forked from kabdelrazek-do/SecurityAndAuthentication
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathSessionManager.cs
More file actions
442 lines (391 loc) · 14.5 KB
/
SessionManager.cs
File metadata and controls
442 lines (391 loc) · 14.5 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
using System;
using System.Collections.Generic;
using System.Security.Cryptography;
using System.Text;
using System.Threading.Tasks;
using SafeVault.Data;
using System.Data;
using System.Data.SqlClient;
namespace SafeVault.Services
{
/// <summary>
/// Secure session management service with JWT-like tokens
/// </summary>
public class SessionManager
{
private readonly SecureDatabaseManager _dbManager;
private readonly string _secretKey;
private readonly TimeSpan _sessionTimeout;
public SessionManager(SecureDatabaseManager dbManager, string secretKey = null, TimeSpan? sessionTimeout = null)
{
_dbManager = dbManager ?? throw new ArgumentNullException(nameof(dbManager));
_secretKey = secretKey ?? GenerateSecretKey();
_sessionTimeout = sessionTimeout ?? TimeSpan.FromHours(8);
}
/// <summary>
/// Creates a new session for a user
/// </summary>
/// <param name="userId">User ID</param>
/// <param name="ipAddress">Client IP address</param>
/// <param name="userAgent">Client user agent</param>
/// <returns>Session information</returns>
public async Task<SessionInfo> CreateSessionAsync(int userId, string ipAddress, string userAgent)
{
try
{
// Generate session ID
string sessionId = GenerateSessionId();
// Generate JWT-like token
string token = GenerateToken(userId, sessionId);
// Calculate expiration
DateTime expiresAt = DateTime.UtcNow.Add(_sessionTimeout);
// Store session in database
await _dbManager.CreateSessionAsync(sessionId, userId, expiresAt, ipAddress, userAgent);
return new SessionInfo
{
SessionId = sessionId,
UserId = userId,
Token = token,
CreatedAt = DateTime.UtcNow,
ExpiresAt = expiresAt,
IsActive = true
};
}
catch (Exception ex)
{
throw new InvalidOperationException("Failed to create session", ex);
}
}
/// <summary>
/// Validates a session and returns session information
/// </summary>
/// <param name="sessionId">Session ID</param>
/// <returns>Session information or null if invalid</returns>
public async Task<SessionInfo> GetSessionAsync(string sessionId)
{
try
{
if (string.IsNullOrWhiteSpace(sessionId))
return null;
return await _dbManager.GetSessionAsync(sessionId);
}
catch
{
return null;
}
}
/// <summary>
/// Validates a token and returns session information
/// </summary>
/// <param name="token">JWT-like token</param>
/// <returns>Session information or null if invalid</returns>
public async Task<SessionInfo> ValidateTokenAsync(string token)
{
try
{
if (string.IsNullOrWhiteSpace(token))
return null;
// Parse token to extract session ID
string sessionId = ExtractSessionIdFromToken(token);
if (string.IsNullOrWhiteSpace(sessionId))
return null;
// Get session from database
var session = await _dbManager.GetSessionAsync(sessionId);
if (session == null || !session.IsActive || session.ExpiresAt <= DateTime.UtcNow)
return null;
// Verify token signature
if (!VerifyTokenSignature(token, session.UserId, sessionId))
return null;
return session;
}
catch
{
return null;
}
}
/// <summary>
/// Invalidates a session
/// </summary>
/// <param name="sessionId">Session ID</param>
public async Task InvalidateSessionAsync(string sessionId)
{
try
{
if (!string.IsNullOrWhiteSpace(sessionId))
{
await _dbManager.InvalidateSessionAsync(sessionId);
}
}
catch
{
// Log error but don't throw
}
}
/// <summary>
/// Invalidates all sessions for a user
/// </summary>
/// <param name="userId">User ID</param>
public async Task InvalidateAllUserSessionsAsync(int userId)
{
try
{
await _dbManager.InvalidateAllUserSessionsAsync(userId);
}
catch
{
// Log error but don't throw
}
}
/// <summary>
/// Refreshes a session (extends expiration)
/// </summary>
/// <param name="sessionId">Session ID</param>
/// <returns>New session information</returns>
public async Task<SessionInfo> RefreshSessionAsync(string sessionId)
{
try
{
var session = await _dbManager.GetSessionAsync(sessionId);
if (session == null || !session.IsActive)
return null;
// Extend expiration
DateTime newExpiresAt = DateTime.UtcNow.Add(_sessionTimeout);
await _dbManager.UpdateSessionExpirationAsync(sessionId, newExpiresAt);
// Generate new token
string newToken = GenerateToken(session.UserId, sessionId);
return new SessionInfo
{
SessionId = sessionId,
UserId = session.UserId,
Token = newToken,
CreatedAt = session.CreatedAt,
ExpiresAt = newExpiresAt,
IsActive = true
};
}
catch
{
return null;
}
}
/// <summary>
/// Cleans up expired sessions
/// </summary>
public async Task CleanupExpiredSessionsAsync()
{
try
{
await _dbManager.CleanupExpiredSessionsAsync();
}
catch
{
// Log error but don't throw
}
}
/// <summary>
/// Generates a secure session ID
/// </summary>
/// <returns>Session ID</returns>
private string GenerateSessionId()
{
using (var rng = new RNGCryptoServiceProvider())
{
byte[] bytes = new byte[32];
rng.GetBytes(bytes);
return Convert.ToBase64String(bytes).Replace("+", "-").Replace("/", "_").Replace("=", "");
}
}
/// <summary>
/// Generates a JWT-like token
