forked from mystiq/hydrogen-web
297 lines
12 KiB
JavaScript
297 lines
12 KiB
JavaScript
/*
|
|
Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
import {DecryptionError} from "../common.js";
|
|
import {groupBy} from "../../../utils/groupBy.js";
|
|
import {Session} from "./Session.js";
|
|
|
|
const SESSION_LIMIT_PER_SENDER_KEY = 4;
|
|
|
|
function isPreKeyMessage(message) {
|
|
return message.type === 0;
|
|
}
|
|
|
|
function sortSessions(sessions) {
|
|
sessions.sort((a, b) => {
|
|
return b.data.lastUsed - a.data.lastUsed;
|
|
});
|
|
}
|
|
|
|
export class Decryption {
|
|
constructor({account, pickleKey, now, ownUserId, storage, olm, senderKeyLock}) {
|
|
this._account = account;
|
|
this._pickleKey = pickleKey;
|
|
this._now = now;
|
|
this._ownUserId = ownUserId;
|
|
this._storage = storage;
|
|
this._olm = olm;
|
|
this._senderKeyLock = senderKeyLock;
|
|
}
|
|
|
|
// we need decryptAll because there is some parallelization we can do for decrypting different sender keys at once
|
|
// but for the same sender key we need to do one by one
|
|
//
|
|
// also we want to store the room key, etc ... in the same txn as we remove the pending encrypted event
|
|
//
|
|
// so we need to decrypt events in a batch (so we can decide which ones can run in parallel and which one one by one)
|
|
// and also can avoid side-effects before all can be stored this way
|
|
//
|
|
// doing it one by one would be possible, but we would lose the opportunity for parallelization
|
|
async decryptAll(events) {
|
|
const eventsPerSenderKey = groupBy(events, event => event.content?.["sender_key"]);
|
|
const timestamp = this._now();
|
|
// take a lock on all senderKeys so encryption or other calls to decryptAll (should not happen)
|
|
// don't modify the sessions at the same time
|
|
const locks = await Promise.all(Array.from(eventsPerSenderKey.keys()).map(senderKey => {
|
|
return this._senderKeyLock.takeLock(senderKey);
|
|
}));
|
|
try {
|
|
const readSessionsTxn = await this._storage.readTxn([this._storage.storeNames.olmSessions]);
|
|
// decrypt events for different sender keys in parallel
|
|
const results = await Promise.all(Array.from(eventsPerSenderKey.entries()).map(([senderKey, events]) => {
|
|
return this._decryptAllForSenderKey(senderKey, events, timestamp, readSessionsTxn);
|
|
}));
|
|
const payloads = results.reduce((all, r) => all.concat(r.payloads), []);
|
|
const errors = results.reduce((all, r) => all.concat(r.errors), []);
|
|
const senderKeyDecryptions = results.map(r => r.senderKeyDecryption);
|
|
return new DecryptionChanges(senderKeyDecryptions, payloads, errors, this._account, locks);
|
|
} catch (err) {
|
|
// make sure the locks are release if something throws
|
|
for (const lock of locks) {
|
|
lock.release();
|
|
}
|
|
throw err;
|
|
}
|
|
}
|
|
|
|
async _decryptAllForSenderKey(senderKey, events, timestamp, readSessionsTxn) {
|
|
const sessions = await this._getSessions(senderKey, readSessionsTxn);
|
|
const senderKeyDecryption = new SenderKeyDecryption(senderKey, sessions, this._olm, timestamp);
|
|
const payloads = [];
|
|
const errors = [];
|
|
// events for a single senderKey need to be decrypted one by one
|
|
for (const event of events) {
|
|
try {
|
|
const payload = this._decryptForSenderKey(senderKeyDecryption, event, timestamp);
|
|
payloads.push(payload);
|
|
} catch (err) {
|
|
errors.push(err);
|
|
}
|
|
}
|
|
return {payloads, errors, senderKeyDecryption};
|
|
}
|
|
|
|
_decryptForSenderKey(senderKeyDecryption, event, timestamp) {
|
|
const senderKey = senderKeyDecryption.senderKey;
|
|
const message = this._getMessageAndValidateEvent(event);
|
|
let plaintext;
|
|
try {
|
|
plaintext = senderKeyDecryption.decrypt(message);
|
|
} catch (err) {
|
|
// TODO: is it ok that an error on one session prevents other sessions from being attempted?
