2022-04-01 09:18:18 -06:00
# MIT License
#
2024-09-04 09:37:18 -06:00
# Copyright (c) 2016-2024 Mark Qvist / unsigned.io and contributors.
2022-04-01 09:18:18 -06:00
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all
# copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
# SOFTWARE.
2018-03-16 04:40:37 -06:00
import math
2018-03-19 11:11:50 -06:00
import os
2018-04-04 06:14:22 -06:00
import RNS
2018-03-19 13:51:26 -06:00
import time
import atexit
2022-06-07 04:51:41 -06:00
import hashlib
2024-09-05 07:02:22 -06:00
import threading
2022-06-07 04:51:41 -06:00
2020-04-22 04:07:13 -06:00
from . vendor import umsgpack as umsgpack
2022-06-08 04:29:51 -06:00
2022-06-08 11:47:09 -06:00
from RNS . Cryptography import X25519PrivateKey , X25519PublicKey , Ed25519PrivateKey , Ed25519PublicKey
2024-11-22 07:19:12 -07:00
from RNS . Cryptography import Token
2018-03-16 03:50:37 -06:00
2022-03-07 16:38:51 -07:00
2018-03-16 03:50:37 -06:00
class Identity :
2021-05-16 13:58:50 -06:00
"""
This class is used to manage identities in Reticulum . It provides methods
for encryption , decryption , signatures and verification , and is the basis
for all encrypted communication over Reticulum networks .
2021-05-20 07:31:38 -06:00
: param create_keys : Specifies whether new encryption and signing keys should be generated .
2021-05-16 13:58:50 -06:00
"""
2021-05-20 07:31:38 -06:00
CURVE = " Curve25519 "
2021-05-16 13:58:50 -06:00
"""
2021-05-20 07:31:38 -06:00
The curve used for Elliptic Curve DH key exchanges
2021-05-16 13:58:50 -06:00
"""
2020-08-13 04:15:56 -06:00
2021-05-20 07:31:38 -06:00
KEYSIZE = 256 * 2
"""
2024-09-05 07:02:22 -06:00
X .25519 key size in bits . A complete key is the concatenation of a 256 bit encryption key , and a 256 bit signing key .
2024-09-04 09:37:18 -06:00
"""
RATCHETSIZE = 256
2024-09-05 07:02:22 -06:00
"""
X .25519 ratchet key size in bits .
"""
2024-09-04 09:37:18 -06:00
RATCHET_EXPIRY = 60 * 60 * 24 * 30
2024-09-05 07:02:22 -06:00
"""
The expiry time for received ratchets in seconds , defaults to 30 days . Reticulum will always use the most recently
announced ratchet , and remember it for up to ` ` RATCHET_EXPIRY ` ` since receiving it , after which it will be discarded .
If a newer ratchet is announced in the meantime , it will be replace the already known ratchet .
"""
2020-08-13 04:15:56 -06:00
2021-05-20 07:31:38 -06:00
# Non-configurable constants
2024-11-22 07:19:12 -07:00
TOKEN_OVERHEAD = RNS . Cryptography . Token . TOKEN_OVERHEAD
2022-04-27 05:21:53 -06:00
AES128_BLOCKSIZE = 16 # In bytes
HASHLENGTH = 256 # In bits
SIGLENGTH = KEYSIZE # In bits
2020-08-13 04:15:56 -06:00
2022-10-06 15:14:32 -06:00
NAME_HASH_LENGTH = 80
2021-09-02 10:00:03 -06:00
TRUNCATED_HASHLENGTH = RNS . Reticulum . TRUNCATED_HASHLENGTH
2021-05-16 13:58:50 -06:00
"""
Constant specifying the truncated hash length ( in bits ) used by Reticulum
2021-05-20 07:31:38 -06:00
for addressable hashes and other purposes . Non - configurable .
2021-05-16 13:58:50 -06:00
"""
2020-08-13 04:15:56 -06:00
# Storage
known_destinations = { }
2024-09-04 09:37:18 -06:00
known_ratchets = { }
2020-08-13 04:15:56 -06:00
2024-09-05 07:02:22 -06:00
ratchet_persist_lock = threading . Lock ( )
2020-08-13 04:15:56 -06:00
@staticmethod
def remember ( packet_hash , destination_hash , public_key , app_data = None ) :
2021-05-20 14:30:54 -06:00
if len ( public_key ) != Identity . KEYSIZE / / 8 :
raise TypeError ( " Can ' t remember " + RNS . prettyhexrep ( destination_hash ) + " , the public key size of " + str ( len ( public_key ) ) + " is not valid. " , RNS . LOG_ERROR )
else :
Identity . known_destinations [ destination_hash ] = [ time . time ( ) , packet_hash , public_key , app_data ]
2020-08-13 04:15:56 -06:00
@staticmethod
def recall ( destination_hash ) :
2021-05-16 13:58:50 -06:00
"""
Recall identity for a destination hash .
: param destination_hash : Destination hash as * bytes * .
: returns : An : ref : ` RNS . Identity < api - identity > ` instance that can be used to create an outgoing : ref : ` RNS . Destination < api - destination > ` , or * None * if the destination is unknown .
