comparison libervia/backend/plugins/plugin_xep_0391.py @ 4071:4b842c1fb686

refactoring: renamed `sat` package to `libervia.backend`
author Goffi <goffi@goffi.org>
date Fri, 02 Jun 2023 11:49:51 +0200
parents sat/plugins/plugin_xep_0391.py@524856bd7b19
children 1b5cf2ee1d86
comparison
equal deleted inserted replaced
4070:d10748475025 4071:4b842c1fb686
1 #!/usr/bin/env python3
2
3 # Libervia plugin for Jingle Encrypted Transports
4 # Copyright (C) 2009-2022 Jérôme Poisson (goffi@goffi.org)
5
6 # This program is free software: you can redistribute it and/or modify
7 # it under the terms of the GNU Affero General Public License as published by
8 # the Free Software Foundation, either version 3 of the License, or
9 # (at your option) any later version.
10
11 # This program is distributed in the hope that it will be useful,
12 # but WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU Affero General Public License for more details.
15
16 # You should have received a copy of the GNU Affero General Public License
17 # along with this program. If not, see <http://www.gnu.org/licenses/>.
18
19 from base64 import b64encode
20 from functools import partial
21 import io
22 from typing import Any, Callable, Dict, List, Optional, Tuple, Union
23
24 from twisted.words.protocols.jabber import error, jid, xmlstream
25 from twisted.words.xish import domish
26 from wokkel import disco, iwokkel
27 from zope.interface import implementer
28 from cryptography.exceptions import AlreadyFinalized
29 from cryptography.hazmat import backends
30 from cryptography.hazmat.primitives import ciphers
31 from cryptography.hazmat.primitives.ciphers import Cipher, CipherContext, modes
32 from cryptography.hazmat.primitives.padding import PKCS7, PaddingContext
33
34 from libervia.backend.core import exceptions
35 from libervia.backend.core.constants import Const as C
36 from libervia.backend.core.core_types import SatXMPPEntity
37 from libervia.backend.core.i18n import _
38 from libervia.backend.core.log import getLogger
39 from libervia.backend.tools import xml_tools
40
41 try:
42 import oldmemo
43 import oldmemo.etree
44 except ImportError as import_error:
45 raise exceptions.MissingModule(
46 "You are missing one or more package required by the OMEMO plugin. Please"
47 " download/install the pip packages 'oldmemo'."
48 ) from import_error
49
50
51 log = getLogger(__name__)
52
53 IMPORT_NAME = "XEP-0391"
54
55 PLUGIN_INFO = {
56 C.PI_NAME: "Jingle Encrypted Transports",
57 C.PI_IMPORT_NAME: IMPORT_NAME,
58 C.PI_TYPE: C.PLUG_TYPE_XEP,
59 C.PI_MODES: C.PLUG_MODE_BOTH,
60 C.PI_PROTOCOLS: ["XEP-0391", "XEP-0396"],
61 C.PI_DEPENDENCIES: ["XEP-0166", "XEP-0384"],
62 C.PI_MAIN: "JET",
63 C.PI_HANDLER: "yes",
64 C.PI_DESCRIPTION: _("""End-to-end encryption of Jingle transports"""),
65 }
66
67 NS_JET = "urn:xmpp:jingle:jet:0"
68 NS_JET_OMEMO = "urn:xmpp:jingle:jet-omemo:0"
69
70
71 class JET:
72 namespace = NS_JET
73
74 def __init__(self, host):
75 log.info(_("XEP-0391 (Pubsub Attachments) plugin initialization"))
76 host.register_namespace("jet", NS_JET)
77 self.host = host
78 self._o = host.plugins["XEP-0384"]
79 self._j = host.plugins["XEP-0166"]
80 host.trigger.add(
81 "XEP-0166_initiate_elt_built",
82 self._on_initiate_elt_build
83 )
84 host.trigger.add(
85 "XEP-0166_on_session_initiate",
86 self._on_session_initiate
87 )
88 host.trigger.add(
89 "XEP-0234_jingle_handler",
90 self._add_encryption_filter
91 )
92 host.trigger.add(
93 "XEP-0234_file_receiving_request_conf",
94 self._add_encryption_filter
95 )
96
97 def get_handler(self, client):
98 return JET_Handler()
99
100 async def _on_initiate_elt_build(
101 self,
102 client: SatXMPPEntity,
103 session: Dict[str, Any],
104 iq_elt: domish.Element,
105 jingle_elt: domish.Element
106 ) -> bool:
107 if client.encryption.get_namespace(
108 session["peer_jid"].userhostJID()
109 ) != self._o.NS_OLDMEMO:
110 return True
111 for content_elt in jingle_elt.elements(self._j.namespace, "content"):
112 content_data = session["contents"][content_elt["name"]]
113 security_elt = content_elt.addElement((NS_JET, "security"))
114 security_elt["name"] = content_elt["name"]
115 # XXX: for now only OLDMEMO is supported, thus we do it directly here. If some
116 # other are supported in the future, a plugin registering mechanism will be
117 # implemented.
