keyring.py 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2014-2016 OpenMarket Ltd
  3. # Copyright 2017 New Vector Ltd.
  4. #
  5. # Licensed under the Apache License, Version 2.0 (the "License");
  6. # you may not use this file except in compliance with the License.
  7. # You may obtain a copy of the License at
  8. #
  9. # http://www.apache.org/licenses/LICENSE-2.0
  10. #
  11. # Unless required by applicable law or agreed to in writing, software
  12. # distributed under the License is distributed on an "AS IS" BASIS,
  13. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. # See the License for the specific language governing permissions and
  15. # limitations under the License.
  16. import hashlib
  17. import logging
  18. import urllib
  19. from collections import namedtuple
  20. from signedjson.key import (
  21. decode_verify_key_bytes,
  22. encode_verify_key_base64,
  23. is_signing_algorithm_supported,
  24. )
  25. from signedjson.sign import (
  26. SignatureVerifyException,
  27. encode_canonical_json,
  28. sign_json,
  29. signature_ids,
  30. verify_signed_json,
  31. )
  32. from unpaddedbase64 import decode_base64, encode_base64
  33. from OpenSSL import crypto
  34. from twisted.internet import defer
  35. from synapse.api.errors import Codes, SynapseError
  36. from synapse.crypto.keyclient import fetch_server_key
  37. from synapse.util import logcontext, unwrapFirstError
  38. from synapse.util.logcontext import (
  39. PreserveLoggingContext,
  40. preserve_fn,
  41. run_in_background,
  42. )
  43. from synapse.util.metrics import Measure
  44. logger = logging.getLogger(__name__)
  45. VerifyKeyRequest = namedtuple("VerifyRequest", (
  46. "server_name", "key_ids", "json_object", "deferred"
  47. ))
  48. """
  49. A request for a verify key to verify a JSON object.
  50. Attributes:
  51. server_name(str): The name of the server to verify against.
  52. key_ids(set(str)): The set of key_ids to that could be used to verify the
  53. JSON object
  54. json_object(dict): The JSON object to verify.
  55. deferred(Deferred[str, str, nacl.signing.VerifyKey]):
  56. A deferred (server_name, key_id, verify_key) tuple that resolves when
  57. a verify key has been fetched. The deferreds' callbacks are run with no
  58. logcontext.
  59. """
  60. class KeyLookupError(ValueError):
  61. pass
  62. class Keyring(object):
  63. def __init__(self, hs):
  64. self.store = hs.get_datastore()
  65. self.clock = hs.get_clock()
  66. self.client = hs.get_http_client()
  67. self.config = hs.get_config()
  68. self.perspective_servers = self.config.perspectives
  69. self.hs = hs
  70. # map from server name to Deferred. Has an entry for each server with
  71. # an ongoing key download; the Deferred completes once the download
  72. # completes.
  73. #
  74. # These are regular, logcontext-agnostic Deferreds.
  75. self.key_downloads = {}
  76. def verify_json_for_server(self, server_name, json_object):
  77. return logcontext.make_deferred_yieldable(
  78. self.verify_json_objects_for_server(
  79. [(server_name, json_object)]
  80. )[0]
  81. )
  82. def verify_json_objects_for_server(self, server_and_json):
  83. """Bulk verifies signatures of json objects, bulk fetching keys as
  84. necessary.
  85. Args:
  86. server_and_json (list): List of pairs of (server_name, json_object)
  87. Returns:
  88. List<Deferred>: for each input pair, a deferred indicating success
  89. or failure to verify each json object's signature for the given
  90. server_name. The deferreds run their callbacks in the sentinel
  91. logcontext.
  92. """
  93. verify_requests = []
  94. for server_name, json_object in server_and_json:
  95. key_ids = signature_ids(json_object, server_name)
  96. if not key_ids:
  97. logger.warn("Request from %s: no supported signature keys",
  98. server_name)
  99. deferred = defer.fail(SynapseError(
  100. 400,
  101. "Not signed with a supported algorithm",
  102. Codes.UNAUTHORIZED,
  103. ))
  104. else:
  105. deferred = defer.Deferred()
  106. logger.debug("Verifying for %s with key_ids %s",
  107. server_name, key_ids)
  108. verify_request = VerifyKeyRequest(
  109. server_name, key_ids, json_object, deferred
  110. )
  111. verify_requests.append(verify_request)
  112. run_in_background(self._start_key_lookups, verify_requests)
  113. # Pass those keys to handle_key_deferred so that the json object
  114. # signatures can be verified
  115. handle = preserve_fn(_handle_key_deferred)
  116. return [
  117. handle(rq) for rq in verify_requests
  118. ]
  119. @defer.inlineCallbacks
  120. def _start_key_lookups(self, verify_requests):
