py-libp2p/libp2p/security/secio/transport.py

485 lines
16 KiB
Python
Raw Normal View History

2019-08-17 09:54:06 +08:00
from dataclasses import dataclass
import io
import itertools
from typing import Optional, Tuple
2019-08-17 09:54:06 +08:00
2019-10-17 15:34:11 +08:00
import multihash
from libp2p.crypto.authenticated_encryption import (
EncryptionParameters as AuthenticatedEncryptionParameters,
)
from libp2p.crypto.authenticated_encryption import (
initialize_pair as initialize_pair_for_encryption,
)
2019-10-18 15:44:07 +08:00
from libp2p.crypto.authenticated_encryption import InvalidMACException
from libp2p.crypto.authenticated_encryption import MacAndCipher as Encrypter
from libp2p.crypto.ecc import ECCPublicKey
from libp2p.crypto.exceptions import MissingDeserializerError
from libp2p.crypto.key_exchange import create_ephemeral_key_pair
2019-08-22 23:55:36 +08:00
from libp2p.crypto.keys import PrivateKey, PublicKey
from libp2p.crypto.serialization import deserialize_public_key
from libp2p.io.exceptions import DecryptionFailedException, IOException
from libp2p.io.msgio import MsgIOReadWriter
2019-08-17 09:54:06 +08:00
from libp2p.network.connection.raw_connection_interface import IRawConnection
from libp2p.peer.id import ID as PeerID
from libp2p.security.base_session import BaseSession
from libp2p.security.base_transport import BaseSecureTransport
from libp2p.security.secure_conn_interface import ISecureConn
from .exceptions import (
2019-08-24 05:43:36 +08:00
IncompatibleChoices,
InconsistentNonce,
InvalidSignatureOnExchange,
PeerMismatchException,
SecioException,
SedesException,
SelfEncryption,
)
2019-08-22 23:55:36 +08:00
from .pb.spipe_pb2 import Exchange, Propose
2019-08-17 09:54:06 +08:00
ID = "/secio/1.0.0"
2019-08-22 23:55:36 +08:00
NONCE_SIZE = 16 # bytes
2019-08-17 09:54:06 +08:00
2019-08-22 23:55:36 +08:00
# NOTE: the following is only a subset of allowable parameters according to the
# `secio` specification.
DEFAULT_SUPPORTED_EXCHANGES = "P-256"
DEFAULT_SUPPORTED_CIPHERS = "AES-128"
DEFAULT_SUPPORTED_HASHES = "SHA256"
2019-08-17 09:54:06 +08:00
class SecureSession(BaseSession):
buf: io.BytesIO
low_watermark: int
high_watermark: int
2019-08-24 05:43:36 +08:00
def __init__(
self,
local_peer: PeerID,
local_private_key: PrivateKey,
local_encryption_parameters: AuthenticatedEncryptionParameters,
remote_peer: PeerID,
remote_encryption_parameters: AuthenticatedEncryptionParameters,
conn: MsgIOReadWriter,
2019-10-25 01:22:24 +08:00
is_initiator: bool,
2019-08-24 05:43:36 +08:00
) -> None:
2019-10-25 01:22:24 +08:00
super().__init__(local_peer, local_private_key, is_initiator, remote_peer)
self.conn = conn
2019-08-24 05:43:36 +08:00
self.local_encryption_parameters = local_encryption_parameters
self.remote_encryption_parameters = remote_encryption_parameters
self._initialize_authenticated_encryption_for_local_peer()
self._initialize_authenticated_encryption_for_remote_peer()
self._reset_internal_buffer()
def _initialize_authenticated_encryption_for_local_peer(self) -> None:
self.local_encrypter = Encrypter(self.local_encryption_parameters)
def _initialize_authenticated_encryption_for_remote_peer(self) -> None:
self.remote_encrypter = Encrypter(self.remote_encryption_parameters)
async def next_msg_len(self) -> int:
return await self.conn.next_msg_len()
def _reset_internal_buffer(self) -> None:
self.buf = io.BytesIO()
self.low_watermark = 0
self.high_watermark = 0
def _drain(self, n: int) -> bytes:
if self.low_watermark == self.high_watermark:
return bytes()
data = self.buf.getbuffer()[self.low_watermark : self.high_watermark]
if n < 0:
n = len(data)
result = data[:n].tobytes()
self.low_watermark += len(result)
if self.low_watermark == self.high_watermark:
del data # free the memoryview so we can free the underlying BytesIO
self.buf.close()
self._reset_internal_buffer()
return result
async def _fill(self) -> None:
msg = await self.read_msg()
self.buf.write(msg)
self.low_watermark = 0
self.high_watermark = len(msg)
2019-08-25 02:36:33 +08:00
async def read(self, n: int = -1) -> bytes:
if n == 0:
return bytes()
data_from_buffer = self._drain(n)
if len(data_from_buffer) > 0:
return data_from_buffer
next_length = await self.next_msg_len()
if n < next_length:
await self._fill()
return self._drain(n)
else:
return await self.read_msg()
async def read_msg(self) -> bytes:
msg = await self.conn.read_msg()
try:
decrypted_msg = self.remote_encrypter.decrypt_if_valid(msg)
except InvalidMACException:
raise DecryptionFailedException
return decrypted_msg
async def write(self, data: bytes) -> int:
await self.write_msg(data)
return len(data)
async def write_msg(self, msg: bytes) -> None:
encrypted_data = self.local_encrypter.encrypt(msg)
tag = self.local_encrypter.authenticate(encrypted_data)
await self.conn.write_msg(encrypted_data + tag)
2019-08-17 09:54:06 +08:00
2019-08-22 23:55:36 +08:00
@dataclass(frozen=True)
class Proposal:
"""A ``Proposal`` represents the set of session parameters one peer in a
pair of peers attempting to negotiate a `secio` channel prefers."""
