Compare commits
No commits in common. "master" and "0.3" have entirely different histories.
31 changed files with 608 additions and 682 deletions
|
@ -1,4 +0,0 @@
|
||||||
SECRET_KEY=ldskjflkdsnejnjsdnf
|
|
||||||
DEBUG=False
|
|
||||||
ENABLE_DEBUG_LOG=True
|
|
||||||
ALLOWED_HOSTS=localhost,.ungleich.ch
|
|
4
.gitignore
vendored
4
.gitignore
vendored
|
@ -1,6 +1,2 @@
|
||||||
.idea/
|
|
||||||
venv/
|
venv/
|
||||||
db.sqlite3
|
db.sqlite3
|
||||||
aux/
|
|
||||||
__pycache__/
|
|
||||||
static/
|
|
||||||
|
|
384
README.md
384
README.md
|
@ -1,87 +1,33 @@
|
||||||
# ungleichotp #
|
# ungleich-otp
|
||||||
|
|
||||||
ungleich-otp is a full blown authentication and authorisation service
|
ungleich-otp is a full blown authentication and authorisation service
|
||||||
made for micro services.
|
made for micro services.
|
||||||
|
|
||||||
The basic idea is that every micro service has a (long term) triple
|
The basic idea is that every micro service has a (long term) seed and
|
||||||
constisting of (name, realm, seed) and creates time based tokens.
|
creates time based tokens (See python pyotp, RFC4226, RFC6238).
|
||||||
|
|
||||||
This basically revamps Kerberos in a simple way into the web area.
|
## Setup instructions ##
|
||||||
|
|
||||||
ungleichotp has been created and is maintained by [ungleich](https://ungleich.ch/).
|
|
||||||
|
|
||||||
Related documentation:
|
|
||||||
|
|
||||||
* [Python pyotp](https://pyotp.readthedocs.io/)
|
|
||||||
* [RFC6238, TOTP](https://tools.ietf.org/html/rfc6238)
|
|
||||||
* [RFC4120, Kerberos](https://tools.ietf.org/html/rfc4120)
|
|
||||||
|
|
||||||
## Overview ##
|
|
||||||
|
|
||||||
This repository the reference implementation of the ungleichotp server.
|
|
||||||
|
|
||||||
|
|
||||||
## Using the ungleichotpclient ##
|
|
||||||
|
|
||||||
The client can be used to test the ungleich-otp-server.
|
|
||||||
|
|
||||||
All client commands need the parameters --auth-name and --auth-realm.
|
|
||||||
Also either --auth-seed or --auth-token needs to be specified.
|
|
||||||
```
|
|
||||||
python manage.py ungleichotpclient create \
|
|
||||||
--server-url https://otp.ungleich.ch/ungleichotp/
|
|
||||||
--auth-name admin
|
|
||||||
--auth-realm ungleich-admin
|
|
||||||
[--auth-seed THESEEDFORADMIN]
|
|
||||||
[--auth-token THECURRENTTOKEN]
|
|
||||||
```
|
|
||||||
|
|
||||||
### Creating new users
|
|
||||||
|
|
||||||
```
|
|
||||||
--name USERNAME --realm REALMOFUSER create
|
|
||||||
```
|
|
||||||
|
|
||||||
The seed is randomly created.
|
|
||||||
|
|
||||||
### Listing users
|
|
||||||
|
|
||||||
```
|
|
||||||
list
|
|
||||||
```
|
|
||||||
|
|
||||||
### Deleting users
|
|
||||||
|
|
||||||
```
|
|
||||||
--name USERNAME --realm REALMOFUSER delete
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
### Verifying a token is correct
|
|
||||||
|
|
||||||
Verify using:
|
|
||||||
|
|
||||||
```
|
|
||||||
--name USERNAME --realm REALMOFUSER --token TOKENTOBEVERIFIED verify
|
|
||||||
```
|
|
||||||
|
|
||||||
You can also verify using a seed:
|
|
||||||
|
|
||||||
```
|
|
||||||
--name USERNAME --realm REALMOFUSER --seed SEEDOFUSER verify
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Server Setup instructions ##
|
|
||||||
|
|
||||||
This is a standard django project and thus can be easily setup using
|
This is a standard django project and thus can be easily setup using
|
||||||
|
|
||||||
```
|
```
|
||||||
pip install -r requirements.txt
|
pip install -r requirements.txt
|
||||||
python manage.py createsuperuser
|
```
|
||||||
|
|
||||||
|
To bootstrap the application, you need your very first trusted seed to
|
||||||
|
access the application. You can generate it using
|
||||||
|
|
||||||
|
```
|
||||||
|
to be filled in
|
||||||
|
```
|
||||||
|
|
||||||
|
After that, you can run the application using
|
||||||
|
|
||||||
|
```
|
||||||
python manage.py runserver
|
python manage.py runserver
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The usual instructions on how to setup an https proxy should be followed.
|
||||||
|
|
||||||
## Realms ##
|
## Realms ##
|
||||||
|
|
||||||
|
@ -100,122 +46,262 @@ All micro services that are trusted to authenticate another micro
|
||||||
service should have an entry in the ungleich-auth realm, which allows
|
service should have an entry in the ungleich-auth realm, which allows
|
||||||
them to verify a token of somebody else.
|
them to verify a token of somebody else.
|
||||||
|
|
||||||
```
|
|
||||||
| Name | Capabilities |
|
| Name | Capabilities |
|
||||||
|------------------+--------------------------------------------|
|
|------------------+--------------------------------------------|
|
||||||
| ungleich-admin | authenticate, create, delete, list, update |
|
| ungleich-admin | authenticate, create, delete, list, update |
|
||||||
| ungleich-auth | authenticate, verify |
|
| ungleich-auth | authenticate |
|
||||||
| all other realms | authenticate |
|
| all other realms | NO ACCESS |
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Verify using http POST ##
|
## Usage: REST ##
|
||||||
|
|
||||||
Post a JSON object to the server at /ungleichotp/verify/ that
|
- Use an existing token to connect to the service
|
||||||
contains the following elements:
|
- All REST based messages: JSON
|
||||||
|
|
||||||
|
|
||||||
|
### POST: /ungleichotp/verify
|
||||||
|
|
||||||
Request JSON object:
|
Request JSON object:
|
||||||
|
|
||||||
```
|
```
|
||||||
{
|
{
|
||||||
auth_name: "auth-name",
|
version: "1",
|
||||||
auth_realm: "auth-realm",
|
name: "your-name",
|
||||||
auth_token: "current time based token",
|
realm: "your-realm",
|
||||||
name: "name that wants to be authenticated",
|
token: "current time based token",
|
||||||
realm: "realm that wants to be authenticated",
|
verifyname: "name that wants to be authenticated",
|
||||||
token: "token that wants to be authenticated"
|
verifyrealm: "realm that wants to be authenticated",
|
||||||
|
verifytoken: "token that wants to be authenticated",
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
Response JSON object:
|
Response JSON object:
|
||||||
|
|
||||||
Either HTTP 200 with
|
Either
|
||||||
```
|
```
|
||||||
{
|
{
|
||||||
status: "OK",
|
status: "OK",
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
OR return code 403:
|
OR
|
||||||
|
|
||||||
* If token for authenticating is wrong, you get
|
|
||||||
|
|
||||||
```
|
```
|
||||||
{"detail":"Incorrect authentication credentials."}
|
{
|
||||||
|
status: "FAIL",
|
||||||
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
* If token that is being verified is wrong, you get
|
### POST /register
|
||||||
|
|
||||||
|
Register a new seed. Returns an app ID.
|
||||||
|
|
||||||
|
Request JSON object:
|
||||||
|
|
||||||
```
|
```
|
||||||
{"detail":"You do not have permission to perform this action."}
|
{
|
||||||
|
version: "1",
|
||||||
|
appuuid: "your-app-uuid",
|
||||||
|
token: "current time based token",
|
||||||
|
username: "user this app belongs to",
|
||||||
|
appname: "name of your web app"
|
||||||
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
## Authorize the request ##
|
Response JSON object:
|
||||||
|
|
||||||
From the ungleichotp-server, you get a validated information that a
|
```
|
||||||
name on a realm authenticated successfully. The associated permissions
|
{
|
||||||
("authorization") is application specific and needs to be decided by
|
status: "OK",
|
||||||
your application.
|
appuuid: "UUID of your app",
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
OR
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
status: "FAIL",
|
||||||
|
error: "Reason for failure"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### POST /app/register
|
||||||
|
|
||||||
|
Register a new app. Returns an app ID.
|
||||||
|
|
||||||
|
Request JSON object:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
version: "1",
|
||||||
|
appuuid: "your-app-uuid",
|
||||||
|
token: "current time based token",
|
||||||
|
username: "user this app belongs to",
|
||||||
|
appname: "name of your web app"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Response JSON object:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
status: "OK",
|
||||||
|
appuuid: "UUID of your app",
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
OR
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
status: "FAIL",
|
||||||
|
error: "Reason for failure"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### GET /app
|
||||||
|
|
||||||
|
List all registered apps for the current user.
|
||||||
|
|
||||||
|
Request JSON object:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
version: "1",
|
||||||
|
appuuid: "your-app-uuid",
|
||||||
|
token: "current time based token"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Response JSON object:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
status: "OK",
|
||||||
|
apps: [
|
||||||
|
{
|
||||||
|
name: "name of your web app"
|
||||||
|
appuuid: "UUID of your app",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "name of your second web app"
|
||||||
|
appuuid: "UUID of your second app",
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### GET /app/UUID
|
||||||
|
|
||||||
|
Get seed for APP to be used as a token
|
||||||
|
|
||||||
|
Request JSON object:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
version: "1",
|
||||||
|
appuuid: "your-app-uuid",
|
||||||
|
token: "current time based token"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Response JSON object:
|
||||||
|
|
||||||
|
```
|
||||||
|
{
|
||||||
|
status: "OK",
|
||||||
|
seed: "seed of your app"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
## Limitations ##
|
## Usage: OTP
|
||||||
|
|
||||||
|
The seeds that you receive can be used for TOTP to authenticate your
|
||||||
|
apps.
|
||||||
|
|
||||||
|
|
||||||
|
## Database
|
||||||
|
|
||||||
|
The database saves a list of appuuids with their seeds and the user
|
||||||
|
assignments as well as whether the appuuid might use the BUS interface.
|
||||||
|
|
||||||
|
Fields:
|
||||||
|
|
||||||
|
- appuuid (a random UUID)
|
||||||
|
- appname (name chosen by the user)
|
||||||
|
- username (who this appuuid belongs to)
|
||||||
|
- seed (a random base32 string)
|
||||||
|
- trusted (boolean, whether app is allowed to use the BUS and the
|
||||||
|
verify method)
|
||||||
|
|
||||||
|
|
||||||
|
## Environment / Configuration
|
||||||
|
|
||||||
|
- POSTGRES_USERNAME
|
||||||
|
- SECRET_KEY -- random
|
||||||
|
|
||||||
|
## Random notes / stuff
|
||||||
|
|
||||||
|
django.db.backends.postgresql
|
||||||
|
django.contrib.admin
|
||||||
|
|
||||||
|
```
|
||||||
|
DATABASES = {
|
||||||
|
'default': {
|
||||||
|
'ENGINE': 'django.db.backends.postgresql',
|
||||||
|
'NAME': 'mydatabase',
|
||||||
|
'USER': 'mydatabaseuser',
|
||||||
|
'PASSWORD': 'mypassword',
|
||||||
|
'HOST': '127.0.0.1',
|
||||||
|
'PORT': '5432',
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Custom auth
|
||||||
|
|
||||||
|
```
|
||||||
|
from django.contrib.auth.models import User
|
||||||
|
from rest_framework import authentication
|
||||||
|
from rest_framework import exceptions
|
||||||
|
|
||||||
|
class ExampleAuthentication(authentication.BaseAuthentication):
|
||||||
|
def authenticate(self, request):
|
||||||
|
username = request.META.get('X_USERNAME')
|
||||||
|
if not username:
|
||||||
|
return None
|
||||||
|
|
||||||
|
try:
|
||||||
|
user = User.objects.get(username=username)
|
||||||
|
except User.DoesNotExist:
|
||||||
|
raise exceptions.AuthenticationFailed('No such user')
|
||||||
|
|
||||||
|
return (user, None)
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Custom user
|
||||||
|
|
||||||
|
Don’t forget to point AUTH_USER_MODEL to it. Do this before creating any migrations or running manage.py migrate for the first time.
|
||||||
|
|
||||||
* Name, Realm and seed are hard coded to 128 bytes length.
|
|
||||||
This can be changed, if necessary.
|
|
||||||
* Only python3 support for ungleichotp
|
|
||||||
|
|
||||||
|
|
||||||
## TODOs
|
## TODOs
|
||||||
|
|
||||||
- [x] (server) Serialize / input request
|
- [x] serialize / input request
|
||||||
- [x] (server) Make seed read only
|
- [x] Make seed read only
|
||||||
- [x] (server) Implement registering of new entries
|
- [ ] Remove hard coded JSON
|
||||||
- [x] (server) OTPSerializer: allow to read seed for admin
|
- [ ] Implement registering of new entries
|
||||||
- [x] (server) Implement deleting entry
|
- [ ] Use Custom authentication (?) - needs to have a user
|
||||||
- [x] (server) Include verify in ModelSerializer
|
- [ ] Maybe we map name+realm == User (?)
|
||||||
- [x] (server) Map name+realm == User (?)
|
|
||||||
- name == name@realm
|
- name == name@realm
|
||||||
- password is used for admin login (?)
|
- no password
|
||||||
- seed
|
- seed
|
||||||
- custom auth method
|
- custom auth method
|
||||||
- [n] (server) Try to fake username for django based on name+realm (?)
|
- [ ] Implement creating new "User"
|
||||||
- No need
|
- by POST / Model based
|
||||||
- [n] (server) maybe overwrite get_username()
|
- [ ] Implement deleting "User"
|
||||||
- No need
|
- [ ] OTPSerializer: allow to read seed for admin
|
||||||
- [x] (server) Use Custom authentication - needs to have a user!
