Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion lib/auth/accountrecovery_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1286,7 +1286,7 @@ func TestGetAccountRecoveryCodes(t *testing.T) {

func triggerLoginLock(t *testing.T, srv *Server, username string) {
for i := 1; i <= defaults.MaxLoginAttempts; i++ {
_, _, err := srv.authenticateUser(context.Background(), AuthenticateUserRequest{
_, _, _, err := srv.authenticateUser(context.Background(), AuthenticateUserRequest{
Username: username,
OTP: &OTPCreds{},
})
Expand Down
125 changes: 125 additions & 0 deletions lib/auth/auth_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,7 @@ import (
"github.com/gravitational/teleport/lib/auth/keystore"
"github.com/gravitational/teleport/lib/auth/native"
"github.com/gravitational/teleport/lib/auth/testauthority"
wantypes "github.com/gravitational/teleport/lib/auth/webauthntypes"
"github.com/gravitational/teleport/lib/authz"
"github.com/gravitational/teleport/lib/backend"
"github.com/gravitational/teleport/lib/backend/lite"
Expand Down Expand Up @@ -525,6 +526,130 @@ func TestAuthenticateSSHUser(t *testing.T) {
require.Error(t, err)
}

func TestAuthenticateUser_mfaDeviceLocked(t *testing.T) {
t.Parallel()

testServer := newTestTLSServer(t)
authServer := testServer.Auth()

ctx := context.Background()
const user = "llama"
const pass = "supersecret!!1!one"

// Configure auth preferences.
authPref, err := authServer.GetAuthPreference(ctx)
require.NoError(t, err, "GetAuthPreference")
authPref.SetSecondFactor(constants.SecondFactorOptional) // good enough
authPref.SetWebauthn(&types.Webauthn{
RPID: "localhost",
})
require.NoError(t,
authServer.SetAuthPreference(ctx, authPref),
"SetAuthPreference")

// Prepare user, password and MFA device.
_, _, err = CreateUserAndRole(authServer, user, []string{user})
require.NoError(t, err, "CreateUserAndRole")
require.NoError(t,
authServer.UpsertPassword(user, []byte(pass)),
"UpsertPassword")

userClient, err := testServer.NewClient(TestUser(user))
require.NoError(t, err, "NewClient")

// OTP devices would work for this test too.
dev1, err := RegisterTestDevice(ctx, userClient, "dev1", proto.DeviceType_DEVICE_TYPE_WEBAUTHN, nil /* authenticator */)
require.NoError(t, err, "RegisterTestDevice")
dev2, err := RegisterTestDevice(ctx, userClient, "dev2", proto.DeviceType_DEVICE_TYPE_WEBAUTHN, dev1 /* authenticator */)
require.NoError(t, err, "RegisterTestDevice")

// Prepare an SSH public key for testing.
privKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
require.NoError(t, err, "GenerateKey")
signer, err := ssh.NewSignerFromSigner(privKey)
require.NoError(t, err, "NewSignerFromSigner")
pubKey := ssh.MarshalAuthorizedKey(signer.PublicKey())

// Users initially authenticate via Proxy, as there isn't a userClient before
// authn.
proxyClient, err := testServer.NewClient(TestBuiltin(types.RoleProxy))
require.NoError(t, err, "NewClient")

authenticateSSH := func(dev *TestDevice) (*SSHLoginResponse, error) {
chal, err := proxyClient.CreateAuthenticateChallenge(ctx, &proto.CreateAuthenticateChallengeRequest{
Request: &proto.CreateAuthenticateChallengeRequest_UserCredentials{
UserCredentials: &proto.UserCredentials{
Username: user,
Password: []byte(pass),
},
},
})
if err != nil {
return nil, fmt.Errorf("create challenge: %w", err)
}

chalResp, err := dev.SolveAuthn(chal)
if err != nil {
return nil, fmt.Errorf("solve challenge: %w", err)
}

return proxyClient.AuthenticateSSHUser(ctx, AuthenticateSSHRequest{
AuthenticateUserRequest: AuthenticateUserRequest{
Username: user,
PublicKey: pubKey,
Pass: &PassCreds{
Password: []byte(pass),
},
Webauthn: wantypes.CredentialAssertionResponseFromProto(chalResp.GetWebauthn()),
},
TTL: 1 * time.Hour,
})
}

// Lock dev1.
const lockMessage = "device locked for testing"
lock, err := types.NewLock("dev1-lock", types.LockSpecV2{
Target: types.LockTarget{
MFADevice: dev1.MFA.Id,
},
Message: lockMessage,
})
require.NoError(t, err, "NewLock")
require.NoError(t,
userClient.UpsertLock(ctx, lock),
"UpsertLock")

t.Run("locked device", func(t *testing.T) {
_, err := authenticateSSH(dev1)
assert.ErrorContains(t, err, lockMessage)
})

t.Run("unlocked device", func(t *testing.T) {
_, err := authenticateSSH(dev2)
assert.NoError(t, err, "authenticateSSH failed unexpectedly")
})

t.Run("locked device password change", func(t *testing.T) {
chal, err := userClient.CreateAuthenticateChallenge(ctx, &proto.CreateAuthenticateChallengeRequest{
Request: &proto.CreateAuthenticateChallengeRequest_ContextUser{},
})
require.NoError(t, err, "CreateAuthenticateChallenge")

