key.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420
  1. from binascii import hexlify, a2b_base64, b2a_base64
  2. import configparser
  3. import getpass
  4. import os
  5. import msgpack
  6. import textwrap
  7. import hmac
  8. from hashlib import sha256
  9. from .crypto import pbkdf2_sha256, get_random_bytes, AES, bytes_to_long, long_to_bytes, bytes_to_int, num_aes_blocks
  10. from .compress import Compressor, COMPR_BUFFER
  11. from .helpers import IntegrityError, get_keys_dir, Error
  12. from .logger import create_logger
  13. logger = create_logger()
  14. PREFIX = b'\0' * 8
  15. class UnsupportedPayloadError(Error):
  16. """Unsupported payload type {}. A newer version is required to access this repository.
  17. """
  18. class KeyfileNotFoundError(Error):
  19. """No key file for repository {} found in {}.
  20. """
  21. class RepoKeyNotFoundError(Error):
  22. """No key entry found in the config of repository {}.
  23. """
  24. class HMAC(hmac.HMAC):
  25. """Workaround a bug in Python < 3.4 Where HMAC does not accept memoryviews
  26. """
  27. def update(self, msg):
  28. self.inner.update(msg)
  29. def key_creator(repository, args):
  30. if args.encryption == 'keyfile':
  31. return KeyfileKey.create(repository, args)
  32. elif args.encryption == 'repokey':
  33. return RepoKey.create(repository, args)
  34. elif args.encryption == 'passphrase': # deprecated, kill in 1.x
  35. return PassphraseKey.create(repository, args)
  36. else:
  37. return PlaintextKey.create(repository, args)
  38. def key_factory(repository, manifest_data):
  39. key_type = manifest_data[0]
  40. if key_type == KeyfileKey.TYPE:
  41. return KeyfileKey.detect(repository, manifest_data)
  42. elif key_type == RepoKey.TYPE:
  43. return RepoKey.detect(repository, manifest_data)
  44. elif key_type == PassphraseKey.TYPE: # deprecated, kill in 1.x
  45. return PassphraseKey.detect(repository, manifest_data)
  46. elif key_type == PlaintextKey.TYPE:
  47. return PlaintextKey.detect(repository, manifest_data)
  48. else:
  49. raise UnsupportedPayloadError(key_type)
  50. class KeyBase:
  51. TYPE = None # override in subclasses
  52. def __init__(self, repository):
  53. self.TYPE_STR = bytes([self.TYPE])
  54. self.repository = repository
  55. self.target = None # key location file path / repo obj
  56. self.compressor = Compressor('none', buffer=COMPR_BUFFER)
  57. def id_hash(self, data):
  58. """Return HMAC hash using the "id" HMAC key
  59. """
  60. def encrypt(self, data):
  61. pass
  62. def decrypt(self, id, data):
  63. pass
  64. class PlaintextKey(KeyBase):
  65. TYPE = 0x02
  66. chunk_seed = 0
  67. @classmethod
  68. def create(cls, repository, args):
  69. logger.info('Encryption NOT enabled.\nUse the "--encryption=repokey|keyfile|passphrase" to enable encryption.')
  70. return cls(repository)
  71. @classmethod
  72. def detect(cls, repository, manifest_data):
  73. return cls(repository)
  74. def id_hash(self, data):
  75. return sha256(data).digest()
  76. def encrypt(self, data):
  77. return b''.join([self.TYPE_STR, self.compressor.compress(data)])
  78. def decrypt(self, id, data):
  79. if data[0] != self.TYPE:
  80. raise IntegrityError('Invalid encryption envelope')
  81. data = self.compressor.decompress(memoryview(data)[1:])
  82. if id and sha256(data).digest() != id:
  83. raise IntegrityError('Chunk id verification failed')
  84. return data
  85. class AESKeyBase(KeyBase):
  86. """Common base class shared by KeyfileKey and PassphraseKey
  87. Chunks are encrypted using 256bit AES in Counter Mode (CTR)
  88. Payload layout: TYPE(1) + HMAC(32) + NONCE(8) + CIPHERTEXT
  89. To reduce payload size only 8 bytes of the 16 bytes nonce is saved
  90. in the payload, the first 8 bytes are always zeros. This does not
  91. affect security but limits the maximum repository capacity to
  92. only 295 exabytes!
