key.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498
  1. from binascii import a2b_base64, b2a_base64, hexlify
  2. import configparser
  3. import getpass
  4. import os
  5. import sys
  6. import textwrap
  7. from hmac import compare_digest
  8. from hashlib import sha256, pbkdf2_hmac
  9. from .helpers import Chunk, IntegrityError, get_keys_dir, Error, yes, bin_to_hex, CompressionDecider2, CompressionSpec
  10. from .logger import create_logger
  11. logger = create_logger()
  12. from .constants import * # NOQA
  13. from .crypto import AES, bytes_to_long, long_to_bytes, bytes_to_int, num_aes_blocks, hmac_sha256
  14. from .compress import Compressor, COMPR_BUFFER, get_compressor
  15. import msgpack
  16. PREFIX = b'\0' * 8
  17. class PassphraseWrong(Error):
  18. """passphrase supplied in BORG_PASSPHRASE is incorrect"""
  19. class PasswordRetriesExceeded(Error):
  20. """exceeded the maximum password retries"""
  21. class UnsupportedPayloadError(Error):
  22. """Unsupported payload type {}. A newer version is required to access this repository."""
  23. class KeyfileNotFoundError(Error):
  24. """No key file for repository {} found in {}."""
  25. class KeyfileInvalidError(Error):
  26. """Invalid key file for repository {} found in {}."""
  27. class KeyfileMismatchError(Error):
  28. """Mismatch between repository {} and key file {}."""
  29. class RepoKeyNotFoundError(Error):
  30. """No key entry found in the config of repository {}."""
  31. def key_creator(repository, args):
  32. if args.encryption == 'keyfile':
  33. return KeyfileKey.create(repository, args)
  34. elif args.encryption == 'repokey':
  35. return RepoKey.create(repository, args)
  36. else:
  37. return PlaintextKey.create(repository, args)
  38. def key_factory(repository, manifest_data):
  39. key_type = manifest_data[0]
  40. if key_type == KeyfileKey.TYPE:
  41. return KeyfileKey.detect(repository, manifest_data)
  42. elif key_type == RepoKey.TYPE:
  43. return RepoKey.detect(repository, manifest_data)
  44. elif key_type == PassphraseKey.TYPE:
  45. # we just dispatch to repokey mode and assume the passphrase was migrated to a repokey.
  46. # see also comment in PassphraseKey class.
  47. return RepoKey.detect(repository, manifest_data)
  48. elif key_type == PlaintextKey.TYPE:
  49. return PlaintextKey.detect(repository, manifest_data)
  50. else:
  51. raise UnsupportedPayloadError(key_type)
  52. class KeyBase:
  53. TYPE = None # override in subclasses
  54. def __init__(self, repository):
  55. self.TYPE_STR = bytes([self.TYPE])
  56. self.repository = repository
  57. self.target = None # key location file path / repo obj
  58. self.compression_decider2 = CompressionDecider2(CompressionSpec('none'))
  59. self.compressor = Compressor('none', buffer=COMPR_BUFFER) # for decompression
  60. def id_hash(self, data):
  61. """Return HMAC hash using the "id" HMAC key
  62. """
  63. def compress(self, chunk):
  64. compr_args, chunk = self.compression_decider2.decide(chunk)
  65. compressor = Compressor(**compr_args)
  66. meta, data = chunk
  67. data = compressor.compress(data)
  68. return Chunk(data, **meta)
  69. def encrypt(self, chunk):
  70. pass
  71. def decrypt(self, id, data):
  72. pass
  73. class PlaintextKey(KeyBase):
  74. TYPE = 0x02
  75. chunk_seed = 0
  76. @classmethod
  77. def create(cls, repository, args):
  78. logger.info('Encryption NOT enabled.\nUse the "--encryption=repokey|keyfile" to enable encryption.')
