fix nil pointer and timing vulnerability
This commit is contained in:
parent
d75e5a3ff3
commit
89d3a2552a
|
@ -162,6 +162,12 @@ func routeAll() chi.Router {
|
||||||
r.Post("/{otp}", func(w http.ResponseWriter, r *http.Request) {
|
r.Post("/{otp}", func(w http.ResponseWriter, r *http.Request) {
|
||||||
sharedKey := chi.URLParam(r, "otp")
|
sharedKey := chi.URLParam(r, "otp")
|
||||||
original, err := store.Get(sharedKey)
|
original, err := store.Get(sharedKey)
|
||||||
|
if nil != err {
|
||||||
|
msg := `{"error":"not found"}`
|
||||||
|
log.Printf("/api/register-device/\n")
|
||||||
|
log.Println(err)
|
||||||
|
http.Error(w, msg, http.StatusNotFound)
|
||||||
|
}
|
||||||
if "" != original.MachinePPID {
|
if "" != original.MachinePPID {
|
||||||
msg := `{"error":"the presented key has already been used"}`
|
msg := `{"error":"the presented key has already been used"}`
|
||||||
log.Printf("/api/register-device/\n")
|
log.Printf("/api/register-device/\n")
|
||||||
|
|
|
@ -27,10 +27,11 @@ func TestStore(t *testing.T) {
|
||||||
|
|
||||||
num := "8"
|
num := "8"
|
||||||
slug := num + "-xxx-client"
|
slug := num + "-xxx-client"
|
||||||
pubkey := num + "-somehash"
|
secret := "3-xxxx-zzzz-yyyy"
|
||||||
|
pubkey := ToPublicKeyString(secret)
|
||||||
auth1 := &Authorization{
|
auth1 := &Authorization{
|
||||||
Slug: slug,
|
Slug: slug,
|
||||||
SharedKey: "3-xxxx-zzzz-yyyy",
|
SharedKey: secret,
|
||||||
PublicKey: pubkey,
|
PublicKey: pubkey,
|
||||||
}
|
}
|
||||||
err = store.Add(auth1)
|
err = store.Add(auth1)
|
||||||
|
@ -64,7 +65,7 @@ func TestStore(t *testing.T) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
auth, err := store.Get(slug)
|
auth, err = store.Get(slug)
|
||||||
if nil == err {
|
if nil == err {
|
||||||
t.Fatal("should get nothing back")
|
t.Fatal("should get nothing back")
|
||||||
return
|
return
|
||||||
|
|
|
@ -203,9 +203,15 @@ func (s *PGStore) Get(id string) (*Authorization, error) {
|
||||||
query := `
|
query := `
|
||||||
SELECT * FROM authorizations
|
SELECT * FROM authorizations
|
||||||
WHERE deleted_at = '1970-01-01 00:00:00'
|
WHERE deleted_at = '1970-01-01 00:00:00'
|
||||||
AND (slug = $1 OR public_key = $1 OR shared_key = $1)
|
AND (slug = $1 OR public_key = $1 OR public_key = $2)
|
||||||
`
|
`
|
||||||
row := s.dbx.QueryRowxContext(ctx, query, id)
|
// if the id is actually the secret, we want the public form
|
||||||
|
// (we do this to protect against a timing attack)
|
||||||
|
pubby := ToPublicKeyString(id)
|
||||||
|
if len(id) > 24 {
|
||||||
|
id = id[:24]
|
||||||
|
}
|
||||||
|
row := s.dbx.QueryRowxContext(ctx, query, id, pubby)
|
||||||
if nil != row {
|
if nil != row {
|
||||||
auth := &Authorization{}
|
auth := &Authorization{}
|
||||||
if err := row.StructScan(auth); nil != err {
|
if err := row.StructScan(auth); nil != err {
|
||||||
|
|
Loading…
Reference in New Issue