|
|
||||||
- [x] (server) Implement creating new "User" by POST / Model based
|
|
||||||
- [n] (server) Remove hard coded JSON in /verify (no - good enough for the moment)
|
|
||||||
- [x] (server) Fully rename server from ungleichotp to ungleichotpserver
|
|
||||||
- [x] (security) Ensure that only the right realms can verify
|
|
||||||
- [x] (security) Ensure that only the right realms can manage
|
|
||||||
- [ ] (doc) Add proper documentation
|
|
||||||
- [ ] (server) Add tests for verify
|
|
||||||
- [ ] (server) Add tests for authentication
|
|
||||||
- [ ] (server) move totp constants into settings
|
|
||||||
- [ ] (server) move field lengths into settings
|
|
||||||
- [ ] (server) Document how admin vs. rest works
|
|
||||||
- [ ] (server, client) Make settings adjustable by environment - k8s/docker compatible
|
|
||||||
- [ ] (server, client) Read DB from outside (?) (fallback to sqlite)
|
|
||||||
- [x] (client) Establish auth using urllib
|
|
||||||
- [ ] (client) Bootstrap Django + DRF (including an object for CRUD)
|
|
||||||
- [ ] (client) Add custom authentication / remote auth
|
|
||||||
- [ ] (client) Show case: any realm vs. specific realm
|
|
||||||
- [x] (library) Write a "client library" that can use ungleichotp
|
|
||||||
- [x] (library) extract generic parts from server
|
|
||||||
- [ ] (library) upload to pypi
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Changelog
|
|
||||||
|
|
||||||
### 0.8, 2019-02-08
|
|
||||||
|
|
||||||
* Verify needed to call super()
|
|
||||||
|
|
||||||
### 0.6, 2018-11-18
|
|
||||||
|
|
||||||
* Reuse TokenSerializer for VerifySerializer logic
|
|
||||||
|
|
||||||
### 0.5, 2018-11-18
|
|
||||||
|
|
||||||
* Require authentication on all rest endpoints by token
|
|
||||||
|
|
2
logs/.gitignore
vendored
2
logs/.gitignore
vendored
|
@ -1,2 +0,0 @@
|
||||||
*
|
|
||||||
!.gitignore
|
|
122
nameko1.py
Normal file
122
nameko1.py
Normal file
|
@ -0,0 +1,122 @@
|
||||||
|
from nameko.events import EventDispatcher, event_handler
|
||||||
|
from nameko.rpc import rpc
|
||||||
|
|
||||||
|
import json
|
||||||
|
from nameko.web.handlers import http
|
||||||
|
from nameko.timer import timer
|
||||||
|
from nameko.rpc import rpc, RpcProxy
|
||||||
|
|
||||||
|
import pyotp
|
||||||
|
|
||||||
|
|
||||||
|
class ServiceA:
|
||||||
|
""" Event dispatching service. """
|
||||||
|
name = "service_a"
|
||||||
|
|
||||||
|
dispatch = EventDispatcher()
|
||||||
|
|
||||||
|
@rpc
|
||||||
|
def dispatching_method(self, payload):
|
||||||
|
self.dispatch("event_type", payload)
|
||||||
|
|
||||||
|
|
||||||
|
class ServiceB:
|
||||||
|
""" Event listening service. """
|
||||||
|
name = "service_b"
|
||||||
|
|
||||||
|
@event_handler("service_a", "event_type")
|
||||||
|
def handle_event(self, payload):
|
||||||
|
print("service b received:", payload)
|
||||||
|
|
||||||
|
|
||||||
|
class HttpService:
|
||||||
|
name = "http_service"
|
||||||
|
|
||||||
|
@http('GET', '/get/<int:value>')
|
||||||
|
def get_method(self, request, value):
|
||||||
|
return json.dumps({'value': value})
|
||||||
|
|
||||||
|
@http('POST', '/post')
|
||||||
|
def do_post(self, request):
|
||||||
|
return u"received: {}".format(request.get_data(as_text=True))
|
||||||
|
|
||||||
|
@http('GET,PUT,POST,DELETE', '/multi')
|
||||||
|
def do_multi(self, request):
|
||||||
|
return request.method
|
||||||
|
|
||||||
|
class ServiceTimer:
|
||||||
|
name ="servicetimer"
|
||||||
|
|
||||||
|
dispatch = EventDispatcher()
|
||||||
|
|
||||||
|
@timer(interval=3)
|
||||||
|
def ping(self):
|
||||||
|
# method executed every second
|
||||||
|
print("pong")
|
||||||
|
self.dispatch("ping", "pong")
|
||||||
|
|
||||||
|
|
||||||
|
class LoggerService:
|
||||||
|
name = "loggerpoint"
|
||||||
|
|
||||||
|
@event_handler("servicetimer", "ping")
|
||||||
|
def handle_event(self, payload):
|
||||||
|
print("timing receive in logger: ", payload)
|
||||||
|
|
||||||
|
|
||||||
|
class OTPClient:
|
||||||
|
name = "generic-service-using-otp"
|
||||||
|
|
||||||
|
totp = pyotp.TOTP("JBSWY3DPEHPK3PXP")
|
||||||
|
|
||||||
|
otp = RpcProxy("otp")
|
||||||
|
|
||||||
|
@timer(interval=3)
|
||||||
|
def auth(self):
|
||||||
|
token = self.totp.now()
|
||||||
|
print("Verifying using {}".format(token))
|
||||||
|
print("Auth1: {}".format(self.otp.verify("app1", token)))
|
||||||
|
print("Auth-wrongapp: {}".format(self.otp.verify("app2", token)))
|
||||||
|
print("Auth-noapp: {}".format(self.otp.verify("appNOAPP", token)))
|
||||||
|
|
||||||
|
class OTPSeed:
|
||||||
|
name = "generic-service-using-otp-seed"
|
||||||
|
|
||||||
|
otp = RpcProxy("otp")
|
||||||
|
|
||||||
|
@timer(interval=10)
|
||||||
|
def auth(self):
|
||||||
|
seed = self.otp.get_seed("app1")
|
||||||
|
totp = pyotp.TOTP(seed)
|
||||||
|
token = totp.now()
|
||||||
|
|
||||||
|
res = self.otp.verify("app1", token)
|
||||||
|
|
||||||
|
print("seed / token / res {} {} {}".format(seed, token, res))
|
||||||
|
|
||||||
|
class OTPService:
|
||||||
|
name = "otp"
|
||||||
|
|
||||||
|
otp_tokens = {
|
||||||
|
'app1': 'JBSWY3DPEHPK3PXP',
|
||||||
|
'app2': 'AIEIU3IAAA'
|
||||||
|
}
|
||||||
|
|
||||||
|
@rpc
|
||||||
|
def get_seed(self, appid):
|
||||||
|
if appid in self.otp_tokens:
|
||||||
|
return self.otp_tokens[appid]
|
||||||
|
else:
|
||||||
|
return "NO SEED"
|
||||||
|
|
||||||
|
@rpc
|
||||||
|
def verify(self, appid, token):
|
||||||
|
if not appid in self.otp_tokens:
|
||||||
|
return "NO SUCH APP {}".format(appid)
|
||||||
|
|
||||||
|
totp = pyotp.TOTP(self.otp_tokens[appid])
|
||||||
|
|
||||||
|
if totp.verify(token, valid_window=3):
|
||||||
|
return "OK"
|
||||||
|
else:
|
||||||
|
return "FAIL"
|
|
@ -1,10 +0,0 @@
|
||||||
from django.contrib import admin
|
|
||||||
|
|
||||||
from django.contrib import admin
|
|
||||||
from django.contrib.auth.admin import UserAdmin
|
|
||||||
from .models import OTPSeed
|
|
||||||
|
|
||||||
from django.contrib import admin
|
|
||||||
from django.contrib.auth.admin import UserAdmin
|
|
||||||
|
|
||||||
admin.site.register(OTPSeed)
|
|
|
@ -1,97 +0,0 @@
|
||||||
from django.conf import settings
|
|
||||||
from django.core.management.base import BaseCommand
|
|
||||||
|
|
||||||
import pyotp
|
|
||||||
import json
|
|
||||||
import urllib.request
|
|
||||||
import urllib.error
|
|
||||||
import sys
|
|
||||||
|
|
||||||
class Command(BaseCommand):
|
|
||||||
help = 'Access ungleichotp'
|
|
||||||
|
|
||||||
def add_arguments(self, parser):
|
|
||||||
parser.add_argument('--server-url', required=True)
|
|
||||||
|
|
||||||
# For creating / verifying
|
|
||||||
parser.add_argument('--name', help="Name to create/verify")
|
|
||||||
parser.add_argument('--realm', help="Realm for create/verify")
|
|
||||||
parser.add_argument('--token', help="Token for create/verify")
|
|
||||||
parser.add_argument('--seed', help="Seed for create/verify")
|
|
||||||
|
|
||||||
# How to authenticate against ungleich-otp
|
|
||||||
parser.add_argument('--auth-name', required=True, help="Name for auth")
|
|
||||||
parser.add_argument('--auth-realm', required=True, help="Realm for auth")
|
|
||||||
parser.add_argument('--auth-token', help="Token for auth")