  121. """Sets off the key fetches for each verify request
  122. Once each fetch completes, verify_request.deferred will be resolved.
  123. Args:
  124. verify_requests (List[VerifyKeyRequest]):
  125. """
  126. try:
  127. # create a deferred for each server we're going to look up the keys
  128. # for; we'll resolve them once we have completed our lookups.
  129. # These will be passed into wait_for_previous_lookups to block
  130. # any other lookups until we have finished.
  131. # The deferreds are called with no logcontext.
  132. server_to_deferred = {
  133. rq.server_name: defer.Deferred()
  134. for rq in verify_requests
  135. }
  136. # We want to wait for any previous lookups to complete before
  137. # proceeding.
  138. yield self.wait_for_previous_lookups(
  139. [rq.server_name for rq in verify_requests],
  140. server_to_deferred,
  141. )
  142. # Actually start fetching keys.
  143. self._get_server_verify_keys(verify_requests)
  144. # When we've finished fetching all the keys for a given server_name,
  145. # resolve the deferred passed to `wait_for_previous_lookups` so that
  146. # any lookups waiting will proceed.
  147. #
  148. # map from server name to a set of request ids
  149. server_to_request_ids = {}
  150. for verify_request in verify_requests:
  151. server_name = verify_request.server_name
  152. request_id = id(verify_request)
  153. server_to_request_ids.setdefault(server_name, set()).add(request_id)
  154. def remove_deferreds(res, verify_request):
  155. server_name = verify_request.server_name
  156. request_id = id(verify_request)
  157. server_to_request_ids[server_name].discard(request_id)
  158. if not server_to_request_ids[server_name]:
  159. d = server_to_deferred.pop(server_name, None)
  160. if d:
  161. d.callback(None)
  162. return res
  163. for verify_request in verify_requests:
  164. verify_request.deferred.addBoth(
  165. remove_deferreds, verify_request,
  166. )
  167. except Exception:
  168. logger.exception("Error starting key lookups")
  169. @defer.inlineCallbacks
  170. def wait_for_previous_lookups(self, server_names, server_to_deferred):
  171. """Waits for any previous key lookups for the given servers to finish.
  172. Args:
  173. server_names (list): list of server_names we want to lookup
  174. server_to_deferred (dict): server_name to deferred which gets
  175. resolved once we've finished looking up keys for that server.
  176. The Deferreds should be regular twisted ones which call their
  177. callbacks with no logcontext.
  178. Returns: a Deferred which resolves once all key lookups for the given
  179. servers have completed. Follows the synapse rules of logcontext
  180. preservation.
  181. """
  182. while True:
  183. wait_on = [
  184. self.key_downloads[server_name]
  185. for server_name in server_names
  186. if server_name in self.key_downloads
  187. ]
  188. if wait_on:
  189. with PreserveLoggingContext():
  190. yield defer.DeferredList(wait_on)
  191. else:
  192. break
  193. def rm(r, server_name_):
  194. self.key_downloads.pop(server_name_, None)
  195. return r
  196. for server_name, deferred in server_to_deferred.items():
  197. self.key_downloads[server_name] = deferred
  198. deferred.addBoth(rm, server_name)
  199. def _get_server_verify_keys(self, verify_requests):
  200. """Tries to find at least one key for each verify request
  201. For each verify_request, verify_request.deferred is called back with
  202. params (server_name, key_id, VerifyKey) if a key is found, or errbacked
  203. with a SynapseError if none of the keys are found.
  204. Args:
  205. verify_requests (list[VerifyKeyRequest]): list of verify requests
  206. """
  207. # These are functions that produce keys given a list of key ids
  208. key_fetch_fns = (
  209. self.get_keys_from_store, # First try the local store
  210. self.get_keys_from_perspectives, # Then try via perspectives
  211. self.get_keys_from_server, # Then try directly
  212. )
  213. @defer.inlineCallbacks
  214. def do_iterations():
  215. with Measure(self.clock, "get_server_verify_keys"):
  216. # dict[str, dict[str, VerifyKey]]: results so far.
