php集成動(dòng)態(tài)口令認(rèn)證
大多數(shù)系統(tǒng)目前均使用的靜態(tài)密碼進(jìn)行身份認(rèn)證登錄,但由于靜態(tài)密碼容易被竊取,其安全性無(wú)法滿足安全要求。
動(dòng)態(tài)口令采用一次一密、用過(guò)密碼作廢的方式防止了密碼被竊取帶來(lái)的安全問(wèn)題。
動(dòng)態(tài)口令分為HOTP(基于事件計(jì)數(shù)的動(dòng)態(tài)口令,RFC4226)、TOTP(基于時(shí)間計(jì)數(shù)的動(dòng)態(tài)口令,RFC6238)、OCRA(挑戰(zhàn)應(yīng)答式動(dòng)態(tài)口令,RFC6287)等方式。
本文介紹了集成TOTP方式的動(dòng)態(tài)口令認(rèn)證的方案,PHP框架采用Thinkphp3.2.3,動(dòng)態(tài)口令生成器使用的是google authtication。
1、為Thinkphp框架添加oath算法類
oath算法封裝類oath.php代碼如下:
<?PHP /** * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. * * PHP Google two-factor authentication module. * * See http://www.idontplaydarts.com/2011/07/google-totp-two-factor-authentication-for-php/ * for more details * * @author Phil **/ class Google2FA { const keyRegeneration = 30; // Interval between key regeneration const otpLength = 6; // Length of the Token generated private static $lut = array( // Lookup needed for Base32 encoding "A" => 0, "B" => 1, "C" => 2, "D" => 3, "E" => 4, "F" => 5, "G" => 6, "H" => 7, "I" => 8, "J" => 9, "K" => 10, "L" => 11, "M" => 12, "N" => 13, "O" => 14, "P" => 15, "Q" => 16, "R" => 17, "S" => 18, "T" => 19, "U" => 20, "V" => 21, "W" => 22, "X" => 23, "Y" => 24, "Z" => 25, "2" => 26, "3" => 27, "4" => 28, "5" => 29, "6" => 30, "7" => 31 ); /** * Generates a 16 digit secret key in base32 format * @return string **/ public static function generate_secret_key($length = 16) { $b32 = "234567QWERTYUIOPASDFGHJKLZXCVBNM"; $s = ""; for ($i = 0; $i < $length; $i++) $s .= $b32[rand(0,31)]; return $s; } /** * Returns the current Unix Timestamp devided by the keyRegeneration * period. * @return integer **/ public static function get_timestamp() { return floor(microtime(true)/self::keyRegeneration); } /** * Decodes a base32 string into a binary string. **/ public static function base32_decode($b32) { $b32 = strtoupper($b32); if (!preg_match('/^[ABCDEFGHIJKLMNOPQRSTUVWXYZ234567]+$/', $b32, $match)) throw new Exception('Invalid characters in the base32 string.'); $l = strlen($b32); $n = 0; $j = 0; $binary = ""; for ($i = 0; $i < $l; $i++) { $n = $n << 5; // Move buffer left by 5 to make room $n = $n + self::$lut[$b32[$i]]; // Add value into buffer $j = $j + 5; // Keep track of number of bits in buffer if ($j >= 8) { $j = $j - 8; $binary .= chr(($n & (0xFF << $j)) >> $j); } } return $binary; } /*by tang*/ public static function base32_encode($data, $length){ $basestr = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567"; $count = 0; if ($length > 0) { $buffer = $data[0]; $next = 1; $bitsLeft = 8; while (($bitsLeft > 0 || $next < $length)) { if ($bitsLeft < 5) { if ($next < $length) { $buffer <<= 8; $buffer |= $data[$next++] & 0xFF; $bitsLeft += 8; } else { $pad = 5 - $bitsLeft; $buffer <<= $pad; $bitsLeft += $pad; } } $index = 0x1F & ($buffer >> ($bitsLeft - 5)); $bitsLeft -= 5; $result .= $basestr[$index]; $count++; } } return $result; } /** * Takes the secret key and the timestamp and returns the one time * password. * * @param binary $key - Secret key in binary form. * @param integer $counter - Timestamp as returned by get_timestamp. * @return string **/ public static function oath_hotp($key, $counter) { if (strlen($key) < 8) throw new Exception('Secret key is too short. Must be at least 16 base 32 characters'); $bin_counter = pack('N*', 0) . pack('N*', $counter); // Counter must be 64-bit