You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

accountreg.go 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297
  1. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  2. // released under the MIT license
  3. package irc
  4. import (
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "log"
  9. "strconv"
  10. "strings"
  11. "time"
  12. "github.com/goshuirc/irc-go/ircfmt"
  13. "github.com/goshuirc/irc-go/ircmsg"
  14. "github.com/oragono/oragono/irc/passwd"
  15. "github.com/oragono/oragono/irc/sno"
  16. "github.com/tidwall/buntdb"
  17. )
  18. var (
  19. errAccountCreation = errors.New("Account could not be created")
  20. errCertfpAlreadyExists = errors.New("An account already exists with your certificate")
  21. )
  22. // AccountRegistration manages the registration of accounts.
  23. type AccountRegistration struct {
  24. Enabled bool
  25. EnabledCallbacks []string
  26. EnabledCredentialTypes []string
  27. AllowMultiplePerConnection bool
  28. }
  29. // AccountCredentials stores the various methods for verifying accounts.
  30. type AccountCredentials struct {
  31. PassphraseSalt []byte
  32. PassphraseHash []byte
  33. Certificate string // fingerprint
  34. }
  35. // NewAccountRegistration returns a new AccountRegistration, configured correctly.
  36. func NewAccountRegistration(config AccountRegistrationConfig) (accountReg AccountRegistration) {
  37. if config.Enabled {
  38. accountReg.Enabled = true
  39. accountReg.AllowMultiplePerConnection = config.AllowMultiplePerConnection
  40. for _, name := range config.EnabledCallbacks {
  41. // we store "none" as "*" internally
  42. if name == "none" {
  43. name = "*"
  44. }
  45. accountReg.EnabledCallbacks = append(accountReg.EnabledCallbacks, name)
  46. }
  47. // no need to make this configurable, right now at least
  48. accountReg.EnabledCredentialTypes = []string{
  49. "passphrase",
  50. "certfp",
  51. }
  52. }
  53. return accountReg
  54. }
  55. // accHandler parses the ACC command.
  56. func accHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  57. subcommand := strings.ToLower(msg.Params[0])
  58. if subcommand == "register" {
  59. return accRegisterHandler(server, client, msg)
  60. } else if subcommand == "verify" {
  61. client.Notice(client.t("VERIFY is not yet implemented"))
  62. } else {
  63. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "ACC", msg.Params[0], client.t("Unknown subcommand"))
  64. }
  65. return false
  66. }
  67. // removeFailedAccRegisterData removes the data created by ACC REGISTER if the account creation fails early.
  68. func removeFailedAccRegisterData(store *buntdb.DB, account string) {
  69. // error is ignored here, we can't do much about it anyways
  70. store.Update(func(tx *buntdb.Tx) error {
  71. tx.Delete(fmt.Sprintf(keyAccountExists, account))
  72. tx.Delete(fmt.Sprintf(keyAccountRegTime, account))
  73. tx.Delete(fmt.Sprintf(keyAccountCredentials, account))
  74. return nil
  75. })
  76. }
  77. // accRegisterHandler parses the ACC REGISTER command.
