keyring.py 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812
  1. # -*- coding: utf-8 -*-
  2. # Copyright 2014-2016 OpenMarket Ltd
  3. # Copyright 2017 New Vector Ltd.
  4. #
  5. # Licensed under the Apache License, Version 2.0 (the "License");
  6. # you may not use this file except in compliance with the License.
  7. # You may obtain a copy of the License at
  8. #
  9. # http://www.apache.org/licenses/LICENSE-2.0
  10. #
  11. # Unless required by applicable law or agreed to in writing, software
  12. # distributed under the License is distributed on an "AS IS" BASIS,
  13. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. # See the License for the specific language governing permissions and
  15. # limitations under the License.
  16. import hashlib
  17. import logging
  18. from collections import namedtuple
  19. from six.moves import urllib
  20. from signedjson.key import (
  21. decode_verify_key_bytes,
  22. encode_verify_key_base64,
  23. is_signing_algorithm_supported,
  24. )
  25. from signedjson.sign import (
  26. SignatureVerifyException,
  27. encode_canonical_json,
  28. sign_json,
  29. signature_ids,
  30. verify_signed_json,
  31. )
  32. from unpaddedbase64 import decode_base64, encode_base64
  33. from OpenSSL import crypto
  34. from twisted.internet import defer
  35. from synapse.api.errors import Codes, SynapseError
  36. from synapse.crypto.keyclient import fetch_server_key
  37. from synapse.util import logcontext, unwrapFirstError
  38. from synapse.util.logcontext import (
  39. LoggingContext,
  40. PreserveLoggingContext,
  41. preserve_fn,
  42. run_in_background,
  43. )
  44. from synapse.util.metrics import Measure
  45. logger = logging.getLogger(__name__)
  46. VerifyKeyRequest = namedtuple("VerifyRequest", (
  47. "server_name", "key_ids", "json_object", "deferred"
  48. ))
  49. """
  50. A request for a verify key to verify a JSON object.
  51. Attributes:
  52. server_name(str): The name of the server to verify against.
  53. key_ids(set(str)): The set of key_ids to that could be used to verify the
  54. JSON object
  55. json_object(dict): The JSON object to verify.
  56. deferred(Deferred[str, str, nacl.signing.VerifyKey]):
  57. A deferred (server_name, key_id, verify_key) tuple that resolves when
  58. a verify key has been fetched. The deferreds' callbacks are run with no
  59. logcontext.
  60. """
  61. class KeyLookupError(ValueError):
  62. pass
  63. class Keyring(object):
  64. def __init__(self, hs):
  65. self.store = hs.get_datastore()
  66. self.clock = hs.get_clock()
  67. self.client = hs.get_http_client()
  68. self.config = hs.get_config()
  69. self.perspective_servers = self.config.perspectives
  70. self.hs = hs
  71. # map from server name to Deferred. Has an entry for each server with
  72. # an ongoing key download; the Deferred completes once the download
  73. # completes.
  74. #
  75. # These are regular, logcontext-agnostic Deferreds.
  76. self.key_downloads = {}
  77. def verify_json_for_server(self, server_name, json_object):
  78. return logcontext.make_deferred_yieldable(
  79. self.verify_json_objects_for_server(
  80. [(server_name, json_object)]
  81. )[0]
  82. )
  83. def verify_json_objects_for_server(self, server_and_json):
  84. """Bulk verifies signatures of json objects, bulk fetching keys as
  85. necessary.
  86. Args:
  87. server_and_json (list): List of pairs of (server_name, json_object)
  88. Returns:
  89. List<Deferred>: for each input pair, a deferred indicating success
  90. or failure to verify each json object's signature for the given
  91. server_name. The deferreds run their callbacks in the sentinel
  92. logcontext.
  93. """
  94. verify_requests = []
  95. for server_name, json_object in server_and_json:
  96. key_ids = signature_ids(json_object, server_name)
  97. if not key_ids:
  98. logger.warn("Request from %s: no supported signature keys",
  99. server_name)
  100. deferred = defer.fail(SynapseError(
  101. 400,
  102. "Not signed with a supported algorithm",
  103. Codes.UNAUTHORIZED,
  104. ))
  105. else:
  106. deferred = defer.Deferred()
  107. logger.debug("Verifying for %s with key_ids %s",
  108. server_name, key_ids)
  109. verify_request = VerifyKeyRequest(
  110. server_name, key_ids, json_object, deferred
  111. )
  112. verify_requests.append(verify_request)
  113. run_in_background(self._start_key_lookups, verify_requests)
  114. # Pass those keys to handle_key_deferred so that the json object
  115. # signatures can be verified
  116. handle = preserve_fn(_handle_key_deferred)
  117. return [
  118. handle(rq) for rq in verify_requests
  119. ]
  120. @defer.inlineCallbacks
  121. def _start_key_lookups(self, verify_requests):
