2018-02-01 22:45:15 +00:00
|
|
|
'''
|
2019-06-12 00:05:15 +00:00
|
|
|
Onionr - Private P2P Communication
|
2018-02-01 22:45:15 +00:00
|
|
|
|
|
|
|
This file handles Onionr's cryptography.
|
|
|
|
'''
|
|
|
|
'''
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
'''
|
2019-06-13 06:58:17 +00:00
|
|
|
import os, binascii, base64, hashlib, time, sys, hmac, secrets
|
2019-06-11 06:08:44 +00:00
|
|
|
import nacl.signing, nacl.encoding, nacl.public, nacl.hash, nacl.pwhash, nacl.utils, nacl.secret
|
2019-06-19 06:57:13 +00:00
|
|
|
import unpaddedbase32
|
2019-06-11 06:08:44 +00:00
|
|
|
import logger, onionrproofs
|
2019-06-25 23:07:35 +00:00
|
|
|
from onionrutils import stringvalidators, epoch, bytesconverter
|
2019-07-19 04:59:44 +00:00
|
|
|
import filepaths
|
|
|
|
import onionrexceptions, keymanager, onionrutils
|
2018-11-11 02:10:58 +00:00
|
|
|
import config
|
2019-07-19 19:49:56 +00:00
|
|
|
from . import generate, hashers
|
2019-06-16 06:06:32 +00:00
|
|
|
config.reload()
|
2018-02-01 22:45:15 +00:00
|
|
|
|
|
|
|
class OnionrCrypto:
|
2019-07-19 04:59:44 +00:00
|
|
|
def __init__(self):
|
|
|
|
self._keyFile = filepaths.keys_file
|
2018-02-21 02:44:56 +00:00
|
|
|
self.pubKey = None
|
|
|
|
self.privKey = None
|
2018-06-15 05:45:07 +00:00
|
|
|
self.secrets = secrets
|
2018-12-09 17:29:39 +00:00
|
|
|
self.deterministicRequirement = 25 # Min deterministic password/phrase length
|
2018-04-25 04:04:12 +00:00
|
|
|
self.HASH_ID_ROUNDS = 2000
|
2018-12-09 17:29:39 +00:00
|
|
|
self.keyManager = keymanager.KeyManager(self)
|
2018-02-21 02:44:56 +00:00
|
|
|
|
|
|
|
# Load our own pub/priv Ed25519 keys, gen & save them if they don't exist
|
|
|
|
if os.path.exists(self._keyFile):
|
2019-07-19 04:59:44 +00:00
|
|
|
if len(config.get('general.public_key', '')) > 0:
|
|
|
|
self.pubKey = config.get('general.public_key')
|
2018-12-09 17:29:39 +00:00
|
|
|
else:
|
|
|
|
self.pubKey = self.keyManager.getPubkeyList()[0]
|
|
|
|
self.privKey = self.keyManager.getPrivkey(self.pubKey)
|
2018-02-21 02:44:56 +00:00
|
|
|
else:
|
|
|
|
keys = self.generatePubKey()
|
|
|
|
self.pubKey = keys[0]
|
|
|
|
self.privKey = keys[1]
|
2018-12-09 17:29:39 +00:00
|
|
|
self.keyManager.addKey(self.pubKey, self.privKey)
|
2018-02-21 02:44:56 +00:00
|
|
|
return
|
|
|
|
|
2018-04-26 19:56:17 +00:00
|
|
|
def edVerify(self, data, key, sig, encodedData=True):
|
2018-03-01 19:59:07 +00:00
|
|
|
'''Verify signed data (combined in nacl) to an ed25519 key'''
|
2018-04-27 02:14:31 +00:00
|
|
|
try:
|
|
|
|
key = nacl.signing.VerifyKey(key=key, encoder=nacl.encoding.Base32Encoder)
|
2018-04-27 02:18:17 +00:00
|
|
|
except nacl.exceptions.ValueError:
|
2018-11-11 02:10:58 +00:00
|
|
|