2019-08-22 23:55:36 +08:00
nonce: bytes
public_key: PublicKey
exchanges: str = DEFAULT_SUPPORTED_EXCHANGES # comma separated list
ciphers: str = DEFAULT_SUPPORTED_CIPHERS # comma separated list
hashes: str = DEFAULT_SUPPORTED_HASHES # comma separated list
def serialize(self) -> bytes:
protobuf = Propose(
2019-08-25 01:57:56 +08:00
rand=self.nonce,
public_key=self.public_key.serialize(),
exchanges=self.exchanges,
ciphers=self.ciphers,
hashes=self.hashes,
2019-08-22 23:55:36 +08:00
)
return protobuf.SerializeToString()
@classmethod
def deserialize(cls, protobuf_bytes: bytes) -> "Proposal":
2019-08-25 01:57:56 +08:00
protobuf = Propose.FromString(protobuf_bytes)
2019-08-22 23:55:36 +08:00
nonce = protobuf.rand
public_key_protobuf_bytes = protobuf.public_key
try:
public_key = deserialize_public_key(public_key_protobuf_bytes)
except MissingDeserializerError as error:
raise SedesException(error)
2019-08-22 23:55:36 +08:00
exchanges = protobuf.exchanges
ciphers = protobuf.ciphers
hashes = protobuf.hashes
return cls(nonce, public_key, exchanges, ciphers, hashes)
def calculate_peer_id(self) -> PeerID:
return PeerID.from_pubkey(self.public_key)
2019-08-17 09:54:06 +08:00
2019-08-22 23:55:36 +08:00
@dataclass
class EncryptionParameters:
permanent_public_key: PublicKey
curve_type: str
cipher_type: str
hash_type: str
ephemeral_public_key: PublicKey
2019-08-24 05:43:36 +08:00
def __init__(self) -> None:
pass
@dataclass
class SessionParameters:
local_peer: PeerID
local_encryption_parameters: EncryptionParameters
remote_peer: PeerID
remote_encryption_parameters: EncryptionParameters
# order is a comparator used to break the symmetry b/t each pair of peers
order: int
shared_key: bytes
2019-08-17 09:54:06 +08:00
2019-08-24 05:43:36 +08:00
def __init__(self) -> None:
pass
2019-08-17 09:54:06 +08:00
async def _response_to_msg(read_writer: MsgIOReadWriter, msg: bytes) -> bytes:
await read_writer.write_msg(msg)
return await read_writer.read_msg()
2019-08-17 09:54:06 +08:00
2019-08-22 23:55:36 +08:00
def _mk_multihash_sha256(data: bytes) -> bytes:
2019-08-25 01:57:56 +08:00
return multihash.digest(data, "sha2-256")
2019-08-22 23:55:36 +08:00
def _mk_score(public_key: PublicKey, nonce: bytes) -> bytes:
return _mk_multihash_sha256(public_key.serialize() + nonce)
def _select_parameter_from_order(
order: int, supported_parameters: str, available_parameters: str
) -> str:
if order < 0:
first_choices = available_parameters.split(",")
second_choices = supported_parameters.split(",")
elif order > 0:
first_choices = supported_parameters.split(",")
second_choices = available_parameters.split(",")
else:
return supported_parameters.split(",")[0]
for first, second in itertools.product(first_choices, second_choices):
2019-08-22 23:55:36 +08:00
if first == second:
return first
2019-08-24 05:43:36 +08:00
raise IncompatibleChoices()
2019-08-22 23:55:36 +08:00
def _select_encryption_parameters(
local_proposal: Proposal, remote_proposal: Proposal
) -> Tuple[str, str, str, int]:
2019-08-22 23:55:36 +08:00
first_score = _mk_score(remote_proposal.public_key, local_proposal.nonce)
second_score = _mk_score(local_proposal.public_key, remote_proposal.nonce)
order = 0
if first_score < second_score:
order = -1
elif second_score < first_score:
order = 1
if order == 0:
raise SelfEncryption()
2019-08-22 23:55:36 +08:00
return (
_select_parameter_from_order(
order, DEFAULT_SUPPORTED_EXCHANGES, remote_proposal.exchanges
),
_select_parameter_from_order(
2019-08-22 23:55:36 +08:00
order, DEFAULT_SUPPORTED_CIPHERS, remote_proposal.ciphers
),
_select_parameter_from_order(
2019-08-22 23:55:36 +08:00
order, DEFAULT_SUPPORTED_HASHES, remote_proposal.hashes
),
order,
2019-08-22 23:55:36 +08:00
)
async def _establish_session_parameters(
local_peer: PeerID,
local_private_key: PrivateKey,
remote_peer: Optional[PeerID],
