mirror of https://github.com/hashicorp/boundary
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
252 lines
7.8 KiB
252 lines
7.8 KiB
// Copyright IBM Corp. 2020, 2025
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package password
|
|
|
|
import (
|
|
"context"
|
|
"io"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/boundary/internal/auth/password/store"
|
|
"github.com/hashicorp/boundary/internal/errors"
|
|
"github.com/hashicorp/boundary/internal/oplog"
|
|
wrapping "github.com/hashicorp/go-kms-wrapping/v2"
|
|
"github.com/hashicorp/go-kms-wrapping/v2/extras/structwrapping"
|
|
"golang.org/x/crypto/argon2"
|
|
"google.golang.org/protobuf/proto"
|
|
)
|
|
|
|
// hashingPermitPool is the global permit pool used to restrict concurrent
|
|
// password hashing. It can be resized with SetHashingPermits.
|
|
var hashingPermitPool *resizablePermitPool
|
|
|
|
func init() {
|
|
hashingPermitPool = newResizablePermitPool(1)
|
|
}
|
|
|
|
// SetHashingPermits sets the number of concurrent password hashing operations permitted.
|
|
func SetHashingPermits(n int) error {
|
|
const op = "password.SetHashingPermits"
|
|
if n <= 0 {
|
|
return errors.New(context.Background(), errors.InvalidParameter, op, "n must be greater than 0")
|
|
}
|
|
if err := hashingPermitPool.SetPermits(n); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Argon2Configuration is a configuration for using the argon2id key
|
|
// derivation function. It is owned by an AuthMethod.
|
|
//
|
|
// Iterations, Memory, and Threads are the cost parameters. The cost
|
|
// parameters should be increased as memory latency and CPU parallelism
|
|
// increases.
|
|
//
|
|
// For a detailed specification of Argon2 see:
|
|
// https://github.com/P-H-C/phc-winner-argon2/blob/master/argon2-specs.pdf
|
|
type Argon2Configuration struct {
|
|
*store.Argon2Configuration
|
|
tableName string
|
|
}
|
|
|
|
// NewArgon2Configuration creates a new in memory Argon2Configuration with
|
|
// reasonable default settings.
|
|
func NewArgon2Configuration() *Argon2Configuration {
|
|
return &Argon2Configuration{
|
|
Argon2Configuration: &store.Argon2Configuration{
|
|
Iterations: 3,
|
|
Memory: 64 * 1024,
|
|
Threads: 1,
|
|
SaltLength: 32,
|
|
KeyLength: 32,
|
|
},
|
|
}
|
|
}
|
|
|
|
func (c *Argon2Configuration) validate(ctx context.Context) error {
|
|
const op = "password.(Argon2Configuration).validate"
|
|
if c == nil {
|
|
return errors.New(ctx, errors.PasswordInvalidConfiguration, op, "missing config")
|
|
}
|
|
if c.Argon2Configuration == nil {
|
|
return errors.New(ctx, errors.PasswordInvalidConfiguration, op, "missing embedded config")
|
|
}
|
|
if c.Iterations == 0 {
|
|
return errors.New(ctx, errors.PasswordInvalidConfiguration, op, "missing iterations")
|
|
}
|
|
if c.Memory == 0 {
|
|
return errors.New(ctx, errors.PasswordInvalidConfiguration, op, "missing memory")
|
|
}
|
|
if c.Threads == 0 {
|
|
return errors.New(ctx, errors.PasswordInvalidConfiguration, op, "missing threads")
|
|
}
|
|
if c.SaltLength == 0 {
|
|
return errors.New(ctx, errors.PasswordInvalidConfiguration, op, "missing salt length")
|
|
}
|
|
if c.KeyLength == 0 {
|
|
return errors.New(ctx, errors.PasswordInvalidConfiguration, op, "missing key length")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// AuthMethodId returns the Id of the AuthMethod which owns c.
|
|
func (c *Argon2Configuration) AuthMethodId() string {
|
|
if c != nil && c.Argon2Configuration != nil {
|
|
return c.PasswordMethodId
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (c *Argon2Configuration) clone() *Argon2Configuration {
|
|
cp := proto.Clone(c.Argon2Configuration)
|
|
return &Argon2Configuration{
|
|
Argon2Configuration: cp.(*store.Argon2Configuration),
|
|
}
|
|
}
|
|
|
|
// TableName returns the table name.
|
|
func (c *Argon2Configuration) TableName() string {
|
|
if c != nil && c.tableName != "" {
|
|
return c.tableName
|
|
}
|
|
return "auth_password_argon2_conf"
|
|
}
|
|
|
|
// SetTableName sets the table name.
