claws-mail/src/password.c
Andrej Kacian 54ce0e858a Use PBKDF2 to derive encryption key for passwords.
...instead of my previous hash-then-xor nonsense.
2016-05-24 18:30:44 +02:00

565 lines
14 KiB
C

/*
* Claws Mail -- a GTK+ based, lightweight, and fast e-mail client
* Copyright (C) 2016 The Claws Mail Team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#include "claws-features.h"
#endif
#ifdef PASSWORD_CRYPTO_GNUTLS
# include <gnutls/gnutls.h>
# include <gnutls/crypto.h>
#endif
#include <glib.h>
#include <glib/gi18n.h>
#if defined G_OS_UNIX
#include <fcntl.h>
#include <unistd.h>
#elif defined G_OS_WIN32
#include <windows.h>
#include <wincrypt.h>
#endif
#include "common/passcrypt.h"
#include "common/plugin.h"
#include "common/pkcs5_pbkdf2.h"
#include "common/timing.h"
#include "common/utils.h"
#include "account.h"
#include "alertpanel.h"
#include "inputdialog.h"
#include "password.h"
#include "passwordstore.h"
#include "prefs_common.h"
#ifndef PASSWORD_CRYPTO_OLD
static gchar *_master_passphrase = NULL;
/* Length of stored key derivation, before base64. */
#define KD_LENGTH 64
/* Length of randomly generated and saved salt, used for key derivation.
* Also before base64. */
#define KD_SALT_LENGTH 64
static void _generate_salt()
{
guchar salt[KD_SALT_LENGTH];
if (prefs_common_get_prefs()->master_passphrase_salt != NULL) {
g_free(prefs_common_get_prefs()->master_passphrase_salt);
}
if (!get_random_bytes(salt, KD_SALT_LENGTH)) {
debug_print("Could not get random bytes for kd salt.\n");
return;
}
prefs_common_get_prefs()->master_passphrase_salt =
g_base64_encode(salt, KD_SALT_LENGTH);
}
#undef KD_SALT_LENGTH
static guchar *_make_key_deriv(const gchar *passphrase, guint rounds,
guint length)
{
guchar *kd, *salt;
gchar *saltpref = prefs_common_get_prefs()->master_passphrase_salt;
gsize saltlen;
gint ret;
/* Grab our salt, generating and saving a new random one if needed. */
if (saltpref == NULL || strlen(saltpref) == 0) {
_generate_salt();
saltpref = prefs_common_get_prefs()->master_passphrase_salt;
}
salt = g_base64_decode(saltpref, &saltlen);
kd = g_malloc0(length);
START_TIMING("PBKDF2");
ret = pkcs5_pbkdf2(passphrase, strlen(passphrase), salt, saltlen,
kd, length, rounds);
END_TIMING();
g_free(salt);
if (ret == 0) {
return kd;
}
g_free(kd);
return NULL;
}
static const gchar *master_passphrase()
{
gchar *input;
gboolean end = FALSE;
if (!prefs_common_get_prefs()->use_master_passphrase) {
return PASSCRYPT_KEY;
}
if (_master_passphrase != NULL) {
debug_print("Master passphrase is in memory, offering it.\n");
return _master_passphrase;
}
while (!end) {
input = input_dialog_with_invisible(_("Input master passphrase"),
_("Input master passphrase"), NULL);
if (input == NULL) {
debug_print("Cancel pressed at master passphrase dialog.\n");
break;
}
if (master_passphrase_is_correct(input)) {
debug_print("Entered master passphrase seems to be correct, remembering it.\n");
_master_passphrase = input;
end = TRUE;
} else {
alertpanel_error(_("Incorrect master passphrase."));
}
}
return _master_passphrase;
}
const gboolean master_passphrase_is_set()
{
if (prefs_common_get_prefs()->master_passphrase == NULL
|| strlen(prefs_common_get_prefs()->master_passphrase) == 0)
return FALSE;
return TRUE;
}
const gboolean master_passphrase_is_correct(const gchar *input)
{
guchar *kd, *input_kd;
gchar **tokens;
gchar *stored_kd = prefs_common_get_prefs()->master_passphrase;
gsize kd_len;
guint rounds = 0;
gint ret;
g_return_val_if_fail(stored_kd != NULL && strlen(stored_kd) > 0, FALSE);
g_return_val_if_fail(input != NULL, FALSE);
if (stored_kd == NULL)
return FALSE;
tokens = g_strsplit_set(stored_kd, "{}", 3);
if (tokens[0] == NULL ||
strlen(tokens[0]) != 0 || /* nothing before { */
