2015-06-06 12:49:27 +01:00
|
|
|
|
<?php
|
|
|
|
|
/*
|
|
|
|
|
* GNU Social - a federating social network
|
|
|
|
|
* Copyright (C) 2015, Free Software Foundation, Inc.
|
|
|
|
|
*
|
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
if (!defined('GNUSOCIAL')) { exit(1); }
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Diaspora federation protocol plugin for GNU Social
|
|
|
|
|
*
|
|
|
|
|
* Depends on:
|
|
|
|
|
* - OStatus plugin
|
|
|
|
|
* - WebFinger plugin
|
|
|
|
|
*
|
|
|
|
|
* @package ProtocolDiasporaPlugin
|
|
|
|
|
* @maintainer Mikael Nordfeldth <mmn@hethane.se>
|
|
|
|
|
*/
|
|
|
|
|
|
2015-10-04 11:06:48 +01:00
|
|
|
|
// Depends on OStatus of course.
|
|
|
|
|
addPlugin('OStatus');
|
|
|
|
|
|
2015-06-06 12:49:27 +01:00
|
|
|
|
class DiasporaPlugin extends Plugin
|
|
|
|
|
{
|
2019-06-03 01:56:52 +01:00
|
|
|
|
const PLUGIN_VERSION = '0.2.0';
|
|
|
|
|
|
2015-06-06 12:49:27 +01:00
|
|
|
|
const REL_SEED_LOCATION = 'http://joindiaspora.com/seed_location';
|
|
|
|
|
const REL_GUID = 'http://joindiaspora.com/guid';
|
|
|
|
|
const REL_PUBLIC_KEY = 'diaspora-public-key';
|
|
|
|
|
|
|
|
|
|
public function onEndAttachPubkeyToUserXRD(Magicsig $magicsig, XML_XRD $xrd, Profile $target)
|
|
|
|
|
{
|
2015-06-06 13:46:17 +01:00
|
|
|
|
// So far we've only handled RSA keys, but it can change in the future,
|
|
|
|
|
// so be prepared. And remember to change the statically assigned type attribute below!
|
2016-06-19 01:26:44 +01:00
|
|
|
|
assert($magicsig->publicKey instanceof \phpseclib\Crypt\RSA);
|
2015-06-06 12:49:27 +01:00
|
|
|
|
$xrd->links[] = new XML_XRD_Element_Link(self::REL_PUBLIC_KEY,
|
2015-06-06 13:46:17 +01:00
|
|
|
|
base64_encode($magicsig->exportPublicKey()), 'RSA');
|
2015-06-06 13:49:39 +01:00
|
|
|
|
|
|
|
|
|
// Instead of choosing a random string, we calculate our GUID from the public key
|
|
|
|
|
// by fingerprint through a sha256 hash.
|
|
|
|
|
$xrd->links[] = new XML_XRD_Element_Link(self::REL_GUID,
|
|
|
|
|
strtolower($magicsig->toFingerprint()));
|
2015-06-06 12:49:27 +01:00
|
|
|
|
}
|
|
|
|
|
|
2015-10-04 16:26:35 +01:00
|
|
|
|
public function onMagicsigPublicKeyFromXRD(XML_XRD $xrd, &$pubkey)
|
|
|
|
|
{
|
|
|
|
|
// See if we have a Diaspora public key in the XRD response
|
|
|
|
|
$link = $xrd->get(self::REL_PUBLIC_KEY, 'RSA');
|
|
|
|
|
if (!is_null($link)) {
|
|
|
|
|
// If we do, decode it so we have the PKCS1 format (starts with -----BEGIN PUBLIC KEY-----)
|
|
|
|
|
$pkcs1 = base64_decode($link->href);
|
|
|
|
|
$magicsig = new Magicsig(Magicsig::DEFAULT_SIGALG); // Diaspora uses RSA-SHA256 (we do too)
|
|
|
|
|
try {
|
|
|
|
|
// Try to load the public key so we can get it in the standard Magic signature format
|
|
|
|
|
$magicsig->loadPublicKeyPKCS1($pkcs1);
|
|
|
|
|
// We found it and will now store it in $pubkey in a proper format!
|
|
|
|
|
// This is how it would be found in a well implemented XRD according to the standard.
