github.com/keybase/client/go@v0.0.0-20240309051027-028f7c731f8b/teams/ftl.go (about) 1 package teams 2 3 import ( 4 "fmt" 5 "strings" 6 "sync" 7 "time" 8 9 "github.com/keybase/client/go/gregor" 10 "github.com/keybase/client/go/libkb" 11 "github.com/keybase/client/go/protocol/keybase1" 12 "github.com/keybase/client/go/sig3" 13 "github.com/keybase/client/go/teams/hidden" 14 storage "github.com/keybase/client/go/teams/storage" 15 ) 16 17 // 18 // ftl.go 19 // 20 // Fast Team chain Loader 21 // 22 // Routines for fast-team loading. In fast team loading, we ignore most signatures 23 // and use the Merkle Tree as a source of truth. This is good enough for getting 24 // directly into a chat, where it's not necessary to see a list of team members. 25 // 26 27 // FastTeamChainLoader loads teams using the "fast approach." It doesn't compute 28 // membership or check any signatures. It just checks for consistency against the merkle 29 // tree, and audits that the merkle tree is being faithfully constructed. 30 type FastTeamChainLoader struct { 31 32 // context for loading things from the outside world. 33 world LoaderContext 34 35 // single-flight lock on TeamID 36 locktab *libkb.LockTable 37 38 // Hold onto FastTeamLoad by-products as long as we have room, and store 39 // them persistently to disk. 40 storage *storage.FTLStorage 41 42 // We can get pushed by the server into "force repoll" mode, in which we're 43 // not getting cache invalidations. An example: when Coyne or Nojima revokes 44 // a device. We want to cut down on notification spam. So instead, all attempts 45 // to load a team result in a preliminary poll for freshness, which this state is enabled. 46 forceRepollMutex sync.RWMutex 47 forceRepollUntil gregor.TimeOrOffset 48 } 49 50 const FTLVersion = 1 51 52 // NewFastLoader makes a new fast loader and initializes it. 53 func NewFastTeamLoader(g *libkb.GlobalContext) *FastTeamChainLoader { 54 ret := &FastTeamChainLoader{ 55 world: NewLoaderContextFromG(g), 56 locktab: libkb.NewLockTable(), 57 } 58 ret.storage = storage.NewFTLStorage(g, ret.upgradeStoredState) 59 return ret 60 } 61 62 // NewFastTeamLoaderAndInstall creates a new loader and installs it into G. 63 func NewFastTeamLoaderAndInstall(g *libkb.GlobalContext) *FastTeamChainLoader { 64 l := NewFastTeamLoader(g) 65 g.SetFastTeamLoader(l) 66 g.AddLogoutHook(l, "fastTeamLoader") 67 g.AddDbNukeHook(l, "fastTeamLoader") 68 return l 69 } 70 71 var _ libkb.FastTeamLoader = (*FastTeamChainLoader)(nil) 72 73 func ftlLogTag(m libkb.MetaContext) libkb.MetaContext { 74 return m.WithLogTag("FTL") 75 } 76 77 func FTL(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) { 78 return m.G().GetFastTeamLoader().Load(m, arg) 79 } 80 81 type ftlCombinedData struct { 82 visible *keybase1.FastTeamData 83 hidden *keybase1.HiddenTeamChain 84 } 85 86 func newFTLCombinedData(v *keybase1.FastTeamData, h *keybase1.HiddenTeamChain) ftlCombinedData { 87 return ftlCombinedData{visible: v, hidden: h} 88 } 89 90 func (f ftlCombinedData) latestKeyGeneration() keybase1.PerTeamKeyGeneration { 91 ret := f.visible.LatestKeyGeneration 92 g := f.hidden.MaxReaderPerTeamKeyGeneration() 93 if ret < g { 94 ret = g 95 } 96 return ret 97 } 98 99 func (f ftlCombinedData) perTeamKey(g keybase1.PerTeamKeyGeneration) *keybase1.PerTeamKey { 100 ret, ok := f.visible.Chain.PerTeamKeys[g] 101 if ok { 102 return &ret 103 } 104 ret, ok = f.hidden.GetReaderPerTeamKeyAtGeneration(g) 105 if ok { 106 return &ret 107 } 108 return nil 109 } 110 111 // Load fast-loads the given team. Provide some hints as to how to load it. You can specify an application 112 // and key generations needed, if you are entering chat. Those links will be returned unstubbed 113 // from the server, and then the keys can be output in the result. 114 func (f *FastTeamChainLoader) Load(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) { 115 m = ftlLogTag(m) 116 defer m.Trace(fmt.Sprintf("FastTeamChainLoader#Load(%+v)", arg), &err)() 117 originalArg := arg.DeepCopy() 118 119 res, err = f.loadOneAttempt(m, arg) 120 if err != nil { 121 return res, err 122 } 123 124 if arg.AssertTeamName != nil && !arg.AssertTeamName.Eq(res.Name) { 125 m.Debug("Did not get expected subteam name; will reattempt with forceRefresh (%s != %s)", arg.AssertTeamName.String(), res.Name.String()) 126 arg.ForceRefresh = true 127 res, err = f.loadOneAttempt(m, arg) 128 if err != nil { 129 return res, err 130 } 131 if !arg.AssertTeamName.Eq(res.Name) { 132 return res, NewBadNameError(fmt.Sprintf("After force-refresh, still bad team name: wanted %s, but got %s", arg.AssertTeamName.String(), res.Name.String())) 133 } 134 } 135 136 if ShouldRunBoxAudit(m) { 137 newM, shouldReload := VerifyBoxAudit(m, res.Name.ToTeamID(arg.Public)) 138 if shouldReload { 139 return f.Load(newM, originalArg) 140 } 141 } else { 142 m.Debug("Box auditor feature flagged off; not checking jail during ftl team load...") 143 } 144 145 return res, nil 146 } 147 148 // VerifyTeamName verifies that the given ID aligns with the given name, using the Merkle tree only 149 // (and not verifying sigs along the way). 150 func (f *FastTeamChainLoader) VerifyTeamName(m libkb.MetaContext, id keybase1.TeamID, name keybase1.TeamName, forceRefresh bool) (err error) { 151 m = m.WithLogTag("FTL") 152 defer m.Trace(fmt.Sprintf("FastTeamChainLoader#VerifyTeamName(%v,%s)", id, name.String()), &err)() 153 _, err = f.Load(m, keybase1.FastTeamLoadArg{ 154 ID: id, 155 Public: id.IsPublic(), 156 AssertTeamName: &name, 157 ForceRefresh: forceRefresh, 158 HiddenChainIsOptional: true, 159 }) 160 return err 161 } 162 163 func (f *FastTeamChainLoader) loadOneAttempt(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) { 164 165 if arg.ID.IsPublic() != arg.Public { 166 return res, NewBadPublicError(arg.ID, arg.Public) 167 } 168 169 flr, err := f.load(m, fastLoadArg{FastTeamLoadArg: arg}) 170 if err != nil { 171 return res, err 172 } 173 174 res.ApplicationKeys = flr.applicationKeys 175 res.Name, err = f.verifyTeamNameViaParentLoad(m, arg.ID, arg.Public, flr.unverifiedName, flr.upPointer, arg.ID, arg.ForceRefresh) 176 if err != nil { 177 return res, err 178 } 179 180 return res, nil 181 } 182 183 // verifyTeamNameViaParentLoad takes a team ID, and a pointer to a parent team's sigchain, and computes 184 // the full resolved team name. If the pointer is null, we'll assume this is a root team and do the 185 // verification via hash-comparison. 186 func (f *FastTeamChainLoader) verifyTeamNameViaParentLoad(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, unverifiedName keybase1.TeamName, parent *keybase1.UpPointer, bottomSubteam keybase1.TeamID, forceRefresh bool) (res keybase1.TeamName, err error) { 187 188 if parent == nil { 189 if !unverifiedName.IsRootTeam() { 190 return res, NewBadNameError("expected a root team") 191 } 192 if !unverifiedName.ToTeamID(isPublic).Eq(id) { 193 return res, NewBadNameError("root team v. team ID mismatch") 194 } 195 return unverifiedName, nil 196 } 197 198 if parent.ParentID.IsPublic() != isPublic { 199 return res, NewBadPublicError(parent.ParentID, isPublic) 200 } 201 202 parentRes, err := f.load(m, fastLoadArg{ 203 FastTeamLoadArg: keybase1.FastTeamLoadArg{ 204 ID: parent.ParentID, 205 Public: isPublic, 206 ForceRefresh: forceRefresh, 207 HiddenChainIsOptional: true, // we do not need to see the hidden chain for the parent 208 }, 209 downPointersNeeded: []keybase1.Seqno{parent.ParentSeqno}, 210 needLatestName: true, 211 readSubteamID: bottomSubteam, 212 }) 213 if err != nil { 214 return res, err 215 } 216 downPointer, ok := parentRes.downPointers[parent.ParentSeqno] 217 if !ok { 218 return