2017-07-09 08:06:36 -04:00
|
|
|
# frozen_string_literal: true
|
2017-07-10 09:39:13 -04:00
|
|
|
|
2016-08-06 11:58:50 -04:00
|
|
|
require "openssl"
|
|
|
|
require "base64"
|
2018-03-30 06:06:54 -04:00
|
|
|
require "active_support/core_ext/module/attribute_accessors"
|
2017-10-21 09:11:29 -04:00
|
|
|
require "active_support/message_verifier"
|
|
|
|
require "active_support/messages/metadata"
|
2008-11-25 14:27:54 -05:00
|
|
|
|
|
|
|
module ActiveSupport
|
2012-09-17 01:22:18 -04:00
|
|
|
# MessageEncryptor is a simple way to encrypt values which get stored
|
|
|
|
# somewhere you don't trust.
|
2010-08-14 01:13:00 -04:00
|
|
|
#
|
2012-09-17 01:22:18 -04:00
|
|
|
# The cipher text and initialization vector are base64 encoded and returned
|
|
|
|
# to you.
|
2008-11-25 14:27:54 -05:00
|
|
|
#
|
2012-09-17 01:22:18 -04:00
|
|
|
# This can be used in situations similar to the <tt>MessageVerifier</tt>, but
|
|
|
|
# where you don't want users to be able to determine the value of the payload.
|
2012-01-25 21:09:04 -05:00
|
|
|
#
|
2017-07-09 11:17:47 -04:00
|
|
|
# len = ActiveSupport::MessageEncryptor.key_len
|
|
|
|
# salt = SecureRandom.random_bytes(len)
|
|
|
|
# key = ActiveSupport::KeyGenerator.new('password').generate_key(salt, len) # => "\x89\xE0\x156\xAC..."
|
|
|
|
# crypt = ActiveSupport::MessageEncryptor.new(key) # => #<ActiveSupport::MessageEncryptor ...>
|
|
|
|
# encrypted_data = crypt.encrypt_and_sign('my secret data') # => "NlFBTTMwOUV5UlA1QlNEN2xkY2d6eThYWWh..."
|
|
|
|
# crypt.decrypt_and_verify(encrypted_data) # => "my secret data"
|
2017-07-22 10:31:53 -04:00
|
|
|
#
|
|
|
|
# === Confining messages to a specific purpose
|
|
|
|
#
|
|
|
|
# By default any message can be used throughout your app. But they can also be
|
|
|
|
# confined to a specific +:purpose+.
|
|
|
|
#
|
|
|
|
# token = crypt.encrypt_and_sign("this is the chair", purpose: :login)
|
|
|
|
#
|
|
|
|
# Then that same purpose must be passed when verifying to get the data back out:
|
|
|
|
#
|
|
|
|
# crypt.decrypt_and_verify(token, purpose: :login) # => "this is the chair"
|
|
|
|
# crypt.decrypt_and_verify(token, purpose: :shipping) # => nil
|
|
|
|
# crypt.decrypt_and_verify(token) # => nil
|
|
|
|
#
|
|
|
|
# Likewise, if a message has no purpose it won't be returned when verifying with
|
|
|
|
# a specific purpose.
|
|
|
|
#
|
|
|
|
# token = crypt.encrypt_and_sign("the conversation is lively")
|
|
|
|
# crypt.decrypt_and_verify(token, purpose: :scare_tactics) # => nil
|
|
|
|
# crypt.decrypt_and_verify(token) # => "the conversation is lively"
|
|
|
|
#
|
|
|
|
# === Making messages expire
|
|
|
|
#
|
|
|
|
# By default messages last forever and verifying one year from now will still
|
|
|
|