|
|
func (c *Argon2Configuration) SetTableName(n string) {
|
|
c.tableName = n
|
|
}
|
|
|
|
func (c *Argon2Configuration) oplog(op oplog.OpType) oplog.Metadata {
|
|
metadata := oplog.Metadata{
|
|
"resource-public-id": []string{c.PrivateId},
|
|
"resource-type": []string{"password argon2 conf"},
|
|
"op-type": []string{op.String()},
|
|
}
|
|
if c.PasswordMethodId != "" {
|
|
metadata["password-method-id"] = []string{c.PasswordMethodId}
|
|
}
|
|
return metadata
|
|
}
|
|
|
|
func (c *Argon2Configuration) whereDup() (string, []any) {
|
|
var where []string
|
|
var args []any
|
|
|
|
where, args = append(where, "password_method_id = ?"), append(args, c.PasswordMethodId)
|
|
where, args = append(where, "iterations = ?"), append(args, c.Iterations)
|
|
where, args = append(where, "memory = ?"), append(args, c.Memory)
|
|
where, args = append(where, "threads = ?"), append(args, c.Threads)
|
|
where, args = append(where, "key_length = ?"), append(args, c.KeyLength)
|
|
where, args = append(where, "salt_length = ?"), append(args, c.SaltLength)
|
|
|
|
return strings.Join(where, " and "), args
|
|
}
|
|
|
|
// A Argon2Credential contains a key derived from a password and the salt
|
|
// used in the key derivation. It is owned by an Account.
|
|
type Argon2Credential struct {
|
|
*store.Argon2Credential
|
|
tableName string
|
|
}
|
|
|
|
func newArgon2Credential(ctx context.Context, accountId string, password string, conf *Argon2Configuration, randReader io.Reader) (*Argon2Credential, error) {
|
|
const op = "password.newArgon2Credential"
|
|
if accountId == "" {
|
|
return nil, errors.New(ctx, errors.InvalidParameter, op, "missing accountId")
|
|
}
|
|
if password == "" {
|
|
return nil, errors.New(ctx, errors.InvalidParameter, op, "missing password")
|
|
}
|
|
if conf == nil {
|
|
return nil, errors.New(ctx, errors.InvalidParameter, op, "missing argon2 configuration")
|
|
}
|
|
|
|
id, err := newArgon2CredentialId(ctx)
|
|
if err != nil {
|
|
return nil, errors.Wrap(ctx, err, op)
|
|
}
|
|
|
|
c := &Argon2Credential{
|
|
Argon2Credential: &store.Argon2Credential{
|
|
PrivateId: id,
|
|
PasswordAccountId: accountId,
|
|
PasswordConfId: conf.PrivateId,
|
|
PasswordMethodId: conf.PasswordMethodId,
|
|
},
|
|
}
|
|
|
|
// Generate a random salt
|
|
salt := make([]byte, conf.SaltLength)
|
|
if _, err := io.ReadFull(randReader, salt); err != nil {
|
|
return nil, errors.Wrap(ctx, err, op, errors.WithCode(errors.Io))
|
|
}
|
|
c.Salt = salt
|
|
|
|
// Limit the number of concurrent calls to the argon2 hashing function,
|
|
// since each call consumes a significant amount of CPU and memory.
|
|
if err := hashingPermitPool.Do(ctx, func() {
|
|
c.DerivedKey = argon2.IDKey([]byte(password), c.Salt, conf.Iterations, conf.Memory, uint8(conf.Threads), conf.KeyLength)
|
|
}); err != nil {
|
|
// Context was canceled while waiting for a permit
|
|
return nil, errors.Wrap(ctx, err, op, errors.WithMsg("context canceled while waiting for hashing permit"))
|
|
}
|
|
return c, nil
|
|
}
|
|
|
|
func (c *Argon2Credential) clone() *Argon2Credential {
|
|
cp := proto.Clone(c.Argon2Credential)
|
|
return &Argon2Credential{
|
|
Argon2Credential: cp.(*store.Argon2Credential),
|
|
}
|
|
}
|
|
|
|
// TableName returns the table name.
|
|
func (c *Argon2Credential) TableName() string {
|
|
if c != nil && c.tableName != "" {
|
|
return c.tableName
|
|
}
|
|
return "auth_password_argon2_cred"
|
|
}
|
|
|
|
// SetTableName sets the table name.
|
|
func (c *Argon2Credential) SetTableName(n string) {
|
|
c.tableName = n
|
|
}
|
|
|
|
func (c *Argon2Credential) encrypt(ctx context.Context, cipher wrapping.Wrapper) error {
|
|
const op = "password.(Argon2Credential).encrypt"
|
|
if err := structwrapping.WrapStruct(ctx, cipher, c.Argon2Credential, nil); err != nil {
|
|
return errors.Wrap(ctx, err, op, errors.WithCode(errors.Encrypt))
|
|
}
|
|
keyId, err := cipher.KeyId(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(ctx, err, op, errors.WithCode(errors.Encrypt), errors.WithMsg("error reading cipher key id"))
|
|
}
|
|
c.KeyId = keyId
|
|
return nil
|
|
}
|
|
|
|
func (c *Argon2Credential) decrypt(ctx context.Context, cipher wrapping.Wrapper) error {
|
|
const op = "password.(Argon2Credential).decrypt"
|
|
if err := structwrapping.UnwrapStruct(ctx, cipher, c.Argon2Credential, nil); err != nil {
|
|
return errors.Wrap(ctx, err, op, errors.WithCode(errors.Decrypt))
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *Argon2Credential) oplog(op oplog.OpType) oplog.Metadata {
|
|
metadata := oplog.Metadata{
|
|
"resource-public-id": []string{c.PrivateId},
|
|
"resource-type": []string{"argon2 credential"},
|
|
"op-type": []string{op.String()},
|
|
"password-account-id": []string{c.PasswordAccountId},
|
|
}
|
|
if c.PasswordMethodId != "" {
|
|
metadata["password-method-id"] = []string{c.PasswordMethodId}
|
|
}
|
|
return metadata
|
|
}
|