Reticulum/RNS/Identity.py

328 lines
9.5 KiB
Python
Raw Permalink Normal View History

2018-03-16 10:40:37 +00:00
import base64
import math
2018-03-19 17:11:50 +00:00
import os
import RNS
2018-03-19 19:51:26 +00:00
import time
import atexit
2020-04-22 10:07:13 +00:00
from .vendor import umsgpack as umsgpack
2018-03-16 10:40:37 +00:00
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import serialization
2018-03-19 17:11:50 +00:00
from cryptography.hazmat.primitives.serialization import load_der_public_key
from cryptography.hazmat.primitives.serialization import load_der_private_key
2018-03-16 10:40:37 +00:00
from cryptography.hazmat.primitives.asymmetric import rsa
from cryptography.hazmat.primitives.asymmetric import padding
2018-03-16 09:50:37 +00:00
class Identity:
2018-04-17 15:46:48 +00:00
#KEYSIZE = 1536
KEYSIZE = 1024
DERKEYSIZE = KEYSIZE+272
2018-03-16 09:50:37 +00:00
2018-04-17 15:46:48 +00:00
# Non-configurable constants
PADDINGSIZE = 336 # In bits
HASHLENGTH = 256 # In bits
SIGLENGTH = KEYSIZE
2018-03-16 10:40:37 +00:00
ENCRYPT_CHUNKSIZE = (KEYSIZE-PADDINGSIZE)//8
DECRYPT_CHUNKSIZE = KEYSIZE//8
TRUNCATED_HASHLENGTH = 80 # In bits
2018-03-19 17:11:50 +00:00
# Storage
2018-03-19 19:51:26 +00:00
known_destinations = {}
2018-03-19 17:11:50 +00:00
2018-03-16 10:40:37 +00:00
@staticmethod
2018-03-20 11:32:41 +00:00
def remember(packet_hash, destination_hash, public_key, app_data = None):
RNS.log("Remembering "+RNS.prettyhexrep(destination_hash), RNS.LOG_VERBOSE)
2018-03-20 11:32:41 +00:00
Identity.known_destinations[destination_hash] = [time.time(), packet_hash, public_key, app_data]
2018-03-19 17:11:50 +00:00
@staticmethod
2018-03-20 11:32:41 +00:00
def recall(destination_hash):
2020-03-06 21:20:50 +00:00
RNS.log("Searching for "+RNS.prettyhexrep(destination_hash)+"...", RNS.LOG_EXTREME)
2018-03-20 11:32:41 +00:00
if destination_hash in Identity.known_destinations:
identity_data = Identity.known_destinations[destination_hash]
identity = Identity(public_only=True)
identity.loadPublicKey(identity_data[2])
2020-03-06 21:20:50 +00:00
RNS.log("Found "+RNS.prettyhexrep(destination_hash)+" in known destinations", RNS.LOG_EXTREME)
2018-03-20 11:32:41 +00:00
return identity
else:
2020-03-06 21:20:50 +00:00
RNS.log("Could not find "+RNS.prettyhexrep(destination_hash)+" in known destinations", RNS.LOG_EXTREME)
2018-03-20 11:32:41 +00:00
return None
2018-03-19 17:11:50 +00:00
2018-03-19 19:51:26 +00:00
@staticmethod
def saveKnownDestinations():
RNS.log("Saving known destinations to storage...", RNS.LOG_VERBOSE)
2020-04-22 10:07:13 +00:00
file = open(RNS.Reticulum.storagepath+"/known_destinations","wb")
2018-04-18 21:31:17 +00:00
umsgpack.dump(Identity.known_destinations, file)
2018-03-19 19:51:26 +00:00
file.close()
RNS.log("Done saving known destinations to storage", RNS.LOG_VERBOSE)
2018-03-19 19:51:26 +00:00
@staticmethod
def loadKnownDestinations():
if os.path.isfile(RNS.Reticulum.storagepath+"/known_destinations"):
try:
2020-04-22 10:07:13 +00:00
file = open(RNS.Reticulum.storagepath+"/known_destinations","rb")
Identity.known_destinations = umsgpack.load(file)
file.close()
2020-05-11 19:27:42 +00:00
RNS.log("Loaded "+str(len(Identity.known_destinations))+" known destination from storage", RNS.LOG_VERBOSE)
except:
RNS.log("Error loading known destinations from disk, file will be recreated on exit", RNS.LOG_ERROR)
2018-03-19 19:51:26 +00:00
else:
RNS.log("Destinations file does not exist, so no known destinations loaded", RNS.LOG_VERBOSE)
2018-03-19 19:51:26 +00:00
2018-03-19 17:11:50 +00:00
@staticmethod
def fullHash(data):
digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
digest.update(data)
return digest.finalize()
@staticmethod
def truncatedHash(data):
2018-03-16 10:40:37 +00:00
digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
