Marco Ricci commited on 2024-08-18 00:45:19
Zeige 1 geänderte Dateien mit 273 Einfügungen und 0 Löschungen.
Based on a rather direct translation of vault's "legacy" configuration migrator, for storeroom-enabled builds of vault.
| ... | ... |
@@ -0,0 +1,273 @@ |
| 1 |
+#!/usr/bin/python3 |
|
| 2 |
+ |
|
| 3 |
+from __future__ import annotations |
|
| 4 |
+ |
|
| 5 |
+import abc |
|
| 6 |
+import base64 |
|
| 7 |
+import json |
|
| 8 |
+import logging |
|
| 9 |
+import warnings |
|
| 10 |
+from typing import Any |
|
| 11 |
+ |
|
| 12 |
+from cryptography import exceptions as crypt_exceptions |
|
| 13 |
+from cryptography import utils as crypt_utils |
|
| 14 |
+from cryptography.hazmat.primitives import ciphers, hashes, hmac, padding |
|
| 15 |
+from cryptography.hazmat.primitives.ciphers import algorithms, modes |
|
| 16 |
+from cryptography.hazmat.primitives.kdf import pbkdf2 |
|
| 17 |
+ |
|
| 18 |
+from derivepassphrase import vault |
|
| 19 |
+ |
|
| 20 |
+logger = logging.getLogger(__name__) |
|
| 21 |
+ |
|
| 22 |
+ |
|
| 23 |
+def _h(bs: bytes | bytearray) -> str: |
|
| 24 |
+ return 'bytes.fromhex({!r})'.format(bs.hex(' '))
|
|
| 25 |
+ |
|
| 26 |
+ |
|
| 27 |
+class Reader(abc.ABC): |
|
| 28 |
+ def __init__( |
|
| 29 |
+ self, contents: bytes | bytearray, password: str | bytes | bytearray |
|
| 30 |
+ ) -> None: |
|
| 31 |
+ if not password: |
|
| 32 |
+ msg = 'No password given; check VAULT_KEY environment variable' |
|
| 33 |
+ raise ValueError(msg) |
|
| 34 |
+ self.contents = contents |
|
| 35 |
+ self.password = password |
|
| 36 |
+ self.iv_size = 0 |
|
| 37 |
+ self.mac_size = 0 |
|
| 38 |
+ self.encryption_key = b'' |
|
| 39 |
+ self.encryption_key_size = 0 |
|
| 40 |
+ self.signing_key = b'' |
|
| 41 |
+ self.signing_key_size = 0 |
|
| 42 |
+ |
|
| 43 |
+ def run(self) -> Any: |
|
| 44 |
+ self._parse_contents() |
|
| 45 |
+ self._derive_keys() |
|
| 46 |
+ self._check_signature() |
|
| 47 |
+ self._decrypt_payload() |
|
| 48 |
+ return self._data |
|
| 49 |
+ |
|
| 50 |
+ @staticmethod |
|
| 51 |
+ def pbkdf2( |
|
| 52 |
+ password: str | bytes | bytearray, key_size: int, iterations: int |
|
| 53 |
+ ) -> bytes: |
|
| 54 |
+ if isinstance(password, str): |
|
| 55 |
+ password = password.encode('utf-8')
|
|
| 56 |
+ raw_key = pbkdf2.PBKDF2HMAC( |
|
| 57 |
+ algorithm=hashes.SHA1(), # noqa: S303 |
|
| 58 |
+ length=key_size // 2, |
|
| 59 |
+ salt=vault.Vault._UUID, # noqa: SLF001 |
|
| 60 |
+ iterations=iterations, |
|
| 61 |
+ ).derive(password) |
|
| 62 |
+ logger.debug( |
|
| 63 |
+ 'binary = pbkdf2(%s, %s, %s, %s, %s) = %s -> %s', |
|
| 64 |
+ repr(password), |
|
| 65 |
+ repr(vault.Vault._UUID), # noqa: SLF001 |
|
| 66 |
+ iterations, |
|
| 67 |
+ key_size // 2, |
|
| 68 |
+ repr('sha1'),
|
|
| 69 |
