Jiri Simsa | d7616c9 | 2015-03-24 23:44:30 -0700 | [diff] [blame] | 1 | // Copyright 2015 The Vanadium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style |
| 3 | // license that can be found in the LICENSE file. |
| 4 | |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 5 | package security |
| 6 | |
| 7 | import ( |
| 8 | "crypto/ecdsa" |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 9 | "os" |
| 10 | "path" |
| 11 | |
Jiri Simsa | 6ac9522 | 2015-02-23 16:11:49 -0800 | [diff] [blame] | 12 | "v.io/v23/security" |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 13 | "v.io/v23/verror" |
| 14 | ) |
| 15 | |
Todd Wang | b351149 | 2015-04-07 23:32:34 -0700 | [diff] [blame] | 16 | const pkgPath = "v.io/x/ref/lib/security" |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 17 | |
| 18 | var ( |
| 19 | errCantCreateSigner = verror.Register(pkgPath+".errCantCreateSigner", verror.NoRetry, "{1:}{2:} failed to create serialization.Signer{:_}") |
| 20 | errCantLoadBlessingRoots = verror.Register(pkgPath+".errCantLoadBlessingRoots", verror.NoRetry, "{1:}{2:} failed to load BlessingRoots{:_}") |
| 21 | errCantLoadBlessingStore = verror.Register(pkgPath+".errCantLoadBlessingStore", verror.NoRetry, "{1:}{2:} failed to load BlessingStore{:_}") |
| 22 | errCantInitPrivateKey = verror.Register(pkgPath+".errCantInitPrivateKey", verror.NoRetry, "{1:}{2:} failed to initialize private key{:_}") |
| 23 | errNotADirectory = verror.Register(pkgPath+".errNotADirectory", verror.NoRetry, "{1:}{2:} {3} is not a directory{:_}") |
| 24 | errCantCreate = verror.Register(pkgPath+".errCantCreate", verror.NoRetry, "{1:}{2:} failed to create {3}{:_}") |
| 25 | errCantOpenForWriting = verror.Register(pkgPath+".errCantOpenForWriting", verror.NoRetry, "{1:}{2:} failed to open {3} for writing{:_}") |
| 26 | errCantGenerateKey = verror.Register(pkgPath+".errCantGenerateKey", verror.NoRetry, "{1:}{2:} failed to generate private key{:_}") |
| 27 | errCantSaveKey = verror.Register(pkgPath+".errCantSaveKey", verror.NoRetry, "{1:}{2:} failed to save private key to {3}{:_}") |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 28 | ) |
| 29 | |
gauthamt | 1e313bc | 2014-11-10 15:45:56 -0800 | [diff] [blame] | 30 | const ( |
| 31 | blessingStoreDataFile = "blessingstore.data" |
| 32 | blessingStoreSigFile = "blessingstore.sig" |
| 33 | |
| 34 | blessingRootsDataFile = "blessingroots.data" |
| 35 | blessingRootsSigFile = "blessingroots.sig" |
| 36 | |
| 37 | privateKeyFile = "privatekey.pem" |
| 38 | ) |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 39 | |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 40 | // NewPrincipal mints a new private key and generates a principal based on |
| 41 | // this key, storing its BlessingRoots and BlessingStore in memory. |
| 42 | func NewPrincipal() (security.Principal, error) { |
gauthamt | a134eda | 2014-11-05 17:57:42 -0800 | [diff] [blame] | 43 | pub, priv, err := NewPrincipalKey() |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 44 | if err != nil { |
| 45 | return nil, err |
| 46 | } |
| 47 | return security.CreatePrincipal(security.NewInMemoryECDSASigner(priv), newInMemoryBlessingStore(pub), newInMemoryBlessingRoots()) |
| 48 | } |
| 49 | |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 50 | // PrincipalStateSerializer is used to persist BlessingRoots/BlessingStore state for |
| 51 | // a principal with the provided SerializerReaderWriters. |
| 52 | type PrincipalStateSerializer struct { |
| 53 | BlessingRoots SerializerReaderWriter |
| 54 | BlessingStore SerializerReaderWriter |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 55 | } |
| 56 | |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 57 | // NewPrincipalStateSerializer is a convenience function that returns a serializer |
| 58 | // for BlessingStore and BlessingRoots given a directory location. We create the |
| 59 | // directory if it does not already exist. |
| 60 | func NewPrincipalStateSerializer(dir string) (*PrincipalStateSerializer, error) { |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 61 | if err := mkDir(dir); err != nil { |
| 62 | return nil, err |
| 63 | } |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 64 | return &PrincipalStateSerializer{ |
Ankur | 27c56fd | 2014-11-17 19:30:34 -0800 | [diff] [blame] | 65 | BlessingRoots: NewFileSerializer(path.Join(dir, blessingRootsDataFile), path.Join(dir, blessingRootsSigFile)), |
| 66 | BlessingStore: NewFileSerializer(path.Join(dir, blessingStoreDataFile), path.Join(dir, blessingStoreSigFile)), |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 67 | }, nil |
