| line | stmt | bran | cond | sub | pod | time | code | 
| 1 |  |  |  |  |  |  | #  You may distribute under the terms of either the GNU General Public License | 
| 2 |  |  |  |  |  |  | #  or the Artistic License (the same terms as Perl itself) | 
| 3 |  |  |  |  |  |  | # | 
| 4 |  |  |  |  |  |  | #  (C) Paul Evans, 2015-2016 -- leonerd@leonerd.org.uk | 
| 5 |  |  |  |  |  |  |  | 
| 6 |  |  |  |  |  |  | package App::MatrixTool::Command::server_key; | 
| 7 |  |  |  |  |  |  |  | 
| 8 | 1 |  |  | 1 |  | 624 | use strict; | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 21 |  | 
| 9 | 1 |  |  | 1 |  | 3 | use warnings; | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 18 |  | 
| 10 | 1 |  |  | 1 |  | 3 | use base qw( App::MatrixTool ); | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 105 |  | 
| 11 |  |  |  |  |  |  |  | 
| 12 |  |  |  |  |  |  | our $VERSION = '0.06'; | 
| 13 |  |  |  |  |  |  |  | 
| 14 | 1 |  |  | 1 |  | 4 | use MIME::Base64 qw( decode_base64 ); | 
|  | 1 |  |  |  |  | 0 |  | 
|  | 1 |  |  |  |  | 42 |  | 
| 15 | 1 |  |  | 1 |  | 4 | use Protocol::Matrix qw( verify_json_signature ); | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 31 |  | 
| 16 |  |  |  |  |  |  |  | 
| 17 | 1 |  |  | 1 |  | 488 | use Net::Async::HTTP; | 
|  | 1 |  |  |  |  | 18102 |  | 
|  | 1 |  |  |  |  | 55 |  | 
| 18 |  |  |  |  |  |  | Net::Async::HTTP->VERSION( '0.40' ); # ->request on_ready | 
| 19 |  |  |  |  |  |  |  | 
| 20 | 1 |  |  |  |  | 2 | use constant SHA256_ALGO => do { | 
| 21 | 1 |  |  |  |  | 515 | require Net::SSLeay; | 
| 22 | 1 |  |  |  |  | 5483 | Net::SSLeay::SSLeay_add_ssl_algorithms(); | 
| 23 | 1 |  |  |  |  | 61 | Net::SSLeay::EVP_get_digestbyname( "sha256" ); | 
| 24 | 1 |  |  | 1 |  | 4 | }; | 
|  | 1 |  |  |  |  | 1 |  | 
| 25 |  |  |  |  |  |  |  | 
| 26 | 1 |  |  | 1 |  | 5 | use constant DESCRIPTION => "Fetch a server's signing key"; | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 38 |  | 
| 27 | 1 |  |  | 1 |  | 3 | use constant ARGUMENTS => ( "server_name" ); | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 46 |  | 
| 28 | 1 |  |  |  |  | 888 | use constant OPTIONS => ( | 
| 29 |  |  |  |  |  |  | '1|v1'       => "Restrict to the v1 key API", | 
| 30 |  |  |  |  |  |  | '2|v2'       => "Restrict to the v2 key API", | 
| 31 |  |  |  |  |  |  | 'n|no-store' => "Don't cache the received key in the key store", | 
| 32 | 1 |  |  | 1 |  | 3 | ); | 
|  | 1 |  |  |  |  | 1 |  | 
| 33 |  |  |  |  |  |  |  | 
| 34 |  |  |  |  |  |  | =head1 NAME | 
| 35 |  |  |  |  |  |  |  | 
| 36 |  |  |  |  |  |  | matrixtool server-key - Fetch a server's signing key | 
| 37 |  |  |  |  |  |  |  | 
| 38 |  |  |  |  |  |  | =head1 SYNOPSIS | 
| 39 |  |  |  |  |  |  |  | 
| 40 |  |  |  |  |  |  | $ matrixtool server-key my-server.org | 
| 41 |  |  |  |  |  |  |  | 
| 42 |  |  |  |  |  |  | =head1 DESCRIPTION | 
| 43 |  |  |  |  |  |  |  | 
| 44 |  |  |  |  |  |  | This command fetches the keys from a Matrix homeserver. This helps you test | 
