|
|
|
|
|
|
|
|
use anyhow::{format_err, Context as _, Result}; |
|
|
use num_traits::FromPrimitive; |
|
|
|
|
|
use crate::aheader::{Aheader, EncryptPreference}; |
|
|
use crate::config::Config; |
|
|
use crate::context::Context; |
|
|
use crate::key::{load_self_public_key, load_self_secret_key, SignedPublicKey}; |
|
|
use crate::peerstate::Peerstate; |
|
|
use crate::pgp; |
|
|
|
|
|
#[derive(Debug)] |
|
|
pub struct EncryptHelper { |
|
|
pub prefer_encrypt: EncryptPreference, |
|
|
pub addr: String, |
|
|
pub public_key: SignedPublicKey, |
|
|
} |
|
|
|
|
|
impl EncryptHelper { |
|
|
pub async fn new(context: &Context) -> Result<EncryptHelper> { |
|
|
let prefer_encrypt = |
|
|
EncryptPreference::from_i32(context.get_config_int(Config::E2eeEnabled).await?) |
|
|
.unwrap_or_default(); |
|
|
let addr = context.get_primary_self_addr().await?; |
|
|
let public_key = load_self_public_key(context).await?; |
|
|
|
|
|
Ok(EncryptHelper { |
|
|
prefer_encrypt, |
|
|
addr, |
|
|
public_key, |
|
|
}) |
|
|
} |
|
|
|
|
|
pub fn get_aheader(&self) -> Aheader { |
|
|
let pk = self.public_key.clone(); |
|
|
let addr = self.addr.to_string(); |
|
|
Aheader::new(addr, pk, self.prefer_encrypt) |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
pub fn should_encrypt( |
|
|
&self, |
|
|
context: &Context, |
|
|
e2ee_guaranteed: bool, |
|
|
peerstates: &[(Option<Peerstate>, String)], |
|
|
) -> Result<bool> { |
|
|
let mut prefer_encrypt_count = if self.prefer_encrypt == EncryptPreference::Mutual { |
|
|
1 |
|
|
} else { |
|
|
0 |
|
|
}; |
|
|
for (peerstate, addr) in peerstates { |
|
|
match peerstate { |
|
|
Some(peerstate) => { |
|
|
let prefer_encrypt = peerstate.prefer_encrypt; |
|
|
info!(context, "Peerstate for {addr:?} is {prefer_encrypt}."); |
|
|
match peerstate.prefer_encrypt { |
|
|
EncryptPreference::NoPreference | EncryptPreference::Reset => {} |
|
|
EncryptPreference::Mutual => prefer_encrypt_count += 1, |
|
|
}; |
|
|
} |
|
|
None => { |
|
|
let msg = format!("Peerstate for {addr:?} missing, cannot encrypt"); |
|
|
if e2ee_guaranteed { |
|
|
return Err(format_err!("{msg}")); |
|
|
} else { |
|
|
info!(context, "{msg}."); |
|
|
return Ok(false); |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
let recipients_count = peerstates.len() + 1; |
|
|
|
|
|
Ok(e2ee_guaranteed || 2 * prefer_encrypt_count > recipients_count) |
|
|
} |
|
|
|
|
|
|
|
|
pub async fn encrypt( |
|
|
self, |
|
|
context: &Context, |
|
|
verified: bool, |
|
|
mail_to_encrypt: lettre_email::PartBuilder, |
|
|
peerstates: Vec<(Option<Peerstate>, String)>, |
|
|
compress: bool, |
|
|
) -> Result<String> { |
|
|
let mut keyring: Vec<SignedPublicKey> = Vec::new(); |
|
|
|
|
|
let mut verifier_addresses: Vec<&str> = Vec::new(); |
|
|
|
|
|
for (peerstate, addr) in peerstates |
|
|
.iter() |
|
|
.filter_map(|(state, addr)| state.clone().map(|s| (s, addr))) |
|
|
{ |
|
|
let key = peerstate |
|
|
.take_key(verified) |
|
|
.with_context(|| format!("proper enc-key for {addr} missing, cannot encrypt"))?; |
|
|
keyring.push(key); |
|
|
verifier_addresses.push(addr); |
|
|
} |
|
|
|
|
|
|
|
|
keyring.push(self.public_key.clone()); |
|
|
|
|
|
|
|
|
|
|
|
if verified { |
|
|
for (peerstate, _addr) in &peerstates { |
|
|
if let Some(peerstate) = peerstate { |
|
|
if let (Some(key), Some(verifier)) = ( |
|
|
peerstate.secondary_verified_key.as_ref(), |
|
|
peerstate.secondary_verifier.as_deref(), |
|
|
) { |
|
|
if verifier_addresses.contains(&verifier) { |
|
|
keyring.push(key.clone()); |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
let sign_key = load_self_secret_key(context).await?; |
|
|
|
|
|