# return the original value. But messages can be set to expire at a given
|
|
|
|
# time with +:expires_in+ or +:expires_at+.
|
|
|
|
#
|
|
|
|
# crypt.encrypt_and_sign(parcel, expires_in: 1.month)
|
|
|
|
# crypt.encrypt_and_sign(doowad, expires_at: Time.now.end_of_year)
|
|
|
|
#
|
2019-02-15 10:18:47 -05:00
|
|
|
# Then the messages can be verified and returned up to the expire time.
|
2017-07-22 10:31:53 -04:00
|
|
|
# Thereafter, verifying returns +nil+.
|
2017-09-23 17:16:21 -04:00
|
|
|
#
|
|
|
|
# === Rotating keys
|
|
|
|
#
|
2017-09-24 15:41:16 -04:00
|
|
|
# MessageEncryptor also supports rotating out old configurations by falling
|
2017-11-22 14:45:51 -05:00
|
|
|
# back to a stack of encryptors. Call +rotate+ to build and add an encryptor
|
|
|
|
# so +decrypt_and_verify+ will also try the fallback.
|
2017-09-24 15:41:16 -04:00
|
|
|
#
|
|
|
|
# By default any rotated encryptors use the values of the primary
|
|
|
|
# encryptor unless specified otherwise.
|
|
|
|
#
|
|
|
|
# You'd give your encryptor the new defaults:
|
|
|
|
#
|
|
|
|
# crypt = ActiveSupport::MessageEncryptor.new(@secret, cipher: "aes-256-gcm")
|
|
|
|
#
|
|
|
|
# Then gradually rotate the old values out by adding them as fallbacks. Any message
|
|
|
|
# generated with the old values will then work until the rotation is removed.
|
|
|
|
#
|
|
|
|
# crypt.rotate old_secret # Fallback to an old secret instead of @secret.
|
|
|
|
# crypt.rotate cipher: "aes-256-cbc" # Fallback to an old cipher instead of aes-256-gcm.
|
|
|
|
#
|
|
|
|
# Though if both the secret and the cipher was changed at the same time,
|
|
|
|
# the above should be combined into:
|
|
|
|
#
|
2017-10-10 10:23:41 -04:00
|
|
|
# crypt.rotate old_secret, cipher: "aes-256-cbc"
|
2008-11-25 14:27:54 -05:00
|
|
|
class MessageEncryptor
|
2017-09-23 17:16:21 -04:00
|
|
|
prepend Messages::Rotator::Encryptor
|
|
|
|
|
2017-12-22 17:13:19 -05:00
|
|
|
cattr_accessor :use_authenticated_message_encryption, instance_accessor: false, default: false
|
2017-06-02 15:51:10 -04:00
|
|
|
|
2017-12-22 17:13:19 -05:00
|
|
|
class << self
|
2017-06-02 15:51:10 -04:00
|
|
|
def default_cipher #:nodoc:
|
|
|
|
if use_authenticated_message_encryption
|
|
|
|
"aes-256-gcm"
|
|
|
|
else
|
|
|
|
"aes-256-cbc"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-07-09 18:51:56 -04:00
|
|
|
|
2011-11-09 17:11:46 -05:00
|
|
|
module NullSerializer #:nodoc:
|
|
|
|
def self.load(value)
|
|
|
|
value
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.dump(value)
|
|
|
|
value
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-07-18 07:48:58 -04:00
|
|
|
module NullVerifier #:nodoc:
|
|
|
|
def self.verify(value)
|
|
|
|
value
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.generate(value)
