github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/engine/saltpack_sign_test.go (about)

     1  // Copyright 2015 Keybase, Inc. All rights reserved. Use of
     2  // this source code is governed by the included BSD license.
     3  
     4  package engine
     5  
     6  import (
     7  	"bytes"
     8  	"io"
     9  	"strings"
    10  	"testing"
    11  
    12  	"github.com/keybase/client/go/libkb"
    13  	keybase1 "github.com/keybase/client/go/protocol/keybase1"
    14  	"github.com/keybase/go-codec/codec"
    15  	"github.com/keybase/saltpack"
    16  )
    17  
    18  func TestSaltpackSignDeviceRequired(t *testing.T) {
    19  	tc := SetupEngineTest(t, "sign")
    20  	defer tc.Cleanup()
    21  
    22  	uis := libkb.UIs{
    23  		SecretUI: &libkb.TestSecretUI{},
    24  	}
    25  	eng := NewSaltpackSign(tc.G, nil)
    26  	m := NewMetaContextForTest(tc).WithUIs(uis)
    27  	err := RunEngine2(m, eng)
    28  	if err == nil {
    29  		t.Fatal("sign not logged in returned no error")
    30  	}
    31  	if _, ok := err.(libkb.DeviceRequiredError); !ok {
    32  		t.Errorf("error type: %T, expected DeviceRequiredError", err)
    33  	}
    34  }
    35  
    36  func TestSaltpackSignVerify(t *testing.T) {
    37  	tc := SetupEngineTest(t, "sign")
    38  	defer tc.Cleanup()
    39  
    40  	fu := CreateAndSignupFakeUser(tc, "sign")
    41  
    42  	// signTests are defined in pgp_sign_test.  Make sure that saltpack sign can
    43  	// sign/verify the same messages as pgp.
    44  	for _, test := range signTests {
    45  		var sink bytes.Buffer
    46  
    47  		sarg := &SaltpackSignArg{
    48  			Sink:   libkb.NopWriteCloser{W: &sink},
    49  			Source: io.NopCloser(bytes.NewBufferString(test.input)),
    50  		}
    51  
    52  		eng := NewSaltpackSign(tc.G, sarg)
    53  		uis := libkb.UIs{
    54  			IdentifyUI: &FakeIdentifyUI{},
    55  			SecretUI:   fu.NewSecretUI(),
    56  		}
    57  
    58  		m := NewMetaContextForTest(tc).WithUIs(uis)
    59  		if err := RunEngine2(m, eng); err != nil {
    60  			t.Errorf("%s: run error: %s", test.name, err)
    61  			continue
    62  		}
    63  
    64  		sig := sink.String()
    65  
    66  		if len(sig) == 0 {
    67  			t.Errorf("%s: empty sig", test.name)
    68  		}
    69  
    70  		varg := &SaltpackVerifyArg{
    71  			Sink:   libkb.NopWriteCloser{W: &sink},
    72  			Source: strings.NewReader(sig),
    73  		}
    74  		veng := NewSaltpackVerify(tc.G, varg)
    75  
    76  		m = m.WithSaltpackUI(fakeSaltpackUI{})
    77  
    78  		if err := RunEngine2(m, veng); err != nil {
    79  			t.Errorf("%s: verify error: %s", test.name, err)
    80  			continue
    81  		}
    82  
    83  		// test SignedBy option:
    84  		varg = &SaltpackVerifyArg{
    85  			Sink:   libkb.NopWriteCloser{W: &sink},
    86  			Source: strings.NewReader(sig),
    87  			Opts: keybase1.SaltpackVerifyOptions{
    88  				SignedBy: fu.Username,
    89  			},
    90  		}
    91  		veng = NewSaltpackVerify(tc.G, varg)
    92  		if err := RunEngine2(m, veng); err != nil {
    93  			t.Errorf("%s: verify w/ SignedBy error: %s", test.name, err)
    94  			continue
    95  		}
    96  
    97  		varg = &SaltpackVerifyArg{
    98  			Sink:   libkb.NopWriteCloser{W: &sink},
    99  			Source: strings.NewReader(sig),
   100  			Opts: keybase1.SaltpackVerifyOptions{
   101  				SignedBy: "unknown",
   102  			},
   103  		}
   104  		veng = NewSaltpackVerify(tc.G, varg)
   105  		if err := RunEngine2(m, veng); err == nil {
   106  			t.Errorf("%s: verify w/ SignedBy=unknown worked, should have failed", test.name)
   107  			continue
   108  		}
   109  	}
   110  
   111  	// now try the same messages, but generate detached signatures
   112  	for _, test := range signTests {
   113  		var sink bytes.Buffer
   114  
   115  		sarg := &SaltpackSignArg{
   116  			Sink:   libkb.NopWriteCloser{W: &sink},
   117  			Source: io.NopCloser(bytes.NewBufferString(test.input)),
   118  			Opts: keybase1.SaltpackSignOptions{
   119  				Detached: true,
   120  			},
   121  		}
   122  
   123  		eng := NewSaltpackSign(tc.G, sarg)
   124  		uis := libkb.UIs{
   125  			IdentifyUI: &FakeIdentifyUI{},
   126  			SecretUI:   fu.NewSecretUI(),
   127  		}
   128  		m := NewMetaContextForTest(tc).WithUIs(uis)
   129  		if err := RunEngine2(m, eng); err != nil {
   130  			t.Errorf("(detached) %s: run error: %s", test.name, err)
   131  			continue
   132  		}
   133  
   134  		sig := sink.Bytes()
   135  
   136  		if len(sig) == 0 {
   137  			t.Errorf("(detached) %s: empty sig", test.name)
   138  		}
   139  
   140  		varg := &SaltpackVerifyArg{
   141  			Sink:   libkb.NopWriteCloser{W: &sink},
   142  			Source: strings.NewReader(test.input),
   143  			Opts: keybase1.SaltpackVerifyOptions{
   144  				Signature: sig,
   145  			},
   146  		}
   147  
   148  		veng := NewSaltpackVerify(tc.G, varg)
   149  		m = m.WithSaltpackUI(fakeSaltpackUI{})
   150  		if err := RunEngine2(m, veng); err != nil {
   151  			t.Errorf("(detached) %s: verify error: %s", test.name, err)
   152  			continue
   153  		}
   154  	}
   155  }
   156  
   157  func TestSaltpackSignVerifyBinary(t *testing.T) {
   158  	tc := SetupEngineTest(t, "sign")
   159  	defer tc.Cleanup()
   160  
   161  	fu := CreateAndSignupFakeUser(tc, "sign")
   162  
   163  	// signTests are defined in pgp_sign_test.  Make sure that saltpack sign can
   164  	// sign/verify the same messages as pgp.
