Skip to content

Commit

Permalink
use password hash instead of the plain password to encrypt the privat…
Browse files Browse the repository at this point in the history
…e key
  • Loading branch information
Bjoern Schiessle committed Aug 7, 2015
1 parent 43888bb commit 62bc0e5
Show file tree
Hide file tree
Showing 11 changed files with 335 additions and 29 deletions.
2 changes: 1 addition & 1 deletion apps/encryption/controller/settingscontroller.php
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ public function updatePrivateKeyPassword($oldPassword, $newPassword) {
$decryptedKey = $this->crypt->decryptPrivateKey($encryptedKey, $oldPassword);

if ($decryptedKey) {
$encryptedKey = $this->crypt->symmetricEncryptFileContent($decryptedKey, $newPassword);
$encryptedKey = $this->crypt->encryptPrivateKey($decryptedKey, $newPassword);
$header = $this->crypt->generateHeader();
if ($encryptedKey) {
$this->keyManager->setPrivateKey($uid, $header . $encryptedKey);
Expand Down
6 changes: 2 additions & 4 deletions apps/encryption/hooks/userhooks.php
Original file line number Diff line number Diff line change
Expand Up @@ -220,8 +220,7 @@ public function setPassphrase($params) {
if ($user && $params['uid'] === $user->getUID() && $privateKey) {

// Encrypt private key with new user pwd as passphrase
$encryptedPrivateKey = $this->crypt->symmetricEncryptFileContent($privateKey,
$params['password']);
$encryptedPrivateKey = $this->crypt->encryptPrivateKey($privateKey, $params['password']);

// Save private key
if ($encryptedPrivateKey) {
Expand Down Expand Up @@ -259,8 +258,7 @@ public function setPassphrase($params) {
$this->keyManager->setPublicKey($user, $keyPair['publicKey']);

// Encrypt private key with new password
$encryptedKey = $this->crypt->symmetricEncryptFileContent($keyPair['privateKey'],
$newUserPassword);
$encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $newUserPassword);

if ($encryptedKey) {
$this->keyManager->setPrivateKey($user, $this->crypt->generateHeader() . $encryptedKey);
Expand Down
139 changes: 130 additions & 9 deletions apps/encryption/lib/crypto/crypt.php
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@
use OC\Encryption\Exceptions\EncryptionFailedException;
use OCA\Encryption\Exceptions\MultiKeyDecryptException;
use OCA\Encryption\Exceptions\MultiKeyEncryptException;
use OCA\Encryption\Vendor\PBKDF2Fallback;
use OCP\Encryption\Exceptions\GenericEncryptionException;
use OCP\IConfig;
use OCP\ILogger;
Expand All @@ -42,6 +43,10 @@ class Crypt {
// default cipher from old ownCloud versions
const LEGACY_CIPHER = 'AES-128-CFB';

// default key format, old ownCloud version encrypted the private key directly
// with the user password
const LEGACY_KEY_FORMAT = 'password';

const HEADER_START = 'HBEGIN';
const HEADER_END = 'HEND';
/**
Expand All @@ -57,6 +62,11 @@ class Crypt {
*/
private $config;

/**
* @var array
*/
private $supportedKeyFormats;

/**
* @param ILogger $logger
* @param IUserSession $userSession
Expand All @@ -66,6 +76,7 @@ public function __construct(ILogger $logger, IUserSession $userSession, IConfig
$this->logger = $logger;
$this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser() : false;
$this->config = $config;
$this->supportedKeyFormats = ['hash', 'password'];
}

/**
Expand Down Expand Up @@ -161,10 +172,23 @@ public function symmetricEncryptFileContent($plainContent, $passPhrase) {

/**
* generate header for encrypted file
*
* @param string $keyFormat (can be 'hash' or 'password')
* @return string
* @throws \InvalidArgumentException
*/
public function generateHeader() {
public function generateHeader($keyFormat = 'hash') {

if (in_array($keyFormat, $this->supportedKeyFormats, true) === false) {
throw new \InvalidArgumentException('key format "' . $keyFormat . '" is not supported');
}