|
|
|
|
|
$pubkey = 'data:application/magic-public-key,'.$magicsig->toString();
|
|
|
|
|
common_debug('magic-public-key found in diaspora-public-key: '.$pubkey);
|
|
|
|
|
return false;
|
|
|
|
|
} catch (ServerException $e) {
|
|
|
|
|
common_log(LOG_WARNING, $e->getMessage());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-06-06 12:49:27 +01:00
|
|
|
|
public function onPluginVersion(array &$versions)
|
|
|
|
|
{
|
|
|
|
|
$versions[] = array('name' => 'Diaspora',
|
2019-06-03 01:56:52 +01:00
|
|
|
|
'version' => self::PLUGIN_VERSION,
|
2015-06-06 12:49:27 +01:00
|
|
|
|
'author' => 'Mikael Nordfeldth',
|
|
|
|
|
'homepage' => 'https://gnu.io/social',
|
|
|
|
|
// TRANS: Plugin description.
|
|
|
|
|
'rawdescription' => _m('Follow people across social networks that implement '.
|
|
|
|
|
'the <a href="https://diasporafoundation.org/">Diaspora</a> federation protocol.'));
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
2015-10-04 11:06:48 +01:00
|
|
|
|
|
|
|
|
|
public function onStartMagicEnvelopeToXML(MagicEnvelope $magic_env, XMLStringer $xs, $flavour=null, Profile $target=null)
|
|
|
|
|
{
|
|
|
|
|
// Since Diaspora doesn't use a separate namespace for their "extended"
|
|
|
|
|
// salmon slap, we'll have to resort to this workaround hack.
|
|
|
|
|
if ($flavour !== 'diaspora') {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// WARNING: This changes the $magic_env contents! Be aware of it.
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* https://wiki.diasporafoundation.org/Federation_protocol_overview
|
2015-10-05 11:49:54 +01:00
|
|
|
|
* http://www.rubydoc.info/github/Raven24/diaspora-federation/master/DiasporaFederation/Salmon/EncryptedSlap
|
2015-10-04 11:06:48 +01:00
|
|
|
|
*
|
|
|
|
|
* Constructing the encryption header
|
|
|
|
|
*/
|
|
|
|
|
|
2015-10-05 11:49:54 +01:00
|
|
|
|
// For some reason diaspora wants the salmon slap in a <diaspora> header.
|
|
|
|
|
$xs->elementStart('diaspora', array('xmlns'=>'https://joindiaspora.com/protocol'));
|
2015-10-05 10:22:23 +01:00
|
|
|
|
|
2015-10-04 11:06:48 +01:00
|
|
|
|
/**
|
|
|
|
|
* Choose an AES key and initialization vector, suitable for the
|
|
|
|
|
* aes-256-cbc cipher. I shall refer to this as the “inner key”
|
|
|
|
|
* and the “inner initialization vector (iv)”.
|
|
|
|
|
*/
|
2016-06-17 22:42:50 +01:00
|
|
|
|
$inner_key = new \phpseclib\Crypt\AES(\phpseclib\Crypt\AES::MODE_CBC);
|
2015-10-04 11:06:48 +01:00
|
|
|
|
$inner_key->setKeyLength(256); // set length to 256 bits (could be calculated, but let's be sure)
|
|
|
|
|
$inner_key->setKey(common_random_rawstr(32)); // 32 bytes from a (pseudo) random source
|
|
|
|
|
$inner_key->setIV(common_random_rawstr(16)); // 16 bytes is the block length
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Construct the following XML snippet:
|
|
|
|
|
* <decrypted_header>
|
|
|
|
|
* <iv>((base64-encoded inner iv))</iv>
|
|
|
|
|
* <aes_key>((base64-encoded inner key))</aes_key>
|
|
|
|
|
* <author>
|
|
|
|
|
* <name>Alice Exampleman</name>
|
|
|
|
|
* <uri>acct:user@sender.example</uri>
|
|
|
|
|
* </author>
|
|
|
|
|
* </decrypted_header>
|
|
|
|
|
*/
|
|
|
|
|
$decrypted_header = sprintf('<decrypted_header><iv>%1$s</iv><aes_key>%2$s</aes_key><author_id>%3$s</author_id></decrypted_header>',
|
|
|
|
|
base64_encode($inner_key->iv),
|
|
|
|
|
base64_encode($inner_key->key),
|
|
|
|
|
$magic_env->getActor()->getAcctUri());
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Construct another AES key and initialization vector suitable
|
|
|
|
|
* for the aes-256-cbc cipher. I shall refer to this as the
|
|
|
|
|
* “outer key” and the “outer initialization vector (iv)”.
