Rev 585 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
2 | daniel-mar | 1 | <?php |
2 | |||
3 | /* |
||
4 | * OIDplus 2.0 |
||
511 | daniel-mar | 5 | * Copyright 2019 - 2021 Daniel Marschall, ViaThinkSoft |
2 | daniel-mar | 6 | * |
7 | * Licensed under the Apache License, Version 2.0 (the "License"); |
||
8 | * you may not use this file except in compliance with the License. |
||
9 | * You may obtain a copy of the License at |
||
10 | * |
||
11 | * http://www.apache.org/licenses/LICENSE-2.0 |
||
12 | * |
||
13 | * Unless required by applicable law or agreed to in writing, software |
||
14 | * distributed under the License is distributed on an "AS IS" BASIS, |
||
15 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||
16 | * See the License for the specific language governing permissions and |
||
17 | * limitations under the License. |
||
18 | */ |
||
19 | |||
511 | daniel-mar | 20 | if (!defined('INSIDE_OIDPLUS')) die(); |
21 | |||
571 | daniel-mar | 22 | class OIDplusSessionHandler implements OIDplusGetterSetterInterface { |
2 | daniel-mar | 23 | |
263 | daniel-mar | 24 | private $secret = ''; |
25 | protected $sessionLifetime = ''; |
||
2 | daniel-mar | 26 | |
263 | daniel-mar | 27 | public function __construct() { |
261 | daniel-mar | 28 | $this->sessionLifetime = OIDplus::baseConfig()->getValue('SESSION_LIFETIME', 30*60); |
29 | $this->secret = OIDplus::baseConfig()->getValue('SERVER_SECRET'); |
||
30 | |||
2 | daniel-mar | 31 | // **PREVENTING SESSION HIJACKING** |
32 | // Prevents javascript XSS attacks aimed to steal the session ID |
||
592 | daniel-mar | 33 | @ini_set('session.cookie_httponly', '1'); |
2 | daniel-mar | 34 | |
35 | // **PREVENTING SESSION FIXATION** |
||
36 | // Session ID cannot be passed through URLs |
||
592 | daniel-mar | 37 | @ini_set('session.use_only_cookies', '1'); |
2 | daniel-mar | 38 | |
592 | daniel-mar | 39 | @ini_set('session.use_trans_sid', '0'); |
85 | daniel-mar | 40 | |
2 | daniel-mar | 41 | // Uses a secure connection (HTTPS) if possible |
230 | daniel-mar | 42 | @ini_set('session.cookie_secure', OIDplus::isSslAvailable()); |
2 | daniel-mar | 43 | |
496 | daniel-mar | 44 | $path = OIDplus::webpath(null,true); |
555 | daniel-mar | 45 | if (empty($path)) $path = '/'; |
46 | @ini_set('session.cookie_path', $path); |
||
2 | daniel-mar | 47 | |
563 | daniel-mar | 48 | @ini_set('session.cookie_samesite', OIDplus::baseConfig()->getValue('COOKIE_SAMESITE_POLICY', 'Strict')); |
2 | daniel-mar | 49 | |
592 | daniel-mar | 50 | @ini_set('session.use_strict_mode', '1'); |
2 | daniel-mar | 51 | |
261 | daniel-mar | 52 | @ini_set('session.gc_maxlifetime', $this->sessionLifetime); |
2 | daniel-mar | 53 | } |
54 | |||
86 | daniel-mar | 55 | protected function sessionSafeStart() { |
179 | daniel-mar | 56 | if (!isset($_SESSION)) { |
57 | // TODO: session_name() makes some problems. Leave it away for now. |
||
261 | daniel-mar | 58 | //session_name('OIDplus_SESHDLR'); |
179 | daniel-mar | 59 | if (!session_start()) { |
360 | daniel-mar | 60 | throw new OIDplusException(_L('Session could not be started')); |
179 | daniel-mar | 61 | } |
62 | } |
||
86 | daniel-mar | 63 | |
87 | daniel-mar | 64 | if (!isset($_SESSION['ip'])) { |
