UNPKG

@libp2p/keychain

Version:

Key management and cryptographically protected messages

349 lines • 12.7 kB
/* eslint max-nested-callbacks: ["error", 5] */ import { pbkdf2, randomBytes } from '@libp2p/crypto'; import { privateKeyToProtobuf } from '@libp2p/crypto/keys'; import { InvalidParametersError, NotFoundError, serviceCapabilities } from '@libp2p/interface'; import { Key } from 'interface-datastore/key'; import { base58btc } from 'multiformats/bases/base58'; import { sha256 } from 'multiformats/hashes/sha2'; import sanitize from 'sanitize-filename'; import { fromString as uint8ArrayFromString } from 'uint8arrays/from-string'; import { toString as uint8ArrayToString } from 'uint8arrays/to-string'; import { DEK_INIT } from "./constants.js"; import { exportPrivateKey } from "./utils/export.js"; import { importPrivateKey } from "./utils/import.js"; const keyPrefix = '/pkcs8/'; const infoPrefix = '/info/'; const privates = new WeakMap(); // NIST SP 800-132 const NIST = { minKeyLength: 112 / 8, minSaltLength: 128 / 8, minIterationCount: 1000 }; function validateKeyName(name) { if (name == null) { return false; } if (typeof name !== 'string') { return false; } return name === sanitize(name.trim()) && name.length > 0; } /** * Throws an error after a delay * * This assumes than an error indicates that the keychain is under attack. Delay returning an * error to make brute force attacks harder. */ async function randomDelay() { const min = 200; const max = 1000; const delay = Math.random() * (max - min) + min; await new Promise(resolve => setTimeout(resolve, delay)); } /** * Converts a key name into a datastore name */ function DsName(name) { return new Key(keyPrefix + name); } /** * Converts a key name into a datastore info name */ function DsInfoName(name) { return new Key(infoPrefix + name); } export async function keyId(key) { const pb = privateKeyToProtobuf(key); const hash = await sha256.digest(pb); return base58btc.encode(hash.bytes).substring(1); } /** * Manages the life cycle of a key. Keys are encrypted at rest using PKCS #8. * * A key in the store has two entries * - '/info/*key-name*', contains the KeyInfo for the key * - '/pkcs8/*key-name*', contains the PKCS #8 for the key * */ export class Keychain { components; init; log; self; /** * Creates a new instance of a key chain */ constructor(components, init) { this.components = components; this.log = components.logger.forComponent('libp2p:keychain'); this.init = { ...init, dek: { ...DEK_INIT, ...init.dek } }; this.self = init.selfKey ?? 'self'; // Enforce NIST SP 800-132 if (this.init.pass != null && this.init.pass?.length < 20) { throw new Error('pass must be least 20 characters'); } if (this.init.dek?.keyLength != null && this.init.dek.keyLength < NIST.minKeyLength) { throw new Error(`dek.keyLength must be least ${NIST.minKeyLength} bytes`); } if (this.init.dek?.salt?.length != null && this.init.dek.salt.length < NIST.minSaltLength) { throw new Error(`dek.saltLength must be least ${NIST.minSaltLength} bytes`); } if (this.init.dek?.iterationCount != null && this.init.dek.iterationCount < NIST.minIterationCount) { throw new Error(`dek.iterationCount must be least ${NIST.minIterationCount}`); } const dek = this.init.pass != null && this.init.dek?.salt != null ? pbkdf2(this.init.pass, this.init.dek?.salt, this.init.dek?.iterationCount, this.init.dek?.keyLength, this.init.dek?.hash) : ''; privates.set(this, { dek }); } [Symbol.toStringTag] = '@libp2p/keychain'; [serviceCapabilities] = [ '@libp2p/keychain' ]; /** * Generates the options for a keychain. A random salt is produced. * * @returns {object} */ static generateOptions() { const options = Object.assign({}, this.options); const saltLength = Math.ceil(NIST.minSaltLength / 3) * 3; // no base64 padding if (options.dek != null) { options.dek.salt = uint8ArrayToString(randomBytes(saltLength), 'base64'); } return options; } /** * Gets an object that can encrypt/decrypt protected data. * The default options for a keychain. * * @returns {object} */ static get options() { return { dek: { ...DEK_INIT } }; } async findKeyByName(name) { if (!validateKeyName(name)) { await randomDelay(); throw new InvalidParametersError(`Invalid key name '${name}'`); } const datastoreName = DsInfoName(name); try { const res = await this.components.datastore.get(datastoreName); return JSON.parse(uint8ArrayToString(res)); } catch (err) { await randomDelay(); this.log.error('could not read key from datastore - %e', err); throw new NotFoundError(`Key '${name}' does not exist.`); } } async findKeyById(id) { try { const query = { prefix: infoPrefix }; for await (const value of this.components.datastore.query(query)) { const key = JSON.parse(uint8ArrayToString(value.value)); if (key.id === id) { return key; } } throw new InvalidParametersError(`Key with id '${id}' does not exist.