From c8e5235d1d4500b0c6d65371078cd02aaf28078d Mon Sep 17 00:00:00 2001 From: josh <josh@elixxir.io> Date: Thu, 2 Jun 2022 13:10:07 -0700 Subject: [PATCH] Improve documentation & organization of auth package --- auth/confirm.go | 183 ++++++++++++++++--------------- auth/interface.go | 55 ++++++++++ auth/state.go | 67 ++--------- auth/store/sentRequestHandler.go | 2 +- e2e/sendUnsafe_test.go | 104 ++++++++++++++++++ 5 files changed, 262 insertions(+), 149 deletions(-) create mode 100644 e2e/sendUnsafe_test.go diff --git a/auth/confirm.go b/auth/confirm.go index d95658078..1a7ea2ebd 100644 --- a/auth/confirm.go +++ b/auth/confirm.go @@ -51,97 +51,98 @@ func (s *state) confirm(partner contact.Contact, serviceTag string) ( var sentRound id.Round //run the handler - err := s.store.HandleReceivedRequest(partner.ID, func(rr *store.ReceivedRequest) error { - // verify the passed contact matches what is stored - if rr.GetContact().DhPubKey.Cmp(partner.DhPubKey) != 0 { - return errors.New("pending Auth Request has different " + - "pubkey than stored") - } - - /*cryptographic generation*/ - - // generate ownership proof - ownership := cAuth.MakeOwnershipProof(s.e2e.GetHistoricalDHPrivkey(), - partner.DhPubKey, s.e2e.GetGroup()) - - rng := s.rng.GetStream() - - // generate new keypair - dhPriv, dhPub := genDHKeys(s.e2e.GetGroup(), rng) - sidhVariant := util.GetCompatibleSIDHVariant( - rr.GetTheirSidHPubKeyA().Variant()) - sidhPriv, sidhPub := util.GenerateSIDHKeyPair(sidhVariant, rng) - - rng.Close() - - /*construct message*/ - // we build the payload before we save because it is technically fallible - // which can get into a bricked state if it fails - baseFmt := newBaseFormat(s.net.GetMaxMessageLength(), - s.e2e.GetGroup().GetP().ByteLen()) - ecrFmt := newEcrFormat(baseFmt.GetEcrPayloadLen()) - - // setup the encrypted payload - ecrFmt.SetOwnership(ownership) - ecrFmt.SetSidHPubKey(sidhPub) - // confirmation has no custom payload - - // encrypt the payload - ecrPayload, mac := cAuth.Encrypt(dhPriv, partner.DhPubKey, - ecrFmt.data, s.e2e.GetGroup()) - - // get the fingerprint from the old ownership proof - fp := cAuth.MakeOwnershipProofFP(rr.GetContact().OwnershipProof) - - // final construction - baseFmt.SetEcrPayload(ecrPayload) - baseFmt.SetPubKey(dhPub) - - jww.TRACE.Printf("SendConfirm PARTNERPUBKEY: %v", - partner.DhPubKey.TextVerbose(16, 0)) - jww.TRACE.Printf("SendConfirm MYPUBKEY: %v", dhPub.TextVerbose(16, 0)) - - jww.TRACE.Printf("SendConfirm ECRPAYLOAD: %v", baseFmt.GetEcrPayload()) - jww.TRACE.Printf("SendConfirm MAC: %v", mac) - - // warning: channel can get into a bricked state if the first save occurs and - // the second does not or the two occur and the storage into critical - // messages does not occur - - // create local relationship - p := session.GetDefaultParams() - _, err := s.e2e.AddPartner(partner.ID, partner.DhPubKey, dhPriv, - rr.GetTheirSidHPubKeyA(), sidhPriv, p, p) - if err != nil { - em := fmt.Sprintf("Failed to create channel with partner (%s) "+ - "on confirmation, this is likley a replay: %s", - partner.ID, err.Error()) - jww.WARN.Print(em) - s.event.Report(10, "Auth", "SendConfirmError", em) - } - - s.backupTrigger("confirmed authenticated channel") - - jww.INFO.Printf("Confirming Auth from %s to %s, msgDigest: %s", - partner.ID, s.e2e.GetReceptionID(), - format.DigestContents(baseFmt.Marshal())) - - //service used for notification only - - /*send message*/ - if err = s.store.StoreConfirmation(partner.ID, baseFmt.Marshal(), - mac, fp); err == nil { - jww.WARN.Printf("Failed to store confirmation for replay "+ - "for relationship between %s and %s, cannot be replayed: %+v", - partner.ID, s.e2e.GetReceptionID(), err) - } - - //send