  78. func accRegisterHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  79. // make sure reg is enabled
  80. if !server.accountRegistration.Enabled {
  81. client.Send(nil, server.name, ERR_REG_UNSPECIFIED_ERROR, client.nick, "*", client.t("Account registration is disabled"))
  82. return false
  83. }
  84. // clients can't reg new accounts if they're already logged in
  85. if client.LoggedIntoAccount() {
  86. if server.accountRegistration.AllowMultiplePerConnection {
  87. client.LogoutOfAccount()
  88. } else {
  89. client.Send(nil, server.name, ERR_REG_UNSPECIFIED_ERROR, client.nick, "*", client.t("You're already logged into an account"))
  90. return false
  91. }
  92. }
  93. // get and sanitise account name
  94. account := strings.TrimSpace(msg.Params[1])
  95. casefoldedAccount, err := CasefoldName(account)
  96. // probably don't need explicit check for "*" here... but let's do it anyway just to make sure
  97. if err != nil || msg.Params[1] == "*" {
  98. client.Send(nil, server.name, ERR_REG_UNSPECIFIED_ERROR, client.nick, account, client.t("Account name is not valid"))
  99. return false
  100. }
  101. // check whether account exists
  102. // do it all in one write tx to prevent races
  103. err = server.store.Update(func(tx *buntdb.Tx) error {
  104. accountKey := fmt.Sprintf(keyAccountExists, casefoldedAccount)
  105. _, err := tx.Get(accountKey)
  106. if err != buntdb.ErrNotFound {
  107. //TODO(dan): if account verified key doesn't exist account is not verified, calc the maximum time without verification and expire and continue if need be
  108. client.Send(nil, server.name, ERR_ACCOUNT_ALREADY_EXISTS, client.nick, account, client.t("Account already exists"))
  109. return errAccountCreation
  110. }
  111. registeredTimeKey := fmt.Sprintf(keyAccountRegTime, casefoldedAccount)
  112. tx.Set(accountKey, "1", nil)
  113. tx.Set(fmt.Sprintf(keyAccountName, casefoldedAccount), account, nil)
  114. tx.Set(registeredTimeKey, strconv.FormatInt(time.Now().Unix(), 10), nil)
  115. return nil
  116. })
  117. // account could not be created and relevant numerics have been dispatched, abort
  118. if err != nil {
  119. if err != errAccountCreation {
  120. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "ACC", "REGISTER", client.t("Could not register"))
  121. log.Println("Could not save registration initial data:", err.Error())
  122. }
  123. return false
  124. }
  125. // account didn't already exist, continue with account creation and dispatching verification (if required)
  126. callback := strings.ToLower(msg.Params[2])
  127. var callbackNamespace, callbackValue string
  128. if callback == "*" {
  129. callbackNamespace = "*"
  130. } else if strings.Contains(callback, ":") {
  131. callbackValues := strings.SplitN(callback, ":", 2)
  132. callbackNamespace, callbackValue = callbackValues[0], callbackValues[1]
  133. } else {
  134. callbackNamespace = server.accountRegistration.EnabledCallbacks[0]
  135. callbackValue = callback
  136. }
  137. // ensure the callback namespace is valid
  138. // need to search callback list, maybe look at using a map later?
  139. var callbackValid bool
  140. for _, name := range server.accountRegistration.EnabledCallbacks {
  141. if callbackNamespace == name {
  142. callbackValid = true
  143. }
  144. }
  145. if !callbackValid {
  146. client.Send(nil, server.name, ERR_REG_INVALID_CALLBACK, client.nick, account, callbackNamespace, client.t("Callback namespace is not supported"))
  147. removeFailedAccRegisterData(server.store, casefoldedAccount)
  148. return false
  149. }
  150. // get credential type/value
  151. var credentialType, credentialValue string
  152. if len(msg.Params) > 4 {
  153. credentialType = strings.ToLower(msg.Params[3])
  154. credentialValue = msg.Params[4]
  155. } else if len(msg.Params) == 4 {
  156. credentialType = "passphrase" // default from the spec
  157. credentialValue = msg.Params[3]
  158. } else {
  159. client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, msg.Command, client.t("Not enough parameters"))
  160. removeFailedAccRegisterData(server.store, casefoldedAccount)
  161. return false
  162. }
  163. // ensure the credential type is valid
  164. var credentialValid bool
  165. for _, name := range server.accountRegistration.EnabledCredentialTypes {