  79. return cls(repository)
  80. @classmethod
  81. def detect(cls, repository, manifest_data):
  82. return cls(repository)
  83. def id_hash(self, data):
  84. return sha256(data).digest()
  85. def encrypt(self, chunk):
  86. chunk = self.compress(chunk)
  87. return b''.join([self.TYPE_STR, chunk.data])
  88. def decrypt(self, id, data):
  89. if data[0] != self.TYPE:
  90. raise IntegrityError('Invalid encryption envelope')
  91. data = self.compressor.decompress(memoryview(data)[1:])
  92. if id and sha256(data).digest() != id:
  93. raise IntegrityError('Chunk id verification failed')
  94. return Chunk(data)
  95. class AESKeyBase(KeyBase):
  96. """Common base class shared by KeyfileKey and PassphraseKey
  97. Chunks are encrypted using 256bit AES in Counter Mode (CTR)
  98. Payload layout: TYPE(1) + HMAC(32) + NONCE(8) + CIPHERTEXT
  99. To reduce payload size only 8 bytes of the 16 bytes nonce is saved
  100. in the payload, the first 8 bytes are always zeros. This does not
  101. affect security but limits the maximum repository capacity to
  102. only 295 exabytes!
  103. """
  104. PAYLOAD_OVERHEAD = 1 + 32 + 8 # TYPE + HMAC + NONCE
  105. def id_hash(self, data):
  106. """Return HMAC hash using the "id" HMAC key
  107. """
  108. return hmac_sha256(self.id_key, data)
  109. def encrypt(self, chunk):
  110. chunk = self.compress(chunk)
  111. self.enc_cipher.reset()
  112. data = b''.join((self.enc_cipher.iv[8:], self.enc_cipher.encrypt(chunk.data)))
  113. hmac = hmac_sha256(self.enc_hmac_key, data)
  114. return b''.join((self.TYPE_STR, hmac, data))
  115. def decrypt(self, id, data):
  116. if not (data[0] == self.TYPE or
  117. data[0] == PassphraseKey.TYPE and isinstance(self, RepoKey)):
  118. raise IntegrityError('Invalid encryption envelope')
  119. data_view = memoryview(data)
  120. hmac_given = data_view[1:33]
  121. hmac_computed = memoryview(hmac_sha256(self.enc_hmac_key, data_view[33:]))
  122. if not compare_digest(hmac_computed, hmac_given):
  123. raise IntegrityError('Encryption envelope checksum mismatch')
  124. self.dec_cipher.reset(iv=PREFIX + data[33:41])
  125. data = self.compressor.decompress(self.dec_cipher.decrypt(data_view[41:]))
  126. if id:
  127. hmac_given = id
  128. hmac_computed = hmac_sha256(self.id_key, data)
  129. if not compare_digest(hmac_computed, hmac_given):
  130. raise IntegrityError('Chunk id verification failed')
  131. return Chunk(data)
  132. def extract_nonce(self, payload):
  133. if not (payload[0] == self.TYPE or
  134. payload[0] == PassphraseKey.TYPE and isinstance(self, RepoKey)):
  135. raise IntegrityError('Invalid encryption envelope')
  136. nonce = bytes_to_long(payload[33:41])
  137. return nonce
  138. def init_from_random_data(self, data):
  139. self.enc_key = data[0:32]
  140. self.enc_hmac_key = data[32:64]
  141. self.id_key = data[64:96]
  142. self.chunk_seed = bytes_to_int(data[96:100])
  143. # Convert to signed int32
  144. if self.chunk_seed & 0x80000000:
  145. self.chunk_seed = self.chunk_seed - 0xffffffff - 1
  146. def init_ciphers(self, enc_iv=b''):
  147. self.enc_cipher = AES(is_encrypt=True, key=self.enc_key, iv=enc_iv)
  148. self.dec_cipher = AES(is_encrypt=False, key=self.enc_key)
  149. class Passphrase(str):
  150. @classmethod
  151. def env_passphrase(cls, default=None):
  152. passphrase = os.environ.get('BORG_PASSPHRASE', default)
  153. if passphrase is not None:
  154. return cls(passphrase)
  155. @classmethod
  156. def getpass(cls, prompt):
  157. return cls(getpass.getpass(prompt))