| 68 | } |
| 69 | |
| 70 | // NewPrincipalFromSigner creates a new principal using the provided Signer. If previously |
| 71 | // persisted state is available, we use the serializers to populate BlessingRoots/BlessingStore |
| 72 | // for the Principal. If provided, changes to the state are persisted and committed with the |
| 73 | // same serializers. Otherwise, the state (ie: BlessingStore, BlessingRoots) is kept in memory. |
| 74 | func NewPrincipalFromSigner(signer security.Signer, state *PrincipalStateSerializer) (security.Principal, error) { |
| 75 | if state == nil { |
| 76 | return security.CreatePrincipal(signer, newInMemoryBlessingStore(signer.PublicKey()), newInMemoryBlessingRoots()) |
| 77 | } |
| 78 | serializationSigner, err := security.CreatePrincipal(signer, nil, nil) |
| 79 | if err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 80 | return nil, verror.New(errCantCreateSigner, nil, err) |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 81 | } |
| 82 | blessingRoots, err := newPersistingBlessingRoots(state.BlessingRoots, serializationSigner) |
| 83 | if err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 84 | return nil, verror.New(errCantLoadBlessingRoots, nil, err) |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 85 | } |
| 86 | blessingStore, err := newPersistingBlessingStore(state.BlessingStore, serializationSigner) |
| 87 | if err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 88 | return nil, verror.New(errCantLoadBlessingStore, nil, err) |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 89 | } |
| 90 | return security.CreatePrincipal(signer, blessingStore, blessingRoots) |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 91 | } |
| 92 | |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 93 | // LoadPersistentPrincipal reads state for a principal (private key, BlessingRoots, BlessingStore) |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 94 | // from the provided directory 'dir' and commits all state changes to the same directory. |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 95 | // If private key file does not exist then an error 'err' is returned such that os.IsNotExist(err) is true. |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 96 | // If private key file exists then 'passphrase' must be correct, otherwise ErrBadPassphrase will be returned. |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 97 | func LoadPersistentPrincipal(dir string, passphrase []byte) (security.Principal, error) { |
| 98 | key, err := loadKeyFromDir(dir, passphrase) |
| 99 | if err != nil { |
| 100 | return nil, err |
| 101 | } |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 102 | state, err := NewPrincipalStateSerializer(dir) |
| 103 | if err != nil { |
| 104 | return nil, err |
| 105 | } |
| 106 | return NewPrincipalFromSigner(security.NewInMemoryECDSASigner(key), state) |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 107 | } |
| 108 | |
Ankur | 4704f5f | 2014-10-23 12:40:54 -0700 | [diff] [blame] | 109 | // CreatePersistentPrincipal creates a new principal (private key, BlessingRoots, |
| 110 | // BlessingStore) and commits all state changes to the provided directory. |
| 111 | // |
| 112 | // The generated private key is serialized and saved encrypted if the 'passphrase' |
| 113 | // is non-nil, and unencrypted otherwise. |
| 114 | // |
| 115 | // If the directory has any preexisting principal data, CreatePersistentPrincipal |
| 116 | // will return an error. |
| 117 | // |
| 118 | // The specified directory may not exist, in which case it gets created by this |
| 119 | // function. |
| 120 | func CreatePersistentPrincipal(dir string, passphrase []byte) (principal security.Principal, err error) { |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 121 | if err := mkDir(dir); err != nil { |
| 122 | return nil, err |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 123 | } |
Suharsh Sivakumar | 4e09188 | 2014-11-11 11:50:28 -0800 | [diff] [blame] | 124 | key, err := initKey(dir, passphrase) |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 125 | if err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 126 | return nil, verror.New(errCantInitPrivateKey, nil, err) |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 127 | } |
gauthamt | 9810816 | 2014-11-11 18:45:56 -0800 | [diff] [blame] | 128 | state, err := NewPrincipalStateSerializer(dir) |
| 129 | if err != nil { |
| 130 | return nil, err |
| 131 | } |
| 132 | return NewPrincipalFromSigner(security.NewInMemoryECDSASigner(key), state) |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 133 | } |
| 134 | |
Ankur | c24ff42 | 2014-12-16 17:59:26 -0800 | [diff] [blame] | 135 | // SetDefaultBlessings sets the provided blessings as default and shareable with |
| 136 | // all peers on provided principal's BlessingStore, and also adds it as a root to |
| 137 | // the principal's BlessingRoots. |
| 138 | func SetDefaultBlessings(p security.Principal, blessings security.Blessings) error { |
| 139 | if err := p.BlessingStore().SetDefault(blessings); err != nil { |
| 140 | return err |
| 141 | } |
| 142 | if _, err := p.BlessingStore().Set(blessings, security.AllPrincipals); err != nil { |
| 143 | return err |
| 144 | } |
| 145 | if err := p.AddToRoots(blessings); err != nil { |
| 146 | return err |
| 147 | } |
| 148 | return nil |
| 149 | } |
| 150 | |
Suharsh Sivakumar | 8a7fba4 | 2014-10-27 12:40:48 -0700 | [diff] [blame] | 151 | // InitDefaultBlessings uses the provided principal to create a self blessing for name 'name', |
| 152 | // sets it as default on the principal's BlessingStore and adds it as root to the principal's BlessingRoots. |
Ankur | c24ff42 | 2014-12-16 17:59:26 -0800 | [diff] [blame] | 153 | // TODO(ataly): Get rid this function given that we have SetDefaultBlessings. |
Suharsh Sivakumar | 8a7fba4 | 2014-10-27 12:40:48 -0700 | [diff] [blame] | 154 | func InitDefaultBlessings(p security.Principal, name string) error { |
| 155 | blessing, err := p.BlessSelf(name) |
| 156 | if err != nil { |
| 157 | return err |
| 158 | } |
Ankur | c24ff42 | 2014-12-16 17:59:26 -0800 | [diff] [blame] | 159 | return SetDefaultBlessings(p, blessing) |
Suharsh Sivakumar | 8a7fba4 | 2014-10-27 12:40:48 -0700 | [diff] [blame] | 160 | } |
| 161 | |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 162 | func mkDir(dir string) error { |
| 163 | if finfo, err := os.Stat(dir); err == nil { |
| 164 | if !finfo.IsDir() { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 165 | return verror.New(errNotADirectory, nil, dir) |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 166 | } |
| 167 | } else if err := os.MkdirAll(dir, 0700); err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 168 | return verror.New(errCantCreate, nil, dir, err) |
Srdjan Petrovic | f07f4a0 | 2014-10-22 16:31:06 -0700 | [diff] [blame] | 169 | } |
| 170 | return nil |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 171 | } |
| 172 | |
| 173 | func loadKeyFromDir(dir string, passphrase []byte) (*ecdsa.PrivateKey, error) { |
| 174 | keyFile := path.Join(dir, privateKeyFile) |
| 175 | f, err := os.Open(keyFile) |
| 176 | if err != nil { |
| 177 | return nil, err |
| 178 | } |
| 179 | defer f.Close() |
Ankur | 73e7a93 | 2014-10-24 15:57:03 -0700 | [diff] [blame] | 180 | key, err := LoadPEMKey(f, passphrase) |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 181 | if err != nil { |
| 182 | return nil, err |
| 183 | } |
| 184 | return key.(*ecdsa.PrivateKey), nil |
| 185 | } |
| 186 | |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 187 | func initKey(dir string, passphrase []byte) (*ecdsa.PrivateKey, error) { |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 188 | keyFile := path.Join(dir, privateKeyFile) |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 189 | f, err := os.OpenFile(keyFile, os.O_WRONLY|os.O_CREATE|os.O_EXCL, 0600) |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 190 | if err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 191 | return nil, verror.New(errCantOpenForWriting, nil, keyFile, err) |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 192 | } |
| 193 | defer f.Close() |
gauthamt | a134eda | 2014-11-05 17:57:42 -0800 | [diff] [blame] | 194 | _, key, err := NewPrincipalKey() |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 195 | if err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 196 | return nil, verror.New(errCantGenerateKey, nil, err) |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 197 | } |
Ankur | 73e7a93 | 2014-10-24 15:57:03 -0700 | [diff] [blame] | 198 | if err := SavePEMKey(f, key, passphrase); err != nil { |
Mike Burrows | 7f7088d | 2015-03-25 13:05:00 -0700 | [diff] [blame] | 199 | return nil, verror.New(errCantSaveKey, nil, keyFile, err) |
Suharsh Sivakumar | aca1c32 | 2014-10-21 11:27:32 -0700 | [diff] [blame] | 200 | } |
| 201 | return key, nil |
Asim Shankar | ae8d4c5 | 2014-10-08 13:03:31 -0700 | [diff] [blame] | 202 | } |