let raw_message = mail_to_encrypt.build().as_string().into_bytes(); |
|
|
|
|
|
let ctext = pgp::pk_encrypt(&raw_message, keyring, Some(sign_key), compress).await?; |
|
|
|
|
|
Ok(ctext) |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
pub async fn sign( |
|
|
self, |
|
|
context: &Context, |
|
|
mail: lettre_email::PartBuilder, |
|
|
) -> Result<(lettre_email::MimeMessage, String)> { |
|
|
let sign_key = load_self_secret_key(context).await?; |
|
|
let mime_message = mail.build(); |
|
|
let signature = pgp::pk_calc_signature(mime_message.as_string().as_bytes(), &sign_key)?; |
|
|
Ok((mime_message, signature)) |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
pub async fn ensure_secret_key_exists(context: &Context) -> Result<()> { |
|
|
load_self_public_key(context).await?; |
|
|
Ok(()) |
|
|
} |
|
|
|
|
|
#[cfg(test)] |
|
|
mod tests { |
|
|
use super::*; |
|
|
use crate::key::DcKey; |
|
|
use crate::message::{Message, Viewtype}; |
|
|
use crate::param::Param; |
|
|
use crate::test_utils::{bob_keypair, TestContext, TestContextManager}; |
|
|
|
|
|
mod ensure_secret_key_exists { |
|
|
use super::*; |
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_prexisting() { |
|
|
let t = TestContext::new_alice().await; |
|
|
assert!(ensure_secret_key_exists(&t).await.is_ok()); |
|
|
} |
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_not_configured() { |
|
|
let t = TestContext::new().await; |
|
|
assert!(ensure_secret_key_exists(&t).await.is_err()); |
|
|
} |
|
|
} |
|
|
|
|
|
#[test] |
|
|
fn test_mailmime_parse() { |
|
|
let plain = b"Chat-Disposition-Notification-To: hello@world.de |
|
|
Chat-Group-ID: CovhGgau8M- |
|
|
Chat-Group-Name: Delta Chat Dev |
|
|
Subject: =?utf-8?Q?Chat=3A?= Delta Chat =?utf-8?Q?Dev=3A?= sidenote for |
|
|
=?utf-8?Q?all=3A?= rust core master ... |
|
|
Content-Type: text/plain; charset=\"utf-8\"; protected-headers=\"v1\" |
|
|
Content-Transfer-Encoding: quoted-printable |
|
|
|
|
|
sidenote for all: things are trick atm recomm= |
|
|
end not to try to run with desktop or ios unless you are ready to hunt bugs |
|
|
|
|
|
-- =20 |
|
|
Sent with my Delta Chat Messenger: https://delta.chat"; |
|
|
let mail = mailparse::parse_mail(plain).expect("failed to parse valid message"); |
|
|
|
|
|
assert_eq!(mail.headers.len(), 6); |
|
|
assert!( |
|
|
mail.get_body().unwrap().starts_with( |
|
|
"sidenote for all: things are trick atm recommend not to try to run with desktop or ios unless you are ready to hunt bugs") |
|
|
); |
|
|
} |
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_encrypted_no_autocrypt() -> anyhow::Result<()> { |
|
|
let mut tcm = TestContextManager::new(); |
|
|
let alice = tcm.alice().await; |
|
|
let bob = tcm.bob().await; |
|
|
|
|
|
let chat_alice = alice.create_chat(&bob).await.id; |
|
|
let chat_bob = bob.create_chat(&alice).await.id; |
|
|
|
|
|
|
|
|
let mut msg = Message::new(Viewtype::Text); |
|
|
let sent = alice.send_msg(chat_alice, &mut msg).await; |
|
|
|
|
|
|
|
|
let msg = bob.recv_msg(&sent).await; |
|
|
assert!(!msg.get_showpadlock()); |
|
|
|
|
|
let peerstate_alice = Peerstate::from_addr(&bob.ctx, "alice@example.org") |
|
|
.await? |
|
|
.expect("no peerstate found in the database"); |
|
|
assert_eq!(peerstate_alice.prefer_encrypt, EncryptPreference::Mutual); |
|
|
|
|
|
|
|
|
let mut msg = Message::new(Viewtype::Text); |
|
|
let sent = bob.send_msg(chat_bob, &mut msg).await; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
let msg = alice.recv_msg(&sent).await; |
|
|
assert!(msg.get_showpadlock()); |
|
|
|
|
|
let peerstate_bob = Peerstate::from_addr(&alice.ctx, "bob@example.net") |
|
|
.await? |
|
|