| 45 |  |  |  |  |  |  | whether the server is basically configured correctly, responding to basic | 
| 46 |  |  |  |  |  |  | federation key requests. | 
| 47 |  |  |  |  |  |  |  | 
| 48 |  |  |  |  |  |  | =head1 OPTIONS | 
| 49 |  |  |  |  |  |  |  | 
| 50 |  |  |  |  |  |  | The following additional options are recognised | 
| 51 |  |  |  |  |  |  |  | 
| 52 |  |  |  |  |  |  | =over 4 | 
| 53 |  |  |  |  |  |  |  | 
| 54 |  |  |  |  |  |  | =item C<--v1>, C<-1> | 
| 55 |  |  |  |  |  |  |  | 
| 56 |  |  |  |  |  |  | Restrict to the v1 key API | 
| 57 |  |  |  |  |  |  |  | 
| 58 |  |  |  |  |  |  | =item C<--v2>, C<-2> | 
| 59 |  |  |  |  |  |  |  | 
| 60 |  |  |  |  |  |  | Restrict to the v2 key API | 
| 61 |  |  |  |  |  |  |  | 
| 62 |  |  |  |  |  |  | =item C<--no-store>, C<-n> | 
| 63 |  |  |  |  |  |  |  | 
| 64 |  |  |  |  |  |  | Don't cache the received key in the key store | 
| 65 |  |  |  |  |  |  |  | 
| 66 |  |  |  |  |  |  | =back | 
| 67 |  |  |  |  |  |  |  | 
| 68 |  |  |  |  |  |  | =cut | 
| 69 |  |  |  |  |  |  |  | 
| 70 |  |  |  |  |  |  | sub get_key_v1 | 
| 71 |  |  |  |  |  |  | { | 
| 72 | 0 |  |  | 0 | 0 |  | my $self = shift; | 
| 73 | 0 |  |  |  |  |  | my ( $server_name ) = @_; | 
| 74 |  |  |  |  |  |  |  | 
| 75 | 0 |  |  |  |  |  | my $server_cert; | 
| 76 |  |  |  |  |  |  |  | 
| 77 |  |  |  |  |  |  | $self->http_client->request_json( | 
| 78 |  |  |  |  |  |  | server  => $server_name, | 
| 79 |  |  |  |  |  |  | request => $self->federation->make_key_v1_request( | 
| 80 |  |  |  |  |  |  | server_name => $server_name, | 
| 81 |  |  |  |  |  |  | ), | 
| 82 |  |  |  |  |  |  |  | 
| 83 |  |  |  |  |  |  | on_ready => sub { | 
| 84 | 0 |  |  | 0 |  |  | my ( $conn ) = @_; | 
| 85 | 0 |  |  |  |  |  | my $socket = $conn->read_handle; | 
| 86 |  |  |  |  |  |  |  | 
| 87 | 0 |  |  |  |  |  | $server_cert = $socket->peer_certificate; | 
| 88 |  |  |  |  |  |  |  | 
| 89 | 0 |  |  |  |  |  | $self->output_info( "Connected to " . $self->format_addr( $socket->peername ) ); | 
| 90 | 0 |  |  |  |  |  | Future->done; | 
| 91 |  |  |  |  |  |  | }, | 
| 92 |  |  |  |  |  |  | )->then( sub { | 
| 93 | 0 |  |  | 0 |  |  | my ( $body ) = @_; | 
| 94 |  |  |  |  |  |  |  | 
| 95 | 0 | 0 |  |  |  |  | $body->{server_name} eq $server_name or | 
| 96 |  |  |  |  |  |  | $self->output_check_failure( "Returned server_name does not match" ); | 
| 97 |  |  |  |  |  |  |  | 
| 98 |  |  |  |  |  |  | # Ugh SSLeay is a pain | 
| 99 | 0 |  |  |  |  |  | my $bio = Net::SSLeay::BIO_new( Net::SSLeay::BIO_s_mem() ); | 
| 100 | 0 |  |  |  |  |  | Net::SSLeay::BIO_write( $bio, decode_base64 $body->{tls_certificate} ); | 
| 101 |  |  |  |  |  |  |  | 
| 102 | 0 | 0 |  |  |  |  | my $got_cert = Net::SSLeay::d2i_X509_bio( $bio ) or | 
| 103 |  |  |  |  |  |  | die Net::SSLeay::print_errs("d2i_X509_bio"); | 
| 104 |  |  |  |  |  |  |  | 
| 105 | 0 | 0 |  |  |  |  | Net::SSLeay::X509_digest( $server_cert, SHA256_ALGO ) eq Net::SSLeay::X509_digest( $got_cert, SHA256_ALGO ) | 