|
|
|
|
value
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2008-11-25 14:27:54 -05:00
|
|
|
class InvalidMessage < StandardError; end
|
2013-04-16 08:01:23 -04:00
|
|
|
OpenSSLCipherError = OpenSSL::Cipher::CipherError
|
2008-11-26 02:36:33 -05:00
|
|
|
|
2012-09-17 01:22:18 -04:00
|
|
|
# Initialize a new MessageEncryptor. +secret+ must be at least as long as
|
2017-06-02 15:51:10 -04:00
|
|
|
# the cipher key size. For the default 'aes-256-gcm' cipher, this is 256
|
2012-09-17 01:22:18 -04:00
|
|
|
# bits. If you are using a user-entered secret, you can generate a suitable
|
2015-11-11 00:41:28 -05:00
|
|
|
# key by using <tt>ActiveSupport::KeyGenerator</tt> or a similar key
|
|
|
|
# derivation function.
|
2012-01-25 21:09:04 -05:00
|
|
|
#
|
2017-03-14 14:09:24 -04:00
|
|
|
# First additional parameter is used as the signature key for +MessageVerifier+.
|
|
|
|
# This allows you to specify keys to encrypt and sign data.
|
|
|
|
#
|
2017-03-15 13:10:11 -04:00
|
|
|
# ActiveSupport::MessageEncryptor.new('secret', 'signature_secret')
|
2017-03-14 14:09:24 -04:00
|
|
|
#
|
2012-01-25 21:09:04 -05:00
|
|
|
# Options:
|
2012-09-17 01:22:18 -04:00
|
|
|
# * <tt>:cipher</tt> - Cipher to use. Can be any cipher returned by
|
2017-06-11 18:47:13 -04:00
|
|
|
# <tt>OpenSSL::Cipher.ciphers</tt>. Default is 'aes-256-gcm'.
|
2016-07-18 07:48:58 -04:00
|
|
|
# * <tt>:digest</tt> - String of digest to use for signing. Default is
|
|
|
|
# +SHA1+. Ignored when using an AEAD cipher like 'aes-256-gcm'.
|
2012-09-17 01:22:18 -04:00
|
|
|
# * <tt>:serializer</tt> - Object serializer to use. Default is +Marshal+.
|
2020-02-08 23:35:10 -05:00
|
|
|
def initialize(secret, sign_secret = nil, cipher: nil, digest: nil, serializer: nil)
|
2008-11-25 14:27:54 -05:00
|
|
|
@secret = secret
|
2012-10-30 14:41:11 -04:00
|
|
|
@sign_secret = sign_secret
|
2020-02-08 23:35:10 -05:00
|
|
|
@cipher = cipher || self.class.default_cipher
|
|
|
|
@digest = digest || "SHA1" unless aead_mode?
|
2016-07-18 07:48:58 -04:00
|
|
|
@verifier = resolve_verifier
|
2020-02-08 23:35:10 -05:00
|
|
|
@serializer = serializer || Marshal
|
2008-11-25 14:27:54 -05:00
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2012-09-17 01:22:18 -04:00
|
|
|
# Encrypt and sign a message. We need to sign the message in order to avoid
|
2017-08-21 20:16:50 -04:00
|
|
|
# padding attacks. Reference: https://www.limited-entropy.com/padding-oracle-attacks/.
|
2017-07-06 11:23:22 -04:00
|
|
|
def encrypt_and_sign(value, expires_at: nil, expires_in: nil, purpose: nil)
|
2017-08-09 15:48:25 -04:00
|
|
|
verifier.generate(_encrypt(value, expires_at: expires_at, expires_in: expires_in, purpose: purpose))
|
2011-11-09 16:48:56 -05:00
|
|
|
end
|
|
|
|
|
2012-09-17 01:22:18 -04:00
|
|
|
# Decrypt and verify a message. We need to verify the message in order to
|
2017-08-21 20:16:50 -04:00
|
|
|
# avoid padding attacks. Reference: https://www.limited-entropy.com/padding-oracle-attacks/.
|
2017-09-23 17:16:21 -04:00
|
|
|
def decrypt_and_verify(data, purpose: nil, **)
|
2017-08-09 15:48:25 -04:00
|
|
|
_decrypt(verifier.verify(data), purpose)
|
2011-11-09 16:48:56 -05:00
|
|
|
end
|
|
|
|
|
2016-07-09 18:51:56 -04:00
|
|
|
# Given a cipher, returns the key length of the cipher to help generate the key of desired size
|
2017-06-02 15:51:10 -04:00
|
|
|
def self.key_len(cipher = default_cipher)
|
2016-07-09 18:51:56 -04:00
|
|
|
OpenSSL::Cipher.new(cipher).key_len
|
|
|
|
end
|
|
|
|
|
2011-11-09 16:48:56 -05:00
|
|
|
private
|
2017-08-09 15:48:25 -04:00
|
|
|
def _encrypt(value, **metadata_options)
|
2016-08-06 13:55:02 -04:00
|
|
|
cipher = new_cipher
|
|
|
|
cipher.encrypt
|
|
|
|
cipher.key = @secret
|
2013-04-16 08:01:23 -04:00
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
# Rely on OpenSSL for the initialization vector
|
|
|
|
iv = cipher.random_iv
|
|
|
|
cipher.auth_data = "" if aead_mode?