#logger.debug('Signature by unknown key (cannot reverse hash)')
|
|
|
|
return False
|
|
|
|
except binascii.Error:
|
|
|
|
logger.warn('Could not load key for verification, invalid padding')
|
2018-04-27 02:14:31 +00:00
|
|
|
return False
|
2018-04-26 19:56:17 +00:00
|
|
|
retData = False
|
|
|
|
sig = base64.b64decode(sig)
|
2018-04-27 01:15:30 +00:00
|
|
|
try:
|
|
|
|
data = data.encode()
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
2018-04-26 19:56:17 +00:00
|
|
|
if encodedData:
|
|
|
|
try:
|
|
|
|
retData = key.verify(data, sig) # .encode() is not the same as nacl.encoding
|
|
|
|
except nacl.exceptions.BadSignatureError:
|
|
|
|
pass
|
2018-03-01 19:59:07 +00:00
|
|
|
else:
|
2018-04-26 19:56:17 +00:00
|
|
|
try:
|
|
|
|
retData = key.verify(data, sig)
|
|
|
|
except nacl.exceptions.BadSignatureError:
|
|
|
|
pass
|
2018-03-01 19:59:07 +00:00
|
|
|
return retData
|
2018-05-13 03:45:32 +00:00
|
|
|
|
2018-03-01 19:59:07 +00:00
|
|
|
def edSign(self, data, key, encodeResult=False):
|
|
|
|
'''Ed25519 sign data'''
|
2018-04-26 19:56:17 +00:00
|
|
|
try:
|
|
|
|
data = data.encode()
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
2018-03-01 19:59:07 +00:00
|
|
|
key = nacl.signing.SigningKey(seed=key, encoder=nacl.encoding.Base32Encoder)
|
|
|
|
retData = ''
|
|
|
|
if encodeResult:
|
2018-04-26 19:56:17 +00:00
|
|
|
retData = key.sign(data, encoder=nacl.encoding.Base64Encoder).signature.decode() # .encode() is not the same as nacl.encoding
|
2018-03-01 19:59:07 +00:00
|
|
|
else:
|
2018-04-26 19:56:17 +00:00
|
|
|
retData = key.sign(data).signature
|
2018-03-01 19:59:07 +00:00
|
|
|
return retData
|
|
|
|
|
2019-02-16 04:08:03 +00:00
|
|
|
def pubKeyEncrypt(self, data, pubkey, encodedData=False):
|
2018-03-16 20:38:33 +00:00
|
|
|
'''Encrypt to a public key (Curve25519, taken from base32 Ed25519 pubkey)'''
|
2019-06-25 23:07:35 +00:00
|
|
|
pubkey = unpaddedbase32.repad(bytesconverter.str_to_bytes(pubkey))
|
2018-03-16 20:38:33 +00:00
|
|
|
retVal = ''
|
2019-02-16 04:08:03 +00:00
|
|
|
box = None
|
2019-06-25 23:07:35 +00:00
|
|
|
data = bytesconverter.str_to_bytes(data)
|
2019-02-16 04:08:03 +00:00
|
|
|
|
|
|
|
pubkey = nacl.signing.VerifyKey(pubkey, encoder=nacl.encoding.Base32Encoder()).to_curve25519_public_key()
|
2018-07-13 21:02:41 +00:00
|
|
|
|
2018-04-02 00:33:09 +00:00
|
|
|
if encodedData:
|
|
|
|
encoding = nacl.encoding.Base64Encoder
|
|
|
|
else:
|
|
|
|
encoding = nacl.encoding.RawEncoder
|
2019-02-16 04:08:03 +00:00
|
|
|
|
|
|
|
box = nacl.public.SealedBox(pubkey)
|
|
|
|
retVal = box.encrypt(data, encoder=encoding)
|
2018-04-02 00:33:09 +00:00
|
|
|
|
2018-03-16 20:38:33 +00:00
|
|
|
return retVal
|
2018-02-21 02:44:56 +00:00
|
|
|
|
2019-02-16 04:08:03 +00:00
|
|
|