confirmation - sentRound, err = sendAuthConfirm(s.net, partner.ID, fp, - baseFmt.Marshal(), mac, s.event, serviceTag) - - return err - }) + err := s.store.HandleReceivedRequest(partner.ID, + func(rr *store.ReceivedRequest) error { + // verify the passed contact matches what is stored + if rr.GetContact().DhPubKey.Cmp(partner.DhPubKey) != 0 { + return errors.New("pending Auth Request has different " + + "pubkey than stored") + } + + /*cryptographic generation*/ + + // generate ownership proof + ownership := cAuth.MakeOwnershipProof(s.e2e.GetHistoricalDHPrivkey(), + partner.DhPubKey, s.e2e.GetGroup()) + + rng := s.rng.GetStream() + + // generate new keypair + dhPriv, dhPub := genDHKeys(s.e2e.GetGroup(), rng) + sidhVariant := util.GetCompatibleSIDHVariant( + rr.GetTheirSidHPubKeyA().Variant()) + sidhPriv, sidhPub := util.GenerateSIDHKeyPair(sidhVariant, rng) + + rng.Close() + + /*construct message*/ + // we build the payload before we save because it is technically + // fallible which can get into a bricked state if it fails + baseFmt := newBaseFormat(s.net.GetMaxMessageLength(), + s.e2e.GetGroup().GetP().ByteLen()) + ecrFmt := newEcrFormat(baseFmt.GetEcrPayloadLen()) + + // setup the encrypted payload + ecrFmt.SetOwnership(ownership) + ecrFmt.SetSidHPubKey(sidhPub) + // confirmation has no custom payload + + // encrypt the payload + ecrPayload, mac := cAuth.Encrypt(dhPriv, partner.DhPubKey, + ecrFmt.data, s.e2e.GetGroup()) + + // get the fingerprint from the old ownership proof + fp := cAuth.MakeOwnershipProofFP(rr.GetContact().OwnershipProof) + + // final construction + baseFmt.SetEcrPayload(ecrPayload) + baseFmt.SetPubKey(dhPub) + + jww.TRACE.Printf("SendConfirm PARTNERPUBKEY: %v", + partner.DhPubKey.TextVerbose(16, 0)) + jww.TRACE.Printf("SendConfirm MYPUBKEY: %v", dhPub.TextVerbose(16, 0)) + + jww.TRACE.Printf("SendConfirm ECRPAYLOAD: %v", baseFmt.GetEcrPayload()) + jww.TRACE.Printf("SendConfirm MAC: %v", mac) + + // warning: channel can get into a bricked state if the first save + // occurs and the second does not or the two occur and the storage + // into critical messages does not occur + + // create local relationship + p := session.GetDefaultParams() + _, err := s.e2e.AddPartner(partner.ID, partner.DhPubKey, dhPriv, + rr.GetTheirSidHPubKeyA(), sidhPriv, p, p) + if err != nil { + em := fmt.Sprintf("Failed to create channel with partner (%s) "+ + "on confirmation, this is likley a replay: %s", + partner.ID, err.Error()) + jww.WARN.Print(em) + s.event.Report(10, "Auth", "SendConfirmError", em) + } + + s.backupTrigger("confirmed authenticated channel") + + jww.INFO.Printf("Confirming Auth from %s to %s, msgDigest: %s", + partner.ID, s.e2e.GetReceptionID(), + format.DigestContents(baseFmt.Marshal())) + + //service used for notification only + + /*send message*/ + if err = s.store.StoreConfirmation(partner.ID, baseFmt.Marshal(), + mac, fp); err == nil { + jww.WARN.Printf("Failed to store confirmation for replay "+ + "for relationship between %s and %s, cannot be replayed: %+v", + partner.ID, s.e2e.GetReceptionID(), err) + } + + //send confirmation + sentRound, err = sendAuthConfirm(s.net, partner.ID, fp, + baseFmt.Marshal(), mac, s.event, serviceTag) + + return err + }) return sentRound, err } diff --git a/auth/interface.go b/auth/interface.go index b8ea8865c..92ad54b77 100644 --- a/auth/interface.go +++ b/auth/interface.go @@ -1,10 +1,21 @@ package auth import ( + "github.com/cloudflare/circl/dh/sidh" + "gitlab.com/elixxir/client/cmix" + "gitlab.com/elixxir/client/cmix/identity" + "gitlab.com/elixxir/client/cmix/identity/receptionID" + "gitlab.com/elixxir/client/cmix/message" + "gitlab.com/elixxir/client/cmix/rounds" "gitlab.com/elixxir/client/e2e" + "gitlab.com/elixxir/client/e2e/ratchet/partner" + "gitlab.com/elixxir/client/e2e/ratchet/partner/session" "gitlab.com/elixxir/crypto/contact" + "gitlab.com/elixxir/crypto/cyclic" "gitlab.com/elixxir/primitives/fact" + "gitlab.com/elixxir/primitives/format" "gitlab.com/xx_network/primitives/id" + "gitlab.com/xx_network/primitives/id/ephemeral" ) type State interface { @@ -84,3 +95,47 @@ type State interface { // VerifyOwnership checks if the received ownership proof is valid VerifyOwnership(received, verified contact.Contact, e2e e2e.Handler) bool } + +// Callbacks is the interface for auth callback methods. +type Callbacks interface { + Request(partner contact.Contact, receptionID receptionID.EphemeralIdentity, + round rounds.Round) + Confirm(partner contact.Contact, receptionID receptionID.EphemeralIdentity, + round rounds.Round) + Reset(partner contact.Contact, receptionID receptionID.EphemeralIdentity, + round rounds.Round) +} + +// cmixClient is a sub-interface of cmix.Client with +// methods relevant to this package. +type cmixClient interface { + IsHealthy() bool + GetMaxMessageLength() int + AddService(clientID *id.ID, newService message.Service, + response message.Processor) + DeleteService(clientID *id.ID, toDelete message.Service, + processor message.Processor) + GetIdentity(get *id.ID) (identity.TrackedID, error) + AddFingerprint(identity *id.ID, fingerprint format.Fingerprint, + mp message.Processor) error + DeleteFingerprint(identity *id.ID, fingerprint format.Fingerprint) + Send(recipient *id.ID, fingerprint format.Fingerprint, + service message.Service, payload, mac []byte, cmixParams cmix.CMIXParams) ( + id.Round, ephemeral.Id, error) +} + +// e2eHandler is a sub-interface of e2e.Handler containing +// methods relevant to this package. +type e2eHandler interface { + GetHistoricalDHPubkey() *cyclic.Int + GetHistoricalDHPrivkey() *cyclic.Int + GetGroup() *cyclic.Group + AddPartner(partnerID *id.ID, + partnerPubKey, myPrivKey *cyclic.Int, + partnerSIDHPubKey *sidh.PublicKey, + mySIDHPrivKey *sidh.PrivateKey, sendParams, + receiveParams session.Params) (partner.Manager, error) + GetPartner(partnerID *id.ID) (partner.Manager, error) + DeletePartner(partnerId *id.ID) error + GetReceptionID() *id.ID +} diff --git a/auth/state.go b/auth/state.go index 2be3d4d6b..e2da71073 100644 --- a/auth/state.go +++ b/auth/state.go @@ -10,27 +10,19 @@ package auth import ( "encoding/base64" - "github.com/cloudflare/circl/dh/sidh" "github.com/pkg/errors" "gitlab.com/elixxir/client/auth/store" "gitlab.com/elixxir/client/cmix" - "gitlab.com/elixxir/client/cmix/identity" "gitlab.com/elixxir/client/cmix/identity/receptionID" "gitlab.com/elixxir/client/cmix/message" - "gitlab.com/elixxir/client/cmix/rounds" "gitlab.com/elixxir/client/e2e" - "gitlab.com/elixxir/client/e2e/ratchet/partner" - "gitlab.com/elixxir/client/e2e/ratchet/partner/session" "gitlab.com/elixxir/client/event" "gitlab.com/elixxir/client/storage/versioned" - "gitlab.com/elixxir/crypto/contact" - "gitlab.com/elixxir/crypto/cyclic" "gitlab.com/elixxir/crypto/fastRNG" - "gitlab.com/elixxir/primitives/format" "gitlab.com/xx_network/primitives/id" - "gitlab.com/xx_network/primitives/id/ephemeral" ) +// state is an implementation of the State interface. type state struct { callbacks Callbacks @@ -46,45 +38,6 @@ type state struct { backupTrigger func(reason string) } -type cmixClient interface { - IsHealthy() bool - GetMaxMessageLength() int - AddService(clientID *id.ID, newService message.Service, - response message.Processor) - DeleteService(clientID *id.ID, toDelete message.Service, - processor message.Processor) - GetIdentity(get *id.ID) (identity.TrackedID, error) - AddFingerprint(identity *id.ID, fingerprint format.Fingerprint, - mp message.Processor) error - DeleteFingerprint(identity *id.ID, fingerprint format.Fingerprint) - Send(recipient *id.ID, fingerprint format.Fingerprint, - service message.Service, payload, mac []byte, cmixParams cmix.CMIXParams) ( - id.Round, ephemeral.Id, error) -} - -type e2eHandler interface { - GetHistoricalDHPubkey() *cyclic.Int - GetHistoricalDHPrivkey() *cyclic.Int - GetGroup() *cyclic.Group - AddPartner(partnerID *id.ID, - partnerPubKey, myPrivKey *cyclic.Int, - partnerSIDHPubKey *sidh.PublicKey, - mySIDHPrivKey *sidh.PrivateKey, sendParams, - receiveParams session.Params) (partner.Manager, error) - GetPartner(partnerID *id.ID) (partner.Manager, error) - DeletePartner(partnerId *id.ID) error - GetReceptionID() *id.ID -} - -type Callbacks interface { - Request(partner contact.Contact, receptionID receptionID.EphemeralIdentity, - round rounds.Round) - Confirm(partner contact.Contact, receptionID receptionID.EphemeralIdentity, - round rounds.Round) - Reset(partner contact.Contact, receptionID receptionID.EphemeralIdentity, - round rounds.Round) -} - // NewState loads the auth state or creates new auth state if one cannot be // found. // Bases its reception identity and keys off of what is found in e2e. @@ -92,8 +45,8 @@ type Callbacks interface { // Parameters: // The params object passed in determines the services that will be used // to pick up requests and signal notifications. These are unique to an -// identity, so multiple auth states with the same service tags with different -// identities can run simultaneously. +// identity, so multiple auth states with the same service tags with +// different identities can run simultaneously. // Default parameters can be retrieved via GetDefaultParameters() // Temporary: // In some cases, for example client <-> server communications, connections @@ -108,10 +61,9 @@ func NewState(kv *versioned.KV, net cmix.Client, e2e e2e.Handler, kv, net, e2e, rng, event, params, callbacks, backupTrigger) } -// NewStateLegacy loads the auth state or creates new auth state if one cannot be -// found. -// Bases its reception identity and keys off of what is found in e2e. -// Does not modify the kv prefix for backwards compatibility +// NewStateLegacy loads the auth state or creates new auth state if one cannot +// be found. Bases its reception identity and keys off of what is found in e2e. +// Does not modify the kv prefix for backwards compatibility. // Otherwise, acts the same as NewState func NewStateLegacy(kv *versioned.KV, net cmix.Client, e2e e2e.Handler, rng *fastRNG.StreamGenerator, event event.Reporter, params Param, @@ -152,13 +104,14 @@ func NewStateLegacy(kv *versioned.KV, net cmix.Client, e2e e2e.Handler, return s, nil } -// CallAllReceivedRequests will iterate through all pending contact requests and replay -// them on the callbacks. +// CallAllReceivedRequests will iterate through all pending contact requests +// and replay them on the callbacks. func (s *state) CallAllReceivedRequests() { rrList := s.store.GetAllReceivedRequests() for i := range rrList { rr := rrList[i] - eph := receptionID.BuildIdentityFromRound(rr.GetContact().ID, rr.GetRound()) + eph := receptionID.BuildIdentityFromRound(rr.GetContact().ID, + rr.GetRound()) s.callbacks.Request(rr.GetContact(), eph, rr.GetRound()) } } diff --git a/auth/store/sentRequestHandler.go b/auth/store/sentRequestHandler.go index 1f22c53a2..4a8afac3e 100644 --- a/auth/store/sentRequestHandler.go +++ b/auth/store/sentRequestHandler.go @@ -1,6 +1,6 @@ package store -// SentRequestHandler allows the lower fevel to assign and remove services +// SentRequestHandler allows the lower level