-
Notifications
You must be signed in to change notification settings - Fork 5
/
di.go
458 lines (413 loc) · 14.2 KB
/
di.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
// SPDX-FileCopyrightText: (C) 2024 Intel Corporation
// SPDX-License-Identifier: Apache 2.0
package fdo
import (
"context"
"crypto"
"crypto/ecdsa"
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"fmt"
"hash"
"io"
"time"
"github.com/fido-device-onboard/go-fdo/cbor"
"github.com/fido-device-onboard/go-fdo/cose"
"github.com/fido-device-onboard/go-fdo/protocol"
)
// DIConfig contains required device secrets and optional configuration.
type DIConfig struct {
// HMAC-SHA256 with a device secret that does not change when ownership is
// transferred. HMAC-SHA256 support is always required by spec, so this
// field must be non-nil.
//
// This hash.Hash may optionally implement the following interface to
// return errors from Reset/Write/Sum, noting that implementations of
// hash.Hash are not supposed to return non-nil errors from Write.
//
// type FallibleHash interface {
// Err() error
// }
HmacSha256 hash.Hash
// HMAC-SHA384 with a device secret that does not change when ownership is
// transferred. HMAC-SHA384 support is optional by spec, so this field may
// be nil iff Key is RSA 2048 or EC P-256.
//
// This hash.Hash may optionally implement the following interface to
// return errors from Reset/Write/Sum, noting that implementations of
// hash.Hash are not supposed to return non-nil errors from Write.
//
// type FallibleHash interface {
// Err() error
// }
HmacSha384 hash.Hash
// An ECDSA or RSA private key
Key crypto.Signer
// When true and an RSA key is used as a crypto.Signer argument, RSA-SSAPSS
// will be used for signing
PSS bool
}
// DI runs the DI protocol and returns the voucher header and manufacturer
// public key hash. It requires that the client is configured with an HMAC
// secret, but not necessarily a key.
//
// The device is identified to the manufacturing component by the ID string,
// which may be a device serial, MAC address, or similar. There is generally an
// expectation of network trust for DI.
//
// The device certificate chain should be created before DI is performed,
// because the manufacturing component signs the ownership voucher, but isn't
// necessarily the root of trust for the device's identity and may or may not
// validate the device's presented certificate chain.
//
// However, the [Java server] implementation expects a certificate signing
// request marshaled in the device info and performs certificate signing, so
// PKI and voucher signing duties may be simultaneously handled by the
// manufacturing component.
//
// [Java server]: https://github.com/fido-device-onboard/pri-fidoiot
func DI(ctx context.Context, transport Transport, info any, c DIConfig) (*DeviceCredential, error) {
ctx = contextWithErrMsg(ctx)
ovh, err := appStart(ctx, transport, info)
if err != nil {
errorMsg(ctx, transport, err)
return nil, err
}
// Select the appropriate hash algorithm
ownerPubKey, err := ovh.ManufacturerKey.Public()
if err != nil {
return nil, fmt.Errorf("error parsing manufacturer public key type from received ownership voucher header: %w", err)
}
alg, err := hashAlgFor(c.Key.Public(), ownerPubKey)
if err != nil {
return nil, fmt.Errorf("error selecting the appropriate hash algorithm: %w", err)
}
// Hash initial owner public key
ownerKeyDigest := alg.HashFunc().New()
if err := cbor.NewEncoder(ownerKeyDigest).Encode(ovh.ManufacturerKey); err != nil {
