blob: 7bca61dcf232c74eb9bab70e021f995889d5ee02 [file] [log] [blame]
// Copyright 2015 The Vanadium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package vc
import (
"bytes"
"io"
"v.io/v23/context"
"v.io/v23/rpc/version"
"v.io/v23/security"
"v.io/v23/verror"
"v.io/v23/vom"
"v.io/v23/vtrace"
"v.io/x/ref/runtime/internal/lib/iobuf"
"v.io/x/ref/runtime/internal/rpc/stream"
"v.io/x/ref/runtime/internal/rpc/stream/crypto"
)
var (
authServerContextTag = []byte("VCauthS\x00")
authClientContextTag = []byte("VCauthC\x00")
)
var (
// These errors are intended to be used as arguments to higher
// level errors and hence {1}{2} is omitted from their format
// strings to avoid repeating these n-times in the final error
// message visible to the user.
errVomEncodeBlessing = reg(".errVomEncodeRequest", "failed to encode blessing{:3}")
errHandshakeMessage = reg(".errHandshakeMessage", "failed to read hanshake message{:3}")
errInvalidSignatureInMessage = reg(".errInvalidSignatureInMessage", "signature does not verify in authentication handshake message")
errFailedToCreateSelfBlessing = reg(".errFailedToCreateSelfBlessing", "failed to create self blessing{:3}")
errNoBlessingsToPresentToServer = reg(".errerrNoBlessingsToPresentToServer ", "no blessings to present as a server")
)
// TODO(jhahn): Add len(ChannelBinding) > 0 check in writeBlessing/readBlessings
// to make sure that the auth protocol only works when len(ChannelBinding) > 0
// once we deprecate RPCv10.
// AuthenticateAsServer executes the authentication protocol at the server.
// It returns the blessings shared by the client, and the discharges shared
// by the server.
func AuthenticateAsServer(conn io.ReadWriteCloser, crypter crypto.Crypter, v version.RPCVersion, principal security.Principal, server security.Blessings, dc DischargeClient) (security.Blessings, map[string]security.Discharge, error) {
if server.IsZero() {
return security.Blessings{}, nil, verror.New(stream.ErrSecurity, nil, verror.New(errNoBlessingsToPresentToServer, nil))
}
var serverDischarges []security.Discharge
if tpcavs := server.ThirdPartyCaveats(); len(tpcavs) > 0 && dc != nil {
serverDischarges = dc.PrepareDischarges(nil, tpcavs, security.DischargeImpetus{})
}
if err := writeBlessings(conn, authServerContextTag, crypter, principal, server, serverDischarges, v); err != nil {
return security.Blessings{}, nil, err
}
// Note that since the client uses a self-signed blessing to authenticate
// during VC setup, it does not share any discharges.
client, _, err := readBlessings(nil, conn, authClientContextTag, crypter, v)
if err != nil {
return security.Blessings{}, nil, err
}
return client, mkDischargeMap(serverDischarges), nil
}
// AuthenticateAsClient executes the authentication protocol at the client.
// It returns the blessing shared by the client, and the blessings and any
// discharges shared by the server.
//
// The client will only share its blessings if the server (who shares its
// blessings first) is authorized as per the authorizer for this RPC.
func AuthenticateAsClient(conn io.ReadWriteCloser, crypter crypto.Crypter, v version.RPCVersion, params security.CallParams, auth *ServerAuthorizer) (security.Blessings, security.Blessings, map[string]security.Discharge, error) {
server, serverDischarges, err := readBlessings(nil, conn, authServerContextTag, crypter, v)
if err != nil {
return security.Blessings{}, security.Blessings{}, nil, err
}
// Authorize the server based on the provided authorizer.
if auth != nil {
params.RemoteBlessings = server
params.RemoteDischarges = serverDischarges
if err := auth.Authorize(params); err != nil {
// Note this error type should match with the one in HandshakeDialedVCPreAuthenticated().
return security.Blessings{}, security.Blessings{}, nil, verror.New(stream.ErrNotTrusted, nil, err)
}
}
// The client shares its blessings at RPC time (as the blessings may vary
// across RPCs). During VC handshake, the client simply sends a self-signed
// blessing in order to reveal its public key to the server.
principal := params.LocalPrincipal
client, err := principal.BlessSelf("vcauth")
if err != nil {
return security.Blessings{}, security.Blessings{}, nil, verror.New(stream.ErrSecurity, nil, verror.New(errFailedToCreateSelfBlessing, nil, err))
}
if err := writeBlessings(conn, authClientContextTag, crypter, principal, client, nil, v); err != nil {
return security.Blessings{}, security.Blessings{}, nil, err
}
return client, server, serverDischarges, nil
}
func writeBlessings(w io.Writer, tag []byte, crypter crypto.Crypter, p security.Principal, b security.Blessings, discharges []security.Discharge, v version.RPCVersion) error {
signature, err := p.Sign(append(tag, crypter.ChannelBinding()...))
