pgp_sequoia.rs (22261B)
1 //! This module provides authentication using PGP signatures. 2 //! 3 //! The public key and signature may be provided both as literal values from the individual PGP packets (i.e. raw public key and signature), 4 //! or as the conventional packet bundle. 5 //! 6 //! If using bundle, the encoded data must be from the binary content, e.g. the output value of: 7 //! 8 //! ``` ignore, 9 //! gpg -b <file> 10 //! ``` 11 //! 12 //! Does not work for ECC secp256k1 signature. 13 use std::io::Read; 14 use crate::auth::{ 15 AuthSpec, 16 AuthError, 17 AuthResult, 18 }; 19 use sequoia_openpgp::Cert; 20 use sequoia_openpgp::KeyHandle; 21 use sequoia_openpgp::Result as PGPResult; 22 use sequoia_openpgp::cert::prelude::*; 23 use sequoia_openpgp::packet::key::PrimaryRole; 24 use sequoia_openpgp::packet::key::PublicParts; 25 use sequoia_openpgp::packet::prelude::*; 26 use sequoia_openpgp::parse::Parse; 27 use sequoia_openpgp::parse::stream::*; 28 use sequoia_openpgp::crypto::hash::Digest; 29 use sequoia_openpgp::serialize::MarshalInto; 30 use sequoia_openpgp::parse::PacketParser; 31 use sequoia_openpgp::parse::PacketParserResult; 32 use sequoia_openpgp::policy::StandardPolicy; 33 use nettle::hash::Sha256; 34 35 use base64; 36 37 use log::{debug, info, error}; 38 39 40 fn check_key_single(data: &Vec<u8>) -> Option<Key<PublicParts, PrimaryRole>> { 41 match Key::from_bytes(&data) { 42 Ok(v) => { 43 let pubkey: Key<PublicParts, PrimaryRole> = v.into(); 44 return Some(pubkey); 45 }, 46 Err(e) => { 47 }, 48 }; 49 None 50 } 51 52 fn check_key_bundle(data: &Vec<u8>) -> Option<Cert> { 53 match Cert::from_bytes(&data) { 54 Ok(v) => { 55 //let pubkey = v.primary_key().key(); 56 //return Some(pubkey.clone()); 57 return Some(v); 58 }, 59 Err(e) => { 60 }, 61 }; 62 None 63 } 64 65 fn check_sig_single(public_key: &Key<PublicParts, PrimaryRole>, signature_data: Vec<u8>, mut message: impl Read, message_length: usize) -> bool { 66 match Signature::from_bytes(&signature_data) { 67 Ok(mut v) => { 68 let mut hasher = Sha256::default(); 69 let mut message_data: Vec<u8> = vec!(); 70 message.read_to_end(&mut message_data); 71 debug!("checking mesageĀ {:?}", &message_data); 72 hasher.update(&message_data); 73 match v.verify_hash(&public_key, Box::new(hasher)) { 74 Ok(v) => { 75 return true; 76 }, 77 Err(e) => { 78 }, 79 } 80 }, 81 Err(e) => { 82 83 }, 84 } 85 false 86 } 87 88 struct Helper { 89 cert: Cert, 90 } 91 92 impl VerificationHelper for Helper { 93 fn get_certs(&mut self, ids: &[KeyHandle]) -> PGPResult<Vec<Cert>> { 94 let mut certs = Vec::new(); 95 certs.push(self.cert.clone()); 96 return Ok(certs); 97 } 98 99 fn check(&mut self, structure: MessageStructure) -> PGPResult<()> { 100 let mut good = false; 101 102 for (i, layer) in structure.into_iter().enumerate() { 103 match (i, layer) { 104 (0, MessageLayer::SignatureGroup { results }) => { 105 match results.into_iter().next() { 106 Some(Ok(_)) => { 107 }, 108 None => { 109 panic!("none"); 110 }, 111 Some(Err(e)) => { 112 panic!("err"); 113 }, 114 }; 115 }, 116 _ => { 117 println!("ouch"); 118 }, 119 }; 120 } 121 Ok(()) 122 } 123 } 124 125 fn check_sig_bundle(public_key: &Cert, signature_data: Vec<u8>, mut message: impl Read, message_length: usize) -> bool { 126 let p = StandardPolicy::new(); 127 let mut sig_bundle_packets = PacketParser::from_bytes(&signature_data).unwrap(); 128 while let PacketParserResult::Some(mut pp) = sig_bundle_packets { 129 let mut pk = pp.packet.clone(); 130 if let Packet::Signature(ref mut sig) = pk { 131 let pbytes = pk.to_vec().unwrap(); 132 let helper = Helper{ 133 cert: public_key.clone(), 134 }; 135 let mut verifier = DetachedVerifierBuilder::from_bytes(&pbytes).unwrap().with_policy(&p, None, helper).unwrap(); 136 137 let mut message_all: Vec<u8> = vec!