  93. """
  94. PAYLOAD_OVERHEAD = 1 + 32 + 8 # TYPE + HMAC + NONCE
  95. def id_hash(self, data):
  96. """Return HMAC hash using the "id" HMAC key
  97. """
  98. return HMAC(self.id_key, data, sha256).digest()
  99. def encrypt(self, data):
  100. data = self.compressor.compress(data)
  101. self.enc_cipher.reset()
  102. data = b''.join((self.enc_cipher.iv[8:], self.enc_cipher.encrypt(data)))
  103. hmac = HMAC(self.enc_hmac_key, data, sha256).digest()
  104. return b''.join((self.TYPE_STR, hmac, data))
  105. def decrypt(self, id, data):
  106. if data[0] != self.TYPE:
  107. raise IntegrityError('Invalid encryption envelope')
  108. hmac = memoryview(data)[1:33]
  109. if memoryview(HMAC(self.enc_hmac_key, memoryview(data)[33:], sha256).digest()) != hmac:
  110. raise IntegrityError('Encryption envelope checksum mismatch')
  111. self.dec_cipher.reset(iv=PREFIX + data[33:41])
  112. data = self.compressor.decompress(self.dec_cipher.decrypt(data[41:]))
  113. if id and HMAC(self.id_key, data, sha256).digest() != id:
  114. raise IntegrityError('Chunk id verification failed')
  115. return data
  116. def extract_nonce(self, payload):
  117. if payload[0] != self.TYPE:
  118. raise IntegrityError('Invalid encryption envelope')
  119. nonce = bytes_to_long(payload[33:41])
  120. return nonce
  121. def init_from_random_data(self, data):
  122. self.enc_key = data[0:32]
  123. self.enc_hmac_key = data[32:64]
  124. self.id_key = data[64:96]
  125. self.chunk_seed = bytes_to_int(data[96:100])
  126. # Convert to signed int32
  127. if self.chunk_seed & 0x80000000:
  128. self.chunk_seed = self.chunk_seed - 0xffffffff - 1
  129. def init_ciphers(self, enc_iv=b''):
  130. self.enc_cipher = AES(is_encrypt=True, key=self.enc_key, iv=enc_iv)
  131. self.dec_cipher = AES(is_encrypt=False, key=self.enc_key)
  132. class Passphrase(str):
  133. @classmethod
  134. def env_passphrase(cls, default=None):
  135. passphrase = os.environ.get('BORG_PASSPHRASE', default)
  136. if passphrase is not None:
  137. return cls(passphrase)
  138. @classmethod
  139. def getpass(cls, prompt):
  140. return cls(getpass.getpass(prompt))
  141. @classmethod
  142. def new(cls, allow_empty=False):
  143. passphrase = cls.env_passphrase()
  144. if passphrase is not None:
  145. return passphrase
  146. while True:
  147. passphrase = cls.getpass('Enter new passphrase: ')
  148. if allow_empty or passphrase:
  149. passphrase2 = cls.getpass('Enter same passphrase again: ')
  150. if passphrase == passphrase2:
  151. logger.info('Remember your passphrase. Your data will be inaccessible without it.')
  152. return passphrase
  153. else:
  154. print('Passphrases do not match', file=sys.stderr)
  155. else:
  156. print('Passphrase must not be blank', file=sys.stderr)
  157. def __repr__(self):
  158. return '<Passphrase "***hidden***">'
  159. def kdf(self, salt, iterations, length):
  160. return pbkdf2_sha256(self.encode('utf-8'), salt, iterations, length)
  161. class PassphraseKey(AESKeyBase):
  162. # This mode is DEPRECATED and will be killed at 1.0 release.
  163. # With this mode:
  164. # - you can never ever change your passphrase for existing repos.
