github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/engine/saltpack_sender_identify.go (about)

     1  // Copyright 2015 Keybase, Inc. All rights reserved. Use of
     2  // this source code is governed by the included BSD license.
     3  
     4  package engine
     5  
     6  import (
     7  	"github.com/keybase/client/go/libkb"
     8  	keybase1 "github.com/keybase/client/go/protocol/keybase1"
     9  )
    10  
    11  type SaltpackSenderIdentifyArg struct {
    12  	publicKey        keybase1.KID
    13  	isAnon           bool
    14  	interactive      bool
    15  	forceRemoteCheck bool
    16  	reason           keybase1.IdentifyReason
    17  	userAssertion    string // optional
    18  }
    19  
    20  type SaltpackSenderIdentify struct {
    21  	libkb.Contextified
    22  	arg *SaltpackSenderIdentifyArg
    23  	res keybase1.SaltpackSender
    24  }
    25  
    26  func (e *SaltpackSenderIdentify) Name() string {
    27  	return "SaltpackSenderIdentify"
    28  }
    29  
    30  func NewSaltpackSenderIdentify(g *libkb.GlobalContext, arg *SaltpackSenderIdentifyArg) *SaltpackSenderIdentify {
    31  	return &SaltpackSenderIdentify{
    32  		Contextified: libkb.NewContextified(g),
    33  		arg:          arg,
    34  	}
    35  }
    36  
    37  // GetPrereqs returns the engine prereqs.
    38  func (e *SaltpackSenderIdentify) Prereqs() Prereqs {
    39  	return Prereqs{}
    40  }
    41  
    42  // RequiredUIs returns the required UIs.
    43  func (e *SaltpackSenderIdentify) RequiredUIs() []libkb.UIKind {
    44  	return []libkb.UIKind{}
    45  }
    46  
    47  // SubConsumers returns the other UI consumers for this engine.
    48  func (e *SaltpackSenderIdentify) SubConsumers() []libkb.UIConsumer {
    49  	return []libkb.UIConsumer{
    50  		&Identify2WithUID{},
    51  	}
    52  }
    53  
    54  func (e *SaltpackSenderIdentify) Run(m libkb.MetaContext) (err error) {
    55  	defer m.Trace("SaltpackSenderIdentify::Run", &err)()
    56  
    57  	if e.arg.isAnon {
    58  		e.res.SenderType = keybase1.SaltpackSenderType_ANONYMOUS
    59  		return
    60  	}
    61  
    62  	// Essentially nothing that this key/basics.json endpoint tells us is
    63  	// verifiable. Don't even retain the username it gives us here; we'll get
    64  	// it from LoadUser instead, where we check some of the server's work.
    65  	//
    66  	// Security note: This is an opportunity for the server to maliciously DOS
    67  	// us, by lying and saying a key doesn't exist. If we wanted to really
    68  	// prevent this, we could include a KID->UID index in the Merkle tree that
    69  	// we pin against the bitcoin blockchain, and trust that Someone Out There
    70  	// would audit it for consistency with the main body of the tree. File this
    71  	// one away in the Book of Things We Would Do With Infinite Time and Money.
    72  	var maybeUID keybase1.UID
    73  	_, maybeUID, err = libkb.KeyLookupKIDIncludingRevoked(m, e.arg.publicKey)
    74  	if _, ok := err.(libkb.NotFoundError); ok {
    75  		// The key in question might not be a Keybase key at all (for example,
    76  		// anything generated with the Python saltpack implementation, which
    77  		// isn't Keybase-aware). In that case we'll get this NotFoundError, and
    78  		// we can just report it as an unknown sender.
    79  		e.res.SenderType = keybase1.SaltpackSenderType_UNKNOWN
    80  		err = nil
    81  		return
    82  	} else if err != nil {
    83  		return
    84  	}
    85  
    86  	loadUserArg := libkb.NewLoadUserArgWithMetaContext(m).WithUID(maybeUID)
    87  	var user *libkb.User
    88  	user, err = libkb.LoadUser(loadUserArg)
    89  	if err != nil {
    90  		return
    91  	}
    92  
    93  	// Use the ComputedKeyFamily assembled by LoadUser to get the status of the
    94  	// key we started with. (This is where we'll detect corner cases like the
    95  	// server straight up lying about who owns a given key. An inconsistency
    96  	// like that will be an error here.)
    97  	var maybeSenderType *keybase1.SaltpackSenderType
    98  	maybeSenderType, err = user.GetComputedKeyFamily().GetSaltpackSenderTypeIfInactive(e.arg.publicKey)
    99  	if err != nil {
   100  		return
   101  	}
   102  
   103  	// At this point, since GetSaltpackSenderTypeOrActive has not returned an
   104  	// error, we can consider the UID/username returned by the server to be
   105  	// "mostly legit". It's still possible that the signing key might be
   106  	// revoked (this sort of thing is indicated by a non-nil sender type, which
   107  	// we check for now) or the identify that comes next could report a broken
   108  	// tracking statement, but those are states that we'll report to the user,
   109  	// as opposed to unexpected failures or corner case server lies.
   110  	e.res.Uid = user.GetUID()
   111  	e.res.Username = user.GetName()
   112  	e.res.Fullname, err = libkb.GetFullName(m, user.GetUID())
   113  	if err != nil {
   114  		return err
   115  	}
   116  	if maybeSenderType != nil {
   117  		e.res.SenderType = *maybeSenderType
   118  		return
   119  	}
   120  
   121  	// The key is active! This is the happy path. We'll do an identify and show
   122  	// it to the user, and the SenderType will follow from that.
   123  	err = e.identifySender(m)
   124  
   125  	return
   126  }
   127  
   128  func (e *SaltpackSenderIdentify) identifySender(m libkb.MetaContext) (err error) {
   129  	defer m.Trace("SaltpackDecrypt::identifySender", &err)()
   130  
   131  	var lin bool
   132  	var uid keybase1.UID
   133  	if lin, uid = isLoggedIn(m); lin && uid.Equal(e.res.Uid) {
   134  		e.res.SenderType = keybase1.SaltpackSenderType_SELF
   135  		if len(e.arg.userAssertion) == 0 {
   136  			m.Debug("| Sender is self")
   137  			return nil
   138  		}
   139  	}
   140  
   141  	iarg := keybase1.Identify2Arg{
   142  		Uid:                   e.res.Uid,
   143  		UseDelegateUI:         !e.arg.interactive,
   144  		AlwaysBlock:           e.arg.interactive,
   145  		ForceRemoteCheck:      e.arg.forceRemoteCheck,
   146  		NeedProofSet:          true,
   147  		NoErrorOnTrackFailure: true,
   148  		Reason:                e.arg.reason,
   149  		UserAssertion:         e.arg.userAssertion,
   150  		IdentifyBehavior:      keybase1.TLFIdentifyBehavior_SALTPACK,
   151  	}
   152  	eng := NewIdentify2WithUID(e.G(), &iarg)
   153  	if err = RunEngine2(m, eng); err != nil {
   154  		return err
   155  	}
   156  
   157  	if e.res.SenderType == keybase1.SaltpackSenderType_SELF {
   158  		// if we already know the sender type, then return now
   159  		return nil
   160  	}
   161  
   162  	switch eng.getTrackType() {
   163  	case identify2NoTrack:
   164  		e.res.SenderType = keybase1.SaltpackSenderType_NOT_TRACKED
   165  	case identify2TrackOK:
   166  		e.res.SenderType = keybase1.SaltpackSenderType_TRACKING_OK
   167  	case identify2TrackBroke:
   168  		e.res.SenderType = keybase1.SaltpackSenderType_TRACKING_BROKE
   169  	default:
   170  		panic("unexpected track type")
   171  	}
   172  	return nil
   173  }
   174  
   175  func (e *SaltpackSenderIdentify) Result() keybase1.SaltpackSender {
   176  	return e.res
   177  }