2018-05-11 01:51:37 +00:00
|
|
|
"""
|
|
|
|
Slixmpp: The Slick XMPP Library
|
|
|
|
Copyright (C) 2018 Maxime “pep” Buquet <pep@bouah.net>
|
|
|
|
This file is part of Slixmpp.
|
|
|
|
|
|
|
|
See the file LICENSE for copying permission.
|
|
|
|
"""
|
|
|
|
|
|
|
|
import logging
|
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
from typing import List
|
|
|
|
|
2018-11-18 11:00:25 +00:00
|
|
|
import os
|
|
|
|
import json
|
|
|
|
import time
|
2018-05-14 09:16:54 +00:00
|
|
|
import base64
|
2018-05-14 10:16:14 +00:00
|
|
|
import asyncio
|
2018-05-11 01:51:37 +00:00
|
|
|
from slixmpp.plugins.xep_0384.stanza import OMEMO_BASE_NS
|
2018-05-14 10:21:27 +00:00
|
|
|
from slixmpp.plugins.xep_0384.stanza import OMEMO_DEVICES_NS, OMEMO_BUNDLES_NS
|
2018-05-23 20:13:06 +00:00
|
|
|
from slixmpp.plugins.xep_0384.stanza import Devices, Device, Key, PreKeyPublic
|
2018-05-11 01:51:37 +00:00
|
|
|
from slixmpp.plugins.base import BasePlugin, register_plugin
|
2018-05-23 21:17:42 +00:00
|
|
|
from slixmpp.exceptions import IqError
|
2018-05-11 01:51:37 +00:00
|
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
2018-05-13 11:12:05 +00:00
|
|
|
HAS_OMEMO = True
|
|
|
|
try:
|
2018-11-18 11:00:25 +00:00
|
|
|
from omemo.util import generateDeviceID
|
|
|
|
from omemo_backend_signal import BACKEND as SignalBackend
|
|
|
|
from slixmpp.plugins.xep_0384.session import WrappedSessionManager as SessionManager
|
|
|
|
from slixmpp.plugins.xep_0384.storage import AsyncInMemoryStorage
|
|
|
|
from slixmpp.plugins.xep_0384.otpkpolicy import KeepingOTPKPolicy
|
2018-05-13 11:12:05 +00:00
|
|
|
except ImportError as e:
|
|
|
|
HAS_OMEMO = False
|
2018-05-11 01:51:37 +00:00
|
|
|
|
2018-05-23 20:13:06 +00:00
|
|
|
TRUE_VALUES = {True, 'true', '1'}
|
|
|
|
|
2018-05-11 01:51:37 +00:00
|
|
|
|
2018-11-18 22:45:31 +00:00
|
|
|
def encode_public_key(key: bytes) -> bytes:
|
|
|
|
return b'\x05' + key
|
|
|
|
|
2018-05-14 09:16:54 +00:00
|
|
|
def b64enc(data):
|
|
|
|
return base64.b64encode(bytes(bytearray(data))).decode('ASCII')
|
|
|
|
|
|
|
|
|
|
|
|
def b64dec(data):
|
|
|
|
return base64.b64decode(data.decode('ASCII'))
