github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/engine/scankeys.go (about) 1 // Copyright 2015 Keybase, Inc. All rights reserved. Use of 2 // this source code is governed by the included BSD license. 3 4 package engine 5 6 import ( 7 "fmt" 8 "sync" 9 10 "github.com/keybase/client/go/libkb" 11 keybase1 "github.com/keybase/client/go/protocol/keybase1" 12 "github.com/keybase/go-crypto/openpgp" 13 "github.com/keybase/go-crypto/openpgp/packet" 14 ) 15 16 // ScanKeys finds pgp decryption keys in SKB and also if there is 17 // one stored on the server. It satisfies the openpgp.KeyRing 18 // interface. 19 // 20 // It also will find public pgp keys for signature verification. 21 // 22 // It is not an engine, but uses an engine and is used by engines, 23 // so has to be in the engine package. It is a UIConsumer. 24 type ScanKeys struct { 25 // keys openpgp.EntityList 26 skbs []*libkb.SKB // all skb blocks for local keys 27 keyOwners map[uint64]*libkb.User // user objects for owners of keys found, for convenience 28 me *libkb.User 29 sync.Mutex // protect keyOwners map 30 libkb.MetaContextified 31 } 32 33 const unlockReason = "PGP Decryption" 34 35 // enforce ScanKeys implements openpgp.KeyRing: 36 var _ openpgp.KeyRing = &ScanKeys{} 37 38 // NewScanKeys creates a ScanKeys type. If there is a login 39 // session, it will load the pgp keys for that user. 40 func NewScanKeys(m libkb.MetaContext) (sk *ScanKeys, err error) { 41 sk = &ScanKeys{ 42 keyOwners: make(map[uint64]*libkb.User), 43 MetaContextified: libkb.NewMetaContextified(m), 44 } 45 46 defer m.Trace("NewScanKeys", &err)() 47 48 var loggedIn bool 49 loggedIn, err = isLoggedInWithError(m) 50 if err != nil { 51 return nil, err 52 } 53 if !loggedIn { 54 return sk, nil 55 } 56 57 sk.me, err = libkb.LoadMe(libkb.NewLoadUserArgWithMetaContext(m)) 58 if err != nil { 59 return nil, fmt.Errorf("loadme error: %s", err) 60 } 61 62 // if user provided, then load their local keys, and their synced secret keys: 63 synced, err := sk.me.GetSyncedSecretKeys(m) 64 if err != nil { 65 return nil, fmt.Errorf("getsyncedsecret err: %s", err) 66 } 67 68 ring, err := m.ActiveDevice().Keyring(m) 69 if err != nil { 70 return nil, err 71 } 72 err = sk.coalesceBlocks(m, ring, synced) 73 if err != nil { 74 return nil, err 75 } 76 return sk, nil 77 } 78 79 func (s *ScanKeys) Name() string { 80 return "ScanKeys" 81 } 82 83 func (s *ScanKeys) RequiredUIs() []libkb.UIKind { 84 return []libkb.UIKind{libkb.SecretUIKind} 85 } 86 87 func (s *ScanKeys) SubConsumers() []libkb.UIConsumer { 88 return []libkb.UIConsumer{ 89 &PGPKeyfinder{}, 90 } 91 } 92 93 // Count returns the number of local keys available. 94 func (s *ScanKeys) Count() int { 95 return len(s.skbs) 96 } 97 98 // KeysById returns the set of keys that have the given key id. 99 // It is only called during decryption by openpgp. 100 func (s *ScanKeys) KeysById(id uint64, fp []byte) []openpgp.Key { 101 m := s.M() 102 primaries := s.unlockByID(m, id) 103 memres := primaries.KeysById(id, fp) 104 m.Debug("ScanKeys:KeysById(%016x) => %d keys match in memory", id, len(memres)) 105 if len(memres) > 0 { 106 m.Debug("ScanKeys:KeysById(%016x) => owner == me (%s)", id, s.me.GetName()) 107 s.Lock() 108 s.keyOwners[id] = s.me 109 s.Unlock() 110 return memres 111 } 112 113 // KeysById is only used for decryption, so getting public keys from 114 // API server via s.scan(id) is pointless, so just returning nil. 115 return nil 116 } 117 118 // KeysByIdAndUsage returns the set of public keys with the given 119 // id that also meet the key usage given by requiredUsage. 120 // 121 // The requiredUsage is expressed as the bitwise-OR of 122 // packet.KeyFlag* values. 