  122. """Sets off the key fetches for each verify request
  123. Once each fetch completes, verify_request.deferred will be resolved.
  124. Args:
  125. verify_requests (List[VerifyKeyRequest]):
  126. """
  127. try:
  128. # create a deferred for each server we're going to look up the keys
  129. # for; we'll resolve them once we have completed our lookups.
  130. # These will be passed into wait_for_previous_lookups to block
  131. # any other lookups until we have finished.
  132. # The deferreds are called with no logcontext.
  133. server_to_deferred = {
  134. rq.server_name: defer.Deferred()
  135. for rq in verify_requests
  136. }
  137. # We want to wait for any previous lookups to complete before
  138. # proceeding.
  139. yield self.wait_for_previous_lookups(
  140. [rq.server_name for rq in verify_requests],
  141. server_to_deferred,
  142. )
  143. # Actually start fetching keys.
  144. self._get_server_verify_keys(verify_requests)
  145. # When we've finished fetching all the keys for a given server_name,
  146. # resolve the deferred passed to `wait_for_previous_lookups` so that
  147. # any lookups waiting will proceed.
  148. #
  149. # map from server name to a set of request ids
  150. server_to_request_ids = {}
  151. for verify_request in verify_requests:
  152. server_name = verify_request.server_name
  153. request_id = id(verify_request)
  154. server_to_request_ids.setdefault(server_name, set()).add(request_id)
  155. def remove_deferreds(res, verify_request):
  156. server_name = verify_request.server_name
  157. request_id = id(verify_request)
  158. server_to_request_ids[server_name].discard(request_id)
  159. if not server_to_request_ids[server_name]:
  160. d = server_to_deferred.pop(server_name, None)
  161. if d:
  162. d.callback(None)
  163. return res
  164. for verify_request in verify_requests:
  165. verify_request.deferred.addBoth(
  166. remove_deferreds, verify_request,
  167. )
  168. except Exception:
  169. logger.exception("Error starting key lookups")
  170. @defer.inlineCallbacks
  171. def wait_for_previous_lookups(self, server_names, server_to_deferred):
  172. """Waits for any previous key lookups for the given servers to finish.
  173. Args:
  174. server_names (list): list of server_names we want to lookup
  175. server_to_deferred (dict): server_name to deferred which gets
  176. resolved once we've finished looking up keys for that server.
  177. The Deferreds should be regular twisted ones which call their
  178. callbacks with no logcontext.
  179. Returns: a Deferred which resolves once all key lookups for the given
  180. servers have completed. Follows the synapse rules of logcontext
  181. preservation.
  182. """
  183. loop_count = 1
  184. while True:
  185. wait_on = [
  186. (server_name, self.key_downloads[server_name])
  187. for server_name in server_names
  188. if server_name in self.key_downloads
  189. ]
  190. if not wait_on:
  191. break
  192. logger.info(
  193. "Waiting for existing lookups for %s to complete [loop %i]",
  194. [w[0] for w in wait_on], loop_count,
  195. )
  196. with PreserveLoggingContext():
  197. yield defer.DeferredList((w[1] for w in wait_on))
  198. loop_count += 1
  199. ctx = LoggingContext.current_context()
  200. def rm(r, server_name_):
  201. with PreserveLoggingContext(ctx):
  202. logger.debug("Releasing key lookup lock on %s", server_name_)
  203. self.key_downloads.pop(server_name_, None)
  204. return r
  205. for server_name, deferred in server_to_deferred.items():
  206. logger.debug("Got key lookup lock on %s", server_name)
  207. self.key_downloads[server_name] = deferred
  208. deferred.addBoth(rm, server_name)
  209. def _get_server_verify_keys(self, verify_requests):
  210. """Tries to find at least one key for each verify request
  211. For each verify_request, verify_request.deferred is called back with
  212. params (server_name, key_id, VerifyKey) if a key is found, or errbacked
  213. with a SynapseError if none of the keys are found.