65 | if (!isset($_SERVER['REMOTE_ADDR'])) return; |
||
86 | daniel-mar | 66 | |
87 | daniel-mar | 67 | // Remember the IP address of the user |
68 | $_SESSION['ip'] = $_SERVER['REMOTE_ADDR']; |
||
69 | } else { |
||
70 | if ($_SERVER['REMOTE_ADDR'] != $_SESSION['ip']) { |
||
71 | // Was the session hijacked?! Get out of here! |
||
435 | daniel-mar | 72 | |
73 | // We don't use $this->destroySession(), because this calls sessionSafeStart() again |
||
74 | $_SESSION = array(); |
||
75 | session_destroy(); |
||
76 | session_write_close(); |
||
557 | daniel-mar | 77 | OIDplus::cookieUtils()->unsetcookie(session_name()); // remove cookie, so GDPR people are happy |
87 | daniel-mar | 78 | } |
86 | daniel-mar | 79 | } |
80 | } |
||
81 | |||
2 | daniel-mar | 82 | function __destruct() { |
83 | session_write_close(); |
||
84 | } |
||
85 | |||
424 | daniel-mar | 86 | private $cacheSetValues = array(); // Important if you do a setValue() followed by an getValue() |
87 | |||
2 | daniel-mar | 88 | public function setValue($name, $value) { |
426 | daniel-mar | 89 | $this->cacheSetValues[$name] = self::encrypt($value, $this->secret); |
90 | |||
86 | daniel-mar | 91 | $this->sessionSafeStart(); |
557 | daniel-mar | 92 | OIDplus::cookieUtils()->setcookie(session_name(),session_id(),time()+$this->sessionLifetime); |
85 | daniel-mar | 93 | |
2 | daniel-mar | 94 | $_SESSION[$name] = self::encrypt($value, $this->secret); |
95 | } |
||
96 | |||
569 | daniel-mar | 97 | public function getValue($name, $default = NULL) { |
424 | daniel-mar | 98 | if (isset($this->cacheSetValues[$name])) return self::decrypt($this->cacheSetValues[$name], $this->secret); |
99 | |||
585 | daniel-mar | 100 | if (!$this->isActive()) return $default; // GDPR: Only start a session when we really need one |
86 | daniel-mar | 101 | $this->sessionSafeStart(); |
557 | daniel-mar | 102 | OIDplus::cookieUtils()->setcookie(session_name(),session_id(),time()+$this->sessionLifetime); |
85 | daniel-mar | 103 | |
569 | daniel-mar | 104 | if (!isset($_SESSION[$name])) return $default; |
2 | daniel-mar | 105 | return self::decrypt($_SESSION[$name], $this->secret); |
106 | } |
||
107 | |||
569 | daniel-mar | 108 | public function exists($name) { |
109 | if (isset($this->cacheSetValues[$name])) return true; |
||
110 | |||
585 | daniel-mar | 111 | if (!$this->isActive()) return false; // GDPR: Only start a session when we really need one |
569 | daniel-mar | 112 | $this->sessionSafeStart(); |
113 | OIDplus::cookieUtils()->setcookie(session_name(),session_id(),time()+$this->sessionLifetime); |
||
114 | |||
115 | if (!isset($_SESSION[$name])) return false; |
||
116 | } |
||
117 | |||
118 | public function delete($name) { |
||
119 | if (isset($this->cacheSetValues[$name])) unset($this->cacheSetValues[$name]); |
||
120 | |||
585 | daniel-mar | 121 | if (!$this->isActive()) return; // GDPR: Only start a session when we really need one |
569 | daniel-mar | 122 | $this->sessionSafeStart(); |
123 | OIDplus::cookieUtils()->setcookie(session_name(),session_id(),time()+$this->sessionLifetime); |
||
124 | |||
125 | unset($_SESSION[$name]); |
||
126 | } |
||
127 | |||
85 | daniel-mar | 128 | public function destroySession() { |