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2019-09-03 04:05:59 -04:00
|
|
|
encrypted_data = cipher.update(Messages::Metadata.wrap(@serializer.dump(value), **metadata_options))
|
2016-08-06 13:55:02 -04:00
|
|
|
encrypted_data << cipher.final
|
2008-11-25 14:27:54 -05:00
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
blob = "#{::Base64.strict_encode64 encrypted_data}--#{::Base64.strict_encode64 iv}"
|
2017-06-19 05:03:10 -04:00
|
|
|
blob = "#{blob}--#{::Base64.strict_encode64 cipher.auth_tag}" if aead_mode?
|
2016-08-06 13:55:02 -04:00
|
|
|
blob
|
2016-07-18 07:48:58 -04:00
|
|
|
end
|
2008-11-25 14:27:54 -05:00
|
|
|
|
2017-08-09 15:48:25 -04:00
|
|
|
def _decrypt(encrypted_message, purpose)
|
2016-08-06 13:55:02 -04:00
|
|
|
cipher = new_cipher
|
2018-02-27 23:33:37 -05:00
|
|
|
encrypted_data, iv, auth_tag = encrypted_message.split("--").map { |v| ::Base64.strict_decode64(v) }
|
2016-08-06 13:55:02 -04:00
|
|
|
|
|
|
|
# Currently the OpenSSL bindings do not raise an error if auth_tag is
|
|
|
|
# truncated, which would allow an attacker to easily forge it. See
|
|
|
|
# https://github.com/ruby/openssl/issues/63
|
2017-05-15 04:45:14 -04:00
|
|
|
raise InvalidMessage if aead_mode? && (auth_tag.nil? || auth_tag.bytes.length != 16)
|
2016-08-06 13:55:02 -04:00
|
|
|
|
|
|
|
cipher.decrypt
|
|
|
|
cipher.key = @secret
|
|
|
|
cipher.iv = iv
|
|
|
|
if aead_mode?
|
|
|
|
cipher.auth_tag = auth_tag
|
|
|
|
cipher.auth_data = ""
|
|
|
|
end
|
|
|
|
|
|
|
|
decrypted_data = cipher.update(encrypted_data)
|
|
|
|
decrypted_data << cipher.final
|
|
|
|
|
2017-08-09 15:48:25 -04:00
|
|
|
message = Messages::Metadata.verify(decrypted_data, purpose)
|
|
|
|
@serializer.load(message) if message
|
2016-08-06 13:55:02 -04:00
|
|
|
rescue OpenSSLCipherError, TypeError, ArgumentError
|
|
|
|
raise InvalidMessage
|
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
def new_cipher
|
|
|
|
OpenSSL::Cipher.new(@cipher)
|
|
|
|
end
|
2010-08-14 01:13:00 -04:00
|
|
|
|
2018-03-29 22:29:55 -04:00
|
|
|
attr_reader :verifier
|
2016-07-18 07:48:58 -04:00
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
def aead_mode?
|
|
|
|
@aead_mode ||= new_cipher.authenticated?
|
|
|
|
end
|
2016-07-18 07:48:58 -04:00
|
|
|
|
2016-08-06 13:55:02 -04:00
|
|
|
def resolve_verifier
|
|
|
|
if aead_mode?
|
|
|
|
NullVerifier
|
|
|
|
else
|
|
|
|
MessageVerifier.new(@sign_secret || @secret, digest: @digest, serializer: NullSerializer)
|
|
|
|
end
|
2016-07-18 07:48:58 -04:00
|
|
|
end
|
2008-11-25 14:27:54 -05:00
|
|
|
end
|
2008-11-26 02:36:33 -05:00
|
|
|
end
|