2
0

key.py 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463
  1. from binascii import hexlify, a2b_base64, b2a_base64
  2. import configparser
  3. import getpass
  4. import os
  5. import sys
  6. import textwrap
  7. from hmac import HMAC, compare_digest
  8. from hashlib import sha256, pbkdf2_hmac
  9. from .helpers import IntegrityError, get_keys_dir, Error, yes
  10. from .logger import create_logger
  11. logger = create_logger()
  12. from .crypto import AES, bytes_to_long, long_to_bytes, bytes_to_int, num_aes_blocks
  13. from .compress import Compressor, COMPR_BUFFER
  14. import msgpack
  15. PREFIX = b'\0' * 8
  16. class PassphraseWrong(Error):
  17. """passphrase supplied in BORG_PASSPHRASE is incorrect"""
  18. class PasswordRetriesExceeded(Error):
  19. """exceeded the maximum password retries"""
  20. class UnsupportedPayloadError(Error):
  21. """Unsupported payload type {}. A newer version is required to access this repository."""
  22. class KeyfileNotFoundError(Error):
  23. """No key file for repository {} found in {}."""
  24. class RepoKeyNotFoundError(Error):
  25. """No key entry found in the config of repository {}."""
  26. def key_creator(repository, args):
  27. if args.encryption == 'keyfile':
  28. return KeyfileKey.create(repository, args)
  29. elif args.encryption == 'repokey':
  30. return RepoKey.create(repository, args)
  31. else:
  32. return PlaintextKey.create(repository, args)
  33. def key_factory(repository, manifest_data):
  34. key_type = manifest_data[0]
  35. if key_type == KeyfileKey.TYPE:
  36. return KeyfileKey.detect(repository, manifest_data)
  37. elif key_type == RepoKey.TYPE:
  38. return RepoKey.detect(repository, manifest_data)
  39. elif key_type == PassphraseKey.TYPE:
  40. # we just dispatch to repokey mode and assume the passphrase was migrated to a repokey.
  41. # see also comment in PassphraseKey class.
  42. return RepoKey.detect(repository, manifest_data)
  43. elif key_type == PlaintextKey.TYPE:
  44. return PlaintextKey.detect(repository, manifest_data)
  45. else:
  46. raise UnsupportedPayloadError(key_type)
  47. class KeyBase:
  48. TYPE = None # override in subclasses
  49. def __init__(self, repository):
  50. self.TYPE_STR = bytes([self.TYPE])
  51. self.repository = repository
  52. self.target = None # key location file path / repo obj
  53. self.compressor = Compressor('none', buffer=COMPR_BUFFER)
  54. def id_hash(self, data):
  55. """Return HMAC hash using the "id" HMAC key
  56. """
  57. def encrypt(self, data):
  58. pass
  59. def decrypt(self, id, data):
  60. pass
  61. class PlaintextKey(KeyBase):
  62. TYPE = 0x02
  63. chunk_seed = 0
  64. @classmethod
  65. def create(cls, repository, args):
  66. logger.info('Encryption NOT enabled.\nUse the "--encryption=repokey|keyfile" to enable encryption.')
  67. return cls(repository)
  68. @classmethod
  69. def detect(cls, repository, manifest_data):
  70. return cls(repository)
  71. def id_hash(self, data):
  72. return sha256(data).digest()
  73. def encrypt(self, data):
  74. return b''.join([self.TYPE_STR, self.compressor.compress(data)])
  75. def decrypt(self, id, data):
  76. if data[0] != self.TYPE:
  77. raise IntegrityError('Invalid encryption envelope')
  78. data = self.compressor.decompress(memoryview(data)[1:])
  79. if id and sha256(data).digest() != id:
  80. raise IntegrityError('Chunk id verification failed')
  81. return data
  82. class AESKeyBase(KeyBase):
  83. """Common base class shared by KeyfileKey and PassphraseKey
  84. Chunks are encrypted using 256bit AES in Counter Mode (CTR)
  85. Payload layout: TYPE(1) + HMAC(32) + NONCE(8) + CIPHERTEXT
  86. To reduce payload size only 8 bytes of the 16 bytes nonce is saved
  87. in the payload, the first 8 bytes are always zeros. This does not
  88. affect security but limits the maximum repository capacity to
  89. only 295 exabytes!