|
|
|
|
|
|
|
|
|
2018-11-18 11:00:25 +00:00
|
|
|
# XXX: This should probably be moved in plugins/base.py?
|
|
|
|
class PluginCouldNotLoad(Exception): pass
|
|
|
|
|
|
|
|
|
2018-05-11 01:51:37 +00:00
|
|
|
class XEP_0384(BasePlugin):
|
|
|
|
|
|
|
|
"""
|
|
|
|
XEP-0384: OMEMO
|
|
|
|
"""
|
|
|
|
|
|
|
|
name = 'xep_0384'
|
|
|
|
description = 'XEP-0384 OMEMO'
|
|
|
|
dependencies = {'xep_0163'}
|
2018-05-14 10:07:32 +00:00
|
|
|
default_config = {
|
|
|
|
'cache_dir': None,
|
|
|
|
}
|
|
|
|
|
2018-05-13 11:12:05 +00:00
|
|
|
backend_loaded = HAS_OMEMO
|
2018-05-11 01:51:37 +00:00
|
|
|
|
|
|
|
device_ids = {}
|
|
|
|
|
|
|
|
def plugin_init(self):
|
2018-05-13 11:12:05 +00:00
|
|
|
if not self.backend_loaded:
|
2018-11-18 11:00:25 +00:00
|
|
|
log.info("xep_0384 cannot be loaded as the backend omemo library "
|
2018-05-13 11:12:05 +00:00
|
|
|
"is not available")
|
|
|
|
return
|
|
|
|
|
2018-11-18 11:00:25 +00:00
|
|
|
storage = AsyncInMemoryStorage(self.cache_dir)
|
|
|
|
otpkpolicy = KeepingOTPKPolicy()
|
|
|
|
backend = SignalBackend
|
|
|
|
bare_jid = self.xmpp.boundjid.bare
|
2018-11-18 14:02:03 +00:00
|
|
|
self._device_id = self._load_device_id(self.cache_dir)
|
2018-11-18 11:00:25 +00:00
|
|
|
|
|
|
|
future = SessionManager.create(
|
|
|
|
storage,
|
|
|
|
otpkpolicy,
|
|
|
|
backend,
|
|
|
|
bare_jid,
|
2018-11-18 14:02:03 +00:00
|
|
|
self._device_id,
|
2018-05-14 10:07:32 +00:00
|
|
|
)
|
2018-11-18 11:00:25 +00:00
|
|
|
asyncio.ensure_future(future)
|
2018-05-14 10:07:32 +00:00
|
|
|
|
2018-11-18 11:00:25 +00:00
|
|
|
# XXX: This is crap. Rewrite slixmpp plugin system to use async.
|
|
|
|
# The issue here is that I can't declare plugin_init as async because
|
|
|
|
# it's not awaited on.
|
|
|
|
while not future.done():
|
|
|
|
time.sleep(0.1)
|
2018-05-14 10:16:14 +00:00
|
|
|
|
2018-11-18 11:00:25 +00:00
|
|
|
try:
|
|
|
|
self._omemo = future.result()
|
|
|
|
except:
|
2018-11-18 17:04:58 +00:00
|
|
|
log.error("Couldn't load the OMEMO object; ¯\\_(ツ)_/¯")
|
2018-11-18 11:00:25 +00:00
|
|
|
raise PluginCouldNotLoad
|
2018-05-11 01:51:37 +00:00
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
self.xmpp.add_event_handler('pubsub_publish', self._receive_device_list)
|
|
|
|
asyncio.ensure_future(self._set_device_list())
|
2018-11-18 22:45:31 +00:00
|
|
|
asyncio.ensure_future(self._publish_bundle())
|
2018-11-18 16:48:16 +00:00
|
|
|
|
2018-05-11 01:51:37 +00:00
|
|
|
def plugin_end(self):
|
2018-05-13 11:12:05 +00:00
|
|
|
if not self.backend_loaded:
|
|
|
|
return
|
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
self.xmpp.del_event_handler('pubsub_publish', self._receive_device_list)
|
2018-05-11 01:51:37 +00:00
|
|
|
self.xmpp['xep_0163'].remove_interest(OMEMO_DEVICES_NS)
|
|
|
|
|
2018-11-18 11:00:25 +00:00
|
|
|
def _load_device_id(self, cache_dir):
|
|
|
|
filepath = os.path.join(cache_dir, 'device_id.json')
|
|
|
|
# Try reading file first, decoding, and if file was empty generate
|
|
|
|
# new DeviceID
|
|
|
|
try:
|
|
|
|
with open(filepath, 'r') as f:
|
|
|
|
did = json.load(f)
|
|
|
|
except (FileNotFoundError, json.JSONDecodeError):
|
|
|
|
did = generateDeviceID()
|
|
|
|
with open(filepath, 'w') as f:
|
|
|
|
json.dump(did, f)
|
|
|
|
|
|
|
|
return did
|
|
|
|
|
2018-05-11 01:51:37 +00:00
|
|
|
def session_bind(self, _jid):
|
|
|
|
self.xmpp['xep_0163'].add_interest(OMEMO_DEVICES_NS)
|
|
|
|
|
2018-05-23 21:19:38 +00:00