conn: MsgIOReadWriter,
2019-08-22 23:55:36 +08:00
nonce: bytes,
) -> Tuple[SessionParameters, bytes]:
# establish shared encryption parameters
2019-08-22 23:55:36 +08:00
session_parameters = SessionParameters()
session_parameters.local_peer = local_peer
local_encryption_parameters = EncryptionParameters()
session_parameters.local_encryption_parameters = local_encryption_parameters
local_public_key = local_private_key.get_public_key()
local_encryption_parameters.permanent_public_key = local_public_key
local_proposal = Proposal(nonce, local_public_key)
serialized_local_proposal = local_proposal.serialize()
serialized_remote_proposal = await _response_to_msg(conn, serialized_local_proposal)
remote_encryption_parameters = EncryptionParameters()
session_parameters.remote_encryption_parameters = remote_encryption_parameters
remote_proposal = Proposal.deserialize(serialized_remote_proposal)
remote_encryption_parameters.permanent_public_key = remote_proposal.public_key
remote_peer_from_proposal = remote_proposal.calculate_peer_id()
if not remote_peer:
remote_peer = remote_peer_from_proposal
elif remote_peer != remote_peer_from_proposal:
raise PeerMismatchException(
{
"expected_remote_peer": remote_peer,
"received_remote_peer": remote_peer_from_proposal,
}
)
2019-08-22 23:55:36 +08:00
session_parameters.remote_peer = remote_peer
curve_param, cipher_param, hash_param, order = _select_encryption_parameters(
2019-08-22 23:55:36 +08:00
local_proposal, remote_proposal
)
local_encryption_parameters.curve_type = curve_param
local_encryption_parameters.cipher_type = cipher_param
local_encryption_parameters.hash_type = hash_param
remote_encryption_parameters.curve_type = curve_param
remote_encryption_parameters.cipher_type = cipher_param
remote_encryption_parameters.hash_type = hash_param
session_parameters.order = order
2019-08-17 09:54:06 +08:00
# exchange ephemeral pub keys
local_ephemeral_public_key, shared_key_generator = create_ephemeral_key_pair(
curve_param
2019-08-17 09:54:06 +08:00
)
local_encryption_parameters.ephemeral_public_key = local_ephemeral_public_key
local_selection = (
serialized_local_proposal
+ serialized_remote_proposal
+ local_ephemeral_public_key.to_bytes()
2019-08-17 09:54:06 +08:00
)
exchange_signature = local_private_key.sign(local_selection)
local_exchange = Exchange(
ephemeral_public_key=local_ephemeral_public_key.to_bytes(),
signature=exchange_signature,
2019-08-17 09:54:06 +08:00
)
serialized_local_exchange = local_exchange.SerializeToString()
serialized_remote_exchange = await _response_to_msg(conn, serialized_local_exchange)
2019-08-17 09:54:06 +08:00
remote_exchange = Exchange()
remote_exchange.ParseFromString(serialized_remote_exchange)
remote_ephemeral_public_key_bytes = remote_exchange.ephemeral_public_key
remote_ephemeral_public_key = ECCPublicKey.from_bytes(
remote_ephemeral_public_key_bytes, curve_param
)
remote_encryption_parameters.ephemeral_public_key = remote_ephemeral_public_key
remote_selection = (
serialized_remote_proposal
+ serialized_local_proposal
+ remote_ephemeral_public_key_bytes
)
valid_signature = remote_encryption_parameters.permanent_public_key.verify(
remote_selection, remote_exchange.signature
2019-08-17 09:54:06 +08:00
)
if not valid_signature:
raise InvalidSignatureOnExchange()
shared_key = shared_key_generator(remote_ephemeral_public_key_bytes)
session_parameters.shared_key = shared_key
return session_parameters, remote_proposal.nonce
2019-08-17 09:54:06 +08:00
def _mk_session_from(
2019-08-24 05:43:36 +08:00
local_private_key: PrivateKey,
session_parameters: SessionParameters,
conn: MsgIOReadWriter,
2019-10-25 01:22:24 +08:00
is_initiator: bool,
) -> SecureSession:
key_set1, key_set2 = initialize_pair_for_encryption(
session_parameters.local_encryption_parameters.cipher_type,
