2021-05-08 13:25:55 +01:00
/ *
GoToSocial
Copyright ( C ) 2021 GoToSocial Authors admin @ gotosocial . org
This program is free software : you can redistribute it and / or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation , either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU Affero General Public License for more details .
You should have received a copy of the GNU Affero General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
* /
package federation
import (
"context"
"crypto/x509"
"encoding/json"
"encoding/pem"
"errors"
"fmt"
"net/url"
2021-05-21 14:48:26 +01:00
"strings"
2021-05-08 13:25:55 +01:00
"github.com/go-fed/activity/pub"
"github.com/go-fed/activity/streams"
"github.com/go-fed/activity/streams/vocab"
"github.com/go-fed/httpsig"
2021-05-21 14:48:26 +01:00
"github.com/superseriousbusiness/gotosocial/internal/db"
2021-05-08 13:25:55 +01:00
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
2021-07-05 12:23:03 +01:00
"github.com/superseriousbusiness/gotosocial/internal/util"
2021-05-08 13:25:55 +01:00
)
/ *
publicKeyer is BORROWED DIRECTLY FROM https : //github.com/go-fed/apcore/blob/master/ap/util.go
Thank you @ cj @ mastodon . technology ! < 3
* /
type publicKeyer interface {
GetW3IDSecurityV1PublicKey ( ) vocab . W3IDSecurityV1PublicKeyProperty
}
/ *
getPublicKeyFromResponse is adapted from https : //github.com/go-fed/apcore/blob/master/ap/util.go
Thank you @ cj @ mastodon . technology ! < 3
* /
func getPublicKeyFromResponse ( c context . Context , b [ ] byte , keyID * url . URL ) ( vocab . W3IDSecurityV1PublicKey , error ) {
m := make ( map [ string ] interface { } )
if err := json . Unmarshal ( b , & m ) ; err != nil {
return nil , err
}
t , err := streams . ToType ( c , m )
if err != nil {
return nil , err
}
pker , ok := t . ( publicKeyer )
if ! ok {
return nil , fmt . Errorf ( "ActivityStreams type cannot be converted to one known to have publicKey property: %T" , t )
}
pkp := pker . GetW3IDSecurityV1PublicKey ( )
if pkp == nil {
return nil , errors . New ( "publicKey property is not provided" )
}
var pkpFound vocab . W3IDSecurityV1PublicKey
for pkpIter := pkp . Begin ( ) ; pkpIter != pkp . End ( ) ; pkpIter = pkpIter . Next ( ) {
if ! pkpIter . IsW3IDSecurityV1PublicKey ( ) {
continue
}
pkValue := pkpIter . Get ( )
var pkID * url . URL
pkID , err = pub . GetId ( pkValue )
if err != nil {
return nil , err
}
if pkID . String ( ) != keyID . String ( ) {
continue
}
pkpFound = pkValue
break
}
if pkpFound == nil {
return nil , fmt . Errorf ( "cannot find publicKey with id: %s" , keyID )
}
return pkpFound , nil
}
// AuthenticateFederatedRequest authenticates any kind of incoming federated request from a remote server. This includes things like
// GET requests for dereferencing our users or statuses etc, and POST requests for delivering new Activities. The function returns
2021-06-27 15:52:18 +01:00
// the URL of the owner of the public key used in the requesting http signature.
2021-05-08 13:25:55 +01:00
//
2021-06-27 15:52:18 +01:00
// Authenticate in this case is defined as making sure that the http request is actually signed by whoever claims
// to have signed it, by fetching the public key from the signature and checking it against the remote public key.
//
// To avoid making unnecessary http calls towards blocked domains, this function *does* bail early if an instance-level domain block exists
// for the request from the incoming domain. However, it does not check whether individual blocks exist between the requesting user or domain
// and the requested user: this should be done elsewhere.
2021-05-08 13:25:55 +01:00
//
// The provided username will be used to generate a transport for making remote requests/derefencing the public key ID of the request signature.
// Ideally you should pass in the username of the user *being requested*, so that the remote server can decide how to handle the request based on who's making it.
// Ie., if the request on this server is for https://example.org/users/some_username then you should pass in the username 'some_username'.
// The remote server will then know that this is the user making the dereferencing request, and they can decide to allow or deny the request depending on their settings.
//
// Note that it is also valid to pass in an empty string here, in which case the keys of the instance account will be used.
//
// Also note that this function *does not* dereference the remote account that the signature key is associated with.