// dev1 is still locked.
chalResp, err := dev1.SolveAuthn(chal)
require.NoError(t, err, "SolveAuthn")

assert.ErrorContains(t,
userClient.ChangePassword(ctx, &proto.ChangePasswordRequest{
User: user,
OldPassword: []byte(pass),
NewPassword: []byte("evenmoresecret!!1!ONE"),
Webauthn: chalResp.GetWebauthn(),
}),
lockMessage)
})
}

func TestUserLock(t *testing.T) {
t.Parallel()
s := newAuthSuite(t)
Expand Down
146 changes: 117 additions & 29 deletions lib/auth/methods.go
Original file line number Diff line number Diff line change
Expand Up @@ -115,7 +115,7 @@ type SessionCreds struct {
func (a *Server) AuthenticateUser(ctx context.Context, req AuthenticateUserRequest) (types.User, error) {
username := req.Username

mfaDev, actualUsername, err := a.authenticateUser(ctx, req)
verifyMFALocks, mfaDev, actualUsername, err := a.authenticateUser(ctx, req)
// err is handled below.
switch {
case username != "" && actualUsername != "" && username != actualUsername:
Expand All @@ -133,6 +133,9 @@ func (a *Server) AuthenticateUser(ctx context.Context, req AuthenticateUserReque
UserMetadata: apievents.UserMetadata{
User: username,
},
Status: apievents.Status{
Success: false,
},
Method: events.LoginMethodLocal,
}
if mfaDev != nil {
Expand All @@ -147,33 +150,56 @@ func (a *Server) AuthenticateUser(ctx context.Context, req AuthenticateUserReque
event.UserAgent = req.ClientMetadata.UserAgent
}
}

var user types.User
if err != nil {
event.Code = events.UserLocalLoginFailureCode
event.Status.Success = false
event.Status.Error = err.Error()
} else {
event.Code = events.UserLocalLoginCode
event.Status.Success = true

var err error
user, err = a.GetUser(username, false /* withSecrets */)
if err != nil {
return nil, trace.Wrap(err)
event.Error = err.Error()
if err := a.emitter.EmitAuditEvent(a.closeCtx, event); err != nil {
log.WithError(err).Warn("Failed to emit login event.")
}
return nil, trace.Wrap(err)
}

// After we're sure that the user has been logged in successfully, we should call
// the registered login hooks. Login hooks can be registered by other processes to
// execute arbitrary operations after a successful login.
if err := a.CallLoginHooks(ctx, user); err != nil {
return nil, trace.Wrap(err)
user, err := a.GetUser(username, false /* withSecrets */)
if err != nil {
return nil, trace.Wrap(err)
}

// After we're sure that the user has been logged in successfully, we should call
// the registered login hooks. Login hooks can be registered by other processes to
// execute arbitrary operations after a successful login.
if err := a.CallLoginHooks(ctx, user); err != nil {
return nil, trace.Wrap(err)
}

// Verify if the MFA device is locked.
accessInfo := services.AccessInfoFromUser(user)
clusterName, err := a.GetClusterName()
if err != nil {
return nil, trace.Wrap(err)
}
checker, err := services.NewAccessChecker(accessInfo, clusterName.GetClusterName(), a)
if err != nil {
return nil, trace.Wrap(err)
}
if err := verifyMFALocks(verifyMFADeviceLocksParams{
Checker: checker,
}); err != nil {
// Log MFA lock failure as an authn failure.
event.Error = err.Error()
if err := a.emitter.EmitAuditEvent(a.closeCtx, event); err != nil {
log.WithError(err).Warn("Failed to emit login event.")
}
return nil, trace.Wrap(err)
}

// Log authn success.
event.Code = events.UserLocalLoginCode
event.Success = true
event.Error = ""
if err := a.emitter.EmitAuditEvent(a.closeCtx, event); err != nil {
log.WithError(err).Warn("Failed to emit login event.")
}
return user, trace.Wrap(err)

return user, nil
}

var (
Expand All @@ -197,14 +223,77 @@ func IsInvalidLocalCredentialError(err error) bool {
return errors.Is(err, invalidUserPassError) || errors.Is(err, invalidUserPass2FError)
}

type verifyMFADeviceLocksParams struct {
// Checker used to verify locks.
// Optional, created via a [UserState] fetch if nil.
Checker services.AccessChecker