| 106 |  |  |  |  |  |  | ? $self->output_ok( "TLS certificate fingerprint matches (SHA-256)" ) | 
| 107 |  |  |  |  |  |  | : $self->output_check_failure( "TLS certificate fingerprint does not match" ); | 
| 108 |  |  |  |  |  |  |  | 
| 109 | 0 |  |  |  |  |  | my $keys = $body->{verify_keys}; | 
| 110 | 0 |  |  |  |  |  | my @keys = map { { id => $_, key => decode_base64 $keys->{$_} } } sort keys %$keys; | 
|  | 0 |  |  |  |  |  |  | 
| 111 |  |  |  |  |  |  |  | 
| 112 | 0 |  |  |  |  |  | $self->verify( $body, @keys ); | 
| 113 |  |  |  |  |  |  |  | 
| 114 |  |  |  |  |  |  | Future->done( | 
| 115 |  |  |  |  |  |  | version     => "v1", | 
| 116 |  |  |  |  |  |  | server_name => $body->{server_name}, | 
| 117 | 0 |  |  |  |  |  | keys        => \@keys, | 
| 118 |  |  |  |  |  |  | ); | 
| 119 | 0 |  |  |  |  |  | }); | 
| 120 |  |  |  |  |  |  | } | 
| 121 |  |  |  |  |  |  |  | 
| 122 |  |  |  |  |  |  | sub get_key_v2 | 
| 123 |  |  |  |  |  |  | { | 
| 124 | 0 |  |  | 0 | 0 |  | my $self = shift; | 
| 125 | 0 |  |  |  |  |  | my ( $server_name ) = @_; | 
| 126 |  |  |  |  |  |  |  | 
| 127 | 0 |  |  |  |  |  | my $server_cert; | 
| 128 |  |  |  |  |  |  |  | 
| 129 |  |  |  |  |  |  | $self->http_client->request_json( | 
| 130 |  |  |  |  |  |  | server  => $server_name, | 
| 131 |  |  |  |  |  |  | request => $self->federation->make_key_v2_server_request( | 
| 132 |  |  |  |  |  |  | server_name => $server_name, | 
| 133 |  |  |  |  |  |  | key_id      => "*", | 
| 134 |  |  |  |  |  |  | ), | 
| 135 |  |  |  |  |  |  |  | 
| 136 |  |  |  |  |  |  | on_ready => sub { | 
| 137 | 0 |  |  | 0 |  |  | my ( $conn ) = @_; | 
| 138 | 0 |  |  |  |  |  | my $socket = $conn->read_handle; | 
| 139 |  |  |  |  |  |  |  | 
| 140 | 0 |  |  |  |  |  | $server_cert = $socket->peer_certificate; | 
| 141 |  |  |  |  |  |  |  | 
| 142 | 0 |  |  |  |  |  | $self->output_info( "Connected to " . $self->format_addr( $socket->peername ) ); | 
| 143 | 0 |  |  |  |  |  | Future->done; | 
| 144 |  |  |  |  |  |  | }, | 
| 145 |  |  |  |  |  |  | )->then( sub { | 
| 146 | 0 |  |  | 0 |  |  | my ( $body ) = @_; | 
| 147 |  |  |  |  |  |  |  | 
| 148 | 0 |  |  |  |  |  | my $fingerprint = Net::SSLeay::X509_digest( $server_cert, SHA256_ALGO ); | 
| 149 |  |  |  |  |  |  |  | 
| 150 | 0 | 0 |  |  |  |  | $body->{server_name} eq $server_name or | 
| 151 |  |  |  |  |  |  | $self->output_check_failure( "Returned server_name does not match" ); | 
| 152 |  |  |  |  |  |  |  | 
| 153 | 0 |  |  |  |  |  | my $fprint_ok; | 
| 154 | 0 |  |  |  |  |  | foreach ( @{ $body->{tls_fingerprints} } ) { | 
|  | 0 |  |  |  |  |  |  | 
| 155 | 0 | 0 |  |  |  |  | $_->{sha256} or next; | 
| 156 | 0 | 0 |  |  |  |  | decode_base64( $_->{sha256} ) eq $fingerprint and $fprint_ok++, last; | 
| 157 |  |  |  |  |  |  | } | 
| 158 | 0 | 0 |  |  |  |  | $fprint_ok ? $self->output_ok( "TLS fingerprint matches (SHA-256)" ) | 
| 159 |  |  |  |  |  |  | : $self->output_check_failure( "TLS fingerprint does not match any listed" ); | 
| 160 |  |  |  |  |  |  |  | 