123 // 124 // It is only called during signature verification so therefore 125 // requiredUsage will only equal KeyFlagSign, thus only public 126 // keys are required. If this ever changes upstream in openpgp, 127 // this function will panic. 128 func (s *ScanKeys) KeysByIdUsage(id uint64, fp []byte, requiredUsage byte) []openpgp.Key { 129 if requiredUsage != packet.KeyFlagSign { 130 panic(fmt.Sprintf("ScanKeys: unexpected requiredUsage flags set: %x", requiredUsage)) 131 } 132 133 m := s.M() 134 135 // check the local keys first. 136 primaries := s.publicByID(m, id) 137 memres := primaries.KeysByIdUsage(id, fp, requiredUsage) 138 m.Debug("ScanKeys#KeysByIdUsage(%016x, %x) => %d keys match in memory", id, requiredUsage, len(memres)) 139 if len(memres) > 0 { 140 m.Debug("ScanKeys#KeysByIdUsage(%016x) => owner == me (%s)", id, s.me.GetName()) 141 s.Lock() 142 s.keyOwners[id] = s.me 143 s.Unlock() 144 return memres 145 } 146 147 // no match, so now lookup the user on the api server by the key id. 148 list, err := s.scan(m, id) 149 if err != nil { 150 m.Debug("error finding keys for %016x: %s", id, err) 151 return nil 152 } 153 // use the list to find the keys correctly 154 m.Debug("ScanKeys#KeysByIdUsage(%d, %x) => %d keys found via api scan", id, requiredUsage, len(list)) 155 return list.KeysByIdUsage(id, fp, requiredUsage) 156 } 157 158 // DecryptionKeys returns all private keys that are valid for 159 // decryption. It is only used if there is no key id in the 160 // message. 161 func (s *ScanKeys) DecryptionKeys() []openpgp.Key { 162 m := s.M() 163 m.Debug("ScanKeys#DecryptionKeys() => %d keys available", s.Count()) 164 all := s.unlockAll(m) 165 return all.DecryptionKeys() 166 } 167 168 // KeyOwner returns the owner of the keys found by ScanKeys that were 169 // used in KeysById or KeysByIdUsage, indexed by keyID. 170 func (s *ScanKeys) KeyOwner(keyID uint64) *libkb.User { 171 s.Lock() 172 defer s.Unlock() 173 174 return s.keyOwners[keyID] 175 } 176 177 func (s *ScanKeys) KeyOwnerByEntity(entity *openpgp.Entity) *libkb.User { 178 s.Lock() 179 defer s.Unlock() 180 181 if entity == nil { 182 return nil 183 } 184 if u, found := s.keyOwners[entity.PrimaryKey.KeyId]; found { 185 return u 186 } 187 for _, subKey := range entity.Subkeys { 188 if u, found := s.keyOwners[subKey.PublicKey.KeyId]; found { 189 return u 190 } 191 } 192 return nil 193 } 194 195 // coalesceBlocks puts the synced pgp key block and all the pgp key 196 // blocks in ring into s.skbs. 197 func (s *ScanKeys) coalesceBlocks(m libkb.MetaContext, ring *libkb.SKBKeyringFile, synced []*libkb.SKB) (err error) { 198 defer m.Trace("ScanKeys#coalesceBlocks", &err)() 199 200 // We want keys in this order: first local keyring keys that are LKSec, and 201 // then server synced keys that are triplesec. In ScanKeys.KeysById, this 202 // allows us to prompt for passphrase once and get both passphrase stream 203 // cache and triplesec cache the moment first LKSec key is processed by 204 // SKB.UnlockSecretKey. 205 206 // If they were in different order and we got triplesec bundle first, we 207 // would prompt for passphrase to get triplesec stream, and then prompt 208 // again to get passphrase stream to unlock LKSec bundle, prompting twice 209 // in total (assuming someone has both a server-synced bundle and local 210 // one). 211 212 for _, b := range ring.Blocks { 213 if !libkb.IsPGPAlgo(b.Type) { 214 continue 215 } 216 // make sure uid set on each block: 217 b.SetUID(s.me.GetUID()) 218 s.skbs = append(s.skbs, b) 219 } 220 221 s.skbs = append(s.skbs, synced...) 