"""
2020-08-13 04:15:56 -06:00
if destination_hash in Identity . known_destinations :
identity_data = Identity . known_destinations [ destination_hash ]
2021-05-20 07:31:38 -06:00
identity = Identity ( create_keys = False )
2021-05-16 08:15:57 -06:00
identity . load_public_key ( identity_data [ 2 ] )
2021-05-13 08:41:23 -06:00
identity . app_data = identity_data [ 3 ]
2020-08-13 04:15:56 -06:00
return identity
else :
2022-10-13 12:43:38 -06:00
for registered_destination in RNS . Transport . destinations :
if destination_hash == registered_destination . hash :
identity = Identity ( create_keys = False )
identity . load_public_key ( registered_destination . identity . get_public_key ( ) )
identity . app_data = None
return identity
2020-08-13 04:15:56 -06:00
return None
2021-05-13 08:41:23 -06:00
@staticmethod
def recall_app_data ( destination_hash ) :
2021-05-16 13:58:50 -06:00
"""
Recall last heard app_data for a destination hash .
: param destination_hash : Destination hash as * bytes * .
: returns : * Bytes * containing app_data , or * None * if the destination is unknown .
"""
2021-05-13 08:41:23 -06:00
if destination_hash in Identity . known_destinations :
app_data = Identity . known_destinations [ destination_hash ] [ 3 ]
return app_data
else :
return None
2020-08-13 04:15:56 -06:00
@staticmethod
2021-05-16 08:15:57 -06:00
def save_known_destinations ( ) :
2022-09-06 11:43:46 -06:00
# TODO: Improve the storage method so we don't have to
# deserialize and serialize the entire table on every
2022-09-13 14:32:00 -06:00
# save, but the only changes. It might be possible to
# simply overwrite on exit now that every local client
# disconnect triggers a data persist.
2022-09-06 11:43:46 -06:00
2021-10-08 00:52:50 -06:00
try :
2022-09-06 11:43:46 -06:00
if hasattr ( Identity , " saving_known_destinations " ) :
wait_interval = 0.2
wait_timeout = 5
wait_start = time . time ( )
while Identity . saving_known_destinations :
time . sleep ( wait_interval )
if time . time ( ) > wait_start + wait_timeout :
RNS . log ( " Could not save known destinations to storage, waiting for previous save operation timed out. " , RNS . LOG_ERROR )
return False
Identity . saving_known_destinations = True
save_start = time . time ( )
2021-10-08 00:52:50 -06:00
storage_known_destinations = { }
if os . path . isfile ( RNS . Reticulum . storagepath + " /known_destinations " ) :
try :
2024-10-19 11:39:48 -06:00
with open ( RNS . Reticulum . storagepath + " /known_destinations " , " rb " ) as file :
storage_known_destinations = umsgpack . load ( file )
2021-10-08 00:52:50 -06:00
except :
pass
2024-02-29 15:23:41 -07:00
try :
for destination_hash in storage_known_destinations :
if not destination_hash in Identity . known_destinations :
Identity . known_destinations [ destination_hash ] = storage_known_destinations [ destination_hash ]
except Exception as e :
RNS . log ( " Skipped recombining known destinations from disk, since an error occurred: " + str ( e ) , RNS . LOG_WARNING )
2021-10-08 00:52:50 -06:00
2022-09-24 04:23:59 -06:00
RNS . log ( " Saving " + str ( len ( Identity . known_destinations ) ) + " known destinations to storage... " , RNS . LOG_DEBUG )
2024-10-19 11:39:48 -06:00
with open ( RNS . Reticulum . storagepath + " /known_destinations " , " wb " ) as file :
umsgpack . dump ( Identity . known_destinations , file )
2022-09-06 11:43:46 -06:00
save_time = time . time ( ) - save_start
if save_time < 1 :
time_str = str ( round ( save_time * 1000 , 2 ) ) + " ms "
else :
time_str = str ( round ( save_time , 2 ) ) + " s "
2022-09-24 04:23:59 -06:00
RNS . log ( " Saved known destinations to storage in " + time_str , RNS . LOG_DEBUG )
2022-09-06 11:43:46 -06:00
2021-10-08 00:52:50 -06:00
except Exception as e :
RNS . log ( " Error while saving known destinations to disk, the contained exception was: " + str ( e ) , RNS . LOG_ERROR )
2024-02-29 15:23:41 -07:00
RNS . trace_exception ( e )
2020-08-13 04:15:56 -06:00
2022-09-06 11:43:46 -06:00
Identity . saving_known_destinations = False
2020-08-13 04:15:56 -06:00
@staticmethod
2021-05-16 08:15:57 -06:00
def load_known_destinations ( ) :
2020-08-13 04:15:56 -06:00
if os . path . isfile ( RNS . Reticulum . storagepath + " /known_destinations " ) :
try :
2024-10-19 11:39:48 -06:00
with open ( RNS . Reticulum . storagepath + " /known_destinations " , " rb " ) as file :
loaded_known_destinations = umsgpack . load ( file )
2022-07-02 07:15:47 -06:00
Identity . known_destinations = { }
for known_destination in loaded_known_destinations :
if len ( known_destination ) == RNS . Reticulum . TRUNCATED_HASHLENGTH / / 8 :
Identity . known_destinations [ known_destination ] = loaded_known_destinations [ known_destination ]
2020-08-13 04:15:56 -06:00
RNS . log ( " Loaded " + str ( len ( Identity . known_destinations ) ) + " known destination from storage " , RNS . LOG_VERBOSE )
2024-02-29 15:23:41 -07:00
except Exception as e :
2020-08-13 04:15:56 -06:00
RNS . log ( " Error loading known destinations from disk, file will be recreated on exit " , RNS . LOG_ERROR )
else :
2021-10-08 00:52:50 -06:00
RNS . log ( " Destinations file does not exist, no known destinations loaded " , RNS . LOG_VERBOSE )
2020-08-13 04:15:56 -06:00
@staticmethod
2021-05-16 08:15:57 -06:00
def full_hash ( data ) :
2021-05-16 13:58:50 -06:00
"""
Get a SHA - 256 hash of passed data .