to assign and remove services type SentRequestHandler interface { Add(sr *SentRequest) Delete(sr *SentRequest) diff --git a/e2e/sendUnsafe_test.go b/e2e/sendUnsafe_test.go new file mode 100644 index 000000000..ab8fac2b8 --- /dev/null +++ b/e2e/sendUnsafe_test.go @@ -0,0 +1,104 @@ +/////////////////////////////////////////////////////////////////////////////// +// Copyright © 2020 xx network SEZC // +// // +// Use of this source code is governed by a license that can be found in the // +// LICENSE file // +/////////////////////////////////////////////////////////////////////////////// + +package e2e + +import ( + "gitlab.com/elixxir/client/catalog" + "gitlab.com/elixxir/client/e2e/parse" + "gitlab.com/elixxir/client/e2e/ratchet" + "gitlab.com/elixxir/client/e2e/receive" + "gitlab.com/elixxir/client/e2e/rekey" + "gitlab.com/elixxir/client/storage/versioned" + dh "gitlab.com/elixxir/crypto/diffieHellman" + "gitlab.com/elixxir/crypto/fastRNG" + "gitlab.com/elixxir/ekv" + "gitlab.com/xx_network/crypto/csprng" + "gitlab.com/xx_network/primitives/id" + "testing" +) + +func TestManager_SendUnsafe(t *testing.T) { + streamGen := fastRNG.NewStreamGenerator(12, 1024, csprng.NewSystemRNG) + rng := streamGen.GetStream() + defer rng.Close() + netHandler := newMockCmixHandler() + + // Generate new E2E manager + myKv := versioned.NewKV(ekv.MakeMemstore()) + myID := id.NewIdFromString("myID", id.User, t) + myNet := newMockCmix(myID, netHandler, t) + m1 := &manager{ + Switchboard: receive.New(), + partitioner: parse.NewPartitioner(myKv, myNet.GetMaxMessageLength()), + net: myNet, + myID: myID, + events: mockEventsManager{}, + grp: myNet.GetInstance().GetE2EGroup(), + rekeyParams: rekey.GetDefaultParams(), + } + + myPrivKey := dh.GeneratePrivateKey( + dh.DefaultPrivateKeyLength, m1.grp, rng) + err := ratchet.New(myKv, myID, myPrivKey, m1.grp) + if err != nil { + t.Errorf("Failed to generate new ratchet: %+v", err) + } + + myFpGen := &fpGenerator{m1} + myServices := newMockServices() + + m1.Ratchet, err = ratchet.Load( + myKv, myID, m1.grp, myFpGen, myServices, streamGen) + + // Generate new E2E manager + partnerKv := versioned.NewKV(ekv.MakeMemstore()) + partnerID := id.NewIdFromString("partnerID", id.User, t) + partnerNet := newMockCmix(partnerID, netHandler, t) + m2 := &manager{ + Switchboard: receive.New(), + partitioner: parse.NewPartitioner(partnerKv, partnerNet.GetMaxMessageLength()), + net: partnerNet, + myID: partnerID, + events: mockEventsManager{}, + grp: partnerNet.GetInstance().GetE2EGroup(), + rekeyParams: rekey.GetDefaultParams(), + } + + receiveChan := make(chan receive.Message, 10) + m2.Switchboard.RegisterListener(partnerID, catalog.NoType, &mockListener{receiveChan}) + + partnerPrivKey := dh.GeneratePrivateKey( + dh.DefaultPrivateKeyLength, m2.grp, rng) + err = ratchet.New(partnerKv, partnerID, partnerPrivKey, m2.grp) + if err != nil { + t.Errorf("Failed to generate new ratchet: %+v", err) + } + + partnerFpGen := &fpGenerator{m2} + partnerServices := newMockServices() + + m1.Ratchet, err = ratchet.Load( + partnerKv, partnerID, m2.grp, partnerFpGen, partnerServices, streamGen) + + // Generate partner identity and add partner + partnerPubKey, partnerSidhPubKey, mySidhPrivKey, sessionParams := + genPartnerKeys(partnerPrivKey, m1.grp, rng, t) + _, err = m1.Ratchet.AddPartner(partnerID, partnerPubKey, myPrivKey, + partnerSidhPubKey, mySidhPrivKey, sessionParams, sessionParams) + if err != nil { + t.Errorf("Failed to add partner: %+v", err) + } + + payload := []byte("My Payload") + p := GetDefaultParams() + + _, _, err = m1.sendUnsafe(catalog.NoType, partnerID, payload, p) + if err != nil { + t.Fatalf("sendUnsafe error: %v", err) + } +} -- GitLab