  214. Args:
  215. verify_requests (list[VerifyKeyRequest]): list of verify requests
  216. """
  217. # These are functions that produce keys given a list of key ids
  218. key_fetch_fns = (
  219. self.get_keys_from_store, # First try the local store
  220. self.get_keys_from_perspectives, # Then try via perspectives
  221. self.get_keys_from_server, # Then try directly
  222. )
  223. @defer.inlineCallbacks
  224. def do_iterations():
  225. with Measure(self.clock, "get_server_verify_keys"):
  226. # dict[str, dict[str, VerifyKey]]: results so far.
  227. # map server_name -> key_id -> VerifyKey
  228. merged_results = {}
  229. # dict[str, set(str)]: keys to fetch for each server
  230. missing_keys = {}
  231. for verify_request in verify_requests:
  232. missing_keys.setdefault(verify_request.server_name, set()).update(
  233. verify_request.key_ids
  234. )
  235. for fn in key_fetch_fns:
  236. results = yield fn(missing_keys.items())
  237. merged_results.update(results)
  238. # We now need to figure out which verify requests we have keys
  239. # for and which we don't
  240. missing_keys = {}
  241. requests_missing_keys = []
  242. for verify_request in verify_requests:
  243. server_name = verify_request.server_name
  244. result_keys = merged_results[server_name]
  245. if verify_request.deferred.called:
  246. # We've already called this deferred, which probably
  247. # means that we've already found a key for it.
  248. continue
  249. for key_id in verify_request.key_ids:
  250. if key_id in result_keys:
  251. with PreserveLoggingContext():
  252. verify_request.deferred.callback((
  253. server_name,
  254. key_id,
  255. result_keys[key_id],
  256. ))
  257. break
  258. else:
  259. # The else block is only reached if the loop above
  260. # doesn't break.
  261. missing_keys.setdefault(server_name, set()).update(
  262. verify_request.key_ids
  263. )
  264. requests_missing_keys.append(verify_request)
  265. if not missing_keys:
  266. break
  267. with PreserveLoggingContext():
  268. for verify_request in requests_missing_keys:
  269. verify_request.deferred.errback(SynapseError(
  270. 401,
  271. "No key for %s with id %s" % (
  272. verify_request.server_name, verify_request.key_ids,
  273. ),
  274. Codes.UNAUTHORIZED,
  275. ))
  276. def on_err(err):
  277. with PreserveLoggingContext():
  278. for verify_request in verify_requests:
  279. if not verify_request.deferred.called:
  280. verify_request.deferred.errback(err)
  281. run_in_background(do_iterations).addErrback(on_err)
  282. @defer.inlineCallbacks
  283. def get_keys_from_store(self, server_name_and_key_ids):
  284. """
  285. Args:
  286. server_name_and_key_ids (list[(str, iterable[str])]):
  287. list of (server_name, iterable[key_id]) tuples to fetch keys for
  288. Returns:
  289. Deferred: resolves to dict[str, dict[str, VerifyKey]]: map from
  290. server_name -> key_id -> VerifyKey
  291. """
  292. res = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  293. [
  294. run_in_background(
  295. self.store.get_server_verify_keys,
  296. server_name, key_ids,
  297. ).addCallback(lambda ks, server: (server, ks), server_name)
  298. for server_name, key_ids in server_name_and_key_ids
  299. ],
  300. consumeErrors=True,
  301. ).addErrback(unwrapFirstError))
  302. defer.returnValue(dict(res))
  303. @defer.inlineCallbacks
  304. def get_keys_from_perspectives(self, server_name_and_key_ids):
  305. @defer.inlineCallbacks
  306. def get_key(perspective_name, perspective_keys):
  307. try:
  308. result = yield self.get_server_verify_key_v2_indirect(
  309. server_name_and_key_ids, perspective_name, perspective_keys
  310. )
  311. defer.returnValue(result)
  312. except Exception as e:
  313. logger.exception(
  314. "Unable to get key from %r: %s %s",
  315. perspective_name,
  316. type(e).__name__, str(e),
  317. )
  318. defer.returnValue({})
  319. results = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  320. [
  321. run_in_background(get_key, p_name, p_keys)
  322. for p_name, p_keys in self.perspective_servers.items()
  323. ],
  324. consumeErrors=True,
  325. ).addErrback(unwrapFirstError))
  326. union_of_keys = {}
  327. for result in results:
  328. for server_name, keys in result.items():
  329. union_of_keys.setdefault(server_name, {}).update(keys)