err = fmt.Errorf("error computing hash of initial owner (manufacturer) key: %w", err)
errorMsg(ctx, transport, err)
return nil, err
}
ownerKeyHash := protocol.Hash{Algorithm: alg, Value: ownerKeyDigest.Sum(nil)[:]}
var hmac hash.Hash
switch alg {
case protocol.Sha256Hash:
hmac = c.HmacSha256
case protocol.Sha384Hash:
hmac = c.HmacSha384
}
if err := setHmac(ctx, transport, hmac, ovh); err != nil {
errorMsg(ctx, transport, err)
return nil, err
}
return &DeviceCredential{
Version: ovh.Version,
DeviceInfo: ovh.DeviceInfo,
GUID: ovh.GUID,
RvInfo: ovh.RvInfo,
PublicKeyHash: ownerKeyHash,
}, nil
}
// AppStart(10) -> SetCredentials(11)
func appStart(ctx context.Context, transport Transport, info any) (*VoucherHeader, error) {
// Define request structure
var msg struct {
DeviceMfgInfo *cbor.Bstr[any]
}
if info != nil {
msg.DeviceMfgInfo = cbor.NewBstr(info)
}
// Make request
typ, resp, err := transport.Send(ctx, protocol.DIAppStartMsgType, msg, nil)
if err != nil {
return nil, fmt.Errorf("error sending DI.AppStart: %w", err)
}
defer func() { _ = resp.Close() }()
// Parse response
switch typ {
case protocol.DISetCredentialsMsgType:
captureMsgType(ctx, typ)
var setCredentials setCredentialsMsg
if err := cbor.NewDecoder(resp).Decode(&setCredentials); err != nil {
captureErr(ctx, protocol.MessageBodyErrCode, "")
return nil, fmt.Errorf("error parsing DI.SetCredentials request: %w", err)
}
return &setCredentials.OVHeader.Val, nil
case protocol.ErrorMsgType:
var errMsg protocol.ErrorMessage
if err := cbor.NewDecoder(resp).Decode(&errMsg); err != nil {
return nil, fmt.Errorf("error parsing error message contents of DI.AppStart response: %w", err)
}
return nil, fmt.Errorf("error received from DI.AppStart request: %w", errMsg)
default:
captureErr(ctx, protocol.MessageBodyErrCode, "")
return nil, fmt.Errorf("unexpected message type for response to DI.AppStart: %d", typ)
}
}
type setCredentialsMsg struct {
OVHeader cbor.Bstr[VoucherHeader]
}
// AppStart(10) -> SetCredentials(11)
func (s *DIServer[T]) setCredentials(ctx context.Context, msg io.Reader) (*setCredentialsMsg, error) {
// Decode proprietary device mfg info from app start
var appStart struct {
Info *cbor.Bstr[T]
}
if err := cbor.NewDecoder(msg).Decode(&appStart); err != nil {
return nil, fmt.Errorf("error decoding device manufacturing info: %w", err)
}
var info *T // Null info is valid
if appStart.Info != nil {
info = &appStart.Info.Val
}
// Create and store a new device certificate chain
chain, err := s.SignDeviceCertificate(info)
if err != nil {
return nil, fmt.Errorf("error creating device certificate chain: %w", err)
}
if err := s.Session.SetDeviceCertChain(ctx, chain); err != nil {
return nil, fmt.Errorf("error storing device certificate chain: %w", err)
}
// If supported by the storage implementation, also store device reported
// info
if deviceSelfInfoStore, ok := s.Session.(interface {
SetDeviceSelfInfo(context.Context, *T) error
}); ok {
if err := deviceSelfInfoStore.SetDeviceSelfInfo(ctx, info); err != nil {
return nil, fmt.Errorf("error storing device info: %w", err)
}
}
// Get device info string and key info
deviceInfo, keyType, keyEncoding, err := s.DeviceInfo(ctx, info, chain)
if err != nil {
return nil, fmt.Errorf("error getting device info: %w", err)
}
// Use issuer chain of device certificate to identify manufacturer pubkey
// and encode as the device requested
mfgPubKey, err := encodePublicKey(keyType, keyEncoding, chain[1:])
if err != nil {