  158. @classmethod
  159. def verification(cls, passphrase):
  160. if yes('Do you want your passphrase to be displayed for verification? [yN]: ',
  161. env_var_override='BORG_DISPLAY_PASSPHRASE'):
  162. print('Your passphrase (between double-quotes): "%s"' % passphrase,
  163. file=sys.stderr)
  164. print('Make sure the passphrase displayed above is exactly what you wanted.',
  165. file=sys.stderr)
  166. try:
  167. passphrase.encode('ascii')
  168. except UnicodeEncodeError:
  169. print('Your passphrase (UTF-8 encoding in hex): %s' %
  170. bin_to_hex(passphrase.encode('utf-8')),
  171. file=sys.stderr)
  172. print('As you have a non-ASCII passphrase, it is recommended to keep the UTF-8 encoding in hex together with the passphrase at a safe place.',
  173. file=sys.stderr)
  174. @classmethod
  175. def new(cls, allow_empty=False):
  176. passphrase = cls.env_passphrase()
  177. if passphrase is not None:
  178. return passphrase
  179. for retry in range(1, 11):
  180. passphrase = cls.getpass('Enter new passphrase: ')
  181. if allow_empty or passphrase:
  182. passphrase2 = cls.getpass('Enter same passphrase again: ')
  183. if passphrase == passphrase2:
  184. cls.verification(passphrase)
  185. logger.info('Remember your passphrase. Your data will be inaccessible without it.')
  186. return passphrase
  187. else:
  188. print('Passphrases do not match', file=sys.stderr)
  189. else:
  190. print('Passphrase must not be blank', file=sys.stderr)
  191. else:
  192. raise PasswordRetriesExceeded
  193. def __repr__(self):
  194. return '<Passphrase "***hidden***">'
  195. def kdf(self, salt, iterations, length):
  196. return pbkdf2_hmac('sha256', self.encode('utf-8'), salt, iterations, length)
  197. class PassphraseKey(AESKeyBase):
  198. # This mode was killed in borg 1.0, see: https://github.com/borgbackup/borg/issues/97
  199. # Reasons:
  200. # - you can never ever change your passphrase for existing repos.
  201. # - you can never ever use a different iterations count for existing repos.
  202. # "Killed" means:
  203. # - there is no automatic dispatch to this class via type byte
  204. # - --encryption=passphrase is an invalid argument now
  205. # This class is kept for a while to support migration from passphrase to repokey mode.
  206. TYPE = 0x01
  207. iterations = 100000 # must not be changed ever!
  208. @classmethod
  209. def create(cls, repository, args):
  210. key = cls(repository)
  211. logger.warning('WARNING: "passphrase" mode is unsupported since borg 1.0.')
  212. passphrase = Passphrase.new(allow_empty=False)
  213. key.init(repository, passphrase)
  214. return key
  215. @classmethod
  216. def detect(cls, repository, manifest_data):
  217. prompt = 'Enter passphrase for %s: ' % repository._location.orig
  218. key = cls(repository)
  219. passphrase = Passphrase.env_passphrase()
  220. if passphrase is None:
  221. passphrase = Passphrase.getpass(prompt)
  222. for retry in range(1, 3):
  223. key.init(repository, passphrase)
  224. try:
  225. key.decrypt(None, manifest_data)
  226. num_blocks = num_aes_blocks(len(manifest_data) - 41)
  227. key.init_ciphers(PREFIX + long_to_bytes(key.extract_nonce(manifest_data) + num_blocks))
  228. return key
  229. except IntegrityError:
  230. passphrase = Passphrase.getpass(prompt)
  231. else:
  232. raise PasswordRetriesExceeded
  233. def change_passphrase(self):
  234. class ImmutablePassphraseError(Error):
  235. """The passphrase for this encryption key type can't be changed."""