|
|
|
def my_device_id(self):
|
|
|
|
return self._device_id
|
|
|
|
|
2018-05-14 10:21:27 +00:00
|
|
|
def _generate_bundle_iq(self):
|
2018-11-18 22:45:31 +00:00
|
|
|
bundle = self._omemo.public_bundle
|
2018-05-14 10:21:27 +00:00
|
|
|
|
|
|
|
iq = self.xmpp.Iq(stype='set')
|
|
|
|
publish = iq['pubsub']['publish']
|
|
|
|
publish['node'] = '%s:%d' % (OMEMO_BUNDLES_NS, self._device_id)
|
|
|
|
payload = publish['item']['bundle']
|
2018-11-18 22:45:31 +00:00
|
|
|
signedPreKeyPublic = b64enc(encode_public_key(bundle.spk['key']))
|
2018-05-14 10:21:27 +00:00
|
|
|
payload['signedPreKeyPublic']['value'] = signedPreKeyPublic
|
|
|
|
payload['signedPreKeyPublic']['signedPreKeyId'] = str(bundle.spk['id'])
|
|
|
|
payload['signedPreKeySignature']['value'] = b64enc(
|
|
|
|
bundle.spk_signature
|
|
|
|
)
|
2018-11-18 22:45:31 +00:00
|
|
|
identityKey = b64enc(encode_public_key(bundle.ik))
|
2018-05-14 10:21:27 +00:00
|
|
|
payload['identityKey']['value'] = identityKey
|
|
|
|
|
|
|
|
prekeys = []
|
|
|
|
for otpk in bundle.otpks:
|
|
|
|
prekey = PreKeyPublic()
|
|
|
|
prekey['preKeyId'] = str(otpk['id'])
|
2018-11-18 22:45:31 +00:00
|
|
|
prekey['value'] = b64enc(encode_public_key(otpk['key']))
|
2018-05-14 10:21:27 +00:00
|
|
|
prekeys.append(prekey)
|
|
|
|
payload['prekeys'] = prekeys
|
|
|
|
|
|
|
|
return iq
|
|
|
|
|
|
|
|
async def _publish_bundle(self):
|
2018-11-18 22:45:31 +00:00
|
|
|
if self._omemo.republish_bundle:
|
|
|
|
iq = self._generate_bundle_iq()
|
|
|
|
await iq.send()
|
2018-05-14 10:21:27 +00:00
|
|
|
|
2018-05-14 10:16:14 +00:00
|
|
|
def _store_device_ids(self, jid, items):
|
2018-11-18 16:48:16 +00:00
|
|
|
device_ids = []
|
2018-05-14 10:16:14 +00:00
|
|
|
for item in items:
|
|
|
|
device_ids = [int(d['id']) for d in item['devices']]
|
|
|
|
|
|
|
|
# XXX: There should only be one item so this is fine, but slixmpp
|
|
|
|
# loops forever otherwise. ???
|
|
|
|
break
|
2018-11-18 16:48:16 +00:00
|
|
|
self._omemo.newDeviceList(device_ids, str(jid))
|
2018-05-14 10:16:14 +00:00
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
async def _receive_device_list(self, msg):
|
2018-05-11 01:51:37 +00:00
|
|
|
if msg['pubsub_event']['items']['node'] != OMEMO_DEVICES_NS:
|
|
|
|
return
|
|
|
|
|
2018-05-14 10:12:04 +00:00
|
|
|
jid = msg['from'].bare
|
2018-05-11 01:51:37 +00:00
|
|
|
items = msg['pubsub_event']['items']
|
2018-05-14 10:16:14 +00:00
|
|
|
self._store_device_ids(jid, items)
|
2018-05-11 01:51:37 +00:00
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
device_ids = await self.get_device_list(jid)
|
|
|
|
|
2018-05-14 10:16:14 +00:00
|
|
|
if jid == self.xmpp.boundjid.bare and \
|
2018-11-18 16:48:16 +00:00
|
|
|
self._device_id not in device_ids:
|
2018-05-14 10:16:14 +00:00
|
|
|
asyncio.ensure_future(self._set_device_list())
|
|
|
|
|
|
|
|
async def _set_device_list(self):
|
|
|
|
jid = self.xmpp.boundjid.bare
|
2018-05-23 21:17:42 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
iq = await self.xmpp['xep_0060'].get_items(
|
|
|
|
self.xmpp.boundjid.bare, OMEMO_DEVICES_NS,
|
|
|
|
)
|
|
|
|
log.debug("DEVICES %r", iq)
|
|
|
|
items = iq['pubsub']['items']
|
|
|
|
self._store_device_ids(jid, items)
|
|
|
|
except IqError as iq_err:
|
|
|
|
if iq_err.condition == "item-not-found":
|
|
|
|
log.debug("NO DEVICES")
|
|
|
|
self._store_device_ids(jid, [])
|
|
|
|
else:
|
|
|
|
return # XXX: Handle this!