   165  	for _, test := range signTests {
   166  		var sink bytes.Buffer
   167  
   168  		sarg := &SaltpackSignArg{
   169  			Sink:   libkb.NopWriteCloser{W: &sink},
   170  			Source: io.NopCloser(bytes.NewBufferString(test.input)),
   171  			Opts: keybase1.SaltpackSignOptions{
   172  				Binary: true,
   173  			},
   174  		}
   175  
   176  		eng := NewSaltpackSign(tc.G, sarg)
   177  		uis := libkb.UIs{
   178  			IdentifyUI: &FakeIdentifyUI{},
   179  			SecretUI:   fu.NewSecretUI(),
   180  		}
   181  		m := NewMetaContextForTest(tc).WithUIs(uis)
   182  		if err := RunEngine2(m, eng); err != nil {
   183  			t.Errorf("%s: run error: %s", test.name, err)
   184  			continue
   185  		}
   186  
   187  		sig := sink.String()
   188  
   189  		if len(sig) == 0 {
   190  			t.Errorf("%s: empty sig", test.name)
   191  		}
   192  
   193  		varg := &SaltpackVerifyArg{
   194  			Sink:   libkb.NopWriteCloser{W: &sink},
   195  			Source: strings.NewReader(sig),
   196  		}
   197  		veng := NewSaltpackVerify(tc.G, varg)
   198  
   199  		m = m.WithSaltpackUI(fakeSaltpackUI{})
   200  
   201  		if err := RunEngine2(m, veng); err != nil {
   202  			t.Errorf("%s: verify error: %s", test.name, err)
   203  			continue
   204  		}
   205  	}
   206  
   207  	// now try the same messages, but generate detached signatures
   208  	for _, test := range signTests {
   209  		var sink bytes.Buffer
   210  
   211  		sarg := &SaltpackSignArg{
   212  			Sink:   libkb.NopWriteCloser{W: &sink},
   213  			Source: io.NopCloser(bytes.NewBufferString(test.input)),
   214  			Opts: keybase1.SaltpackSignOptions{
   215  				Binary:   true,
   216  				Detached: true,
   217  			},
   218  		}
   219  
   220  		eng := NewSaltpackSign(tc.G, sarg)
   221  		uis := libkb.UIs{
   222  			IdentifyUI: &FakeIdentifyUI{},
   223  			SecretUI:   fu.NewSecretUI(),
   224  		}
   225  		m := NewMetaContextForTest(tc).WithUIs(uis)
   226  		if err := RunEngine2(m, eng); err != nil {
   227  			t.Errorf("(detached) %s: run error: %s", test.name, err)
   228  			continue
   229  		}
   230  
   231  		sig := sink.Bytes()
   232  
   233  		if len(sig) == 0 {
   234  			t.Errorf("(detached) %s: empty sig", test.name)
   235  		}
   236  
   237  		varg := &SaltpackVerifyArg{
   238  			Sink:   libkb.NopWriteCloser{W: &sink},
   239  			Source: strings.NewReader(test.input),
   240  			Opts: keybase1.SaltpackVerifyOptions{
   241  				Signature: sig,
   242  			},
   243  		}
   244  		veng := NewSaltpackVerify(tc.G, varg)
   245  		m = m.WithSaltpackUI(fakeSaltpackUI{})
   246  
   247  		if err := RunEngine2(m, veng); err != nil {
   248  			t.Errorf("(detached) %s: verify error: %s", test.name, err)
   249  			continue
   250  		}
   251  	}
   252  }
   253  
   254  func TestSaltpackSignVerifyNotSelf(t *testing.T) {
   255  	tc := SetupEngineTest(t, "sign")
   256  	defer tc.Cleanup()
   257  
   258  	signer := CreateAndSignupFakeUser(tc, "sign")
   259  
   260  	var sink bytes.Buffer
   261  
   262  	sarg := &SaltpackSignArg{
   263  		Sink:   libkb.NopWriteCloser{W: &sink},
   264  		Source: io.NopCloser(bytes.NewBufferString("this is from me")),
   265  	}
   266  
   267  	eng := NewSaltpackSign(tc.G, sarg)
   268  	uis := libkb.UIs{
   269  		IdentifyUI: &FakeIdentifyUI{},
   270  		SecretUI:   signer.NewSecretUI(),
   271  	}
   272  
   273  	m := NewMetaContextForTest(tc).WithUIs(uis)
   274  	if err := RunEngine2(m, eng); err != nil {
   275  		t.Fatal(err)
   276  	}
   277  
   278  	sig := sink.String()
   279  
   280  	if len(sig) == 0 {