  236. raise ImmutablePassphraseError
  237. def init(self, repository, passphrase):
  238. self.init_from_random_data(passphrase.kdf(repository.id, self.iterations, 100))
  239. self.init_ciphers()
  240. class KeyfileKeyBase(AESKeyBase):
  241. @classmethod
  242. def detect(cls, repository, manifest_data):
  243. key = cls(repository)
  244. target = key.find_key()
  245. prompt = 'Enter passphrase for key %s: ' % target
  246. passphrase = Passphrase.env_passphrase()
  247. if passphrase is None:
  248. passphrase = Passphrase()
  249. if not key.load(target, passphrase):
  250. for retry in range(0, 3):
  251. passphrase = Passphrase.getpass(prompt)
  252. if key.load(target, passphrase):
  253. break
  254. else:
  255. raise PasswordRetriesExceeded
  256. else:
  257. if not key.load(target, passphrase):
  258. raise PassphraseWrong
  259. num_blocks = num_aes_blocks(len(manifest_data) - 41)
  260. key.init_ciphers(PREFIX + long_to_bytes(key.extract_nonce(manifest_data) + num_blocks))
  261. return key
  262. def find_key(self):
  263. raise NotImplementedError
  264. def load(self, target, passphrase):
  265. raise NotImplementedError
  266. def _load(self, key_data, passphrase):
  267. cdata = a2b_base64(key_data)
  268. data = self.decrypt_key_file(cdata, passphrase)
  269. if data:
  270. key = msgpack.unpackb(data)
  271. if key[b'version'] != 1:
  272. raise IntegrityError('Invalid key file header')
  273. self.repository_id = key[b'repository_id']
  274. self.enc_key = key[b'enc_key']
  275. self.enc_hmac_key = key[b'enc_hmac_key']
  276. self.id_key = key[b'id_key']
  277. self.chunk_seed = key[b'chunk_seed']
  278. return True
  279. return False
  280. def decrypt_key_file(self, data, passphrase):
  281. d = msgpack.unpackb(data)
  282. assert d[b'version'] == 1
  283. assert d[b'algorithm'] == b'sha256'
  284. key = passphrase.kdf(d[b'salt'], d[b'iterations'], 32)
  285. data = AES(is_encrypt=False, key=key).decrypt(d[b'data'])
  286. if hmac_sha256(key, data) == d[b'hash']:
  287. return data
  288. def encrypt_key_file(self, data, passphrase):
  289. salt = os.urandom(32)
  290. iterations = PBKDF2_ITERATIONS
  291. key = passphrase.kdf(salt, iterations, 32)
  292. hash = hmac_sha256(key, data)
  293. cdata = AES(is_encrypt=True, key=key).encrypt(data)
  294. d = {
  295. 'version': 1,
  296. 'salt': salt,
  297. 'iterations': iterations,
  298. 'algorithm': 'sha256',
  299. 'hash': hash,
  300. 'data': cdata,
  301. }
  302. return msgpack.packb(d)
  303. def _save(self, passphrase):
  304. key = {
  305. 'version': 1,
  306. 'repository_id': self.repository_id,
  307. 'enc_key': self.enc_key,
  308. 'enc_hmac_key': self.enc_hmac_key,
  309. 'id_key': self.id_key,
  310. 'chunk_seed': self.chunk_seed,
  311. }
  312. data = self.encrypt_key_file(msgpack.packb(key), passphrase)
  313. key_data = '\n'.join(textwrap.wrap(b2a_base64(data).decode('ascii')))
  314. return key_data
  315. def change_passphrase(self):
  316. passphrase = Passphrase.new(allow_empty=True)
  317. self.save(self.target, passphrase)
  318. logger.info('Key updated')
  319. @classmethod
  320. def create(cls, repository, args):
  321. passphrase = Passphrase.new(allow_empty=True)
  322. key = cls(repository)
  323. key.repository_id = repository.id
  324. key.init_from_random_data(os.urandom(100))
  325. key.init_ciphers()
  326. target = key.get_new_target(args)
  327. key.save(target, passphrase)
  328. logger.info('Key in "%s" created.' % target)
  329. logger.info('Keep this key safe. Your data will be inaccessible without it.')
