Skip to content

LG-766 Require MFA after 12 hours for IAL2 and AAL2#2639

Merged
jgsmith-usds merged 8 commits intomasterfrom
jmhooper-configuration-remember-device-expiration
Nov 1, 2018
Merged

LG-766 Require MFA after 12 hours for IAL2 and AAL2#2639
jgsmith-usds merged 8 commits intomasterfrom
jmhooper-configuration-remember-device-expiration

Conversation

@jmhooper
Copy link
Contributor

Why: The NIST standards require that MFA be expired after 12 hours.
This commit checks the MFA status during the handoff to the SP and
requires the user to re-auth if their device was remembered and their
cookie is older than 12 hours.

How: When a user is MFAed by remember device, flag the session.
Before redirecting to a service provider, check or whether remember
device was used, and if so, if it has expired for the current sp's
configuration. If it has, redirect to the 2FA controller. Also, it is
necessary to prevent the 2FA controller from redirecting if the user is
logged in when the remember device cookie is invalid per the current
SP's configuration.

Hi! Before submitting your PR for review, and/or before merging it, please
go through the checklists below. These represent the more critical elements
of our code quality guidelines. The rest of the list can be found in
CONTRIBUTING.md

Controllers

  • When adding a new controller that requires the user to be fully
    authenticated, make sure to add before_action :confirm_two_factor_authenticated
    as the first callback.

Database

  • Unsafe migrations are implemented over several PRs and over several
    deploys to avoid production errors. The strong_migrations gem
    will warn you about unsafe migrations and has great step-by-step instructions
    for various scenarios.

  • Indexes were added if necessary. This article provides a good overview
    of indexes in Rails.

  • Verified that the changes don't affect other apps (such as the dashboard)

  • When relevant, a rake task is created to populate the necessary DB columns
    in the various environments right before deploying, taking into account the users
    who might not have interacted with this column yet (such as users who have not
    set a password yet)

  • Migrations against existing tables have been tested against a copy of the
    production database. See LG-228 Make migrations safer and more resilient #2127 for an example when a migration caused deployment
    issues. In that case, all the migration did was add a new column and an index to
    the Users table, which might seem innocuous.

Encryption

  • The changes are compatible with data that was encrypted with the old code.

Routes

  • GET requests are not vulnerable to CSRF attacks (i.e. they don't change
    state or result in destructive behavior).

Session

  • When adding user data to the session, use the user_session helper
    instead of the session helper so the data does not persist beyond the user's
    session.

Testing

  • Tests added for this feature/bug
  • Prefer feature/integration specs over controller specs
  • When adding code that reads data, write tests for nil values, empty strings,
    and invalid inputs.

**Why**: The NIST standards require that MFA be expired after 12 hours.
This commit checks the MFA status during the handoff to the SP and
requires the user to re-auth if their device was remembered and their
cookie is older than 12 hours.

**How**: When a user is MFAed by remember device, flag the session.
Before redirecting to a service provider, check or whether remember
device was used, and if so, if it has expired for the current sp's
configuration. If it has, redirect to the 2FA controller. Also, it is
necessary to prevent the 2FA controller from redirecting if the user is
logged in when the remember device cookie is invalid per the current
SP's configuration.
expiration_interval: decorated_session.mfa_expiration_interval
)

handle_valid_remember_device_cookie
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This was changed since now handle_valid_otp removes the mfa_device_remembered flag.

@konklone
Copy link
Contributor

What does the re-auth check look like? Would you mind sharing a screenshot?

@jmhooper
Copy link
Contributor Author

Let me get one real quick, but right now it just looks like the regular sign in flow if you start from an SP.

If you start from secure.login.gov and sign in and then go to an SP while still authed, it looks like the regular sign in flow w/o the username / password.

@jmhooper
Copy link
Contributor Author

I have videos, but they're too large to share on GH. Let me see if I can share them in slack.

@jgsmith-usds jgsmith-usds merged commit 68b24b6 into master Nov 1, 2018
@jmhooper jmhooper deleted the jmhooper-configuration-remember-device-expiration branch February 15, 2019 18:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants