mirror of
https://github.com/moodle/moodle.git
synced 2025-03-20 07:30:01 +01:00
MDL-77077 mod_lti: Fix JWT signature verify when alg missing from JWKS
Infer the algorithm, where necessary, using a combination of JWT headers and known valid LTI algorithms.
This commit is contained in:
parent
67bbf6c416
commit
a6bd5ae245
mod/lti
@ -23,6 +23,8 @@
|
||||
*/
|
||||
namespace mod_lti\local\ltiopenid;
|
||||
|
||||
use Firebase\JWT\JWT;
|
||||
|
||||
/**
|
||||
* This class exposes functions for LTI 1.3 Key Management.
|
||||
*
|
||||
@ -32,6 +34,20 @@ namespace mod_lti\local\ltiopenid;
|
||||
*/
|
||||
class jwks_helper {
|
||||
|
||||
/**
|
||||
*
|
||||
* See https://www.imsglobal.org/spec/security/v1p1#approved-jwt-signing-algorithms.
|
||||
* @var string[]
|
||||
*/
|
||||
private static $ltisupportedalgs = [
|
||||
'RS256' => 'RSA',
|
||||
'RS384' => 'RSA',
|
||||
'RS512' => 'RSA',
|
||||
'ES256' => 'EC',
|
||||
'ES384' => 'EC',
|
||||
'ES512' => 'EC'
|
||||
];
|
||||
|
||||
/**
|
||||
* Returns the private key to use to sign outgoing JWT.
|
||||
*
|
||||
@ -69,4 +85,49 @@ class jwks_helper {
|
||||
return $jwks;
|
||||
}
|
||||
|
||||
/**
|
||||
* Take an array of JWKS keys and infer the 'alg' property for a single key, if missing, based on an input JWT.
|
||||
*
|
||||
* This only sets the 'alg' property for a single key when all the following conditions are met:
|
||||
* - The key's 'kid' matches the 'kid' provided in the JWT's header.
|
||||
* - The key's 'alg' is missing.
|
||||
* - The JWT's header 'alg' matches the algorithm family of the key (the key's kty).
|
||||
* - The JWT's header 'alg' matches one of the approved LTI asymmetric algorithms.
|
||||
*
|
||||
* Keys not matching the above are left unchanged.
|
||||
*
|
||||
* @param array $jwks the keyset array.
|
||||
* @param string $jwt the JWT string.
|
||||
* @return array the fixed keyset array.
|
||||
*/
|
||||
public static function fix_jwks_alg(array $jwks, string $jwt): array {
|
||||
$jwtparts = explode('.', $jwt);
|
||||
$jwtheader = json_decode(JWT::urlsafeB64Decode($jwtparts[0]), true);
|
||||
if (!isset($jwtheader['kid'])) {
|
||||
throw new \moodle_exception('Error: kid must be provided in JWT header.');
|
||||
}
|
||||
|
||||
foreach ($jwks['keys'] as $index => $key) {
|
||||
// Only fix the key being referred to in the JWT.
|
||||
if ($jwtheader['kid'] != $key['kid']) {
|
||||
continue;
|
||||
}
|
||||
|
||||
// Only fix the key if the alg is missing.
|
||||
if (!empty($key['alg'])) {
|
||||
continue;
|
||||
}
|
||||
|
||||
// The header alg must match the key type (family) specified in the JWK's kty.
|
||||
if (!isset(static::$ltisupportedalgs[$jwtheader['alg']]) ||
|
||||
static::$ltisupportedalgs[$jwtheader['alg']] != $key['kty']) {
|
||||
throw new \moodle_exception('Error: Alg specified in the JWT header is incompatible with the JWK key type');
|
||||
}
|
||||
|
||||
$jwks['keys'][$index]['alg'] = $jwtheader['alg'];
|
||||
}
|
||||
|
||||
return $jwks;
|
||||
}
|
||||
|
||||
}
|
||||
|
@ -1390,6 +1390,10 @@ function lti_verify_with_keyset($jwtparam, $keyseturl, $clientid) {
|
||||
// Something went wrong, so attempt to update cached keyset and then try again.
