diff --git a/AndroidManifest.xml b/AndroidManifest.xml index 024c919258..21e50c9ff4 100644 --- a/AndroidManifest.xml +++ b/AndroidManifest.xml @@ -38,7 +38,8 @@ android:protectionLevel="signature" /> - @@ -124,6 +125,9 @@ android:label="@string/AndroidManifest__public_identity_key" android:configChanges="touchscreen|keyboard|keyboardHidden|orientation|screenLayout|screenSize"/> + + diff --git a/res/drawable-hdpi/refresh.png b/res/drawable-hdpi/refresh.png new file mode 100644 index 0000000000..bb9d855f77 Binary files /dev/null and b/res/drawable-hdpi/refresh.png differ diff --git a/res/drawable-mdpi/refresh.png b/res/drawable-mdpi/refresh.png new file mode 100644 index 0000000000..bd611e8e24 Binary files /dev/null and b/res/drawable-mdpi/refresh.png differ diff --git a/res/drawable-xhdpi/refresh.png b/res/drawable-xhdpi/refresh.png new file mode 100644 index 0000000000..a7fdc0dfcb Binary files /dev/null and b/res/drawable-xhdpi/refresh.png differ diff --git a/res/menu/local_identity.xml b/res/menu/local_identity.xml new file mode 100644 index 0000000000..6f97941610 --- /dev/null +++ b/res/menu/local_identity.xml @@ -0,0 +1,7 @@ + + + + + \ No newline at end of file diff --git a/res/values/strings.xml b/res/values/strings.xml index 9d0d384358..870b9c9558 100644 --- a/res/values/strings.xml +++ b/res/values/strings.xml @@ -257,6 +257,22 @@ Mark all as read Mark as read + + Regenerating... + Regenerating identity + key... + + Regenerated! + Reset Identity Key? + + Caution! By regenerating your identity key, your current identity key will be permanently lost, + and your existing contacts will receive warnings when establishing new secure sessions with you. + Are you sure you would like to continue? + + Cancel + Continue + + Currently unable to send your SMS message. It will be sent once service becomes available. @@ -332,6 +348,7 @@ Import a plaintext backup file. Compatible with \'SMSBackup And Restore.\' + Regenerate Key TEXTSECURE PASSPHRASE @@ -455,6 +472,7 @@ Appearance Theme Default + Language @@ -521,7 +539,6 @@ Verified - Language diff --git a/src/org/thoughtcrime/securesms/ApplicationListener.java b/src/org/thoughtcrime/securesms/ApplicationListener.java new file mode 100644 index 0000000000..9ce69f3020 --- /dev/null +++ b/src/org/thoughtcrime/securesms/ApplicationListener.java @@ -0,0 +1,37 @@ +/* + * Copyright (C) 2013 Open Whisper Systems + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . + */ +package org.thoughtcrime.securesms; + +import android.app.Application; + +import org.thoughtcrime.securesms.crypto.PRNGFixes; + +/** + * Will be called once when the TextSecure process is created. + * + * We're using this as an insertion point to patch up the Android PRNG disaster. + * + * @author Moxie Marlinspike + */ +public class ApplicationListener extends Application { + + @Override + public void onCreate() { + PRNGFixes.apply(); + } + +} diff --git a/src/org/thoughtcrime/securesms/ConversationListActivity.java b/src/org/thoughtcrime/securesms/ConversationListActivity.java index 7f17cbe2a2..45166143f3 100644 --- a/src/org/thoughtcrime/securesms/ConversationListActivity.java +++ b/src/org/thoughtcrime/securesms/ConversationListActivity.java @@ -106,10 +106,8 @@ public class ConversationListActivity extends PassphraseRequiredSherlockFragment intent = new Intent(this, ImportExportActivity.class); intent.putExtra("master_secret", masterSecret); } else if (selected.equals("my_identity_key")) { - intent = new Intent(this, ViewIdentityActivity.class); - intent.putExtra("identity_key", IdentityKeyUtil.getIdentityKey(this)); - intent.putExtra("title", getString(R.string.ApplicationPreferencesActivity_my) + " " + - getString(R.string.ViewIdentityActivity_identity_fingerprint)); + intent = new Intent(this, ViewLocalIdentityActivity.class); + intent.putExtra("master_secret", masterSecret); } else if (selected.equals("contact_identity_keys")) { intent = new Intent(this, ReviewIdentitiesActivity.class); intent.putExtra("master_secret", masterSecret); diff --git a/src/org/thoughtcrime/securesms/ViewIdentityActivity.java b/src/org/thoughtcrime/securesms/ViewIdentityActivity.java index ba650d35ca..b145b1bd7e 100644 --- a/src/org/thoughtcrime/securesms/ViewIdentityActivity.java +++ b/src/org/thoughtcrime/securesms/ViewIdentityActivity.java @@ -37,6 +37,10 @@ public class ViewIdentityActivity extends KeyScanningActivity { getSupportActionBar().setDisplayHomeAsUpEnabled(true); setContentView(R.layout.view_identity_activity); + initialize(); + } + + protected void initialize() { initializeResources(); initializeFingerprint(); } diff --git a/src/org/thoughtcrime/securesms/ViewLocalIdentityActivity.java b/src/org/thoughtcrime/securesms/ViewLocalIdentityActivity.java new file mode 100644 index 0000000000..cc87d43162 --- /dev/null +++ b/src/org/thoughtcrime/securesms/ViewLocalIdentityActivity.java @@ -0,0 +1,123 @@ +/* + * Copyright (C) 2011 Whisper Systems + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . + */ +package org.thoughtcrime.securesms; + +import android.app.AlertDialog; +import android.app.ProgressDialog; +import android.content.DialogInterface; +import android.os.AsyncTask; +import android.os.Bundle; +import android.widget.Toast; + +import com.actionbarsherlock.view.Menu; +import com.actionbarsherlock.view.MenuInflater; +import com.actionbarsherlock.view.MenuItem; +import org.thoughtcrime.securesms.crypto.IdentityKeyUtil; +import org.thoughtcrime.securesms.crypto.MasterSecret; + +/** + * Activity that displays the local identity key and offers the option to regenerate it. + * + * @author Moxie Marlinspike + */ +public class ViewLocalIdentityActivity extends ViewIdentityActivity { + + private MasterSecret masterSecret; + + public void onCreate(Bundle bundle) { + this.masterSecret = getIntent().getParcelableExtra("master_secret"); + + getIntent().putExtra("identity_key", IdentityKeyUtil.getIdentityKey(this)); + getIntent().putExtra("title", getString(R.string.ApplicationPreferencesActivity_my) + " " + + getString(R.string.ViewIdentityActivity_identity_fingerprint)); + super.onCreate(bundle); + } + + @Override + public boolean onPrepareOptionsMenu(Menu menu) { + super.onPrepareOptionsMenu(menu); + + MenuInflater inflater = this.getSupportMenuInflater(); + inflater.inflate(R.menu.local_identity, menu); + + return true; + } + + @Override + public boolean onOptionsItemSelected(MenuItem item) { + super.onOptionsItemSelected(item); + + switch (item.getItemId()) { + case R.id.menu_regenerate_key: promptToRegenerateIdentityKey(); return true; + case android.R.id.home: finish(); return true; + } + + return false; + } + + private void promptToRegenerateIdentityKey() { + AlertDialog.Builder dialog = new AlertDialog.Builder(this); + dialog.setIcon(android.R.drawable.ic_dialog_alert); + dialog.setTitle(getString(R.string.ViewLocalIdentityActivity_reset_identity_key)); + dialog.setMessage(getString(R.string.ViewLocalIdentityActivity_by_regenerating_your_identity_key_your_existing_contacts_will_receive_warnings)); + dialog.setNegativeButton(getString(R.string.ViewLocalIdentityActivity_cancel), null); + dialog.setPositiveButton(getString(R.string.ViewLocalIdentityActivity_continue), + new DialogInterface.OnClickListener() { + @Override + public void onClick(DialogInterface dialog, int which) { + regenerateIdentityKey(); + } + }); + dialog.show(); + } + + private void regenerateIdentityKey() { + new AsyncTask() { + private ProgressDialog progressDialog; + + @Override + protected void onPreExecute() { + progressDialog = ProgressDialog.show(ViewLocalIdentityActivity.this, + getString(R.string.ViewLocalIdentityActivity_regenerating), + getString(R.string.ViewLocalIdentityActivity_regenerating_identity_key), + true, false); + } + + @Override + public Void doInBackground(Void... params) { + IdentityKeyUtil.generateIdentityKeys(ViewLocalIdentityActivity.this, masterSecret); + return null; + } + + @Override + protected void onPostExecute(Void result) { + if (progressDialog != null) + progressDialog.dismiss(); + + Toast.makeText(ViewLocalIdentityActivity.this, + getString(R.string.ViewLocalIdentityActivity_regenerated), + Toast.LENGTH_LONG).show(); + + getIntent().putExtra("identity_key", + IdentityKeyUtil.getIdentityKey(ViewLocalIdentityActivity.this)); + initialize(); + } + + }.execute(); + } + +} diff --git a/src/org/thoughtcrime/securesms/crypto/PRNGFixes.java b/src/org/thoughtcrime/securesms/crypto/PRNGFixes.java new file mode 100644 index 0000000000..aad1338285 --- /dev/null +++ b/src/org/thoughtcrime/securesms/crypto/PRNGFixes.java @@ -0,0 +1,337 @@ +package org.thoughtcrime.securesms.crypto; + +import android.os.Build; +import android.os.Process; + +import java.io.ByteArrayOutputStream; +import java.io.DataInputStream; +import java.io.DataOutputStream; +import java.io.File; +import java.io.FileInputStream; +import java.io.FileOutputStream; +import java.io.IOException; +import java.io.OutputStream; +import java.io.UnsupportedEncodingException; +import java.security.NoSuchAlgorithmException; +import java.security.Provider; +import java.security.SecureRandom; +import java.security.SecureRandomSpi; +import java.security.Security; + +/** + * This class is taken directly from the Android blog post announcing this bug: + * http://android-developers.blogspot.com/2013/08/some-securerandom-thoughts.html + * + * Since I still don't know exactly what the source of this bug was, I'm using + * this class verbatim under the assumption that the Android team knows what + * they're doing. Although, at this point, that is perhaps a foolish assumption. + * + */ + +/** + * Fixes for the output of the default PRNG having low entropy. + * + * The fixes need to be applied via {@link #apply()} before any use of Java + * Cryptography Architecture primitives. A good place to invoke them is in the + * application's {@code onCreate}. + */ +public final class PRNGFixes { + + private static final int VERSION_CODE_JELLY_BEAN = 16; + private static final int VERSION_CODE_JELLY_BEAN_MR2 = 18; + private static final byte[] BUILD_FINGERPRINT_AND_DEVICE_SERIAL = + getBuildFingerprintAndDeviceSerial(); + + /** Hidden constructor to prevent instantiation. */ + private PRNGFixes() {} + + /** + * Applies all fixes. + * + * @throws SecurityException if a fix is needed but could not be applied. + */ + public static void apply() { + applyOpenSSLFix(); + installLinuxPRNGSecureRandom(); + } + + /** + * Applies the fix for OpenSSL PRNG having low entropy. Does nothing if the + * fix is not needed. + * + * @throws SecurityException if the fix is needed but could not be applied. + */ + private static void applyOpenSSLFix() throws SecurityException { + if ((Build.VERSION.SDK_INT < VERSION_CODE_JELLY_BEAN) + || (Build.VERSION.SDK_INT > VERSION_CODE_JELLY_BEAN_MR2)) { + // No need to apply the fix + return; + } + + try { + // Mix in the device- and invocation-specific seed. + Class.forName("org.apache.harmony.xnet.provider.jsse.NativeCrypto") + .getMethod("RAND_seed", byte[].class) + .invoke(null, generateSeed()); + + // Mix output of Linux PRNG into OpenSSL's PRNG + int bytesRead = (Integer) Class.forName( + "org.apache.harmony.xnet.provider.jsse.NativeCrypto") + .getMethod("RAND_load_file", String.class, long.class) + .invoke(null, "/dev/urandom", 