res, NewBadNameError("down pointer not found in parent") 219 } 220 suffix := downPointer.NameComponent 221 222 parentName, err := f.verifyTeamNameViaParentLoad(m, parent.ParentID, isPublic, parentRes.unverifiedName, parentRes.upPointer, bottomSubteam, forceRefresh) 223 if err != nil { 224 return res, err 225 } 226 227 return parentName.Append(suffix) 228 } 229 230 // fastLoadRes is used internally to convey the results of the #load() call. 231 type fastLoadRes struct { 232 applicationKeys []keybase1.TeamApplicationKey 233 unverifiedName keybase1.TeamName 234 downPointers map[keybase1.Seqno]keybase1.DownPointer 235 upPointer *keybase1.UpPointer 236 } 237 238 // fastLoadArg is used internally to pass arguments to the #load() call. It is a small wrapper 239 // around the keybase1.FastTeamLoadArg that's passed through to the public #Load() call. 240 type fastLoadArg struct { 241 keybase1.FastTeamLoadArg 242 downPointersNeeded []keybase1.Seqno 243 readSubteamID keybase1.TeamID 244 needLatestName bool 245 forceReset bool 246 } 247 248 // needChainTail returns true if the argument mandates that we need a reasonably up-to-date chain tail, 249 // let's say to figure out what this team is currently named, or to figure out the most recent 250 // encryption key to encrypt new messages for. 251 func (a fastLoadArg) needChainTail() bool { 252 return a.needLatestName || a.NeedLatestKey 253 } 254 255 // load acquires a lock by team ID, and the runs loadLockedWithRetries. 256 func (f *FastTeamChainLoader) load(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) { 257 defer m.Trace(fmt.Sprintf("FastTeamChainLoader#load(%+v)", arg), &err)() 258 259 // Single-flight lock by team ID. 260 lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), arg.ID.String()) 261 defer lock.Release(m.Ctx()) 262 263 res, err = f.loadLockedWithRetries(m, arg) 264 if hidden.ShouldClearSupportFlagOnError(err) { 265 m.Debug("Clearing support hidden chain flag for team %s because of error %v in FTL", arg.ID, err) 266 m.G().GetHiddenTeamChainManager().ClearSupportFlagIfFalse(m, arg.ID) 267 } 268 return res, err 269 } 270 271 // loadLockedWithRetries attempts two loads of the team. If the first iteration returns an FTLMissingSeedError, 272 // we'll blast through the cache and attempt a full reload a second time. Then that's for all the marbles. 273 func (f *FastTeamChainLoader) loadLockedWithRetries(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) { 274 275 for i := 0; i < 2; i++ { 276 res, err = f.loadLocked(m, arg) 277 if err == nil { 278 return res, err 279 } 280 if _, ok := err.(FTLMissingSeedError); !ok { 281 return nil, err 282 } 283 m.Debug("Got retriable error %s; will force reset", err) 284 arg.forceReset = true 285 } 286 return res, err 287 } 288 289 // dervieSeedAtGeneration either goes to cache or rederives the PTK private seed 290 // for the given generation gen. 291 func (f *FastTeamChainLoader) deriveSeedAtGeneration(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, dat ftlCombinedData) (seed keybase1.PerTeamKeySeed, err error) { 292 293 state := dat.visible 294 295 seed, ok := state.Chain.PerTeamKeySeedsVerified[gen] 296 if ok { 297 return seed, nil 298 } 299 300 var tmp keybase1.PerTeamKeySeed 301 tmp, ok = state.PerTeamKeySeedsUnverified[gen] 302 if !ok { 303 // See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam 304 // name before we were members of the team, and then later get added to the team, and then try to 305 // reload the team. We didn't have boxes from the first time around, so just force a full reload. 306 // It's inefficient but it's a very rare case. 307 return seed, NewFTLMissingSeedError(gen) 308 } 309 310 ptkChain := dat.perTeamKey(gen) 311 if ptkChain == nil { 312 return seed, NewFastLoadError(fmt.Sprintf("no per team key public halves at generation %d", gen)) 313 } 314 315 check, ok := state.SeedChecks[gen] 316 if !ok { 317 return seed, NewFastLoadError(fmt.Sprintf("no per team key seed check at %d", gen)) 318 } 319 320 km, err := NewTeamKeyManagerWithSecret(state.ID(), tmp, gen, &check) 321 if err != nil { 322 return seed, err 323 } 324 325 sigKey, err := km.SigningKey() 326 if err != nil { 327 return seed, err 328 } 329 330 if !ptkChain.SigKID.SecureEqual(sigKey.GetKID()) { 331 m.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, sigKey.GetKID(), ptkChain.SigKID) 332 return seed, NewFastLoadError(fmt.Sprintf("wrong team key (sig) found at generation %v", gen)) 333 } 334 335 encKey, err := km.EncryptionKey() 336 if err != nil { 337 return seed, err 338 } 339 340 if !ptkChain.EncKID.SecureEqual(encKey.GetKID()) { 341 m.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, encKey.GetKID(), ptkChain.EncKID) 342 return seed, NewFastLoadError(fmt.Sprintf("wrong team key (enc) found at generation %v", gen)) 343 } 344 345 // write back to cache 346 seed = tmp 347 state.Chain.PerTeamKeySeedsVerified[gen] = seed 348 return seed, err 349 } 350 351 // deriveKeyForApplicationAtGeneration pulls from cache or generates the PTK for the 352 // given application at the given generation. 353 func (f *FastTeamChainLoader) deriveKeyForApplicationAtGeneration(m libkb.MetaContext, app keybase1.TeamApplication, gen keybase1.PerTeamKeyGeneration, dat ftlCombinedData) (key keybase1.TeamApplicationKey, err error) { 354 355 seed, err := f.deriveSeedAtGeneration(m, gen, dat) 356 if err != nil { 357 return key, err 358 } 359 360 var mask *keybase1.MaskB64 361 if m := dat.visible.ReaderKeyMasks[app]; m != nil { 362 tmp, ok := m[gen] 363 if ok { 364 mask = &tmp 365 } 366 } 367 if mask == nil { 368 m.Debug("Could not get reader key mask for <%s,%d>", app, gen) 369 if dat.visible.ID().IsSubTeam() { 370 m.Debug("guessing lack of RKM is due to not being an explicit member of the subteam") 371 return key, NewNotExplicitMemberOfSubteamError() 372 } 373 return key, NewFastLoadError("Could not load application keys") 374 } 375 376 rkm := keybase1.ReaderKeyMask{ 377 Application: app, 378 Generation: gen, 379 Mask: *mask, 380 } 381 return applicationKeyForMask(rkm, seed) 382 } 383 384 // deriveKeysForApplication pulls from cache or generates several geneartions of PTKs 385 // for the given application. 386 func (f *FastTeamChainLoader) deriveKeysForApplication(m libkb.MetaContext, app keybase1.TeamApplication, arg fastLoadArg, dat ftlCombinedData) (keys []keybase1.TeamApplicationKey, err error) { 387 388 latestGen := dat.latestKeyGeneration() 389 390 var didLatest bool 391 doKey := func(gen keybase1.PerTeamKeyGeneration) error { 392 var key keybase1.TeamApplicationKey 393 key, err = f.deriveKeyForApplicationAtGeneration(m, app, gen, dat) 394 if err != nil { 395 return err 396 } 397 keys = append(keys, key) 398 if gen == latestGen { 399 didLatest = true 400 } 401 return nil 402 } 403 404 if arg.NeedLatestKey { 405 // This debug is useful to have since it will spell out which version is the latest in the log 406 // if the caller asked for latest. 407 m.Debug("FastTeamChainLoader#deriveKeysForApplication: sending back latest at key generation %d", latestGen) 408 } 409 410 for _, gen := range arg.KeyGenerationsNeeded { 411 if err = doKey(gen); err != nil { 412 return nil, err 413 } 414 } 415 if !didLatest && arg.NeedLatestKey { 416 if err = doKey(latestGen); err != nil { 417 return nil, err 418 } 419 } 420 return keys, nil 421 } 422 423 // deriveKeys pulls from cache or generates PTKs for an set of (application X generations) 424 // pairs, for all in the cartesian product. 