  165. # - you can never ever use a different iterations count for existing repos.
  166. TYPE = 0x01
  167. iterations = 100000 # must not be changed ever!
  168. @classmethod
  169. def create(cls, repository, args):
  170. key = cls(repository)
  171. logger.warning('WARNING: "passphrase" mode is deprecated and will be removed in 1.0.')
  172. logger.warning('If you want something similar (but with less issues), use "repokey" mode.')
  173. passphrase = Passphrase.new(allow_empty=False)
  174. key.init(repository, passphrase)
  175. return key
  176. @classmethod
  177. def detect(cls, repository, manifest_data):
  178. prompt = 'Enter passphrase for %s: ' % repository._location.orig
  179. key = cls(repository)
  180. passphrase = Passphrase.env_passphrase()
  181. if passphrase is None:
  182. passphrase = Passphrase.getpass(prompt)
  183. while True:
  184. key.init(repository, passphrase)
  185. try:
  186. key.decrypt(None, manifest_data)
  187. num_blocks = num_aes_blocks(len(manifest_data) - 41)
  188. key.init_ciphers(PREFIX + long_to_bytes(key.extract_nonce(manifest_data) + num_blocks))
  189. return key
  190. except IntegrityError:
  191. passphrase = Passphrase.getpass(prompt)
  192. def change_passphrase(self):
  193. class ImmutablePassphraseError(Error):
  194. """The passphrase for this encryption key type can't be changed."""
  195. raise ImmutablePassphraseError
  196. def init(self, repository, passphrase):
  197. self.init_from_random_data(passphrase.kdf(repository.id, self.iterations, 100))
  198. self.init_ciphers()
  199. class KeyfileKeyBase(AESKeyBase):
  200. @classmethod
  201. def detect(cls, repository, manifest_data):
  202. key = cls(repository)
  203. target = key.find_key()
  204. prompt = 'Enter passphrase for key %s: ' % target
  205. passphrase = Passphrase.env_passphrase(default='')
  206. while not key.load(target, passphrase):
  207. passphrase = Passphrase.getpass(prompt)
  208. num_blocks = num_aes_blocks(len(manifest_data) - 41)
  209. key.init_ciphers(PREFIX + long_to_bytes(key.extract_nonce(manifest_data) + num_blocks))
  210. return key
  211. def find_key(self):
  212. raise NotImplementedError
  213. def load(self, target, passphrase):
  214. raise NotImplementedError
  215. def _load(self, key_data, passphrase):
  216. cdata = a2b_base64(key_data.encode('ascii')) # .encode needed for Python 3.[0-2]
  217. data = self.decrypt_key_file(cdata, passphrase)
  218. if data:
  219. key = msgpack.unpackb(data)
  220. if key[b'version'] != 1:
  221. raise IntegrityError('Invalid key file header')
  222. self.repository_id = key[b'repository_id']
  223. self.enc_key = key[b'enc_key']
  224. self.enc_hmac_key = key[b'enc_hmac_key']
  225. self.id_key = key[b'id_key']
  226. self.chunk_seed = key[b'chunk_seed']
  227. return True
  228. return False
  229. def decrypt_key_file(self, data, passphrase):
  230. d = msgpack.unpackb(data)
  231. assert d[b'version'] == 1
  232. assert d[b'algorithm'] == b'sha256'
  233. key = passphrase.kdf(d[b'salt'], d[b'iterations'], 32)
  234. data = AES(is_encrypt=False, key=key).decrypt(d[b'data'])
  235. if HMAC(key, data, sha256).digest() == d[b'hash']:
  236. return data
  237. def encrypt_key_file(self, data, passphrase):
  238. salt = get_random_bytes(32)
  239. iterations = 100000
  240. key = passphrase.kdf(salt, iterations, 32)
  241. hash = HMAC(key, data, sha256).digest()
  242. cdata = AES(is_encrypt=True, key=key).encrypt(data)
  243. d = {
  244. 'version': 1,
  245. 'salt': salt,
  246. 'iterations': iterations,
  247. 'algorithm': 'sha256',
  248. 'hash': hash,