// Other functions should use the returned URL to dereference the remote account, if required.
2021-07-05 12:23:03 +01:00
func ( f * federator ) AuthenticateFederatedRequest ( ctx context . Context , requestedUsername string ) ( * url . URL , bool , error ) {
l := f . log . WithField ( "func" , "AuthenticateFederatedRequest" )
2021-06-27 15:52:18 +01:00
var publicKey interface { }
var pkOwnerURI * url . URL
var err error
2021-07-05 12:23:03 +01:00
// thanks to signaturecheck.go in the security package, we should already have a signature verifier set on the context
vi := ctx . Value ( util . APRequestingPublicKeyVerifier )
if vi == nil {
l . Debug ( "request wasn't signed" )
return nil , false , nil // request wasn't signed
2021-05-08 13:25:55 +01:00
}
2021-07-05 12:23:03 +01:00
verifier , ok := vi . ( httpsig . Verifier )
if ! ok {
l . Debug ( "couldn't extract sig verifier" )
return nil , false , nil // couldn't extract the verifier
2021-05-08 13:25:55 +01:00
}
2021-07-05 12:23:03 +01:00
requestingPublicKeyID , err := url . Parse ( verifier . KeyId ( ) )
2021-06-27 15:52:18 +01:00
if err != nil {
2021-07-05 12:23:03 +01:00
l . Debug ( "couldn't parse public key URL" )
return nil , false , nil // couldn't parse the public key ID url
2021-06-27 15:52:18 +01:00
}
2021-05-23 17:07:04 +01:00
requestingRemoteAccount := & gtsmodel . Account { }
requestingLocalAccount := & gtsmodel . Account { }
2021-06-27 15:52:18 +01:00
requestingHost := requestingPublicKeyID . Host
if strings . EqualFold ( requestingHost , f . config . Host ) {
2021-05-23 17:07:04 +01:00
// LOCAL ACCOUNT REQUEST
2021-05-21 14:48:26 +01:00
// the request is coming from INSIDE THE HOUSE so skip the remote dereferencing
2021-08-10 12:32:39 +01:00
l . Tracef ( "proceeding without dereference for local public key %s" , requestingPublicKeyID )
2021-05-21 14:48:26 +01:00
if err := f . db . GetWhere ( [ ] db . Where { { Key : "public_key_uri" , Value : requestingPublicKeyID . String ( ) } } , requestingLocalAccount ) ; err != nil {
2021-07-05 12:23:03 +01:00
return nil , false , fmt . Errorf ( "couldn't get local account with public key uri %s from the database: %s" , requestingPublicKeyID . String ( ) , err )
2021-05-21 14:48:26 +01:00
}
publicKey = requestingLocalAccount . PublicKey
pkOwnerURI , err = url . Parse ( requestingLocalAccount . URI )
if err != nil {
2021-07-05 12:23:03 +01:00
return nil , false , fmt . Errorf ( "error parsing url %s: %s" , requestingLocalAccount . URI , err )
2021-05-21 14:48:26 +01:00
}
2021-05-23 17:07:04 +01:00
} else if err := f . db . GetWhere ( [ ] db . Where { { Key : "public_key_uri" , Value : requestingPublicKeyID . String ( ) } } , requestingRemoteAccount ) ; err == nil {
// REMOTE ACCOUNT REQUEST WITH KEY CACHED LOCALLY
// this is a remote account and we already have the public key for it so use that
2021-08-10 12:32:39 +01:00
l . Tracef ( "proceeding without dereference for cached public key %s" , requestingPublicKeyID )
2021-05-23 17:07:04 +01:00
publicKey = requestingRemoteAccount . PublicKey
pkOwnerURI , err = url . Parse ( requestingRemoteAccount . URI )
if err != nil {
2021-07-05 12:23:03 +01:00
return nil , false , fmt . Errorf ( "error parsing url %s: %s" , requestingRemoteAccount . URI , err )
2021-05-23 17:07:04 +01:00
}
2021-05-21 14:48:26 +01:00
} else {
2021-05-23 17:07:04 +01:00
// REMOTE ACCOUNT REQUEST WITHOUT KEY CACHED LOCALLY
// the request is remote and we don't have the public key yet,
// so we need to authenticate the request properly by dereferencing the remote key
2021-08-10 12:32:39 +01:00
l . Tracef ( "proceeding with dereference for uncached public key %s" , requestingPublicKeyID )
transport , err := f . transportController . NewTransportForUsername ( requestedUsername )
2021-05-21 14:48:26 +01:00
if err != nil {
2021-07-05 12:23:03 +01:00
return nil , false , fmt . Errorf ( "transport err: %s" , err )
2021-05-21 14:48:26 +01:00
}
2021-05-08 13:25:55 +01:00
2021-05-21 14:48:26 +01:00
// The actual http call to the remote server is made right here in the Dereference function.