|
|
throw new DecryptionError("OLM_BAD_ENCRYPTED_MESSAGE", event, {senderKey, error: err.message});
|
|
}
|
|
// could not decrypt with any existing session
|
|
if (typeof plaintext !== "string" && isPreKeyMessage(message)) {
|
|
const createResult = this._createSessionAndDecrypt(senderKey, message, timestamp);
|
|
senderKeyDecryption.addNewSession(createResult.session);
|
|
plaintext = createResult.plaintext;
|
|
}
|
|
if (typeof plaintext === "string") {
|
|
let payload;
|
|
try {
|
|
payload = JSON.parse(plaintext);
|
|
} catch (err) {
|
|
throw new DecryptionError("Could not JSON decode plaintext", event, {plaintext, err});
|
|
}
|
|
this._validatePayload(payload, event);
|
|
return {event: payload, senderKey};
|
|
} else {
|
|
throw new DecryptionError("Didn't find any session to decrypt with", event,
|
|
{sessionIds: senderKeyDecryption.sessions.map(s => s.id)});
|
|
}
|
|
}
|
|
|
|
// only for pre-key messages after having attempted decryption with existing sessions
|
|
_createSessionAndDecrypt(senderKey, message, timestamp) {
|
|
let plaintext;
|
|
// if we have multiple messages encrypted with the same new session,
|
|
// this could create multiple sessions as the OTK isn't removed yet
|
|
// (this only happens in DecryptionChanges.write)
|
|
// This should be ok though as we'll first try to decrypt with the new session
|
|
const olmSession = this._account.createInboundOlmSession(senderKey, message.body);
|
|
try {
|
|
plaintext = olmSession.decrypt(message.type, message.body);
|
|
const session = Session.create(senderKey, olmSession, this._olm, this._pickleKey, timestamp);
|
|
session.unload(olmSession);
|
|
return {session, plaintext};
|
|
} catch (err) {
|
|
olmSession.free();
|
|
throw err;
|
|
}
|
|
}
|
|
|
|
_getMessageAndValidateEvent(event) {
|
|
const ciphertext = event.content?.ciphertext;
|
|
if (!ciphertext) {
|
|
throw new DecryptionError("OLM_MISSING_CIPHERTEXT", event);
|
|
}
|
|
const message = ciphertext?.[this._account.identityKeys.curve25519];
|
|
if (!message) {
|
|
throw new DecryptionError("OLM_NOT_INCLUDED_IN_RECIPIENTS", event);
|
|
}
|
|
|
|
return message;
|
|
}
|
|
|
|
async _getSessions(senderKey, txn) {
|
|
const sessionEntries = await txn.olmSessions.getAll(senderKey);
|
|
// sort most recent used sessions first
|
|
const sessions = sessionEntries.map(s => new Session(s, this._pickleKey, this._olm));
|
|
sortSessions(sessions);
|
|
return sessions;
|
|
}
|
|
|
|
_validatePayload(payload, event) {
|
|
if (payload.sender !== event.sender) {
|
|
throw new DecryptionError("OLM_FORWARDED_MESSAGE", event, {sentBy: event.sender, encryptedBy: payload.sender});
|
|
}
|
|
if (payload.recipient !== this._ownUserId) {
|
|
throw new DecryptionError("OLM_BAD_RECIPIENT", event, {recipient: payload.recipient});
|
|
}
|
|
if (payload.recipient_keys?.ed25519 !== this._account.identityKeys.ed25519) {
|
|
throw new DecryptionError("OLM_BAD_RECIPIENT_KEY", event, {key: payload.recipient_keys?.ed25519});
|
|
}
|
|
// TODO: check room_id
|
|
if (!payload.type) {
|
|
throw new DecryptionError("missing type on payload", event, {payload});
|
|
}
|
|
if (!payload.content) {
|
|
throw new DecryptionError("missing content on payload", event, {payload});
|
|
}
|
|
// TODO: how important is it to verify the message?