1024); + if (bytesRead != 1024) { + throw new IOException( + "Unexpected number of bytes read from Linux PRNG: " + + bytesRead); + } + } catch (Exception e) { + throw new SecurityException("Failed to seed OpenSSL PRNG", e); + } + } + + /** + * Installs a Linux PRNG-backed {@code SecureRandom} implementation as the + * default. Does nothing if the implementation is already the default or if + * there is not need to install the implementation. + * + * @throws SecurityException if the fix is needed but could not be applied. + */ + private static void installLinuxPRNGSecureRandom() + throws SecurityException { + if (Build.VERSION.SDK_INT > VERSION_CODE_JELLY_BEAN_MR2) { + // No need to apply the fix + return; + } + + // Install a Linux PRNG-based SecureRandom implementation as the + // default, if not yet installed. + Provider[] secureRandomProviders = + Security.getProviders("SecureRandom.SHA1PRNG"); + if ((secureRandomProviders == null) + || (secureRandomProviders.length < 1) + || (!LinuxPRNGSecureRandomProvider.class.equals( + secureRandomProviders[0].getClass()))) { + Security.insertProviderAt(new LinuxPRNGSecureRandomProvider(), 1); + } + + // Assert that new SecureRandom() and + // SecureRandom.getInstance("SHA1PRNG") return a SecureRandom backed + // by the Linux PRNG-based SecureRandom implementation. + SecureRandom rng1 = new SecureRandom(); + if (!LinuxPRNGSecureRandomProvider.class.equals( + rng1.getProvider().getClass())) { + throw new SecurityException( + "new SecureRandom() backed by wrong Provider: " + + rng1.getProvider().getClass()); + } + + SecureRandom rng2; + try { + rng2 = SecureRandom.getInstance("SHA1PRNG"); + } catch (NoSuchAlgorithmException e) { + throw new SecurityException("SHA1PRNG not available", e); + } + if (!LinuxPRNGSecureRandomProvider.class.equals( + rng2.getProvider().getClass())) { + throw new SecurityException( + "SecureRandom.getInstance(\"SHA1PRNG\") backed by wrong" + + " Provider: " + rng2.getProvider().getClass()); + } + } + + /** + * {@code Provider} of {@code SecureRandom} engines which pass through + * all requests to the Linux PRNG. + */ + private static class LinuxPRNGSecureRandomProvider extends Provider { + + public LinuxPRNGSecureRandomProvider() { + super("LinuxPRNG", + 1.0, + "A Linux-specific random number provider that uses" + + " /dev/urandom"); + // Although /dev/urandom is not a SHA-1 PRNG, some apps + // explicitly request a SHA1PRNG SecureRandom and we thus need to + // prevent them from getting the default implementation whose output + // may have low entropy. + put("SecureRandom.SHA1PRNG", LinuxPRNGSecureRandom.class.getName()); + put("SecureRandom.SHA1PRNG ImplementedIn", "Software"); + } + } + + /** + * {@link SecureRandomSpi} which passes all requests to the Linux PRNG + * ({@code /dev/urandom}). + */ + public static class LinuxPRNGSecureRandom extends SecureRandomSpi { + + /* + * IMPLEMENTATION NOTE: Requests to generate bytes and to mix in a seed + * are passed through to the Linux PRNG (/dev/urandom). Instances of + * this class seed themselves by mixing in the current time, PID, UID, + * build fingerprint, and hardware serial number (where available) into + * Linux PRNG. + * + * Concurrency: Read requests to the underlying Linux PRNG are + * serialized (on sLock) to ensure that multiple threads do not get + * duplicated PRNG output. + */ + + private static final File URANDOM_FILE = new File("/dev/urandom"); + + private static final Object sLock = new Object(); + + /** + * Input stream for reading from Linux PRNG or {@code null} if not yet + * opened. + * + * @GuardedBy("sLock") + */ + private static DataInputStream sUrandomIn; + + /** + * Output stream for writing