: param data : Data to be hashed as * bytes * .
2024-09-07 14:32:03 -06:00
: returns : SHA - 256 hash as * bytes * .
2021-05-16 13:58:50 -06:00
"""
2022-06-07 07:48:23 -06:00
return RNS . Cryptography . sha256 ( data )
2020-08-13 04:15:56 -06:00
@staticmethod
2021-05-16 08:15:57 -06:00
def truncated_hash ( data ) :
2021-05-16 13:58:50 -06:00
"""
Get a truncated SHA - 256 hash of passed data .
: param data : Data to be hashed as * bytes * .
2024-09-07 14:32:03 -06:00
: returns : Truncated SHA - 256 hash as * bytes * .
2021-05-16 13:58:50 -06:00
"""
2021-05-16 08:15:57 -06:00
return Identity . full_hash ( data ) [ : ( Identity . TRUNCATED_HASHLENGTH / / 8 ) ]
2020-08-13 04:15:56 -06:00
@staticmethod
2021-05-16 08:15:57 -06:00
def get_random_hash ( ) :
2021-05-16 13:58:50 -06:00
"""
Get a random SHA - 256 hash .
: param data : Data to be hashed as * bytes * .
2024-09-07 14:32:03 -06:00
: returns : Truncated SHA - 256 hash of random data as * bytes * .
2021-05-16 13:58:50 -06:00
"""
2022-04-20 05:08:21 -06:00
return Identity . truncated_hash ( os . urandom ( Identity . TRUNCATED_HASHLENGTH / / 8 ) )
2020-08-13 04:15:56 -06:00
2024-09-07 14:32:03 -06:00
@staticmethod
def current_ratchet_id ( destination_hash ) :
"""
Get the ID of the currently used ratchet key for a given destination hash
: param destination_hash : A destination hash as * bytes * .
: returns : A ratchet ID as * bytes * or * None * .
"""
ratchet = Identity . get_ratchet ( destination_hash )
if ratchet == None :
return None
else :
2024-09-08 12:33:35 -06:00
return Identity . _get_ratchet_id ( ratchet )
@staticmethod
def _get_ratchet_id ( ratchet_pub_bytes ) :
return Identity . full_hash ( ratchet_pub_bytes ) [ : Identity . NAME_HASH_LENGTH / / 8 ]
2024-09-07 14:32:03 -06:00
2024-09-04 04:02:55 -06:00
@staticmethod
2024-09-04 09:37:18 -06:00
def _ratchet_public_bytes ( ratchet ) :
return X25519PrivateKey . from_private_bytes ( ratchet ) . public_key ( ) . public_bytes ( )
@staticmethod
def _generate_ratchet ( ) :
2024-09-04 04:02:55 -06:00
ratchet_prv = X25519PrivateKey . generate ( )
ratchet_pub = ratchet_prv . public_key ( )
return ratchet_prv . private_bytes ( )
@staticmethod
2024-09-04 09:37:18 -06:00
def _remember_ratchet ( destination_hash , ratchet ) :
2024-09-05 07:58:54 -06:00
# TODO: Remove at some point, and only log new ratchets
2024-09-08 12:33:35 -06:00
RNS . log ( f " Remembering ratchet { RNS . prettyhexrep ( Identity . _get_ratchet_id ( ratchet ) ) } for { RNS . prettyhexrep ( destination_hash ) } " , RNS . LOG_EXTREME )
2024-09-04 09:37:18 -06:00
try :
Identity . known_ratchets [ destination_hash ] = ratchet
2024-09-05 07:02:22 -06:00
if not RNS . Transport . owner . is_connected_to_shared_instance :
def persist_job ( ) :
with Identity . ratchet_persist_lock :
hexhash = RNS . hexrep ( destination_hash , delimit = False )
ratchet_data = { " ratchet " : ratchet , " received " : time . time ( ) }
ratchetdir = RNS . Reticulum . storagepath + " /ratchets "
if not os . path . isdir ( ratchetdir ) :
os . makedirs ( ratchetdir )
2024-09-04 09:37:18 -06:00
2024-09-05 07:02:22 -06:00
outpath = f " { ratchetdir } / { hexhash } .out "
finalpath = f " { ratchetdir } / { hexhash } "
2024-10-19 11:39:48 -06:00
with open ( outpath , " wb " ) as ratchet_file :
ratchet_file . write ( umsgpack . packb ( ratchet_data ) )
2024-09-08 18:11:46 -06:00
os . replace ( outpath , finalpath )
2024-09-05 07:02:22 -06:00
threading . Thread ( target = persist_job , daemon = True ) . start ( )
2024-09-04 09:37:18 -06:00
except Exception as e :
RNS . log ( f " Could not persist ratchet for { RNS . prettyhexrep ( destination_hash ) } to storage. " , RNS . LOG_ERROR )
RNS . log ( f " The contained exception was: { e } " )
RNS . trace_exception ( e )
2024-09-05 07:02:22 -06:00
@staticmethod
def _clean_ratchets ( ) :
RNS . log ( " Cleaning ratchets... " , RNS . LOG_DEBUG )
try :
now = time . time ( )
ratchetdir = RNS . Reticulum . storagepath + " /ratchets "
2024-09-05 07:58:54 -06:00
if os . path . isdir ( ratchetdir ) :
for filename in os . listdir ( ratchetdir ) :
try :
expired = False
with open ( f " { ratchetdir } / { filename } " , " rb " ) as rf :
ratchet_data = umsgpack . unpackb ( rf . read ( ) )
if now > ratchet_data [ " received " ] + Identity . RATCHET_EXPIRY :
expired = True
if expired :
os . unlink ( f " { ratchetdir } / { filename } " )
except Exception as e :