.expect("no peerstate found in the database"); |
|
|
assert_eq!(peerstate_bob.prefer_encrypt, EncryptPreference::Mutual); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
let mut msg = Message::new(Viewtype::Text); |
|
|
msg.param.set_int(Param::SkipAutocrypt, 1); |
|
|
let sent = alice.send_msg(chat_alice, &mut msg).await; |
|
|
|
|
|
let msg = bob.recv_msg(&sent).await; |
|
|
assert!(msg.get_showpadlock()); |
|
|
let peerstate_alice = Peerstate::from_addr(&bob.ctx, "alice@example.org") |
|
|
.await? |
|
|
.expect("no peerstate found in the database"); |
|
|
assert_eq!(peerstate_alice.prefer_encrypt, EncryptPreference::Mutual); |
|
|
|
|
|
|
|
|
let mut msg = Message::new(Viewtype::Text); |
|
|
msg.force_plaintext(); |
|
|
let sent = alice.send_msg(chat_alice, &mut msg).await; |
|
|
|
|
|
let msg = bob.recv_msg(&sent).await; |
|
|
assert!(!msg.get_showpadlock()); |
|
|
let peerstate_alice = Peerstate::from_addr(&bob.ctx, "alice@example.org") |
|
|
.await? |
|
|
.expect("no peerstate found in the database"); |
|
|
assert_eq!(peerstate_alice.prefer_encrypt, EncryptPreference::Mutual); |
|
|
|
|
|
|
|
|
let mut msg = Message::new(Viewtype::Text); |
|
|
msg.force_plaintext(); |
|
|
msg.param.set_int(Param::SkipAutocrypt, 1); |
|
|
let sent = alice.send_msg(chat_alice, &mut msg).await; |
|
|
|
|
|
let msg = bob.recv_msg(&sent).await; |
|
|
assert!(!msg.get_showpadlock()); |
|
|
let peerstate_alice = Peerstate::from_addr(&bob.ctx, "alice@example.org") |
|
|
.await? |
|
|
.expect("no peerstate found in the database"); |
|
|
assert_eq!(peerstate_alice.prefer_encrypt, EncryptPreference::Reset); |
|
|
|
|
|
Ok(()) |
|
|
} |
|
|
|
|
|
fn new_peerstates(prefer_encrypt: EncryptPreference) -> Vec<(Option<Peerstate>, String)> { |
|
|
let addr = "bob@foo.bar"; |
|
|
let pub_key = bob_keypair().public; |
|
|
let peerstate = Peerstate { |
|
|
addr: addr.into(), |
|
|
last_seen: 13, |
|
|
last_seen_autocrypt: 14, |
|
|
prefer_encrypt, |
|
|
public_key: Some(pub_key.clone()), |
|
|
public_key_fingerprint: Some(pub_key.fingerprint()), |
|
|
gossip_key: Some(pub_key.clone()), |
|
|
gossip_timestamp: 15, |
|
|
gossip_key_fingerprint: Some(pub_key.fingerprint()), |
|
|
verified_key: Some(pub_key.clone()), |
|
|
verified_key_fingerprint: Some(pub_key.fingerprint()), |
|
|
verifier: None, |
|
|
secondary_verified_key: None, |
|
|
secondary_verified_key_fingerprint: None, |
|
|
secondary_verifier: None, |
|
|
backward_verified_key_id: None, |
|
|
fingerprint_changed: false, |
|
|
}; |
|
|
vec![(Some(peerstate), addr.to_string())] |
|
|
} |
|
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)] |
|
|
async fn test_should_encrypt() { |
|
|
let t = TestContext::new_alice().await; |
|
|
let encrypt_helper = EncryptHelper::new(&t).await.unwrap(); |
|
|
|
|
|
|
|
|
|
|
|
let ps = new_peerstates(EncryptPreference::NoPreference); |
|
|
assert!(encrypt_helper.should_encrypt(&t, true, &ps).unwrap()); |
|
|
assert!(!encrypt_helper.should_encrypt(&t, false, &ps).unwrap()); |
|
|
|
|
|
|
|
|
let ps = new_peerstates(EncryptPreference::Reset); |
|
|
assert!(encrypt_helper.should_encrypt(&t, true, &ps).unwrap()); |
|
|
assert!(!encrypt_helper.should_encrypt(&t, false, &ps).unwrap()); |
|
|
|
|
|
|
|
|
let ps = new_peerstates(EncryptPreference::Mutual); |
|
|
assert!(encrypt_helper.should_encrypt(&t, true, &ps).unwrap()); |
|
|
assert!(encrypt_helper.should_encrypt(&t, false, &ps).unwrap()); |
|
|
|
|
|
|
|
|
let ps = vec![(None, "bob@foo.bar".to_string())]; |
|
|
assert!(encrypt_helper.should_encrypt(&t, true, &ps).is_err()); |
|
|
assert!(!encrypt_helper.should_encrypt(&t, false, &ps).unwrap()); |
|
|
} |
|
|
} |
|
|
|