(); 138 message.read_to_end(&mut message_all); 139 match verifier.verify_bytes(&message_all) { 140 Ok(v) => { 141 return true; 142 }, 143 Err(e) => { 144 }, 145 }; 146 } 147 sig_bundle_packets = pp.recurse().unwrap().1; 148 } 149 false 150 } 151 152 //fn check_sig_bundle(public_key: &PublicKey, signature_data: Vec<u8>, mut message: impl Read, message_length: usize) -> bool { 153 // match StandaloneSignature::from_bytes(&signature_data[..]) { 154 // Ok(v) => { 155 // let mut data: Vec<u8> = vec!(); 156 // let r = message.read_to_end(&mut data); 157 // match v.verify(public_key, &data) { 158 // Ok(v) => { 159 // return true; 160 // }, 161 // _ => {}, 162 // }; 163 // }, 164 // _ => {}, 165 // }; 166 // false 167 //} 168 169 /// Verifies the given [auth::AuthSpec](crate::auth::AuthSpec) structure against the `pgp` scheme. 170 /// 171 /// The `key` and `signature` fields of the [auth::AuthSpec](crate::auth::AuthSpec) **MUST** be 172 /// base64 encoded. 173 /// 174 /// # Arguments 175 /// 176 /// * `auth` - Authentication data submitted by client. 177 /// * `data` - Content body submitted by client, to match signature against. 178 /// * `data_length` - Length of content body. 179 pub fn auth_check(auth: &AuthSpec, data: impl Read, data_length: usize) -> Result<AuthResult, AuthError> { 180 if auth.method != "pgp" { 181 return Err(AuthError{}); 182 } 183 184 let key_data = match base64::decode(&auth.key) { 185 Ok(v) => { 186 v 187 }, 188 Err(e) => { 189 return Err(AuthError{}); 190 } 191 }; 192 193 debug!("signature data {:?}", auth.signature); 194 let sig_data = match base64::decode(&auth.signature) { 195 Ok(v) => { 196 v 197 }, 198 Err(e) => { 199 return Err(AuthError{}); 200 } 201 }; 202 203 204 let key = match check_key_single(&key_data) { 205 Some(v) => { 206 debug!("using public key (raw) {:?}", v.keyid()); 207 let fingerprint = &v.fingerprint().to_vec().unwrap(); 208 let fingerprint_hex = hex::encode(&fingerprint); 209 if !check_sig_single(&v, sig_data, data, data_length) { 210 error!("invalid raw signature for {:?}", &fingerprint_hex); 211 return Err(AuthError{}); 212 } 213 debug!("found valid raw key {:?}", &fingerprint_hex); 214 v 215 }, 216 None => { 217 let key = match check_key_bundle(&key_data) { 218 Some(v) => { 219 let fingerprint = &v.fingerprint().to_vec().unwrap(); 220 let fingerprint_hex = hex::encode(&fingerprint); 221 debug!("using public key (bundle) {:?}", v.keyid()); 222 if !check_sig_bundle(&v, sig_data, data, data_length) { 223 error!("invalid bundle signature for {:?}", &fingerprint_hex); 224 return Err(AuthError{}); 225 } 226 debug!("found valid key bundle {:?}", &fingerprint_hex); 227 v 228 }, 229 None => { 230 return Err(AuthError{}); 231 }, 232 }; 233 key.primary_key().key().clone() 234 }, 235 }; 236 237 238 let res = AuthResult { 239 identity: key.fingerprint().to_vec().unwrap(), 240 error: false, 241 }; 242 Ok(res) 243 } 244 245 #[cfg(test)] 246 mod tests { 247 248 use super::auth_check; 249 use super::AuthSpec; 250 use std::str::FromStr; 251 use super::{ 252 check_key_bundle, 253 check_key_single, 254 check_sig_single, 255 check_sig_bundle, 256 }; 257 use env_logger; 258 259 260 #[test] 261 fn test_pgp_single() { 262 let key_single_hex = "0462a9f5a916092b06010401da470f0101074061f06baae76d5115553019e50353890e498652fac873d78003e9e192dd9f3e13"; 263 let sig_foo_single_hex = "0401160a0006050262a9f5a9002109108b21a9d88b4a0c7f1621044ab95b491980f89789ae8fde8b21a9d88b4a0c7f2aba0100b7b06c424cdb67bba97463d2eb3035ead329f62c92fb6100b629df003748131200fd17e8b6dc866aa1662b93a17ff599334002de273b800fc7160634516187b41407"; 264 265 let key_single = hex::decode(&key_single_hex).unwrap(); 266 let key_single_base64 = base64::encode(&key_single); 267 268 let sig_foo_single = hex::decode(&sig_foo_single_hex).unwrap(); 269 let sig_foo_single_base64 = base64::encode(&sig_foo_single); 270 271 let auth_spec_str = format!