Marco Ricci commited on 2024-08-16 22:48:08
Zeige 1 geänderte Dateien mit 139 Einfügungen und 21 Löschungen.
... | ... |
@@ -1,5 +1,7 @@ |
1 | 1 |
#!/usr/bin/python3 |
2 | 2 |
|
3 |
+from __future__ import annotations |
|
4 |
+ |
|
3 | 5 |
import base64 |
4 | 6 |
import glob |
5 | 7 |
import json |
... | ... |
@@ -42,11 +44,33 @@ class MasterKeys(TypedDict): |
42 | 44 |
|
43 | 45 |
|
44 | 46 |
def derive_master_keys_keys(password: str | bytes, iterations: int) -> KeyPair: |
47 |
+ """Derive encryption and signing keys for the master keys data. |
|
48 |
+ |
|
49 |
+ The master password is run through a key derivation function to |
|
50 |
+ obtain a 64-byte string, which is then split to yield two 32-byte |
|
51 |
+ keys. The key derivation function is PBKDF2, using HMAC-SHA1 and |
|
52 |
+ salted with the storeroom master keys UUID. |
|
53 |
+ |
|
54 |
+ Args: |
|
55 |
+ password: |
|
56 |
+ A master password for the storeroom instance. Usually read |
|
57 |
+ from the `VAULT_KEY` environment variable, otherwise |
|
58 |
+ defaults to the username. |
|
59 |
+ iterations: |
|
60 |
+ A count of rounds for the underlying key derivation |
|
61 |
+ function. Usually stored as a setting next to the encrypted |
|
62 |
+ master keys data. |
|
63 |
+ |
|
64 |
+ Returns: |
|
65 |
+ A 2-tuple of keys, the encryption key and the signing key, to |
|
66 |
+ decrypt and verify the master keys data with. |
|
67 |
+ |
|
68 |
+ """ |
|
45 | 69 |
if isinstance(password, str): |
46 | 70 |
password = password.encode('ASCII') |
47 | 71 |
master_keys_keys_blob = pbkdf2.PBKDF2HMAC( |
48 | 72 |
algorithm=hashes.SHA1(), # noqa: S303 |
49 |
- length=64, |
|
73 |
+ length=2 * KEY_SIZE, |
|
50 | 74 |
salt=STOREROOM_MASTER_KEYS_UUID, |
51 | 75 |
iterations=iterations, |
52 | 76 |
).derive(password) |
... | ... |
@@ -76,6 +100,39 @@ def derive_master_keys_keys(password: str | bytes, iterations: int) -> KeyPair: |
76 | 100 |
|
77 | 101 |
|
78 | 102 |
def decrypt_master_keys_data(data: bytes, keys: KeyPair) -> MasterKeys: |
103 |
+ """Decrypt the master keys data. |
|
104 |
+ |
|
105 |
+ The master keys data contains: |
|
106 |
+ |
|
107 |
+ - a 16-byte IV, |
|
108 |
+ - a 96-byte AES256-CBC-encrypted payload (using PKCS7 padding on the |
|
109 |
+ inside), and |
|
110 |
+ - a 32-byte MAC of the preceding 112 bytes. |
|
111 |
+ |
|
112 |
+ The decrypted payload itself consists of three 32-byte keys: the |
|
113 |
+ hashing, encryption and signing keys, in that order. |
|
114 |
+ |
|
115 |
+ The encrypted payload is encrypted with the encryption key, and the |
|
116 |
+ MAC is created based on the signing key. As per standard |
|
117 |
+ cryptographic procedure, the MAC can be verified before attempting |
|
118 |
+ to decrypt the payload. |
|
119 |
+ |
|
120 |
+ Because the payload size is both fixed and a multiple of the |
|
121 |
+ cipher blocksize, in this case, the PKCS7 padding is a no-op. |
|
122 |
+ |
|
123 |
+ Args: |
|
124 |
+ data: |
|
125 |
+ The encrypted master keys data. |
|
126 |
+ keys: |
|
127 |
+ The encryption and signing keys for the master keys data. |
|
128 |
+ These should have previously been derived via the |