return nil, fmt.Errorf("error constructing manufacturer public key from CA chain: %w", err)
}
// Compute the appropriate cert chain hash
alg, err := hashAlgFor(chain[0].PublicKey, chain[1].PublicKey)
if err != nil {
return nil, fmt.Errorf("error determining appropriate device cert chain hash algorithm: %w", err)
}
certChain := make([]*cbor.X509Certificate, len(chain))
certChainHash := alg.HashFunc().New()
for i, cert := range chain {
certChain[i] = (*cbor.X509Certificate)(cert)
_, _ = certChainHash.Write(cert.Raw)
}
// Generate voucher header
var guid protocol.GUID
if _, err := rand.Read(guid[:]); err != nil {
return nil, fmt.Errorf("error generating device GUID: %w", err)
}
ovh := &VoucherHeader{
Version: 101,
GUID: guid,
DeviceInfo: deviceInfo,
ManufacturerKey: *mfgPubKey,
CertChainHash: &protocol.Hash{
Algorithm: alg,
Value: certChainHash.Sum(nil),
},
}
rvInfo, err := s.RvInfo(ctx, &Voucher{
Version: 101,
Header: *cbor.NewBstr(*ovh),
CertChain: &certChain,
})
if err != nil {
return nil, fmt.Errorf("error determining rendezvous info for device: %w", err)
}
ovh.RvInfo = rvInfo
// Store and return voucher header
if err := s.Session.SetIncompleteVoucherHeader(ctx, ovh); err != nil {
return nil, fmt.Errorf("error storing incomplete voucher header: %w", err)
}
return &setCredentialsMsg{
OVHeader: *cbor.NewBstr(*ovh),
}, nil
}
func encodePublicKey(keyType protocol.KeyType, keyEncoding protocol.KeyEncoding, chain []*x509.Certificate) (*protocol.PublicKey, error) {
switch keyEncoding {
case protocol.X509KeyEnc, protocol.CoseKeyEnc:
switch keyType {
case protocol.Secp256r1KeyType, protocol.Secp384r1KeyType:
return protocol.NewPublicKey(keyType, chain[0].PublicKey.(*ecdsa.PublicKey), keyEncoding == protocol.CoseKeyEnc)
case protocol.Rsa2048RestrKeyType, protocol.RsaPkcsKeyType, protocol.RsaPssKeyType:
return protocol.NewPublicKey(keyType, chain[0].PublicKey.(*rsa.PublicKey), keyEncoding == protocol.CoseKeyEnc)
default:
return nil, fmt.Errorf("unsupported key type: %s", keyType)
}
case protocol.X5ChainKeyEnc:
return protocol.NewPublicKey(keyType, chain, false)
default:
return nil, fmt.Errorf("unsupported key encoding: %s", keyEncoding)
}
}
// SetHMAC(12) -> Done(13)
func setHmac(ctx context.Context, transport Transport, hmac hash.Hash, ovh *VoucherHeader) (err error) {
// Compute HMAC
ovhHash, err := hmacHash(hmac, ovh)
if err != nil {
return fmt.Errorf("error computing HMAC of ownership voucher header: %w", err)
}
// Define request structure
var msg struct {
Hmac protocol.Hmac
}
msg.Hmac = ovhHash
// Make request
typ, resp, err := transport.Send(ctx, protocol.DISetHmacMsgType, msg, nil)
if err != nil {
return fmt.Errorf("error sending DI.SetHMAC: %w", err)
}
defer func() { _ = resp.Close() }()
// Parse response
switch typ {
case protocol.DIDoneMsgType:
captureMsgType(ctx, typ)
return nil
case protocol.ErrorMsgType:
var errMsg protocol.ErrorMessage
if err := cbor.NewDecoder(resp).Decode(&errMsg); err != nil {
captureErr(ctx, protocol.MessageBodyErrCode, "")
return fmt.Errorf("error parsing error message contents of DI.SetHMAC response: %w", err)
}
return fmt.Errorf("error received from DI.SetHMAC request: %w", errMsg)
default:
captureErr(ctx, protocol.MessageBodyErrCode, "")
return fmt.Errorf("unexpected message type for response to DI.SetHMAC: %d", typ)
}
}
// SetHMAC(12) -> Done(13)
func (s *DIServer[T]) diDone(ctx context.Context, msg io.Reader) (struct{}, error) {
var req struct {
Hmac protocol.Hmac
}
if err := cbor.NewDecoder(msg).Decode(&req); err != nil {