|
||||
$keyset = file_get_contents($keyseturl);
|
||||
$keysetarr = json_decode($keyset, true);
|
||||
|
||||
// Fix for firebase/php-jwt's dependency on the optional 'alg' property in the JWK.
|
||||
$keysetarr = jwks_helper::fix_jwks_alg($keysetarr, $jwtparam);
|
||||
|
||||
// JWK::parseKeySet uses RS256 algorithm by default.
|
||||
$keys = JWK::parseKeySet($keysetarr);
|
||||
$jwt = JWT::decode($jwtparam, $keys);
|
||||
|
260
mod/lti/tests/local/ltiopenid/jwks_helper_test.php
Normal file
260
mod/lti/tests/local/ltiopenid/jwks_helper_test.php
Normal file
@ -0,0 +1,260 @@
|
||||
<?php
|
||||
// This file is part of Moodle - http://moodle.org/
|
||||
//
|
||||
// Moodle is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU General Public License as published by
|
||||
// the Free Software Foundation, either version 3 of the License, or
|
||||
// (at your option) any later version.
|
||||
//
|
||||
// Moodle is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU General Public License
|
||||
// along with Moodle. If not, see <http://www.gnu.org/licenses/>.
|
||||
//
|
||||
// This file is part of BasicLTI4Moodle
|
||||
//
|
||||
// BasicLTI4Moodle is an IMS BasicLTI (Basic Learning Tools for Interoperability)
|
||||
// consumer for Moodle 1.9 and Moodle 2.0. BasicLTI is a IMS Standard that allows web
|
||||
// based learning tools to be easily integrated in LMS as native ones. The IMS BasicLTI
|
||||
// specification is part of the IMS standard Common Cartridge 1.1 Sakai and other main LMS
|
||||
// are already supporting or going to support BasicLTI. This project Implements the consumer
|
||||
// for Moodle. Moodle is a Free Open source Learning Management System by Martin Dougiamas.
|
||||
// BasicLTI4Moodle is a project iniciated and leaded by Ludo(Marc Alier) and Jordi Piguillem
|
||||
// at the GESSI research group at UPC.
|
||||
// SimpleLTI consumer for Moodle is an implementation of the early specification of LTI
|
||||
// by Charles Severance (Dr Chuck) htp://dr-chuck.com , developed by Jordi Piguillem in a
|
||||
// Google Summer of Code 2008 project co-mentored by Charles Severance and Marc Alier.
|
||||
//
|
||||
// BasicLTI4Moodle is copyright 2009 by Marc Alier Forment, Jordi Piguillem and Nikolas Galanis
|
||||
// of the Universitat Politecnica de Catalunya http://www.upc.edu
|
||||
// Contact info: Marc Alier Forment granludo @ gmail.com or marc.alier @ upc.edu.
|
||||
|
||||
namespace mod_lti\local\ltiopenid;
|
||||
|
||||
/**
|
||||
* Tests for the jwks_helper class.
|
||||
*
|
||||
* @coversDefaultClass \mod_lti\local\ltiopenid\jwks_helper
|
||||
* @package mod_lti
|
||||
* @copyright 2023 Jake Dallimore <jrhdallimore@gmail.com>
|
||||
* @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
|
||||
*/
|
||||
class jwks_helper_test extends \basic_testcase {
|
||||
|
||||
/**
|
||||
* Test the fix_jwks_alg method with a range of inputs.
|
||||
*
|
||||
* @dataProvider jwks_alg_provider
|
||||
* @covers ::fix_jwks_alg
|
||||
* @param array $jwks the JWKS key set.
|
||||
* @param string $jwt the JWT.
|
||||
* @param array $expected the expected outputs/exceptions.