tokens[1] == NULL ||
strncmp(tokens[1], "PBKDF2-HMAC-SHA1,", 17) || /* correct tag */
strlen(tokens[1]) <= 17 || /* something after , */
(rounds = atoi(tokens[1] + 17)) <= 0 || /* valid rounds # */
tokens[2] == NULL ||
strlen(tokens[2]) == 0) { /* string continues after } */
debug_print("Mangled master_passphrase format in config, can not use it.\n");
g_strfreev(tokens);
return FALSE;
}
stored_kd = tokens[2];
kd = g_base64_decode(stored_kd, &kd_len); /* should be 64 */
g_strfreev(tokens);
if (kd_len != KD_LENGTH) {
debug_print("master_passphrase is %ld bytes long, should be %d.\n",
kd_len, KD_LENGTH);
g_free(kd);
return FALSE;
}
input_kd = _make_key_deriv(input, rounds, KD_LENGTH);
ret = memcmp(kd, input_kd, kd_len);
g_free(input_kd);
g_free(kd);
if (ret == 0)
return TRUE;
return FALSE;
}
gboolean master_passphrase_is_entered()
{
return (_master_passphrase == NULL) ? FALSE : TRUE;
}
void master_passphrase_forget()
{
/* If master passphrase is currently in memory (entered by user),
* get rid of it. User will have to enter the new one again. */
if (_master_passphrase != NULL) {
memset(_master_passphrase, 0, strlen(_master_passphrase));
g_free(_master_passphrase);
_master_passphrase = NULL;
}
}
void master_passphrase_change(const gchar *oldp, const gchar *newp)
{
guchar *kd;
gchar *base64_kd;
guint rounds = prefs_common_get_prefs()->master_passphrase_pbkdf2_rounds;
g_return_if_fail(rounds > 0);
if (oldp == NULL) {
/* If oldp is NULL, make sure the user has to enter the
* current master passphrase before being able to change it. */
master_passphrase_forget();
oldp = master_passphrase();
}
g_return_if_fail(oldp != NULL);
/* Update master passphrase hash in prefs */
if (prefs_common_get_prefs()->master_passphrase != NULL)
g_free(prefs_common_get_prefs()->master_passphrase);
if (newp != NULL) {
debug_print("Storing key derivation of new master passphrase\n");
kd = _make_key_deriv(newp, rounds, KD_LENGTH);
base64_kd = g_base64_encode(kd, 64);
prefs_common_get_prefs()->master_passphrase =
g_strdup_printf("{PBKDF2-HMAC-SHA1,%d}%s", rounds, base64_kd);
g_free(kd);
g_free(base64_kd);
} else {
debug_print("Setting master_passphrase to NULL\n");
prefs_common_get_prefs()->master_passphrase = NULL;
}
/* Now go over all accounts, reencrypting their passwords using
* the new master passphrase. */
if (oldp == NULL)
oldp = PASSCRYPT_KEY;
if (newp == NULL)
newp = PASSCRYPT_KEY;
debug_print("Reencrypting all account passwords...\n");
passwd_store_reencrypt_all(oldp, newp);
/* Now reencrypt all plugins passwords fields
* FIXME: Unloaded plugins won't be able to update their stored passwords
*/
plugins_master_passphrase_change(oldp, newp);
master_passphrase_forget();
}
#endif
gchar *password_encrypt_old(const gchar *password)
{
if (!password || strlen(password) == 0) {
return NULL;
}
gchar *encrypted = g_strdup(password);
gchar *encoded, *result;
gsize len = strlen(password);
passcrypt_encrypt(encrypted, len);
encoded = g_base64_encode(encrypted, len);
g_free(encrypted);
result = g_strconcat("!", encoded, NULL);
g_free(encoded);
return result;
}
gchar *password_decrypt_old(const gchar *password)
{
if (!password || strlen(password) == 0) {
return NULL;
}
if (*password != '!' || strlen(password) < 2) {
return NULL;
}
gsize len;
gchar *decrypted = g_base64_decode(password + 1, &len);
passcrypt_decrypt(decrypted, len);
return decrypted;
}
#ifdef PASSWORD_CRYPTO_GNUTLS
#define BUFSIZE 128
/* Since we can't count on having GnuTLS new enough to have
* gnutls_cipher_get_iv_size(), we hardcode the IV length for now. */
#define IVLEN 16
gchar *password_encrypt_gnutls(const gchar *password,
const gchar *encryption_passphrase)
{
/* Another, slightly inferior combination is AES-128-CBC + SHA-256.