b , err := transport . Dereference ( context . Background ( ) , requestingPublicKeyID )
if err != nil {
2021-07-05 12:23:03 +01:00
return nil , false , fmt . Errorf ( "error deferencing key %s: %s" , requestingPublicKeyID . String ( ) , err )
2021-05-21 14:48:26 +01:00
}
2021-05-08 13:25:55 +01:00
2021-05-21 14:48:26 +01:00
// if the key isn't in the response, we can't authenticate the request
requestingPublicKey , err := getPublicKeyFromResponse ( context . Background ( ) , b , requestingPublicKeyID )
if err != nil {
2021-07-05 12:23:03 +01:00
return nil , false , fmt . Errorf ( "error getting key %s from response %s: %s" , requestingPublicKeyID . String ( ) , string ( b ) , err )
2021-05-21 14:48:26 +01:00
}
2021-05-08 13:25:55 +01:00
2021-05-21 14:48:26 +01:00
// we should be able to get the actual key embedded in the vocab.W3IDSecurityV1PublicKey
pkPemProp := requestingPublicKey . GetW3IDSecurityV1PublicKeyPem ( )
if pkPemProp == nil || ! pkPemProp . IsXMLSchemaString ( ) {
2021-07-05 12:23:03 +01:00
return nil , false , errors . New ( "publicKeyPem property is not provided or it is not embedded as a value" )
2021-05-21 14:48:26 +01:00
}
2021-05-08 13:25:55 +01:00
2021-05-21 14:48:26 +01:00
// and decode the PEM so that we can parse it as a golang public key
pubKeyPem := pkPemProp . Get ( )
block , _ := pem . Decode ( [ ] byte ( pubKeyPem ) )
if block == nil || block . Type != "PUBLIC KEY" {
2021-07-05 12:23:03 +01:00
return nil , false , errors . New ( "could not decode publicKeyPem to PUBLIC KEY pem block type" )
2021-05-21 14:48:26 +01:00
}
2021-05-08 13:25:55 +01:00
2021-05-21 14:48:26 +01:00
publicKey , err = x509 . ParsePKIXPublicKey ( block . Bytes )
if err != nil {
2021-07-05 12:23:03 +01:00
return nil , false , fmt . Errorf ( "could not parse public key from block bytes: %s" , err )
2021-05-21 14:48:26 +01:00
}
// all good! we just need the URI of the key owner to return
pkOwnerProp := requestingPublicKey . GetW3IDSecurityV1Owner ( )
if pkOwnerProp == nil || ! pkOwnerProp . IsIRI ( ) {
2021-07-05 12:23:03 +01:00
return nil , false , errors . New ( "publicKeyOwner property is not provided or it is not embedded as a value" )
2021-05-21 14:48:26 +01:00
}
pkOwnerURI = pkOwnerProp . GetIRI ( )
2021-05-08 13:25:55 +01:00
}
2021-08-10 12:32:39 +01:00
// after all that, public key should be defined
2021-05-21 14:48:26 +01:00
if publicKey == nil {
2021-07-05 12:23:03 +01:00
return nil , false , errors . New ( "returned public key was empty" )
2021-05-08 13:25:55 +01:00
}
// do the actual authentication here!
2021-08-10 12:32:39 +01:00
algos := [ ] httpsig . Algorithm {
httpsig . RSA_SHA512 ,
httpsig . RSA_SHA256 ,
httpsig . ED25519 ,
}
for _ , algo := range algos {
l . Tracef ( "trying algo: %s" , algo )
if err := verifier . Verify ( publicKey , algo ) ; err == nil {
l . Tracef ( "authentication for %s PASSED with algorithm %s" , pkOwnerURI , algo )
return pkOwnerURI , true , nil
}
l . Tracef ( "authentication for %s NOT PASSED with algorithm %s: %s" , pkOwnerURI , algo , err )
2021-05-08 13:25:55 +01:00
}
2021-08-10 12:32:39 +01:00
l . Infof ( "authentication not passed for %s" , pkOwnerURI )
return nil , false , nil
2021-05-08 13:25:55 +01:00
}