Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 1 | /* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */ |
Davide Pesavento | 899b278 | 2019-04-29 20:00:03 -0400 | [diff] [blame] | 2 | /* |
Davide Pesavento | af4e4e7 | 2024-01-26 14:30:11 -0500 | [diff] [blame] | 3 | * Copyright (c) 2014-2024, Regents of the University of California |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 4 | * |
| 5 | * NAC library is free software: you can redistribute it and/or modify it under the |
| 6 | * terms of the GNU Lesser General Public License as published by the Free Software |
| 7 | * Foundation, either version 3 of the License, or (at your option) any later version. |
| 8 | * |
| 9 | * NAC library is distributed in the hope that it will be useful, but WITHOUT ANY |
| 10 | * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A |
| 11 | * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. |
| 12 | * |
| 13 | * You should have received copies of the GNU General Public License and GNU Lesser |
| 14 | * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see |
| 15 | * <http://www.gnu.org/licenses/>. |
| 16 | * |
| 17 | * See AUTHORS.md for complete list of NAC library authors and contributors. |
| 18 | */ |
| 19 | |
| 20 | #include "encryptor.hpp" |
| 21 | |
Davide Pesavento | c264949 | 2020-12-22 21:43:35 -0500 | [diff] [blame] | 22 | #include <ndn-cxx/security/transform/block-cipher.hpp> |
| 23 | #include <ndn-cxx/security/transform/buffer-source.hpp> |
| 24 | #include <ndn-cxx/security/transform/stream-sink.hpp> |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 25 | #include <ndn-cxx/util/logger.hpp> |
Davide Pesavento | 2e5b7b1 | 2022-09-19 23:30:44 -0400 | [diff] [blame] | 26 | #include <ndn-cxx/util/random.hpp> |
| 27 | |
| 28 | #include <boost/lexical_cast.hpp> |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 29 | |
Davide Pesavento | bde084f | 2022-04-17 00:21:35 -0400 | [diff] [blame] | 30 | namespace ndn::nac { |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 31 | |
| 32 | NDN_LOG_INIT(nac.Encryptor); |
| 33 | |
Davide Pesavento | 2e5b7b1 | 2022-09-19 23:30:44 -0400 | [diff] [blame] | 34 | constexpr size_t N_RETRIES = 3; |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 35 | |
| 36 | Encryptor::Encryptor(const Name& accessPrefix, |
| 37 | const Name& ckPrefix, SigningInfo ckDataSigningInfo, |
| 38 | const ErrorCallback& onFailure, |
Davide Pesavento | ba3f689 | 2020-12-08 22:18:35 -0500 | [diff] [blame] | 39 | Validator&, KeyChain& keyChain, Face& face) |
| 40 | : m_accessPrefix(accessPrefix) |
| 41 | , m_ckPrefix(ckPrefix) |
| 42 | , m_ckBits(AES_KEY_SIZE) |
| 43 | , m_ckDataSigningInfo(std::move(ckDataSigningInfo)) |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 44 | , m_isKekRetrievalInProgress(false) |
Alexander Afanasyev | da366d8 | 2018-06-29 18:18:02 -0400 | [diff] [blame] | 45 | , m_onFailure(onFailure) |
Davide Pesavento | ba3f689 | 2020-12-08 22:18:35 -0500 | [diff] [blame] | 46 | , m_keyChain(keyChain) |
| 47 | , m_face(face) |
Davide Pesavento | 74b3a7e | 2023-11-11 17:40:03 -0500 | [diff] [blame] | 48 | , m_scheduler(face.getIoContext()) |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 49 | { |
Alexander Afanasyev | da366d8 | 2018-06-29 18:18:02 -0400 | [diff] [blame] | 50 | regenerateCk(); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 51 | |
Davide Pesavento | d51d960 | 2019-07-20 23:33:06 -0400 | [diff] [blame] | 52 | auto serveFromIms = [this] (const Name&, const Interest& interest) { |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 53 | auto data = m_ims.find(interest); |
| 54 | if (data != nullptr) { |
| 55 | NDN_LOG_DEBUG("Serving " << data->getName() << " from InMemoryStorage"); |
| 56 | m_face.put(*data); |
| 57 | } |
| 58 | else { |
| 59 | NDN_LOG_DEBUG("Didn't find CK data for " << interest.getName()); |
| 60 | // send NACK? |
| 61 | } |
| 62 | }; |
| 63 | |
| 64 | auto handleError = [] (const Name& prefix, const std::string& msg) { |