RNS . log ( f " An error occurred while cleaning ratchets, in the processing of { ratchetdir } / { filename } . " , RNS . LOG_ERROR )
RNS . log ( f " The contained exception was: { e } " , RNS . LOG_ERROR )
2024-09-05 07:02:22 -06:00
except Exception as e :
RNS . log ( f " An error occurred while cleaning ratchets. The contained exception was: { e } " , RNS . LOG_ERROR )
2024-09-04 09:37:18 -06:00
@staticmethod
def get_ratchet ( destination_hash ) :
if not destination_hash in Identity . known_ratchets :
ratchetdir = RNS . Reticulum . storagepath + " /ratchets "
hexhash = RNS . hexrep ( destination_hash , delimit = False )
2024-09-08 09:48:25 -06:00
ratchet_path = f " { ratchetdir } / { hexhash } "
2024-09-04 09:37:18 -06:00
if os . path . isfile ( ratchet_path ) :
try :
2024-10-19 11:39:48 -06:00
with open ( ratchet_path , " rb " ) as ratchet_file :
ratchet_data = umsgpack . unpackb ( ratchet_file . read ( ) )
2024-10-20 04:26:54 -06:00
if time . time ( ) < ratchet_data [ " received " ] + Identity . RATCHET_EXPIRY and len ( ratchet_data [ " ratchet " ] ) == Identity . RATCHETSIZE / / 8 :
Identity . known_ratchets [ destination_hash ] = ratchet_data [ " ratchet " ]
else :
return None
2024-09-04 09:37:18 -06:00
except Exception as e :
RNS . log ( f " An error occurred while loading ratchet data for { RNS . prettyhexrep ( destination_hash ) } from storage. " , RNS . LOG_ERROR )
RNS . log ( f " The contained exception was: { e } " , RNS . LOG_ERROR )
return None
if destination_hash in Identity . known_ratchets :
return Identity . known_ratchets [ destination_hash ]
else :
2024-09-05 07:02:22 -06:00
RNS . log ( f " Could not load ratchet for { RNS . prettyhexrep ( destination_hash ) } " , RNS . LOG_DEBUG )
2024-09-04 09:37:18 -06:00
return None
2024-09-04 04:02:55 -06:00
2020-08-13 04:15:56 -06:00
@staticmethod
2023-09-30 11:13:58 -06:00
def validate_announce ( packet , only_validate_signature = False ) :
2022-04-20 01:04:12 -06:00
try :
if packet . packet_type == RNS . Packet . ANNOUNCE :
2024-09-04 09:37:18 -06:00
keysize = Identity . KEYSIZE / / 8
ratchetsize = Identity . RATCHETSIZE / / 8
name_hash_len = Identity . NAME_HASH_LENGTH / / 8
sig_len = Identity . SIGLENGTH / / 8
2022-04-20 01:04:12 -06:00
destination_hash = packet . destination_hash
2024-09-04 09:37:18 -06:00
# Get public key bytes from announce
public_key = packet . data [ : keysize ]
# If the packet context flag is set,
# this announce contains a new ratchet
if packet . context_flag == RNS . Packet . FLAG_SET :
name_hash = packet . data [ keysize : keysize + name_hash_len ]
random_hash = packet . data [ keysize + name_hash_len : keysize + name_hash_len + 10 ]
ratchet = packet . data [ keysize + name_hash_len + 10 : keysize + name_hash_len + 10 + ratchetsize ]
signature = packet . data [ keysize + name_hash_len + 10 + ratchetsize : keysize + name_hash_len + 10 + ratchetsize + sig_len ]
app_data = b " "
if len ( packet . data ) > keysize + name_hash_len + 10 + sig_len + ratchetsize :
app_data = packet . data [ keysize + name_hash_len + 10 + sig_len + ratchetsize : ]
# If the packet context flag is not set,
# this announce does not contain a ratchet
else :
ratchet = b " "
name_hash = packet . data [ keysize : keysize + name_hash_len ]
random_hash = packet . data [ keysize + name_hash_len : keysize + name_hash_len + 10 ]
signature = packet . data [ keysize + name_hash_len + 10 : keysize + name_hash_len + 10 + sig_len ]
app_data = b " "
if len ( packet . data ) > keysize + name_hash_len + 10 + sig_len :
app_data = packet . data [ keysize + name_hash_len + 10 + sig_len : ]
signed_data = destination_hash + public_key + name_hash + random_hash + ratchet + app_data
2022-04-20 01:04:12 -06:00
2022-10-06 15:14:32 -06:00
if not len ( packet . data ) > Identity . KEYSIZE / / 8 + Identity . NAME_HASH_LENGTH / / 8 + 10 + Identity . SIGLENGTH / / 8 :
2022-04-20 01:04:12 -06:00
app_data = None
announced_identity = Identity ( create_keys = False )
announced_identity . load_public_key ( public_key )
if announced_identity . pub != None and announced_identity . validate ( signature , signed_data ) :
2023-09-30 11:13:58 -06:00
if only_validate_signature :
del announced_identity
return True
2022-10-03 22:59:33 -06:00
hash_material = name_hash + announced_identity . hash
expected_hash = RNS . Identity . full_hash ( hash_material ) [ : RNS . Reticulum . TRUNCATED_HASHLENGTH / / 8 ]
2022-04-20 01:04:12 -06:00
2022-10-03 22:59:33 -06:00
if destination_hash == expected_hash :