118 cipher = "urn:xmpp:ciphers:aes-128-gcm-nopadding"
119 enc_type = "eu.siacs.conversations.axolotl"
120 security_elt["cipher"] = cipher
121 security_elt["type"] = enc_type
122 encryption_data = content_data["encryption"] = {
123 "cipher": cipher,
124 "type": enc_type
125 }
126 session_manager = await self._o.get_session_manager(client.profile)
127 try:
128 messages, encryption_errors = await session_manager.encrypt(
129 frozenset({session["peer_jid"].userhost()}),
130 # the value seems to be the commonly used value
131 { self._o.NS_OLDMEMO: b" " },
132 backend_priority_order=[ self._o.NS_OLDMEMO ],
133 identifier = client.jid.userhost()
134 )
135 except Exception as e:
136 log.error("Can't generate IV and keys: {e}")
137 raise e
138 message, plain_key_material = next(iter(messages.items()))
139 iv, key = message.content.initialization_vector, plain_key_material.key
140 content_data["encryption"].update({
141 "iv": iv,
142 "key": key
143 })
144 encrypted_elt = xml_tools.et_elt_2_domish_elt(
145 oldmemo.etree.serialize_message(message)
146 )
147 security_elt.addChild(encrypted_elt)
148 return True
149
150 async def _on_session_initiate(
151 self,
152 client: SatXMPPEntity,
153 session: Dict[str, Any],
154 iq_elt: domish.Element,
155 jingle_elt: domish.Element
156 ) -> bool:
157 if client.encryption.get_namespace(
158 session["peer_jid"].userhostJID()
159 ) != self._o.NS_OLDMEMO:
160 return True
161 for content_elt in jingle_elt.elements(self._j.namespace, "content"):
162 content_data = session["contents"][content_elt["name"]]
163 security_elt = next(content_elt.elements(NS_JET, "security"), None)
164 if security_elt is None:
165 continue
166 encrypted_elt = next(
167 security_elt.elements(self._o.NS_OLDMEMO, "encrypted"), None
168 )
169 if encrypted_elt is None:
170 log.warning(
171 "missing <encrypted> element, can't decrypt: {security_elt.toXml()}"
172 )
173 continue
174 session_manager = await self._o.get_session_manager(client.profile)
175 try:
176 message = await oldmemo.etree.parse_message(
177 xml_tools.domish_elt_2_et_elt(encrypted_elt, False),
178 session["peer_jid"].userhost(),
179 client.jid.userhost(),
180 session_manager
181 )
182 __, __, plain_key_material = await session_manager.decrypt(message)
183 except Exception as e:
184 log.warning(f"Can't get IV and key: {e}\n{security_elt.toXml()}")
185 continue
186 try:
187 content_data["encryption"] = {
188 "cipher": security_elt["cipher"],
189 "type": security_elt["type"],
190 "iv": message.content.initialization_vector,
191 "key": plain_key_material.key
192 }
193 except KeyError as e:
194 log.warning(f"missing data, can't decrypt: {e}")
195 continue
196
197 return True
198
199 def __encrypt(
200 self,
201 data: bytes,
202 encryptor: CipherContext,
203 data_cb: Callable
204 ) -> bytes:
205 data_cb(data)
206 if data:
207 return encryptor.update(data)
208 else:
209 try:
210 return encryptor.finalize() + encryptor.tag
211 except AlreadyFinalized:
212 return b''
213
214 def __decrypt(
215 self,
216 data: bytes,
217 buffer: list[bytes],
218 decryptor: CipherContext,
219 data_cb: Callable
220 ) -> bytes:
221 buffer.append(data)
222 data = b''.join(buffer)
223 buffer.clear()
224 if len(data) > 16:
225 decrypted = decryptor.update(data[:-16])
226 data_cb(decrypted)
227 else:
228 decrypted = b''
229 buffer.append(data[-16:])
230 return decrypted
231
232 def __decrypt_finalize(
233 self,
234 file_obj: io.BytesIO,
235 buffer: list[bytes],
236 decryptor: CipherContext,
237 ) -> None:
238 tag = b''.join(buffer)
239 file_obj.write(decryptor.finalize_with_tag(tag))
240
241 async def _add_encryption_filter(
242 self,
243 client: SatXMPPEntity,
244 session: Dict[str, Any],
245 content_data: Dict[str, Any],
246 elt: domish.Element
247 ) -> bool:
248 file_obj = content_data["stream_object"].file_obj
249 try:
250 encryption_data=content_data["encryption"]
251 except KeyError:
252 return True
253 cipher = ciphers.Cipher(
254 ciphers.algorithms.AES(encryption_data["key"]),
255 modes.GCM(encryption_data["iv"]),
256 backend=backends.default_backend(),
257 )
258 if file_obj.mode == "wb":
259 # we are receiving a file
260 buffer = []
261 decryptor = cipher.decryptor()
262 file_obj.pre_close_cb = partial(
263 self.__decrypt_finalize,
264 file_obj=file_obj,
265 buffer=buffer,
266 decryptor=decryptor
267 )
268 file_obj.data_cb = partial(
269 self.__decrypt,
270 buffer=buffer,
271 decryptor=decryptor,
272 data_cb=file_obj.data_cb
273 )
274 else:
275 # we are sending a file
276 file_obj.data_cb = partial(
277 self.__encrypt,
278 encryptor=cipher.encryptor(),
279 data_cb=file_obj.data_cb
280 )
281
282 return True
283
284
285 @implementer(iwokkel.IDisco)
286 class JET_Handler(xmlstream.XMPPHandler):
287
288 def getDiscoInfo(self, requestor, service, nodeIdentifier=""):
289 return [
290 disco.DiscoFeature(NS_JET),
291 disco.DiscoFeature(NS_JET_OMEMO),
292 ]
293
294 def getDiscoItems(self, requestor, service, nodeIdentifier=""):
295 return []