|
|
||||||
parser.add_argument('--auth-seed', help="Seed for auth")
|
|
||||||
|
|
||||||
parser.add_argument('command', choices=['create',
|
|
||||||
'delete',
|
|
||||||
'list',
|
|
||||||
'verify'], help='Action to take')
|
|
||||||
|
|
||||||
def handle(self, *args, **options):
|
|
||||||
command_to_verb = { 'create': 'POST',
|
|
||||||
'delete': 'DELETE',
|
|
||||||
'list': 'GET' }
|
|
||||||
|
|
||||||
method = 'POST'
|
|
||||||
|
|
||||||
if not options['auth_token']:
|
|
||||||
if not options['auth_seed']:
|
|
||||||
print("Either token or seed are required")
|
|
||||||
sys.exit(1)
|
|
||||||
else:
|
|
||||||
options['auth_token'] = pyotp.TOTP(options['auth_seed']).now()
|
|
||||||
|
|
||||||
to_send = {}
|
|
||||||
|
|
||||||
# Our credentials
|
|
||||||
to_send['auth_token'] = options['auth_token']
|
|
||||||
to_send['auth_name'] = options['auth_name']
|
|
||||||
to_send['auth_realm'] = options['auth_realm']
|
|
||||||
|
|
||||||
if options['command'] in ["list", "get"]:
|
|
||||||
method = 'GET'
|
|
||||||
|
|
||||||
if options['command'] in ["create", "verify"]:
|
|
||||||
if not options['name'] or not options['realm']:
|
|
||||||
print("Need to specify --name and --realm")
|
|
||||||
sys.exit(1)
|
|
||||||
|
|
||||||
if options['command'] == "verify" and not options['token']:
|
|
||||||
if not options['seed']:
|
|
||||||
print("Need to specify --token or --seed for verify")
|
|
||||||
sys.exit(1)
|
|
||||||
else:
|
|
||||||
options['token'] = pyotp.TOTP(options['seed']).now()
|
|
||||||
|
|
||||||
|
|
||||||
# Client credentials to be verified
|
|
||||||
to_send['name'] = options['name']
|
|
||||||
to_send['realm'] = options['realm']
|
|
||||||
to_send['token'] = options['token']
|
|
||||||
|
|
||||||
if options['command'] == "verify":
|
|
||||||
options['server_url'] = "{}verify/".format(options['server_url'])
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
self.rest_send(options['server_url'], to_send, method=method)
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def rest_send(serverurl, to_send, method='POST'):
|
|
||||||
data = json.dumps(to_send).encode("utf-8")
|
|
||||||
|
|
||||||
req = urllib.request.Request(url=serverurl,
|
|
||||||
data=data,
|
|
||||||
headers={'Content-Type': 'application/json'},
|
|
||||||
method=method)
|
|
||||||
|
|
||||||
f = urllib.request.urlopen(req)
|
|
||||||
|
|
||||||
if f.status == 200:
|
|
||||||
print("Response: {}: {}".format(f.msg, f.read()))
|
|
||||||
return True
|
|
||||||
|
|
||||||
return False
|
|
|
@ -1,46 +0,0 @@
|
||||||
# Generated by Django 2.1.3 on 2018-11-17 22:01
|
|
||||||
|
|
||||||
import django.contrib.auth.models
|
|
||||||
import django.contrib.auth.validators
|
|
||||||
from django.db import migrations, models
|
|
||||||
import django.utils.timezone
|
|
||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
|
||||||
|
|
||||||
initial = True
|
|
||||||
|
|
||||||
dependencies = [
|
|
||||||
('auth', '0009_alter_user_last_name_max_length'),
|
|
||||||
]
|
|
||||||
|
|
||||||
operations = [
|
|
||||||
migrations.CreateModel(
|
|
||||||
name='OTPSeed',
|
|
||||||
fields=[
|
|
||||||
('password', models.CharField(max_length=128, verbose_name='password')),
|
|
||||||
('last_login', models.DateTimeField(blank=True, null=True, verbose_name='last login')),
|
|
||||||
('is_superuser', models.BooleanField(default=False, help_text='Designates that this user has all permissions without explicitly assigning them.', verbose_name='superuser status')),
|
|
||||||
('username', models.CharField(error_messages={'unique': 'A user with that username already exists.'}, help_text='Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only.', max_length=150, unique=True, validators=[django.contrib.auth.validators.UnicodeUsernameValidator()], verbose_name='username')),
|
|
||||||
('first_name', models.CharField(blank=True, max_length=30, verbose_name='first name')),
|
|
||||||
('last_name', models.CharField(blank=True, max_length=150, verbose_name='last name')),
|
|
||||||
('email', models.EmailField(blank=True, max_length=254, verbose_name='email address')),
|
|
||||||
('is_staff', models.BooleanField(default=False, help_text='Designates whether the user can log into this admin site.', verbose_name='staff status')),
|
|
||||||
('is_active', models.BooleanField(default=True, help_text='Designates whether this user should be treated as active. Unselect this instead of deleting accounts.', verbose_name='active')),
|
|
||||||
('date_joined', models.DateTimeField(default=django.utils.timezone.now, verbose_name='date joined')),
|
|
||||||
('id', models.AutoField(primary_key=True, serialize=False)),
|
|
||||||
('name', models.CharField(max_length=128)),
|
|
||||||
('realm', models.CharField(max_length=128)),
|
|
||||||
('seed', models.CharField(max_length=128)),
|
|
||||||
('groups', models.ManyToManyField(blank=True, help_text='The groups this user belongs to. A user will get all permissions granted to each of their groups.', related_name='user_set', related_query_name='user', to='auth.Group', verbose_name='groups')),
|
|
||||||
('user_permissions', models.ManyToManyField(blank=True, help_text='Specific permissions for this user.', related_name='user_set', related_query_name='user', to='auth.Permission', verbose_name='user permissions')),
|
|
||||||
],
|
|
||||||
managers=[
|
|
||||||
('objects', django.contrib.auth.models.UserManager()),
|
|
||||||
],
|
|
||||||
),
|
|
||||||
migrations.AlterUniqueTogether(
|
|
||||||
name='otpseed',
|
|
||||||
unique_together={('name', 'realm')},
|
|
||||||
),
|
|
||||||
]
|
|
|
@ -1,57 +0,0 @@
|
||||||
from django.db import models
|
|
||||||
from django.contrib.auth.models import AbstractUser
|
|
||||||
from rest_framework import exceptions
|
|
||||||
from rest_framework import authentication
|
|
||||||
import json
|
|
||||||
import logging
|
|
||||||
import pyotp
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
|
||||||
|
|
||||||
|
|
||||||
class OTPSeed(AbstractUser):
|
|
||||||
id = models.AutoField(primary_key=True)
|
|
||||||
name = models.CharField(max_length=128)
|
|
||||||
realm = models.CharField(max_length=128)
|
|
||||||
seed = models.CharField(max_length=128)
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
unique_together = (('name', 'realm'),)
|
|
||||||
|
|
||||||
def save(self, *args, **kwargs):
|
|
||||||
"""
|
|
||||||
inject username to ensure it stays unique / is setup at all
|
|
||||||
"""
|
|
||||||
if not self.is_superuser:
|
|
||||||
self.username = "{}@{}".format(self.name, self.realm)
|
|
||||||
else:
|
|
||||||
self.name = self.username
|
|
||||||
self.realm = "ungleich-admin"
|
|
||||||
self.seed = pyotp.random_base32()
|
|
||||||
|
|
||||||
super().save(*args, **kwargs)
|
|
||||||
|
|
||||||
def __str__(self):
|
|
||||||
return "'{}'@{} -- {}".format(self.name, self.realm, self.username)
|
|
||||||
|
|
||||||
from otpauth.serializer import TokenSerializer
|
|
||||||
|
|
||||||
class OTPAuthentication(authentication.BaseAuthentication):
|
|
||||||
def authenticate(self, request):
|
|
||||||
logger.debug("in authenticate {}".format(json.dumps(request.data)))
|
|