2022-10-04 14:42:59 -06:00
# Check if we already have a public key for this destination
# and make sure the public key is not different.
if destination_hash in Identity . known_destinations :
if public_key != Identity . known_destinations [ destination_hash ] [ 2 ] :
# In reality, this should never occur, but in the odd case
# that someone manages a hash collision, we reject the announce.
RNS . log ( " Received announce with valid signature and destination hash, but announced public key does not match already known public key. " , RNS . LOG_CRITICAL )
RNS . log ( " This may indicate an attempt to modify network paths, or a random hash collision. The announce was rejected. " , RNS . LOG_CRITICAL )
return False
2022-10-03 22:59:33 -06:00
RNS . Identity . remember ( packet . get_hash ( ) , destination_hash , public_key , app_data )
del announced_identity
2022-12-22 03:26:59 -07:00
if packet . rssi != None or packet . snr != None :
signal_str = " [ "
if packet . rssi != None :
signal_str + = " RSSI " + str ( packet . rssi ) + " dBm "
if packet . snr != None :
signal_str + = " , "
if packet . snr != None :
signal_str + = " SNR " + str ( packet . snr ) + " dB "
signal_str + = " ] "
else :
signal_str = " "
2022-10-03 22:59:33 -06:00
if hasattr ( packet , " transport_id " ) and packet . transport_id != None :
2022-12-22 03:26:59 -07:00
RNS . log ( " Valid announce for " + RNS . prettyhexrep ( destination_hash ) + " " + str ( packet . hops ) + " hops away, received via " + RNS . prettyhexrep ( packet . transport_id ) + " on " + str ( packet . receiving_interface ) + signal_str , RNS . LOG_EXTREME )
2022-10-03 22:59:33 -06:00
else :
2022-12-22 03:26:59 -07:00
RNS . log ( " Valid announce for " + RNS . prettyhexrep ( destination_hash ) + " " + str ( packet . hops ) + " hops away, received on " + str ( packet . receiving_interface ) + signal_str , RNS . LOG_EXTREME )
2022-04-20 01:04:12 -06:00
2024-09-04 09:37:18 -06:00
if ratchet :
Identity . _remember_ratchet ( destination_hash , ratchet )
2022-10-03 22:59:33 -06:00
return True
else :
2022-10-04 14:42:59 -06:00
RNS . log ( " Received invalid announce for " + RNS . prettyhexrep ( destination_hash ) + " : Destination mismatch. " , RNS . LOG_DEBUG )
2022-10-03 22:59:33 -06:00
return False
2022-04-20 11:29:25 -06:00
2022-04-20 01:04:12 -06:00
else :
2022-10-04 14:42:59 -06:00
RNS . log ( " Received invalid announce for " + RNS . prettyhexrep ( destination_hash ) + " : Invalid signature. " , RNS . LOG_DEBUG )
2022-04-20 01:04:12 -06:00
del announced_identity
return False
except Exception as e :
RNS . log ( " Error occurred while validating announce. The contained exception was: " + str ( e ) , RNS . LOG_ERROR )
return False
2020-08-13 04:15:56 -06:00
2022-09-13 12:17:25 -06:00
@staticmethod
def persist_data ( ) :
if not RNS . Transport . owner . is_connected_to_shared_instance :
Identity . save_known_destinations ( )
2020-08-13 04:15:56 -06:00
@staticmethod
2021-05-16 05:02:46 -06:00
def exit_handler ( ) :
2022-09-13 12:17:25 -06:00
Identity . persist_data ( )
2020-08-13 04:15:56 -06:00
2021-09-02 12:35:42 -06:00
@staticmethod
def from_bytes ( prv_bytes ) :
"""
Create a new : ref : ` RNS . Identity < api - identity > ` instance from * bytes * of private key .
Can be used to load previously created and saved identities into Reticulum .