| 161 | 0 |  |  |  |  |  | my $keys = $body->{verify_keys}; | 
| 162 | 0 |  |  |  |  |  | my @keys = map { { id => $_, key => decode_base64 $keys->{$_}{key} } } sort keys %$keys; | 
|  | 0 |  |  |  |  |  |  | 
| 163 |  |  |  |  |  |  |  | 
| 164 | 0 |  |  |  |  |  | $self->verify( $body, @keys ); | 
| 165 |  |  |  |  |  |  |  | 
| 166 |  |  |  |  |  |  | Future->done( | 
| 167 |  |  |  |  |  |  | version     => "v2", | 
| 168 |  |  |  |  |  |  | server_name => $body->{server_name}, | 
| 169 | 0 |  |  |  |  |  | keys        => \@keys, | 
| 170 |  |  |  |  |  |  | ); | 
| 171 | 0 |  |  |  |  |  | }); | 
| 172 |  |  |  |  |  |  | } | 
| 173 |  |  |  |  |  |  |  | 
| 174 |  |  |  |  |  |  | sub verify | 
| 175 |  |  |  |  |  |  | { | 
| 176 | 0 |  |  | 0 | 0 |  | my $self = shift; | 
| 177 | 0 |  |  |  |  |  | my ( $body, @keys ) = @_; | 
| 178 |  |  |  |  |  |  |  | 
| 179 | 0 |  |  |  |  |  | my %keys_by_id = map { $_->{id} => $_->{key} } @keys; | 
|  | 0 |  |  |  |  |  |  | 
| 180 |  |  |  |  |  |  |  | 
| 181 | 0 |  |  |  |  |  | my $ok; | 
| 182 | 0 |  |  |  |  |  | foreach my $origin ( sort keys %{ $body->{signatures} } ) { | 
|  | 0 |  |  |  |  |  |  | 
| 183 | 0 |  |  |  |  |  | foreach my $key_id ( sort keys %{ $body->{signatures}{$origin} } ) { | 
|  | 0 |  |  |  |  |  |  | 
| 184 | 0 | 0 |  |  |  |  | my $key = $keys_by_id{$key_id} or do { | 
| 185 | 0 |  |  |  |  |  | $self->output_info( "Skipping origin=$origin key_id=$key_id as there is no useable public key" ); | 
| 186 | 0 |  |  |  |  |  | next; | 
| 187 |  |  |  |  |  |  | }; | 
| 188 |  |  |  |  |  |  |  | 
| 189 | 0 |  |  |  |  |  | my $verified = eval { verify_json_signature( $body, | 
|  | 0 |  |  |  |  |  |  | 
| 190 |  |  |  |  |  |  | public_key => $key, | 
| 191 |  |  |  |  |  |  | origin     => $origin, | 
| 192 |  |  |  |  |  |  | key_id     => $key_id, | 
| 193 | 0 |  |  |  |  |  | ); 1 }; | 
| 194 |  |  |  |  |  |  |  | 
| 195 | 0 | 0 |  |  |  |  | $verified or | 
| 196 |  |  |  |  |  |  | $self->output_check_failure( "Signature verification failed for origin=$origin key_id=$key_id" ); | 
| 197 |  |  |  |  |  |  |  | 
| 198 | 0 | 0 |  |  |  |  | $verified and $ok++, | 
| 199 |  |  |  |  |  |  | $self->output_ok( "Verified using origin=$origin key_id=$key_id" ); | 
| 200 |  |  |  |  |  |  | } | 
| 201 |  |  |  |  |  |  | } | 
| 202 |  |  |  |  |  |  |  | 
| 203 |  |  |  |  |  |  | $ok or | 
| 204 | 0 | 0 |  |  |  |  | $self->output_check_failure( "Failed to find any valid signatures" ); | 
| 205 |  |  |  |  |  |  | } | 
| 206 |  |  |  |  |  |  |  | 
| 207 |  |  |  |  |  |  | sub output_check_failure | 
| 208 |  |  |  |  |  |  | { | 
| 209 | 0 |  |  | 0 | 0 |  | my $self = shift; | 
| 210 |  |  |  |  |  |  | # TODO: option to make this fatal or non-fatal | 
| 211 | 0 |  |  |  |  |  | $self->output_fail( @_ ); | 
| 212 |  |  |  |  |  |  | } | 
| 213 |  |  |  |  |  |  |  | 
| 214 |  |  |  |  |  |  | sub run | 
| 215 |  |  |  |  |  |  | { | 
| 216 | 0 |  |  | 0 | 0 |  | my $self = shift; | 
| 217 | 0 |  |  |  |  |  | my ( $opts, $server_name ) = @_; | 
