refactor and better crypto
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
78d597425d
commit
5b22b75e8d
@ -99,10 +99,10 @@ while True:
|
|||||||
print("Invalid command format!")
|
print("Invalid command format!")
|
||||||
continue
|
continue
|
||||||
|
|
||||||
if separatedCommand[0] == 'LIN' and len(separatedCommand) == 2:
|
if separatedCommand[0] == 'LIN' and len(separatedCommand) == 3:
|
||||||
network = NetWrapper(CLIENT_PRIVATE_KEY, CLIENT_ADDRESS, separatedCommand[1], SERVER_PUBLIC_KEY)
|
network = NetWrapper(CLIENT_PRIVATE_KEY, CLIENT_ADDRESS, separatedCommand[1], SERVER_PUBLIC_KEY)
|
||||||
try:
|
try:
|
||||||
network.connectToServer()
|
network.connectToServer(separatedCommand[2])
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
print("Error: "+str(e))
|
print("Error: "+str(e))
|
||||||
continue
|
continue
|
||||||
|
@ -1,4 +0,0 @@
|
|||||||
#!/usr/bin/env python3
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
print("hi")
|
|
@ -7,6 +7,7 @@ import pyDH
|
|||||||
from Crypto.Hash import SHA512
|
from Crypto.Hash import SHA512
|
||||||
from Crypto.Cipher import ChaCha20_Poly1305, PKCS1_OAEP
|
from Crypto.Cipher import ChaCha20_Poly1305, PKCS1_OAEP
|
||||||
from Crypto.PublicKey.RSA import RsaKey
|
from Crypto.PublicKey.RSA import RsaKey
|
||||||
|
from Crypto.Signature import pkcs1_15
|
||||||
|
|
||||||
from netsim import network_interface
|
from netsim import network_interface
|
||||||
|
|
||||||
@ -14,7 +15,6 @@ from netsim import network_interface
|
|||||||
class NetWrapper:
|
class NetWrapper:
|
||||||
def __init__(self, privateKey: RsaKey, clientAddress: str, username: str, serverPubKey: RsaKey,
|
def __init__(self, privateKey: RsaKey, clientAddress: str, username: str, serverPubKey: RsaKey,
|
||||||
serverAddr: str = 'A'):
|
serverAddr: str = 'A'):
|
||||||
# Create network_interface: network_interface(path, addr) path root is shared with network / addr is own address
|
|
||||||
self.network = network_interface('./../../netsim/network/', clientAddress)
|
self.network = network_interface('./../../netsim/network/', clientAddress)
|
||||||
self.serverAddr = serverAddr
|
self.serverAddr = serverAddr
|
||||||
self.username = username
|
self.username = username
|
||||||
@ -22,62 +22,93 @@ class NetWrapper:
|
|||||||
self.serverPubKey = serverPubKey
|
self.serverPubKey = serverPubKey
|
||||||
self.cipherkey = "".encode('UTF-8')
|
self.cipherkey = "".encode('UTF-8')
|
||||||
|
|
||||||
def randomStringGenerator(self, str_size: int = 128,
|
def randomStringGenerator(self, str_size: int = 256,
|
||||||
allowed_chars: str = string.ascii_letters + string.punctuation) -> str:
|
allowed_chars: str = string.ascii_letters + string.punctuation) -> str:
|
||||||
return ''.join(random.choice(allowed_chars) for x in range(str_size))
|
return ''.join(random.choice(allowed_chars) for x in range(str_size))
|
||||||
|
|
||||||
def identifyServer(self) -> bool:
|
def ecryptRSAMessage(self, message: str) -> bytes:
|
||||||
randommsg = self.randomStringGenerator()
|
|
||||||
cipher_rsa = PKCS1_OAEP.new(self.serverPubKey)
|
cipher_rsa = PKCS1_OAEP.new(self.serverPubKey)
|
||||||
identMsg = json.dumps(
|
encrypted_msg = cipher_rsa.encrypt(message.encode('UTF-8'))
|
||||||
{'type': 'IDY', 'source': self.network.own_addr, 'username': self.username,
|
return encrypted_msg
|
||||||
'message': b64encode(cipher_rsa.encrypt(randommsg.encode('UTF-8'))).decode('ASCII')}).encode(
|
|
||||||
'UTF-8')
|
|
||||||
self.network.send_msg(self.serverAddr, identMsg)
|
|
||||||
returnJson = {'source': '', 'type': ''}
|
|
||||||
while not (returnJson['source'] == self.serverAddr and returnJson['type'] == 'IDY'):
|
|
||||||
status, msg = self.network.receive_msg(blocking=True)
|
|
||||||
if not status:
|
|
||||||
raise Exception('Network error during connection.')