222 223 return nil 224 } 225 226 // scan finds the user on the api server for the key id. Then it 227 // uses PGPKeyfinder to find the public pgp keys for the user. 228 func (s *ScanKeys) scan(m libkb.MetaContext, id uint64) (openpgp.EntityList, error) { 229 // lookup the user on the api server by the key id. 230 username, uid, err := s.apiLookup(m, id) 231 if err != nil { 232 return nil, err 233 } 234 m.Debug("key id %016x => %s, %s", id, id, username, uid) 235 if len(username) == 0 || len(uid) == 0 { 236 return nil, libkb.NoKeyError{} 237 } 238 239 // use PGPKeyfinder engine to get the pgp keys for the user 240 arg := &PGPKeyfinderArg{Usernames: []string{username}} 241 eng := NewPGPKeyfinder(m.G(), arg) 242 if err := RunEngine2(m, eng); err != nil { 243 return nil, err 244 } 245 uplus := eng.UsersPlusKeys() 246 if len(uplus) != 1 { 247 m.Warning("error getting user plus pgp key from %s", username) 248 return nil, err 249 } 250 // user found is the owner of the keys 251 m.Debug("scan(%016x) => owner of key = (%s)", id, uplus[0].User.GetName()) 252 s.Lock() 253 s.keyOwners[id] = uplus[0].User 254 s.Unlock() 255 256 // convert the bundles to an openpgp entity list 257 // (which implements the openpgp.KeyRing interface) 258 var list openpgp.EntityList 259 for _, k := range uplus[0].Keys { 260 list = append(list, k.Entity) 261 } 262 return list, nil 263 } 264 265 // apiLookup gets the username and uid from the api server for the 266 // key id. 267 func (s *ScanKeys) apiLookup(m libkb.MetaContext, id uint64) (username string, uid keybase1.UID, err error) { 268 return libkb.PGPLookup(m, id) 269 } 270 271 func (s *ScanKeys) publicByID(m libkb.MetaContext, id uint64) openpgp.EntityList { 272 var list openpgp.EntityList 273 for _, skb := range s.skbs { 274 pubkey, err := skb.GetPubKey() 275 if err != nil { 276 m.Warning("error getting pub key from skb: %s", err) 277 continue 278 } 279 bundle, ok := pubkey.(*libkb.PGPKeyBundle) 280 if !ok { 281 continue 282 } 283 if len(bundle.KeysById(id, nil)) == 0 { 284 // no match 285 continue 286 } 287 list = append(list, bundle.Entity) 288 } 289 return list 290 } 291 292 func (s *ScanKeys) unlockByID(m libkb.MetaContext, id uint64) openpgp.EntityList { 293 var list openpgp.EntityList 294 for _, skb := range s.skbs { 295 pubkey, err := skb.GetPubKey() 296 if err != nil { 297 m.Warning("error getting pub key from skb: %s", err) 298 continue 299 } 300 bundle, ok := pubkey.(*libkb.PGPKeyBundle) 301 if !ok { 302 continue 303 } 304 if len(bundle.KeysById(id, nil)) == 0 { 305 // no match 306 continue 307 } 308 309 // some key in the bundle matched, so unlock everything: 310 parg := libkb.SecretKeyPromptArg{ 311 Reason: unlockReason, 312 SecretUI: m.UIs().SecretUI, 313 } 314 secretStore := libkb.NewSecretStore(m, s.me.GetNormalizedName()) 315 unlocked, err := skb.PromptAndUnlock(m, parg, secretStore, s.me) 316 if err != nil { 317 m.Warning("error unlocking key: %s", err) 318 continue 319 } 320 unlockedBundle, ok := unlocked.(*libkb.PGPKeyBundle) 321 if !ok { 322 m.Warning("could not convert unlocked key to PGPKeyBundle") 323 continue 324 } 325 list = append(list, unlockedBundle.Entity) 326 } 327 return list 328 } 329 330 func (s *ScanKeys) unlockAll(m libkb.MetaContext) openpgp.EntityList { 331 var list openpgp.EntityList 332 for _, skb := range s.skbs { 333 parg := libkb.SecretKeyPromptArg{ 334 Reason: unlockReason, 335 SecretUI: m.UIs().SecretUI, 336 } 337 secretStore := libkb.NewSecretStore(m, s.me.GetNormalizedName()) 338 unlocked, err := skb.PromptAndUnlock(m, parg, secretStore, s.me) 339 if err != nil { 340 m.Warning("error unlocking key: %s", err) 341 continue 342 } 343 unlockedBundle, ok := unlocked.(*libkb.PGPKeyBundle) 344 if !ok { 345 m.Warning("could not convert unlocked key to PGPKeyBundle") 346 continue 347 } 348 list = append(list, unlockedBundle.Entity) 349 } 350 return list 351 }