  330. return key
  331. def save(self, target, passphrase):
  332. raise NotImplementedError
  333. def get_new_target(self, args):
  334. raise NotImplementedError
  335. class KeyfileKey(KeyfileKeyBase):
  336. TYPE = 0x00
  337. FILE_ID = 'BORG_KEY'
  338. def sanity_check(self, filename, id):
  339. file_id = self.FILE_ID.encode() + b' '
  340. repo_id = hexlify(id)
  341. with open(filename, 'rb') as fd:
  342. # we do the magic / id check in binary mode to avoid stumbling over
  343. # decoding errors if somebody has binary files in the keys dir for some reason.
  344. if fd.read(len(file_id)) != file_id:
  345. raise KeyfileInvalidError(self.repository._location.canonical_path(), filename)
  346. if fd.read(len(repo_id)) != repo_id:
  347. raise KeyfileMismatchError(self.repository._location.canonical_path(), filename)
  348. return filename
  349. def find_key(self):
  350. id = self.repository.id
  351. keyfile = os.environ.get('BORG_KEY_FILE')
  352. if keyfile:
  353. return self.sanity_check(keyfile, id)
  354. keys_dir = get_keys_dir()
  355. for name in os.listdir(keys_dir):
  356. filename = os.path.join(keys_dir, name)
  357. try:
  358. return self.sanity_check(filename, id)
  359. except (KeyfileInvalidError, KeyfileMismatchError):
  360. pass
  361. raise KeyfileNotFoundError(self.repository._location.canonical_path(), get_keys_dir())
  362. def get_new_target(self, args):
  363. keyfile = os.environ.get('BORG_KEY_FILE')
  364. if keyfile:
  365. return keyfile
  366. filename = args.location.to_key_filename()
  367. path = filename
  368. i = 1
  369. while os.path.exists(path):
  370. i += 1
  371. path = filename + '.%d' % i
  372. return path
  373. def load(self, target, passphrase):
  374. with open(target, 'r') as fd:
  375. key_data = ''.join(fd.readlines()[1:])
  376. success = self._load(key_data, passphrase)
  377. if success:
  378. self.target = target
  379. return success
  380. def save(self, target, passphrase):
  381. key_data = self._save(passphrase)
  382. with open(target, 'w') as fd:
  383. fd.write('%s %s\n' % (self.FILE_ID, bin_to_hex(self.repository_id)))
  384. fd.write(key_data)
  385. fd.write('\n')
  386. self.target = target
  387. class RepoKey(KeyfileKeyBase):
  388. TYPE = 0x03
  389. def find_key(self):
  390. loc = self.repository._location.canonical_path()
  391. try:
  392. self.repository.load_key()
  393. return loc
  394. except configparser.NoOptionError:
  395. raise RepoKeyNotFoundError(loc) from None
  396. def get_new_target(self, args):
  397. return self.repository
  398. def load(self, target, passphrase):
  399. # what we get in target is just a repo location, but we already have the repo obj:
  400. target = self.repository
  401. key_data = target.load_key()
  402. key_data = key_data.decode('utf-8') # remote repo: msgpack issue #99, getting bytes
  403. success = self._load(key_data, passphrase)
  404. if success:
  405. self.target = target
  406. return success
  407. def save(self, target, passphrase):
  408. key_data = self._save(passphrase)
  409. key_data = key_data.encode('utf-8') # remote repo: msgpack issue #99, giving bytes
  410. target.save_key(key_data)
  411. self.target = target