UNPKG

tssrp6a

Version:

SRP6a client and server lib

163 lines (114 loc) 9.54 kB
# Midokura TSSRP6a [![npm version](https://badge.fury.io/js/tssrp6a.svg)](https://badge.fury.io/js/tssrp6a) [![CI](https://github.com/midonet/tssrp6a/actions/workflows/main.yml/badge.svg)](https://github.com/midonet/tssrp6a/actions/workflows/main.yml) [![badge](https://img.shields.io/endpoint?url=https://gist.githubusercontent.com/bgrosse-midokura/6d88c7cb89cc67292dc093e5d7bcede3/raw/tssrp6a-coverage-badge.json)](https://midonet.github.io/tssrp6a/coverage) This library is a TypeScript implementation of [Secure Remote Password](http://srp.stanford.edu/) SRP6a. SRP allows a user to authenticate to a server without sending the password (zero-knowledge proof of password) using generated private/public keys. See https://en.wikipedia.org/wiki/Secure_Remote_Password_protocol https://tools.ietf.org/html/rfc5054 for all the details. You can see a real-time [demo here](https://midonet.github.io/tssrp6a/demo). ## Requirements & Dependencies The `target` of TypeScript output is `es6`. This package has zero dependencies. It only needs [BigInt](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/BigInt) native support, or a polyfill which is not included. **Note**: This module makes use of [`Crypto.subtle`](https://developer.mozilla.org/en-US/docs/Web/API/Crypto/subtle) and therefore only works on HTTPS. ## Usage ### Signup / registration [![Diagram](docs/signup.svg)](https://mermaidjs.github.io/mermaid-live-editor/#/edit/eyJjb2RlIjoic2VxdWVuY2VEaWFncmFtXG4gICAgcGFydGljaXBhbnQgQiBhcyBCcm93c2VyXG4gICAgcGFydGljaXBhbnQgUyBhcyBTZXJ2ZXJcbiAgICBOb3RlIGxlZnQgb2YgQjogVXNlciBlbnRlcnM8YnIvPmlkLCBwYXNzd29yZFxuICAgIEItPj5COiBzYWx0ID0gY2xpZW50LmdlbmVyYXRlUmFuZG9tU2FsdCgpXG4gICAgQi0-PkI6IGNsaWVudC5nZW5lcmF0ZVZlcmlmaWVyKHNhbHQsIGlkLCBwYXNzd29yZClcbiAgICBCLT4-UzogZW1haWwsIHNhbHQsIHZlcmlmaWVyXG4gICAgTm90ZSByaWdodCBvZiBTOiBzYXZlIGJ5IGlkOjxici8-c2FsdCwgdmVyaWZpZXJcbiIsIm1lcm1haWQiOnsidGhlbWUiOiJkZWZhdWx0In19) The user requests a registration page, the browser will generate a salt and take the user's identity and password and generate a verifier. The browser sends email, salt, verifier to server. The server saves this to storage. Here is a complete example of signup: ```JavaScript import { createVerifierAndSalt, SRPParameters, SRPRoutines, } from "tssrp6a" (async ()=> { const srp6aNimbusRoutines = new SRPRoutines(new SRPParameters()); const userId = "hello@world.org"; const userPassword = "password"; const { s: salt, v: verifier } = await createVerifierAndSalt( srp6aNimbusRoutines, userId, userPassword, ); // store salt and verifier in a database })() ``` ### Signin / login [![Diagram](docs/signin.svg)](https://mermaidjs.github.io/mermaid-live-editor/#/edit/eyJjb2RlIjoic2VxdWVuY2VEaWFncmFtXG4gICAgcGFydGljaXBhbnQgQiBhcyBCcm93c2VyXG4gICAgcGFydGljaXBhbnQgUyBhcyBTZXJ2ZXJcbiAgICBOb3RlIGxlZnQgb2YgQjogVXNlciBlbnRlcnM8YnIvPmlkLCBwYXNzd29yZFxuICAgIEItPj5COiBjbGllbnQuc3RlcDEoaWQsIHBhc3N3b3JkKVxuICAgIEItPj5TOiBpZFxuICAgIE5vdGUgcmlnaHQgb2YgUzogZmluZCBpbiBzdG9yYWdlPGJyLz5ieSBpZDo8YnIvPnNhbHQsIHZlcmlmaWVyXG4gICAgUy0-PlM6IGIsQiA9IHNlcnZlci5zdGVwMShpZCwgc2FsdCwgdmVyaWZpZXIpXG4gICAgUy0-PkI6IHNhbHQsIEJcbiAgICBCLT4-QjogYSxBLE0xID0gY2xpZW50LnN0ZXAyKHNhbHQsIEIpXG4gICAgQi0-PlM6IEEsTTFcbiAgICBTLT4-UzogTTIgPSBzZXJ2ZXIuc3RlcDIoYiwgQSwgTTEpXG4gICAgUy0-PkI6IE0yXG4gICAgTm90ZSBsZWZ0IG9mIEI6IEJyb3dzZXIgbWF5IHZlcmlmeTxici8-c2VydmVyXG4gICAgQi0tPj5COiBjbGllbnQuc3RlcDMoYSwgTTIpIiwibWVybWFpZCI6eyJ0aGVtZSI6ImRlZmF1bHQifX0) The user starts an authentication session by entering his id and password. The id is sent with a request to the server, which finds salt and verifier for that id. Server executes step1 to generate private key `b` and public key `B`, and responds to browser with `salt` and `B`. The browser generates private key `a`, public key `A` and computes `M1`. Browser makes requests with `A` and `M1`. Server verifies that the credentials were correct with step2, using `b` and `M1`. If successful, it also takes `A` and generates and responds with `M2`. Browser may additionally verify the authority of the server from `M2` with step3. Note: `a` and `b` are generated for one authentication "session" and discarded immediately. Here is a complete example of authentication session: ```JavaScript import { createVerifierAndSalt, SRPClientSession, SRPParameters, SRPRoutines, SRPServerSession } from "tssrp6a" (async ()=> { const srp6aNimbusRoutines = new SRPRoutines(new SRPParameters()); const username = "hello@world.org"; let password = "password"; // Sign up const {s: salt, v: verifier} = await createVerifierAndSalt( srp6aNimbusRoutines, username, password, ); // Sign in const srp6aNimbusClient = new