   281  		t.Fatal("empty sig")
   282  	}
   283  
   284  	Logout(tc)
   285  
   286  	_ = CreateAndSignupFakeUser(tc, "sign")
   287  
   288  	// no user assertion
   289  	varg := &SaltpackVerifyArg{
   290  		Sink:   libkb.NopWriteCloser{W: &sink},
   291  		Source: strings.NewReader(sig),
   292  	}
   293  	veng := NewSaltpackVerify(tc.G, varg)
   294  
   295  	m = m.WithSaltpackUI(fakeSaltpackUI{})
   296  
   297  	if err := RunEngine2(m, veng); err != nil {
   298  		t.Fatalf("verify error: %s", err)
   299  	}
   300  
   301  	// valid user assertion
   302  	varg = &SaltpackVerifyArg{
   303  		Sink:   libkb.NopWriteCloser{W: &sink},
   304  		Source: strings.NewReader(sig),
   305  		Opts: keybase1.SaltpackVerifyOptions{
   306  			SignedBy: signer.Username,
   307  		},
   308  	}
   309  	veng = NewSaltpackVerify(tc.G, varg)
   310  	if err := RunEngine2(m, veng); err != nil {
   311  		t.Fatalf("verify w/ SignedBy error: %s", err)
   312  	}
   313  
   314  	// invalid user assertion
   315  	varg = &SaltpackVerifyArg{
   316  		Sink:   libkb.NopWriteCloser{W: &sink},
   317  		Source: strings.NewReader(sig),
   318  		Opts: keybase1.SaltpackVerifyOptions{
   319  			SignedBy: "unknown",
   320  		},
   321  	}
   322  	veng = NewSaltpackVerify(tc.G, varg)
   323  	if err := RunEngine2(m, veng); err == nil {
   324  		t.Errorf("verify w/ SignedBy unknown didn't fail")
   325  	}
   326  }
   327  
   328  func TestSaltpackVerifyRevoked(t *testing.T) {
   329  	tc := SetupEngineTest(t, "sign")
   330  	defer tc.Cleanup()
   331  
   332  	fu := CreateAndSignupFakeUser(tc, "sign")
   333  
   334  	var sink bytes.Buffer
   335  
   336  	sarg := &SaltpackSignArg{
   337  		Sink:   libkb.NopWriteCloser{W: &sink},
   338  		Source: io.NopCloser(bytes.NewBufferString("test input wooo")),
   339  	}
   340  
   341  	eng := NewSaltpackSign(tc.G, sarg)
   342  	uis := libkb.UIs{
   343  		LogUI:      tc.G.UI.GetLogUI(),
   344  		LoginUI:    &libkb.TestLoginUI{},
   345  		IdentifyUI: &FakeIdentifyUI{},
   346  		SecretUI:   fu.NewSecretUI(),
   347  	}
   348  	m := NewMetaContextForTest(tc).WithUIs(uis)
   349  	if err := RunEngine2(m, eng); err != nil {
   350  		t.Fatal(err)
   351  	}
   352  
   353  	// Get the current device
   354  	devices, _ := getActiveDevicesAndKeys(tc, fu)
   355  	if len(devices) != 1 {
   356  		t.Fatalf("Expected a single device, but found %d", len(devices))
   357  	}
   358  	currentDevice := devices[0]
   359  
   360  	// Delegate a new paper key so that we have something active after we
   361  	// revoke the current device.
   362  	paperEng := NewPaperKey(tc.G)
   363  	if err := RunEngine2(m, paperEng); err != nil {
   364  		t.Fatal(err)
   365  	}
   366  
   367  	// Revoke the current device.
   368  	err := doRevokeDevice(tc, fu, currentDevice.ID, false, false)
   369  	if err == nil {
   370  		tc.T.Fatal("Expected revoking the current device to fail.")
   371  	}
   372  	// force=true is required for the current device
   373  	err = doRevokeDevice(tc, fu, currentDevice.ID, true, false)
   374  	if err != nil {
   375  		tc.T.Fatal(err)
   376  	}
   377  
   378  	// Finally verify the sig. This should be an error, because the signing
   379  	// device is revoked. The revoked status will get passed to our
   380  	// fakeSaltpackUI's SaltpackVerifyBadSender method, made into an error, and
   381  	// propagated all the way back here. Unfortunately we can't really test the
   382  	// force option here, because that's implemented in the real client
   383  	// SaltpackUI.