425 func (f *FastTeamChainLoader) deriveKeys(m libkb.MetaContext, arg fastLoadArg, dat ftlCombinedData) (keys []keybase1.TeamApplicationKey, err error) { 426 for _, app := range arg.Applications { 427 var tmp []keybase1.TeamApplicationKey 428 tmp, err = f.deriveKeysForApplication(m, app, arg, dat) 429 if err != nil { 430 return nil, err 431 } 432 keys = append(keys, tmp...) 433 } 434 return keys, nil 435 } 436 437 // toResult turns the current fast state into a fastLoadRes. 438 func (f *FastTeamChainLoader) toResult(m libkb.MetaContext, arg fastLoadArg, dat ftlCombinedData) (res *fastLoadRes, err error) { 439 res = &fastLoadRes{ 440 unverifiedName: dat.visible.Name, 441 downPointers: dat.visible.Chain.DownPointers, 442 upPointer: dat.visible.Chain.LastUpPointer, 443 } 444 res.applicationKeys, err = f.deriveKeys(m, arg, dat) 445 if err != nil { 446 return nil, err 447 } 448 return res, nil 449 } 450 451 // findState in cache finds the team ID's state in an in-memory cache. 452 func (f *FastTeamChainLoader) findStateInCache(m libkb.MetaContext, id keybase1.TeamID) (data *keybase1.FastTeamData, frozen bool, tombstoned bool) { 453 return f.storage.Get(m, id, id.IsPublic()) 454 } 455 456 // stateHasKeySeed returns true/false if the state has the seed material for the given 457 // generation. Either the fully verified PTK seed, or the public portion and 458 // unverified PTK seed. 459 func stateHasKeySeed(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) bool { 460 _, foundVerified := state.Chain.PerTeamKeySeedsVerified[gen] 461 if foundVerified { 462 return true 463 } 464 _, foundUnverifiedSeed := state.PerTeamKeySeedsUnverified[gen] 465 if !foundUnverifiedSeed { 466 return false 467 } 468 _, foundPerTeamKey := state.Chain.PerTeamKeys[gen] 469 return foundPerTeamKey 470 } 471 472 // stateHasKeys checks to see if the given state has the keys specified in the shopping list. If not, it will 473 // modify the shopping list and return false. If yes, it will leave the shopping list unchanged and return 474 // true. 475 func stateHasKeys(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, data ftlCombinedData) (fresh bool) { 476 gens := make(map[keybase1.PerTeamKeyGeneration]struct{}) 477 state := data.visible 478 479 fresh = true 480 481 if arg.NeedLatestKey && !state.LoadedLatest { 482 m.Debug("latest was never loaded, we need to load it") 483 shoppingList.needMerkleRefresh = true 484 shoppingList.needLatestKey = true 485 fresh = false 486 } 487 488 // The key generations needed are the ones passed in, and also, potentially, our cached 489 // LatestKeyGeneration from the state. It could be that when we go to the server, this is no 490 // longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should 491 // pull down the mask, since it's a bug to not have it if it turns out the server refresh 492 // didn't budge the latest key generation. 493 kgn := append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...) 494 latestKeyGeneration := data.latestKeyGeneration() 495 if arg.NeedLatestKey && state.LoadedLatest && latestKeyGeneration > 0 { 496 kgn = append(kgn, latestKeyGeneration) 497 } 498 499 for _, app := range arg.Applications { 500 for _, gen := range kgn { 501 add := false 502 if state.ReaderKeyMasks[app] == nil || state.ReaderKeyMasks[app][gen] == nil { 503 m.Debug("state doesn't have mask for <%d,%d>", app, gen) 504 add = true 505 } 506 if !stateHasKeySeed(m, gen, state) { 507 m.Debug("state doesn't have key seed for gen=%d", gen) 508 add = true 509 } 510 if add { 511 gens[gen] = struct{}{} 512 fresh = false 513 } 514 } 515 } 516 517 shoppingList.applications = append([]keybase1.TeamApplication{}, arg.Applications...) 518 519 if !fresh { 520 for gen := range gens { 521 shoppingList.generations = append(shoppingList.generations, gen) 522 } 523 } 524 525 // Let's just get all keys from the past, so figure out the minimal seed value that we have. 526 shoppingList.seedLow = computeSeedLow(state) 527 528 return fresh 529 } 530 531 // stateHasDownPointers checks to see if the given state has the down pointers specified in the shopping list. 532 // If not, it will change the shopping list to have the down pointers and return false. If yes, it will 533 // leave the shopping list unchanged and return true. 534 func stateHasDownPointers(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (ret bool) { 535 ret = true 536 537 for _, seqno := range arg.downPointersNeeded { 538 if _, ok := state.Chain.DownPointers[seqno]; !ok { 539 m.Debug("Down pointer at seqno=%d wasn't found", seqno) 540 shoppingList.addDownPointer(seqno) 541 ret = false 542 } 543 } 544 return ret 545 } 546 547 // computeSeedLow computes the value for ftl_seed_low that we're going to send up to the server for fetches. 548 func computeSeedLow(state *keybase1.FastTeamData) keybase1.PerTeamKeyGeneration { 549 if state.MaxContinuousPTKGeneration > 0 { 550 return state.MaxContinuousPTKGeneration 551 } 552 var ret keybase1.PerTeamKeyGeneration 553 for i := keybase1.PerTeamKeyGeneration(1); i <= state.LatestKeyGeneration; i++ { 554 _, found := state.PerTeamKeySeedsUnverified[i] 555 if !found { 556 break 557 } 558 ret = i 559 } 560 state.MaxContinuousPTKGeneration = ret 561 return ret 562 } 563 564 // shoppingList is a list of what we need from the server. 565 type shoppingList struct { 566 needMerkleRefresh bool // if we need to refresh the Merkle path for this team 567 needLatestKey bool // true if we never loaded the latest mask, and need to do it 568 569 // links *and* PTKs newer than the given seqno. And RKMs for 570 // the given apps. 571 linksSince keybase1.Seqno 572 downPointers []keybase1.Seqno 573 574 // The applications we care about. 575 applications []keybase1.TeamApplication 576 577 // The generations we care about. We'll always get back the most recent RKMs 578 // if we send a needMerkleRefresh. 579 seedLow keybase1.PerTeamKeyGeneration 580 generations []keybase1.PerTeamKeyGeneration 581 582 // the last hidden link we got, in case we need to download more 583 hiddenLinksSince keybase1.Seqno 584 } 585 586 // groceries are what we get back from the server. 587 type groceries struct { 588 newLinks []*ChainLinkUnpacked 589 rkms []keybase1.ReaderKeyMask 590 latestKeyGen keybase1.PerTeamKeyGeneration 591 seeds []keybase1.PerTeamKeySeed 592 newHiddenLinks []sig3.ExportJSON 593 expMaxHiddenSeqno keybase1.Seqno 594 lastMerkleRoot *libkb.MerkleRoot 595 } 596 597 // isEmpty returns true if our shopping list is empty. In this case, we have no need to go to the 598 // server (store), and can just return with what's in our cache. 599 func (s shoppingList) isEmpty() bool { 600 return !s.needMerkleRefresh && len(s.generations) == 0 && len(s.downPointers) == 0 601 } 602 603 // onlyNeedsRefresh will be true if we only are going to the server for a refresh, 604 // say when encrypting for the latest key version. If the merkle tree says we're up to date, 605 // we can skip the team/get call. 606 func (s shoppingList) onlyNeedsRefresh() bool { 607 return s.needMerkleRefresh && !s.needLatestKey && len(s.generations) == 0 && len(s.downPointers) == 0 608 } 609 610 // addDownPointer adds a down pointer to our shopping list. If we need to read naming information 611 // out of a parent team, we'll add the corresponding sequence number here. The we expect the 612 // payload JSON for the corrsponding seqno -- that we already have the wrapper chainlink v2 613 // that contains the hash of this payload JSON. 614 func (s *shoppingList) addDownPointer(seqno keybase1.Seqno) { 615 s.downPointers = append(s.downPointers, seqno) 616 } 617 618 // computeWithPreviousState looks into the given load arg, and also our current cached state, to figure 619 // what to get from the server. The results are compiled into a "shopping list" that we'll later 620 // use when we concoct our server request. 