session_parameters.local_encryption_parameters.hash_type,
session_parameters.shared_key,
)
2019-08-17 09:54:06 +08:00
if session_parameters.order < 0:
key_set1, key_set2 = key_set2, key_set1
2019-08-17 09:54:06 +08:00
session = SecureSession(
session_parameters.local_peer,
2019-08-24 05:43:36 +08:00
local_private_key,
key_set1,
session_parameters.remote_peer,
key_set2,
conn,
2019-10-25 01:22:24 +08:00
is_initiator,
)
return session
2019-08-17 09:54:06 +08:00
async def _finish_handshake(session: SecureSession, remote_nonce: bytes) -> bytes:
await session.write_msg(remote_nonce)
return await session.read_msg()
2019-08-17 09:54:06 +08:00
2019-08-22 23:55:36 +08:00
async def create_secure_session(
2019-08-24 17:43:27 +08:00
local_nonce: bytes,
local_peer: PeerID,
local_private_key: PrivateKey,
conn: IRawConnection,
remote_peer: PeerID = None,
2019-08-22 23:55:36 +08:00
) -> ISecureConn:
2019-08-17 09:54:06 +08:00
"""
2019-08-22 23:55:36 +08:00
Attempt the initial `secio` handshake with the remote peer.
If successful, return an object that provides secure communication
to the ``remote_peer``. Raise `SecioException` when `conn` closed.
2019-09-19 22:19:36 +08:00
Raise `InconsistentNonce` when handshake failed
2019-08-17 09:54:06 +08:00
"""
msg_io = MsgIOReadWriter(conn)
2019-08-22 23:55:36 +08:00
try:
session_parameters, remote_nonce = await _establish_session_parameters(
local_peer, local_private_key, remote_peer, msg_io, local_nonce
2019-08-22 23:55:36 +08:00
)
except SecioException as e:
2019-08-27 01:03:12 +08:00
await conn.close()
2019-08-22 23:55:36 +08:00
raise e
# `IOException` includes errors raised while read from/write to raw connection
except IOException:
raise SecioException("connection closed")
2019-08-17 09:54:06 +08:00
2019-10-25 01:22:24 +08:00
is_initiator = remote_peer is not None
2019-10-25 01:52:03 +08:00
session = _mk_session_from(
local_private_key, session_parameters, msg_io, is_initiator
)
2019-08-17 09:54:06 +08:00
try:
received_nonce = await _finish_handshake(session, remote_nonce)
# `IOException` includes errors raised while read from/write to raw connection
except IOException:
raise SecioException("connection closed")
if received_nonce != local_nonce:
2019-08-27 01:03:12 +08:00
await conn.close()
raise InconsistentNonce()
2019-08-17 09:54:06 +08:00
return session
2019-08-24 17:43:27 +08:00
class Transport(BaseSecureTransport):
"""``Transport`` provides a security upgrader for a ``IRawConnection``,
following the `secio` protocol defined in the libp2p specs."""
2019-08-17 09:54:06 +08:00
2019-08-22 23:55:36 +08:00
def get_nonce(self) -> bytes:
return self.secure_bytes_provider(NONCE_SIZE)
2019-08-17 09:54:06 +08:00
async def secure_inbound(self, conn: IRawConnection) -> ISecureConn:
"""
Secure the connection, either locally or by communicating with opposing
node via conn, for an inbound connection (i.e. we are not the
initiator)
2019-08-17 09:54:06 +08:00
:return: secure connection object (that implements secure_conn_interface)
"""
2019-08-24 17:43:27 +08:00
local_nonce = self.get_nonce()
local_peer = self.local_peer
local_private_key = self.local_private_key
return await create_secure_session(
local_nonce, local_peer, local_private_key, conn
)
2019-08-17 09:54:06 +08:00
async def secure_outbound(
self, conn: IRawConnection, peer_id: PeerID
) -> ISecureConn:
"""
Secure the connection, either locally or by communicating with opposing
node via conn, for an inbound connection (i.e. we are the initiator)
2019-08-17 09:54:06 +08:00
:return: secure connection object (that implements secure_conn_interface)
"""
2019-08-24 17:43:27 +08:00
local_nonce = self.get_nonce()
local_peer = self.local_peer
local_private_key = self.local_private_key
return await create_secure_session(
local_nonce, local_peer, local_private_key, conn, peer_id
)