 +03:00
|
|
|
$hashLength = \strlen($hash);
|
2018-04-04 16:40:28 +03:00
|
|
|
if(($hashLength === 60 && password_verify($message.$this->legacySalt, $hash)) ||
|
|
|
|
($hashLength === 40 && hash_equals($hash, sha1($message)))) {
|
2014-11-04 18:05:31 +03:00
|
|
|
$newHash = $this->hash($message);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-04-04 16:40:28 +03:00
|
|
|
* Verify V1 (blowfish) hashes
|
|
|
|
* Verify V2 (argon2i) hashes
|
2020-02-05 22:34:51 +03:00
|
|
|
* Verify V3 (argon2id) hashes
|
2018-04-04 16:40:28 +03:00
|
|
|
* @param string $message Message to verify
|
|
|
|
* @param string $hash Assumed hash of the message
|
|
|
|
* @param null|string &$newHash Reference will contain the updated hash if necessary. Update the existing hash with this one.
|
|
|
|
* @return bool Whether $hash is a valid hash of $message
|
|
|
|
*/
|
2020-02-05 22:34:51 +03:00
|
|
|
protected function verifyHash(string $message, string $hash, &$newHash = null): bool {
|
2018-04-04 16:40:28 +03:00
|
|
|
if(password_verify($message, $hash)) {
|
2020-02-05 22:34:51 +03:00
|
|
|
if ($this->needsRehash($hash)) {
|
2014-11-04 18:05:31 +03:00
|
|
|
$newHash = $this->hash($message);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $message Message to verify
|
|
|
|
* @param string $hash Assumed hash of the message
|
|
|
|
* @param null|string &$newHash Reference will contain the updated hash if necessary. Update the existing hash with this one.
|
|
|
|
* @return bool Whether $hash is a valid hash of $message
|
|
|
|
*/
|
2018-01-16 22:28:22 +03:00
|
|
|
public function verify(string $message, string $hash, &$newHash = null): bool {
|
2014-11-04 18:05:31 +03:00
|
|
|
$splittedHash = $this->splitHash($hash);
|
|
|
|
|
|
|
|
if(isset($splittedHash['version'])) {
|
|
|
|
switch ($splittedHash['version']) {
|
2020-02-05 22:34:51 +03:00
|
|
|
case 3:
|
2018-04-04 16:40:28 +03:00
|
|
|
case 2:
|
2014-11-04 18:05:31 +03:00
|
|
|
case 1:
|
2020-02-05 22:34:51 +03:00
|
|
|
return $this->verifyHash($message, $splittedHash['hash'], $newHash);
|
2014-11-04 18:05:31 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return $this->legacyHashVerify($message, $hash, $newHash);
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-01-29 23:39:58 +03:00
|
|
|
private function needsRehash(string $hash): bool {
|
|
|
|
$algorithm = $this->getPrefferedAlgorithm();
|
|
|
|
|
|
|
|
return password_needs_rehash($hash, $algorithm, $this->options);
|
|
|
|
}
|
|
|
|
|
|
|
|
private function getPrefferedAlgorithm() {
|
|
|
|
$default = PASSWORD_BCRYPT;
|
|
|
|
if (\defined('PASSWORD_ARGON2I')) {
|
|
|
|
$default = PASSWORD_ARGON2I;
|
|
|
|
}
|
|
|
|
|
2020-02-05 22:34:51 +03:00
|
|
|
if (\defined('PASSWORD_ARGON2ID')) {
|
|
|
|
$default = PASSWORD_ARGON2ID;
|
|
|
|
}
|
|
|
|
|
2020-01-29 23:39:58 +03:00
|
|
|
// Check if we should use PASSWORD_DEFAULT
|
|
|
|
if ($this->config->getSystemValue('hashing_default_password', false) === true) {
|
|
|
|
$default = PASSWORD_DEFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $default;
|
|
|
|
}
|
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
}
|