|
129 |
+ [`derivepassphrase.exporter.storeroom.derive_master_keys_keys`][] |
|
130 |
+ function. |
|
131 |
+ |
|
132 |
+ Returns: |
|
133 |
+ The master encryption, signing and hashing keys. |
|
134 |
+ |
|
135 |
+ """ |
|
79 | 136 |
ciphertext, claimed_mac = struct.unpack( |
80 | 137 |
f'{len(data) - MAC_SIZE}s {MAC_SIZE}s', data |
81 | 138 |
) |
... | ... |
@@ -124,21 +181,54 @@ def decrypt_master_keys_data(data: bytes, keys: KeyPair) -> MasterKeys: |
124 | 181 |
} |
125 | 182 |
|
126 | 183 |
|
127 |
-def decrypt_session_keys(data: bytes, keys: MasterKeys) -> KeyPair: |
|
184 |
+def decrypt_session_keys(data: bytes, master_keys: MasterKeys) -> KeyPair: |
|
185 |
+ """Decrypt the bucket item's session keys. |
|
186 |
+ |
|
187 |
+ The bucket item's session keys are single-use keys for encrypting |
|
188 |
+ and signing a single item in the storage bucket. The encrypted |
|
189 |
+ session key data consists of: |
|
190 |
+ |
|
191 |
+ - a 16-byte IV, |
|
192 |
+ - a 64-byte AES256-CBC-encrypted payload (using PKCS7 padding on the |
|
193 |
+ inside), and |
|
194 |
+ - a 32-byte MAC of the preceding 80 bytes. |
|
195 |
+ |
|
196 |
+ The encrypted payload is encrypted with the master encryption key, |
|
197 |
+ and the MAC is created with the master signing key. As per standard |
|
198 |
+ cryptographic procedure, the MAC can be verified before attempting |
|
199 |
+ to decrypt the payload. |
|
200 |
+ |
|
201 |
+ Because the payload size is both fixed and a multiple of the |
|
202 |
+ cipher blocksize, in this case, the PKCS7 padding is a no-op. |
|
203 |
+ |
|
204 |
+ Args: |
|
205 |
+ data: |
|
206 |
+ The encrypted bucket item session key data. |
|
207 |
+ master_keys: |
|
208 |
+ The master keys. Presumably these have previously been |
|
209 |
+ obtained via the |
|
210 |
+ [`derivepassphrase.exporter.storeroom.decrypt_master_keys_data`][] |
|
211 |
+ function. |
|
212 |
+ |
|
213 |
+ Returns: |
|
214 |
+ The bucket item's encryption and signing keys. |
|
215 |
+ |
|
216 |
+ """ |
|
217 |
+ |
|
128 | 218 |
ciphertext, claimed_mac = struct.unpack( |
129 | 219 |
f'{len(data) - MAC_SIZE}s {MAC_SIZE}s', data |
130 | 220 |
) |
131 |
- actual_mac = hmac.HMAC(keys['signing_key'], hashes.SHA256()) |
|
221 |
+ actual_mac = hmac.HMAC(master_keys['signing_key'], hashes.SHA256()) |
|
132 | 222 |
actual_mac.update(ciphertext) |
133 | 223 |
logger.debug( |
134 | 224 |
( |
135 |
- 'decrypt_bucket_line (session_keys): ' |
|
225 |
+ 'decrypt_bucket_item (session_keys): ' |
|
136 | 226 |
'mac_key = bytes.fromhex(%s) (master), ' |
137 | 227 |
'hashed_content = bytes.fromhex(%s), ' |
138 | 228 |
'claimed_mac = bytes.fromhex(%s), ' |
139 | 229 |
'actual_mac = bytes.fromhex(%s)' |
140 | 230 |
), |
141 |
- repr(keys['signing_key'].hex(' ')), |
|
231 |
+ repr(master_keys['signing_key'].hex(' ')), |
|
142 | 232 |
repr(ciphertext.hex(' ')), |
143 | 233 |
repr(claimed_mac.hex(' ')), |
144 | 234 |
repr(actual_mac.copy().finalize().hex(' ')), |
... | ... |
@@ -149,7 +239,7 @@ def decrypt_session_keys(data: bytes, keys: MasterKeys) -> KeyPair: |
149 | 239 |
f'{IV_SIZE}s {len(ciphertext) - IV_SIZE}s', ciphertext |