: param prv_bytes : The * bytes * of private a saved private key . * * HAZARD ! * * Never use this to generate a new key by feeding random data in prv_bytes .
: returns : A : ref : ` RNS . Identity < api - identity > ` instance , or * None * if the * bytes * data was invalid .
"""
identity = Identity ( create_keys = False )
if identity . load_private_key ( prv_bytes ) :
return identity
else :
return None
2020-08-13 04:15:56 -06:00
@staticmethod
def from_file ( path ) :
2021-05-16 13:58:50 -06:00
"""
Create a new : ref : ` RNS . Identity < api - identity > ` instance from a file .
Can be used to load previously created and saved identities into Reticulum .
: param path : The full path to the saved : ref : ` RNS . Identity < api - identity > ` data
: returns : A : ref : ` RNS . Identity < api - identity > ` instance , or * None * if the loaded data was invalid .
"""
2021-05-20 07:31:38 -06:00
identity = Identity ( create_keys = False )
2020-08-13 04:15:56 -06:00
if identity . load ( path ) :
return identity
else :
return None
2021-08-28 17:24:21 -06:00
def to_file ( self , path ) :
"""
Saves the identity to a file . This will write the private key to disk ,
and anyone with access to this file will be able to decrypt all
communication for the identity . Be very careful with this method .
: param path : The full path specifying where to save the identity .
: returns : True if the file was saved , otherwise False .
"""
try :
with open ( path , " wb " ) as key_file :
key_file . write ( self . get_private_key ( ) )
return True
return False
except Exception as e :
RNS . log ( " Error while saving identity to " + str ( path ) , RNS . LOG_ERROR )
RNS . log ( " The contained exception was: " + str ( e ) )
2021-05-20 07:31:38 -06:00
def __init__ ( self , create_keys = True ) :
2020-08-13 04:15:56 -06:00
# Initialize keys to none
2021-05-20 07:31:38 -06:00
self . prv = None
self . prv_bytes = None
self . sig_prv = None
self . sig_prv_bytes = None
self . pub = None
self . pub_bytes = None
self . sig_pub = None
self . sig_pub_bytes = None
self . hash = None
self . hexhash = None
if create_keys :
2021-05-16 08:15:57 -06:00
self . create_keys ( )
2020-08-13 04:15:56 -06:00
2021-05-16 08:15:57 -06:00
def create_keys ( self ) :
2021-05-20 07:31:38 -06:00
self . prv = X25519PrivateKey . generate ( )
2022-06-08 05:36:23 -06:00
self . prv_bytes = self . prv . private_bytes ( )
2021-05-20 07:31:38 -06:00
self . sig_prv = Ed25519PrivateKey . generate ( )
2022-06-08 11:47:09 -06:00
self . sig_prv_bytes = self . sig_prv . private_bytes ( )
2021-05-20 07:31:38 -06:00
self . pub = self . prv . public_key ( )
2022-06-08 05:36:23 -06:00
self . pub_bytes = self . pub . public_bytes ( )
2021-05-20 07:31:38 -06:00
self . sig_pub = self . sig_prv . public_key ( )
2022-06-08 11:47:09 -06:00
self . sig_pub_bytes = self . sig_pub . public_bytes ( )
2020-08-13 04:15:56 -06:00
2021-05-16 08:15:57 -06:00
self . update_hashes ( )
2020-08-13 04:15:56 -06:00
RNS . log ( " Identity keys created for " + RNS . prettyhexrep ( self . hash ) , RNS . LOG_VERBOSE )
2021-05-16 08:15:57 -06:00
def get_private_key ( self ) :
2021-05-16 13:58:50 -06:00
"""
: returns : The private key as * bytes *
"""
2021-05-20 07:31:38 -06:00
return self . prv_bytes + self . sig_prv_bytes
2020-08-13 04:15:56 -06:00
2021-05-16 08:15:57 -06:00
def get_public_key ( self ) :
2021-05-16 13:58:50 -06:00
"""
: returns : The public key as * bytes *
"""
2021-05-20 07:31:38 -06:00
return self . pub_bytes + self . sig_pub_bytes
2020-08-13 04:15:56 -06:00
2021-05-16 08:15:57 -06:00
def load_private_key ( self , prv_bytes ) :
2021-05-16 13:58:50 -06:00
"""
Load a private key into the instance .
: param prv_bytes : The private key as * bytes * .
: returns : True if the key was loaded , otherwise False .
"""
2020-08-13 04:15:56 -06:00
try :
2021-05-20 07:31:38 -06:00
self . prv_bytes = prv_bytes [ : Identity . KEYSIZE / / 8 / / 2 ]
self . prv = X25519PrivateKey . from_private_bytes ( self . prv_bytes )
self . sig_prv_bytes = prv_bytes [ Identity . KEYSIZE / / 8 / / 2 : ]
self . sig_prv = Ed25519PrivateKey . from_private_bytes ( self . sig_prv_bytes )
self . pub = self . prv . public_key ( )
2022-06-08 05:36:23 -06:00
self . pub_bytes = self . pub . public_bytes ( )
2021-05-20 07:31:38 -06:00
self . sig_pub = self . sig_prv . public_key ( )
2022-06-08 11:47:09 -06:00
self . sig_pub_bytes = self . sig_pub . public_bytes ( )
2021-05-20 07:31:38 -06:00
2021-05-16 08:15:57 -06:00
self . update_hashes ( )
2020-08-13 04:15:56 -06:00
return True
except Exception as e :
2021-05-20 07:31:38 -06:00
raise e
2020-08-13 04:15:56 -06:00
RNS . log ( " Failed to load identity key " , RNS . LOG_ERROR )
2021-05-03 12:24:44 -06:00
RNS . log ( " The contained exception was: " + str ( e ) , RNS . LOG_ERROR )
2020-08-13 04:15:56 -06:00
return False
2021-05-20 07:31:38 -06:00
def load_public_key ( self , pub_bytes ) :
2021-05-16 13:58:50 -06:00
"""
Load a public key into the instance .