def pubKeyDecrypt(self, data, pubkey='', privkey='', encodedData=False):
|
2018-02-21 02:44:56 +00:00
|
|
|
'''pubkey decrypt (Curve25519, taken from Ed25519 pubkey)'''
|
2018-11-11 02:10:58 +00:00
|
|
|
decrypted = False
|
2018-04-02 00:33:09 +00:00
|
|
|
if encodedData:
|
|
|
|
encoding = nacl.encoding.Base64Encoder
|
|
|
|
else:
|
|
|
|
encoding = nacl.encoding.RawEncoder
|
2019-02-16 04:08:03 +00:00
|
|
|
if privkey == '':
|
|
|
|
privkey = self.privKey
|
|
|
|
ownKey = nacl.signing.SigningKey(seed=privkey, encoder=nacl.encoding.Base32Encoder()).to_curve25519_private_key()
|
|
|
|
|
2019-06-25 08:21:36 +00:00
|
|
|
if stringvalidators.validate_pub_key(privkey):
|
2019-02-16 04:08:03 +00:00
|
|
|
privkey = nacl.signing.SigningKey(seed=privkey, encoder=nacl.encoding.Base32Encoder()).to_curve25519_private_key()
|
|
|
|
anonBox = nacl.public.SealedBox(privkey)
|
|
|
|
else:
|
|
|
|
anonBox = nacl.public.SealedBox(ownKey)
|
|
|
|
decrypted = anonBox.decrypt(data, encoder=encoding)
|
2018-04-02 00:33:09 +00:00
|
|
|
return decrypted
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-04-02 00:33:09 +00:00
|
|
|
def symmetricEncrypt(self, data, key, encodedKey=False, returnEncoded=True):
|
2019-06-19 06:57:13 +00:00
|
|
|
'''Encrypt data with a 32-byte key (Salsa20-Poly1305 MAC)'''
|
2018-04-02 00:33:09 +00:00
|
|
|
if encodedKey:
|
|
|
|
encoding = nacl.encoding.Base64Encoder
|
|
|
|
else:
|
|
|
|
encoding = nacl.encoding.RawEncoder
|
|
|
|
|
|
|
|
# Make sure data is bytes
|
|
|
|
if type(data) != bytes:
|
|
|
|
data = data.encode()
|
|
|
|
|
|
|
|
box = nacl.secret.SecretBox(key, encoder=encoding)
|
|
|
|
|
|
|
|
if returnEncoded:
|
|
|
|
encoding = nacl.encoding.Base64Encoder
|
|
|
|
else:
|
|
|
|
encoding = nacl.encoding.RawEncoder
|
|
|
|
|
|
|
|
encrypted = box.encrypt(data, encoder=encoding)
|
|
|
|
return encrypted
|
|
|
|
|
|
|
|
def symmetricDecrypt(self, data, key, encodedKey=False, encodedMessage=False, returnEncoded=False):
|
|
|
|
'''Decrypt data to a 32-byte key (Salsa20-Poly1305 MAC)'''
|
|
|
|
if encodedKey:
|
|
|
|
encoding = nacl.encoding.Base64Encoder
|
|
|
|
else:
|
|
|
|
encoding = nacl.encoding.RawEncoder
|
|
|
|
box = nacl.secret.SecretBox(key, encoder=encoding)
|
|
|
|
|
|
|
|
if encodedMessage:
|
|
|
|
encoding = nacl.encoding.Base64Encoder
|
|
|
|
else:
|
|
|
|
encoding = nacl.encoding.RawEncoder
|
|
|
|
decrypted = box.decrypt(data, encoder=encoding)
|
|
|
|
if returnEncoded:
|
|
|
|
decrypted = base64.b64encode(decrypted)
|
|
|
|
return decrypted
|
2018-05-13 03:45:32 +00:00
|
|
|
|
2018-04-02 00:33:09 +00:00
|
|
|
def generateSymmetric(self):
|
|
|
|
'''Generate a symmetric key (bytes) and return it'''
|
|
|
|
return binascii.hexlify(nacl.utils.random(nacl.secret.SecretBox.KEY_SIZE))