150 | 240 |
) |
151 | 241 |
decryptor = ciphers.Cipher( |
152 |
- algorithms.AES256(keys['encryption_key']), modes.CBC(iv) |
|
242 |
+ algorithms.AES256(master_keys['encryption_key']), modes.CBC(iv) |
|
153 | 243 |
).decryptor() |
154 | 244 |
padded_plaintext = bytearray() |
155 | 245 |
padded_plaintext.extend(decryptor.update(payload)) |
... | ... |
@@ -170,14 +260,14 @@ def decrypt_session_keys(data: bytes, keys: MasterKeys) -> KeyPair: |
170 | 260 |
|
171 | 261 |
logger.debug( |
172 | 262 |
( |
173 |
- 'decrypt_bucket_line (session_keys): ' |
|
263 |
+ 'decrypt_bucket_item (session_keys): ' |
|
174 | 264 |
'decrypt_aes256_cbc_and_unpad(key=bytes.fromhex(%s), ' |
175 | 265 |
'iv=bytes.fromhex(%s))(bytes.fromhex(%s)) ' |
176 | 266 |
'= bytes.fromhex(%s) ' |
177 | 267 |
'= {"encryption_key": bytes.fromhex(%s), ' |
178 | 268 |
'"signing_key": bytes.fromhex(%s)}' |
179 | 269 |
), |
180 |
- repr(keys['encryption_key'].hex(' ')), |
|
270 |
+ repr(master_keys['encryption_key'].hex(' ')), |
|
181 | 271 |
repr(iv.hex(' ')), |
182 | 272 |
repr(payload.hex(' ')), |
183 | 273 |
repr(plaintext.hex(' ')), |
... | ... |
@@ -194,21 +284,49 @@ def decrypt_session_keys(data: bytes, keys: MasterKeys) -> KeyPair: |
194 | 284 |
return session_keys |
195 | 285 |
|
196 | 286 |
|
197 |
-def decrypt_contents(data: bytes, keys: KeyPair) -> bytes: |
|
287 |
+def decrypt_contents(data: bytes, session_keys: KeyPair) -> bytes: |
|
288 |
+ """Decrypt the bucket item's contents. |
|
289 |
+ |
|
290 |
+ The data consists of: |
|
291 |
+ |
|
292 |
+ - a 16-byte IV, |
|
293 |
+ - a variable-sized AES256-CBC-encrypted payload (using PKCS7 padding |
|
294 |
+ on the inside), and |
|
295 |
+ - a 32-byte MAC of the preceding 80 bytes. |
|
296 |
+ |
|
297 |
+ The encrypted payload is encrypted with the bucket item's session |
|
298 |
+ encryption key, and the MAC is created with the bucket item's |
|
299 |
+ session signing key. As per standard cryptographic procedure, the |
|
300 |
+ MAC can be verified before attempting to decrypt the payload. |
|
301 |
+ |
|
302 |
+ Args: |
|
303 |
+ data: |
|
304 |
+ The encrypted bucket item payload data. |
|
305 |
+ session_keys: |
|
306 |
+ The bucket item's session keys. Presumably these have |
|
307 |
+ previously been obtained via the |
|
308 |
+ [`derivepassphrase.exporter.storeroom.decrypt_session_keys`][] |
|
309 |
+ function. |
|
310 |
+ |
|
311 |
+ Returns: |
|
312 |
+ The bucket item's payload. |
|
313 |
+ |
|
314 |
+ """ |
|
315 |
+ |
|
198 | 316 |
ciphertext, claimed_mac = struct.unpack( |
199 | 317 |
f'{len(data) - MAC_SIZE}s {MAC_SIZE}s', data |
200 | 318 |
) |
201 |
- actual_mac = hmac.HMAC(keys['signing_key'], hashes.SHA256()) |
|
319 |
+ actual_mac = hmac.HMAC(session_keys['signing_key'], hashes.SHA256()) |
|
202 | 320 |
actual_mac.update(ciphertext) |
203 | 321 |
logger.debug( |
204 | 322 |
( |
205 |
- 'decrypt_bucket_line (contents): ' |
|
323 |
+ 'decrypt_bucket_item (contents): ' |
|
206 | 324 |
'mac_key = bytes.fromhex(%s), ' |
207 | 325 |
'hashed_content = bytes.fromhex(%s), ' |
208 | 326 |
'claimed_mac = bytes.fromhex(%s), ' |
209 | 327 |
'actual_mac = bytes.fromhex(%s)' |