  166. if credentialType == name {
  167. credentialValid = true
  168. }
  169. }
  170. if credentialType == "certfp" && client.certfp == "" {
  171. client.Send(nil, server.name, ERR_REG_INVALID_CRED_TYPE, client.nick, credentialType, callbackNamespace, client.t("You are not using a TLS certificate"))
  172. removeFailedAccRegisterData(server.store, casefoldedAccount)
  173. return false
  174. }
  175. if !credentialValid {
  176. client.Send(nil, server.name, ERR_REG_INVALID_CRED_TYPE, client.nick, credentialType, callbackNamespace, client.t("Credential type is not supported"))
  177. removeFailedAccRegisterData(server.store, casefoldedAccount)
  178. return false
  179. }
  180. // store details
  181. err = server.store.Update(func(tx *buntdb.Tx) error {
  182. // certfp special lookup key
  183. if credentialType == "certfp" {
  184. assembledKeyCertToAccount := fmt.Sprintf(keyCertToAccount, client.certfp)
  185. // make sure certfp doesn't already exist because that'd be silly
  186. _, err := tx.Get(assembledKeyCertToAccount)
  187. if err != buntdb.ErrNotFound {
  188. return errCertfpAlreadyExists
  189. }
  190. tx.Set(assembledKeyCertToAccount, casefoldedAccount, nil)
  191. }
  192. // make creds
  193. var creds AccountCredentials
  194. // always set passphrase salt
  195. creds.PassphraseSalt, err = passwd.NewSalt()
  196. if err != nil {
  197. return fmt.Errorf("Could not create passphrase salt: %s", err.Error())
  198. }
  199. if credentialType == "certfp" {
  200. creds.Certificate = client.certfp
  201. } else if credentialType == "passphrase" {
  202. creds.PassphraseHash, err = server.passwords.GenerateFromPassword(creds.PassphraseSalt, credentialValue)
  203. if err != nil {
  204. return fmt.Errorf("Could not hash password: %s", err)
  205. }
  206. }
  207. credText, err := json.Marshal(creds)
  208. if err != nil {
  209. return fmt.Errorf("Could not marshal creds: %s", err)
  210. }
  211. tx.Set(fmt.Sprintf(keyAccountCredentials, account), string(credText), nil)
  212. return nil
  213. })
  214. // details could not be stored and relevant numerics have been dispatched, abort
  215. if err != nil {
  216. errMsg := "Could not register"
  217. if err == errCertfpAlreadyExists {
  218. errMsg = "An account already exists for your certificate fingerprint"
  219. }
  220. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "ACC", "REGISTER", errMsg)
  221. log.Println("Could not save registration creds:", err.Error())
  222. removeFailedAccRegisterData(server.store, casefoldedAccount)
  223. return false
  224. }
  225. // automatically complete registration
  226. if callbackNamespace == "*" {
  227. err = server.store.Update(func(tx *buntdb.Tx) error {
  228. tx.Set(fmt.Sprintf(keyAccountVerified, casefoldedAccount), "1", nil)
  229. // load acct info inside store tx
  230. account := ClientAccount{
  231. Name: strings.TrimSpace(msg.Params[1]),
  232. RegisteredAt: time.Now(),
  233. Clients: []*Client{client},
  234. }
  235. //TODO(dan): Consider creating ircd-wide account adding/removing/affecting lock for protecting access to these sorts of variables
  236. server.accounts[casefoldedAccount] = &account
  237. client.account = &account
  238. client.Send(nil, server.name, RPL_REGISTRATION_SUCCESS, client.nick, account.Name, client.t("Account created"))
  239. client.Send(nil, server.name, RPL_LOGGEDIN, client.nick, client.nickMaskString, account.Name, fmt.Sprintf(client.t("You are now logged in as %s"), account.Name))
  240. client.Send(nil, server.name, RPL_SASLSUCCESS, client.nick, client.t("Authentication successful"))
  241. server.snomasks.Send(sno.LocalAccounts, fmt.Sprintf(ircfmt.Unescape("Account registered $c[grey][$r%s$c[grey]] by $c[grey][$r%s$c[grey]]"), account.Name, client.nickMaskString))
  242. return nil
  243. })
  244. if err != nil {
  245. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, "ACC", "REGISTER", client.t("Could not register"))
  246. log.Println("Could not save verification confirmation (*):", err.Error())
  247. removeFailedAccRegisterData(server.store, casefoldedAccount)
  248. return false
  249. }
  250. return false
  251. }
  252. // dispatch callback
  253. client.Notice(fmt.Sprintf("We should dispatch a real callback here to %s:%s", callbackNamespace, callbackValue))
  254. return false
  255. }