|
|
|
|
|
2018-02-21 02:44:56 +00:00
|
|
|
def generatePubKey(self):
|
2018-04-23 02:58:24 +00:00
|
|
|
'''Generate a Ed25519 public key pair, return tuple of base32encoded pubkey, privkey'''
|
2019-07-19 19:49:56 +00:00
|
|
|
return generate.generate_pub_key()
|
2018-12-16 05:36:47 +00:00
|
|
|
|
2018-12-09 17:29:39 +00:00
|
|
|
def generateDeterministic(self, passphrase, bypassCheck=False):
|
|
|
|
'''Generate a Ed25519 public key pair from a password'''
|
|
|
|
passStrength = self.deterministicRequirement
|
2019-06-25 23:07:35 +00:00
|
|
|
passphrase = bytesconverter.str_to_bytes(passphrase) # Convert to bytes if not already
|
2018-12-09 17:29:39 +00:00
|
|
|
# Validate passphrase length
|
|
|
|
if not bypassCheck:
|
|
|
|
if len(passphrase) < passStrength:
|
|
|
|
raise onionrexceptions.PasswordStrengthError("Passphase must be at least %s characters" % (passStrength,))
|
|
|
|
# KDF values
|
|
|
|
kdf = nacl.pwhash.argon2id.kdf
|
|
|
|
salt = b"U81Q7llrQcdTP0Ux" # Does not need to be unique or secret, but must be 16 bytes
|
|
|
|
ops = nacl.pwhash.argon2id.OPSLIMIT_SENSITIVE
|
|
|
|
mem = nacl.pwhash.argon2id.MEMLIMIT_SENSITIVE
|
2018-12-16 05:36:47 +00:00
|
|
|
|
2019-01-20 05:39:25 +00:00
|
|
|
key = kdf(32, passphrase, salt, opslimit=ops, memlimit=mem) # Generate seed for ed25519 key
|
|
|
|
key = nacl.signing.SigningKey(key)
|
|
|
|
return (key.verify_key.encode(nacl.encoding.Base32Encoder).decode(), key.encode(nacl.encoding.Base32Encoder).decode())
|
2018-05-13 03:45:32 +00:00
|
|
|
|
2018-04-25 06:56:40 +00:00
|
|
|
def pubKeyHashID(self, pubkey=''):
|
2018-04-25 04:04:12 +00:00
|
|
|
'''Accept a ed25519 public key, return a truncated result of X many sha3_256 hash rounds'''
|
2018-04-25 06:56:40 +00:00
|
|
|
if pubkey == '':
|
|
|
|
pubkey = self.pubKey
|
2018-04-25 04:04:12 +00:00
|
|
|
prev = ''
|
2019-06-25 23:07:35 +00:00
|
|
|
pubkey = bytesconverter.str_to_bytes(pubkey)
|
2018-04-25 04:04:12 +00:00
|
|
|
for i in range(self.HASH_ID_ROUNDS):
|
2018-04-26 20:39:02 +00:00
|
|
|
try:
|
|
|
|
prev = prev.encode()
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
2018-04-25 04:04:12 +00:00
|
|
|
hasher = hashlib.sha3_256()
|
2018-04-26 20:39:02 +00:00
|
|
|
hasher.update(pubkey + prev)
|
2018-04-25 04:04:12 +00:00
|
|
|
prev = hasher.hexdigest()
|
|
|
|
result = prev
|
2018-05-05 21:50:15 +00:00
|
|
|
return result
|
|
|
|
|
|
|
|
def sha3Hash(self, data):
|
2019-07-19 19:49:56 +00:00
|
|
|
return hashers.sha3_hash(data)
|
2018-05-13 03:45:32 +00:00
|
|
|
|
2018-05-05 21:50:15 +00:00
|
|
|
def blake2bHash(self, data):
|
2019-07-19 19:49:56 +00:00
|
|
|
return hashers.blake2b_hash(data)
|
2018-05-13 03:45:32 +00:00
|
|
|
|