+ _h(raw_key), |
|
| 70 |
+ _h(raw_key.hex().lower().encode('ASCII')),
|
|
| 71 |
+ ) |
|
| 72 |
+ return raw_key.hex().lower().encode('ASCII')
|
|
| 73 |
+ |
|
| 74 |
+ def _parse_contents(self) -> None: |
|
| 75 |
+ logger.info('Parsing IV, payload and signature from the file contents')
|
|
| 76 |
+ |
|
| 77 |
+ if len(self.contents) < self.iv_size + 16 + self.mac_size: |
|
| 78 |
+ msg = 'File contents are too small to parse' |
|
| 79 |
+ raise ValueError(msg) |
|
| 80 |
+ |
|
| 81 |
+ cutpos1 = self.iv_size |
|
| 82 |
+ cutpos2 = len(self.contents) - self.mac_size |
|
| 83 |
+ |
|
| 84 |
+ self.message = self.contents[:cutpos2] |
|
| 85 |
+ self.message_tag = self.contents[cutpos2:] |
|
| 86 |
+ self.iv = self.message[:cutpos1] |
|
| 87 |
+ self.payload = self.message[cutpos1:] |
|
| 88 |
+ |
|
| 89 |
+ logger.debug( |
|
| 90 |
+ 'buffer %s = [[%s, %s], %s]', |
|
| 91 |
+ _h(self.contents), |
|
| 92 |
+ _h(self.iv), |
|
| 93 |
+ _h(self.payload), |
|
| 94 |
+ _h(self.message_tag), |
|
| 95 |
+ ) |
|
| 96 |
+ |
|
| 97 |
+ def _derive_keys(self) -> None: |
|
| 98 |
+ logger.info('Deriving an encryption and signing key')
|
|
| 99 |
+ self._generate_keys() |
|
| 100 |
+ assert ( |
|
| 101 |
+ len(self.encryption_key) == self.encryption_key_size |
|
| 102 |
+ ), 'Derived encryption key is not valid' |
|
| 103 |
+ assert ( |
|
| 104 |
+ len(self.signing_key) == self.signing_key_size |
|
| 105 |
+ ), 'Derived signing key is not valid' |
|
| 106 |
+ |
|
| 107 |
+ @abc.abstractmethod |
|
| 108 |
+ def _generate_keys(self) -> None: |
|
| 109 |
+ raise AssertionError |
|
| 110 |
+ |
|
| 111 |
+ def _check_signature(self) -> None: |
|
| 112 |
+ logger.info('Checking HMAC signature')
|
|
| 113 |
+ mac = hmac.HMAC(self.signing_key, hashes.SHA256()) |
|
| 114 |
+ mac_input = self._hmac_input() |
|
| 115 |
+ logger.debug( |
|
| 116 |
+ 'mac_input = %s, expected_tag = %s', |
|
| 117 |
+ _h(mac_input), |
|
| 118 |
+ _h(self.message_tag), |
|
| 119 |
+ ) |
|
| 120 |
+ mac.update(mac_input) |
|
| 121 |
+ try: |
|
| 122 |
+ mac.verify(self.message_tag) |
|
| 123 |
+ except crypt_exceptions.InvalidSignature: |
|
| 124 |
+ msg = 'File does not contain a valid HMAC-SHA256 signature' |
|
| 125 |
+ raise ValueError(msg) from None |
|
| 126 |
+ |
|
| 127 |
+ @abc.abstractmethod |
|
| 128 |
+ def _hmac_input(self) -> bytes: |
|
| 129 |
+ raise AssertionError |
|
| 130 |
+ |
|
| 131 |
+ def _decrypt_payload(self) -> None: |
|
| 132 |
+ decryptor = self._make_decryptor() |
|
| 133 |
+ padded_plaintext = bytearray() |
|
| 134 |
+ padded_plaintext.extend(decryptor.update(self.payload)) |
|
| 135 |
+ padded_plaintext.extend(decryptor.finalize()) |
|
| 136 |
+ logger.debug('padded plaintext = %s', _h(padded_plaintext))
|
|
| 137 |
+ unpadder = padding.PKCS7(self.iv_size * 8).unpadder() |