|
2018-05-14 10:16:14 +00:00
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
device_ids = await self.get_device_list(jid)
|
|
|
|
log.debug('FOO: device_ids: %r', device_ids)
|
|
|
|
|
2018-05-14 10:16:14 +00:00
|
|
|
# Verify that this device in the list and set it if necessary
|
2018-11-18 16:48:16 +00:00
|
|
|
if self._device_id in device_ids:
|
2018-05-11 01:51:37 +00:00
|
|
|
return
|
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
device_ids.append(self._device_id)
|
2018-05-14 10:16:14 +00:00
|
|
|
|
|
|
|
devices = []
|
2018-11-18 16:48:16 +00:00
|
|
|
for i in device_ids:
|
2018-05-14 10:16:14 +00:00
|
|
|
d = Device()
|
|
|
|
d['id'] = str(i)
|
|
|
|
devices.append(d)
|
|
|
|
payload = Devices()
|
|
|
|
payload['devices'] = devices
|
|
|
|
|
|
|
|
await self.xmpp['xep_0060'].publish(
|
|
|
|
jid, OMEMO_DEVICES_NS, payload=payload,
|
|
|
|
)
|
2018-05-11 01:51:37 +00:00
|
|
|
|
2018-11-18 16:48:16 +00:00
|
|
|
async def get_device_list(self, jid) -> List[str]:
|
|
|
|
# XXX: Maybe someday worry about inactive devices somehow
|
|
|
|
devices = await self._omemo.getDevices(jid)
|
|
|
|
return devices["active"]
|
|
|
|
|
2018-05-14 10:24:13 +00:00
|
|
|
def is_encrypted(self, msg):
|
|
|
|
return msg.xml.find('{%s}encrypted' % OMEMO_BASE_NS) is not None
|
|
|
|
|
2018-05-23 20:13:06 +00:00
|
|
|
def decrypt_message(self, msg):
|
|
|
|
header = msg['omemo_encrypted']['header']
|
|
|
|
payload = msg['omemo_encrypted']['payload']
|
|
|
|
|
2018-05-23 20:32:29 +00:00
|
|
|
jid = msg['from'].bare
|
2018-05-23 20:13:06 +00:00
|
|
|
sid = header['sid']
|
|
|
|
|
|
|
|
key = header.xml.find("{%s}key[@rid='%s']" % (
|
|
|
|
OMEMO_BASE_NS, self._device_id))
|
|
|
|
if key is None:
|
|
|
|
log.debug("Saw encrypted message that wasn't for me, ignoring.")
|
|
|
|
return
|
|
|
|
|
|
|
|
key = Key(key)
|
|
|
|
prekey = key['prekey'] in TRUE_VALUES
|
|
|
|
message = key['value']
|
|
|
|
iv = header['iv']
|
|
|
|
|
|
|
|
return self._omemo.decrypt(jid, sid, iv, message, payload, prekey)
|
|
|
|
|
2018-05-14 10:24:13 +00:00
|
|
|
|
2018-05-11 01:51:37 +00:00
|
|
|
register_plugin(XEP_0384)
|