/// </summary>
/// <param name="userId">User ID</param>
/// <param name="sessionId">Session ID</param>
/// <returns>JWT-like token</returns>
private string GenerateToken(int userId, string sessionId)
{
try
{
// Create header
var header = new
{
alg = "HS256",
typ = "JWT"
};
// Create payload
var payload = new
{
sub = userId.ToString(),
sid = sessionId,
iat = DateTimeOffset.UtcNow.ToUnixTimeSeconds(),
exp = DateTimeOffset.UtcNow.Add(_sessionTimeout).ToUnixTimeSeconds()
};
// Encode header and payload
string headerJson = System.Text.Json.JsonSerializer.Serialize(header);
string payloadJson = System.Text.Json.JsonSerializer.Serialize(payload);
string headerEncoded = Base64UrlEncode(Encoding.UTF8.GetBytes(headerJson));
string payloadEncoded = Base64UrlEncode(Encoding.UTF8.GetBytes(payloadJson));
// Create signature
string dataToSign = $"{headerEncoded}.{payloadEncoded}";
string signature = CreateSignature(dataToSign);
return $"{headerEncoded}.{payloadEncoded}.{signature}";
}
catch
{
throw new InvalidOperationException("Failed to generate token");
}
}
/// <summary>
/// Creates a signature for the token
/// </summary>
/// <param name="data">Data to sign</param>
/// <returns>Signature</returns>
private string CreateSignature(string data)
{
using (var hmac = new HMACSHA256(Encoding.UTF8.GetBytes(_secretKey)))
{
byte[] signatureBytes = hmac.ComputeHash(Encoding.UTF8.GetBytes(data));
return Base64UrlEncode(signatureBytes);
}
}
/// <summary>
/// Verifies a token signature
/// </summary>
/// <param name="token">Token to verify</param>
/// <param name="userId">Expected user ID</param>
/// <param name="sessionId">Expected session ID</param>
/// <returns>True if signature is valid</returns>
private bool VerifyTokenSignature(string token, int userId, string sessionId)
{
try
{
string[] parts = token.Split('.');
if (parts.Length != 3)
return false;
string headerEncoded = parts[0];
string payloadEncoded = parts[1];
string signature = parts[2];
// Verify signature
string dataToVerify = $"{headerEncoded}.{payloadEncoded}";
string expectedSignature = CreateSignature(dataToVerify);
if (!SecureCompare(signature, expectedSignature))
return false;
// Verify payload
byte[] payloadBytes = Base64UrlDecode(payloadEncoded);
string payloadJson = Encoding.UTF8.GetString(payloadBytes);
var payload = System.Text.Json.JsonSerializer.Deserialize<Dictionary<string, object>>(payloadJson);
if (!payload.ContainsKey("sub") || !payload.ContainsKey("sid"))
return false;
if (payload["sub"].ToString() != userId.ToString() || payload["sid"].ToString() != sessionId)
return false;
// Check expiration
if (payload.ContainsKey("exp"))
{
long exp = Convert.ToInt64(payload["exp"]);
if (DateTimeOffset.FromUnixTimeSeconds(exp) <= DateTimeOffset.UtcNow)
return false;
}
return true;
}
catch
{
return false;
}
}
/// <summary>
/// Extracts session ID from token
/// </summary>
/// <param name="token">Token</param>
/// <returns>Session ID</returns>
private string ExtractSessionIdFromToken(string token)
{
try
{
string[] parts = token.Split('.');
if (parts.Length != 3)
return null;
byte[] payloadBytes = Base64UrlDecode(parts[1]);
string payloadJson = Encoding.UTF8.GetString(payloadBytes);
var payload = System.Text.Json.JsonSerializer.Deserialize<Dictionary<string, object>>(payloadJson);
return payload.ContainsKey("sid") ? payload["sid"].ToString() : null;
}
catch
{
return null;
}
}
/// <summary>
/// Base64 URL encoding
/// </summary>
/// <param name="input">Input bytes</param>
/// <returns>Base64 URL encoded string</returns>
private string Base64UrlEncode(byte[] input)
{
return Convert.ToBase64String(input)
.Replace("+", "-")
.Replace("/", "_")
.Replace("=", "");
}
/// <summary>
/// Base64 URL decoding
/// </summary>
/// <param name="input">Base64 URL encoded string</param>
/// <returns>Decoded bytes</returns>
private byte[] Base64UrlDecode(string input)
{
string base64 = input
.Replace("-", "+")
.Replace("_", "/");
// Add padding if needed
switch (base64.Length % 4)
{
case 2: base64 += "=="; break;
case 3: base64 += "="; break;
}
return Convert.FromBase64String(base64);
}
/// <summary>
/// Constant-time string comparison
/// </summary>
/// <param name="a">First string</param>
/// <param name="b">Second string</param>
/// <returns>True if strings are equal</returns>
private bool SecureCompare(string a, string b)
{
if (a == null || b == null || a.Length != b.Length)
return false;
int result = 0;
for (int i = 0; i < a.Length; i++)
{
result |= a[i] ^ b[i];
}
return result == 0;
}
/// <summary>
/// Generates a secret key for token signing
/// </summary>
/// <returns>Secret key</returns>
private string GenerateSecretKey()
{
using (var rng = new RNGCryptoServiceProvider())
{
byte[] bytes = new byte[64];
rng.GetBytes(bytes);
return Convert.ToBase64String(bytes);
}
}
}
/// <summary>
/// Session information model
/// </summary>
public class SessionInfo
{
public string SessionId { get; set; }
public int UserId { get; set; }
public string Token { get; set; }
public DateTime CreatedAt { get; set; }
public DateTime ExpiresAt { get; set; }
public bool IsActive { get; set; }
public string IpAddress { get; set; }
public string UserAgent { get; set; }
}
}