   384  	sig := sink.String()
   385  	if len(sig) == 0 {
   386  		t.Fatal("empty sig")
   387  	}
   388  	varg := &SaltpackVerifyArg{
   389  		Sink:   libkb.NopWriteCloser{W: &sink},
   390  		Source: strings.NewReader(sig),
   391  	}
   392  	veng := NewSaltpackVerify(tc.G, varg)
   393  	m = m.WithSaltpackUI(fakeSaltpackUI{})
   394  	err = RunEngine2(m, veng)
   395  	if err == nil {
   396  		t.Fatal("expected error during verify")
   397  	}
   398  	verificationError, ok := err.(libkb.VerificationError)
   399  	if !ok {
   400  		t.Fatal("expected VerificationError during verify")
   401  	}
   402  	badSenderError, ok := verificationError.Cause.Err.(*FakeBadSenderError)
   403  	if !ok {
   404  		t.Fatal("expected FakeBadSenderError during verify")
   405  	}
   406  
   407  	if badSenderError.senderType != keybase1.SaltpackSenderType_REVOKED {
   408  		t.Fatalf("expected keybase1.SaltpackSenderType_REVOKED, got %s", badSenderError.senderType.String())
   409  	}
   410  }
   411  
   412  func TestSaltpackSignForceVersion(t *testing.T) {
   413  	tc := SetupEngineTest(t, "sign")
   414  	defer tc.Cleanup()
   415  
   416  	fu := CreateAndSignupFakeUser(tc, "sign")
   417  
   418  	run := func(versionFlag int, majorVersionExpected int) {
   419  		// For each run, test both the attached and detached sig modes.
   420  		for _, isAttached := range []bool{true, false} {
   421  			var sink bytes.Buffer
   422  			sarg := &SaltpackSignArg{
   423  				Sink:   libkb.NopWriteCloser{W: &sink},
   424  				Source: io.NopCloser(bytes.NewBufferString("some test input")),
   425  				Opts: keybase1.SaltpackSignOptions{
   426  					Binary:          true,
   427  					SaltpackVersion: versionFlag,
   428  					Detached:        !isAttached,
   429  				},
   430  			}
   431  			eng := NewSaltpackSign(tc.G, sarg)
   432  			uis := libkb.UIs{
   433  				IdentifyUI: &FakeIdentifyUI{},
   434  				SecretUI:   fu.NewSecretUI(),
   435  			}
   436  			m := NewMetaContextForTest(tc).WithUIs(uis)
   437  			if err := RunEngine2(m, eng); err != nil {
   438  				t.Fatal(err)
   439  			}
   440  
   441  			// Double decode the header and inspect it.
   442  			var header saltpack.EncryptionHeader
   443  			dec := codec.NewDecoderBytes(sink.Bytes(), &codec.MsgpackHandle{WriteExt: true})
   444  			var b []byte
   445  			if err := dec.Decode(&b); err != nil {
   446  				t.Fatal(err)
   447  			}
   448  			dec = codec.NewDecoderBytes(b, &codec.MsgpackHandle{WriteExt: true})
   449  			if err := dec.Decode(&header); err != nil {
   450  				t.Fatal(err)
   451  			}
   452  
   453  			if header.Version.Major != majorVersionExpected {
   454  				t.Fatalf("passed saltpack version %d (attached: %t) and expected major version %d, found %d", versionFlag, isAttached, majorVersionExpected, header.Version.Major)
   455  			}
   456  		}
   457  	}
   458  
   459  	// 0 means the default, which is major version 2.
   460  	run(0, 2)
   461  	run(1, 1)
   462  	run(2, 2)
   463  }