585 | daniel-mar | 129 | if (!$this->isActive()) return; |
85 | daniel-mar | 130 | |
86 | daniel-mar | 131 | $this->sessionSafeStart(); |
557 | daniel-mar | 132 | OIDplus::cookieUtils()->setcookie(session_name(),session_id(),time()+$this->sessionLifetime); |
85 | daniel-mar | 133 | |
134 | $_SESSION = array(); |
||
135 | session_destroy(); |
||
136 | session_write_close(); |
||
557 | daniel-mar | 137 | OIDplus::cookieUtils()->unsetcookie(session_name()); // remove cookie, so GDPR people are happy |
85 | daniel-mar | 138 | } |
139 | |||
585 | daniel-mar | 140 | public function isActive() { |
141 | return isset($_COOKIE[session_name()]); |
||
142 | } |
||
143 | |||
2 | daniel-mar | 144 | protected static function encrypt($data, $key) { |
465 | daniel-mar | 145 | if (function_exists('openssl_encrypt')) { |
146 | $iv = random_bytes(16); // AES block size in CBC mode |
||
147 | // Encryption |
||
148 | $ciphertext = openssl_encrypt( |
||
149 | $data, |
||
150 | 'AES-256-CBC', |
||
151 | mb_substr($key, 0, 32, '8bit'), |
||
152 | OPENSSL_RAW_DATA, |
||
153 | $iv |
||
154 | ); |
||
155 | // Authentication |
||
156 | $hmac = hash_hmac( |
||
592 | daniel-mar | 157 | 'sha256', |
465 | daniel-mar | 158 | $iv . $ciphertext, |
159 | mb_substr($key, 32, null, '8bit'), |
||
160 | true |
||
161 | ); |
||
162 | return $hmac . $iv . $ciphertext; |
||
163 | } else { |
||
164 | // When OpenSSL is not available, then we just do a HMAC |
||
165 | $hmac = hash_hmac( |
||
592 | daniel-mar | 166 | 'sha256', |
465 | daniel-mar | 167 | $data, |
168 | mb_substr($key, 32, null, '8bit'), |
||
169 | true |
||
170 | ); |
||
171 | return $hmac . $data; |
||
172 | } |
||
6 | daniel-mar | 173 | } |
2 | daniel-mar | 174 | |
6 | daniel-mar | 175 | protected static function decrypt($data, $key) { |
465 | daniel-mar | 176 | if (function_exists('openssl_decrypt')) { |
177 | $hmac = mb_substr($data, 0, 32, '8bit'); |
||
178 | $iv = mb_substr($data, 32, 16, '8bit'); |
||
179 | $ciphertext = mb_substr($data, 48, null, '8bit'); |
||
180 | // Authentication |
||
181 | $hmacNew = hash_hmac( |
||
592 | daniel-mar | 182 | 'sha256', |
465 | daniel-mar | 183 | $iv . $ciphertext, |
184 | mb_substr($key, 32, null, '8bit'), |
||
185 | true |
||
186 | ); |
||
187 | if (!hash_equals($hmac, $hmacNew)) { |
||
188 | throw new OIDplusException(_L('Authentication failed')); |
||
189 | } |
||
190 | // Decryption |
||
191 | return openssl_decrypt( |
||
192 | $ciphertext, |
||
193 | 'AES-256-CBC', |
||
194 | mb_substr($key, 0, 32, '8bit'), |
||
195 | OPENSSL_RAW_DATA, |
||
196 | $iv |
||
197 | ); |
||
198 | } else { |
||
199 | // When OpenSSL is not available, then we just do a HMAC |
||
200 | $hmac = mb_substr($data, 0, 32, '8bit'); |
||
201 | $cleartext = mb_substr($data, 32, null, '8bit'); |
||
202 | $hmacNew = hash_hmac( |
||
592 | daniel-mar | 203 | 'sha256', |
465 | daniel-mar | 204 | $cleartext, |
205 | mb_substr($key, 32, null, '8bit'), |
||
206 | true |
||
207 | ); |
||
208 | if (!hash_equals($hmac, $hmacNew)) { |
||
209 | throw new OIDplusException(_L('Authentication failed')); |
||
210 | } |
||
211 | return $cleartext; |
||
6 | daniel-mar | 212 | } |
213 | } |
||
424 | daniel-mar | 214 | } |