  90. """
  91. PAYLOAD_OVERHEAD = 1 + 32 + 8 # TYPE + HMAC + NONCE
  92. def id_hash(self, data):
  93. """Return HMAC hash using the "id" HMAC key
  94. """
  95. return HMAC(self.id_key, data, sha256).digest()
  96. def encrypt(self, data):
  97. data = self.compressor.compress(data)
  98. self.enc_cipher.reset()
  99. data = b''.join((self.enc_cipher.iv[8:], self.enc_cipher.encrypt(data)))
  100. hmac = HMAC(self.enc_hmac_key, data, sha256).digest()
  101. return b''.join((self.TYPE_STR, hmac, data))
  102. def decrypt(self, id, data):
  103. if not (data[0] == self.TYPE or
  104. data[0] == PassphraseKey.TYPE and isinstance(self, RepoKey)):
  105. raise IntegrityError('Invalid encryption envelope')
  106. hmac_given = memoryview(data)[1:33]
  107. hmac_computed = memoryview(HMAC(self.enc_hmac_key, memoryview(data)[33:], sha256).digest())
  108. if not compare_digest(hmac_computed, hmac_given):
  109. raise IntegrityError('Encryption envelope checksum mismatch')
  110. self.dec_cipher.reset(iv=PREFIX + data[33:41])
  111. data = self.compressor.decompress(self.dec_cipher.decrypt(data[41:]))
  112. if id:
  113. hmac_given = id
  114. hmac_computed = HMAC(self.id_key, data, sha256).digest()
  115. if not compare_digest(hmac_computed, hmac_given):
  116. raise IntegrityError('Chunk id verification failed')
  117. return data
  118. def extract_nonce(self, payload):
  119. if not (payload[0] == self.TYPE or
  120. payload[0] == PassphraseKey.TYPE and isinstance(self, RepoKey)):
  121. raise IntegrityError('Invalid encryption envelope')
  122. nonce = bytes_to_long(payload[33:41])
  123. return nonce
  124. def init_from_random_data(self, data):
  125. self.enc_key = data[0:32]
  126. self.enc_hmac_key = data[32:64]
  127. self.id_key = data[64:96]
  128. self.chunk_seed = bytes_to_int(data[96:100])
  129. # Convert to signed int32
  130. if self.chunk_seed & 0x80000000:
  131. self.chunk_seed = self.chunk_seed - 0xffffffff - 1
  132. def init_ciphers(self, enc_iv=b''):
  133. self.enc_cipher = AES(is_encrypt=True, key=self.enc_key, iv=enc_iv)
  134. self.dec_cipher = AES(is_encrypt=False, key=self.enc_key)
  135. class Passphrase(str):
  136. @classmethod
  137. def env_passphrase(cls, default=None):
  138. passphrase = os.environ.get('BORG_PASSPHRASE', default)
  139. if passphrase is not None:
  140. return cls(passphrase)
  141. @classmethod
  142. def getpass(cls, prompt):
  143. return cls(getpass.getpass(prompt))
  144. @classmethod
  145. def verification(cls, passphrase):
  146. if yes('Do you want your passphrase to be displayed for verification? [yN]: ',
  147. env_var_override='BORG_DISPLAY_PASSPHRASE'):
  148. print('Your passphrase (between double-quotes): "%s"' % passphrase,
  149. file=sys.stderr)
  150. print('Make sure the passphrase displayed above is exactly what you wanted.',
  151. file=sys.stderr)
  152. try:
  153. passphrase.encode('ascii')
  154. except UnicodeEncodeError:
  155. print('Your passphrase (UTF-8 encoding in hex): %s' %
  156. hexlify(passphrase.encode('utf-8')).decode('ascii'),
  157. file=sys.stderr)
  158. print('As you have a non-ASCII passphrase, it is recommended to keep the UTF-8 encoding in hex together with the passphrase at a safe place.',
  159. file=sys.stderr)
  160. @classmethod
  161. def new(cls, allow_empty=False):
  162. passphrase = cls.env_passphrase()
  163. if passphrase is not None:
  164. return passphrase
  165. for retry in range(1, 11):
  166. passphrase = cls.getpass('Enter new passphrase: ')
  167. if allow_empty or passphrase:
  168. passphrase2 = cls.getpass('Enter same passphrase again: ')
  169. if passphrase == passphrase2:
  170. cls.verification(passphrase)
  171. logger.info('Remember your passphrase. Your data will be inaccessible without it.')