|
|
||||||
returnJson = json.loads(msg.decode('UTF-8'))
|
|
||||||
cipher_rsa = PKCS1_OAEP.new(self.privateKey)
|
|
||||||
retmsg = cipher_rsa.decrypt(b64decode(returnJson['message'])).decode('UTF-8')
|
|
||||||
return retmsg == randommsg
|
|
||||||
|
|
||||||
def createEncryptedChannel(self):
|
def signRSAHeader(self, type: str, extradata: dict) -> (bytes, bytes):
|
||||||
dh = pyDH.DiffieHellman()
|
header = json.dumps({'type': type, 'source': self.network.own_addr}.update(extradata)).encode('UTF-8')
|
||||||
cipher_rsa = PKCS1_OAEP.new(self.serverPubKey)
|
h = SHA512.new(header)
|
||||||
mypubkey = b64encode(cipher_rsa.encrypt(str(dh.gen_public_key()).encode('UTF-8'))).decode('ASCII')
|
headersignature = pkcs1_15.new(self.privateKey).sign(h)
|
||||||
jsonmsg = json.dumps({'type': 'DH', 'source': self.network.own_addr, 'message': mypubkey}).encode('UTF-8')
|
return header, headersignature
|
||||||
self.network.send_msg(self.serverAddr, jsonmsg)
|
|
||||||
decodedmsg = {'source': '', 'type': ''}
|
def verifyRSAHeaderSignature(self, header: bytes, headersignature: bytes) -> bool:
|
||||||
while not (decodedmsg['source'] == self.serverAddr and decodedmsg['type'] == 'DH'):
|
h = SHA512.new(header)
|
||||||
|
try:
|
||||||
|
pkcs1_15.new(self.serverPubKey).verify(h, headersignature)
|
||||||
|
return True
|
||||||
|
except Exception:
|
||||||
|
return False
|
||||||
|
|
||||||
|
def decryptRSAMessage(self, message: bytes) -> bytes:
|
||||||
|
cipher_rsa = PKCS1_OAEP.new(self.privateKey)
|
||||||
|
return cipher_rsa.decrypt(message)
|
||||||
|
|
||||||
|
def recieveAndUnpackRSAMessage(self) -> (str, str):
|
||||||
status, msg = self.network.receive_msg(blocking=True)
|
status, msg = self.network.receive_msg(blocking=True)
|
||||||
if not status:
|
if not status:
|
||||||
raise Exception('Network error during connection.')
|
raise Exception('Network error during connection.')
