summaryrefslogtreecommitdiff
path: root/backend
authorMichael Krelin <hacker@klever.net>2014-06-30 18:29:31 (UTC)
committer Michael Krelin <hacker@klever.net>2014-06-30 18:29:31 (UTC)
commit9d4ae3e240e8d82a5e500c1bfbf3b4e8a43c62c6 (patch) (unidiff)
tree9c8068f07b59aaedd72393090a4f68e9dfc58c3e /backend
parentc392fe28606eefa0c814e5c25d641f5ffe623186 (diff)
downloadclipperz-9d4ae3e240e8d82a5e500c1bfbf3b4e8a43c62c6.zip
clipperz-9d4ae3e240e8d82a5e500c1bfbf3b4e8a43c62c6.tar.gz
clipperz-9d4ae3e240e8d82a5e500c1bfbf3b4e8a43c62c6.tar.bz2
adjust SRP to match clipper change
Diffstat (limited to 'backend') (more/less context) (ignore whitespace changes)
-rw-r--r--backend/node/src/clipperz.js17
1 files changed, 12 insertions, 5 deletions
diff --git a/backend/node/src/clipperz.js b/backend/node/src/clipperz.js
index 37b9cae..72b6c9f 100644
--- a/backend/node/src/clipperz.js
+++ b/backend/node/src/clipperz.js
@@ -34,32 +34,34 @@ function clipperz_store(PG) {
34 "DELETE FROM clipperz.thesession WHERE s_id=$1",[sid],cb 34 "DELETE FROM clipperz.thesession WHERE s_id=$1",[sid],cb
35 ) }; 35 ) };
36 rv.prototype.length = function(cb) { PG.Q( 36 rv.prototype.length = function(cb) { PG.Q(
37 "SELECT count(*) AS c FROM clipperz.thesession", function(e,r) { 37 "SELECT count(*) AS c FROM clipperz.thesession", function(e,r) {
38 cb(e,e?null:r.rows[0].c); 38 cb(e,e?null:r.rows[0].c);
39 } 39 }
40 ) }; 40 ) };
41 rv.prototype.clear = function(cb) { PQ.Q( 41 rv.prototype.clear = function(cb) { PQ.Q(
42 "TRUNCATE clipperz.thesession", cb 42 "TRUNCATE clipperz.thesession", cb
43 ) }; 43 ) };
44 rv.prototype.__proto__ = express_store.prototype; 44 rv.prototype.__proto__ = express_store.prototype;
45 return rv; 45 return rv;
46} 46}
47 47
48var srp_g = BIGNUM(2); 48var srp_g = BIGNUM(2);
49var srp_n = BIGNUM("115b8b692e0e045692cf280b436735c77a5a9e8a9e7ed56c965f87db5b2a2ece3",16); 49var srp_n = BIGNUM("115b8b692e0e045692cf280b436735c77a5a9e8a9e7ed56c965f87db5b2a2ece3",16);
50var srp_k = BIGNUM("64398bff522814e306a97cb9bfc4364b7eed16a8c17c5208a40a2bad2933c8e",16);
51var srp_hn = "597626870978286801440197562148588907434001483655788865609375806439877501869636875571920406529";
50var n123 = '112233445566778899aabbccddeeff00112233445566778899aabbccddeeff00'; 52var n123 = '112233445566778899aabbccddeeff00112233445566778899aabbccddeeff00';
51 53
52 54
53var CLIPPERZ = module.exports = function(CONFIG) { 55var CLIPPERZ = module.exports = function(CONFIG) {
54 56
55 var LOGGER = CONFIG.logger||{trace:function(){}}; 57 var LOGGER = CONFIG.logger||{trace:function(){}};
56 58
57 var PG = { 59 var PG = {
58 url: CONFIG.psql, 60 url: CONFIG.psql,
59 PG: require('pg').native, 61 PG: require('pg').native,
60 Q: function(q,a,cb) { 62 Q: function(q,a,cb) {
61 if('function'===typeof a) cb=a,a=[]; 63 if('function'===typeof a) cb=a,a=[];
62 LOGGER.trace({query:q,args:a},'SQL: %s',q); 64 LOGGER.trace({query:q,args:a},'SQL: %s',q);
63 PG.PG.connect(PG.url,function(e,C,D) { 65 PG.PG.connect(PG.url,function(e,C,D) {
64 if(e) return cb(e); 66 if(e) return cb(e);
65 var t0=new Date(); 67 var t0=new Date();
@@ -162,45 +164,50 @@ var CLIPPERZ = module.exports = function(CONFIG) {
162 +" RETURNING o.otps_id!=otp.otps_id AS yes, o.otp_ref", 164 +" RETURNING o.otps_id!=otp.otps_id AS yes, o.otp_ref",
163 [ req.session.otp, req.session.u ], 165 [ req.session.otp, req.session.u ],
164 function(e,r) { 166 function(e,r) {
165 if(e) return cb(e); 167 if(e) return cb(e);
166 if(!r.rowCount) return cb(new Error('no OTP found')); 168 if(!r.rowCount) return cb(new Error('no OTP found'));
167 r=r.rows[0]; 169 r=r.rows[0];