| 65 | NDN_LOG_ERROR("Failed to register prefix " << prefix << ": " << msg); |
| 66 | }; |
| 67 | |
Davide Pesavento | d51d960 | 2019-07-20 23:33:06 -0400 | [diff] [blame] | 68 | m_ckReg = m_face.setInterestFilter(Name(ckPrefix).append(CK), serveFromIms, handleError); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 69 | } |
| 70 | |
| 71 | Encryptor::~Encryptor() |
| 72 | { |
Davide Pesavento | d51d960 | 2019-07-20 23:33:06 -0400 | [diff] [blame] | 73 | m_kekPendingInterest.cancel(); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 74 | } |
| 75 | |
| 76 | void |
Alexander Afanasyev | da366d8 | 2018-06-29 18:18:02 -0400 | [diff] [blame] | 77 | Encryptor::retryFetchingKek() |
| 78 | { |
| 79 | if (m_isKekRetrievalInProgress) { |
| 80 | return; |
| 81 | } |
| 82 | |
| 83 | NDN_LOG_DEBUG("Retrying fetching of KEK"); |
| 84 | m_isKekRetrievalInProgress = true; |
| 85 | fetchKekAndPublishCkData([&] { |
| 86 | NDN_LOG_DEBUG("KEK retrieved and published"); |
| 87 | m_isKekRetrievalInProgress = false; |
| 88 | }, |
| 89 | [=] (const ErrorCode& code, const std::string& msg) { |
| 90 | NDN_LOG_ERROR("Failed to retrieved KEK: " + msg); |
| 91 | m_isKekRetrievalInProgress = false; |
| 92 | m_onFailure(code, msg); |
| 93 | }, |
| 94 | N_RETRIES); |
| 95 | } |
| 96 | |
| 97 | void |
| 98 | Encryptor::regenerateCk() |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 99 | { |
| 100 | m_ckName = m_ckPrefix; |
| 101 | m_ckName |
| 102 | .append(CK) |
| 103 | .appendVersion(); // version = ID of CK |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 104 | NDN_LOG_DEBUG("Generating new CK: " << m_ckName); |
Davide Pesavento | 714dba0 | 2022-03-17 20:46:28 -0400 | [diff] [blame] | 105 | random::generateSecureBytes(m_ckBits); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 106 | |
| 107 | // one implication: if CK updated before KEK fetched, KDK for the old CK will not be published |
| 108 | if (!m_kek) { |
Alexander Afanasyev | da366d8 | 2018-06-29 18:18:02 -0400 | [diff] [blame] | 109 | retryFetchingKek(); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 110 | } |
| 111 | else { |
Alexander Afanasyev | da366d8 | 2018-06-29 18:18:02 -0400 | [diff] [blame] | 112 | makeAndPublishCkData(m_onFailure); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 113 | } |
| 114 | } |
| 115 | |
| 116 | EncryptedContent |
Davide Pesavento | 714dba0 | 2022-03-17 20:46:28 -0400 | [diff] [blame] | 117 | Encryptor::encrypt(span<const uint8_t> data) |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 118 | { |
Davide Pesavento | c264949 | 2020-12-22 21:43:35 -0500 | [diff] [blame] | 119 | // Generate IV |
Davide Pesavento | af4e4e7 | 2024-01-26 14:30:11 -0500 | [diff] [blame] | 120 | auto iv = std::make_shared<Buffer>(AES_IV_SIZE); |
Davide Pesavento | 714dba0 | 2022-03-17 20:46:28 -0400 | [diff] [blame] | 121 | random::generateSecureBytes(*iv); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 122 | |
| 123 | OBufferStream os; |
Davide Pesavento | 714dba0 | 2022-03-17 20:46:28 -0400 | [diff] [blame] | 124 | security::transform::bufferSource(data) |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 125 | >> security::transform::blockCipher(BlockCipherAlgorithm::AES_CBC, |
| 126 | CipherOperator::ENCRYPT, |
Davide Pesavento | 714dba0 | 2022-03-17 20:46:28 -0400 | [diff] [blame] | 127 | m_ckBits, *iv) |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 128 | >> security::transform::streamSink(os); |
| 129 | |
| 130 | EncryptedContent content; |
| 131 | content.setIv(iv); |
| 132 | content.setPayload(os.buf()); |
| 133 | content.setKeyLocator(m_ckName); |
| 134 | |
| 135 | return content; |
| 136 | } |
| 137 | |
| 138 | void |
| 139 | Encryptor::fetchKekAndPublishCkData(const std::function<void()>& onReady, |
| 140 | const ErrorCallback& onFailure, |
| 141 | size_t nTriesLeft) |
| 142 | { |
Davide Pesavento | d51d960 | 2019-07-20 23:33:06 -0400 | [diff] [blame] | 143 | // interest for <access-prefix>/KEK to retrieve <access-prefix>/KEK/<key-id> KekData |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 144 | |