("PUBSIG pgp:{}:{}", key_single_base64, sig_foo_single_base64); 272 let auth_spec = AuthSpec::from_str(&auth_spec_str).unwrap(); 273 274 let data = b"foo"; 275 let r = match check_key_single(&key_single) { 276 Some(v) => { 277 //if !check_sig_single(&v, sig_foo_single, &data[..], 0) { 278 // panic!("invalid"); 279 //} 280 }, 281 None => { 282 panic!("no public key"); 283 }, 284 }; 285 286 } 287 288 289 #[test] 290 fn test_pgp_bundle() { 291 let key_bundle_hex = "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"; 292 let sig_foo_bundle_hex = "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"; 293 294 let key_bundle = hex::decode(&key_bundle_hex).unwrap(); 295 let key_bundle_base64 = base64::encode(&key_bundle); 296 297 let sig_foo_bundle = hex::decode(&sig_foo_bundle_hex).unwrap(); 298 let sig_foo_bundle_base64 = base64::encode(&sig_foo_bundle); 299 300 let data = b"foo"; 301 302 let r = match check_key_bundle(&key_bundle) { 303 Some(v) => { 304 //if !check_sig_bundle(&v, sig_foo_bundle, &data[..], 0) { 305 // panic!("invalid"); 306 //} 307 }, 308 None => { 309 panic!("no public key"); 310 }, 311 }; 312 } 313 314 315 #[test] 316 fn test_pgp_auth_single() { 317 env_logger::init(); 318 319 let key_single_hex = "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"; 320 //let key_single_hex = "0462a9f5a916092b06010401da470f0101074061f06baae76d5115553019e50353890e498652fac873d78003e9e192dd9f3e13"; 321 322 let sig_foo_single_hex = "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"; 323 //let sig_foo_single_hex = "0401160a0006050262a9f5a9002109108b21a9d88b4a0c7f1621044ab95b491980f89789ae8fde8b21a9d88b4a0c7f2aba0100b7b06c424cdb67bba97463d2eb3035ead329f62c92fb6100b629df003748131200fd17e8b6dc866aa1662b93a17ff599334002de273b800fc7160634516187b41407"; 324 325 let key_single = hex::decode(&key_single_hex).unwrap(); 326 let key_single_base64 = base64::encode(&key_single); 327 328 let sig_foo_single = hex::decode(&sig_foo_single_hex).unwrap(); 329 let sig_foo_single_base64 = base64::encode(&sig_foo_single); 330 331 let auth_spec_str = format!("PUBSIG pgp:{}:{}", key_single_base64, sig_foo_single_base64); 332 let auth_spec = AuthSpec::from_str(&auth_spec_str).unwrap(); 333 334 let data = b"foo"; 335 336 match auth_check(&auth_spec, &data[..], 0) { 337 Ok(v) => { 338 }, 339 Err(e) => { 340 panic!("{}", e); 341 }, 342 } 343 } 344 345 #[test] 346 fn test_pgp_auth_bundle() { 347 let key_bundle_hex = "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"; 348 let sig_foo_bundle_hex = "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"; 349 350 let key_bundle = hex::decode(&key_bundle_hex).unwrap(); 351 let key_bundle_base64 = base64::encode(&key_bundle); 352 353 let sig_foo_bundle = hex::decode(&sig_foo_bundle_hex).unwrap(); 354 let sig_foo_bundle_base64 = base64::encode(&sig_foo_bundle); 355 356 let auth_spec_str = format!("PUBSIG pgp:{}:{}", key_bundle_base64, sig_foo_bundle_base64); 357 let auth_spec = AuthSpec::from_str(&auth_spec_str).unwrap(); 358 359 let data = b"foo"; 360 361 match auth_check(&auth_spec, &data[..], 0) { 362 Ok(v) => { 363 }, 364 Err(e) => { 365 panic!("{}", e); 366 }, 367 } 368 } 369 }