SRPClientSession(srp6aNimbusRoutines); await srp6aNimbusClient.step1(username, password); // erase password at this point, it is no longer stored password = "" const server = new SRPServerSession(srp6aNimbusRoutines); // server gets identifier from client, salt+verifier from db (from signup) const B = await server.step1(username, salt, verifier); // client gets challenge B from server step1 and sends prove M1 to server const {A, M1} = await srp6aNimbusClient.step2(salt, B); // servers checks client prove M1 and sends server prove M2 to client const M2 = await server.step2(A, M1); // client ensures server identity await srp6aNimbusClient.step3(M2); })() ``` ## Recommendations SRP alone only prevents a man-in-the-middle attack from _reading_ the password, but such an attack could also inject code into the browser to hijack the password. Always use SRP in combination with HTTPS. Browsers can be vulnerable to: having malicious certificates installed beforehand, rogue certificates in the wild, server misconfiguration, bugs like the heartbleed attack, servers leaking password into errors and logs. SRP in the browser offers an additional hurdle and may prevent some mistakes from escalating. The client can choose to exclude the identity of its computations or not. If excluded, the id cannot be changed. But this problem is better solved by an application schema that separates "identity" from "authentication", so that one identity can have multiple authentications. This allows to switch identity + password, and also to user more than one way of logging in (think "login with email+password, google, or facebook"). ## Serialization The SRP protocol and therefore this library is stateful. Each step sets various internal state. Due to the randomness of some of this state (namely the public and private values), repeating the step methods with the same arguments is unlikely (almost definitely) to result in the same state. This proves to be an issue when using a stateless protocol such as HTTP (as opposed to websockets). The server "session" state (the server step 1 state) might not be easily kept in memory. Therefore, we provide a way to serialize and deserialize the step classes in order to restore state. [serialize.test.ts](test/serialize.test.ts) shows some examples here's an explanation of how it works: ```typescript const serverStep1 = await new SRPServerSession(TEST_ROUTINES).step1(...); // Each step returns a class, in this case .step1 returns SRPServerSessionStep1 const serializedServerStep1 = JSON.stringify(serverStep1); // Some of the step methods (see below for which ones) have a .toJSON method that returns the internal state. JSON.stringify calls .toJSON // you can now store serializedServerStep1 in a database or elsewhere. There are security implications, see below. // when you are ready to restore the state, call fromState on the same step class used to serialize the data (in this case SRPServerSessionStep1) to deserialize const deserializedServerStep1 = SRPServerSessionStep1.fromState( TEST_ROUTINES, // first param is the routines JSON.parse(serializedServerStep1), ); // deserializedServerStep1 is now functionally equivilent as serverStep1 because it contains the same state ``` Supported steps/classes for serialization are: - `SRPServerSessionStep1` - `SRPClientSessionStep1` - `SRPClientSessionStep2` While the password is **never** kept directly in the state, hashes of it are. If an adversary is able to access the serialized state it will likely open you up to some kind of MITM attack and depending on the step, may allow an attacker to perform a bruteforce and/or dictionary attack to retrieve the password. **Do not expose the serialized data.** For clients, this means do not send it over the network and be careful where you store it. For servers, only send it in encrypted form to parties you trust (such as your database). If you believe state at anytime may have been exposed, it is suggested you change passwords as soon as possible. ## Notes This package's default configuration matches the following Java's [Nimbus SRP](https://connect2id.com/products/nimbus-srp) configuration: ```Java SRP6CryptoParams.getInstance(2048, "SHA-512") ``` The default routines does not strictly follow SRP6a RFC because user identity is NOT included in the verifier generation. This makes possible for malicious server to detect if [two users share the same password](https://crypto.stackexchange.com/questions/8626/why-is-tls-srp-verifier-based-on-user-name/9430#9430) but also allows client to change it "identity" without regenerating password. [This example](test/srp6a.test.ts) shows how to make SRP client strictly compliant with SRP6a specification.