  217. # map server_name -> key_id -> VerifyKey
  218. merged_results = {}
  219. # dict[str, set(str)]: keys to fetch for each server
  220. missing_keys = {}
  221. for verify_request in verify_requests:
  222. missing_keys.setdefault(verify_request.server_name, set()).update(
  223. verify_request.key_ids
  224. )
  225. for fn in key_fetch_fns:
  226. results = yield fn(missing_keys.items())
  227. merged_results.update(results)
  228. # We now need to figure out which verify requests we have keys
  229. # for and which we don't
  230. missing_keys = {}
  231. requests_missing_keys = []
  232. for verify_request in verify_requests:
  233. server_name = verify_request.server_name
  234. result_keys = merged_results[server_name]
  235. if verify_request.deferred.called:
  236. # We've already called this deferred, which probably
  237. # means that we've already found a key for it.
  238. continue
  239. for key_id in verify_request.key_ids:
  240. if key_id in result_keys:
  241. with PreserveLoggingContext():
  242. verify_request.deferred.callback((
  243. server_name,
  244. key_id,
  245. result_keys[key_id],
  246. ))
  247. break
  248. else:
  249. # The else block is only reached if the loop above
  250. # doesn't break.
  251. missing_keys.setdefault(server_name, set()).update(
  252. verify_request.key_ids
  253. )
  254. requests_missing_keys.append(verify_request)
  255. if not missing_keys:
  256. break
  257. with PreserveLoggingContext():
  258. for verify_request in requests_missing_keys:
  259. verify_request.deferred.errback(SynapseError(
  260. 401,
  261. "No key for %s with id %s" % (
  262. verify_request.server_name, verify_request.key_ids,
  263. ),
  264. Codes.UNAUTHORIZED,
  265. ))
  266. def on_err(err):
  267. with PreserveLoggingContext():
  268. for verify_request in verify_requests:
  269. if not verify_request.deferred.called:
  270. verify_request.deferred.errback(err)
  271. run_in_background(do_iterations).addErrback(on_err)
  272. @defer.inlineCallbacks
  273. def get_keys_from_store(self, server_name_and_key_ids):
  274. """
  275. Args:
  276. server_name_and_key_ids (list[(str, iterable[str])]):
  277. list of (server_name, iterable[key_id]) tuples to fetch keys for
  278. Returns:
  279. Deferred: resolves to dict[str, dict[str, VerifyKey]]: map from
  280. server_name -> key_id -> VerifyKey
  281. """
  282. res = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  283. [
  284. run_in_background(
  285. self.store.get_server_verify_keys,
  286. server_name, key_ids,
  287. ).addCallback(lambda ks, server: (server, ks), server_name)
  288. for server_name, key_ids in server_name_and_key_ids
  289. ],
  290. consumeErrors=True,
  291. ).addErrback(unwrapFirstError))
  292. defer.returnValue(dict(res))
  293. @defer.inlineCallbacks
  294. def get_keys_from_perspectives(self, server_name_and_key_ids):
  295. @defer.inlineCallbacks
  296. def get_key(perspective_name, perspective_keys):
  297. try:
  298. result = yield self.get_server_verify_key_v2_indirect(
  299. server_name_and_key_ids, perspective_name, perspective_keys
  300. )
  301. defer.returnValue(result)
  302. except Exception as e:
  303. logger.exception(
  304. "Unable to get key from %r: %s %s",
  305. perspective_name,
  306. type(e).__name__, str(e),
  307. )
  308. defer.returnValue({})
  309. results = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  310. [
  311. run_in_background(get_key, p_name, p_keys)
  312. for p_name, p_keys in self.perspective_servers.items()
  313. ],
  314. consumeErrors=True,
  315. ).addErrback(unwrapFirstError))
  316. union_of_keys = {}
  317. for result in results:
  318. for server_name, keys in result.items():
  319. union_of_keys.setdefault(server_name, {}).update(keys)
  320. defer.returnValue(union_of_keys)
  321. @defer.inlineCallbacks
  322. def get_keys_from_server(self, server_name_and_key_ids):
  323. @defer.inlineCallbacks
  324. def get_key(server_name, key_ids):
  325. keys = None
  326. try:
  327. keys = yield self.get_server_verify_key_v2_direct(
  328. server_name, key_ids
  329. )
  330. except Exception as e:
  331. logger.info(
  332. "Unable to get key %r for %r directly: %s %s",
  333. key_ids, server_name,
  334. type(e).__name__, str(e),
  335. )
  336. if not keys:
  337. keys = yield self.get_server_verify_key_v1_direct(
  338. server_name, key_ids
  339. )
  340. keys = {server_name: keys}
  341. defer.returnValue(keys)
  342. results = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  343. [
  344. run_in_background(get_key, server_name, key_ids)
  345. for server_name, key_ids in server_name_and_key_ids
  346. ],
  347. consumeErrors=True,
  348. ).addErrback(unwrapFirstError))
  349. merged = {}
  350. for result in results:
  351. merged.update(result)
  352. defer.returnValue({
  353. server_name: keys
  354. for server_name, keys in merged.items()
  355. if keys
  356. })
  357. @defer.inlineCallbacks
  358. def get_server_verify_key_v2_indirect(self, server_names_and_key_ids,
  359. perspective_name,
  360. perspective_keys):
  361. # TODO(mark): Set the minimum_valid_until_ts to that needed by
  362. # the events being validated or the current time if validating
  363. # an incoming request.