to Linux PRNG or {@code null} if not yet + * opened. + * + * @GuardedBy("sLock") + */ + private static OutputStream sUrandomOut; + + /** + * Whether this engine instance has been seeded. This is needed because + * each instance needs to seed itself if the client does not explicitly + * seed it. + */ + private boolean mSeeded; + + @Override + protected void engineSetSeed(byte[] bytes) { + try { + OutputStream out; + synchronized (sLock) { + out = getUrandomOutputStream(); + } + out.write(bytes); + out.flush(); + mSeeded = true; + } catch (IOException e) { + throw new SecurityException( + "Failed to mix seed into " + URANDOM_FILE, e); + } + } + + @Override + protected void engineNextBytes(byte[] bytes) { + if (!mSeeded) { + // Mix in the device- and invocation-specific seed. + engineSetSeed(generateSeed()); + } + + try { + DataInputStream in; + synchronized (sLock) { + in = getUrandomInputStream(); + } + synchronized (in) { + in.readFully(bytes); + } + } catch (IOException e) { + throw new SecurityException( + "Failed to read from " + URANDOM_FILE, e); + } + } + + @Override + protected byte[] engineGenerateSeed(int size) { + byte[] seed = new byte[size]; + engineNextBytes(seed); + return seed; + } + + private DataInputStream getUrandomInputStream() { + synchronized (sLock) { + if (sUrandomIn == null) { + // NOTE: Consider inserting a BufferedInputStream between + // DataInputStream and FileInputStream if you need higher + // PRNG output performance and can live with future PRNG + // output being pulled into this process prematurely. + try { + sUrandomIn = new DataInputStream( + new FileInputStream(URANDOM_FILE)); + } catch (IOException e) { + throw new SecurityException("Failed to open " + + URANDOM_FILE + " for reading", e); + } + } + return sUrandomIn; + } + } + + private OutputStream getUrandomOutputStream() { + synchronized (sLock) { + if (sUrandomOut == null) { + try { + sUrandomOut = new FileOutputStream(URANDOM_FILE); + } catch (IOException e) { + throw new SecurityException("Failed to open " + + URANDOM_FILE + " for writing", e); + } + } + return sUrandomOut; + } + } + } + + /** + * Generates a device- and invocation-specific seed to be mixed into the + * Linux PRNG. + */ + private static byte[] generateSeed() { + try { + ByteArrayOutputStream seedBuffer = new ByteArrayOutputStream(); + DataOutputStream seedBufferOut = + new DataOutputStream(seedBuffer); + seedBufferOut.writeLong(System.currentTimeMillis()); + seedBufferOut.writeLong(System.nanoTime()); + seedBufferOut.writeInt(Process.myPid()); + seedBufferOut.writeInt(Process.myUid()); + seedBufferOut.write(BUILD_FINGERPRINT_AND_DEVICE_SERIAL); + seedBufferOut.close(); + return seedBuffer.toByteArray(); + } catch (IOException e) { + throw new SecurityException("Failed to generate seed", e); + } + } + + /** + * Gets the hardware serial number of this device. + * + * @return serial number or {@code null} if not available. + */ + private static String getDeviceSerialNumber() { + // We're using the Reflection API because Build.SERIAL is only available + // since API Level 9 (Gingerbread, Android 2.3). + try { + return (String) Build.class.getField("SERIAL").get(null); + } catch (Exception ignored) { + return null; + } + } + + private static byte[] getBuildFingerprintAndDeviceSerial() { + StringBuilder result = new StringBuilder(); + String fingerprint = Build.FINGERPRINT; + if (fingerprint != null) { + result.append(fingerprint); + } + String serial = getDeviceSerialNumber(); + if (serial != null) { + result.append(serial); + } + try { + return result.toString().getBytes("UTF-8"); + } catch (UnsupportedEncodingException e) { + throw new RuntimeException("UTF-8 encoding not supported"); + } + } +} \ No newline at end of file