return struct{}{}, fmt.Errorf("error parsing DI.SetHMAC request: %w", err)
}
ovh, err := s.Session.IncompleteVoucherHeader(ctx)
if err != nil {
return struct{}{}, fmt.Errorf("voucher header not found for session: %w", err)
}
deviceCertChain, err := s.Session.DeviceCertChain(ctx)
if err != nil {
return struct{}{}, fmt.Errorf("device certificate chain not found for session: %w", err)
}
certChain := make([]*cbor.X509Certificate, len(deviceCertChain))
for i, cert := range deviceCertChain {
certChain[i] = (*cbor.X509Certificate)(cert)
}
ov := &Voucher{
Version: 101,
Header: *cbor.NewBstr(*ovh),
Hmac: req.Hmac,
CertChain: &certChain,
Entries: nil,
}
if err := s.maybeAutoExtend(ov); err != nil {
return struct{}{}, fmt.Errorf("error extending voucher: %w", err)
}
if err := s.Vouchers.NewVoucher(ctx, ov); err != nil {
return struct{}{}, fmt.Errorf("error storing voucher: %w", err)
}
if err := s.maybeAutoTO0(ctx, ov); err != nil {
return struct{}{}, fmt.Errorf("error auto-registering device for rendezvous: %w", err)
}
return struct{}{}, nil
}
func (s *DIServer[T]) maybeAutoExtend(ov *Voucher) error {
if s.AutoExtend == nil {
return nil
}
keyType := ov.Header.Val.ManufacturerKey.Type
owner, _, err := s.AutoExtend.ManufacturerKey(keyType)
if err != nil {
return fmt.Errorf("error getting %s manufacturer key: %w", keyType, err)
}
nextOwner, _, err := s.AutoExtend.OwnerKey(keyType)
if err != nil {
return fmt.Errorf("error getting %s owner key: %w", keyType, err)
}
switch owner.Public().(type) {
case *ecdsa.PublicKey:
nextOwner, ok := nextOwner.Public().(*ecdsa.PublicKey)
if !ok {
return fmt.Errorf("owner key must be %s", keyType)
}
extended, err := ExtendVoucher(ov, owner, nextOwner, nil)
if err != nil {
return err
}
*ov = *extended
return nil
case *rsa.PublicKey:
nextOwner, ok := nextOwner.Public().(*rsa.PublicKey)
if !ok {
return fmt.Errorf("owner key must be %s", keyType)
}
extended, err := ExtendVoucher(ov, owner, nextOwner, nil)
if err != nil {
return err
}
*ov = *extended
return nil
default:
return fmt.Errorf("invalid key type %T", owner)
}
}
func (s *DIServer[T]) maybeAutoTO0(ctx context.Context, ov *Voucher) error {
if s.AutoTO0 == nil {
return nil
}
if s.AutoExtend == nil {
return fmt.Errorf("voucher auto-extension must be enabled when auto-TO0 is enabled")
}
if len(s.AutoTO0Addrs) == 0 {
return fmt.Errorf("TO2 addrs cannot be empty when auto-TO0 is enabled")
}
keyType := ov.Header.Val.ManufacturerKey.Type
nextOwner, _, err := s.AutoTO0.OwnerKey(keyType)
if err != nil {
return fmt.Errorf("error getting %s owner key: %w", keyType, err)
}
var opts crypto.SignerOpts
switch keyType {
case protocol.Rsa2048RestrKeyType, protocol.RsaPkcsKeyType, protocol.RsaPssKeyType:
switch rsaPub := nextOwner.Public().(*rsa.PublicKey); rsaPub.Size() {
case 2048 / 8:
opts = crypto.SHA256
case 3072 / 8:
opts = crypto.SHA384
default:
return fmt.Errorf("unsupported RSA key size: %d bits", rsaPub.Size()*8)
}
if keyType == protocol.RsaPssKeyType {
opts = &rsa.PSSOptions{
SaltLength: rsa.PSSSaltLengthEqualsHash,
Hash: opts.(crypto.Hash),
}
}
}
sign1 := cose.Sign1[protocol.To1d, []byte]{
Payload: cbor.NewByteWrap(protocol.To1d{
RV: s.AutoTO0Addrs,
To0dHash: protocol.Hash{Algorithm: protocol.Sha256Hash},
}),
}
if err := sign1.Sign(nextOwner, nil, nil, opts); err != nil {
return fmt.Errorf("error signing to1d: %w", err)
}
exp := time.Now().AddDate(30, 0, 0) // Expire in 30 years
if err := s.AutoTO0.SetRVBlob(ctx, ov, &sign1, exp); err != nil {
return fmt.Errorf("error storing to1d: %w", err)
}
return nil
}