621 func (f *FastTeamChainLoader) computeWithPreviousState(m libkb.MetaContext, s *shoppingList, arg fastLoadArg, data ftlCombinedData) { 622 state := data.visible 623 cachedAt := state.CachedAt.Time() 624 s.linksSince = state.Chain.Last.Seqno 625 626 if arg.forceReset { 627 s.linksSince = keybase1.Seqno(0) 628 m.Debug("forceReset specified, so reloading from low=0") 629 } 630 631 if arg.needChainTail() && m.G().Clock().Now().Sub(cachedAt) > time.Hour { 632 m.Debug("cached value is more than an hour old (cached at %s)", cachedAt) 633 s.needMerkleRefresh = true 634 } 635 if arg.needChainTail() && state.LatestSeqnoHint > state.Chain.Last.Seqno { 636 m.Debug("cached value is stale: seqno %d > %d", state.LatestSeqnoHint, state.Chain.Last.Seqno) 637 s.needMerkleRefresh = true 638 } 639 if arg.needChainTail() && data.hidden.IsStale() { 640 m.Debug("HiddenTeamChain was stale, forcing refresh") 641 s.needMerkleRefresh = true 642 } 643 if arg.ForceRefresh { 644 m.Debug("refresh forced via flag") 645 s.needMerkleRefresh = true 646 } 647 if !s.needMerkleRefresh && f.InForceRepollMode(m) { 648 m.Debug("must repoll since in force mode") 649 s.needMerkleRefresh = true 650 } 651 if !stateHasKeys(m, s, arg, data) { 652 m.Debug("state was missing needed encryption keys, or we need the freshest") 653 } 654 if !stateHasDownPointers(m, s, arg, state) { 655 m.Debug("state was missing unstubbed links") 656 } 657 } 658 659 // computeFreshLoad computes a shopping list from a fresh load of the state. 660 func (s *shoppingList) computeFreshLoad(m libkb.MetaContext, arg fastLoadArg) { 661 s.needMerkleRefresh = true 662 s.applications = append([]keybase1.TeamApplication{}, arg.Applications...) 663 s.downPointers = append([]keybase1.Seqno{}, arg.downPointersNeeded...) 664 s.generations = append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...) 665 } 666 667 func (s *shoppingList) addHiddenLow(hp *hidden.LoaderPackage) { 668 s.hiddenLinksSince = hp.LastSeqno() 669 } 670 671 // applicationsToString converts the list of applications to a comma-separated string. 672 func applicationsToString(applications []keybase1.TeamApplication) string { 673 var tmp []string 674 for _, k := range applications { 675 tmp = append(tmp, fmt.Sprintf("%d", int(k))) 676 } 677 return strings.Join(tmp, ",") 678 } 679 680 // generationsToString converts the list of generations to a comma-separated string. 681 func generationsToString(generations []keybase1.PerTeamKeyGeneration) string { 682 var tmp []string 683 for _, k := range generations { 684 tmp = append(tmp, fmt.Sprintf("%d", int(k))) 685 } 686 return strings.Join(tmp, ",") 687 } 688 689 // toHTTPArgs turns our shopping list into what we need from the server. Here is what we need: 690 // all stubs since `low`, which might be 0, in which case all `stubs`. The first link we 691 // get back must be unstubbed. The last "up pointer" must be unstubbed. Any link in `seqnos` 692 // must be returned unstubbed, and might be in the sequence *before* `low`. We specify 693 // key generations and applications, and need reader key masks for all applications 694 // in the (apps X gens) cartesian product. 695 func (a fastLoadArg) toHTTPArgs(m libkb.MetaContext, s shoppingList, hp *hidden.LoaderPackage) libkb.HTTPArgs { 696 ret := libkb.HTTPArgs{ 697 "id": libkb.S{Val: a.ID.String()}, 698 "public": libkb.B{Val: a.Public}, 699 "ftl": libkb.B{Val: true}, 700 "ftl_low": libkb.I{Val: int(s.linksSince)}, 701 "ftl_seqnos": libkb.S{Val: seqnosToString(s.downPointers)}, 702 "ftl_key_generations": libkb.S{Val: generationsToString(s.generations)}, 703 "ftl_version": libkb.I{Val: FTLVersion}, 704 "ftl_seed_low": libkb.I{Val: int(s.seedLow)}, 705 } 706 if len(s.applications) > 0 { 707 ret["ftl_include_applications"] = libkb.S{Val: applicationsToString(s.applications)} 708 } 709 if a.NeedLatestKey { 710 ret["ftl_n_newest_key_generations"] = libkb.I{Val: int(3)} 711 } 712 if !a.readSubteamID.IsNil() { 713 ret["read_subteam_id"] = libkb.S{Val: a.readSubteamID.String()} 714 } 715 716 if hp.HiddenChainDataEnabled() { 717 ret["ftl_hidden_low"] = libkb.I{Val: int(s.hiddenLinksSince)} 718 } 719 return ret 720 } 721 722 // loadFromServerWithRetries loads the leaf in the merkle tree and then fetches from team/get.json the links 723 // needed for the team chain. There is a race possible, when a link is added between the two. In that 724 // case, refetch in a loop until we match up. It will retry in the case of GreenLinkErrors. If 725 // the given state was fresh already, then we'll return a nil groceries. 726 func (f *FastTeamChainLoader) loadFromServerWithRetries(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, shoppingList shoppingList, hp *hidden.LoaderPackage) (groceries *groceries, err error) { 727 728 defer m.Trace(fmt.Sprintf("FastTeamChainLoader#loadFromServerWithRetries(%s,%v)", arg.ID, arg.Public), &err)() 729 730 const nRetries = 3 731 for i := 0; i < nRetries; i++ { 732 groceries, err = f.loadFromServerOnce(m, arg, state, shoppingList, hp) 733 switch err.(type) { 734 case nil: 735 return groceries, nil 736 case GreenLinkError: 737 m.Debug("FastTeamChainLoader retrying after green link") 738 continue 739 default: 740 return nil, err 741 } 742 } 743 return nil, err 744 } 745 746 // makeHTTPRequest hits the HTTP GET endpoint for the team data. 747 func (f *FastTeamChainLoader) makeHTTPRequest(m libkb.MetaContext, args libkb.HTTPArgs, isPublic bool) (t rawTeam, err error) { 748 apiArg := libkb.NewAPIArg("team/get") 749 apiArg.Args = args 750 if isPublic { 751 apiArg.SessionType = libkb.APISessionTypeOPTIONAL 752 } else { 753 apiArg.SessionType = libkb.APISessionTypeREQUIRED 754 } 755 err = m.G().API.GetDecode(m, apiArg, &t) 756 if err != nil { 757 return t, err 758 } 759 return t, nil 760 } 761 762 func (f *FastTeamChainLoader) checkHiddenResp(m libkb.MetaContext, arg fastLoadArg, hiddenResp *libkb.MerkleHiddenResponse, hp *hidden.LoaderPackage) (hiddenIsFresh bool, err error) { 763 if !arg.HiddenChainIsOptional && hiddenResp.RespType == libkb.MerkleHiddenResponseTypeNONE { 764 return hiddenIsFresh, libkb.NewHiddenChainDataMissingError("the server did not return the necessary hidden chain data") 765 } 766 767 if hiddenResp.RespType != libkb.MerkleHiddenResponseTypeFLAGOFF && hiddenResp.RespType != libkb.MerkleHiddenResponseTypeNONE { 768 hiddenIsFresh, err = hp.CheckHiddenMerklePathResponseAndAddRatchets(m, hiddenResp) 769 if err != nil { 770 return hiddenIsFresh, err 771 } 772 } else { 773 hiddenIsFresh = true 774 } 775 776 return hiddenIsFresh, nil 777 } 778 779 // loadFromServerOnce turns the giving "shoppingList" into requests for the server, and then makes 780 // an HTTP GET to fetch the corresponding "groceries." Once retrieved, we unpack links, and 781 // check for "green" links --- those that might have been added to the team after the merkle update 782 // we previously read. If we find a green link, we retry in our caller. Otherwise, we also do the 783 // key decryption here, decrypting the most recent generation, and all prevs we haven't previously 784 // decrypted. 