Sealed sender support

pull/721/head
Maxim Shishmarev 5 years ago
parent dc0571137c
commit b405b150cc

@ -102,37 +102,17 @@ function _createServerCertificateFromBuffer(serialized) {
// public SenderCertificate(byte[] serialized) // public SenderCertificate(byte[] serialized)
function _createSenderCertificateFromBuffer(serialized) { function _createSenderCertificateFromBuffer(serialized) {
const wrapper = textsecure.protobuf.SenderCertificate.decode(serialized); const cert = textsecure.protobuf.SenderCertificate.decode(serialized);
if (!wrapper.signature || !wrapper.certificate) { if (!cert.senderDevice || !cert.sender) {
throw new Error('Missing fields');
}
const certificate = textsecure.protobuf.SenderCertificate.Certificate.decode(
wrapper.certificate.toArrayBuffer()
);
if (
!certificate.signer ||
!certificate.identityKey ||
!certificate.senderDevice ||
!certificate.expires ||
!certificate.sender
) {
throw new Error('Missing fields'); throw new Error('Missing fields');
} }
return { return {
sender: certificate.sender, sender: cert.sender,
senderDevice: certificate.senderDevice, senderDevice: cert.senderDevice,
expires: certificate.expires.toNumber(),
identityKey: certificate.identityKey.toArrayBuffer(),
signer: _createServerCertificateFromBuffer(
certificate.signer.toArrayBuffer()
),
certificate: wrapper.certificate.toArrayBuffer(), certificate: cert.toArrayBuffer(),
signature: wrapper.signature.toArrayBuffer(),
serialized, serialized,
}; };
@ -257,9 +237,7 @@ function _createUnidentifiedSenderMessageContent(
) { ) {
const innerMessage = new textsecure.protobuf.UnidentifiedSenderMessage.Message(); const innerMessage = new textsecure.protobuf.UnidentifiedSenderMessage.Message();
innerMessage.type = _getProtoMessageType(type); innerMessage.type = _getProtoMessageType(type);
innerMessage.senderCertificate = textsecure.protobuf.SenderCertificate.decode( innerMessage.senderCertificate = senderCertificate;
senderCertificate.serialized
);
innerMessage.content = content; innerMessage.content = content;
return { return {
@ -392,15 +370,6 @@ SecretSessionCipher.prototype = {
messageBytes messageBytes
); );
await validator.validate(content.senderCertificate, timestamp);
if (
!constantTimeEqual(content.senderCertificate.identityKey, staticKeyBytes)
) {
throw new Error(
"Sender's certificate key does not match key used in message"
);
}
const { sender, senderDevice } = content.senderCertificate; const { sender, senderDevice } = content.senderCertificate;
const { number, deviceId } = me || {}; const { number, deviceId } = me || {};
if (sender === number && senderDevice === deviceId) { if (sender === number && senderDevice === deviceId) {

@ -429,16 +429,47 @@ OutgoingMessage.prototype = {
options.messageKeysLimit = false; options.messageKeysLimit = false;
} }
ciphers[address.getDeviceId()] = sessionCipher; let content;
let type;
let destinationRegistrationId;
// Encrypt our plain text if (window.lokiFeatureFlags.useSealedSender) {
const ciphertext = await sessionCipher.encrypt(plaintext); const secretSessionCipher = new window.Signal.Metadata.SecretSessionCipher(
if (!enableFallBackEncryption) { textsecure.storage.protocol
// eslint-disable-next-line no-param-reassign
ciphertext.body = new Uint8Array(
dcodeIO.ByteBuffer.wrap(ciphertext.body, 'binary').toArrayBuffer()
); );
ciphers[address.getDeviceId()] = secretSessionCipher;
var senderCert = new textsecure.protobuf.SenderCertificate();
senderCert.sender = ourKey;
senderCert.senderDevice = deviceId;
const ciphertext = await secretSessionCipher.encrypt(
address,
senderCert,
plaintext
);
type = textsecure.protobuf.Envelope.Type.UNIDENTIFIED_SENDER;
content = window.Signal.Crypto.arrayBufferToBase64(ciphertext);
destinationRegistrationId = null;
} else {
ciphers[address.getDeviceId()] = sessionCipher;
const ciphertext = await sessionCipher.encrypt(plaintext);
if (!enableFallBackEncryption) {
// eslint-disable-next-line no-param-reassign
ciphertext.body = new Uint8Array(
dcodeIO.ByteBuffer.wrap(ciphertext.body, 'binary').toArrayBuffer()
);
}
type = ciphertext.type;
content = ciphertext.body;
destinationRegistrationId = ciphertext.registrationId;
} }
const getTTL = type => { const getTTL = type => {
switch (type) { switch (type) {
case 'friend-request': case 'friend-request':
@ -458,12 +489,12 @@ OutgoingMessage.prototype = {
const ttl = getTTL(thisDeviceMessageType); const ttl = getTTL(thisDeviceMessageType);
return { return {
type: ciphertext.type, // FallBackSessionCipher sets this to FRIEND_REQUEST type, // FallBackSessionCipher sets this to FRIEND_REQUEST
ttl, ttl,
ourKey, ourKey,
sourceDevice: 1, sourceDevice: 1,
destinationRegistrationId: ciphertext.registrationId, destinationRegistrationId,
content: ciphertext.body, content,
pubKey: devicePubKey, pubKey: devicePubKey,
}; };
}) })

@ -495,10 +495,12 @@ window.pubkeyPattern = /@[a-fA-F0-9]{64,66}\b/g;
// Limited due to the proof-of-work requirement // Limited due to the proof-of-work requirement
window.SMALL_GROUP_SIZE_LIMIT = 10; window.SMALL_GROUP_SIZE_LIMIT = 10;
// TODO: activate SealedSender once it is ready on all platforms
window.lokiFeatureFlags = { window.lokiFeatureFlags = {
multiDeviceUnpairing: true, multiDeviceUnpairing: true,
privateGroupChats: false, privateGroupChats: false,
useSnodeProxy: false, useSnodeProxy: false,
useSealedSender: false,
}; };
// eslint-disable-next-line no-extend-native,func-names // eslint-disable-next-line no-extend-native,func-names

@ -13,17 +13,10 @@ message ServerCertificate {
optional bytes signature = 2; optional bytes signature = 2;
} }
// This should perhaps be renamed to something like `SenderInfo`
message SenderCertificate { message SenderCertificate {
message Certificate { optional string sender = 1;
optional string sender = 1; optional uint32 senderDevice = 2;
optional uint32 senderDevice = 2;
optional fixed64 expires = 3;
optional bytes identityKey = 4;
optional ServerCertificate signer = 5;
}
optional bytes certificate = 1;
optional bytes signature = 2;
} }
message UnidentifiedSenderMessage { message UnidentifiedSenderMessage {

Loading…
Cancel
Save