  364. query_response = yield self.client.post_json(
  365. destination=perspective_name,
  366. path=b"/_matrix/key/v2/query",
  367. data={
  368. u"server_keys": {
  369. server_name: {
  370. key_id: {
  371. u"minimum_valid_until_ts": 0
  372. } for key_id in key_ids
  373. }
  374. for server_name, key_ids in server_names_and_key_ids
  375. }
  376. },
  377. long_retries=True,
  378. )
  379. keys = {}
  380. responses = query_response["server_keys"]
  381. for response in responses:
  382. if (u"signatures" not in response
  383. or perspective_name not in response[u"signatures"]):
  384. raise KeyLookupError(
  385. "Key response not signed by perspective server"
  386. " %r" % (perspective_name,)
  387. )
  388. verified = False
  389. for key_id in response[u"signatures"][perspective_name]:
  390. if key_id in perspective_keys:
  391. verify_signed_json(
  392. response,
  393. perspective_name,
  394. perspective_keys[key_id]
  395. )
  396. verified = True
  397. if not verified:
  398. logging.info(
  399. "Response from perspective server %r not signed with a"
  400. " known key, signed with: %r, known keys: %r",
  401. perspective_name,
  402. list(response[u"signatures"][perspective_name]),
  403. list(perspective_keys)
  404. )
  405. raise KeyLookupError(
  406. "Response not signed with a known key for perspective"
  407. " server %r" % (perspective_name,)
  408. )
  409. processed_response = yield self.process_v2_response(
  410. perspective_name, response, only_from_server=False
  411. )
  412. for server_name, response_keys in processed_response.items():
  413. keys.setdefault(server_name, {}).update(response_keys)
  414. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  415. [
  416. run_in_background(
  417. self.store_keys,
  418. server_name=server_name,
  419. from_server=perspective_name,
  420. verify_keys=response_keys,
  421. )
  422. for server_name, response_keys in keys.items()
  423. ],
  424. consumeErrors=True
  425. ).addErrback(unwrapFirstError))
  426. defer.returnValue(keys)
  427. @defer.inlineCallbacks
  428. def get_server_verify_key_v2_direct(self, server_name, key_ids):
  429. keys = {}
  430. for requested_key_id in key_ids:
  431. if requested_key_id in keys:
  432. continue
  433. (response, tls_certificate) = yield fetch_server_key(
  434. server_name, self.tls_client_options_factory,
  435. path=(b"/_matrix/key/v2/server/%s" % (
  436. urllib.quote(requested_key_id),
  437. )).encode("ascii"),
  438. )
  439. if (u"signatures" not in response
  440. or server_name not in response[u"signatures"]):
  441. raise KeyLookupError("Key response not signed by remote server")
  442. if "tls_fingerprints" not in response:
  443. raise KeyLookupError("Key response missing TLS fingerprints")
  444. certificate_bytes = crypto.dump_certificate(
  445. crypto.FILETYPE_ASN1, tls_certificate
  446. )
  447. sha256_fingerprint = hashlib.sha256(certificate_bytes).digest()
  448. sha256_fingerprint_b64 = encode_base64(sha256_fingerprint)
  449. response_sha256_fingerprints = set()
  450. for fingerprint in response[u"tls_fingerprints"]:
  451. if u"sha256" in fingerprint:
  452. response_sha256_fingerprints.add(fingerprint[u"sha256"])
  453. if sha256_fingerprint_b64 not in response_sha256_fingerprints:
  454. raise KeyLookupError("TLS certificate not allowed by fingerprints")
  455. response_keys = yield self.process_v2_response(
  456. from_server=server_name,
  457. requested_ids=[requested_key_id],
  458. response_json=response,
  459. )
  460. keys.update(response_keys)