  330. defer.returnValue(union_of_keys)
  331. @defer.inlineCallbacks
  332. def get_keys_from_server(self, server_name_and_key_ids):
  333. @defer.inlineCallbacks
  334. def get_key(server_name, key_ids):
  335. keys = None
  336. try:
  337. keys = yield self.get_server_verify_key_v2_direct(
  338. server_name, key_ids
  339. )
  340. except Exception as e:
  341. logger.info(
  342. "Unable to get key %r for %r directly: %s %s",
  343. key_ids, server_name,
  344. type(e).__name__, str(e),
  345. )
  346. if not keys:
  347. keys = yield self.get_server_verify_key_v1_direct(
  348. server_name, key_ids
  349. )
  350. keys = {server_name: keys}
  351. defer.returnValue(keys)
  352. results = yield logcontext.make_deferred_yieldable(defer.gatherResults(
  353. [
  354. run_in_background(get_key, server_name, key_ids)
  355. for server_name, key_ids in server_name_and_key_ids
  356. ],
  357. consumeErrors=True,
  358. ).addErrback(unwrapFirstError))
  359. merged = {}
  360. for result in results:
  361. merged.update(result)
  362. defer.returnValue({
  363. server_name: keys
  364. for server_name, keys in merged.items()
  365. if keys
  366. })
  367. @defer.inlineCallbacks
  368. def get_server_verify_key_v2_indirect(self, server_names_and_key_ids,
  369. perspective_name,
  370. perspective_keys):
  371. # TODO(mark): Set the minimum_valid_until_ts to that needed by
  372. # the events being validated or the current time if validating
  373. # an incoming request.
  374. query_response = yield self.client.post_json(
  375. destination=perspective_name,
  376. path="/_matrix/key/v2/query",
  377. data={
  378. u"server_keys": {
  379. server_name: {
  380. key_id: {
  381. u"minimum_valid_until_ts": 0
  382. } for key_id in key_ids
  383. }
  384. for server_name, key_ids in server_names_and_key_ids
  385. }
  386. },
  387. long_retries=True,
  388. )
  389. keys = {}
  390. responses = query_response["server_keys"]
  391. for response in responses:
  392. if (u"signatures" not in response
  393. or perspective_name not in response[u"signatures"]):
  394. raise KeyLookupError(
  395. "Key response not signed by perspective server"
  396. " %r" % (perspective_name,)
  397. )
  398. verified = False
  399. for key_id in response[u"signatures"][perspective_name]:
  400. if key_id in perspective_keys:
  401. verify_signed_json(
  402. response,
  403. perspective_name,
  404. perspective_keys[key_id]
  405. )
  406. verified = True
  407. if not verified:
  408. logging.info(
  409. "Response from perspective server %r not signed with a"
  410. " known key, signed with: %r, known keys: %r",
  411. perspective_name,
  412. list(response[u"signatures"][perspective_name]),
  413. list(perspective_keys)
  414. )
  415. raise KeyLookupError(
  416. "Response not signed with a known key for perspective"
  417. " server %r" % (perspective_name,)
  418. )
  419. processed_response = yield self.process_v2_response(
  420. perspective_name, response, only_from_server=False
  421. )
  422. for server_name, response_keys in processed_response.items():
  423. keys.setdefault(server_name, {}).update(response_keys)
  424. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  425. [
  426. run_in_background(
  427. self.store_keys,
  428. server_name=server_name,
  429. from_server=perspective_name,
  430. verify_keys=response_keys,
  431. )
  432. for server_name, response_keys in keys.items()
  433. ],
  434. consumeErrors=True
  435. ).addErrback(unwrapFirstError))
  436. defer.returnValue(keys)
  437. @defer.inlineCallbacks
  438. def get_server_verify_key_v2_direct(self, server_name, key_ids):
  439. keys = {}
  440. for requested_key_id in key_ids:
  441. if requested_key_id in keys:
  442. continue
  443. (response, tls_certificate) = yield fetch_server_key(
  444. server_name, self.hs.tls_client_options_factory,
  445. path=("/_matrix/key/v2/server/%s" % (
  446. urllib.parse.quote(requested_key_id),
  447. )).encode("ascii"),
  448. )
  449. if (u"signatures" not in response
  450. or server_name not in response[u"signatures"]):
  451. raise KeyLookupError("Key response not signed by remote server")
  452. if "tls_fingerprints" not in response:
  453. raise KeyLookupError("Key response missing TLS fingerprints")
  454. certificate_bytes = crypto.dump_certificate(