2018-07-08 07:51:23 +00:00
|
|
|
def verifyPow(self, blockContent):
|
2018-05-13 03:45:32 +00:00
|
|
|
'''
|
|
|
|
Verifies the proof of work associated with a block
|
|
|
|
'''
|
|
|
|
retData = False
|
|
|
|
|
|
|
|
dataLen = len(blockContent)
|
|
|
|
|
|
|
|
try:
|
2018-07-08 07:51:23 +00:00
|
|
|
blockContent = blockContent.encode()
|
2018-05-13 03:45:32 +00:00
|
|
|
except AttributeError:
|
|
|
|
pass
|
|
|
|
|
2018-07-08 07:51:23 +00:00
|
|
|
blockHash = self.sha3Hash(blockContent)
|
2018-07-10 07:20:32 +00:00
|
|
|
try:
|
|
|
|
blockHash = blockHash.decode() # bytes on some versions for some reason
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
2018-12-26 06:14:05 +00:00
|
|
|
|
2019-07-19 04:59:44 +00:00
|
|
|
difficulty = onionrproofs.getDifficultyForNewBlock(blockContent, ourBlock=False)
|
2018-12-24 06:12:46 +00:00
|
|
|
|
2019-07-19 04:59:44 +00:00
|
|
|
if difficulty < int(config.get('general.minimum_block_pow')):
|
|
|
|
difficulty = int(config.get('general.minimum_block_pow'))
|
2018-06-16 20:54:56 +00:00
|
|
|
mainHash = '0000000000000000000000000000000000000000000000000000000000000000'#nacl.hash.blake2b(nacl.utils.random()).decode()
|
|
|
|
puzzle = mainHash[:difficulty]
|
|
|
|
|
2018-07-08 07:51:23 +00:00
|
|
|
if blockHash[:difficulty] == puzzle:
|
2018-06-16 20:54:56 +00:00
|
|
|
# logger.debug('Validated block pow')
|
|
|
|
retData = True
|
2018-05-13 03:45:32 +00:00
|
|
|
else:
|
2018-06-16 20:54:56 +00:00
|
|
|
logger.debug("Invalid token, bad proof")
|
2018-05-13 03:45:32 +00:00
|
|
|
|
|
|
|
return retData
|
2018-12-16 05:36:47 +00:00
|
|
|
|
2019-02-26 04:19:37 +00:00
|
|
|
@staticmethod
|
|
|
|
def replayTimestampValidation(timestamp):
|
2019-06-25 23:07:35 +00:00
|
|
|
if epoch.get_epoch() - int(timestamp) > 2419200:
|
2019-02-26 04:19:37 +00:00
|
|
|
return False
|
|
|
|
else:
|
|
|
|
return True
|
|
|
|
|
2019-01-22 17:40:27 +00:00
|
|
|
@staticmethod
|
|
|
|
def safeCompare(one, two):
|
2019-02-15 03:28:41 +00:00
|
|
|
# Do encode here to avoid spawning core
|
|
|
|
try:
|
|
|
|
one = one.encode()
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
|
|
|
try:
|
|
|
|
two = two.encode()
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
2018-12-09 17:29:39 +00:00
|
|
|
return hmac.compare_digest(one, two)
|
2019-01-22 17:40:27 +00:00
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def randomShuffle(theList):
|
|
|
|
myList = list(theList)
|
|
|
|
shuffledList = []
|
|
|
|
myListLength = len(myList) + 1
|
|
|
|
while myListLength > 0:
|
|
|
|
removed = secrets.randbelow(myListLength)
|
|
|
|
try:
|
|
|
|
shuffledList.append(myList.pop(removed))
|
|
|
|
except IndexError:
|
|
|
|
pass
|
|
|
|
myListLength = len(myList)
|
|
|
|
return shuffledList
|