||||||
serializer = TokenSerializer(data=request.data)
|
|
||||||
|
|
||||||
if serializer.is_valid():
|
|
||||||
instance, token = serializer.save()
|
|
||||||
else:
|
|
||||||
logger.error("serializer is invalid")
|
|
||||||
raise exceptions.AuthenticationFailed()
|
|
||||||
|
|
||||||
# not dealing with admin realm -> can only be auth [see serializer]
|
|
||||||
if not instance.realm == "ungleich-admin":
|
|
||||||
if not request.path == "/ungleichotp/verify/":
|
|
||||||
logger.debug("request.path is not /ungleichotp/verify/")
|
|
||||||
raise exceptions.AuthenticationFailed()
|
|
||||||
|
|
||||||
logger.debug("AUTH DONE: {} - {}".format(request.path, instance))
|
|
||||||
return (instance, token)
|
|
|
@ -1,87 +0,0 @@
|
||||||
import logging
|
|
||||||
import pyotp
|
|
||||||
import otpauth
|
|
||||||
from rest_framework import serializers, exceptions
|
|
||||||
from otpauth.models import OTPSeed
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
|
||||||
|
|
||||||
# For accessing / modifying the data -- currently unused
|
|
||||||
class OTPSerializer(serializers.ModelSerializer):
|
|
||||||
class Meta:
|
|
||||||
model = OTPSeed
|
|
||||||
fields = ('name', 'realm', 'seed')
|
|
||||||
read_only_fields = ('seed',)
|
|
||||||
|
|
||||||
def create(self, validated_data):
|
|
||||||
validated_data['seed'] = pyotp.random_base32()
|
|
||||||
return OTPSeed.objects.create(**validated_data)
|
|
||||||
|
|
||||||
class TokenSerializer(serializers.Serializer):
|
|
||||||
""" This class is mainly / only used for authentication"""
|
|
||||||
|
|
||||||
auth_name = serializers.CharField(max_length=128)
|
|
||||||
auth_token = serializers.CharField(max_length=128)
|
|
||||||
auth_realm = serializers.CharField(max_length=128)
|
|
||||||
|
|
||||||
token_name = 'auth_token'
|
|
||||||
name_name = 'auth_name'
|
|
||||||
realm_name = 'auth_realm'
|
|
||||||
|
|
||||||
def save(self):
|
|
||||||
auth_token = self.validated_data.get(self.token_name)
|
|
||||||
auth_name = self.validated_data.get(self.name_name)
|
|
||||||
auth_realm = self.validated_data.get(self.realm_name)
|
|
||||||
|
|
||||||
# only 2 special realms can login
|
|
||||||
# if not auth_realm in ["ungleich-admin", "ungleich-auth" ]:
|
|
||||||
# logger.error("Auth-realm is neither ungleich-admin "
|
|
||||||
# "nor ungleich-auth".format()
|
|
||||||
# )
|
|
||||||
# raise exceptions.AuthenticationFailed()
|
|
||||||
|
|
||||||
logger.debug("auth: [{}]{}@'{}' {} + {})".format(
|
|
||||||
self.name_name, auth_name, auth_realm,
|
|
||||||
auth_token, self.validated_data
|
|
||||||
))
|
|
||||||
|
|
||||||
# 1. Verify that the connection might authenticate
|
|
||||||
try:
|
|
||||||
logger.debug("Checking in db for name:{} & realm:{}".format(
|
|
||||||
auth_name, auth_realm
|
|
||||||
))
|
|
||||||
db_instance = otpauth.models.OTPSeed.objects.get(name=auth_name, realm=auth_realm)
|
|
||||||
except (OTPSeed.MultipleObjectsReturned, OTPSeed.DoesNotExist):
|
|
||||||
logger.error("OTPSeed name: {}, realm: {} does not exist".format(
|
|
||||||
auth_name, auth_realm
|
|
||||||
))
|
|
||||||
raise exceptions.AuthenticationFailed()
|
|
||||||
logger.debug("Found seed: {}".format(db_instance.seed))
|
|
||||||
totp = pyotp.TOTP(db_instance.seed)
|
|
||||||
logger.debug("calculated token = {}".format(totp.now()))
|
|
||||||
|
|
||||||
if not totp.verify(auth_token, valid_window=3):
|
|
||||||
logger.error("totp not verified")
|
|
||||||
raise exceptions.AuthenticationFailed()
|
|
||||||
|
|
||||||
return (db_instance, auth_token)
|
|
||||||
|
|
||||||
# For verifying somebody else's token
|
|
||||||
class VerifySerializer(TokenSerializer):
|
|
||||||
name = serializers.CharField(max_length=128)
|
|
||||||
token = serializers.CharField(max_length=128)
|
|
||||||
realm = serializers.CharField(max_length=128)
|
|
||||||
|
|
||||||
token_name = 'token'
|
|
||||||
name_name = 'name'
|
|
||||||
realm_name = 'realm'
|
|
||||||
|
|
||||||
def save(self):
|
|
||||||
auth_realm = self.validated_data.get("auth_realm")
|
|
||||||
|
|
||||||
if not auth_realm == "ungleich-auth":
|
|
||||||
logger.error("Auth-realm is not ungleich-auth")
|
|
||||||
raise exceptions.AuthenticationFailed()
|
|
||||||
|
|
||||||
# Do the authentication part
|
|
||||||
super().save()
|
|
|
@ -1,34 +0,0 @@
|
||||||
from django.shortcuts import render
|
|
||||||
|
|
||||||
from rest_framework import viewsets, serializers
|
|
||||||
from rest_framework.decorators import action
|
|
||||||
from rest_framework.response import Response
|
|
||||||
|
|
||||||
from django.http import JsonResponse
|
|
||||||
from otpauth.serializer import VerifySerializer, OTPSerializer, TokenSerializer
|
|
||||||
from otpauth.models import OTPSeed
|
|
||||||
import json
|
|
||||||
import logging
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
|
||||||
|
|
||||||
|
|
||||||
class OTPVerifyViewSet(viewsets.ModelViewSet):
|
|
||||||
serializer_class = OTPSerializer
|
|
||||||
queryset = OTPSeed.objects.all()
|
|
||||||
|
|
||||||
@action(detail=False, methods=['post'])
|
|
||||||
def verify(self, request):
|
|
||||||
"""the standard serializer above already verified that
|
|
||||||
(name, realm, token) is valid.
|
|
||||||
|
|
||||||
Now we inspect the payload and return ok,
|
|
||||||
if they also verify
|
|
||||||
"""
|
|
||||||
logger.debug("in verify {}".format(json.dumps(request.data)))
|
|
||||||
serializer = VerifySerializer(data=request.data)
|
|
||||||
if serializer.is_valid():
|
|
||||||
serializer.save()
|
|
||||||
return Response({'status': 'OK'})
|
|
||||||
|
|
||||||
return JsonResponse(serializer.errors, status=400)
|
|
22
requests/gendata.py
Normal file
22
requests/gendata.py
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
import json
|
||||||
|
import pyotp
|
||||||
|
|
||||||
|
totp=pyotp.TOTP("PZKBPTHDGSLZBKIZ")
|
||||||
|
|
||||||
|
request={}
|
||||||
|
request['name'] = "info@ungleich.ch"
|
||||||
|
request['verifyname'] = request['name']
|
||||||
|
|
||||||
|
request['token'] = totp.now()
|
||||||
|
request['verifytoken'] = request['token']
|
||||||
|
|
||||||
|
request['realm'] = "ungleich-admin"
|
||||||
|
request['verifyrealm'] = request['realm']
|
||||||
|
|
||||||
|
print(json.dumps(request))
|
||||||
|
|
||||||
|
data = json.dumps(request)
|
||||||
|
|
||||||
|
with open("outdata", "w") as fd:
|
||||||
|
fd.write(data)
|
||||||
|
fd.write("\n")
|
|
@ -1,10 +1,6 @@
|
||||||
pyotp>=2.2.6
|
pyotp>=2.2.6
|
||||||
django==2.2.16
|
django>=2.1.2
|
||||||
djangorestframework
|
djangorestframework
|
||||||
python-decouple>=3.1
|
|
||||||
|
|
||||||
# DB
|
|
||||||
psycopg2>=2.8,<2.9
|
|
||||||
|
|
||||||
# Recommended
|
# Recommended
|
||||||
markdown
|
markdown
|
||||||
|
|
|
@ -3,7 +3,7 @@ import os
|
||||||
import sys
|
import sys
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'ungleichotpserver.settings')
|
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'ungleichotp.settings')
|
||||||
try:
|
try:
|
||||||
from django.core.management import execute_from_command_line
|
from django.core.management import execute_from_command_line
|
||||||
except ImportError as exc:
|
except ImportError as exc:
|
9
ungleichotp/otpauth/admin.py
Normal file
9
ungleichotp/otpauth/admin.py
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
from django.contrib import admin
|
||||||
|
|
||||||
|
# Register your models here.
|
||||||
|
|
||||||
|
from django.contrib import admin
|
||||||
|
|
||||||
|
from .models import OTPSeed
|
||||||
|
|
||||||
|
admin.site.register(OTPSeed)
|
27
ungleichotp/otpauth/migrations/0001_initial.py
Normal file
27
ungleichotp/otpauth/migrations/0001_initial.py
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
# Generated by Django 2.1.3 on 2018-11-17 09:01
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
initial = True
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='OTPSeed',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(primary_key=True, serialize=False)),
|
||||||
|
('name', models.CharField(max_length=128)),
|
||||||
|
('realm', models.CharField(max_length=128)),
|
||||||
|
('seed', models.CharField(max_length=128)),
|
||||||
|
],
|
||||||
|
),
|
||||||
|
migrations.AlterUniqueTogether(
|
||||||
|
name='otpseed',
|
||||||
|
unique_together={('name', 'realm')},
|
||||||
|
),
|
||||||
|
]
|
0
otpauth/management/__init__.py → ungleichotp/otpauth/migrations/__init__.py
Executable file → Normal file
0
otpauth/management/__init__.py → ungleichotp/otpauth/migrations/__init__.py
Executable file → Normal file
29
ungleichotp/otpauth/models.py
Normal file
29
ungleichotp/otpauth/models.py
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
from django.db import models
|
||||||
|
from django.contrib.auth.models import AbstractUser
|
||||||
|
|
||||||
|
# Create your models here.
|
||||||
|
class OTPSeed(models.Model):
|
||||||
|
id = models.AutoField(primary_key=True)
|
||||||
|
name = models.CharField(max_length=128)
|
||||||
|
realm = models.CharField(max_length=128)
|
||||||
|
seed = models.CharField(max_length=128)
|
||||||
|
|
||||||
|
class Meta:
|
||||||
|
unique_together = (('name', 'realm'),)
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return "'{}'@{}".format(self.name, self.realm)
|
||||||
|
|
||||||
|
# class OTPUser(AbstractUser, OTPSeed):
|
||||||
|
# @classmethod
|
||||||
|
# def get_username(cls):
|
||||||
|
# pass
|
||||||
|
|
||||||
|
# @classmethod
|
||||||
|
# def check_password(cls, raw_password):
|
||||||
|
# """ receives a time based token"""
|
||||||
|
# pass
|
||||||
|
|
||||||
|
# @classmethod
|
||||||
|
# def has_usable_password(cls):
|
||||||
|
# pass
|
63
ungleichotp/otpauth/serializer.py
Normal file
63
ungleichotp/otpauth/serializer.py
Normal file
|
@ -0,0 +1,63 @@
|
||||||
|
from rest_framework import serializers, exceptions
|
||||||
|
from otpauth.models import OTPSeed
|
||||||
|
import pyotp
|
||||||
|
import otpauth
|
||||||
|
|
||||||
|
class OTPSerializer(serializers.ModelSerializer):
|
||||||
|
class Meta:
|
||||||
|
model = OTPSeed
|
||||||
|
fields = ('name', 'realm', 'seed')
|
||||||
|
read_only_fields = ('seed',)
|
||||||
|
|
||||||
|
|
||||||
|
class VerifySerializer(serializers.Serializer):
|
||||||
|
name = serializers.CharField(max_length=128)
|
||||||
|
token = serializers.CharField(max_length=128)
|
||||||
|
realm = serializers.CharField(max_length=128)
|
||||||
|
|
||||||
|
verifyname = serializers.CharField(max_length=128)
|
||||||
|
verifytoken = serializers.CharField(max_length=128)
|
||||||
|
verifyrealm = serializers.CharField(max_length=128)
|
||||||
|
|
||||||
|
def create(self, validated_data):
|
||||||
|
print("all going to be verified - CREATE")
|
||||||
|
token_in = validated_data.get('token')
|
||||||
|
name_in = validated_data.get('name')
|
||||||
|
realm_in = validated_data.get('realm')
|
||||||
|
|
||||||
|
verifytoken = validated_data.get('verifytoken')
|
||||||
|
verifyname = validated_data.get('verifyname')
|
||||||
|
verifyrealm = validated_data.get('verifyrealm')
|
||||||
|
|
||||||
|
# 1. Verify that the connection might authenticate
|
||||||
|
|
||||||
|
try:
|
||||||
|
db_instance = otpauth.models.OTPSeed.objects.get(name=name_in, realm=realm_in)
|
||||||
|
except (OTPSeed.MultipleObjectsReturned, OTPSeed.DoesNotExist):
|
||||||
|
raise exceptions.AuthenticationFailed()
|
||||||
|
|
||||||
|
print("serializer found object")
|
||||||
|
|
||||||
|
totp = pyotp.TOTP(db_instance.seed)
|
||||||
|
|
||||||
|
if not totp.verify(token_in, valid_window=3):
|
||||||
|
raise exceptions.AuthenticationFailed()
|
||||||
|
|
||||||
|
|
||||||
|
# 2. Verify the requested data
|
||||||
|
|
||||||
|
try:
|
||||||
|
verifyinstance = otpauth.models.OTPSeed.objects.get(name=verifyname, realm=verifyrealm)
|
||||||
|
except (OTPSeed.MultipleObjectsReturned, OTPSeed.DoesNotExist):
|
||||||
|
raise exceptions.PermissionDenied()
|
||||||
|
|
||||||
|
totp = pyotp.TOTP(verifyinstance.seed)
|
||||||
|
|
||||||
|
if not totp.verify(verifytoken, valid_window=3):
|
||||||
|
raise exceptions.PermissionDenied()
|
||||||
|
|
||||||
|
print("All verified!")