int $hash = hash_hmac ('sha1', $bin_counter, $key, true); return str_pad(self::oath_truncate($hash), self::otpLength, '0', STR_PAD_LEFT); } /** * Verifys a user inputted key against the current timestamp. Checks $window * keys either side of the timestamp. * * @param string $b32seed * @param string $key - User specified key * @param integer $window * @param boolean $useTimeStamp * @return boolean **/ public static function verify_key($b32seed, $key, $window = 5, $useTimeStamp = true) { $timeStamp = self::get_timestamp(); if ($useTimeStamp !== true) $timeStamp = (int)$useTimeStamp; $binarySeed = self::base32_decode($b32seed); for ($ts = $timeStamp - $window; $ts <= $timeStamp + $window; $ts++) if (self::oath_hotp($binarySeed, $ts) == $key) return true; return false; } /** * Extracts the OTP from the SHA1 hash. * @param binary $hash * @return integer **/ public static function oath_truncate($hash) { $offset = ord($hash[19]) & 0xf; return ( ((ord($hash[$offset+0]) & 0x7f) << 24 ) | ((ord($hash[$offset+1]) & 0xff) << 16 ) | ((ord($hash[$offset+2]) & 0xff) << 8 ) | (ord($hash[$offset+3]) & 0xff) ) % pow(10, self::otpLength); } } /* $InitalizationKey = "LFLFMU2SGVCUIUCZKBMEKRKLIQ"; // Set the inital key $TimeStamp = Google2FA::get_timestamp(); $secretkey = Google2FA::base32_decode($InitalizationKey); // Decode it into binary $otp = Google2FA::oath_hotp($secretkey, $TimeStamp); // Get current token echo("Init key: $InitalizationKey\n"); echo("Timestamp: $TimeStamp\n"); echo("One time password: $otp\n"); // Use this to verify a key as it allows for some time drift. $result = Google2FA::verify_key($InitalizationKey, "123456"); var_dump($result); */ ?>
由于google的動(dòng)態(tài)口令算法中種子密鑰使用了base32編碼,因此需要base32算法,base32.php內(nèi)容如下:
<?php //namespace Base32; /** * Base32 encoder and decoder * * Last update: 2012-06-20 * * RFC 4648 compliant * @link http://www.ietf.org/rfc/rfc4648.txt * * Some groundwork based on this class * https://github.com/NTICompass/PHP-Base32 * * @author Christian Riesen <chris.riesen@gmail.com> * @link http://christianriesen.com * @license MIT License see LICENSE file */ class Base32 { /** * Alphabet for encoding and decoding base32 * * @var array */ private static $alphabet = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ234567='; /** * Creates an array from a binary string into a given chunk size * * @param string $binaryString String to chunk * @param integer $bits Number of bits per chunk * @return array */ private static function chunk($binaryString, $bits) { $binaryString = chunk_split($binaryString, $bits, ' '); if (substr($binaryString, (strlen($binaryString)) - 1) == ' ') { $binaryString = substr($binaryString, 0, strlen($binaryString)-1); } return explode(' ', $binaryString); } /** * Encodes into base32 * * @param string $string Clear text string * @return string Base32 encoded string */ public static function encode($string) { if (strlen($string) == 0) { // Gives an empty string return ''; } // Convert string to binary $binaryString = ''; foreach (str_split($string) as $s) { // Return each character as an 8-bit binary string $binaryString .= sprintf('%08b', ord($s)); } // Break into 5-bit chunks, then break that into an array $binaryArray = self::chunk($binaryString, 5); // Pad array to be divisible by 8 while (count($binaryArray) % 8 !