|
|
|
|
|
*/
|
2016-06-17 22:42:50 +01:00
|
|
|
|
$outer_key = new \phpseclib\Crypt\AES(\phpseclib\Crypt\AES::MODE_CBC);
|
2015-10-04 11:06:48 +01:00
|
|
|
|
$outer_key->setKeyLength(256); // set length to 256 bits (could be calculated, but let's be sure)
|
|
|
|
|
$outer_key->setKey(common_random_rawstr(32)); // 32 bytes from a (pseudo) random source
|
|
|
|
|
$outer_key->setIV(common_random_rawstr(16)); // 16 bytes is the block length
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Encrypt your <decrypted_header> XML snippet using the “outer key”
|
|
|
|
|
* and “outer iv” (using the aes-256-cbc cipher). This encrypted
|
2019-06-03 01:56:52 +01:00
|
|
|
|
* blob shall be referred to as “the ciphertext”.
|
2015-10-04 11:06:48 +01:00
|
|
|
|
*/
|
2016-06-19 02:23:26 +01:00
|
|
|
|
$ciphertext = $outer_key->encrypt($decrypted_header, \phpseclib\Crypt\RSA::PADDING_PKCS1);
|
2015-10-04 11:06:48 +01:00
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Construct the following JSON object, which shall be referred to
|
|
|
|
|
* as “the outer aes key bundle”:
|
|
|
|
|
* {
|
|
|
|
|
* "iv": ((base64-encoded AES outer iv)),
|
|
|
|
|
* "key": ((base64-encoded AES outer key))
|
|
|
|
|
* }
|
|
|
|
|
*/
|
|
|
|
|
$outer_bundle = json_encode(array(
|
|
|
|
|
'iv' => base64_encode($outer_key->iv),
|
|
|
|
|
'key' => base64_encode($outer_key->key),
|
|
|
|
|
));
|
|
|
|
|
/**
|
|
|
|
|
* Encrypt the “outer aes key bundle” with Bob’s RSA public key.
|
|
|
|
|
* I shall refer to this as the “encrypted outer aes key bundle”.
|
|
|
|
|
*/
|
2015-10-04 16:26:35 +01:00
|
|
|
|
common_debug('Diaspora creating "outer aes key bundle", will require magic-public-key');
|
2015-10-04 11:06:48 +01:00
|
|
|
|
$key_fetcher = new MagicEnvelope();
|
|
|
|
|
$remote_keys = $key_fetcher->getKeyPair($target, true); // actually just gets the public key
|
2016-06-19 02:23:26 +01:00
|
|
|
|
$enc_outer = $remote_keys->publicKey->encrypt($outer_bundle, \phpseclib\Crypt\RSA::PADDING_PKCS1);
|
2015-10-04 11:06:48 +01:00
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Construct the following JSON object, which I shall refer to as
|
|
|
|
|
* the “encrypted header json object”:
|
|
|
|
|
* {
|
|
|
|
|
* "aes_key": ((base64-encoded encrypted outer aes key bundle)),
|
|
|
|
|
* "ciphertext": ((base64-encoded ciphertextm from above))
|
|
|
|
|
* }
|
|
|
|
|
*/
|
|
|
|
|
$enc_header = json_encode(array(
|
|
|
|
|
'aes_key' => base64_encode($enc_outer),
|
|
|
|
|
'ciphertext' => base64_encode($ciphertext),
|
|
|
|
|
));
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Construct the xml snippet:
|
|
|
|
|
* <encrypted_header>((base64-encoded encrypted header json object))</encrypted_header>
|
|
|
|
|
*/
|
|
|
|
|
$xs->element('encrypted_header', null, base64_encode($enc_header));
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* In order to prepare the payload message for inclusion in your
|
|
|
|
|
* salmon slap, you will:
|
|
|
|
|
*
|
|
|
|
|
* 1. Encrypt the payload message using the aes-256-cbc cipher and
|
|
|
|
|
* the “inner encryption key” and “inner encryption iv” you
|
|
|
|
|
* chose earlier.