| 218 |  |  |  |  |  |  |  | 
| 219 |  |  |  |  |  |  | $opts->{v1} and $opts->{v2} and | 
| 220 | 0 | 0 | 0 |  |  |  | return $self->error( "Cannot request 'v1' and 'v2' key API at the same time" ); | 
| 221 |  |  |  |  |  |  |  | 
| 222 |  |  |  |  |  |  | ( $opts->{v1} ? Future->fail( "No v2" ) : $self->get_key_v2( $server_name ) ) | 
| 223 | 0 | 0 |  | 0 |  |  | ->else_with_f( sub { $opts->{v2} ? shift : $self->get_key_v1( $server_name ) } ) | 
| 224 |  |  |  |  |  |  | ->then( sub { | 
| 225 | 0 |  |  | 0 |  |  | my %result = @_; | 
| 226 | 0 |  |  |  |  |  | $self->output( "$result{version} keys from $result{server_name}:" ); | 
| 227 | 0 |  |  |  |  |  | $self->output(); | 
| 228 |  |  |  |  |  |  |  | 
| 229 | 0 |  |  |  |  |  | my $store = $self->server_key_store; | 
| 230 | 0 |  |  |  |  |  | my %cached_keys = $store->list( server => $result{server_name} ); | 
| 231 |  |  |  |  |  |  |  | 
| 232 | 0 |  |  |  |  |  | foreach ( @{ $result{keys} } ) { | 
|  | 0 |  |  |  |  |  |  | 
| 233 | 0 |  |  |  |  |  | $self->output( "Key id $_->{id}" ); | 
| 234 | 0 |  |  |  |  |  | $self->output( "  " . $self->format_binary( $_->{key} ) ); | 
| 235 |  |  |  |  |  |  |  | 
| 236 | 0 | 0 |  |  |  |  | if( !exists $cached_keys{ $_->{id} } ) { | 
|  |  | 0 |  |  |  |  |  | 
| 237 |  |  |  |  |  |  | $store->put( | 
| 238 |  |  |  |  |  |  | server => $result{server_name}, | 
| 239 |  |  |  |  |  |  | id     => $_->{id}, | 
| 240 |  |  |  |  |  |  | data   => $_->{key}, | 
| 241 | 0 | 0 |  |  |  |  | ) unless $opts->{no_store}; | 
| 242 |  |  |  |  |  |  | } | 
| 243 |  |  |  |  |  |  | elsif( $cached_keys{ $_->{id} } eq $_->{key} ) { | 
| 244 | 0 |  |  |  |  |  | $self->output_info( "Matches cached key" ); | 
| 245 |  |  |  |  |  |  | } | 
| 246 |  |  |  |  |  |  | else { | 
| 247 | 0 |  |  |  |  |  | $self->output_warn( "Does not match cached key " . $self->format_binary( $cached_keys{ $_->{id} } ) ); | 
| 248 |  |  |  |  |  |  | } | 
| 249 |  |  |  |  |  |  | } | 
| 250 |  |  |  |  |  |  |  | 
| 251 | 0 |  |  |  |  |  | Future->done; | 
| 252 | 0 | 0 |  |  |  |  | }); | 
| 253 |  |  |  |  |  |  | } | 
| 254 |  |  |  |  |  |  |  | 
| 255 |  |  |  |  |  |  | =head1 EXAMPLES | 
| 256 |  |  |  |  |  |  |  | 
| 257 |  |  |  |  |  |  | For example, fetching the keys from a server: | 
| 258 |  |  |  |  |  |  |  | 
| 259 |  |  |  |  |  |  | $ matrixtool server-key matrix.org | 
| 260 |  |  |  |  |  |  | [INFO] Connected to 83.166.64.33:8448 | 
| 261 |  |  |  |  |  |  | Keys from matrix.org | 
| 262 |  |  |  |  |  |  |  | 
| 263 |  |  |  |  |  |  | Key id ed25519:auto | 
| 264 |  |  |  |  |  |  | base64::aBcDeFgHiJ... | 
| 265 |  |  |  |  |  |  | [INFO] Matches cached key | 
| 266 |  |  |  |  |  |  |  | 
| 267 |  |  |  |  |  |  | =cut | 
| 268 |  |  |  |  |  |  |  | 
| 269 |  |  |  |  |  |  | =head1 AUTHOR | 
| 270 |  |  |  |  |  |  |  | 
| 271 |  |  |  |  |  |  | Paul Evans | 
| 272 |  |  |  |  |  |  |  | 
| 273 |  |  |  |  |  |  | =cut | 
| 274 |  |  |  |  |  |  |  | 
| 275 |  |  |  |  |  |  | 0x55AA; |