  455. crypto.FILETYPE_ASN1, tls_certificate
  456. )
  457. sha256_fingerprint = hashlib.sha256(certificate_bytes).digest()
  458. sha256_fingerprint_b64 = encode_base64(sha256_fingerprint)
  459. response_sha256_fingerprints = set()
  460. for fingerprint in response[u"tls_fingerprints"]:
  461. if u"sha256" in fingerprint:
  462. response_sha256_fingerprints.add(fingerprint[u"sha256"])
  463. if sha256_fingerprint_b64 not in response_sha256_fingerprints:
  464. raise KeyLookupError("TLS certificate not allowed by fingerprints")
  465. response_keys = yield self.process_v2_response(
  466. from_server=server_name,
  467. requested_ids=[requested_key_id],
  468. response_json=response,
  469. )
  470. keys.update(response_keys)
  471. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  472. [
  473. run_in_background(
  474. self.store_keys,
  475. server_name=key_server_name,
  476. from_server=server_name,
  477. verify_keys=verify_keys,
  478. )
  479. for key_server_name, verify_keys in keys.items()
  480. ],
  481. consumeErrors=True
  482. ).addErrback(unwrapFirstError))
  483. defer.returnValue(keys)
  484. @defer.inlineCallbacks
  485. def process_v2_response(self, from_server, response_json,
  486. requested_ids=[], only_from_server=True):
  487. time_now_ms = self.clock.time_msec()
  488. response_keys = {}
  489. verify_keys = {}
  490. for key_id, key_data in response_json["verify_keys"].items():
  491. if is_signing_algorithm_supported(key_id):
  492. key_base64 = key_data["key"]
  493. key_bytes = decode_base64(key_base64)
  494. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  495. verify_key.time_added = time_now_ms
  496. verify_keys[key_id] = verify_key
  497. old_verify_keys = {}
  498. for key_id, key_data in response_json["old_verify_keys"].items():
  499. if is_signing_algorithm_supported(key_id):
  500. key_base64 = key_data["key"]
  501. key_bytes = decode_base64(key_base64)
  502. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  503. verify_key.expired = key_data["expired_ts"]
  504. verify_key.time_added = time_now_ms
  505. old_verify_keys[key_id] = verify_key
  506. results = {}
  507. server_name = response_json["server_name"]
  508. if only_from_server:
  509. if server_name != from_server:
  510. raise KeyLookupError(
  511. "Expected a response for server %r not %r" % (
  512. from_server, server_name
  513. )
  514. )
  515. for key_id in response_json["signatures"].get(server_name, {}):
  516. if key_id not in response_json["verify_keys"]:
  517. raise KeyLookupError(
  518. "Key response must include verification keys for all"
  519. " signatures"
  520. )
  521. if key_id in verify_keys:
  522. verify_signed_json(
  523. response_json,
  524. server_name,
  525. verify_keys[key_id]
  526. )
  527. signed_key_json = sign_json(
  528. response_json,
  529. self.config.server_name,
  530. self.config.signing_key[0],
  531. )
  532. signed_key_json_bytes = encode_canonical_json(signed_key_json)
  533. ts_valid_until_ms = signed_key_json[u"valid_until_ts"]
  534. updated_key_ids = set(requested_ids)
  535. updated_key_ids.update(verify_keys)
  536. updated_key_ids.update(old_verify_keys)
  537. response_keys.update(verify_keys)
  538. response_keys.update(old_verify_keys)
  539. yield logcontext.make_deferred_yieldable(defer.gatherResults(
  540. [
  541. run_in_background(
  542. self.store.store_server_keys_json,
  543. server_name=server_name,
  544. key_id=key_id,
  545. from_server=server_name,
  546. ts_now_ms=time_now_ms,
  547. ts_expires_ms=ts_valid_until_ms,
  548. key_json_bytes=signed_key_json_bytes,
  549. )
  550. for key_id in updated_key_ids
  551. ],
  552. consumeErrors=True,
  553. ).addErrback(unwrapFirstError))
  554. results[server_name] = response_keys
  555. defer.returnValue(results)
  556. @defer.inlineCallbacks
  557. def get_server_verify_key_v1_direct(self, server_name, key_ids):
  558. """Finds a verification key for the server with one of the key ids.
  559. Args:
  560. server_name (str): The name of the server to fetch a key for.
  561. keys_ids (list of str): The key_ids to check for.
  562. """
  563. # Try to fetch the key from the remote server.
  564. (response, tls_certificate) = yield fetch_server_key(
  565. server_name, self.hs.tls_client_options_factory
  566. )
  567. # Check the response.