|
| 138 |
+ plaintext = bytearray() |
|
| 139 |
+ plaintext.extend(unpadder.update(padded_plaintext)) |
|
| 140 |
+ plaintext.extend(unpadder.finalize()) |
|
| 141 |
+ logger.debug('plaintext = %s', _h(plaintext))
|
|
| 142 |
+ self._data = json.loads(plaintext) |
|
| 143 |
+ |
|
| 144 |
+ @abc.abstractmethod |
|
| 145 |
+ def _make_decryptor(self) -> ciphers.CipherContext: |
|
| 146 |
+ raise AssertionError |
|
| 147 |
+ |
|
| 148 |
+ |
|
| 149 |
+class V03Reader(Reader): |
|
| 150 |
+ KEY_SIZE = 32 |
|
| 151 |
+ |
|
| 152 |
+ def __init__(self, *args: Any, **kwargs: Any) -> None: |
|
| 153 |
+ super().__init__(*args, **kwargs) |
|
| 154 |
+ self.iv_size = 16 |
|
| 155 |
+ self.mac_size = 32 |
|
| 156 |
+ |
|
| 157 |
+ def run(self) -> Any: |
|
| 158 |
+ logger.info('Attempting to parse as v0.3 configuration')
|
|
| 159 |
+ return super().run() |
|
| 160 |
+ |
|
| 161 |
+ def _generate_keys(self) -> None: |
|
| 162 |
+ self.encryption_key = self.pbkdf2(self.password, self.KEY_SIZE, 100) |
|
| 163 |
+ self.signing_key = self.pbkdf2(self.password, self.KEY_SIZE, 200) |
|
| 164 |
+ self.encryption_key_size = self.signing_key_size = self.KEY_SIZE |
|
| 165 |
+ |
|
| 166 |
+ def _hmac_input(self) -> bytes: |
|
| 167 |
+ return self.message.hex().lower().encode('ASCII')
|
|
| 168 |
+ |
|
| 169 |
+ def _make_decryptor(self) -> ciphers.CipherContext: |
|
| 170 |
+ return ciphers.Cipher( |
|
| 171 |
+ algorithms.AES256(self.encryption_key), modes.CBC(self.iv) |
|
| 172 |
+ ).decryptor() |
|
| 173 |
+ |
|
| 174 |
+ |
|
| 175 |
+class V02Reader(Reader): |
|
| 176 |
+ def __init__(self, *args: Any, **kwargs: Any) -> None: |
|
| 177 |
+ super().__init__(*args, **kwargs) |
|
| 178 |
+ self.iv_size = 16 |
|
| 179 |
+ self.mac_size = 64 |
|
| 180 |
+ |
|
| 181 |
+ def run(self) -> Any: |
|
| 182 |
+ logger.info('Attempting to parse as v0.2 configuration')
|
|
| 183 |
+ return super().run() |
|
| 184 |
+ |
|
| 185 |
+ def _parse_contents(self) -> None: |
|
| 186 |
+ super()._parse_contents() |
|
| 187 |
+ logger.debug('Decoding payload (base64) and message tag (hex)')
|
|
| 188 |
+ self.payload = base64.standard_b64decode(self.payload) |
|
| 189 |
+ self.message_tag = bytes.fromhex(self.message_tag.decode('ASCII'))
|
|
| 190 |
+ |
|
| 191 |
+ def _generate_keys(self) -> None: |
|
| 192 |
+ self.encryption_key = self.pbkdf2(self.password, 8, 16) |
|
| 193 |
+ self.signing_key = self.pbkdf2(self.password, 16, 16) |
|
| 194 |
+ self.encryption_key_size = 8 |
|
| 195 |
+ self.signing_key_size = 16 |
|
| 196 |
+ |
|
| 197 |
+ def _hmac_input(self) -> bytes: |
|
| 198 |
+ return base64.standard_b64encode(self.message) |
|
| 199 |
+ |
|
| 200 |
+ def _make_decryptor(self) -> ciphers.CipherContext: |
|
| 201 |