== 0) { $binaryArray[] = null; } $base32String = ''; // Encode in base32 foreach ($binaryArray as $bin) { $char = 32; if (!is_null($bin)) { // Pad the binary strings $bin = str_pad($bin, 5, 0, STR_PAD_RIGHT); $char = bindec($bin); } // Base32 character $base32String .= self::$alphabet[$char]; } return $base32String; } /** * Decodes base32 * * @param string $base32String Base32 encoded string * @return string Clear text string */ public static function decode($base32String) { // Only work in upper cases $base32String = strtoupper($base32String); // Remove anything that is not base32 alphabet $pattern = '/[^A-Z2-7]/'; $base32String = preg_replace($pattern, '', $base32String); if (strlen($base32String) == 0) { // Gives an empty string return ''; } $base32Array = str_split($base32String); $string = ''; foreach ($base32Array as $str) { $char = strpos(self::$alphabet, $str); // Ignore the padding character if ($char !== 32) { $string .= sprintf('%05b', $char); } } while (strlen($string) %8 !== 0) { $string = substr($string, 0, strlen($string)-1); } $binaryArray = self::chunk($string, 8); $realString = ''; foreach ($binaryArray as $bin) { // Pad each value to 8 bits $bin = str_pad($bin, 8, 0, STR_PAD_RIGHT); // Convert binary strings to ASCII $realString .= chr(bindec($bin)); } return $realString; } } ?>
將這兩個(gè)文件放到Thinkphp框架的ThinkPHP\Library\Vendor\oath目錄下,oath目錄是自己創(chuàng)建的。
2、添加數(shù)據(jù)庫(kù)字段
用戶表添加如下字段:
auth_type(0-靜態(tài)密碼,1-動(dòng)態(tài)口令)
seed(種子密鑰)
temp_seed(臨時(shí)種子密鑰)
last_logintime(上次登錄成功時(shí)間)
last_otp(上次使用密碼)
其中auth_type是為了標(biāo)明用戶使用的哪種認(rèn)證方式,seed為用戶的種子密鑰,temp_seed為用戶未開通前臨時(shí)保存的一個(gè)種子密鑰,如果用戶開通動(dòng)態(tài)口令認(rèn)證成功,該字段內(nèi)容會(huì)填到seed字段。last_logintime和last_otp為上次認(rèn)證成功的時(shí)間和動(dòng)態(tài)口令,用于避免用戶同一個(gè)口令重復(fù)使用。
3、代碼集成
1)、開通動(dòng)態(tài)口令
在原有系統(tǒng)的修改密碼頁(yè)面,加上認(rèn)證方式的選擇,例如:
如果用戶選擇動(dòng)態(tài)口令方式,則會(huì)生成一張二維碼顯示在頁(yè)面,用于用戶開通動(dòng)態(tài)口令。為了兼容google authtication,其二維碼格式與谷歌一樣。生成二維碼的方法見我的另一篇《Thinkphp3.2.3整合phpqrcode生成帶logo的二維碼》 。
生成密鑰二維碼代碼如下:
public function qrcode() { Vendor('oath.base32'); $base32 = new \Base32(); $rand = random(16);//生成隨機(jī)種子 $rand = $base32->encode($rand); $rand=str_replace('=','',$rand);//去除填充的‘=' $errorCorrectionLevel =intval(3) ;//容錯(cuò)級(jí)別 $matrixPointSize = intval(8);//生成圖片大小 //生成二維碼圖片 Vendor('phpqrcode.phpqrcode'); $object = new \QRcode(); $text = sprintf("otpauth://totp/%s?secret=%s", $user, $rand); $object->png($text, false, $errorCorrectionLevel, $matrixPointSize, 2); 生成的種子$rand保存到數(shù)據(jù)庫(kù)的temp_seed字段 }
random是生成隨機(jī)字符串函數(shù)。$rand=str_replace('=','',$rand)這句代碼是因?yàn)楣雀枋謾C(jī)令牌中base32解碼算法并沒有填充的‘='號(hào)。
驗(yàn)證用戶動(dòng)態(tài)口令的代碼如下:
從數(shù)據(jù)庫(kù)讀取temp_seed Vendor('oath.oath'); $object = new \Google2FA(); if($object->verify_key($temp_seed, $otp)){ 驗(yàn)證成功,將數(shù)據(jù)庫(kù)更新seed為temp_seed,auth_type為1,last_otp為otp }
2)、動(dòng)態(tài)口令登錄
用戶動(dòng)態(tài)口令登錄驗(yàn)證的代碼:
從數(shù)據(jù)庫(kù)讀取auth_type,seed,last_otp字段。
if($auth_type==1){//動(dòng)態(tài)口令 //防止重復(fù)認(rèn)證 if($lat_otp == $otp) { 動(dòng)態(tài)口令重復(fù)使用返回 } Vendor('oath.oath'); $object = new \Google2FA(); if(!$object->verify_key($seed, $otp)) { 動(dòng)態(tài)口令不正確 } else { 登錄成功,將數(shù)據(jù)庫(kù)更新last_otp為$otp,last_logintime為time() } }
4、測(cè)試驗(yàn)證
下載google authtication,使用靜態(tài)密碼登錄系統(tǒng),進(jìn)入修改密碼頁(yè)面。
打開google authtication,掃描二維碼,會(huì)顯示動(dòng)態(tài)口令。
保存內(nèi)容,開通動(dòng)態(tài)口令成功!