785 func (f *FastTeamChainLoader) loadFromServerOnce(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, shoppingList shoppingList, hp *hidden.LoaderPackage) (ret *groceries, err error) { 786 787 defer m.Trace("FastTeamChainLoader#loadFromServerOnce", &err)() 788 789 var teamUpdate rawTeam 790 var links []*ChainLinkUnpacked 791 var lastSecretGen keybase1.PerTeamKeyGeneration 792 var seeds []keybase1.PerTeamKeySeed 793 794 lastSeqno, lastLinkID, hiddenResp, lastMerkleRoot, err := f.world.merkleLookupWithHidden(m.Ctx(), arg.ID, arg.Public) 795 if err != nil { 796 return nil, err 797 } 798 799 hiddenIsFresh, err := f.checkHiddenResp(m, arg, hiddenResp, hp) 800 if err != nil { 801 return nil, err 802 } 803 804 if shoppingList.onlyNeedsRefresh() && state != nil && state.Chain.Last != nil && state.Chain.Last.Seqno == lastSeqno && hiddenIsFresh { 805 if !lastLinkID.Eq(state.Chain.Last.LinkID) { 806 m.Debug("link ID mismatch at tail seqno %d: wanted %s but got %s", state.Chain.Last.LinkID, lastLinkID) 807 return nil, NewFastLoadError("cached last link at seqno=%d did not match current merke tree", lastSeqno) 808 } 809 m.Debug("according to merkle tree, previously loaded chain at %d is current, and shopping list was empty", lastSeqno) 810 return nil, nil 811 } 812 813 teamUpdate, err = f.makeHTTPRequest(m, arg.toHTTPArgs(m, shoppingList, hp), arg.Public) 814 if err != nil { 815 return nil, err 816 } 817 818 if !teamUpdate.ID.Eq(arg.ID) { 819 return nil, NewFastLoadError("server returned wrong id: %v != %v", teamUpdate.ID, arg.ID) 820 } 821 links, err = teamUpdate.unpackLinks(m) 822 if err != nil { 823 return nil, err 824 } 825 826 numStubbed := 0 827 828 for _, link := range links { 829 if link.Seqno() > lastSeqno { 830 m.Debug("TeamLoader found green link seqno:%v", link.Seqno()) 831 return nil, NewGreenLinkError(link.Seqno()) 832 } 833 if link.Seqno() == lastSeqno && !lastLinkID.Eq(link.LinkID().Export()) { 834 m.Debug("Merkle tail mismatch at link %d: %v != %v", lastSeqno, lastLinkID, link.LinkID().Export()) 835 return nil, NewInvalidLink(link, "last link did not match merkle tree") 836 } 837 if link.isStubbed() { 838 numStubbed++ 839 } 840 } 841 842 if teamUpdate.Box != nil { 843 lastSecretGen, seeds, err = unboxPerTeamSecrets(m, f.world, teamUpdate.Box, teamUpdate.Prevs) 844 if err != nil { 845 return nil, err 846 } 847 } 848 849 hp.SetRatchetBlindingKeySet(teamUpdate.RatchetBlindingKeySet) 850 851 m.Debug("loadFromServerOnce: got back %d new links; %d stubbed; %d RKMs; %d prevs; box=%v; lastSecretGen=%d; %d hidden chainlinks", len(links), numStubbed, len(teamUpdate.ReaderKeyMasks), len(teamUpdate.Prevs), teamUpdate.Box != nil, lastSecretGen, len(teamUpdate.HiddenChain)) 852 853 return &groceries{ 854 newLinks: links, 855 latestKeyGen: lastSecretGen, 856 rkms: teamUpdate.ReaderKeyMasks, 857 seeds: seeds, 858 newHiddenLinks: teamUpdate.HiddenChain, 859 expMaxHiddenSeqno: hiddenResp.UncommittedSeqno, 860 lastMerkleRoot: lastMerkleRoot, 861 }, nil 862 } 863 864 // checkStubs makes sure that new links sent down from the server have the right stubbing/unstubbing 865 // pattern. The rules are: the most recent "up pointer" should be unstubbed. The first link should be 866 // unstubbed. The last key rotation should be unstubbed (though we can't really check this now). 867 // And any links we ask for should be unstubbed too. 868 func (f *FastTeamChainLoader) checkStubs(m libkb.MetaContext, shoppingList shoppingList, newLinks []*ChainLinkUnpacked, canReadTeam bool) (err error) { 869 870 if len(newLinks) == 0 { 871 return nil 872 } 873 874 isUpPointer := func(t libkb.SigchainV2Type) bool { 875 return (t == libkb.SigchainV2TypeTeamRenameUpPointer) || (t == libkb.SigchainV2TypeTeamDeleteUpPointer) 876 } 877 878 isKeyRotation := func(link *ChainLinkUnpacked) bool { 879 return (link.LinkType() == libkb.SigchainV2TypeTeamRotateKey) || (!link.isStubbed() && link.inner != nil && link.inner.Body.Key != nil) 880 } 881 882 // these are the links that we explicitly asked for from the server. 883 neededSeqnos := make(map[keybase1.Seqno]bool) 884 for _, s := range shoppingList.downPointers { 885 neededSeqnos[s] = true 886 } 887 888 foundUpPointer := false 889 foundKeyRotation := false 890 for i := len(newLinks) - 1; i >= 0; i-- { 891 link := newLinks[i] 892 893 // Check that the most recent up pointer is unstubbed 894 if !foundUpPointer && isUpPointer(link.LinkType()) { 895 if link.isStubbed() { 896 return NewInvalidLink(link, "expected last 'UP' pointer to be unstubbed") 897 } 898 foundUpPointer = true 899 } 900 901 // This check is approximate, since the server can hide key rotations, since they can be 902 // included in membership changes. 903 if !foundKeyRotation && isKeyRotation(link) { 904 if link.isStubbed() { 905 return NewInvalidLink(link, "we expected the last key rotation to be unstubbed") 906 } 907 foundKeyRotation = true 908 } 909 910 if neededSeqnos[link.Seqno()] && link.isStubbed() { 911 return NewInvalidLink(link, "server sent back stubbed link, but we asked for unstubbed") 912 } 913 } 914 915 if newLinks[0].isStubbed() && newLinks[0].Seqno() == keybase1.Seqno(1) { 916 return NewInvalidLink(newLinks[0], "expected head link to be unstubbed") 917 } 918 919 return nil 920 } 921 922 func checkSeqType(m libkb.MetaContext, arg fastLoadArg, link *ChainLinkUnpacked) error { 923 if link.SeqType() != keybase1.SeqType_NONE && ((arg.Public && link.SeqType() != keybase1.SeqType_PUBLIC) || (!arg.Public && link.SeqType() != keybase1.SeqType_SEMIPRIVATE)) { 924 m.Debug("Bad seqtype at %v/%d: %d", arg.ID, link.Seqno(), link.SeqType()) 925 return NewInvalidLink(link, "bad seqtype") 926 } 927 return nil 928 } 929 930 // checkPrevs checks the previous pointers on the new links that came down from the server. It 931 // only checks prevs for links that are newer than the last link gotten in this chain. 932 // We assume the rest are expanding hashes for links we've previously downloaded. 933 func (f *FastTeamChainLoader) checkPrevs(m libkb.MetaContext, arg fastLoadArg, last *keybase1.LinkTriple, newLinks []*ChainLinkUnpacked) (err error) { 934 if len(newLinks) == 0 { 935 return nil 936 } 937 938 var prev keybase1.LinkTriple 939 if last != nil { 940 prev = *last 941 } 942 943 cmpHash := func(prev keybase1.LinkTriple, link *ChainLinkUnpacked) (err error) { 944 945 // not ideal to have to export here, but it simplifies the code. 946 prevex := link.Prev().Export() 947 948 if prev.LinkID.IsNil() && prevex.IsNil() { 949 return nil 950 } 951 if prev.LinkID.IsNil() || prevex.IsNil() { 952 m.Debug("Bad prev nil/non-nil pointer check at seqno %d: (prev=%v vs curr=%v)", link.Seqno(), prev.LinkID.IsNil(), prevex.IsNil()) 953 return NewInvalidLink(link, "bad nil/non-nil prev pointer comparison") 954 } 955 if !prev.LinkID.Eq(prevex) { 956 m.Debug("Bad prev comparison at seqno %d: %s != %s", prev.LinkID, prevex) 957 return NewInvalidLink(link, "bad prev pointer") 958 } 959 return nil 960 } 961 962 cmpSeqnos := func(prev keybase1.LinkTriple, link *ChainLinkUnpacked) (err error) { 963 if prev.Seqno+1 != link.Seqno() { 964 m.Debug("Bad sequence violation: %d+1 != %d", prev.Seqno, link.Seqno()) 965 return NewInvalidLink(link, "seqno violation") 966 } 967 return checkSeqType(m, arg, link) 968 } 969 970 cmp := func(prev keybase1.LinkTriple, link *ChainLinkUnpacked) (err error) { 971 err = cmpHash(prev, link) 972 if err != nil { 973 return err 974 } 975 return cmpSeqnos(prev, link) 976 } 977 978 for _, link := range newLinks { 979 // We might have gotten some links from the past just for the purposes of expanding 980 // previous links that were stubbed. We don't need to check prevs on them, since 981 // we previously did. 982 if last != nil && last.Seqno >= link.Seqno() { 983 continue 984 } 985 err := cmp(prev, link) 986 if err != nil { 987 return err 988 } 989 prev = link.LinkTriple() 990 } 991 return nil 992 } 993 994 // audit runs probabilistic merkle tree audit on the new links, to make sure that the server isn't 995 // running odd-even-style attacks against members in a group. 996 func (f *FastTeamChainLoader) audit(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, hiddenChain *keybase1.HiddenTeamChain, lastMerkleRoot *libkb.MerkleRoot) (err error) { 997 head, ok := state.Chain.MerkleInfo[1] 998 if !ok { 999 return NewAuditError("cannot run audit without merkle info for head") 1000 } 1001 last := state.Chain.Last 1002 if last == nil { 1003 return NewAuditError("cannot run audit, no last chain data") 1004 } 1005 auditMode := keybase1.AuditMode_STANDARD 1006 if arg.HiddenChainIsOptional { 1007 auditMode = keybase1.AuditMode_STANDARD_NO_HIDDEN 1008 } 1009 return m.G().GetTeamAuditor().AuditTeam(m, arg.ID, arg.Public, head.Seqno, state.Chain.LinkIDs, hiddenChain.GetOuter(), last.Seqno, hiddenChain.GetLastCommittedSeqno(), lastMerkleRoot, auditMode) 1010 } 1011 1012 // readDownPointer reads a down pointer out of a given link, if it's unstubbed. Down pointers 1013 // are (1) new_subteams; (2) subteam rename down pointers; and (3) subteam delete down pointers. 1014 // Will return (nil, non-nil) if there is an error. 1015 func readDownPointer(m libkb.MetaContext, link *ChainLinkUnpacked) (*keybase1.DownPointer, error) { 1016 if link.inner == nil || link.inner.Body.Team == nil || link.inner.Body.Team.Subteam == nil { 1017 return nil, nil 1018 } 1019 subteam := link.inner.Body.Team.Subteam 1020 typ := link.LinkType() 1021 if typ != libkb.SigchainV2TypeTeamNewSubteam && typ != libkb.SigchainV2TypeTeamRenameSubteam && typ != libkb.SigchainV2TypeTeamDeleteSubteam { 1022 return nil, nil 1023 } 1024 del := (typ == libkb.SigchainV2TypeTeamDeleteSubteam) 1025 if len(subteam.Name) == 0 && len(subteam.ID) == 0 { 1026 return nil, nil 1027 } 1028 lastPart, err := subteam.Name.LastPart() 1029 if err != nil { 1030 return nil, err 1031 } 1032 xid, err := subteam.ID.ToTeamID() 1033 if err != nil { 1034 return nil, err 1035 } 1036 return &keybase1.DownPointer{ 1037 Id: xid, 1038 NameComponent: lastPart, 1039 IsDeleted: del, 1040 }, nil 1041 } 1042 1043 // readMerkleRoot reads the merkle root out of the link if this link is unstubbed. 1044 func readMerkleRoot(m libkb.MetaContext, link *ChainLinkUnpacked) (*keybase1.MerkleRootV2, error) { 1045 if link.inner == nil { 1046 return nil, nil 1047 } 1048 ret := link.inner.Body.MerkleRoot.ToMerkleRootV2() 1049 return &ret, nil 1050 } 1051 1052 // readUpPointer reads an up pointer out the given link, if it's unstubbed. Up pointers are 1053 // (1) subteam heads; (2) subteam rename up pointers; and (3) subteam delete up pointers. 1054 // Will return (nil, non-nil) if we hit any error condition. 1055 func readUpPointer(m libkb.MetaContext, arg fastLoadArg, link *ChainLinkUnpacked) (*keybase1.UpPointer, error) { 1056 if link.inner == nil || link.inner.Body.Team == nil || link.inner.Body.Team.Parent == nil { 1057 return nil, nil 1058 } 1059 parent := link.inner.Body.Team.Parent 1060 typ := link.LinkType() 1061 if typ != libkb.SigchainV2TypeTeamSubteamHead && typ != libkb.SigchainV2TypeTeamRenameUpPointer && typ != libkb.SigchainV2TypeTeamDeleteUpPointer { 1062 return nil, nil 1063 } 1064 xid, err := parent.ID.ToTeamID() 1065 if err != nil { 1066 return nil, err 1067 } 1068 1069 err = checkSeqType(m, arg, link) 1070 if err != nil { 1071 return nil, err 1072 } 1073 return &keybase1.UpPointer{ 1074 OurSeqno: link.Seqno(), 1075 ParentID: xid, 1076 ParentSeqno: parent.Seqno, 1077 Deletion: (typ == libkb.SigchainV2TypeTeamDeleteUpPointer), 1078 }, nil 1079 } 1080 1081 // putName takes the name out of the team (or subteam) head and stores it to state. 1082 // In the case of a subteam, this name has not been verified, and we should 1083 // verify it ourselves against the merkle tree. 1084 func (f *FastTeamChainLoader) putName(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, newLinks []*ChainLinkUnpacked) (err error) { 1085 if len(newLinks) == 0 || newLinks[0].Seqno() != keybase1.Seqno(1) { 1086 return nil 1087 } 1088 head := newLinks[0] 1089 if head.isStubbed() { 1090 return NewInvalidLink(head, "head should never be stubbed") 1091 } 1092 if head.inner.Body.Team == nil || head.inner.Body.Team.Name == nil { 1093 return NewInvalidLink(head, "head name should never be nil") 1094 } 1095 nm := *head.inner.Body.Team.Name 1096 xname, err := keybase1.TeamNameFromString(string(nm)) 1097 if err != nil { 1098 return err 1099 } 1100 if !state.Name.IsNil() && !state.Name.Eq(xname) { 1101 return NewInvalidLink(head, "wrong name for team") 1102 } 1103 state.Name = xname 1104 return nil 1105 } 1106 1107 // readPerTeamKey reads a PerTeamKey section, if it exists, out of the given unpacked chainlink. 1108 func readPerTeamKey(m libkb.MetaContext, link *ChainLinkUnpacked) (ret *keybase1.PerTeamKey, err error) { 1109 1110 if link.inner == nil || link.inner.Body.Team == nil || link.inner.Body.Team.PerTeamKey == nil { 1111 return nil, nil 1112 } 1113 ptk := link.inner.Body.Team.PerTeamKey 1114 return &keybase1.PerTeamKey{ 1115 Gen: ptk.Generation, 1116 Seqno: link.Seqno(), 1117 SigKID: ptk.SigKID, 1118 EncKID: ptk.EncKID, 1119 }, nil 1120 } 1121 1122 // putLinks takes the links we just downloaded from the server, and stores them to the state. 1123 // It also fills in unstubbed fields for those links that have come back with payloads that 1124 // were previously stubbed. There are several error cases that can come up, when reading down 1125 // or up pointers from the reply. 1126 func (f *FastTeamChainLoader) putLinks(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, newLinks []*ChainLinkUnpacked) (err error) { 1127 if len(newLinks) == 0 { 1128 return nil 1129 } 1130 1131 for _, link := range newLinks { 1132 existing, ok := state.Chain.LinkIDs[link.Seqno()] 1133 linkID := link.LinkID().Export() 1134 if ok { 1135 // NOTE! This is a crucial check, since we might have checked prev's on this link 1136 // in a previous run on the chain. We have to make sure an unstubbed link is 1137 // consistent with that previous check. See checkPrevs for when we skip 1138 // checking prevs in such a case, and need to check here for linkID equality. 1139 if !linkID.Eq(existing) { 1140 return NewInvalidLink(link, "list doesn't match previously cached link") 1141 } 1142 } else { 1143 state.Chain.LinkIDs[link.Seqno()] = linkID 1144 } 1145 dp, err := readDownPointer(m, link) 1146 if err != nil { 1147 return err 1148 } 1149 if dp != nil { 1150 state.Chain.DownPointers[link.Seqno()] = *dp 1151 } 1152 up, err := readUpPointer(m, arg, link) 1153 if err != nil { 1154 return err 1155 } 1156 if up != nil && (state.Chain.LastUpPointer == nil || state.Chain.LastUpPointer.OurSeqno < up.OurSeqno) { 1157 state.Chain.LastUpPointer = up 1158 } 1159 ptk, err := readPerTeamKey(m, link) 1160 if err != nil { 1161 return err 1162 } 1163 if ptk != nil { 1164 state.Chain.PerTeamKeys[ptk.Gen] = *ptk 1165 } 1166 merkleRoot, err := readMerkleRoot(m, link) 1167 if err != nil { 1168 return err 1169 } 1170 if merkleRoot != nil { 1171 state.Chain.MerkleInfo[link.Seqno()] = *merkleRoot 1172 } 1173 } 1174 newLast := newLinks[len(newLinks)-1] 1175 if state.Chain.Last == nil || state.Chain.Last.Seqno < newLast.Seqno() { 1176 tmp := newLast.LinkTriple() 1177 state.Chain.Last = &tmp 1178 } 1179 return nil 1180 } 1181 1182 // putRKMs stores the new reader key masks loaded from the server to the state structure. 1183 func (f *FastTeamChainLoader) putRKMs(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, rkms []keybase1.ReaderKeyMask) (err error) { 1184 for _, rkm := range rkms { 1185 if _, ok := state.ReaderKeyMasks[rkm.Application]; !ok { 1186 state.ReaderKeyMasks[rkm.Application] = make(map[keybase1.PerTeamKeyGeneration]keybase1.MaskB64) 1187 } 1188 state.ReaderKeyMasks[rkm.Application][rkm.Generation] = rkm.Mask 1189 } 1190 return nil 1191 } 1192 1193 // putSeeds stores the crypto seeds to the PeterTeamKeySeedsUnverified slot of the state. It returns 1194 // the last n seeds, counting backwards. We exploit this fact to infer the seed generations from their 1195 // order. 