// ClusterLockingMode used to verify locks.
// Optional, acquired from [Server.GetAuthPreference] if nil.
ClusterLockingMode constants.LockingMode
}

// authenticateUser authenticates a user through various methods (password, MFA,
// passwordless)
// Returns the device used to authenticate (if applicable) and the username.
func (a *Server) authenticateUser(ctx context.Context, req AuthenticateUserRequest) (*types.MFADevice, string, error) {
//
// Returns a callback to verify MFA device locks, the MFA device used to
// authenticate (if applicable), and the authenticated user name.
//
// Callers MUST call the verifyLocks callback.
func (a *Server) authenticateUser(
ctx context.Context,
req AuthenticateUserRequest,
) (verifyLocks func(verifyMFADeviceLocksParams) error, mfaDev *types.MFADevice, user string, err error) {
mfaDev, user, err = a.authenticateUserInternal(ctx, req)
if err != nil || mfaDev == nil {
return func(verifyMFADeviceLocksParams) error { return nil }, mfaDev, user, trace.Wrap(err)
}

verifyLocks = func(p verifyMFADeviceLocksParams) error {
if p.Checker == nil {
u, err := a.GetUser(user, false /* withSecrets */)
if err != nil {
return trace.Wrap(err)
}
accessInfo := services.AccessInfoFromUser(u)
clusterName, err := a.GetClusterName()
if err != nil {
return trace.Wrap(err)
}
checker, err := services.NewAccessChecker(accessInfo, clusterName.GetClusterName(), a)
if err != nil {
return trace.Wrap(err)
}
p.Checker = checker
}

if p.ClusterLockingMode == "" {
authPref, err := a.GetAuthPreference(ctx)
if err != nil {
return trace.Wrap(err)
}
p.ClusterLockingMode = authPref.GetLockingMode()
}

// The MFA device needs to be explicitly verified, as it won't be verified
// as part of certificate issuance in various scenarios (password change,
// non-session certificates, etc)
return a.verifyLocksForUserCerts(verifyLocksForUserCertsReq{
checker: p.Checker,
defaultMode: p.ClusterLockingMode,
username: user,
mfaVerified: mfaDev.Id,
})
}
return verifyLocks, mfaDev, user, nil
}

// Do not use this method directly, use authenticateUser instead.
func (a *Server) authenticateUserInternal(ctx context.Context, req AuthenticateUserRequest) (mfaDev *types.MFADevice, user string, err error) {
if err := req.CheckAndSetDefaults(); err != nil {
return nil, "", trace.Wrap(err)
}
user := req.Username
user = req.Username
passwordless := user == ""

// Only one path if passwordless, other variants shouldn't see an empty user.
Expand Down Expand Up @@ -236,8 +325,8 @@ func (a *Server) authenticateUser(ctx context.Context, req AuthenticateUserReque
Webauthn: wantypes.CredentialAssertionResponseToProto(req.Webauthn),
},
}
dev, _, err := a.validateMFAAuthResponse(ctx, mfaResponse, user, passwordless)
return dev, trace.Wrap(err)
mfaDev, _, err := a.validateMFAAuthResponse(ctx, mfaResponse, user, passwordless)
return mfaDev, trace.Wrap(err)
}
authErr = authenticateWebauthnError
case req.OTP != nil:
Expand All @@ -253,10 +342,9 @@ func (a *Server) authenticateUser(ctx context.Context, req AuthenticateUserReque
authErr = invalidUserPass2FError
}
if authenticateFn != nil {
var dev *types.MFADevice
err := a.WithUserLock(user, func() error {
var err error
dev, err = authenticateFn()
mfaDev, err = authenticateFn()
return err
})
switch {
Expand All @@ -267,13 +355,13 @@ func (a *Server) authenticateUser(ctx context.Context, req AuthenticateUserReque
}

return nil, "", trace.Wrap(authErr)
case dev == nil:
case mfaDev == nil:
log.Debugf(
"MFA authentication returned nil device (Webauthn = %v, TOTP = %v, Headless = %v): %v.",
req.Webauthn != nil, req.OTP != nil, req.HeadlessAuthenticationID != "", err)
return nil, "", trace.Wrap(authErr)
default:
return dev, user, nil
return mfaDev, user, nil
}
}

Expand Down
7 changes: 6 additions & 1 deletion lib/auth/password.go
Original file line number Diff line number Diff line change
Expand Up @@ -136,7 +136,12 @@ func (a *Server) ChangePassword(ctx context.Context, req *proto.ChangePasswordRe
Token: req.SecondFactorToken,
}
}
if _, _, err := a.authenticateUser(ctx, authReq); err != nil {
verifyMFALocks, _, _, err := a.authenticateUser(ctx, authReq)
if err != nil {
return trace.Wrap(err)
}
// Verify if the MFA device used is locked.
if err := verifyMFALocks(verifyMFADeviceLocksParams{}); err != nil {
return trace.Wrap(err)
}

Expand Down
Loading