Advertisement
WhosYourDaddySec

Captive Ghost

Nov 20th, 2023
86
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.87 KB | None | 0 0
  1. # Expert User-End Security Portal
  2. # Created by Michael Errington
  3.  
  4. require 'sinatra'
  5. require 'sinatra/activerecord'
  6. require 'bcrypt'
  7. require 'logger'
  8. require 'sqlite3'
  9. require 'dotenv/load'
  10. require 'rack/protection'
  11. require 'rack/session/dalli'
  12. require 'securerandom'
  13. require 'openssl'
  14. require 'rbnacl/libsodium'
  15. require 'jwt'
  16. require 'ipaddr'
  17.  
  18. # Configure SQLite as the database
  19. configure do
  20. set :database, {
  21. adapter: 'sqlite3',
  22. database: 'db/captive_portal.db'
  23. }
  24. end
  25.  
  26. # Define the User model with advanced security
  27. class User < ActiveRecord::Base
  28. validates :username, presence: true, uniqueness: true, format: {
  29. with: /\A[a-zA-Z0-9_]+\z/,
  30. message: 'can only contain letters, numbers, and underscores'
  31. }
  32. validates :password_hash, presence: true
  33.  
  34. def authenticate(password)
  35. BCrypt::Password.new(self.password_hash) == password
  36. end
  37.  
  38. def password = (new_password)
  39. self.password_hash = BCrypt::Password.create(new_password)
  40. end
  41. end
  42.  
  43. # Configure advanced logging with log rotation
  44. logger = Logger.new('log/captive_portal.log', 'weekly')
  45. logger.level = Logger::INFO
  46.  
  47. # Configure security middleware
  48. use Rack::Protection
  49. use Rack::Session::Dalli, memcache_server: 'localhost:11211'
  50.  
  51. # Load settings
  52. configure do
  53. set :server_port, 4567
  54. set :log_file, 'log/captive_portal.log'
  55. set :session_timeout, 60 * 60 * 2 # 2 hours
  56. set :min_password_length, 12
  57. set :session_secret, ENV['SESSION_SECRET'] || SecureRandom.hex(64)
  58. set :encryption_key, ENV['ENCRYPTION_KEY'] || SecureRandom.hex(32)
  59. set :jwt_secret, ENV['JWT_SECRET'] || SecureRandom.hex(64)
  60. end
  61.  
  62. # Main application
  63. class CaptivePortalApp < Sinatra::Base
  64. enable :sessions
  65.  
  66. get '/' do
  67. erb :welcome
  68. end
  69.  
  70. post '/login' do
  71. username = params['username']
  72. password = params['password']
  73.  
  74. user = User.find_by(username: username)
  75.  
  76. if user && user.authenticate(password)
  77. # Encrypt the user ID with AES encryption
  78. aes = OpenSSL::Cipher::AES.new(256, :CBC)
  79. aes.encrypt
  80. aes.key = settings.encryption_key
  81. encrypted_user_id = aes.update(user.id.to_s) + aes.final
  82.  
  83. # Create a Fernet token for secure session management
  84. token = RbNaCl::SimpleBox.from_secret_key(settings.encryption_key).encrypt(encrypted_user_id)
  85.  
  86. # Generate a JWT token with user information
  87. jwt_payload = {
  88. user_id: user.id,
  89. username: user.username
  90. }
  91. jwt_token = JWT.encode(jwt_payload, settings.jwt_secret, 'HS256')
  92.  
  93. # Store IP address in the session for added security
  94. session[:ip_address] = request.ip
  95.  
  96. session[:token] = token
  97. session[:jwt_token] = jwt_token
  98. logger.info("User '#{user.username
  99. }' logged in from IP: #{request.ip
  100. }.")
  101. redirect '/welcome'
  102. else
  103. @error = 'Invalid credentials'
  104. logger.warn("Failed login attempt for '#{username
  105. }' from IP: #{request.ip
  106. }.")
  107. erb :welcome
  108. end
  109. end
  110.  
  111. get '/welcome' do
  112. authenticate_user
  113. erb :welcome
  114. end
  115.  
  116. private
  117.  
  118. def authenticate_user
  119. token = session[:token]
  120. jwt_token = session[:jwt_token]
  121. halt 401 unless token && jwt_token && request.ip == session[:ip_address]
  122.  
  123. # Decrypt the token and retrieve the user ID with Fernet and AES decryption
  124. decrypted_user_id = RbNaCl::SimpleBox.from_secret_key(settings.encryption_key).decrypt(token)
  125. aes = OpenSSL::Cipher::AES.new(256, :CBC)
  126. aes.decrypt
  127. aes.key = settings.encryption_key
  128. user_id = aes.update(decrypted_user_id) + aes.final
  129.  
  130. # Verify JWT token and user ID
  131. jwt_payload = JWT.decode(jwt_token, settings.jwt_secret, true, {
  132. algorithm: 'HS256'
  133. })[0]
  134. halt 401 unless jwt_payload['user_id'] == user_id.to_i
  135.  
  136. session[:user_id] = user_id.to_i
  137. end
  138. end
  139.  
  140. # Run migrations for creating the users table
  141. ActiveRecord::Migration.verbose = false
  142.  
  143. class CreateUsers < ActiveRecord::Migration[6.1]
  144. def change
  145. create_table :users do |table|
  146. table.column :username, :string
  147. table.column :password_hash, :string
  148. end
  149. end
  150. end
  151.  
  152. CreateUsers.new.change
  153.  
  154. # Run the Sinatra application
  155. CaptivePortalApp.run! if __FILE__ == $0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement