blob: 636d89b2443fd81c4a3c24698b0df0fc5a6ac236 [file] [log] [blame]
Jiri Simsa5293dcb2014-05-10 09:56:38 -07001package caveat
2
3import (
Asim Shankar23c84a02014-06-04 15:17:10 -07004 "bytes"
Asim Shankar23c84a02014-06-04 15:17:10 -07005 "crypto/rand"
6 "crypto/sha256"
7 "encoding/binary"
Jiri Simsa5293dcb2014-05-10 09:56:38 -07008 "fmt"
Asim Shankar23c84a02014-06-04 15:17:10 -07009 "time"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070010
Jiri Simsa5293dcb2014-05-10 09:56:38 -070011 "veyron2/security"
Asim Shankar8303f182014-06-05 00:42:33 -070012 "veyron2/security/wire"
Andres Erbsendde52bf2014-06-09 09:42:33 -070013 "veyron2/vom"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070014)
15
16// nonceLength specifies the length in bytes of the random nonce used
Andres Erbsendde52bf2014-06-09 09:42:33 -070017// in publicKeyCaveat and publicKeyDischarge.
Jiri Simsa5293dcb2014-05-10 09:56:38 -070018//
19// TODO(ataly, ashankar): Nonce length of 16 bytes was chosen very conservatively.
20// The purpose of the random nonce is essentially to separate caveats that have
21// the same restriction and validation key (in order to prevent discharge replay).
22// Can we use 4bytes instead?.
23const nonceLength = 16
24
25// errPublicKeyCaveat returns an error indicating that the provided caveat has
26// an invalid or missing discharge.
Asim Shankar23c84a02014-06-04 15:17:10 -070027func errPublicKeyCaveat(c *publicKeyCaveat, err error) error {
Andres Erbsendde52bf2014-06-09 09:42:33 -070028 return fmt.Errorf("%v for publicKeyCaveat{nonce:%v location:%q}", err, c.RandNonce, c.Location())
Jiri Simsa5293dcb2014-05-10 09:56:38 -070029}
30
Asim Shankar23c84a02014-06-04 15:17:10 -070031// publicKeyCaveat implements security.ThirdPartyCaveat. It specifies a restriction,
Jiri Simsa5293dcb2014-05-10 09:56:38 -070032// a validation key and the location of the third-party responsible for
33// discharging the caveat. A discharge for this caveat is a signed assertion whose
34// signature can be verified using the validation key.
Asim Shankar23c84a02014-06-04 15:17:10 -070035type publicKeyCaveat struct {
Jiri Simsa5293dcb2014-05-10 09:56:38 -070036 // RandNonce specifies a cryptographically random nonce (of fixed length) that
37 // uniquely identifies the caveat.
38 RandNonce []uint8
Andres Erbsendde52bf2014-06-09 09:42:33 -070039 // DischargeMintingCaveat specifies the caveat that has to be validated
40 // before minting a discharge for a publicKeyCaveat. A byte slice containing
41 // VOM-encoded security.Caveat is used to enable a publicKeyCaveat to be
42 // validated by devices that cannot decode the discharge minting caveats.
43 DischargeMintingCaveat []byte
Jiri Simsa5293dcb2014-05-10 09:56:38 -070044 // ValidationKey specifies the public key of the discharging-party.
45 ValidationKey wire.PublicKey
Asim Shankara94e5072014-08-19 18:18:36 -070046 // ThirdPartyLocation specifies the object name of the discharging-party.
Jiri Simsa5293dcb2014-05-10 09:56:38 -070047 ThirdPartyLocation string
Asim Shankara94e5072014-08-19 18:18:36 -070048 // Information wanted in order to issue a discharge.
49 ThirdPartyRequirements security.ThirdPartyRequirements
Jiri Simsa5293dcb2014-05-10 09:56:38 -070050}
51
52// ID returns a unique 32bytes long identity for the caveat based on the random nonce
53// and SHA-256 hash of the restriction embedded in the caveat.
54//
55// TODO(ataly, ashankar): A 256bit hash is probably much stronger that what we need
56// here. Can we truncate the hash to 96bits?
Asim Shankar23c84a02014-06-04 15:17:10 -070057func (c *publicKeyCaveat) ID() security.ThirdPartyCaveatID {
Andres Erbsendde52bf2014-06-09 09:42:33 -070058 return security.ThirdPartyCaveatID(id(c.RandNonce, c.DischargeMintingCaveat))
Jiri Simsa5293dcb2014-05-10 09:56:38 -070059}
60
61// Location returns the third-party location embedded in the caveat.
Asim Shankar23c84a02014-06-04 15:17:10 -070062func (c *publicKeyCaveat) Location() string {
Jiri Simsa5293dcb2014-05-10 09:56:38 -070063 return c.ThirdPartyLocation
64}
65
Asim Shankar23c84a02014-06-04 15:17:10 -070066func (c *publicKeyCaveat) String() string {
Andres Erbsendde52bf2014-06-09 09:42:33 -070067 return fmt.Sprintf("publicKeyCaveat{DischargeMintingCaveat: (%v bytes), ThirdPartyLocation: %q}", len(c.DischargeMintingCaveat), c.ThirdPartyLocation)
Jiri Simsa5293dcb2014-05-10 09:56:38 -070068}
69
Asim Shankara94e5072014-08-19 18:18:36 -070070func (c *publicKeyCaveat) Requirements() security.ThirdPartyRequirements {
71 return c.ThirdPartyRequirements
72}
73
Jiri Simsa5293dcb2014-05-10 09:56:38 -070074// Validate verifies whether the caveat validates for the provided context.
Asim Shankar23c84a02014-06-04 15:17:10 -070075func (c *publicKeyCaveat) Validate(ctx security.Context) error {
Jiri Simsa5293dcb2014-05-10 09:56:38 -070076 // Check whether the context has a dicharge matching the caveat's ID.
77 dis, ok := ctx.CaveatDischarges()[c.ID()]
78 if !ok {
79 return errPublicKeyCaveat(c, fmt.Errorf("missing discharge"))
80 }
81
Asim Shankar23c84a02014-06-04 15:17:10 -070082 pkDischarge, ok := dis.(*publicKeyDischarge)
Jiri Simsa5293dcb2014-05-10 09:56:38 -070083 if !ok {
84 return errPublicKeyCaveat(c, fmt.Errorf("caveat of type %T cannot be validated with discharge of type %T", c, dis))
85 }
86
87 // Validate all caveats present on the discharge.
88 for _, cav := range pkDischarge.Caveats {
89 if err := cav.Validate(ctx); err != nil {
90 return errPublicKeyCaveat(c, err)
91 }
92 }
93
94 // Check the discharge signature with the validation key from the caveat.
95 key, err := c.ValidationKey.Decode()
96 if err != nil {
97 return errPublicKeyCaveat(c, err)
98 }
Ryan Brown407b7322014-07-22 14:18:08 -070099 if !pkDischarge.Signature.Verify(key, pkDischarge.contentHash()) {
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700100 return errPublicKeyCaveat(c, fmt.Errorf("discharge %v has invalid signature", dis))
101 }
102 return nil
103}
104
Asim Shankar23c84a02014-06-04 15:17:10 -0700105// publicKeyDischarge implements security.ThirdPartyDischarge. It specifies a
106// discharge for a publicKeyCaveat, and includes a signature that can be verified
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700107// with the validation key of the caveat. Additionally, the discharge may include
108// service caveats which must all be valid in order for the discharge to be
109// considered valid.
Asim Shankar23c84a02014-06-04 15:17:10 -0700110type publicKeyDischarge struct {
Andres Erbsendde52bf2014-06-09 09:42:33 -0700111 // ThirdPartyCaveatID is used to match a Discharge with the Caveat it is for.
112 ThirdPartyCaveatID security.ThirdPartyCaveatID
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700113
114 // Caveats under which this Discharge is valid.
115 Caveats []wire.Caveat
116
117 // Signature on the contents of the discharge obtained using the private key
118 // corresponding to the validaton key in the caveat.
Ryan Brown407b7322014-07-22 14:18:08 -0700119 Signature security.Signature
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700120}
121
122// CaveatID returns a unique identity for the discharge based on the random nonce and
123// restriction embedded in the discharge.
Asim Shankar23c84a02014-06-04 15:17:10 -0700124func (d *publicKeyDischarge) CaveatID() security.ThirdPartyCaveatID {
Andres Erbsendde52bf2014-06-09 09:42:33 -0700125 return d.ThirdPartyCaveatID
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700126}
127
Asim Shankar23c84a02014-06-04 15:17:10 -0700128func (d *publicKeyDischarge) ThirdPartyCaveats() []security.ServiceCaveat {
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700129 return wire.DecodeThirdPartyCaveats(d.Caveats)
130}
Asim Shankar23c84a02014-06-04 15:17:10 -0700131
Asim Shankarb38d0362014-06-11 12:47:46 -0700132// sign uses the provided identity to sign the contents of the discharge.
Ryan Brown407b7322014-07-22 14:18:08 -0700133func (d *publicKeyDischarge) sign(discharger security.PrivateID) (err error) {
134 d.Signature, err = discharger.Sign(d.contentHash())
135 return
Asim Shankar23c84a02014-06-04 15:17:10 -0700136}
137
138func (d *publicKeyDischarge) contentHash() []byte {
139 h := sha256.New()
140 tmp := make([]byte, binary.MaxVarintLen64)
141
Andres Erbsendde52bf2014-06-09 09:42:33 -0700142 wire.WriteBytes(h, tmp, []byte(d.ThirdPartyCaveatID))
Asim Shankar23c84a02014-06-04 15:17:10 -0700143 for _, cav := range d.Caveats {
144 wire.WriteString(h, tmp, string(cav.Service))
145 wire.WriteBytes(h, tmp, cav.Bytes)
146 }
147 return h.Sum(nil)
148}
149
150// NewPublicKeyCaveat returns a new third-party caveat from the provided restriction,
151// third-party identity, and third-party location.
Asim Shankara94e5072014-08-19 18:18:36 -0700152func NewPublicKeyCaveat(dischargeMintingCaveat security.Caveat, thirdParty security.PublicID, location string, requirements security.ThirdPartyRequirements) (security.ThirdPartyCaveat, error) {
Asim Shankar23c84a02014-06-04 15:17:10 -0700153 nonce := make([]uint8, nonceLength)
154 if _, err := rand.Read(nonce); err != nil {
155 return nil, err
156 }
157
158 var validationKey wire.PublicKey
159 if err := validationKey.Encode(thirdParty.PublicKey()); err != nil {
160 return nil, err
161 }
162
Andres Erbsendde52bf2014-06-09 09:42:33 -0700163 var mintingCaveatEncoded bytes.Buffer
164 vom.NewEncoder(&mintingCaveatEncoded).Encode(dischargeMintingCaveat)
Asim Shankar23c84a02014-06-04 15:17:10 -0700165 return &publicKeyCaveat{
Andres Erbsendde52bf2014-06-09 09:42:33 -0700166 RandNonce: nonce,
167 DischargeMintingCaveat: mintingCaveatEncoded.Bytes(),
168 ValidationKey: validationKey,
169 ThirdPartyLocation: location,
Asim Shankara94e5072014-08-19 18:18:36 -0700170 ThirdPartyRequirements: requirements,
Asim Shankar23c84a02014-06-04 15:17:10 -0700171 }, nil
172}
173
174// NewPublicKeyDischarge returns a new discharge for the provided caveat
Andres Erbsendde52bf2014-06-09 09:42:33 -0700175// after verifying that the caveats for minting a discharge are met.