  461. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  462. [
  463. run_in_background(
  464. self.store_keys,
  465. server_name=key_server_name,
  466. from_server=server_name,
  467. verify_keys=verify_keys,
  468. )
  469. for key_server_name, verify_keys in keys.items()
  470. ],
  471. consumeErrors=True
  472. ).addErrback(unwrapFirstError))
  473. defer.returnValue(keys)
  474. @defer.inlineCallbacks
  475. def process_v2_response(self, from_server, response_json,
  476. requested_ids=[], only_from_server=True):
  477. time_now_ms = self.clock.time_msec()
  478. response_keys = {}
  479. verify_keys = {}
  480. for key_id, key_data in response_json["verify_keys"].items():
  481. if is_signing_algorithm_supported(key_id):
  482. key_base64 = key_data["key"]
  483. key_bytes = decode_base64(key_base64)
  484. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  485. verify_key.time_added = time_now_ms
  486. verify_keys[key_id] = verify_key
  487. old_verify_keys = {}
  488. for key_id, key_data in response_json["old_verify_keys"].items():
  489. if is_signing_algorithm_supported(key_id):
  490. key_base64 = key_data["key"]
  491. key_bytes = decode_base64(key_base64)
  492. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  493. verify_key.expired = key_data["expired_ts"]
  494. verify_key.time_added = time_now_ms
  495. old_verify_keys[key_id] = verify_key
  496. results = {}
  497. server_name = response_json["server_name"]
  498. if only_from_server:
  499. if server_name != from_server:
  500. raise KeyLookupError(
  501. "Expected a response for server %r not %r" % (
  502. from_server, server_name
  503. )
  504. )
  505. for key_id in response_json["signatures"].get(server_name, {}):
  506. if key_id not in response_json["verify_keys"]:
  507. raise KeyLookupError(
  508. "Key response must include verification keys for all"
  509. " signatures"
  510. )
  511. if key_id in verify_keys:
  512. verify_signed_json(
  513. response_json,
  514. server_name,
  515. verify_keys[key_id]
  516. )
  517. signed_key_json = sign_json(
  518. response_json,
  519. self.config.server_name,
  520. self.config.signing_key[0],
  521. )
  522. signed_key_json_bytes = encode_canonical_json(signed_key_json)
  523. ts_valid_until_ms = signed_key_json[u"valid_until_ts"]
  524. updated_key_ids = set(requested_ids)
  525. updated_key_ids.update(verify_keys)
  526. updated_key_ids.update(old_verify_keys)
  527. response_keys.update(verify_keys)
  528. response_keys.update(old_verify_keys)
  529. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  530. [
  531. run_in_background(
  532. self.store.store_server_keys_json,
  533. server_name=server_name,
  534. key_id=key_id,
  535. from_server=server_name,
  536. ts_now_ms=time_now_ms,
  537. ts_expires_ms=ts_valid_until_ms,
  538. key_json_bytes=signed_key_json_bytes,
  539. )
  540. for key_id in updated_key_ids
  541. ],
  542. consumeErrors=True,
  543. ).addErrback(unwrapFirstError))
  544. results[server_name] = response_keys
  545. defer.returnValue(results)
  546. @defer.inlineCallbacks
  547. def get_server_verify_key_v1_direct(self, server_name, key_ids):
  548. """Finds a verification key for the server with one of the key ids.
  549. Args:
  550. server_name (str): The name of the server to fetch a key for.
  551. keys_ids (list of str): The key_ids to check for.
  552. """
  553. # Try to fetch the key from the remote server.
  554. (response, tls_certificate) = yield fetch_server_key(
  555. server_name, self.hs.tls_client_options_factory
  556. )
  557. # Check the response.