|
|
// we should look at payload.keys.ed25519 for that... and compare it to the key we have fetched
|
|
// from /keys/query, which we might not have done yet at this point.
|
|
}
|
|
}
|
|
|
|
// decryption helper for a single senderKey
|
|
class SenderKeyDecryption {
|
|
constructor(senderKey, sessions, olm, timestamp) {
|
|
this.senderKey = senderKey;
|
|
this.sessions = sessions;
|
|
this._olm = olm;
|
|
this._timestamp = timestamp;
|
|
}
|
|
|
|
addNewSession(session) {
|
|
// add at top as it is most recent
|
|
this.sessions.unshift(session);
|
|
}
|
|
|
|
decrypt(message) {
|
|
for (const session of this.sessions) {
|
|
const plaintext = this._decryptWithSession(session, message);
|
|
if (typeof plaintext === "string") {
|
|
// keep them sorted so will try the same session first for other messages
|
|
// and so we can assume the excess ones are at the end
|
|
// if they grow too large
|
|
sortSessions(this.sessions);
|
|
return plaintext;
|
|
}
|
|
}
|
|
}
|
|
|
|
getModifiedSessions() {
|
|
return this.sessions.filter(session => session.isModified);
|
|
}
|
|
|
|
get hasNewSessions() {
|
|
return this.sessions.some(session => session.isNew);
|
|
}
|
|
|
|
// this could internally dispatch to a web-worker
|
|
// and is why we unpickle/pickle on each iteration
|
|
// if this turns out to be a real cost for IE11,
|
|
// we could look into adding a less expensive serialization mechanism
|
|
// for olm sessions to libolm
|
|
_decryptWithSession(session, message) {
|
|
const olmSession = session.load();
|
|
try {
|
|
if (isPreKeyMessage(message) && !olmSession.matches_inbound(message.body)) {
|
|
return;
|
|
}
|
|
try {
|
|
const plaintext = olmSession.decrypt(message.type, message.body);
|
|
session.save(olmSession);
|
|
session.lastUsed = this._timestamp;
|
|
return plaintext;
|
|
} catch (err) {
|
|
if (isPreKeyMessage(message)) {
|
|
throw new Error(`Error decrypting prekey message with existing session id ${session.id}: ${err.message}`);
|
|
}
|
|
// decryption failed, bail out
|
|
return;
|
|
}
|
|
} finally {
|
|
session.unload(olmSession);
|
|
}
|
|
}
|
|
}
|
|
|
|
class DecryptionChanges {
|
|
constructor(senderKeyDecryptions, payloads, errors, account, locks) {
|
|
this._senderKeyDecryptions = senderKeyDecryptions;
|
|
this._account = account;
|
|
this.payloads = payloads;
|
|
this.errors = errors;
|
|
this._locks = locks;
|
|
}
|
|
|
|
get hasNewSessions() {
|
|
return this._senderKeyDecryptions.some(skd => skd.hasNewSessions);
|
|
}
|
|
|
|
write(txn) {
|
|
try {
|
|
for (const senderKeyDecryption of this._senderKeyDecryptions) {
|
|
for (const session of senderKeyDecryption.getModifiedSessions()) {
|
|
txn.olmSessions.set(session.data);
|
|
if (session.isNew) {
|
|
const olmSession = session.load();
|
|
try {
|
|
this._account.writeRemoveOneTimeKey(olmSession, txn);
|
|
} finally {
|
|
session.unload(olmSession);
|
|
}
|
|
}
|
|
}
|
|
if (senderKeyDecryption.sessions.length > SESSION_LIMIT_PER_SENDER_KEY) {
|
|
const {senderKey, sessions} = senderKeyDecryption;
|
|
// >= because index is zero-based
|
|
for (let i = sessions.length - 1; i >= SESSION_LIMIT_PER_SENDER_KEY ; i -= 1) {
|
|
const session = sessions[i];
|
|
txn.olmSessions.remove(senderKey, session.id);
|
|
}
|
|
}
|
|
}
|
|
} finally {
|
|
for (const lock of this._locks) {
|
|
lock.release();
|
|
}
|
|
}
|
|
}
|
|
}
|