if err != nil {
return err
}
var buf bytes.Buffer
enc := vom.NewEncoder(&buf)
if err := enc.Encode(signature); err != nil {
return verror.New(stream.ErrNetwork, nil, verror.New(errVomEncodeBlessing, nil, err))
}
if err := enc.Encode(b); err != nil {
return verror.New(stream.ErrNetwork, nil, verror.New(errVomEncodeBlessing, nil, err))
}
if err := enc.Encode(discharges); err != nil {
return verror.New(stream.ErrNetwork, nil, verror.New(errVomEncodeBlessing, nil, err))
}
bts := buf.Bytes()
msg, err := crypter.Encrypt(iobuf.NewSlice(bts))
if err != nil {
return err
}
defer msg.Release()
enc = vom.NewEncoder(w)
if err := enc.Encode(msg.Contents); err != nil {
return verror.New(stream.ErrNetwork, nil, verror.New(errVomEncodeBlessing, nil, err))
}
return nil
}
func readBlessings(ctx *context.T, r io.Reader, tag []byte, crypter crypto.Crypter, v version.RPCVersion) (security.Blessings, map[string]security.Discharge, error) {
var span vtrace.Span
if ctx != nil {
ctx, span = vtrace.WithNewSpan(ctx, "Read blessings")
defer span.Finish()
}
var msg []byte
var noBlessings security.Blessings
_, span = vtrace.WithNewSpan(ctx, "First vom Decoding")
dec := vom.NewDecoder(r)
if err := dec.Decode(&msg); err != nil {
return noBlessings, nil, verror.New(stream.ErrNetwork, nil, verror.New(errHandshakeMessage, nil, err))
}
span.Finish()
_, span = vtrace.WithNewSpan(ctx, "Checking channel binding")
buf, err := crypter.Decrypt(iobuf.NewSlice(msg))
if err != nil {
return noBlessings, nil, err
}
defer buf.Release()
span.Finish()
dec = vom.NewDecoder(bytes.NewReader(buf.Contents))
var (
blessings security.Blessings
sig security.Signature
)
_, span = vtrace.WithNewSpan(ctx, "Second vom Decoding")
if err = dec.Decode(&sig); err != nil {
return noBlessings, nil, verror.New(stream.ErrNetwork, nil, err)
}
span.Finish()
_, span = vtrace.WithNewSpan(ctx, "Third vom Decoding")
if err = dec.Decode(&blessings); err != nil {
return noBlessings, nil, verror.New(stream.ErrNetwork, nil, err)
}
span.Finish()
_, span = vtrace.WithNewSpan(ctx, "Fourth vom Decoding")
var discharges []security.Discharge
if err := dec.Decode(&discharges); err != nil {
return noBlessings, nil, verror.New(stream.ErrNetwork, nil, err)
}
span.Finish()
_, span = vtrace.WithNewSpan(ctx, "Signature verify")
if !sig.Verify(blessings.PublicKey(), append(tag, crypter.ChannelBinding()...)) {
return noBlessings, nil, verror.New(stream.ErrSecurity, nil, verror.New(errInvalidSignatureInMessage, nil))
}
span.Finish()
return blessings, mkDischargeMap(discharges), nil
}
func mkDischargeMap(discharges []security.Discharge) map[string]security.Discharge {
if len(discharges) == 0 {
return nil
}
m := make(map[string]security.Discharge, len(discharges))
for _, d := range discharges {
m[d.ID()] = d
}
return m
}
func bindClientPrincipalToChannel(crypter crypto.Crypter, p security.Principal) ([]byte, error) {
sig, err := p.Sign(append(authClientContextTag, crypter.ChannelBinding()...))
if err != nil {
return nil, err
}
var buf bytes.Buffer
enc := vom.NewEncoder(&buf)
if err := enc.Encode(sig); err != nil {
return nil, verror.New(errVomEncodeBlessing, nil, err)
}
msg, err := crypter.Encrypt(iobuf.NewSlice(buf.Bytes()))
if err != nil {
return nil, err
}
defer msg.Release()
signature := make([]byte, len(msg.Contents))
copy(signature, msg.Contents)
return signature, nil
}
func verifyClientPrincipalBoundToChannel(signature []byte, crypter crypto.Crypter, publicKey security.PublicKey) error {
msg, err := crypter.Decrypt(iobuf.NewSlice(signature))
if err != nil {
return err
}
defer msg.Release()
dec := vom.NewDecoder(bytes.NewReader(msg.Contents))
var sig security.Signature
if err = dec.Decode(&sig); err != nil {
return verror.New(errHandshakeMessage, nil, err)
}
if !sig.Verify(publicKey, append(authClientContextTag, crypter.ChannelBinding()...)) {
return verror.New(errInvalidSignatureInMessage, nil)
}
return nil
}