|
||||
* @return void
|
||||
*/
|
||||
public function test_fix_jwks_alg(array $jwks, string $jwt, array $expected) {
|
||||
if (isset($expected['exception'])) {
|
||||
$this->expectException($expected['exception']);
|
||||
}
|
||||
$fixed = jwks_helper::fix_jwks_alg($jwks, $jwt);
|
||||
$this->assertEquals($expected['jwks'], $fixed);
|
||||
}
|
||||
|
||||
/**
|
||||
* Provider for test_fix_jwks_alg.
|
||||
* @return array test data.
|
||||
*/
|
||||
public function jwks_alg_provider(): array {
|
||||
return [
|
||||
// Algs already present, so no changes to input key array.
|
||||
'All JWKS keys have algs set' => [
|
||||
'jwks' => [
|
||||
'keys' => [
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '41',
|
||||
'alg' => 'RS256'
|
||||
],
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '42',
|
||||
'alg' => 'RS256'
|
||||
]
|
||||
]
|
||||
],
|
||||
// RS256 JWT with kid = 42.
|
||||
'jwt' => 'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6IjQyIn0.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IlRoZSBjYXQiLCJz'.
|
||||
'bG9nYW4iOiJMb3ZlcyBpdCwgbG92ZXMgaXQsIGxvdmVzIE1vb2RsZSIsImlhdCI6MTUxNjIzOTAyMn0.EiqMEqufKJj74JevdTxXqzHvHGIcZ'.
|
||||
'EFYhOe9sliL2FmlyiJcf7waObO2ZNwWvVZwTI4DfEGFamheMmTb6-YBODacDvH6BlQNb0H_6ye6AGl1u-3OAQj7i_SKsLuB37k6Lw5YFrwQYr'.
|
||||
'7bjujSaQx6BL3kaqkqCdZhFjr2EYcn5-NehGHsevKqpMA-ShBovcndYkD5gfZEbXr59sgpQuJ43qO7gnGPzRbaJAEw_0_6v0r3y0pzDNfarNd'.
|
||||
'fHfCZQbcF9T8dpHAeO4JMmuCanV8iJziI8ihVPwH-BwUJmzthyUgy8542FinHVbXo-88wu9xpbdV17VPgeGGBCpYpnVnWaA',
|
||||
'expected' => [
|
||||
'jwks' => [
|
||||
'keys' => [
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '41',
|
||||
'alg' => 'RS256'
|
||||
],
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '42',
|
||||
'alg' => 'RS256'
|
||||
]
|
||||
]
|
||||
]
|
||||
]
|
||||
],
|
||||
// Only the key matching the kid in the JWT header should be fixed.
|
||||
'All JWKS keys missing alg' => [
|
||||
'jwks' => [
|
||||
'keys' => [
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '41',
|
||||
],
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '42',
|
||||
]
|
||||
]
|
||||
],
|
||||
// RS256 JWT with kid = 42.
|
||||
'jwt' => 'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6IjQyIn0.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IlRoZSBjYXQiLCJz'.
|
||||
'bG9nYW4iOiJMb3ZlcyBpdCwgbG92ZXMgaXQsIGxvdmVzIE1vb2RsZSIsImlhdCI6MTUxNjIzOTAyMn0.EiqMEqufKJj74JevdTxXqzHvHGIcZ'.
|
||||
'EFYhOe9sliL2FmlyiJcf7waObO2ZNwWvVZwTI4DfEGFamheMmTb6-YBODacDvH6BlQNb0H_6ye6AGl1u-3OAQj7i_SKsLuB37k6Lw5YFrwQYr'.
|
||||
'7bjujSaQx6BL3kaqkqCdZhFjr2EYcn5-NehGHsevKqpMA-ShBovcndYkD5gfZEbXr59sgpQuJ43qO7gnGPzRbaJAEw_0_6v0r3y0pzDNfarNd'.