168 if(!r.yes) return cb(new Error('OTP is in a sorry state')); 170 if(!r.yes) return cb(new Error('OTP is in a sorry state'));
169 cb(null,{ref:r.otp_ref}); 171 cb(null,{ref:r.otp_ref});
170 }); 172 });
171 }] 173 }]
172 },function(e,r) { 174 },function(e,r) {
173 if(e) return cb(e); 175 if(e) return cb(e);
174 req.session.C = ppp.C; req.session.A = ppp.A; 176 req.session.C = ppp.C; req.session.A = ppp.A;
175 req.session.s = r.u.u_srp_s; req.session.v = r.u.u_srp_v; 177 req.session.s = r.u.u_srp_s; req.session.v = r.u.u_srp_v;
176 req.session.u = r.u.u_id; 178 req.session.u = r.u.u_id;
177 req.session.b = clipperz_random(); 179 req.session.b = clipperz_random();
178 req.session.B = BIGNUM(req.session.v,16).add(srp_g.powm(BIGNUM(req.session.b,16),srp_n)).toString(16); 180 req.session.B = srp_k.mul(BIGNUM(req.session.v,16)).add(srp_g.powm(BIGNUM(req.session.b,16),srp_n)).toString(16);
179 var rv = {s:req.session.s,B:req.session.B} 181 var rv = {s:req.session.s,B:req.session.B}
180 if(r.otp && r.otp.otp_ref) rv.oneTimePassword=r.otp.otp_ref; 182 if(r.otp && r.otp.otp_ref) rv.oneTimePassword=r.otp.otp_ref;
181 res.res(rv); 183 res.res(rv);
182 }); 184 });
183 185
184 case 'credentialCheck': 186 case 'credentialCheck':
185 var u = clipperz_hash(BIGNUM(req.session.B,16).toString(10)); 187 var u = clipperz_hash(BIGNUM(req.session.A,16).toString(10)+BIGNUM(req.session.B,16).toString(10));
186 var A = BIGNUM(req.session.A,16); 188 var A = BIGNUM(req.session.A,16);
187 var S = A.mul(BIGNUM(req.session.v,16).powm(BIGNUM(u,16),srp_n)).powm( 189 var S = A.mul(BIGNUM(req.session.v,16).powm(BIGNUM(u,16),srp_n)).powm(BIGNUM(req.session.b,16),srp_n);
188 BIGNUM(req.session.b,16), srp_n);
189 var K = clipperz_hash(S.toString(10)); 190 var K = clipperz_hash(S.toString(10));
190 var M1 = clipperz_hash(A.toString(10)+BIGNUM(req.session.B,16).toString(10)+K.toString(16)); 191 var M1 = clipperz_hash(
192 srp_hn
193 +clipperz_hash(req.session.C)
194 +BIGNUM(req.session.s,16).toString(10)
195 +A.toString(10)
196 +BIGNUM(req.session.B,16).toString(10)
197 +K );
191 if(M1!=ppp.M1) return res.res({error:'?'}); 198 if(M1!=ppp.M1) return res.res({error:'?'});
192 req.session.K = K; 199 req.session.K = K;
193 var M2 = clipperz_hash(A.toString(10)+M1+K.toString(16)); 200 var M2 = clipperz_hash(A.toString(10)+M1+K.toString(16));
194 return res.res({M2:M2,connectionId:'',loginInfo:{latest:{},current:{}},offlineCopyNeeded:false,lock:'----'}); 201 return res.res({M2:M2,connectionId:'',loginInfo:{latest:{},current:{}},offlineCopyNeeded:false,lock:'----'});
195 202
196 case 'oneTimePassword': return PG.Q( 203 case 'oneTimePassword': return PG.Q(
197 "UPDATE clipperz.theotp AS otp" 204 "UPDATE clipperz.theotp AS otp"
198 +" SET" 205 +" SET"
199 +" otps_id = CASE WHEN s.otps_code!='ACTIVE' THEN s.otps_id ELSE (" 206 +" otps_id = CASE WHEN s.otps_code!='ACTIVE' THEN s.otps_id ELSE ("
200 +" SELECT ss.otps_id FROM clipperz.otpstatus AS ss WHERE ss.otps_code=CASE" 207 +" SELECT ss.otps_id FROM clipperz.otpstatus AS ss WHERE ss.otps_code=CASE"
201 +" WHEN otp.otp_key_checksum=$2 THEN 'REQUESTED'" 208 +" WHEN otp.otp_key_checksum=$2 THEN 'REQUESTED'"
202 +" ELSE 'DISABLED' END" 209 +" ELSE 'DISABLED' END"
203 +" ) END," 210 +" ) END,"
204 +" otp_data = CASE WHEN s.otps_code='ACTIVE' THEN '' ELSE otp.otp_data END," 211 +" otp_data = CASE WHEN s.otps_code='ACTIVE' THEN '' ELSE otp.otp_data END,"
205 +" otp_utime = current_timestamp," 212 +" otp_utime = current_timestamp,"
206 +" otp_rtime = CASE WHEN otp.otp_key_checksum=$2 THEN current_timestamp ELSE otp.otp_rtime END" 213 +" otp_rtime = CASE WHEN otp.otp_key_checksum=$2 THEN current_timestamp ELSE otp.otp_rtime END"