|
||||||
decodedmsg = json.loads(msg.decode('UTF-8'))
|
decodedmsg = json.loads(msg.decode('UTF-8'))
|
||||||
cipher_rsa = PKCS1_OAEP.new(self.privateKey)
|
return decodedmsg, json.loads(b64decode(decodedmsg['header']).decode('UTF-8'))
|
||||||
serverpubkey = int(cipher_rsa.decrypt(b64decode(decodedmsg['message'])).decode('UTF-8'))
|
|
||||||
|
def identifyServer(self) -> bool:
|
||||||
|
randommsg = self.randomStringGenerator()
|
||||||
|
encrypted_msg = self.ecryptRSAMessage(randommsg)
|
||||||
|
header, headersignature = self.signRSAHeader('IDY', {'username': self.username})
|
||||||
|
identMsg = json.dumps(
|
||||||
|
{'header': b64encode(header).decode('UTF-8'),
|
||||||
|
'message': b64encode(encrypted_msg).decode('UTF-8'),
|
||||||
|
'headersignature': b64encode(headersignature).decode('UTF-8')}).encode(
|
||||||
|
'UTF-8')
|
||||||
|
self.network.send_msg(self.serverAddr, identMsg)
|
||||||
|
returnJson, header = self.recieveAndUnpackRSAMessage()
|
||||||
|
try:
|
||||||
|
if not self.verifyRSAHeaderSignature(b64decode(returnJson['header']),
|
||||||
|
b64decode(returnJson['headersignature'])) or not (
|
||||||
|
header['source'] == self.serverAddr and header['type'] == 'IDY'):
|
||||||
|
return False
|
||||||
|
retmsg = self.decryptRSAMessage(b64decode(returnJson['message'])).decode('UTF-8')
|
||||||
|
except Exception:
|
||||||
|
return False
|
||||||
|
return retmsg == randommsg
|
||||||
|
|
||||||
|
def createEncryptedChannel(self) -> None:
|
||||||
|
dh = pyDH.DiffieHellman()
|
||||||
|
mypubkey = self.ecryptRSAMessage(str(dh.gen_public_key()))
|
||||||
|
header, headersignature = self.signRSAHeader("DH",{})
|
||||||
|
jsonmsg = json.dumps(
|
||||||
|
{'header': b64encode(header).decode('UTF-8'), 'headersignature': b64encode(headersignature).decode('UTF-8'),
|
||||||
|
'message': mypubkey}).encode('UTF-8')
|
||||||
|
self.network.send_msg(self.serverAddr, jsonmsg)
|
||||||
|
decodedmsg, header = self.recieveAndUnpackRSAMessage()
|
||||||
|
if not self.verifyRSAHeaderSignature(b64decode(decodedmsg['header']),
|
||||||
|
b64decode(decodedmsg['headersignature'])) or not (
|
||||||
|
header['source'] == self.serverAddr and header['type'] == 'DH'):
|
||||||
|
raise Exception('Header signature error')
|
||||||
|
serverpubkey = int(self.decryptRSAMessage(b64decode(decodedmsg['message'])).decode('UTF-8'))
|
||||||
cipherkey = dh.gen_shared_key(serverpubkey).encode('UTF-8')
|
cipherkey = dh.gen_shared_key(serverpubkey).encode('UTF-8')
|
||||||
hasher = SHA512.new()
|
hasher = SHA512.new()
|
||||||
hasher.update(cipherkey)
|
hasher.update(cipherkey)
|
||||||
self.cipherkey = (hasher.hexdigest()[:32]).encode('UTF-8')
|
self.cipherkey = (hasher.hexdigest()[:32]).encode('UTF-8')
|
||||||
|
|
||||||
def authenticate(self, password: str):
|
def authenticate(self, password: str) -> None:
|
||||||
message = f"LIN {self.username} {password}".encode('UTF-8')
|
message = f"LIN {self.username} {password}".encode('UTF-8')
|
||||||
self.sendTypedMessage(message, "AUT")
|
self.sendTypedMessage(message, "AUT")
|
||||||
plaintext = self.recieveTypedMessage("AUT").decode('UTF-8')
|
plaintext = self.recieveTypedMessage("AUT").decode('UTF-8')
|
||||||
if plaintext != "OK":
|
if plaintext != "OK":
|
||||||
print("Authentication error")
|
print("Authentication error")
|
||||||
|
|
||||||
def connectToServer(self):
|
def connectToServer(self, password: str) -> None:
|
||||||
identStatus = self.identifyServer()
|
identStatus = self.identifyServer()
|
||||||
if not identStatus:
|
if not identStatus:
|
||||||
raise Exception('Server identification faliure')
|
raise Exception('Server identification faliure')
|
||||||
self.createEncryptedChannel()
|
self.createEncryptedChannel()
|
||||||
print('Please enter your password:')
|
self.authenticate(password)
|
||||||
pw = input()
|
|
||||||
self.authenticate(pw)
|
|
||||||
|
|
||||||
def sendMessage(self, message: bytes) -> None:
|
def sendMessage(self, message: bytes) -> None:
|
||||||
try:
|
try:
|
||||||
|
Loading…
Reference in New Issue
Block a user