2018-11-26 11:23:27 +01:00
|
|
|
// Copyright (c) 2018 Shivaram Lingamneni <slingamn@cs.stanford.edu>
|
|
|
|
// released under the MIT license
|
|
|
|
|
|
|
|
package utils
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rand"
|
2020-05-05 04:29:10 +02:00
|
|
|
"crypto/sha256"
|
2018-11-26 11:23:27 +01:00
|
|
|
"crypto/subtle"
|
2020-05-05 04:29:10 +02:00
|
|
|
"crypto/tls"
|
2018-12-28 19:45:55 +01:00
|
|
|
"encoding/base32"
|
2019-05-12 22:26:23 +02:00
|
|
|
"encoding/base64"
|
2019-12-29 17:59:49 +01:00
|
|
|
"encoding/hex"
|
|
|
|
"errors"
|
2020-05-05 04:29:10 +02:00
|
|
|
"net"
|
2019-12-18 21:44:06 +01:00
|
|
|
"strings"
|
2020-05-05 04:29:10 +02:00
|
|
|
"time"
|
2018-12-28 19:45:55 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2019-02-08 02:41:25 +01:00
|
|
|
// slingamn's own private b32 alphabet, removing 1, l, o, and 0
|
2019-05-12 08:17:57 +02:00
|
|
|
B32Encoder = base32.NewEncoding("abcdefghijkmnpqrstuvwxyz23456789").WithPadding(base32.NoPadding)
|
2019-12-29 17:59:49 +01:00
|
|
|
|
|
|
|
ErrInvalidCertfp = errors.New("Invalid certfp")
|
2020-05-05 04:29:10 +02:00
|
|
|
|
|
|
|
ErrNoPeerCerts = errors.New("No certfp available")
|
|
|
|
|
|
|
|
ErrNotTLS = errors.New("Connection is not TLS")
|
2018-11-26 11:23:27 +01:00
|
|
|
)
|
|
|
|
|
2019-02-12 06:27:57 +01:00
|
|
|
const (
|
|
|
|
SecretTokenLength = 26
|
|
|
|
)
|
|
|
|
|
2018-11-26 11:23:27 +01:00
|
|
|
// generate a secret token that cannot be brute-forced via online attacks
|
|
|
|
func GenerateSecretToken() string {
|
|
|
|
// 128 bits of entropy are enough to resist any online attack:
|
|
|
|
var buf [16]byte
|
|
|
|
rand.Read(buf[:])
|
2018-12-28 19:45:55 +01:00
|
|
|
// 26 ASCII characters, should be fine for most purposes
|
2019-05-12 08:17:57 +02:00
|
|
|
return B32Encoder.EncodeToString(buf[:])
|
2018-11-26 11:23:27 +01:00
|
|
|
}
|
|
|
|
|
2019-05-15 11:00:55 +02:00
|
|
|
// "munge" a secret token to a new value. requirements:
|
|
|
|
// 1. MUST be roughly as unlikely to collide with `GenerateSecretToken` outputs
|
|
|
|
// as those outputs are with each other
|
|
|
|
// 2. SHOULD be deterministic (motivation: if a JOIN line has msgid x,
|
|
|
|
// create a deterministic msgid y for the fake HistServ PRIVMSG that "replays" it)
|
|
|
|
// 3. SHOULD be in the same "namespace" as `GenerateSecretToken` outputs
|
|
|
|
// (same length and character set)
|
|
|
|
func MungeSecretToken(token string) (result string) {
|
|
|
|
bytes, err := B32Encoder.DecodeString(token)
|
|
|
|
if err != nil {
|
|
|
|
// this should never happen
|
|
|
|
return GenerateSecretToken()
|
|
|
|
}
|
|
|
|
// add 1 with carrying
|
|
|
|
for i := len(bytes) - 1; 0 <= i; i -= 1 {
|
|
|
|
bytes[i] += 1
|
|
|
|
if bytes[i] != 0 {
|
|
|
|
break
|
|
|
|
} // else: overflow, carry to the next place
|
|
|
|
}
|
|
|
|
return B32Encoder.EncodeToString(bytes)
|
|
|
|
}
|
|
|
|
|
2018-11-26 11:23:27 +01:00
|
|
|
// securely check if a supplied token matches a stored token
|
|
|
|
func SecretTokensMatch(storedToken string, suppliedToken string) bool {
|
|
|
|
// XXX fix a potential gotcha: if the stored token is uninitialized,
|
|
|
|
// then nothing should match it, not even supplying an empty token.
|
|
|
|
if len(storedToken) == 0 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return subtle.ConstantTimeCompare([]byte(storedToken), []byte(suppliedToken)) == 1
|
|
|
|
}
|
2019-05-12 22:26:23 +02:00
|
|
|
|
|
|
|
// generate a 256-bit secret key that can be written into a config file
|
|
|
|
func GenerateSecretKey() string {
|
|
|
|
var buf [32]byte
|
|
|
|
rand.Read(buf[:])
|
|
|
|
return base64.RawURLEncoding.EncodeToString(buf[:])
|
|
|
|
}
|
2019-12-18 21:44:06 +01:00
|
|
|
|
2019-12-29 17:59:49 +01:00
|
|
|
// Normalize openssl-formatted certfp's to oragono's format
|
|
|
|
func NormalizeCertfp(certfp string) (result string, err error) {
|
|
|
|
result = strings.ToLower(strings.Replace(certfp, ":", "", -1))
|
|
|
|
decoded, err := hex.DecodeString(result)
|
|
|
|
if err != nil || len(decoded) != 32 {
|
|
|
|
return "", ErrInvalidCertfp
|
2019-12-18 21:44:06 +01:00
|
|
|
}
|
2019-12-29 17:59:49 +01:00
|
|
|
return
|
2019-12-18 21:44:06 +01:00
|
|
|
}
|
2020-05-05 04:29:10 +02:00
|
|
|
|
|
|
|
func GetCertFP(conn net.Conn, handshakeTimeout time.Duration) (result string, err error) {
|
|
|
|
tlsConn, isTLS := conn.(*tls.Conn)
|
|
|
|
if !isTLS {
|
|
|
|
return "", ErrNotTLS
|
|
|
|
}
|
|
|
|
|
|
|
|
// ensure handshake is performed
|
|
|
|
tlsConn.SetDeadline(time.Now().Add(handshakeTimeout))
|
|
|
|
err = tlsConn.Handshake()
|
|
|
|
tlsConn.SetDeadline(time.Time{})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
peerCerts := tlsConn.ConnectionState().PeerCertificates
|
|
|
|
if len(peerCerts) < 1 {
|
|
|
|
return "", ErrNoPeerCerts
|
|
|
|
}
|
|
|
|
|
|
|
|
rawCert := sha256.Sum256(peerCerts[0].Raw)
|
|
|
|
fingerprint := hex.EncodeToString(rawCert[:])
|
|
|
|
|
|
|
|
return fingerprint, nil
|
|
|
|
}
|