$cipher = $this->getCipher();
$header = self::HEADER_START . ':cipher:' . $cipher . ':' . self::HEADER_END;

$header = self::HEADER_START
. ':cipher:' . $cipher
. ':keyFormat:' . $keyFormat
. ':' . self::HEADER_END;

return $header;
}
Expand Down Expand Up @@ -211,6 +235,25 @@ public function getCipher() {
return $cipher;
}

/**
* get key size depending on the cipher
*
* @param string $cipher supported ('AES-256-CFB' and 'AES-128-CFB')
* @return int
* @throws \InvalidArgumentException
*/
protected function getKeySize($cipher) {
if ($cipher === 'AES-256-CFB') {
return 32;
} else if ($cipher === 'AES-128-CFB') {
return 16;
}

throw new \InvalidArgumentException(
'Wrong cipher defined only AES-128-CFB and AES-256-CFB are supported.'
);
}

/**
* get legacy cipher
*
Expand All @@ -237,6 +280,63 @@ private function addPadding($data) {
return $data . 'xx';
}

/**
* generate password hash used to encrypt the users private key
*
* @param string $password
* @param string $cipher
* @return string
*/
protected function generatePasswordHash($password, $cipher) {
$instanceId = $this->config->getSystemValue('instanceid');
$instanceSecret = $this->config->getSystemValue('secret');
$salt = hash('sha256', $instanceId . $instanceSecret, true);
$keySize = $this->getKeySize($cipher);

if (function_exists('hash_pbkdf2')) {
$hash = hash_pbkdf2(
'sha256',
$password,
$salt,
100000,
$keySize,
true
);
} else {
// fallback to 3rdparty lib for PHP <= 5.4.
// FIXME: Can be removed as soon as support for PHP 5.4 was dropped
$fallback = new PBKDF2Fallback();
$hash = $fallback->pbkdf2(
'sha256',
$password,
$salt,
100000,
$keySize,
true
);
}

return $hash;
}

/**
* encrypt private key
*
* @param string $privateKey
* @param string $password
* @return bool|string
*/
public function encryptPrivateKey($privateKey, $password) {
$cipher = $this->getCipher();
$hash = $this->generatePasswordHash($password, $cipher);
$encryptedKey = $this->symmetricEncryptFileContent(
$privateKey,
$hash
);

return $encryptedKey;
}

/**
* @param string $privateKey
* @param string $password
Expand All @@ -252,6 +352,16 @@ public function decryptPrivateKey($privateKey, $password = '') {
$cipher = self::LEGACY_CIPHER;
}

if (isset($header['keyFormat'])) {
$keyFormat = $header['keyFormat'];
} else {
$keyFormat = self::LEGACY_KEY_FORMAT;
}

if ($keyFormat === 'hash') {
$password = $this->generatePasswordHash($password, $cipher);
}

// If we found a header we need to remove it from the key we want to decrypt
if (!empty($header)) {
$privateKey = substr($privateKey,
Expand All @@ -263,18 +373,29 @@ public function decryptPrivateKey($privateKey, $password = '') {
$password,
$cipher);

// Check if this is a valid private key
if ($this->isValidPrivateKey($plainKey) === false) {
return false;
}

return $plainKey;
}

/**
* check if it is a valid private key
*
* @param $plainKey
* @return bool
*/
protected function isValidPrivateKey($plainKey) {
$res = openssl_get_privatekey($plainKey);
if (is_resource($res)) {
$sslInfo = openssl_pkey_get_details($res);
if (!isset($sslInfo['key'])) {
return false;
if (isset($sslInfo['key'])) {
return true;
}
} else {
return false;
}

return $plainKey;
return true;
}

/**
Expand Down Expand Up @@ -358,7 +479,7 @@ private function decrypt($encryptedContent, $iv, $passPhrase = '', $cipher = sel
* @param $data
* @return array
*/
private function parseHeader($data) {
protected function parseHeader($data) {
$result = [];

if (substr($data, 0, strlen(self::HEADER_START)) === self::HEADER_START) {
Expand Down
9 changes: 4 additions & 5 deletions apps/encryption/lib/keymanager.php
Original file line number Diff line number Diff line change
Expand Up @@ -146,7 +146,7 @@ public function validateShareKey() {
Encryption::ID);