2018-03-19 17:11:50 +00:00
digest.update(data)
2018-03-16 10:40:37 +00:00
2020-04-22 10:07:13 +00:00
return digest.finalize()[:(Identity.TRUNCATED_HASHLENGTH//8)]
2018-03-16 10:40:37 +00:00
2018-04-18 21:31:17 +00:00
@staticmethod
def getRandomHash():
return Identity.truncatedHash(os.urandom(10))
2018-03-19 17:11:50 +00:00
@staticmethod
def validateAnnounce(packet):
if packet.packet_type == RNS.Packet.ANNOUNCE:
2020-03-06 13:28:26 +00:00
RNS.log("Validating announce from "+RNS.prettyhexrep(packet.destination_hash), RNS.LOG_DEBUG)
2018-03-19 17:11:50 +00:00
destination_hash = packet.destination_hash
2020-04-22 10:07:13 +00:00
public_key = packet.data[10:Identity.DERKEYSIZE//8+10]
random_hash = packet.data[Identity.DERKEYSIZE//8+10:Identity.DERKEYSIZE//8+20]
signature = packet.data[Identity.DERKEYSIZE//8+20:Identity.DERKEYSIZE//8+20+Identity.KEYSIZE//8]
app_data = b""
if len(packet.data) > Identity.DERKEYSIZE//8+20+Identity.KEYSIZE//8:
app_data = packet.data[Identity.DERKEYSIZE//8+20+Identity.KEYSIZE//8:]
2018-03-19 17:11:50 +00:00
signed_data = destination_hash+public_key+random_hash+app_data
2018-03-19 19:51:26 +00:00
announced_identity = Identity(public_only=True)
2018-03-19 17:11:50 +00:00
announced_identity.loadPublicKey(public_key)
2018-03-20 15:57:26 +00:00
if announced_identity.pub != None and announced_identity.validate(signature, signed_data):
2020-03-06 21:20:50 +00:00
RNS.Identity.remember(packet.getHash(), destination_hash, public_key)
RNS.log("Stored valid announce from "+RNS.prettyhexrep(destination_hash), RNS.LOG_INFO)
2018-03-20 11:32:41 +00:00
del announced_identity
return True
2018-03-19 17:11:50 +00:00
else:
2018-04-24 22:20:57 +00:00
RNS.log("Received invalid announce", RNS.LOG_DEBUG)
2018-03-20 11:32:41 +00:00
del announced_identity
return False
@staticmethod
def exitHandler():
Identity.saveKnownDestinations()
2018-03-19 17:11:50 +00:00
@staticmethod
def from_file(path):
identity = Identity(public_only=True)
if identity.load(path):
return identity
else:
return None
def __init__(self,public_only=False):
# Initialize keys to none
self.prv = None
self.pub = None
self.prv_bytes = None
self.pub_bytes = None
self.hash = None
self.hexhash = None
if not public_only:
self.createKeys()
2018-03-16 10:40:37 +00:00
def createKeys(self):
self.prv = rsa.generate_private_key(
public_exponent=65337,
key_size=Identity.KEYSIZE,
backend=default_backend()
)
self.prv_bytes = self.prv.private_bytes(
encoding=serialization.Encoding.DER,
format=serialization.PrivateFormat.PKCS8,
encryption_algorithm=serialization.NoEncryption()
)
self.pub = self.prv.public_key()
self.pub_bytes = self.pub.public_bytes(
encoding=serialization.Encoding.DER,
format=serialization.PublicFormat.SubjectPublicKeyInfo
)
2018-03-20 11:32:41 +00:00
self.updateHashes()
2018-03-16 10:40:37 +00:00
RNS.log("Identity keys created for "+RNS.prettyhexrep(self.hash), RNS.LOG_VERBOSE)
2018-03-16 10:40:37 +00:00
def getPrivateKey(self):
return self.prv_bytes
def getPublicKey(self):
return self.pub_bytes
def loadPrivateKey(self, prv_bytes):
try:
self.prv_bytes = prv_bytes
self.prv = serialization.load_der_private_key(
self.prv_bytes,
password=None,
backend=default_backend()
)
self.pub = self.prv.public_key()
self.pub_bytes = self.pub.public_bytes(
encoding=serialization.Encoding.DER,
format=serialization.PublicFormat.SubjectPublicKeyInfo
)
self.updateHashes()
return True
except Exception as e:
RNS.log("Failed to load identity key", RNS.LOG_ERROR)
RNS.log("The contained exception was: "+str(e))
return False
2018-03-16 10:40:37 +00:00
def loadPublicKey(self, key):
2018-03-20 15:57:26 +00:00
try:
self.pub_bytes = key
self.pub = load_der_public_key(self.pub_bytes, backend=default_backend())
self.updateHashes()
except Exception as e:
RNS.log("Error while loading public key, the contained exception was: "+str(e), RNS.LOG_ERROR)