|
||||
'fHfCZQbcF9T8dpHAeO4JMmuCanV8iJziI8ihVPwH-BwUJmzthyUgy8542FinHVbXo-88wu9xpbdV17VPgeGGBCpYpnVnWaA',
|
||||
'expected' => [
|
||||
'jwks' => [
|
||||
'keys' => [
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '41',
|
||||
],
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '42',
|
||||
'alg' => 'RS256'
|
||||
]
|
||||
]
|
||||
]
|
||||
]
|
||||
],
|
||||
// Exception expected when JWT alg is supported but does not match the family of key in the JWK.
|
||||
'JWT kty algorithm family mismatch' => [
|
||||
'jwks' => [
|
||||
'keys' => [
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '41',
|
||||
],
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '42',
|
||||
]
|
||||
]
|
||||
],
|
||||
// ES256 JWT with kid = 42.
|
||||
'jwt' => 'eyJhbGciOiJFUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6IjQyIn0.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwi'.
|
||||
'YWRtaW4iOnRydWUsImlhdCI6MTUxNjIzOTAyMn0.dbUlZopFo7164JVLD0G4GoZOhoMYWhIXkgtlblBXT6fC3K4lJ38l3LzlEBhfRRKvJlXpe'.
|
||||
'NNGmBg8V29jd5J33Q',
|
||||
'expected' => [
|
||||
'exception' => \moodle_exception::class
|
||||
]
|
||||
],
|
||||
// Exception expected when JWK kid field missing.
|
||||
'JWT missing kid header field' => [
|
||||
'jwks' => [
|
||||
'keys' => [
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '41',
|
||||
'alg' => 'RS256'
|
||||
],
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '42',
|
||||
'alg' => 'RS256'
|
||||
]
|
||||
]
|
||||
],
|
||||
// RS256 JWT with kid omitted.
|
||||
'jwt' => 'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWU'.
|
||||
'sImlhdCI6MTUxNjIzOTAyMn0.NHVaYe26MbtOYhSKkoKYdFVomg4i8ZJd8_-RU8VNbftc4TSMb4bXP3l3YlNWACwyXPGffz5aXHc6lty1Y2t4'.
|
||||
'SWRqGteragsVdZufDn5BlnJl9pdR_kdVFUsra2rWKEofkZeIC4yWytE58sMIihvo9H1ScmmVwBcQP6XETqYd0aSHp1gOa9RdUPDvoXQ5oqygT'.
|
||||
'qVtxaDr6wUFKrKItgBMzWIdNZ6y7O9E0DhEPTbE9rfBo6KTFsHAZnMg4k68CDp2woYIaXbmYTWcvbzIuHO7_37GT79XdIwkm95QJ7hYC9Riwr'.
|
||||
'V7mesbY4PAahERJawntho0my942XheVLmGwLMBkQ',
|
||||
'expected' => [
|
||||
'exception' => \moodle_exception::class
|
||||
]
|
||||
],
|
||||
// Exception expected when JWT passes unsupported symmetrical alg.
|
||||
'JWT passes in unsupported alg' => [
|
||||
'jwks' => [
|
||||
'keys' => [
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '41',
|
||||
],
|
||||
[
|
||||
'kty' => 'RSA',
|
||||
'use' => 'sig',
|
||||
'e' => 'AQAB',
|
||||
'n' => '3nVf6',
|
||||
'kid' => '42',
|
||||
]
|
||||
]
|
||||
],
|
||||
// HS256 JWT with kid = 42.
|
||||
'jwt' => 'eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6IjQyIn0.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IlRoZSBjYXQiLCJz'.
|
||||
'bG9nYW4iOiJMb3ZlcyBpdCwgbG92ZXMgaXQsIGxvdmVzIE1vb2RsZSIsImlhdCI6MTUxNjIzOTAyMn0.zBM5Jw0BOig5-C1R7TD-TzH1QVmyD'.
|
||||
'yMjbK0KGG76xIE',
|
||||
'expected' => [
|
||||
'exception' => \moodle_exception::class
|
||||
]
|
||||
],
|
||||
];
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user