|
||||||
|
return verifyinstance
|
||||||
|
|
||||||
|
def verify(self, validated_data):
|
||||||
|
print("all going to be verified - AAAAAAAA")
|
43
ungleichotp/otpauth/views.py
Normal file
43
ungleichotp/otpauth/views.py
Normal file
|
@ -0,0 +1,43 @@
|
||||||
|
from django.shortcuts import render
|
||||||
|
|
||||||
|
from rest_framework import viewsets
|
||||||
|
from rest_framework.parsers import JSONParser
|
||||||
|
from rest_framework.decorators import action
|
||||||
|
from rest_framework.response import Response
|
||||||
|
|
||||||
|
|
||||||
|
from django.http import HttpResponse, JsonResponse
|
||||||
|
|
||||||
|
from otpauth.serializer import VerifySerializer, OTPSerializer
|
||||||
|
from otpauth.models import OTPSeed
|
||||||
|
|
||||||
|
class OTPVerifyViewSet(viewsets.ModelViewSet):
|
||||||
|
serializer_class = OTPSerializer
|
||||||
|
queryset = OTPSeed.objects.all()
|
||||||
|
|
||||||
|
@action(detail=False, methods=['post'])
|
||||||
|
def verify(self, request):
|
||||||
|
serializer = VerifySerializer(data=request.data)
|
||||||
|
if serializer.is_valid():
|
||||||
|
print(serializer)
|
||||||
|
return Response({'status': 'OK'})
|
||||||
|
|
||||||
|
return JsonResponse(serializer.errors, status=400)
|
||||||
|
|
||||||
|
|
||||||
|
class VerifyViewSet(viewsets.ViewSet):
|
||||||
|
serializer_class = VerifySerializer
|
||||||
|
|
||||||
|
def create(self, request):
|
||||||
|
data = JSONParser().parse(request)
|
||||||
|
serializer = VerifySerializer(data=data)
|
||||||
|
if serializer.is_valid():
|
||||||
|
print("is valid")
|
||||||
|
print(serializer)
|
||||||
|
#serializer.save()
|
||||||
|
return JsonResponse(serializer.data, status=201)
|
||||||
|
return JsonResponse(serializer.errors, status=400)
|
||||||
|
|
||||||
|
|
||||||
|
def get_queryset(self):
|
||||||
|
return []
|
0
otpauth/management/commands/__init__.py → ungleichotp/ungleichotp/__init__.py
Executable file → Normal file
0
otpauth/management/commands/__init__.py → ungleichotp/ungleichotp/__init__.py
Executable file → Normal file
|
@ -10,8 +10,6 @@ For the full list of settings and their values, see
|
||||||
https://docs.djangoproject.com/en/2.1/ref/settings/
|
https://docs.djangoproject.com/en/2.1/ref/settings/
|
||||||
"""
|
"""
|
||||||
|
|
||||||
from decouple import config, Csv
|
|
||||||
|
|
||||||
import os
|
import os
|
||||||
|
|
||||||
# Build paths inside the project like this: os.path.join(BASE_DIR, ...)
|
# Build paths inside the project like this: os.path.join(BASE_DIR, ...)
|
||||||
|
@ -22,9 +20,13 @@ BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
|
||||||
# See https://docs.djangoproject.com/en/2.1/howto/deployment/checklist/
|
# See https://docs.djangoproject.com/en/2.1/howto/deployment/checklist/
|
||||||
|
|
||||||
# SECURITY WARNING: keep the secret key used in production secret!
|
# SECURITY WARNING: keep the secret key used in production secret!
|
||||||
SECRET_KEY = config('SECRET_KEY')
|
SECRET_KEY = 'h^*!&u7yaac_6t02kk4de%$aagp6_j#+_wnw3@rqu6os0tlv#r'
|
||||||
|
|
||||||
# SECURITY WARNING: don't run with debug turned on in production!
|
# SECURITY WARNING: don't run with debug turned on in production!
|
||||||
|
DEBUG = True
|
||||||
|
|
||||||
|
ALLOWED_HOSTS = []
|
||||||
|
|
||||||
|
|
||||||
# Application definition
|
# Application definition
|
||||||
|
|
||||||
|
@ -49,7 +51,7 @@ MIDDLEWARE = [
|
||||||
'django.middleware.clickjacking.XFrameOptionsMiddleware',
|
'django.middleware.clickjacking.XFrameOptionsMiddleware',
|
||||||
]
|
]
|
||||||
|
|
||||||
ROOT_URLCONF = 'ungleichotpserver.urls'
|
ROOT_URLCONF = 'ungleichotp.urls'
|
||||||
|
|
||||||
TEMPLATES = [
|
TEMPLATES = [
|
||||||
{
|
{
|
||||||
|
@ -67,7 +69,18 @@ TEMPLATES = [
|
||||||
},
|
},
|
||||||
]
|
]
|
||||||
|
|
||||||
WSGI_APPLICATION = 'ungleichotpserver.wsgi.application'
|
WSGI_APPLICATION = 'ungleichotp.wsgi.application'
|
||||||
|
|
||||||
|
|
||||||
|
# Database
|
||||||
|
# https://docs.djangoproject.com/en/2.1/ref/settings/#databases
|
||||||
|
|
||||||
|
DATABASES = {
|
||||||
|
'default': {
|
||||||
|
'ENGINE': 'django.db.backends.sqlite3',
|
||||||
|
'NAME': os.path.join(BASE_DIR, 'db.sqlite3'),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
# Password validation
|
# Password validation
|
||||||
|
@ -89,22 +102,6 @@ AUTH_PASSWORD_VALIDATORS = [
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
# Customer user model so that we can use our tokens for authentication!
|
|
||||||
AUTH_USER_MODEL = 'otpauth.OTPSeed'
|
|
||||||
|
|
||||||
# Custom authentication so we can use tokens ourselves
|
|
||||||
REST_FRAMEWORK = {
|
|
||||||
'DEFAULT_AUTHENTICATION_CLASSES': (
|
|
||||||
'rest_framework.authentication.SessionAuthentication',
|
|
||||||
'otpauth.models.OTPAuthentication'
|
|
||||||
),
|
|
||||||
'DEFAULT_PERMISSION_CLASSES': (
|
|
||||||
'rest_framework.permissions.IsAuthenticated',
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# Internationalization
|
# Internationalization
|
||||||
# https://docs.djangoproject.com/en/2.1/topics/i18n/
|
# https://docs.djangoproject.com/en/2.1/topics/i18n/
|
||||||
|
|
||||||
|
@ -123,72 +120,3 @@ USE_TZ = True
|
||||||
# https://docs.djangoproject.com/en/2.1/howto/static-files/
|
# https://docs.djangoproject.com/en/2.1/howto/static-files/
|
||||||
|
|
||||||
STATIC_URL = '/static/'
|
STATIC_URL = '/static/'
|
||||||
|
|
||||||
DEBUG_DATABASES = {
|
|
||||||
'default': {
|
|
||||||
'ENGINE': 'django.db.backends.sqlite3',
|
|
||||||
'NAME': os.path.join(BASE_DIR, 'db.sqlite3'),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
DEBUG = config('DEBUG', False, cast=bool)
|
|
||||||
ALLOWED_HOSTS = config('ALLOWED_HOSTS', default='localhost', cast=Csv())
|
|
||||||
|
|
||||||
DATABASES = {
|
|
||||||
'default': {
|
|
||||||
'ENGINE': 'django.db.backends.postgresql_psycopg2',
|
|
||||||
'NAME': 'app',
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Static files
|
|
||||||
BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
|
|
||||||
STATIC_ROOT = os.path.join(BASE_DIR, "static")
|
|
||||||
STATIC_URL = '/static/'
|
|
||||||
|
|
||||||
LOGGING = {
|
|
||||||
'disable_existing_loggers': False,
|
|
||||||
'version': 1,
|
|
||||||
'formatters': {
|
|
||||||
'standard': {
|
|
||||||
'format': '%(asctime)s %(levelname)s %(name)s: %(message)s'
|
|
||||||
}
|
|
||||||
},
|
|
||||||
'handlers': {
|
|
||||||
'default': {
|
|
||||||
'level': 'DEBUG',
|
|
||||||
'class': 'logging.handlers.RotatingFileHandler',
|
|
||||||
'filename': 'logs/debug.log',
|
|
||||||
'maxBytes': 1024*1024*5,
|
|
||||||
'backupCount': 10,