Asim Shankar23c84a02014-06-04 15:17:10 -0700176//
177// The CaveatID of the discharge is the same as the ID of the caveat, and
178// the discharge includes the provided service caveats along with a universal
179// expiry caveat for the provided duration. The discharge also includes a
180// signature over its contents obtained from the provided private key.
Asim Shankarb38d0362014-06-11 12:47:46 -0700181func NewPublicKeyDischarge(discharger security.PrivateID, caveat security.ThirdPartyCaveat, ctx security.Context, duration time.Duration, caveats []security.ServiceCaveat) (security.ThirdPartyDischarge, error) {
Asim Shankar23c84a02014-06-04 15:17:10 -0700182 cav, ok := caveat.(*publicKeyCaveat)
183 if !ok {
184 return nil, fmt.Errorf("cannot mint discharges for %T", caveat)
185 }
Andres Erbsendde52bf2014-06-09 09:42:33 -0700186 var mintingCaveat security.Caveat
187 mcBuf := bytes.NewReader(cav.DischargeMintingCaveat)
188 if err := vom.NewDecoder(mcBuf).Decode(&mintingCaveat); err != nil {
189 return nil, fmt.Errorf("failed to decode DischargeMintingCaveat: %s", err)
Asim Shankar23c84a02014-06-04 15:17:10 -0700190 }
Andres Erbsendde52bf2014-06-09 09:42:33 -0700191 if err := mintingCaveat.Validate(ctx); err != nil {
192 return nil, fmt.Errorf("failed to validate DischargeMintingCaveat: %s", err)
193 }
Asim Shankar23c84a02014-06-04 15:17:10 -0700194 now := time.Now()
Asim Shankard45f0022014-06-11 14:12:34 -0700195 expiryCaveat := &Expiry{IssueTime: now, ExpiryTime: now.Add(duration)}
Asim Shankar23c84a02014-06-04 15:17:10 -0700196 caveats = append(caveats, security.UniversalCaveat(expiryCaveat))
Asim Shankar23c84a02014-06-04 15:17:10 -0700197 encodedCaveats, err := wire.EncodeCaveats(caveats)
198 if err != nil {
Asim Shankarb38d0362014-06-11 12:47:46 -0700199 return nil, fmt.Errorf("failed to encode caveats in discharge: %v", err)
200 }
201 discharge := &publicKeyDischarge{
202 ThirdPartyCaveatID: caveat.ID(),
203 Caveats: encodedCaveats,
204 }
205 // TODO(ashankar,ataly): Should discharger necessarily be the same as ctx.LocalID()?
206 // If so, need the PrivateID object corresponding to ctx.LocalID.
207 if err := discharge.sign(discharger); err != nil {
Asim Shankar23c84a02014-06-04 15:17:10 -0700208 return nil, err
209 }
Asim Shankar23c84a02014-06-04 15:17:10 -0700210 return discharge, nil
211}
212
Andres Erbsendde52bf2014-06-09 09:42:33 -0700213// id calculates the sha256 hash of length-delimited byte slices
214func id(slices ...[]byte) string {
Asim Shankar23c84a02014-06-04 15:17:10 -0700215 h := sha256.New()
216 tmp := make([]byte, binary.MaxVarintLen64)
Asim Shankar23c84a02014-06-04 15:17:10 -0700217
Andres Erbsendde52bf2014-06-09 09:42:33 -0700218 for _, slice := range slices {
219 wire.WriteBytes(h, tmp, slice)
220 }
221 return string(h.Sum(nil))
222}
223
224func init() {
225 vom.Register(publicKeyCaveat{})
226 vom.Register(publicKeyDischarge{})
Asim Shankar23c84a02014-06-04 15:17:10 -0700227}