+ def evp_bytestokey_md5_one_iteration( |
|
| 202 |
+ data: bytes, salt: bytes | None, key_size: int, iv_size: int |
|
| 203 |
+ ) -> tuple[bytes, bytes]: |
|
| 204 |
+ total_size = key_size + iv_size |
|
| 205 |
+ buffer = bytearray() |
|
| 206 |
+ last_block = b'' |
|
| 207 |
+ if salt is None: |
|
| 208 |
+ salt = b'' |
|
| 209 |
+ logging.debug( |
|
| 210 |
+ ( |
|
| 211 |
+ 'data = %s, salt = %s, key_size = %s, iv_size = %s, ' |
|
| 212 |
+ 'buffer length = %s, buffer = %s' |
|
| 213 |
+ ), |
|
| 214 |
+ _h(data), |
|
| 215 |
+ _h(salt), |
|
| 216 |
+ key_size, |
|
| 217 |
+ iv_size, |
|
| 218 |
+ len(buffer), |
|
| 219 |
+ _h(buffer), |
|
| 220 |
+ ) |
|
| 221 |
+ while len(buffer) < total_size: |
|
| 222 |
+ with warnings.catch_warnings(): |
|
| 223 |
+ warnings.simplefilter( |
|
| 224 |
+ 'ignore', crypt_utils.CryptographyDeprecationWarning |
|
| 225 |
+ ) |
|
| 226 |
+ block = hashes.Hash(hashes.MD5()) # noqa: S303 |
|
| 227 |
+ block.update(last_block) |
|
| 228 |
+ block.update(data) |
|
| 229 |
+ block.update(salt) |
|
| 230 |
+ last_block = block.finalize() |
|
| 231 |
+ buffer.extend(last_block) |
|
| 232 |
+ logging.debug( |
|
| 233 |
+ 'buffer length = %s, buffer = %s', len(buffer), _h(buffer) |
|
| 234 |
+ ) |
|
| 235 |
+ logging.debug( |
|
| 236 |
+ 'encryption_key = %s, iv = %s', |
|
| 237 |
+ _h(buffer[:key_size]), |
|
| 238 |
+ _h(buffer[key_size:total_size]), |
|
| 239 |
+ ) |
|
| 240 |
+ return bytes(buffer[:key_size]), bytes(buffer[key_size:total_size]) |
|
| 241 |
+ |
|
| 242 |
+ data = base64.standard_b64encode(self.iv + self.encryption_key) |
|
| 243 |
+ encryption_key, iv = evp_bytestokey_md5_one_iteration( |
|
| 244 |
+ data, salt=None, key_size=32, iv_size=16 |
|
| 245 |
+ ) |
|
| 246 |
+ return ciphers.Cipher( |
|
| 247 |
+ algorithms.AES256(encryption_key), modes.CBC(iv) |
|
| 248 |
+ ).decryptor() |
|
| 249 |
+ |
|
| 250 |
+ |
|
| 251 |
+if __name__ == '__main__': |
|
| 252 |
+ import os |
|
| 253 |
+ |
|
| 254 |
+ logging.basicConfig(level=('DEBUG' if os.getenv('DEBUG') else 'WARNING'))
|
|
| 255 |
+ with open( |
|
| 256 |
+ os.path.join( |
|
| 257 |
+ os.path.expanduser('~'), os.getenv('VAULT_PATH', '.vault')
|
|
| 258 |
+ ), |
|
| 259 |
+ 'rb', |
|
| 260 |
+ ) as infile: |
|
| 261 |
+ contents = base64.standard_b64decode(infile.read()) |
|
| 262 |
+ password = ( |
|
| 263 |
+ os.getenv('VAULT_KEY')
|
|
| 264 |
+ or os.getenv('LOGNAME')
|
|
| 265 |
+ or os.getenv('USER')
|
|
| 266 |
+ or os.getenv('USERNAME')
|
|
| 267 |
+ ) |
|
| 268 |
+ assert password |
|
| 269 |
+ try: |
|
| 270 |
+ config = V03Reader(contents, password).run() |
|
| 271 |
+ except ValueError: |
|
| 272 |
+ config = V02Reader(contents, password).run() |
|
| 273 |
+ print(json.dumps(config, indent=2, sort_keys=True)) # noqa: T201 |
|
| 0 | 274 |