2018-03-20 11:32:41 +00:00
def updateHashes(self):
self.hash = Identity.truncatedHash(self.pub_bytes)
2020-04-22 10:07:13 +00:00
self.hexhash = self.hash.hex()
2018-03-16 10:40:37 +00:00
def save(self, path):
try:
2020-04-22 10:07:13 +00:00
with open(path, "wb") as key_file:
key_file.write(self.prv_bytes)
return True
return False
except Exception as e:
RNS.log("Error while saving identity to "+str(path), RNS.LOG_ERROR)
RNS.log("The contained exception was: "+str(e))
2018-03-16 10:40:37 +00:00
def load(self, path):
try:
2020-04-22 10:07:13 +00:00
with open(path, "rb") as key_file:
prv_bytes = key_file.read()
return self.loadPrivateKey(prv_bytes)
return False
except Exception as e:
RNS.log("Error while loading identity from "+str(path), RNS.LOG_ERROR)
RNS.log("The contained exception was: "+str(e))
2018-03-16 10:40:37 +00:00
def encrypt(self, plaintext):
2018-03-20 11:32:41 +00:00
if self.pub != None:
chunksize = Identity.ENCRYPT_CHUNKSIZE
2018-03-16 10:40:37 +00:00
chunks = int(math.ceil(len(plaintext)/(float(chunksize))))
2020-04-22 10:07:13 +00:00
ciphertext = b"";
2018-03-16 10:40:37 +00:00
for chunk in range(chunks):
start = chunk*chunksize
end = (chunk+1)*chunksize
if (chunk+1)*chunksize > len(plaintext):
end = len(plaintext)
ciphertext += self.pub.encrypt(
plaintext[start:end],
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA1()),
algorithm=hashes.SHA1(),
label=None
)
)
return ciphertext
else:
2018-03-20 11:32:41 +00:00
raise KeyError("Encryption failed because identity does not hold a public key")
2018-03-16 10:40:37 +00:00
def decrypt(self, ciphertext):
if self.prv != None:
2018-03-20 15:57:26 +00:00
plaintext = None
try:
chunksize = Identity.DECRYPT_CHUNKSIZE
2018-03-20 15:57:26 +00:00
chunks = int(math.ceil(len(ciphertext)/(float(chunksize))))
2020-04-22 10:07:13 +00:00
plaintext = b"";
2018-03-20 15:57:26 +00:00
for chunk in range(chunks):
start = chunk*chunksize
end = (chunk+1)*chunksize
if (chunk+1)*chunksize > len(ciphertext):
end = len(ciphertext)
plaintext += self.prv.decrypt(
ciphertext[start:end],
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA1()),
algorithm=hashes.SHA1(),
label=None
)
2018-03-16 10:40:37 +00:00
)
2018-03-20 15:57:26 +00:00
except:
2018-04-16 15:13:39 +00:00
RNS.log("Decryption by "+RNS.prettyhexrep(self.hash)+" failed", RNS.LOG_VERBOSE)
2018-03-20 15:57:26 +00:00
2018-03-16 10:40:37 +00:00
return plaintext;
else:
raise KeyError("Decryption failed because identity does not hold a private key")
def sign(self, message):
if self.prv != None:
2018-04-25 23:16:16 +00:00
signature = self.prv.sign(
message,
2018-03-16 10:40:37 +00:00
padding.PSS(
mgf=padding.MGF1(hashes.SHA256()),
salt_length=padding.PSS.MAX_LENGTH
),
hashes.SHA256()
)
2018-04-25 23:16:16 +00:00
return signature
2018-03-16 10:40:37 +00:00
else:
raise KeyError("Signing failed because identity does not hold a private key")
2018-03-19 17:11:50 +00:00
def validate(self, signature, message):
if self.pub != None:
try:
self.pub.verify(
signature,
message,
padding.PSS(
mgf=padding.MGF1(hashes.SHA256()),
salt_length=padding.PSS.MAX_LENGTH
),
hashes.SHA256()
)
return True
2018-04-17 15:46:48 +00:00
except Exception as e:
2018-03-19 17:11:50 +00:00
return False
else:
raise KeyError("Signature validation failed because identity does not hold a public key")
2018-04-17 15:46:48 +00:00
def prove(self, packet, destination=None):
signature = self.sign(packet.packet_hash)
if RNS.Reticulum.should_use_implicit_proof():
proof_data = signature
else:
proof_data = packet.packet_hash + signature
if destination == None:
destination = packet.generateProofDestination()
proof = RNS.Packet(destination, proof_data, RNS.Packet.PROOF, attached_interface = packet.receiving_interface)
2018-03-20 11:32:41 +00:00
proof.send()
def __str__(self):
return RNS.prettyhexrep(self.hash)