| 145 | NDN_LOG_DEBUG("Fetching KEK " << Name(m_accessPrefix).append(KEK)); |
| 146 | |
Davide Pesavento | d51d960 | 2019-07-20 23:33:06 -0400 | [diff] [blame] | 147 | auto kekInterest = Interest(Name(m_accessPrefix).append(KEK)) |
| 148 | .setCanBePrefix(true) |
| 149 | .setMustBeFresh(true); |
| 150 | m_kekPendingInterest = m_face.expressInterest(kekInterest, |
| 151 | [=] (const Interest&, const Data& kek) { |
| 152 | // @todo verify if the key is legit |
| 153 | m_kek = kek; |
| 154 | if (makeAndPublishCkData(onFailure)) { |
| 155 | onReady(); |
| 156 | } |
| 157 | // otherwise, failure has been already declared |
| 158 | }, |
| 159 | [=] (const Interest& i, const lp::Nack& nack) { |
| 160 | if (nTriesLeft > 1) { |
| 161 | m_scheduler.schedule(RETRY_DELAY_AFTER_NACK, [=] { |
| 162 | fetchKekAndPublishCkData(onReady, onFailure, nTriesLeft - 1); |
| 163 | }); |
| 164 | } |
| 165 | else { |
| 166 | onFailure(ErrorCode::KekRetrievalFailure, "Retrieval of KEK [" + i.getName().toUri() + |
| 167 | "] failed. Got NACK with reason " + boost::lexical_cast<std::string>(nack.getReason())); |
| 168 | NDN_LOG_DEBUG("Scheduling retry from NACK"); |
| 169 | m_scheduler.schedule(RETRY_DELAY_KEK_RETRIEVAL, [this] { retryFetchingKek(); }); |
| 170 | } |
| 171 | }, |
| 172 | [=] (const Interest& i) { |
| 173 | if (nTriesLeft > 1) { |
| 174 | fetchKekAndPublishCkData(onReady, onFailure, nTriesLeft - 1); |
| 175 | } |
| 176 | else { |
| 177 | onFailure(ErrorCode::KekRetrievalTimeout, |
| 178 | "Retrieval of KEK [" + i.getName().toUri() + "] timed out"); |
| 179 | NDN_LOG_DEBUG("Scheduling retry after all timeouts"); |
| 180 | m_scheduler.schedule(RETRY_DELAY_KEK_RETRIEVAL, [this] { retryFetchingKek(); }); |
| 181 | } |
| 182 | }); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 183 | } |
| 184 | |
Alexander Afanasyev | c993428 | 2018-07-17 18:41:36 -0400 | [diff] [blame] | 185 | bool |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 186 | Encryptor::makeAndPublishCkData(const ErrorCallback& onFailure) |
| 187 | { |
| 188 | try { |
| 189 | PublicKey kek; |
Davide Pesavento | 714dba0 | 2022-03-17 20:46:28 -0400 | [diff] [blame] | 190 | kek.loadPkcs8(m_kek->getContent().value_bytes()); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 191 | |
| 192 | EncryptedContent content; |
Davide Pesavento | 714dba0 | 2022-03-17 20:46:28 -0400 | [diff] [blame] | 193 | content.setPayload(kek.encrypt(m_ckBits)); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 194 | |
Davide Pesavento | af4e4e7 | 2024-01-26 14:30:11 -0500 | [diff] [blame] | 195 | auto ckData = std::make_shared<Data>(Name(m_ckName).append(ENCRYPTED_BY).append(m_kek->getName())); |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 196 | ckData->setContent(content.wireEncode()); |
| 197 | // FreshnessPeriod can serve as a soft access control for revoking access |
| 198 | ckData->setFreshnessPeriod(DEFAULT_CK_FRESHNESS_PERIOD); |
| 199 | m_keyChain.sign(*ckData, m_ckDataSigningInfo); |
| 200 | m_ims.insert(*ckData); |
| 201 | |
| 202 | NDN_LOG_DEBUG("Publishing CK data: " << ckData->getName()); |
Alexander Afanasyev | c993428 | 2018-07-17 18:41:36 -0400 | [diff] [blame] | 203 | return true; |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 204 | } |
Davide Pesavento | d51d960 | 2019-07-20 23:33:06 -0400 | [diff] [blame] | 205 | catch (const std::runtime_error&) { |
Davide Pesavento | ba3f689 | 2020-12-08 22:18:35 -0500 | [diff] [blame] | 206 | onFailure(ErrorCode::EncryptionFailure, |
| 207 | "Failed to encrypt generated CK with KEK " + m_kek->getName().toUri()); |
Alexander Afanasyev | c993428 | 2018-07-17 18:41:36 -0400 | [diff] [blame] | 208 | return false; |
Alexander Afanasyev | 1a21e10 | 2018-06-13 20:33:21 -0400 | [diff] [blame] | 209 | } |
| 210 | } |
| 211 | |
Davide Pesavento | bde084f | 2022-04-17 00:21:35 -0400 | [diff] [blame] | 212 | } // namespace ndn::nac |