// Encrypt private key empty passphrase
$encryptedKey = $this->crypt->symmetricEncryptFileContent($keyPair['privateKey'], '');
$encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], '');
$header = $this->crypt->generateHeader();
$this->setSystemPrivateKey($this->publicShareKeyId, $header . $encryptedKey);
}
Expand Down Expand Up @@ -203,8 +203,8 @@ public function storeKeyPair($uid, $password, $keyPair) {
// Save Public Key
$this->setPublicKey($uid, $keyPair['publicKey']);

$encryptedKey = $this->crypt->symmetricEncryptFileContent($keyPair['privateKey'],
$password);
$encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $password);

$header = $this->crypt->generateHeader();

if ($encryptedKey) {
Expand All @@ -226,8 +226,7 @@ public function setRecoveryKey($password, $keyPair) {
$keyPair['publicKey'],
Encryption::ID);

$encryptedKey = $this->crypt->symmetricEncryptFileContent($keyPair['privateKey'],
$password);
$encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $password);
$header = $this->crypt->generateHeader();

if ($encryptedKey) {
Expand Down
2 changes: 1 addition & 1 deletion apps/encryption/lib/recovery.php
Original file line number Diff line number Diff line change
Expand Up @@ -136,7 +136,7 @@ public function enableAdminRecovery($password) {
public function changeRecoveryKeyPassword($newPassword, $oldPassword) {
$recoveryKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
$decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey, $oldPassword);
$encryptedRecoveryKey = $this->crypt->symmetricEncryptFileContent($decryptedRecoveryKey, $newPassword);
$encryptedRecoveryKey = $this->crypt->encryptPrivateKey($decryptedRecoveryKey, $newPassword);
$header = $this->crypt->generateHeader();
if ($encryptedRecoveryKey) {
$this->keyManager->setSystemPrivateKey($this->keyManager->getRecoveryKeyId(), $header . $encryptedRecoveryKey);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,7 @@ public function testUpdatePrivateKeyPassword() {

$this->cryptMock
->expects($this->once())
->method('symmetricEncryptFileContent')
->method('encryptPrivateKey')
->willReturn('encryptedKey');

$this->cryptMock
Expand Down
2 changes: 1 addition & 1 deletion apps/encryption/tests/hooks/UserHooksTest.php
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ public function testSetPassphrase() {
->willReturnOnConsecutiveCalls(true, false);

$this->cryptMock->expects($this->exactly(4))
->method('symmetricEncryptFileContent')
->method('encryptPrivateKey')
->willReturn(true);

$this->cryptMock->expects($this->any())
Expand Down
2 changes: 1 addition & 1 deletion apps/encryption/tests/lib/KeyManagerTest.php
Original file line number Diff line number Diff line change
Expand Up @@ -260,7 +260,7 @@ public function testSetRecoveryKey() {
->method('setSystemUserKey')
->willReturn(true);
$this->cryptMock->expects($this->any())
->method('symmetricEncryptFileContent')
->method('encryptPrivateKey')
->with($this->equalTo('privateKey'), $this->equalTo('pass'))
->willReturn('decryptedPrivateKey');

Expand Down
2 changes: 1 addition & 1 deletion apps/encryption/tests/lib/RecoveryTest.php
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ public function testChangeRecoveryKeyPassword() {
->method('decryptPrivateKey');

$this->cryptMock->expects($this->once())
->method('symmetricEncryptFileContent')
->method('encryptPrivateKey')
->willReturn(true);

$this->assertTrue($this->instance->changeRecoveryKeyPassword('password',
Expand Down
Loading

0 comments on commit 62bc0e5

Please sign in to comment.