mirror of
https://mau.dev/maunium/synapse.git
synced 2024-11-11 20:42:23 +01:00
Add shared secret auth into register v2 and switch the script over.
This commit is contained in:
parent
c5bf0343e8
commit
70a84f17f3
3 changed files with 61 additions and 13 deletions
|
@ -33,10 +33,9 @@ def request_registration(user, password, server_location, shared_secret):
|
||||||
).hexdigest()
|
).hexdigest()
|
||||||
|
|
||||||
data = {
|
data = {
|
||||||
"user": user,
|
"username": user,
|
||||||
"password": password,
|
"password": password,
|
||||||
"mac": mac,
|
"mac": mac,
|
||||||
"type": "org.matrix.login.shared_secret",
|
|
||||||
}
|
}
|
||||||
|
|
||||||
server_location = server_location.rstrip("/")
|
server_location = server_location.rstrip("/")
|
||||||
|
@ -44,7 +43,7 @@ def request_registration(user, password, server_location, shared_secret):
|
||||||
print "Sending registration request..."
|
print "Sending registration request..."
|
||||||
|
|
||||||
req = urllib2.Request(
|
req = urllib2.Request(
|
||||||
"%s/_matrix/client/api/v1/register" % (server_location,),
|
"%s/_matrix/client/v2_alpha/register" % (server_location,),
|
||||||
data=json.dumps(data),
|
data=json.dumps(data),
|
||||||
headers={'Content-Type': 'application/json'}
|
headers={'Content-Type': 'application/json'}
|
||||||
)
|
)
|
||||||
|
|
|
@ -60,9 +60,11 @@ class LoginType(object):
|
||||||
EMAIL_IDENTITY = u"m.login.email.identity"
|
EMAIL_IDENTITY = u"m.login.email.identity"
|
||||||
RECAPTCHA = u"m.login.recaptcha"
|
RECAPTCHA = u"m.login.recaptcha"
|
||||||
APPLICATION_SERVICE = u"m.login.application_service"
|
APPLICATION_SERVICE = u"m.login.application_service"
|
||||||
|
|
||||||
|
# Only for C/S API v1
|
||||||
SHARED_SECRET = u"org.matrix.login.shared_secret"
|
SHARED_SECRET = u"org.matrix.login.shared_secret"
|
||||||
|
|
||||||
HIDDEN_TYPES = [APPLICATION_SERVICE, SHARED_SECRET]
|
HIDDEN_TYPES = [APPLICATION_SERVICE]
|
||||||
|
|
||||||
|
|
||||||
class EventTypes(object):
|
class EventTypes(object):
|
||||||
|
|
|
@ -22,6 +22,19 @@ from synapse.http.servlet import RestServlet
|
||||||
from ._base import client_v2_pattern, parse_request_allow_empty
|
from ._base import client_v2_pattern, parse_request_allow_empty
|
||||||
|
|
||||||
import logging
|
import logging
|
||||||
|
import hmac
|
||||||
|
from hashlib import sha1
|
||||||
|
from synapse.util.async import run_on_reactor
|
||||||
|
|
||||||
|
|
||||||
|
# We ought to be using hmac.compare_digest() but on older pythons it doesn't
|
||||||
|
# exist. It's a _really minor_ security flaw to use plain string comparison
|
||||||
|
# because the timing attack is so obscured by all the other code here it's
|
||||||
|
# unlikely to make much difference
|
||||||
|
if hasattr(hmac, "compare_digest"):
|
||||||
|
compare_digest = hmac.compare_digest
|
||||||
|
else:
|
||||||
|
compare_digest = lambda a, b: a == b
|
||||||
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
logger = logging.getLogger(__name__)
|
||||||
|
@ -39,19 +52,30 @@ class RegisterRestServlet(RestServlet):
|
||||||
|
|
||||||
@defer.inlineCallbacks
|
@defer.inlineCallbacks
|
||||||
def on_POST(self, request):
|
def on_POST(self, request):
|
||||||
|
yield run_on_reactor()
|
||||||
|
|
||||||
body = parse_request_allow_empty(request)
|
body = parse_request_allow_empty(request)
|
||||||
|
|
||||||
authed, result = yield self.auth_handler.check_auth([
|
is_using_shared_secret = False
|
||||||
[LoginType.RECAPTCHA],
|
is_application_server = False
|
||||||
[LoginType.EMAIL_IDENTITY, LoginType.RECAPTCHA],
|
|
||||||
[LoginType.APPLICATION_SERVICE]
|
|
||||||
], body, self.hs.get_ip_from_request(request))
|
|
||||||
|
|
||||||
if not authed:
|
if 'mac' in body:
|
||||||
defer.returnValue((401, result))
|
# Check registration-specific shared secret auth
|
||||||
|
if 'username' not in body:
|
||||||
|
raise SynapseError(400, "", Codes.MISSING_PARAM)
|
||||||
|
self._check_shared_secret_auth(
|
||||||
|
body['username'], body['mac']
|
||||||
|
)
|
||||||
|
is_using_shared_secret = True
|
||||||
|
else:
|
||||||
|
authed, result = yield self.auth_handler.check_auth([
|
||||||
|
[LoginType.RECAPTCHA],
|
||||||
|
[LoginType.EMAIL_IDENTITY, LoginType.RECAPTCHA],
|
||||||
|
[LoginType.APPLICATION_SERVICE]
|
||||||
|
], body, self.hs.get_ip_from_request(request))
|
||||||
|
|
||||||
is_application_server = LoginType.APPLICATION_SERVICE in result
|
if not authed:
|
||||||
is_using_shared_secret = LoginType.SHARED_SECRET in result
|
defer.returnValue((401, result))
|
||||||
|
|
||||||
can_register = (
|
can_register = (
|
||||||
not self.hs.config.disable_registration
|
not self.hs.config.disable_registration
|
||||||
|
@ -81,6 +105,29 @@ class RegisterRestServlet(RestServlet):
|
||||||
def on_OPTIONS(self, _):
|
def on_OPTIONS(self, _):
|
||||||
return 200, {}
|
return 200, {}
|
||||||
|
|
||||||
|
def _check_shared_secret_auth(self, username, mac):
|
||||||
|
if not self.hs.config.registration_shared_secret:
|
||||||
|
raise SynapseError(400, "Shared secret registration is not enabled")
|
||||||
|
|
||||||
|
user = username.encode("utf-8")
|
||||||
|
|
||||||
|
# str() because otherwise hmac complains that 'unicode' does not
|
||||||
|
# have the buffer interface
|
||||||
|
got_mac = str(mac)
|
||||||
|
|
||||||
|
want_mac = hmac.new(
|
||||||
|
key=self.hs.config.registration_shared_secret,
|
||||||
|
msg=user,
|
||||||
|
digestmod=sha1,
|
||||||
|
).hexdigest()
|
||||||
|
|
||||||
|
if compare_digest(want_mac, got_mac):
|
||||||
|
return True
|
||||||
|
else:
|
||||||
|
raise SynapseError(
|
||||||
|
403, "HMAC incorrect",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def register_servlets(hs, http_server):
|
def register_servlets(hs, http_server):
|
||||||
RegisterRestServlet(hs).register(http_server)
|
RegisterRestServlet(hs).register(http_server)
|
||||||
|
|
Loading…
Reference in a new issue