|
|
|
|
|
* 2. Base64-encode the encrypted payload message.
|
|
|
|
|
*/
|
2016-06-19 02:23:26 +01:00
|
|
|
|
$payload = $inner_key->encrypt($magic_env->getData(), \phpseclib\Crypt\RSA::PADDING_PKCS1);
|
2015-10-05 10:28:33 +01:00
|
|
|
|
//FIXME: This means we don't actually put an <atom:entry> in the payload,
|
|
|
|
|
// since Diaspora has its own update method! Silly me. Read up on:
|
|
|
|
|
// https://wiki.diasporafoundation.org/Federation_Message_Semantics
|
2015-10-04 11:06:48 +01:00
|
|
|
|
$magic_env->signMessage(base64_encode($payload), 'application/xml');
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Since we have to change the content of me:data we'll just write the
|
|
|
|
|
// whole thing from scratch. We _could_ otherwise have just manipulated
|
|
|
|
|
// that element and added the encrypted_header in the EndMagicEnvelopeToXML event.
|
|
|
|
|
$xs->elementStart('me:env', array('xmlns:me' => MagicEnvelope::NS));
|
|
|
|
|
$xs->element('me:data', array('type' => $magic_env->getDataType()), $magic_env->getData());
|
|
|
|
|
$xs->element('me:encoding', null, $magic_env->getEncoding());
|
|
|
|
|
$xs->element('me:alg', null, $magic_env->getSignatureAlgorithm());
|
|
|
|
|
$xs->element('me:sig', null, $magic_env->getSignature());
|
|
|
|
|
$xs->elementEnd('me:env');
|
|
|
|
|
|
2015-10-05 10:22:23 +01:00
|
|
|
|
$xs->elementEnd('entry');
|
|
|
|
|
|
2015-10-04 11:06:48 +01:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public function onSalmonSlap($endpoint_uri, MagicEnvelope $magic_env, Profile $target=null)
|
|
|
|
|
{
|
2016-06-23 22:27:18 +01:00
|
|
|
|
try {
|
|
|
|
|
$envxml = $magic_env->toXML($target, 'diaspora');
|
|
|
|
|
} catch (Exception $e) {
|
|
|
|
|
common_log(LOG_ERR, sprintf('Could not generate Magic Envelope XML (diaspora flavour) for profile id=='.$target->getID().': '.$e->getMessage()));
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2015-10-04 11:06:48 +01:00
|
|
|
|
|
|
|
|
|
// Diaspora wants another POST format (base64url-encoded POST variable 'xml')
|
|
|
|
|
$headers = array('Content-Type: application/x-www-form-urlencoded');
|
|
|
|
|
|
|
|
|
|
// Another way to distinguish Diaspora from GNU social is that a POST with
|
|
|
|
|
// $headers=array('Content-Type: application/magic-envelope+xml') would return
|
|
|
|
|
// HTTP status code 422 Unprocessable Entity, at least as of 2015-10-04.
|
|
|
|
|
try {
|
|
|
|
|
$client = new HTTPClient();
|
|
|
|
|
$client->setBody('xml=' . Magicsig::base64_url_encode($envxml));
|
|
|
|
|
$response = $client->post($endpoint_uri, $headers);
|
2016-01-13 13:17:49 +00:00
|
|
|
|
} catch (Exception $e) {
|
2015-10-04 11:06:48 +01:00
|
|
|
|
common_log(LOG_ERR, "Diaspora-flavoured Salmon post to $endpoint_uri failed: " . $e->getMessage());
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// 200 OK is the best response
|
|
|
|
|
// 202 Accepted is what we get from Diaspora for example
|
|
|
|
|
if (!in_array($response->getStatus(), array(200, 202))) {
|
|
|
|
|
common_log(LOG_ERR, sprintf('Salmon (from profile %d) endpoint %s returned status %s: %s',
|
2015-10-04 16:26:35 +01:00
|
|
|
|
$magic_env->getActor()->getID(), $endpoint_uri, $response->getStatus(), $response->getBody()));
|
2015-10-04 11:06:48 +01:00
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Success!
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2015-06-06 12:49:27 +01:00
|
|
|
|
}
|