2018-05-17 11:32:23 +02:00
|
|
|
# https://tools.ietf.org/html/draft-cavage-http-signatures-08
|
2018-10-11 17:37:39 +02:00
|
|
|
defmodule Mobilizon.Service.HTTPSignatures do
|
2018-06-14 18:15:27 +02:00
|
|
|
@moduledoc """
|
|
|
|
# HTTP Signatures
|
|
|
|
|
|
|
|
Generates and checks HTTP Signatures
|
|
|
|
"""
|
|
|
|
|
2018-10-11 17:37:39 +02:00
|
|
|
alias Mobilizon.Actors.Actor
|
|
|
|
alias Mobilizon.Service.ActivityPub
|
2018-06-14 18:15:27 +02:00
|
|
|
import Logger
|
2018-05-17 11:32:23 +02:00
|
|
|
|
|
|
|
def split_signature(sig) do
|
|
|
|
default = %{"headers" => "date"}
|
|
|
|
|
|
|
|
sig =
|
|
|
|
sig
|
|
|
|
|> String.trim()
|
|
|
|
|> String.split(",")
|
|
|
|
|> Enum.reduce(default, fn part, acc ->
|
|
|
|
[key | rest] = String.split(part, "=")
|
|
|
|
value = Enum.join(rest, "=")
|
|
|
|
Map.put(acc, key, String.trim(value, "\""))
|
|
|
|
end)
|
|
|
|
|
|
|
|
Map.put(sig, "headers", String.split(sig["headers"], ~r/\s/))
|
|
|
|
end
|
|
|
|
|
|
|
|
def validate(headers, signature, public_key) do
|
|
|
|
sigstring = build_signing_string(headers, signature["headers"])
|
2018-07-27 10:45:35 +02:00
|
|
|
|
|
|
|
Logger.debug(fn ->
|
2018-06-14 18:15:27 +02:00
|
|
|
"Signature: #{signature["signature"]}"
|
2018-07-27 10:45:35 +02:00
|
|
|
end)
|
|
|
|
|
|
|
|
Logger.debug(fn ->
|
2018-06-14 18:15:27 +02:00
|
|
|
"Sigstring: #{sigstring}"
|
2018-07-27 10:45:35 +02:00
|
|
|
end)
|
|
|
|
|
2018-05-17 11:32:23 +02:00
|
|
|
{:ok, sig} = Base.decode64(signature["signature"])
|
2018-05-18 09:56:21 +02:00
|
|
|
:public_key.verify(sigstring, :sha256, sig, public_key)
|
2018-05-17 11:32:23 +02:00
|
|
|
end
|
|
|
|
|
2018-11-07 18:12:21 +01:00
|
|
|
defp prepare_public_key(public_key_code) do
|
|
|
|
with [public_key_entry] <- :public_key.pem_decode(public_key_code) do
|
2018-11-08 16:26:14 +01:00
|
|
|
{:ok, :public_key.pem_entry_decode(public_key_entry)}
|
2018-11-08 16:11:23 +01:00
|
|
|
else
|
|
|
|
_err ->
|
|
|
|
{:error, :pem_decode_error}
|
2018-11-07 18:12:21 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-05-17 11:32:23 +02:00
|
|
|
def validate_conn(conn) do
|
|
|
|
# TODO: How to get the right key and see if it is actually valid for that request.
|
|
|
|
# For now, fetch the key for the actor.
|
2018-11-08 16:11:23 +01:00
|
|
|
with {:ok, public_key} <- conn.params["actor"] |> Actor.get_public_key_for_url(),
|
|
|
|
{:ok, public_key} <- prepare_public_key(public_key) do
|
2018-05-18 09:56:21 +02:00
|
|
|
if validate_conn(conn, public_key) do
|
|
|
|
true
|
|
|
|
else
|
|
|
|
Logger.info("Could not validate request, re-fetching user and trying one more time")
|
2018-05-17 11:32:23 +02:00
|
|
|
# Fetch user anew and try one more time
|
|
|
|
with actor_id <- conn.params["actor"],
|
2018-05-18 09:56:21 +02:00
|
|
|
{:ok, _actor} <- ActivityPub.make_actor_from_url(actor_id),
|
2018-11-08 16:11:23 +01:00
|
|
|
{:ok, public_key} <- actor_id |> Actor.get_public_key_for_url(),
|
|
|
|
{:ok, public_key} <- prepare_public_key(public_key) do
|
2018-07-27 10:45:35 +02:00
|
|
|
validate_conn(conn, public_key)
|
2018-05-17 11:32:23 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
else
|
|
|
|
e ->
|
2018-05-18 09:56:21 +02:00
|
|
|
Logger.debug("Could not found url for actor!")
|
2018-07-27 10:45:35 +02:00
|
|
|
Logger.debug(inspect(e))
|
2018-05-17 11:32:23 +02:00
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-05-18 09:56:21 +02:00
|
|
|
def validate_conn(conn, public_key) do
|
|
|
|
headers = Enum.into(conn.req_headers, %{})
|
2018-11-07 18:16:57 +01:00
|
|
|
host_without_port = String.split(headers["host"], ":") |> hd
|
2018-05-18 09:56:21 +02:00
|
|
|
headers = Map.put(headers, "host", host_without_port)
|
|
|
|
signature = split_signature(headers["signature"])
|
|
|
|
validate(headers, signature, public_key)
|
|
|
|
end
|
2018-05-17 11:32:23 +02:00
|
|
|
|
|
|
|
def build_signing_string(headers, used_headers) do
|
|
|
|
used_headers
|
|
|
|
|> Enum.map(fn header -> "#{header}: #{headers[header]}" end)
|
|
|
|
|> Enum.join("\n")
|
|
|
|
end
|
|
|
|
|
2018-06-14 17:25:55 +02:00
|
|
|
def sign(%Actor{} = actor, headers) do
|
2018-08-01 14:45:18 +02:00
|
|
|
sigstring = build_signing_string(headers, Map.keys(headers))
|
2018-05-17 11:32:23 +02:00
|
|
|
|
2018-08-01 14:45:18 +02:00
|
|
|
signature = sigstring |> :public_key.sign(:sha256, actor.keys) |> Base.encode64()
|
2018-05-17 11:32:23 +02:00
|
|
|
|
2018-08-01 14:45:18 +02:00
|
|
|
[
|
|
|
|
keyId: actor.url <> "#main-key",
|
|
|
|
algorithm: "rsa-sha256",
|
|
|
|
headers: headers |> Map.keys() |> Enum.join(" "),
|
|
|
|
signature: signature
|
|
|
|
]
|
|
|
|
|> Enum.map(fn {k, v} -> "#{k}=\"#{v}\"" end)
|
|
|
|
|> Enum.join(",")
|
2018-05-17 11:32:23 +02:00
|
|
|
end
|
|
|
|
end
|