Commit Graph

39 Commits

Author SHA1 Message Date
Dane Everitt
d60e8a193b Very basic working implementation of sanctum for API validation 2021-08-04 21:15:16 -07:00
Matthew Penner
31c2ef5279 webauthn: update login flow to support other 2fa methods 2021-07-17 14:45:23 -06:00
Matthew Penner
28146f5bb6 webauthn: add controllers and transformers 2021-07-17 14:45:23 -06:00
Dane Everitt
c449ca5155 Use more standardized phpcs 2021-01-23 12:33:34 -08:00
Dane Everitt
a043071e3c Update to Laravel 8
Co-authored-by: Matthew Penner <me@matthewp.io>
2021-01-23 12:12:54 -08:00
Dane Everitt
7b75e7a648 Support using recovery tokens during the login process to bypass 2fa; closes #479 2020-07-02 23:01:02 -07:00
Dane Everitt
9eb31a16d9 Fix 2FA handling; closes #1962 2020-04-25 13:01:16 -07:00
Dane Everitt
7543ef085d Format files 2019-09-05 21:32:57 -07:00
Dane Everitt
bd8b708c32 [L6] Update cache methods to use defined times and not ints 2019-09-04 20:24:46 -07:00
Dane Everitt
212773d63c Finish authentication flow for 2FA 2019-06-22 13:33:11 -07:00
Dane Everitt
56640253b9 Merge branch 'release/v0.7.14' into feature/react 2019-06-22 12:28:44 -07:00
Dane Everitt
2db7928b76 Don't expose existence of account when an incorrect password is provided and the user has 2FA enabled 2019-06-21 21:39:24 -07:00
Oreo Oreoniv
adcf0c9fee Fixed Failed event
Thank you very much Laravel for not pointing out the changes to be made when upgrading from 5.6 to 5.7
2018-11-28 23:24:43 +03:00
Dane Everitt
a1444b047e Fix JWT handling for API access when logging in 2018-05-28 14:59:48 -07:00
Dane Everitt
ad69193ac0 Add JWT to login forms 2018-05-28 12:48:42 -07:00
Dane Everitt
b6e94d9a1e Code cleanup 2018-04-08 16:00:52 -05:00
Dane Everitt
6d970a4cc3 Finalize login page! 2018-04-08 15:46:32 -05:00
Dane Everitt
d63624f607 Working login form with password reset functionality. 2018-04-08 15:18:13 -05:00
Dane Everitt
c3e462ab2f Cleanup login/reset functionality, address security issue with 2FA pathways 2018-04-07 16:17:51 -05:00
Dane Everitt
4f3c668420 Refactor auth controllers to be cleaner and easier to maintain 2018-04-07 12:35:15 -05:00
Dane Everitt
324b989a29 Get a working rough copy of the login page 2018-04-01 17:46:16 -05:00
Dane Everitt
b9d67459b2 Update to Laravel 5.5 (#814) 2017-12-17 13:07:38 -06:00
Dane Everitt
6f52f4a614 Push updates to login page, mostly UI enhancements. 2017-11-18 15:09:58 -06:00
Dane Everitt
c7c2c1a45e Implement changes to 2FA system (#761) 2017-11-18 13:35:33 -05:00
Dane Everitt
3ee5803416 Massive PHPCS linting 2017-08-21 22:10:48 -05:00
Dane Everitt
72c0330486 Fixes 2FA not honoring 'Remember Me' checkbox, closes #439 2017-05-22 19:09:42 -05:00
Dane Everitt
77b1a258d9 Weekly fix of my StyleCI violations... 2017-04-24 16:56:38 -04:00
Dane Everitt
f1024ad1a8 Improved login controller func. for 2FA, throws Failed event correctly now 2017-04-14 14:33:15 -04:00
Jakob Schrettenbrunner
e613e44749 fix #363 2017-04-01 01:58:05 +02:00
Dane Everitt
0312c974f5 Update doc blocks for all app/ 2017-03-19 19:36:50 -04:00
Jakob Schrettenbrunner
4fc832838b use ‚required|string‘ to validate usernames 2017-02-16 20:45:36 +01:00
Jakob Schrettenbrunner
0b2c5279a8 allow to use the username for login as well
add translation strings
2017-02-16 20:40:21 +01:00
Dane Everitt
2290118a0d Apply fixes from StyleCI (#293) 2017-02-12 15:17:14 -05:00
Dane Everitt
a93adce303 Only allow up to 30 seconds of overlap on comparing the 2FA tokens. 2017-02-01 23:02:54 -05:00
Dane Everitt
4abdee0efb Better 2FA implementation on logins 2017-02-01 22:58:48 -05:00
Dane Everitt
bf7b58470a Update copyright headers 2017-01-24 17:57:08 -05:00
Dane Everitt
c1fb0a665f Apply fixes from StyleCI 2016-12-07 22:46:38 +00:00
Dane Everitt
659c33f0e8 Fixes a bug that allows a user to bypass 2FA authentication requirements
This bug was reported to us by a user (@Ferry#1704) on Discord on
Monday, November 7th, 2016.

It was disclosed that it was possible to bypass the 2FA checkpoint by
clicking outside of the modal which would prompt the modal to close,
but not submit the form. The user could then press the login button
which would trigger an error. Due to this error being triggered the
authentication attempt was not cancelled. On the next page load the
application recognized the user as logged in and continued on to the
panel.

At no time was it possible to login without using the correct email
address and password.

As a result of this bug we have re-factored the Authentication code for
logins to address the persistent session. Previously accounts were
manually logged back out on 2FA failure. However, as this bug
demonstrated, causing a fatal error in the code would prevent the
logout code from firing, thus preserving their session state.

This commit modifies the code to use a non-persistent login to handle
2FA checking. In order for the session to be saved the application must
complete all portions of the login without any errors, at which point
the user is persistently authenticated using Auth::login().

This resolves the ability to cause an exception and bypass 2FA
verification.
2016-11-07 15:55:57 -05:00
Dane Everitt
afb5011fbe Update to Laravel 5.3
[BREAKING] — REMOVES REMOTE API

A new API will need to be implemented properly using the new Laravel
Passport OAuth2 system. DingoAPI was becoming too unstable and
development wasn’t really moving along enough to continue to rely on it.
2016-09-03 17:09:00 -04:00