2021-05-20 07:31:38 -06:00
: param pub_bytes : The public key as * bytes * .
2021-05-16 13:58:50 -06:00
: returns : True if the key was loaded , otherwise False .
"""
2020-08-13 04:15:56 -06:00
try :
2021-05-20 07:31:38 -06:00
self . pub_bytes = pub_bytes [ : Identity . KEYSIZE / / 8 / / 2 ]
self . sig_pub_bytes = pub_bytes [ Identity . KEYSIZE / / 8 / / 2 : ]
self . pub = X25519PublicKey . from_public_bytes ( self . pub_bytes )
self . sig_pub = Ed25519PublicKey . from_public_bytes ( self . sig_pub_bytes )
2021-05-16 08:15:57 -06:00
self . update_hashes ( )
2020-08-13 04:15:56 -06:00
except Exception as e :
RNS . log ( " Error while loading public key, the contained exception was: " + str ( e ) , RNS . LOG_ERROR )
2021-05-16 08:15:57 -06:00
def update_hashes ( self ) :
2021-05-20 07:31:38 -06:00
self . hash = Identity . truncated_hash ( self . get_public_key ( ) )
2020-08-13 04:15:56 -06:00
self . hexhash = self . hash . hex ( )
def load ( self , path ) :
try :
with open ( path , " rb " ) as key_file :
prv_bytes = key_file . read ( )
2021-05-16 08:15:57 -06:00
return self . load_private_key ( prv_bytes )
2020-08-13 04:15:56 -06:00
return False
except Exception as e :
RNS . log ( " Error while loading identity from " + str ( path ) , RNS . LOG_ERROR )
2023-05-31 07:39:55 -06:00
RNS . log ( " The contained exception was: " + str ( e ) , RNS . LOG_ERROR )
2020-08-13 04:15:56 -06:00
2021-05-20 07:31:38 -06:00
def get_salt ( self ) :
return self . hash
def get_context ( self ) :
return None
2024-09-04 09:37:18 -06:00
def encrypt ( self , plaintext , ratchet = None ) :
2021-05-16 13:58:50 -06:00
"""
Encrypts information for the identity .
: param plaintext : The plaintext to be encrypted as * bytes * .
2021-05-20 07:31:38 -06:00
: returns : Ciphertext token as * bytes * .
: raises : * KeyError * if the instance does not hold a public key .
2021-05-16 13:58:50 -06:00
"""
2020-08-13 04:15:56 -06:00
if self . pub != None :
2021-05-20 07:31:38 -06:00
ephemeral_key = X25519PrivateKey . generate ( )
2022-06-08 05:36:23 -06:00
ephemeral_pub_bytes = ephemeral_key . public_key ( ) . public_bytes ( )
2021-05-20 07:31:38 -06:00
2024-09-04 09:37:18 -06:00
if ratchet != None :
target_public_key = X25519PublicKey . from_public_bytes ( ratchet )
else :
target_public_key = self . pub
shared_key = ephemeral_key . exchange ( target_public_key )
2022-03-07 16:38:51 -07:00
2022-06-07 07:48:23 -06:00
derived_key = RNS . Cryptography . hkdf (
2021-05-20 07:31:38 -06:00
length = 32 ,
2022-06-07 07:48:23 -06:00
derive_from = shared_key ,
2021-05-20 07:31:38 -06:00
salt = self . get_salt ( ) ,
2022-06-07 07:48:23 -06:00
context = self . get_context ( ) ,
)
2021-05-20 07:31:38 -06:00
2024-11-22 07:19:12 -07:00
token = Token ( derived_key )
ciphertext = token . encrypt ( plaintext )
2021-05-20 07:31:38 -06:00
token = ephemeral_pub_bytes + ciphertext
return token
2020-08-13 04:15:56 -06:00
else :
raise KeyError ( " Encryption failed because identity does not hold a public key " )
2024-09-08 06:55:07 -06:00
def decrypt ( self , ciphertext_token , ratchets = None , enforce_ratchets = False , ratchet_id_receiver = None ) :
2021-05-16 13:58:50 -06:00
"""
Decrypts information for the identity .
: param ciphertext : The ciphertext to be decrypted as * bytes * .
: returns : Plaintext as * bytes * , or * None * if decryption fails .
2021-05-20 07:31:38 -06:00
: raises : * KeyError * if the instance does not hold a private key .