* Any block cipher in CBC mode with keysize N and a hash algo with
* digest length 2*N would do. */
gnutls_cipher_algorithm_t algo = GNUTLS_CIPHER_AES_256_CBC;
gnutls_cipher_hd_t handle;
gnutls_datum_t key, iv;
int keylen, blocklen, ret;
unsigned char *buf, *encbuf, *base, *output;
guint rounds = prefs_common_get_prefs()->master_passphrase_pbkdf2_rounds;
g_return_val_if_fail(password != NULL, NULL);
g_return_val_if_fail(encryption_passphrase != NULL, NULL);
/* ivlen = gnutls_cipher_get_iv_size(algo);*/
keylen = gnutls_cipher_get_key_size(algo);
blocklen = gnutls_cipher_get_block_size(algo);
/* digestlen = gnutls_hash_get_len(digest); */
/* Take the passphrase and compute a key derivation of suitable
* length to be used as encryption key for our block cipher. */
key.data = _make_key_deriv(encryption_passphrase, rounds, keylen);
key.size = keylen;
/* Prepare random IV for cipher */
iv.data = malloc(IVLEN);
iv.size = IVLEN;
if (!get_random_bytes(iv.data, IVLEN)) {
g_free(key.data);
g_free(iv.data);
return NULL;
}
/* Initialize the encryption */
ret = gnutls_cipher_init(&handle, algo, &key, &iv);
if (ret < 0) {
g_free(key.data);
g_free(iv.data);
return NULL;
}
/* Fill buf with one block of random data, our password, pad the
* rest with zero bytes. */
buf = malloc(BUFSIZE + blocklen);
memset(buf, 0, BUFSIZE);
if (!get_random_bytes(buf, blocklen)) {
g_free(buf);
g_free(key.data);
g_free(iv.data);
gnutls_cipher_deinit(handle);
return NULL;
}
memcpy(buf + blocklen, password, strlen(password));
/* Encrypt into encbuf */
encbuf = malloc(BUFSIZE + blocklen);
memset(encbuf, 0, BUFSIZE + blocklen);
ret = gnutls_cipher_encrypt2(handle, buf, BUFSIZE + blocklen,
encbuf, BUFSIZE + blocklen);
if (ret < 0) {
g_free(key.data);
g_free(iv.data);
g_free(buf);
g_free(encbuf);
gnutls_cipher_deinit(handle);
return NULL;
}
/* Cleanup */
gnutls_cipher_deinit(handle);
g_free(key.data);
g_free(iv.data);
g_free(buf);
/* And finally prepare the resulting string:
* "{algorithm,rounds}base64encodedciphertext" */
base = g_base64_encode(encbuf, BUFSIZE);
g_free(encbuf);
output = g_strdup_printf("{%s,%d}%s",
gnutls_cipher_get_name(algo), rounds, base);
g_free(base);
return output;
}
gchar *password_decrypt_gnutls(const gchar *password,
const gchar *decryption_passphrase)
{
gchar **tokens, *tmp;
gnutls_cipher_algorithm_t algo;
gnutls_cipher_hd_t handle;
gnutls_datum_t key, iv;
int keylen, blocklen, ret;
gsize len;
unsigned char *buf;
guint rounds;
size_t commapos;
g_return_val_if_fail(password != NULL, NULL);
g_return_val_if_fail(decryption_passphrase != NULL, NULL);
tokens = g_strsplit_set(password, "{}", 3);
/* Parse the string, retrieving algorithm and encrypted data.