210 | 328 |
), |
211 |
- repr(keys['signing_key'].hex(' ')), |
|
329 |
+ repr(session_keys['signing_key'].hex(' ')), |
|
212 | 330 |
repr(ciphertext.hex(' ')), |
213 | 331 |
repr(claimed_mac.hex(' ')), |
214 | 332 |
repr(actual_mac.copy().finalize().hex(' ')), |
... | ... |
@@ -219,7 +337,7 @@ def decrypt_contents(data: bytes, keys: KeyPair) -> bytes: |
219 | 337 |
f'{IV_SIZE}s {len(ciphertext) - IV_SIZE}s', ciphertext |
220 | 338 |
) |
221 | 339 |
decryptor = ciphers.Cipher( |
222 |
- algorithms.AES256(keys['encryption_key']), modes.CBC(iv) |
|
340 |
+ algorithms.AES256(session_keys['encryption_key']), modes.CBC(iv) |
|
223 | 341 |
).decryptor() |
224 | 342 |
padded_plaintext = bytearray() |
225 | 343 |
padded_plaintext.extend(decryptor.update(payload)) |
... | ... |
@@ -231,12 +349,12 @@ def decrypt_contents(data: bytes, keys: KeyPair) -> bytes: |
231 | 349 |
|
232 | 350 |
logger.debug( |
233 | 351 |
( |
234 |
- 'decrypt_bucket_line (contents): ' |
|
352 |
+ 'decrypt_bucket_item (contents): ' |
|
235 | 353 |
'decrypt_aes256_cbc_and_unpad(key=bytes.fromhex(%s), ' |
236 | 354 |
'iv=bytes.fromhex(%s))(bytes.fromhex(%s)) ' |
237 | 355 |
'= bytes.fromhex(%s)' |
238 | 356 |
), |
239 |
- repr(keys['encryption_key'].hex(' ')), |
|
357 |
+ repr(session_keys['encryption_key'].hex(' ')), |
|
240 | 358 |
repr(iv.hex(' ')), |
241 | 359 |
repr(payload.hex(' ')), |
242 | 360 |
repr(plaintext.hex(' ')), |
... | ... |
@@ -245,23 +363,23 @@ def decrypt_contents(data: bytes, keys: KeyPair) -> bytes: |
245 | 363 |
return plaintext |
246 | 364 |
|
247 | 365 |
|
248 |
-def decrypt_bucket_line(bucket_line: bytes, master_keys: MasterKeys) -> bytes: |
|
366 |
+def decrypt_bucket_item(bucket_item: bytes, master_keys: MasterKeys) -> bytes: |
|
249 | 367 |
logger.debug( |
250 | 368 |
( |
251 |
- 'decrypt_bucket_line: data = bytes.fromhex(%s), ' |
|
369 |
+ 'decrypt_bucket_item: data = bytes.fromhex(%s), ' |
|
252 | 370 |
'encryption_key = bytes.fromhex(%s), ' |
253 | 371 |
'signing_key = bytes.fromhex(%s)' |
254 | 372 |
), |
255 |
- repr(bucket_line.hex(' ')), |
|
373 |
+ repr(bucket_item.hex(' ')), |
|
256 | 374 |
repr(master_keys['encryption_key'].hex(' ')), |
257 | 375 |
repr(master_keys['signing_key'].hex(' ')), |
258 | 376 |
) |
259 | 377 |
data_version, encrypted_session_keys, data_contents = struct.unpack( |
260 | 378 |
( |
261 | 379 |
f'B {ENCRYPTED_KEYPAIR_SIZE}s ' |
262 |
- f'{len(bucket_line) - 1 - ENCRYPTED_KEYPAIR_SIZE}s' |
|
380 |
+ f'{len(bucket_item) - 1 - ENCRYPTED_KEYPAIR_SIZE}s' |
|
263 | 381 |
), |
264 |
- bucket_line, |
|
382 |
+ bucket_item, |
|
265 | 383 |
) |
266 | 384 |
if data_version != 1: |
267 | 385 |
msg = f'Cannot handle version {data_version} encrypted data' |
... | ... |
@@ -287,7 +405,7 @@ def decrypt_bucket_file(filename: str, master_keys: MasterKeys) -> None: |
287 | 405 |
decrypted_file.write(header_line) |
288 | 406 |
for line in bucket_file: |
289 | 407 |
decrypted_contents = ( |
290 |
- decrypt_bucket_line( |
|
408 |
+ decrypt_bucket_item( |
|
291 | 409 |
base64.standard_b64decode(line), master_keys |
292 | 410 |
).removesuffix(b'\n') |
293 | 411 |
+ b'\n' |
294 | 412 |