2021-05-16 13:58:50 -06:00
"""
2020-08-13 04:15:56 -06:00
if self . prv != None :
2021-05-20 07:31:38 -06:00
if len ( ciphertext_token ) > Identity . KEYSIZE / / 8 / / 2 :
plaintext = None
try :
peer_pub_bytes = ciphertext_token [ : Identity . KEYSIZE / / 8 / / 2 ]
peer_pub = X25519PublicKey . from_public_bytes ( peer_pub_bytes )
ciphertext = ciphertext_token [ Identity . KEYSIZE / / 8 / / 2 : ]
2024-09-04 09:37:18 -06:00
if ratchets :
for ratchet in ratchets :
try :
ratchet_prv = X25519PrivateKey . from_private_bytes ( ratchet )
2024-09-08 12:33:35 -06:00
ratchet_id = Identity . _get_ratchet_id ( ratchet_prv . public_key ( ) . public_bytes ( ) )
2024-09-04 09:37:18 -06:00
shared_key = ratchet_prv . exchange ( peer_pub )
derived_key = RNS . Cryptography . hkdf (
length = 32 ,
derive_from = shared_key ,
salt = self . get_salt ( ) ,
context = self . get_context ( ) ,
)
2024-11-22 07:19:12 -07:00
token = Token ( derived_key )
plaintext = token . decrypt ( ciphertext )
2024-09-08 06:55:07 -06:00
if ratchet_id_receiver :
ratchet_id_receiver . latest_ratchet_id = ratchet_id
2024-09-04 11:08:18 -06:00
2024-09-04 09:37:18 -06:00
break
except Exception as e :
pass
2024-09-05 07:02:22 -06:00
if enforce_ratchets and plaintext == None :
RNS . log ( " Decryption with ratchet enforcement by " + RNS . prettyhexrep ( self . hash ) + " failed. Dropping packet. " , RNS . LOG_DEBUG )
2024-09-08 06:55:07 -06:00
if ratchet_id_receiver :
ratchet_id_receiver . latest_ratchet_id = None
2024-09-05 07:02:22 -06:00
return None
2024-09-04 09:37:18 -06:00
if plaintext == None :
shared_key = self . prv . exchange ( peer_pub )
derived_key = RNS . Cryptography . hkdf (
length = 32 ,
derive_from = shared_key ,
salt = self . get_salt ( ) ,
context = self . get_context ( ) ,
)
2024-11-22 07:19:12 -07:00
token = Token ( derived_key )
plaintext = token . decrypt ( ciphertext )
2024-09-08 06:55:07 -06:00
if ratchet_id_receiver :
ratchet_id_receiver . latest_ratchet_id = None
2021-05-20 07:31:38 -06:00
except Exception as e :
RNS . log ( " Decryption by " + RNS . prettyhexrep ( self . hash ) + " failed: " + str ( e ) , RNS . LOG_DEBUG )
2024-09-08 06:55:07 -06:00
if ratchet_id_receiver :
ratchet_id_receiver . latest_ratchet_id = None
2021-05-20 07:31:38 -06:00
return plaintext ;
else :
RNS . log ( " Decryption failed because the token size was invalid. " , RNS . LOG_DEBUG )
return None
2020-08-13 04:15:56 -06:00
else :
raise KeyError ( " Decryption failed because identity does not hold a private key " )
def sign ( self , message ) :
2021-05-16 13:58:50 -06:00
"""
Signs information by the identity .
: param message : The message to be signed as * bytes * .
: returns : Signature as * bytes * .
2021-05-20 07:31:38 -06:00
: raises : * KeyError * if the instance does not hold a private key .
2021-05-16 13:58:50 -06:00
"""
2021-05-20 07:31:38 -06:00
if self . sig_prv != None :
try :
return self . sig_prv . sign ( message )
except Exception as e :
RNS . log ( " The identity " + str ( self ) + " could not sign the requested message. The contained exception was: " + str ( e ) , RNS . LOG_ERROR )
2022-04-28 06:17:12 -06:00
raise e
2020-08-13 04:15:56 -06:00
else :
raise KeyError ( " Signing failed because identity does not hold a private key " )
def validate ( self , signature , message ) :
2021-05-16 13:58:50 -06:00
"""
Validates the signature of a signed message .
: param signature : The signature to be validated as * bytes * .
: param message : The message to be validated as * bytes * .
: returns : True if the signature is valid , otherwise False .
2021-05-20 07:31:38 -06:00
: raises : * KeyError * if the instance does not hold a public key .
2021-05-16 13:58:50 -06:00
"""
2020-08-13 04:15:56 -06:00
if self . pub != None :
try :
2021-05-20 07:31:38 -06:00
self . sig_pub . verify ( signature , message )
2020-08-13 04:15:56 -06:00
return True
except Exception as e :
return False
else :
raise KeyError ( " Signature validation failed because identity does not hold a public key " )
def prove ( self , packet , destination = None ) :
signature = self . sign ( packet . packet_hash )
if RNS . Reticulum . should_use_implicit_proof ( ) :
proof_data = signature
else :
proof_data = packet . packet_hash + signature
if destination == None :
2021-05-16 08:42:07 -06:00
destination = packet . generate_proof_destination ( )
2020-08-13 04:15:56 -06:00
proof = RNS . Packet ( destination , proof_data , RNS . Packet . PROOF , attached_interface = packet . receiving_interface )
proof . send ( )
def __str__ ( self ) :
return RNS . prettyhexrep ( self . hash )