  558. x509_certificate_bytes = crypto.dump_certificate(
  559. crypto.FILETYPE_ASN1, tls_certificate
  560. )
  561. if ("signatures" not in response
  562. or server_name not in response["signatures"]):
  563. raise KeyLookupError("Key response not signed by remote server")
  564. if "tls_certificate" not in response:
  565. raise KeyLookupError("Key response missing TLS certificate")
  566. tls_certificate_b64 = response["tls_certificate"]
  567. if encode_base64(x509_certificate_bytes) != tls_certificate_b64:
  568. raise KeyLookupError("TLS certificate doesn't match")
  569. # Cache the result in the datastore.
  570. time_now_ms = self.clock.time_msec()
  571. verify_keys = {}
  572. for key_id, key_base64 in response["verify_keys"].items():
  573. if is_signing_algorithm_supported(key_id):
  574. key_bytes = decode_base64(key_base64)
  575. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  576. verify_key.time_added = time_now_ms
  577. verify_keys[key_id] = verify_key
  578. for key_id in response["signatures"][server_name]:
  579. if key_id not in response["verify_keys"]:
  580. raise KeyLookupError(
  581. "Key response must include verification keys for all"
  582. " signatures"
  583. )
  584. if key_id in verify_keys:
  585. verify_signed_json(
  586. response,
  587. server_name,
  588. verify_keys[key_id]
  589. )
  590. yield self.store.store_server_certificate(
  591. server_name,
  592. server_name,
  593. time_now_ms,
  594. tls_certificate,
  595. )
  596. yield self.store_keys(
  597. server_name=server_name,
  598. from_server=server_name,
  599. verify_keys=verify_keys,
  600. )
  601. defer.returnValue(verify_keys)
  602. def store_keys(self, server_name, from_server, verify_keys):
  603. """Store a collection of verify keys for a given server
  604. Args:
  605. server_name(str): The name of the server the keys are for.
  606. from_server(str): The server the keys were downloaded from.
  607. verify_keys(dict): A mapping of key_id to VerifyKey.
  608. Returns:
  609. A deferred that completes when the keys are stored.
  610. """
  611. # TODO(markjh): Store whether the keys have expired.
  612. return logcontext.make_deferred_yieldable(defer.gatherResults(
  613. [
  614. run_in_background(
  615. self.store.store_server_verify_key,
  616. server_name, server_name, key.time_added, key
  617. )
  618. for key_id, key in verify_keys.items()
  619. ],
  620. consumeErrors=True,
  621. ).addErrback(unwrapFirstError))
  622. @defer.inlineCallbacks
  623. def _handle_key_deferred(verify_request):
  624. """Waits for the key to become available, and then performs a verification
  625. Args:
  626. verify_request (VerifyKeyRequest):
  627. Returns:
  628. Deferred[None]
  629. Raises:
  630. SynapseError if there was a problem performing the verification
  631. """
  632. server_name = verify_request.server_name
  633. try:
  634. with PreserveLoggingContext():
  635. _, key_id, verify_key = yield verify_request.deferred
  636. except IOError as e:
  637. logger.warn(
  638. "Got IOError when downloading keys for %s: %s %s",
  639. server_name, type(e).__name__, str(e),
  640. )
  641. raise SynapseError(
  642. 502,
  643. "Error downloading keys for %s" % (server_name,),
  644. Codes.UNAUTHORIZED,
  645. )
  646. except Exception as e:
  647. logger.exception(
  648. "Got Exception when downloading keys for %s: %s %s",
  649. server_name, type(e).__name__, str(e),
  650. )
  651. raise SynapseError(
  652. 401,
  653. "No key for %s with id %s" % (server_name, verify_request.key_ids),
  654. Codes.UNAUTHORIZED,
  655. )
  656. json_object = verify_request.json_object
  657. logger.debug("Got key %s %s:%s for server %s, verifying" % (
  658. key_id, verify_key.alg, verify_key.version, server_name,
  659. ))
  660. try:
  661. verify_signed_json(json_object, server_name, verify_key)
  662. except SignatureVerifyException as e:
  663. logger.debug(
  664. "Error verifying signature for %s:%s:%s with key %s: %s",
  665. server_name, verify_key.alg, verify_key.version,
  666. encode_verify_key_base64(verify_key),
  667. str(e),
  668. )
  669. raise SynapseError(
  670. 401,
  671. "Invalid signature for server %s with key %s:%s: %s" % (
  672. server_name, verify_key.alg, verify_key.version, str(e),
  673. ),
  674. Codes.UNAUTHORIZED,
  675. )