  568. x509_certificate_bytes = crypto.dump_certificate(
  569. crypto.FILETYPE_ASN1, tls_certificate
  570. )
  571. if ("signatures" not in response
  572. or server_name not in response["signatures"]):
  573. raise KeyLookupError("Key response not signed by remote server")
  574. if "tls_certificate" not in response:
  575. raise KeyLookupError("Key response missing TLS certificate")
  576. tls_certificate_b64 = response["tls_certificate"]
  577. if encode_base64(x509_certificate_bytes) != tls_certificate_b64:
  578. raise KeyLookupError("TLS certificate doesn't match")
  579. # Cache the result in the datastore.
  580. time_now_ms = self.clock.time_msec()
  581. verify_keys = {}
  582. for key_id, key_base64 in response["verify_keys"].items():
  583. if is_signing_algorithm_supported(key_id):
  584. key_bytes = decode_base64(key_base64)
  585. verify_key = decode_verify_key_bytes(key_id, key_bytes)
  586. verify_key.time_added = time_now_ms
  587. verify_keys[key_id] = verify_key
  588. for key_id in response["signatures"][server_name]:
  589. if key_id not in response["verify_keys"]:
  590. raise KeyLookupError(
  591. "Key response must include verification keys for all"
  592. " signatures"
  593. )
  594. if key_id in verify_keys:
  595. verify_signed_json(
  596. response,
  597. server_name,
  598. verify_keys[key_id]
  599. )
  600. yield self.store.store_server_certificate(
  601. server_name,
  602. server_name,
  603. time_now_ms,
  604. tls_certificate,
  605. )
  606. yield self.store_keys(
  607. server_name=server_name,
  608. from_server=server_name,
  609. verify_keys=verify_keys,
  610. )
  611. defer.returnValue(verify_keys)
  612. def store_keys(self, server_name, from_server, verify_keys):
  613. """Store a collection of verify keys for a given server
  614. Args:
  615. server_name(str): The name of the server the keys are for.
  616. from_server(str): The server the keys were downloaded from.
  617. verify_keys(dict): A mapping of key_id to VerifyKey.
  618. Returns:
  619. A deferred that completes when the keys are stored.
  620. """
  621. # TODO(markjh): Store whether the keys have expired.
  622. return logcontext.make_deferred_yieldable(defer.gatherResults(
  623. [
  624. run_in_background(
  625. self.store.store_server_verify_key,
  626. server_name, server_name, key.time_added, key
  627. )
  628. for key_id, key in verify_keys.items()
  629. ],
  630. consumeErrors=True,
  631. ).addErrback(unwrapFirstError))
  632. @defer.inlineCallbacks
  633. def _handle_key_deferred(verify_request):
  634. """Waits for the key to become available, and then performs a verification
  635. Args:
  636. verify_request (VerifyKeyRequest):
  637. Returns:
  638. Deferred[None]
  639. Raises:
  640. SynapseError if there was a problem performing the verification
  641. """
  642. server_name = verify_request.server_name
  643. try:
  644. with PreserveLoggingContext():
  645. _, key_id, verify_key = yield verify_request.deferred
  646. except IOError as e:
  647. logger.warn(
  648. "Got IOError when downloading keys for %s: %s %s",
  649. server_name, type(e).__name__, str(e),
  650. )
  651. raise SynapseError(
  652. 502,
  653. "Error downloading keys for %s" % (server_name,),
  654. Codes.UNAUTHORIZED,
  655. )
  656. except Exception as e:
  657. logger.exception(
  658. "Got Exception when downloading keys for %s: %s %s",
  659. server_name, type(e).__name__, str(e),
  660. )
  661. raise SynapseError(
  662. 401,
  663. "No key for %s with id %s" % (server_name, verify_request.key_ids),
  664. Codes.UNAUTHORIZED,
  665. )
  666. json_object = verify_request.json_object
  667. logger.debug("Got key %s %s:%s for server %s, verifying" % (
  668. key_id, verify_key.alg, verify_key.version, server_name,
  669. ))
  670. try:
  671. verify_signed_json(json_object, server_name, verify_key)
  672. except SignatureVerifyException as e:
  673. logger.debug(
  674. "Error verifying signature for %s:%s:%s with key %s: %s",
  675. server_name, verify_key.alg, verify_key.version,
  676. encode_verify_key_base64(verify_key),
  677. str(e),
  678. )
  679. raise SynapseError(
  680. 401,
  681. "Invalid signature for server %s with key %s:%s: %s" % (
  682. server_name, verify_key.alg, verify_key.version, str(e),
  683. ),
  684. Codes.UNAUTHORIZED,
  685. )