  249. 'data': cdata,
  250. }
  251. return msgpack.packb(d)
  252. def _save(self, passphrase):
  253. key = {
  254. 'version': 1,
  255. 'repository_id': self.repository_id,
  256. 'enc_key': self.enc_key,
  257. 'enc_hmac_key': self.enc_hmac_key,
  258. 'id_key': self.id_key,
  259. 'chunk_seed': self.chunk_seed,
  260. }
  261. data = self.encrypt_key_file(msgpack.packb(key), passphrase)
  262. key_data = '\n'.join(textwrap.wrap(b2a_base64(data).decode('ascii')))
  263. return key_data
  264. def change_passphrase(self):
  265. passphrase = Passphrase.new(allow_empty=True)
  266. self.save(self.target, passphrase)
  267. logger.info('Key updated')
  268. @classmethod
  269. def create(cls, repository, args):
  270. passphrase = Passphrase.new(allow_empty=True)
  271. key = cls(repository)
  272. key.repository_id = repository.id
  273. key.init_from_random_data(get_random_bytes(100))
  274. key.init_ciphers()
  275. target = key.get_new_target(args)
  276. key.save(target, passphrase)
  277. logger.info('Key in "%s" created.' % target)
  278. logger.info('Keep this key safe. Your data will be inaccessible without it.')
  279. return key
  280. def save(self, target, passphrase):
  281. raise NotImplementedError
  282. def get_new_target(self, args):
  283. raise NotImplementedError
  284. class KeyfileKey(KeyfileKeyBase):
  285. TYPE = 0x00
  286. FILE_ID = 'BORG_KEY'
  287. def find_key(self):
  288. id = hexlify(self.repository.id).decode('ascii')
  289. keys_dir = get_keys_dir()
  290. for name in os.listdir(keys_dir):
  291. filename = os.path.join(keys_dir, name)
  292. with open(filename, 'r') as fd:
  293. line = fd.readline().strip()
  294. if line.startswith(self.FILE_ID) and line[len(self.FILE_ID)+1:] == id:
  295. return filename
  296. raise KeyfileNotFoundError(self.repository._location.canonical_path(), get_keys_dir())
  297. def get_new_target(self, args):
  298. filename = args.repository.to_key_filename()
  299. path = filename
  300. i = 1
  301. while os.path.exists(path):
  302. i += 1
  303. path = filename + '.%d' % i
  304. return path
  305. def load(self, target, passphrase):
  306. with open(target, 'r') as fd:
  307. key_data = ''.join(fd.readlines()[1:])
  308. success = self._load(key_data, passphrase)
  309. if success:
  310. self.target = target
  311. return success
  312. def save(self, target, passphrase):
  313. key_data = self._save(passphrase)
  314. with open(target, 'w') as fd:
  315. fd.write('%s %s\n' % (self.FILE_ID, hexlify(self.repository_id).decode('ascii')))
  316. fd.write(key_data)
  317. fd.write('\n')
  318. self.target = target
  319. class RepoKey(KeyfileKeyBase):
  320. TYPE = 0x03
  321. def find_key(self):
  322. loc = self.repository._location.canonical_path()
  323. try:
  324. self.repository.load_key()
  325. return loc
  326. except configparser.NoOptionError:
  327. raise RepoKeyNotFoundError(loc)
  328. def get_new_target(self, args):
  329. return self.repository
  330. def load(self, target, passphrase):
  331. # what we get in target is just a repo location, but we already have the repo obj:
  332. target = self.repository
  333. key_data = target.load_key()
  334. key_data = key_data.decode('utf-8') # remote repo: msgpack issue #99, getting bytes
  335. success = self._load(key_data, passphrase)
  336. if success:
  337. self.target = target
  338. return success
  339. def save(self, target, passphrase):
  340. key_data = self._save(passphrase)
  341. key_data = key_data.encode('utf-8') # remote repo: msgpack issue #99, giving bytes
  342. target.save_key(key_data)
  343. self.target = target