1196 func (f *FastTeamChainLoader) putSeeds(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, latestKeyGen keybase1.PerTeamKeyGeneration, seeds []keybase1.PerTeamKeySeed) (err error) { 1197 for i, seed := range seeds { 1198 state.PerTeamKeySeedsUnverified[latestKeyGen-keybase1.PerTeamKeyGeneration(len(seeds)-i-1)] = seed 1199 } 1200 1201 // We might have gotten back 0 seeds from the server, so don't overwrite a valid LatestKeyGeneration 1202 // with 0 in that case. 1203 if latestKeyGen > state.LatestKeyGeneration { 1204 state.LatestKeyGeneration = latestKeyGen 1205 } 1206 return nil 1207 } 1208 1209 func (f *FastTeamChainLoader) putSeedChecks(m libkb.MetaContext, state *keybase1.FastTeamData) (err error) { 1210 latestChainGen := keybase1.PerTeamKeyGeneration(len(state.PerTeamKeySeedsUnverified)) 1211 if state.SeedChecks == nil { 1212 state.SeedChecks = make(map[keybase1.PerTeamKeyGeneration]keybase1.PerTeamSeedCheck) 1213 } 1214 return computeSeedChecks( 1215 m.Ctx(), 1216 state.ID(), 1217 latestChainGen, 1218 func(g keybase1.PerTeamKeyGeneration) (check *keybase1.PerTeamSeedCheck, seed keybase1.PerTeamKeySeed, err error) { 1219 seed, ok := state.PerTeamKeySeedsUnverified[g] 1220 if !ok { 1221 return nil, keybase1.PerTeamKeySeed{}, fmt.Errorf("unexpected nil PerTeamKeySeedsUnverified at %d", g) 1222 } 1223 tmp, ok := state.SeedChecks[g] 1224 if ok { 1225 check = &tmp 1226 } 1227 return check, seed, nil 1228 }, 1229 func(g keybase1.PerTeamKeyGeneration, check keybase1.PerTeamSeedCheck) { 1230 state.SeedChecks[g] = check 1231 }, 1232 ) 1233 } 1234 1235 func setCachedAtToNow(m libkb.MetaContext, state *keybase1.FastTeamData) { 1236 state.CachedAt = keybase1.ToTime(m.G().Clock().Now()) 1237 } 1238 1239 func (f *FastTeamChainLoader) putMetadata(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) error { 1240 setCachedAtToNow(m, state) 1241 if arg.NeedLatestKey { 1242 state.LoadedLatest = true 1243 } 1244 return nil 1245 } 1246 1247 // mutateState takes the groceries fetched from the server and applies them to our current state. 1248 func (f *FastTeamChainLoader) mutateState(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, groceries *groceries) (err error) { 1249 1250 err = f.putName(m, arg, state, groceries.newLinks) 1251 if err != nil { 1252 return err 1253 } 1254 err = f.putLinks(m, arg, state, groceries.newLinks) 1255 if err != nil { 1256 return err 1257 } 1258 err = f.putRKMs(m, arg, state, groceries.rkms) 1259 if err != nil { 1260 return err 1261 } 1262 err = f.putSeeds(m, arg, state, groceries.latestKeyGen, groceries.seeds) 1263 if err != nil { 1264 return err 1265 } 1266 err = f.putSeedChecks(m, state) 1267 if err != nil { 1268 return err 1269 } 1270 err = f.putMetadata(m, arg, state) 1271 if err != nil { 1272 return err 1273 } 1274 return nil 1275 } 1276 1277 // makeState does a clone on a non-nil state, or makes a new state if nil. 1278 func makeState(arg fastLoadArg, s *keybase1.FastTeamData) *keybase1.FastTeamData { 1279 if s != nil { 1280 tmp := s.DeepCopy() 1281 return &tmp 1282 } 1283 return &keybase1.FastTeamData{ 1284 Subversion: 1, 1285 PerTeamKeySeedsUnverified: make(map[keybase1.PerTeamKeyGeneration]keybase1.PerTeamKeySeed), 1286 SeedChecks: make(map[keybase1.PerTeamKeyGeneration]keybase1.PerTeamSeedCheck), 1287 ReaderKeyMasks: make(map[keybase1.TeamApplication](map[keybase1.PerTeamKeyGeneration]keybase1.MaskB64)), 1288 Chain: keybase1.FastTeamSigChainState{ 1289 ID: arg.ID, 1290 Public: arg.Public, 1291 PerTeamKeys: make(map[keybase1.PerTeamKeyGeneration]keybase1.PerTeamKey), 1292 PerTeamKeySeedsVerified: make(map[keybase1.PerTeamKeyGeneration]keybase1.PerTeamKeySeed), 1293 DownPointers: make(map[keybase1.Seqno]keybase1.DownPointer), 1294 LinkIDs: make(map[keybase1.Seqno]keybase1.LinkID), 1295 MerkleInfo: make(map[keybase1.Seqno]keybase1.MerkleRootV2), 1296 }, 1297 } 1298 } 1299 1300 func (f *FastTeamChainLoader) hiddenPackage(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) (hp *hidden.LoaderPackage, err error) { 1301 hp, err = hidden.NewLoaderPackage(m, arg.ID, 1302 func() (encKID keybase1.KID, gen keybase1.PerTeamKeyGeneration, role keybase1.TeamRole, err error) { 1303 // Always return TeamRole_NONE since ftl does not have access to 1304 // member roles. The hidden chain uses the role to skip checks bot 1305 // members are not able to perform. Bot members should never FTL, 1306 // however since they don't have key access. 1307 if state == nil || len(state.Chain.PerTeamKeys) == 0 { 1308 return encKID, gen, keybase1.TeamRole_NONE, nil 1309 } 1310 var ptk keybase1.PerTeamKey 1311 for _, tmp := range state.Chain.PerTeamKeys { 1312 ptk = tmp 1313 break 1314 } 1315 return ptk.EncKID, ptk.Gen, keybase1.TeamRole_NONE, nil 1316 }) 1317 if err != nil { 1318 return nil, err 1319 } 1320 if !arg.readSubteamID.IsNil() { 1321 m.Debug("hiddenPackage: disabling checks since we a subteam reader looking for parent chain") 1322 hp.DisableHiddenChainData() 1323 } 1324 if tmp := hidden.CheckFeatureGateForSupport(m, arg.ID); tmp != nil { 1325 m.Debug("hiddenPackage: disabling checks since we are feature-flagged off") 1326 hp.DisableHiddenChainData() 1327 } 1328 return hp, nil 1329 } 1330 1331 func (f *FastTeamChainLoader) consumeRatchets(m libkb.MetaContext, newLinks []*ChainLinkUnpacked, hp *hidden.LoaderPackage) (err error) { 1332 for _, link := range newLinks { 1333 if err := consumeRatchets(m, hp, link); err != nil { 1334 return err 1335 } 1336 } 1337 return nil 1338 } 1339 1340 func (f *FastTeamChainLoader) processHidden(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, groceries *groceries, hp *hidden.LoaderPackage) (err error) { 1341 1342 err = f.consumeRatchets(m, groceries.newLinks, hp) 1343 if err != nil { 1344 return err 1345 } 1346 1347 err = hp.Update(m, groceries.newHiddenLinks, groceries.expMaxHiddenSeqno) 1348 if err != nil { 1349 return err 1350 } 1351 err = hp.CheckUpdatesAgainstSeeds(m, func(g keybase1.PerTeamKeyGeneration) *keybase1.PerTeamSeedCheck { 1352 chk, ok := state.SeedChecks[g] 1353 if !ok { 1354 return nil 1355 } 1356 return &chk 1357 }) 1358 if err != nil { 1359 return err 1360 } 1361 err = hp.CheckParentPointersOnFastLoad(m, state) 1362 if err != nil { 1363 return err 1364 } 1365 1366 err = hp.Commit(m) 1367 if err != nil { 1368 return err 1369 } 1370 return nil 1371 } 1372 1373 // refresh the team's state, but loading with the server. It will download new stubbed chainlinks, 1374 // fill in unstubbed chainlinks, make sure that prev pointers match, make sure that the merkle 1375 // tree agrees with the chain tail, and then run the audit mechanism. If the state is already 1376 // fresh, we will return (nil, nil) and short-circuit. 1377 func (f *FastTeamChainLoader) refresh(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData, shoppingList shoppingList, hp *hidden.LoaderPackage) (res *keybase1.FastTeamData, err error) { 1378 1379 defer m.Trace(fmt.Sprintf("FastTeamChainLoader#refresh(%+v)", arg), &err)() 1380 1381 groceries, err := f.loadFromServerWithRetries(m, arg, state, shoppingList, hp) 1382 if err != nil { 1383 return nil, err 1384 } 1385 1386 if groceries == nil { 1387 m.Debug("FastTeamChainLoader#refresh: our state was fresh according to the Merkle tree") 1388 1389 // Even if the state is fresh (no new chain links are necessary), we 1390 // might still have learned about old hidden links being committed to 1391 // the blind tree. This information needs to be persisted. 