|
|
||||||
'formatter': 'standard',
|
|
||||||
},
|
|
||||||
'console': {
|
|
||||||
'class': 'logging.StreamHandler',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
if config('ENABLE_DEBUG_LOG', cast=bool, default=False):
|
|
||||||
loggers_dict = {}
|
|
||||||
modules_to_log_list = config(
|
|
||||||
'MODULES_TO_LOG', default='django', cast=Csv()
|
|
||||||
)
|
|
||||||
for custom_module in modules_to_log_list:
|
|
||||||
logger_item = {
|
|
||||||
custom_module: {
|
|
||||||
'handlers': ['default'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
'propagate': True
|
|
||||||
}
|
|
||||||
}
|
|
||||||
loggers_dict.update(logger_item)
|
|
||||||
|
|
||||||
LOGGING['loggers'] = loggers_dict
|
|
||||||
|
|
||||||
|
|
||||||
if "DEBUG" in os.environ:
|
|
||||||
DEBUG = True
|
|
||||||
ALLOWED_HOSTS = []
|
|
||||||
|
|
||||||
DATABASES = DEBUG_DATABASES
|
|
37
ungleichotp/ungleichotp/urls.py
Normal file
37
ungleichotp/ungleichotp/urls.py
Normal file
|
@ -0,0 +1,37 @@
|
||||||
|
"""ungleichotp URL Configuration
|
||||||
|
|
||||||
|
The `urlpatterns` list routes URLs to views. For more information please see:
|
||||||
|
https://docs.djangoproject.com/en/2.1/topics/http/urls/
|
||||||
|
Examples:
|
||||||
|
Function views
|
||||||
|
1. Add an import: from my_app import views
|
||||||
|
2. Add a URL to urlpatterns: path('', views.home, name='home')
|
||||||
|
Class-based views
|
||||||
|
1. Add an import: from other_app.views import Home
|
||||||
|
2. Add a URL to urlpatterns: path('', Home.as_view(), name='home')
|
||||||
|
Including another URLconf
|
||||||
|
1. Import the include() function: from django.urls import include, path
|
||||||
|
2. Add a URL to urlpatterns: path('blog/', include('blog.urls'))
|
||||||
|
"""
|
||||||
|
|
||||||
|
|
||||||
|
from django.contrib import admin
|
||||||
|
from django.urls import path
|
||||||
|
from django.conf.urls import url, include
|
||||||
|
from django.contrib.auth.models import User
|
||||||
|
from rest_framework import routers, serializers, viewsets
|
||||||
|
from otpauth.models import OTPSeed
|
||||||
|
from otpauth.views import OTPVerifyViewSet, VerifyViewSet
|
||||||
|
|
||||||
|
|
||||||
|
router = routers.DefaultRouter()
|
||||||
|
router.register(r'ungleichotp', VerifyViewSet, basename='ungleichotp')
|
||||||
|
router.register(r'ungleichotpv2', OTPVerifyViewSet, basename='ungleichotpv2')
|
||||||
|
|
||||||
|
print(router.urls)
|
||||||
|
|
||||||
|
urlpatterns = [
|
||||||
|
path('admin/', admin.site.urls),
|
||||||
|
url(r'^', include(router.urls)),
|
||||||
|
url(r'^api-auth/', include('rest_framework.urls', namespace='rest_framework'))
|
||||||
|
]
|
|
@ -11,6 +11,6 @@ import os
|
||||||
|
|
||||||
from django.core.wsgi import get_wsgi_application
|
from django.core.wsgi import get_wsgi_application
|
||||||
|
|
||||||
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'ungleichotpserver.settings')
|
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'ungleichotp.settings')
|
||||||
|
|
||||||
application = get_wsgi_application()
|
application = get_wsgi_application()
|
|
@ -1,81 +0,0 @@
|
||||||
import pyotp
|
|
||||||
import json
|
|
||||||
import urllib.request
|
|
||||||
import urllib.error
|
|
||||||
|
|
||||||
class UngleichOTPClient(object):
|
|
||||||
token_name = 'token'
|
|
||||||
name_name = 'name'
|
|
||||||
realm_name = 'realm'
|
|
||||||
|
|
||||||
def __init__(self, name, realm, seed, serverurl):
|
|
||||||
self.name = name
|
|
||||||
self.realm = realm
|
|
||||||
self.seed = seed
|
|
||||||
self.serverurl = serverurl
|
|
||||||
|
|
||||||
def verify(self, name, realm, token):
|
|
||||||
to_send = {}
|
|
||||||
|
|
||||||
# Client credentials to be verified
|
|
||||||
to_send['verifyname'] = name
|
|
||||||
to_send['verifyrealm'] = realm
|
|
||||||
to_send['verifytoken'] = token
|
|
||||||
|
|
||||||
# Our credentials
|
|
||||||
to_send['token'] = pyotp.TOTP(self.seed).now()
|
|
||||||
to_send['name'] = self.name
|
|
||||||
to_send['realm'] = self.realm
|
|
||||||
|
|
||||||
data = json.dumps(to_send).encode("utf-8")
|
|
||||||
|
|
||||||
req = urllib.request.Request(url=self.serverurl,
|
|
||||||
data=data,
|
|
||||||
headers={'Content-Type': 'application/json'},
|
|
||||||
method='POST')
|
|
||||||
|
|
||||||
f = urllib.request.urlopen(req)
|
|
||||||
|
|
||||||
if f.status == 200:
|
|
||||||
return True
|
|
||||||
|
|
||||||
return False
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
import argparse
|
|
||||||
import os
|
|
||||||
import sys
|
|
||||||
|
|
||||||
parser = argparse.ArgumentParser(description='ungleichotp-client')
|
|
||||||
parser.add_argument('-n', '--name', help="Name (for verification)", required=True)
|
|
||||||
parser.add_argument('-r', '--realm', help="Realm (for verification)", required=True)
|
|
||||||
|
|
||||||
g = parser.add_mutually_exclusive_group(required=True)
|
|
||||||
g.add_argument('--token', help="Token (for verification)")
|
|
||||||
g.add_argument('--seed', help="Seed (for verification)")
|
|
||||||
|
|
||||||
args = parser.parse_args(sys.argv[1:])
|
|
||||||
|
|
||||||
|
|
||||||
UNGLEICHOTP={}
|
|
||||||
for env in ['UNGLEICHOTPREALM', 'UNGLEICHOTPNAME', 'UNGLEICHOTPSEED', 'UNGLEICHOTPSERVER' ]:
|
|
||||||
if not env in os.environ:
|
|
||||||
raise Exception("Required environment variable missing: {}".format(env))
|
|
||||||
|
|
||||||
client = UngleichOTPClient(os.environ['UNGLEICHOTPNAME'],
|
|
||||||
os.environ['UNGLEICHOTPREALM'],
|
|
||||||
os.environ['UNGLEICHOTPSEED'],
|
|
||||||
os.environ['UNGLEICHOTPSERVER'])
|
|
||||||
|
|
||||||
|
|
||||||
if args.seed:
|
|
||||||
token = pyotp.TOTP(args.seed).now()
|
|
||||||
else:
|
|
||||||
token = args.token
|
|
||||||
|
|
||||||
try:
|
|
||||||
if client.verify(args.name, args.realm, token) == True:
|
|
||||||
print("Verify ok")
|
|
||||||
except urllib.error.HTTPError as e:
|
|
||||||
print("Failed to verify: {}".format(e))
|
|
|
@ -1,14 +0,0 @@
|
||||||
from django.contrib import admin
|
|
||||||
from django.urls import path
|
|
||||||
from django.conf.urls import url, include
|
|
||||||
from rest_framework import routers
|
|
||||||
from otpauth.views import OTPVerifyViewSet
|
|
||||||
|
|
||||||
router = routers.DefaultRouter()
|
|
||||||
router.register(r'ungleichotp', OTPVerifyViewSet, basename='ungleichotp')
|
|
||||||
|
|
||||||
urlpatterns = [
|
|
||||||
path('admin/', admin.site.urls),
|
|
||||||
url(r'^', include(router.urls)),
|
|
||||||
url(r'^api-auth/', include('rest_framework.urls', namespace='rest_framework'))
|
|
||||||
]
|
|
Loading…
Reference in a new issue