然后你就可以用高大上的動(dòng)態(tài)口令登錄系統(tǒng)了!
以上就是本文的全部?jī)?nèi)容,希望對(duì)大家的學(xué)習(xí)有所幫助,也希望大家多多支持腳本之家。
- 通過(guò)PHP修改Linux或Unix口令的方法分享
- ThinkPHP權(quán)限認(rèn)證Auth實(shí)例詳解
- PHP中對(duì)用戶身份認(rèn)證實(shí)現(xiàn)兩種方法
- 用PHP寫的MySQL數(shù)據(jù)庫(kù)用戶認(rèn)證系統(tǒng)代碼
- PHP實(shí)現(xiàn)用戶認(rèn)證及管理完全源碼
- PHP防注入安全代碼
- 理解php Hash函數(shù),增強(qiáng)密碼安全
- php.ini 啟用disable_functions提高安全
- php中安全模式safe_mode配置教程
- PHP開發(fā)不能違背的安全規(guī)則 過(guò)濾用戶輸入
相關(guān)文章
win7計(jì)劃任務(wù)定時(shí)執(zhí)行PHP腳本設(shè)置圖解
這篇文章主要介紹了win7計(jì)劃任務(wù)定時(shí)執(zhí)行PHP腳本設(shè)置圖解,需要的朋友可以參考下2014-05-05Laravel框架中擴(kuò)展函數(shù)、擴(kuò)展自定義類的方法
這篇文章主要介紹了Laravel框架中擴(kuò)展函數(shù)、擴(kuò)展自定義類的方法,非常實(shí)用的技術(shù)文章,需要的朋友可以參考下2014-09-09Laravel中GraphQL接口請(qǐng)求頻率實(shí)戰(zhàn)記錄
這篇文章主要給大家介紹了關(guān)于Laravel中GraphQL接口請(qǐng)求頻率的相關(guān)資料,文中通過(guò)示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來(lái)一起學(xué)習(xí)學(xué)習(xí)吧2020-09-09實(shí)現(xiàn)PHP框架系列文章(6)mysql數(shù)據(jù)庫(kù)方法
這篇文章主要介紹了實(shí)現(xiàn)PHP框架系列文章(6)mysql數(shù)據(jù)庫(kù)方法的相關(guān)資料,需要的朋友可以參考下2016-03-03ThinkPHP 3.2 版本升級(jí)了哪些內(nèi)容
ThinkPHP 3.2發(fā)布了挺長(zhǎng)時(shí)間了,這里也總結(jié)下這次ThinkPHP 3.2到底發(fā)生了哪些變化,方便程序員們進(jìn)行開發(fā)。2015-03-03Laravel使用消息隊(duì)列需要注意的一些問(wèn)題
這篇文章主要給大家介紹了關(guān)于Laravel使用消息隊(duì)列需要注意的一些問(wèn)題,文中通過(guò)示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來(lái)一起看看吧。2017-12-12