Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add two factor authentication flow #25480

Merged
merged 31 commits into from
Jan 29, 2024
Merged

Add two factor authentication flow #25480

merged 31 commits into from
Jan 29, 2024

Conversation

peppy
Copy link
Member

@peppy peppy commented Nov 16, 2023

Draft as this requires osu-web implementation.

Flows required:

  • Endpoint to perform verification
  • Endpoint to re-request verification code
  • Response from a request (either error or otherwise) to let us know that verification hasn't been performed. ie. consider the case where the user does user/password login then quits the game before 2FA authenticating – to handle this, osu-web needs to let us know that we should show the flow again.

@nanaya is looking into the above requirements


CleanShot.2023-11-16.at.09.34.04.mp4

Copy link
Collaborator

@bdach bdach left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Aside from the test failures

@AAGaming00
Copy link

Is proper TOTP also going to be considered in the future? I feel like it could be more convenient for a lot of people and is more secure.

@peppy
Copy link
Member Author

peppy commented Dec 20, 2023

Is proper TOTP also going to be considered in the future? I feel like it could be more convenient for a lot of people and is more secure.

ppy/osu-web#5163 searching is not hard

@AAGaming00
Copy link

Oh I searched the wrong repo oops.

@bdach bdach self-assigned this Jan 23, 2024
@bdach
Copy link
Collaborator

bdach commented Jan 24, 2024

I've pushed some stuff here and the basic flows appear to work. I'm not sure I'm super happy with the code, though.

First of all, the current "notification client" is almost glued to chat in its construction. Like have a look at WebSocketNotificationClient on master. It's half websocket handling logic, half chat specific stuff (things like fetching chat updates in ConnectAsync() via... calling base). I've attempted to basically step over that in 62a0c23 by splitting out the part I care about (the osu! ws glue code) from the rest but not sure how to feel about adding another layer to that lasagna.

Secondly there's e3eb7a8: turns out that the previous flow of consumption of the notification websocket (a) was half-reliant on the user API state being online, (b) required to request the user's notifications to retrieve the address of the notification websocket endpoint:

var req = new GetNotificationsRequest();
req.Success += bundle => tcs.SetResult(bundle.Endpoint);
req.Failure += ex => tcs.SetException(ex);
api.Queue(req);
string endpoint = await tcs.Task.ConfigureAwait(false);

I'm not sure that's going to work if the user's session isn't verified, and it also seems turbo weird to do this. So I just hardcoded the websocket address. I'll likely want to ask the web team as to whether this is anywhere near acceptable.

There's also the part where any failure to set up the websocket listener basically is met with "welp, there was an attempt, enter the code manually or go away". Not sure how much I should care about that.

Tests will probably fail. And there are no new tests exercising the new logic. I'll come back to that tomorrow.

@nanaya
Copy link

nanaya commented Jan 25, 2024

the main idea for /endpoint is to avoid hardcoding the url in web (web build/deployment constraints etc). Whether or not it should be hardcoded in client would be just deployment consideration (both for client and notification server).

There's no particular reason why it requires authentication apart of there's no exclusion for it from requiring one and that it's not usable without authentication anyway.

bdach added a commit to bdach/osu that referenced this pull request Jan 25, 2024
This is a prerequisite for ppy#25480.

The `WebSocketNotificationsClient` was tightly coupled to chat specifics
making it difficult to use in the second factor verification flow.
This commit's goal is to separate the websocket connection and message
handling concerns from specific chat logic concerns.
@bdach
Copy link
Collaborator

bdach commented Jan 26, 2024

I think I'm okay with where this is at right now, but this is dependent on #26724 now.

@bdach bdach marked this pull request as ready for review January 26, 2024 10:26
@peppy
Copy link
Member Author

peppy commented Jan 29, 2024

Seems to work well. @bdach I've deployed the required changes to staging if you want to give it a final test, but I think this is good to go from my end.

@peppy peppy merged commit cbbe2f9 into ppy:master Jan 29, 2024
@peppy peppy deleted the 2fa branch January 29, 2024 11:07
bdach added a commit to bdach/osu that referenced this pull request Jan 30, 2024
Closes ppy#26835.

I must have not re-tested this correctly after all the refactors...

Basically the issue is that the websocket connection would only come
online when the API state changed to full `Online`. In particular
the connector would not attempt to connect when the API state was
`RequiresSecondFactorAuth`, giving the link-based flow no chance to
actually work.

The change in `WebSocketNotificationsClientConnector` is relevant in
that queueing requests does nothing before the API state changes to full
`Online`. It also cleans up things a bit code-wise so... win?

And yes, this means that the _other_ `PersistentEndpointClientConnector`
implementations (i.e. SignalR connectors) will also come online earlier
after this. Based on previous discussions
(ppy#25480 (comment)) I think
this is fine, but if it is _not_ fine, then it can be fixed by exposing
a virtual that lets a connector to decide when to come alive, I guess.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

Two factor authentication needs to be implemented
4 participants