  172. return passphrase
  173. else:
  174. print('Passphrases do not match', file=sys.stderr)
  175. else:
  176. print('Passphrase must not be blank', file=sys.stderr)
  177. else:
  178. raise PasswordRetriesExceeded
  179. def __repr__(self):
  180. return '<Passphrase "***hidden***">'
  181. def kdf(self, salt, iterations, length):
  182. return pbkdf2_hmac('sha256', self.encode('utf-8'), salt, iterations, length)
  183. class PassphraseKey(AESKeyBase):
  184. # This mode was killed in borg 1.0, see: https://github.com/borgbackup/borg/issues/97
  185. # Reasons:
  186. # - you can never ever change your passphrase for existing repos.
  187. # - you can never ever use a different iterations count for existing repos.
  188. # "Killed" means:
  189. # - there is no automatic dispatch to this class via type byte
  190. # - --encryption=passphrase is an invalid argument now
  191. # This class is kept for a while to support migration from passphrase to repokey mode.
  192. TYPE = 0x01
  193. iterations = 100000 # must not be changed ever!
  194. @classmethod
  195. def create(cls, repository, args):
  196. key = cls(repository)
  197. logger.warning('WARNING: "passphrase" mode is unsupported since borg 1.0.')
  198. passphrase = Passphrase.new(allow_empty=False)
  199. key.init(repository, passphrase)
  200. return key
  201. @classmethod
  202. def detect(cls, repository, manifest_data):
  203. prompt = 'Enter passphrase for %s: ' % repository._location.orig
  204. key = cls(repository)
  205. passphrase = Passphrase.env_passphrase()
  206. if passphrase is None:
  207. passphrase = Passphrase.getpass(prompt)
  208. for retry in range(1, 3):
  209. key.init(repository, passphrase)
  210. try:
  211. key.decrypt(None, manifest_data)
  212. num_blocks = num_aes_blocks(len(manifest_data) - 41)
  213. key.init_ciphers(PREFIX + long_to_bytes(key.extract_nonce(manifest_data) + num_blocks))
  214. return key
  215. except IntegrityError:
  216. passphrase = Passphrase.getpass(prompt)
  217. else:
  218. raise PasswordRetriesExceeded
  219. def change_passphrase(self):
  220. class ImmutablePassphraseError(Error):
  221. """The passphrase for this encryption key type can't be changed."""
  222. raise ImmutablePassphraseError
  223. def init(self, repository, passphrase):
  224. self.init_from_random_data(passphrase.kdf(repository.id, self.iterations, 100))
  225. self.init_ciphers()
  226. class KeyfileKeyBase(AESKeyBase):
  227. @classmethod
  228. def detect(cls, repository, manifest_data):
  229. key = cls(repository)
  230. target = key.find_key()
  231. prompt = 'Enter passphrase for key %s: ' % target
  232. passphrase = Passphrase.env_passphrase()
  233. if passphrase is None:
  234. passphrase = Passphrase()
  235. if not key.load(target, passphrase):
  236. for retry in range(0, 3):
  237. passphrase = Passphrase.getpass(prompt)
  238. if key.load(target, passphrase):
  239. break
  240. else:
  241. raise PasswordRetriesExceeded
  242. else:
  243. if not key.load(target, passphrase):
  244. raise PassphraseWrong
  245. num_blocks = num_aes_blocks(len(manifest_data) - 41)
  246. key.init_ciphers(PREFIX + long_to_bytes(key.extract_nonce(manifest_data) + num_blocks))
  247. return key
  248. def find_key(self):
  249. raise NotImplementedError
  250. def load(self, target, passphrase):
  251. raise NotImplementedError
  252. def _load(self, key_data, passphrase):
  253. cdata = a2b_base64(key_data)
  254. data = self.decrypt_key_file(cdata, passphrase)
  255. if data:
  256. key = msgpack.unpackb(data)
  257. if key[b'version'] != 1:
  258. raise IntegrityError('Invalid key file header')
  259. self.repository_id = key[b'repository_id']
  260. self.enc_key = key[b'enc_key']
  261. self.enc_hmac_key = key[b'enc_hmac_key']
  262. self.id_key = key[b'id_key']
  263. self.chunk_seed = key[b'chunk_seed']
  264. return True
  265. return False
  266. def decrypt_key_file(self, data, passphrase):
  267. d = msgpack.unpackb(data)
  268. assert d[b'version'] == 1
  269. assert d[b'algorithm'] == b'sha256'
  270. key = passphrase.kdf(d[b'salt'], d[b'iterations'], 32)
  271. data = AES(is_encrypt=False, key=key).decrypt(d[b'data'])
  272. if HMAC(key, data, sha256).digest() == d[b'hash']:
  273. return data
  274. def encrypt_key_file(self, data, passphrase):
  275. salt = os.urandom(32)
  276. iterations = 100000
  277. key = passphrase.kdf(salt, iterations, 32)
  278. hash = HMAC(key, data, sha256).digest()
  279. cdata = AES(is_encrypt=True, key=key).encrypt(data)
  280. d = {
  281. 'version': 1,
  282. 'salt': salt,
  283. 'iterations': iterations,
  284. 'algorithm': 'sha256',
  285. 'hash': hash,
  286. 'data': cdata,
  287. }
  288. return msgpack.packb(d)
  289. def _save(self, passphrase):
  290. key = {
  291. 'version': 1,
  292. 'repository_id': self.repository_id,
  293. 'enc_key': self.enc_key,
  294. 'enc_hmac_key': self.enc_hmac_key,
  295. 'id_key': self.id_key,
  296. 'chunk_seed': self.chunk_seed,
  297. }
  298. data = self.encrypt_key_file(msgpack.packb(key), passphrase)
  299. key_data = '\n'.join(textwrap.wrap(b2a_base64(data).decode('ascii')))
  300. return key_data
  301. def change_passphrase(self):
  302. passphrase = Passphrase.new(allow_empty=True)
  303. self.save(self.target, passphrase)
  304. logger.info('Key updated')
  305. @classmethod
  306. def create(cls, repository, args):
  307. passphrase = Passphrase.new(allow_empty=True)
  308. key = cls(repository)
  309. key.repository_id = repository.id
  310. key.init_from_random_data(os.urandom(100))
  311. key.init_ciphers()
  312. target = key.get_new_target(args)
  313. key.save(target, passphrase)
  314. logger.info('Key in "%s" created.' % target)
  315. logger.info('Keep this key safe. Your data will be inaccessible without it.')
  316. return key
  317. def save(self, target, passphrase):
  318. raise NotImplementedError
  319. def get_new_target(self, args):
  320. raise NotImplementedError
  321. class KeyfileKey(KeyfileKeyBase):
  322. TYPE = 0x00
  323. FILE_ID = 'BORG_KEY'
  324. def find_key(self):
  325. file_id = self.FILE_ID.encode()
  326. first_line = file_id + b' ' + hexlify(self.repository.id)
  327. keys_dir = get_keys_dir()
  328. for name in os.listdir(keys_dir):
  329. filename = os.path.join(keys_dir, name)
  330. # we do the magic / id check in binary mode to avoid stumbling over
  331. # decoding errors if somebody has binary files in the keys dir for some reason.
  332. with open(filename, 'rb') as fd:
  333. if fd.read(len(first_line)) == first_line:
  334. return filename
  335. raise KeyfileNotFoundError(self.repository._location.canonical_path(), get_keys_dir())
  336. def get_new_target(self, args):
  337. filename = args.location.to_key_filename()
  338. path = filename
  339. i = 1
  340. while os.path.exists(path):
  341. i += 1
  342. path = filename + '.%d' % i
  343. return path
  344. def load(self, target, passphrase):
  345. with open(target, 'r') as fd:
  346. key_data = ''.join(fd.readlines()[1:])
  347. success = self._load(key_data, passphrase)
  348. if success:
  349. self.target = target
  350. return success
  351. def save(self, target, passphrase):
  352. key_data = self._save(passphrase)
  353. with open(target, 'w') as fd:
  354. fd.write('%s %s\n' % (self.FILE_ID, hexlify(self.repository_id).decode('ascii')))
  355. fd.write(key_data)
  356. fd.write('\n')
  357. self.target = target
  358. class RepoKey(KeyfileKeyBase):
  359. TYPE = 0x03
  360. def find_key(self):
  361. loc = self.repository._location.canonical_path()
  362. try:
  363. self.repository.load_key()
  364. return loc
  365. except configparser.NoOptionError:
  366. raise RepoKeyNotFoundError(loc) from None
  367. def get_new_target(self, args):
  368. return self.repository
  369. def load(self, target, passphrase):
  370. # what we get in target is just a repo location, but we already have the repo obj:
  371. target = self.repository
  372. key_data = target.load_key()
  373. key_data = key_data.decode('utf-8') # remote repo: msgpack issue #99, getting bytes
  374. success = self._load(key_data, passphrase)
  375. if success:
  376. self.target = target
  377. return success
  378. def save(self, target, passphrase):
  379. key_data = self._save(passphrase)
  380. key_data = key_data.encode('utf-8') # remote repo: msgpack issue #99, giving bytes
  381. target.save_key(key_data)
  382. self.target = target