1392 err = hp.Update(m, []sig3.ExportJSON{}, 0) 1393 if err != nil { 1394 return nil, err 1395 } 1396 err = hp.Commit(m) 1397 if err != nil { 1398 return nil, err 1399 } 1400 1401 return nil, nil 1402 } 1403 1404 // Either makes a new state, or deepcopies the existing state, so that in the case 1405 // of an error, we haven't corrupted what's in cache. Thus, from here on out, 1406 // we are playing with our own (unshared) copy of the state. 1407 state = makeState(arg, state) 1408 1409 // check that all chain links sent down form a valid hash chain, and point 1410 // to what we already in had in cache. 1411 err = f.checkPrevs(m, arg, state.Chain.Last, groceries.newLinks) 1412 if err != nil { 1413 return nil, err 1414 } 1415 1416 // check that the server stubbed properly. 1417 err = f.checkStubs(m, shoppingList, groceries.newLinks, arg.readSubteamID.IsNil() /* canReadTeam */) 1418 if err != nil { 1419 return nil, err 1420 } 1421 1422 err = f.mutateState(m, arg, state, groceries) 1423 if err != nil { 1424 return nil, err 1425 } 1426 1427 err = f.processHidden(m, arg, state, groceries, hp) 1428 if err != nil { 1429 return nil, err 1430 } 1431 1432 // peform a probabilistic audit on the new links 1433 err = f.audit(m, arg, state, hp.ChainData(), groceries.lastMerkleRoot) 1434 if err != nil { 1435 return nil, err 1436 } 1437 1438 return state, nil 1439 } 1440 1441 // updateCache puts the new version of the state into the cache on the team's ID. 1442 func (f *FastTeamChainLoader) updateCache(m libkb.MetaContext, state *keybase1.FastTeamData) { 1443 f.storage.Put(m, state) 1444 } 1445 1446 func (f *FastTeamChainLoader) upgradeStoredState(mctx libkb.MetaContext, state *keybase1.FastTeamData) (changed bool, err error) { 1447 if state == nil { 1448 return false, nil 1449 } 1450 1451 changed = false 1452 if state.Subversion == 0 { 1453 err = f.putSeedChecks(mctx, state) 1454 if err != nil { 1455 mctx.Debug("failed in upgrade of subversion 0->1: %s", err) 1456 return false, err 1457 } 1458 mctx.Debug("Upgrade to subversion 1") 1459 state.Subversion = 1 1460 changed = true 1461 } 1462 1463 return changed, nil 1464 } 1465 1466 // loadLocked is the inner loop for loading team. Should be called when holding the lock 1467 // this teamID. 1468 func (f *FastTeamChainLoader) loadLocked(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) { 1469 1470 frozenState, frozen, tombstoned := f.findStateInCache(m, arg.ID) 1471 var state *keybase1.FastTeamData 1472 var hp *hidden.LoaderPackage 1473 if tombstoned { 1474 return nil, NewTeamTombstonedError() 1475 } 1476 if !frozen { 1477 state = frozenState 1478 } 1479 1480 hp, err = f.hiddenPackage(m, arg, state) 1481 if err != nil { 1482 return nil, err 1483 } 1484 1485 var shoppingList shoppingList 1486 if state != nil { 1487 combinedData := newFTLCombinedData(state, hp.ChainData()) 1488 f.computeWithPreviousState(m, &shoppingList, arg, combinedData) 1489 if shoppingList.isEmpty() { 1490 return f.toResult(m, arg, combinedData) 1491 } 1492 } else { 1493 shoppingList.computeFreshLoad(m, arg) 1494 } 1495 shoppingList.addHiddenLow(hp) 1496 1497 m.Debug("FastTeamChainLoader#loadLocked: computed shopping list: %+v", shoppingList) 1498 1499 var newState *keybase1.FastTeamData 1500 newState, err = f.refresh(m, arg, state, shoppingList, hp) 1501 if err != nil { 1502 return nil, err 1503 } 1504 1505 // If newState == nil, that means that no updates were required, and the old state 1506 // is fine, we just need to update the cachedAt time. If newState is non-nil, 1507 // then we use if for our state going forward. 1508 if newState == nil { 1509 setCachedAtToNow(m, state) 1510 } else { 1511 state = newState 1512 } 1513 // Always update the cache, even if we're just bumping the cachedAt time. 1514 f.updateCache(m, state) 1515 1516 if frozen && frozenState != nil { 1517 frozenLast := frozenState.Chain.Last 1518 linkID := state.Chain.LinkIDs[frozenLast.Seqno] 1519 if !linkID.Eq(frozenLast.LinkID) { 1520 return nil, fmt.Errorf("FastTeamChainLoader#loadLocked: got wrong sigchain link ID for seqno %d: expected %v from previous cache entry (frozen=%t); got %v in new chain", frozenLast.Seqno, frozenLast.LinkID, frozen, linkID) 1521 } 1522 } 1523 1524 return f.toResult(m, arg, newFTLCombinedData(state, hp.ChainData())) 1525 } 1526 1527 // OnLogout is called when the user logs out, which purges the LRU. 1528 func (f *FastTeamChainLoader) OnLogout(mctx libkb.MetaContext) error { 1529 f.storage.ClearMem() 1530 return nil 1531 } 1532 1533 // OnDbNuke is called when the disk cache is cleared, which purges the LRU. 1534 func (f *FastTeamChainLoader) OnDbNuke(mctx libkb.MetaContext) error { 1535 f.storage.ClearMem() 1536 return nil 1537 } 1538 1539 func (f *FastTeamChainLoader) HintLatestSeqno(m libkb.MetaContext, id keybase1.TeamID, seqno keybase1.Seqno) (err error) { 1540 m = ftlLogTag(m) 1541 1542 defer m.Trace(fmt.Sprintf("FastTeamChainLoader#HintLatestSeqno(%v->%d)", id, seqno), &err)() 1543 1544 // Single-flight lock by team ID. 1545 lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), id.String()) 1546 defer lock.Release(m.Ctx()) 1547 1548 if state, frozen, tombstoned := f.findStateInCache(m, id); state != nil && !frozen && !tombstoned { 1549 m.Debug("Found state in cache; updating") 1550 state.LatestSeqnoHint = seqno 1551 f.updateCache(m, state) 1552 } 1553 1554 return nil 1555 } 1556 1557 func (f *FastTeamChainLoader) ForceRepollUntil(m libkb.MetaContext, dtime gregor.TimeOrOffset) error { 1558 m.Debug("FastTeamChainLoader#ForceRepollUntil(%+v)", dtime) 1559 f.forceRepollMutex.Lock() 1560 defer f.forceRepollMutex.Unlock() 1561 f.forceRepollUntil = dtime 1562 return nil 1563 } 1564 1565 func (f *FastTeamChainLoader) InForceRepollMode(m libkb.MetaContext) bool { 1566 f.forceRepollMutex.Lock() 1567 defer f.forceRepollMutex.Unlock() 1568 if f.forceRepollUntil == nil { 1569 return false 1570 } 1571 if !f.forceRepollUntil.Before(m.G().Clock().Now()) { 1572 m.Debug("FastTeamChainLoader#InForceRepollMode: returning true") 1573 return true 1574 } 1575 f.forceRepollUntil = nil 1576 return false 1577 } 1578 1579 func newFrozenFastChain(chain *keybase1.FastTeamSigChainState) keybase1.FastTeamSigChainState { 1580 return keybase1.FastTeamSigChainState{ 1581 ID: chain.ID, 1582 Public: chain.Public, 1583 Last: chain.Last, 1584 } 1585 } 1586 1587 func (f *FastTeamChainLoader) Freeze(mctx libkb.MetaContext, teamID keybase1.TeamID) (err error) { 1588 defer mctx.Trace(fmt.Sprintf("FastTeamChainLoader#Freeze(%s)", teamID), &err)() 1589 1590 // Single-flight lock by team ID. 1591 lock := f.locktab.AcquireOnName(mctx.Ctx(), mctx.G(), teamID.String()) 1592 defer lock.Release(mctx.Ctx()) 1593 1594 td, frozen, tombstoned := f.storage.Get(mctx, teamID, teamID.IsPublic()) 1595 if frozen || td == nil { 1596 return nil 1597 } 1598 newTD := &keybase1.FastTeamData{ 1599 Frozen: true, 1600 Tombstoned: tombstoned, 1601 Chain: newFrozenFastChain(&td.Chain), 1602 } 1603 f.storage.Put(mctx, newTD) 1604 return nil 1605 } 1606 1607 func (f *FastTeamChainLoader) Tombstone(mctx libkb.MetaContext, teamID keybase1.TeamID) (err error) { 1608 defer mctx.Trace(fmt.Sprintf("FastTeamChainLoader#Tombstone(%s)", teamID), &err)() 1609 1610 // Single-flight lock by team ID. 1611 lock := f.locktab.AcquireOnName(mctx.Ctx(), mctx.G(), teamID.String()) 1612 defer lock.Release(mctx.Ctx()) 1613 1614 td, frozen, tombstoned := f.storage.Get(mctx, teamID, teamID.IsPublic()) 1615 if tombstoned || td == nil { 1616 return nil 1617 } 1618 newTD := &keybase1.FastTeamData{ 1619 Frozen: frozen, 1620 Tombstoned: true, 1621 Chain: newFrozenFastChain(&td.Chain), 1622 } 1623 f.storage.Put(mctx, newTD) 1624 return nil 1625 }