* We expect "{algorithm,rounds}base64encodedciphertext". */
if (tokens[0] == NULL || strlen(tokens[0]) != 0 ||
tokens[1] == NULL || strlen(tokens[1]) == 0 ||
tokens[2] == NULL || strlen(tokens[2]) == 0) {
debug_print("Garbled password string.\n");
g_strfreev(tokens);
return NULL;
}
commapos = strcspn(tokens[1], ",");
if (commapos == strlen(tokens[1]) || commapos == 0) {
debug_print("Garbled algorithm substring.\n");
g_strfreev(tokens);
return NULL;
}
buf = g_strndup(tokens[1], commapos);
if ((algo = gnutls_cipher_get_id(buf)) == GNUTLS_CIPHER_UNKNOWN) {
debug_print("Password string has unknown algorithm: '%s'\n", buf);
g_free(buf);
g_strfreev(tokens);
return NULL;
}
g_free(buf);
if ((rounds = atoi(tokens[1] + commapos + 1)) <= 0) {
debug_print("Invalid number of rounds: %d\n", rounds);
g_strfreev(tokens);
return NULL;
}
/* ivlen = gnutls_cipher_get_iv_size(algo); */
keylen = gnutls_cipher_get_key_size(algo);
blocklen = gnutls_cipher_get_block_size(algo);
/* digestlen = gnutls_hash_get_len(digest); */
/* Take the passphrase and compute a key derivation of suitable
* length to be used as encryption key for our block cipher. */
key.data = _make_key_deriv(decryption_passphrase, rounds, keylen);
key.size = keylen;
/* Prepare random IV for cipher */
iv.data = malloc(IVLEN);
iv.size = IVLEN;
if (!get_random_bytes(iv.data, IVLEN)) {
g_free(key.data);
g_free(iv.data);
g_strfreev(tokens);
return NULL;
}
/* Prepare encrypted password string for decryption. */
tmp = g_base64_decode(tokens[2], &len);
g_strfreev(tokens);
/* Initialize the decryption */
ret = gnutls_cipher_init(&handle, algo, &key, &iv);
if (ret < 0) {
debug_print("Cipher init failed: %s\n", gnutls_strerror(ret));
g_free(key.data);
g_free(iv.data);
return NULL;
}
buf = malloc(BUFSIZE + blocklen);
memset(buf, 0, BUFSIZE + blocklen);
ret = gnutls_cipher_decrypt2(handle, tmp, len,
buf, BUFSIZE + blocklen);
if (ret < 0) {
debug_print("Decryption failed: %s\n", gnutls_strerror(ret));
g_free(key.data);
g_free(iv.data);
g_free(buf);
gnutls_cipher_deinit(handle);
return NULL;
}
/* Cleanup */
gnutls_cipher_deinit(handle);
g_free(key.data);
g_free(iv.data);
tmp = g_strndup(buf + blocklen, MIN(strlen(buf + blocklen), BUFSIZE));
g_free(buf);
return tmp;
}
#undef BUFSIZE
#endif
gchar *password_encrypt(const gchar *password,
const gchar *encryption_passphrase)
{
if (password == NULL || strlen(password) == 0) {
return NULL;
}
#ifndef PASSWORD_CRYPTO_OLD
if (encryption_passphrase == NULL)
encryption_passphrase = master_passphrase();
return password_encrypt_real(password, encryption_passphrase);
#else
return password_encrypt_old(password);
#endif
}
gchar *password_decrypt(const gchar *password,
const gchar *decryption_passphrase)
{
if (password == NULL || strlen(password) == 0) {
return NULL;
}
/* First, check if the password was possibly decrypted using old,
* obsolete method */
if (*password == '!') {
debug_print("Trying to decrypt password using the old method...\n");
return password_decrypt_old(password);
}
/* Try available crypto backend */
#ifndef PASSWORD_CRYPTO_OLD
if (decryption_passphrase == NULL)
decryption_passphrase = master_passphrase();
if (*password == '{') {
debug_print("Trying to decrypt password...\n");
return password_decrypt_real(password, decryption_passphrase);
}
#endif
/* Fallback, in case the configuration is really old and
* stored password in plaintext */
debug_print("Assuming password was stored plaintext, returning it unchanged\n");
return g_strdup(password);
}