`); } catch (err) { await randomDelay(); throw err; } } async importKey(name, key) { if (!validateKeyName(name)) { await randomDelay(); throw new InvalidParametersError(`Invalid key name '${name}'`); } if (key == null) { await randomDelay(); throw new InvalidParametersError('Key is required'); } const datastoreName = DsName(name); const exists = await this.components.datastore.has(datastoreName); if (exists) { await randomDelay(); throw new InvalidParametersError(`Key '${name}' already exists`); } let kid; let pem; try { kid = await keyId(key); const cached = privates.get(this); if (cached == null) { throw new InvalidParametersError('dek missing'); } const dek = cached.dek; pem = await exportPrivateKey(key, dek, key.type === 'RSA' ? 'pkcs-8' : 'libp2p-key'); } catch (err) { await randomDelay(); throw err; } const keyInfo = { name, id: kid }; const batch = this.components.datastore.batch(); batch.put(datastoreName, uint8ArrayFromString(pem)); batch.put(DsInfoName(name), uint8ArrayFromString(JSON.stringify(keyInfo))); await batch.commit(); return keyInfo; } async exportKey(name) { if (!validateKeyName(name)) { await randomDelay(); throw new InvalidParametersError(`Invalid key name '${name}'`); } const datastoreName = DsName(name); try { const res = await this.components.datastore.get(datastoreName); const pem = uint8ArrayToString(res); const cached = privates.get(this); if (cached == null) { throw new InvalidParametersError('dek missing'); } const dek = cached.dek; return await importPrivateKey(pem, dek); } catch (err) { await randomDelay(); throw err; } } async removeKey(name) { if (!validateKeyName(name) || name === this.self) { await randomDelay(); throw new InvalidParametersError(`Invalid key name '${name}'`); } const datastoreName = DsName(name); const keyInfo = await this.findKeyByName(name); const batch = this.components.datastore.batch(); batch.delete(datastoreName); batch.delete(DsInfoName(name)); await batch.commit(); return keyInfo; } /** * List all the keys. * * @returns {Promise<KeyInfo[]>} */ async listKeys() { const query = { prefix: infoPrefix }; const info = []; for await (const value of this.components.datastore.query(query)) { info.push(JSON.parse(uint8ArrayToString(value.value))); } return info; } /** * Rename a key * * @param {string} oldName - The old local key name; must already exist. * @param {string} newName - The new local key name; must not already exist. * @returns {Promise<KeyInfo>} */ async renameKey(oldName, newName) { if (!validateKeyName(oldName) || oldName === this.self) { await randomDelay(); throw new InvalidParametersError(`Invalid old key name '${oldName}'`); } if (!validateKeyName(newName) || newName === this.self) { await randomDelay(); throw new InvalidParametersError(`Invalid new key name '${newName}'`); } const oldDatastoreName = DsName(oldName); const newDatastoreName = DsName(newName); const oldInfoName = DsInfoName(oldName); const newInfoName = DsInfoName(newName); const exists = await this.components.datastore.has(newDatastoreName); if (exists) { await randomDelay(); throw new InvalidParametersError(`Key '${newName}' already exists`); } try { const pem = await this.components.datastore.get(oldDatastoreName); const res = await this.components.datastore.get(oldInfoName); const keyInfo = JSON.parse(uint8ArrayToString(res)); keyInfo.name = newName; const batch = this.components.datastore.batch(); batch.put(newDatastoreName, pem); batch.put(newInfoName, uint8ArrayFromString(JSON.stringify(keyInfo))); batch.delete(oldDatastoreName); batch.delete(oldInfoName); await batch.commit(); return keyInfo; } catch (err) { await randomDelay(); throw err; } } /** * Rotate keychain password and re-encrypt all associated keys */ async rotateKeychainPass(oldPass, newPass) { if (typeof oldPass !== 'string') { await randomDelay(); throw new InvalidParametersError(`Invalid old pass type '${typeof oldPass}'`); } if (typeof newPass !== 'string') { await randomDelay(); throw new InvalidParametersError(`Invalid new pass type '${typeof newPass}'`); } if (newPass.length < 20) { await randomDelay(); throw new InvalidParametersError(`Invalid pass length ${newPass.length}`); } this.log('recreating keychain'); const cached = privates.get(this); if (cached == null) { throw new InvalidParametersError('dek missing'); } const oldDek = cached.dek; this.init.pass = newPass; const newDek = newPass != null && this.init.dek?.salt != null ? pbkdf2(newPass, this.init.dek.salt, this.init.dek?.iterationCount, this.init.dek?.keyLength, this.init.dek?.hash) : ''; privates.set(this, { dek: newDek }); const keys = await this.listKeys(); for (const key of keys) { const res = await this.components.datastore.get(DsName(key.name)); const pem = uint8ArrayToString(res); const privateKey = await importPrivateKey(pem, oldDek); const password = newDek.toString(); const keyAsPEM = await exportPrivateKey(privateKey, password, privateKey.type === 'RSA' ? 'pkcs-8' : 'libp2p-key'); // Update stored key const batch = this.components.datastore.batch(); const keyInfo = { name: key.name, id: key.id }; batch.put(DsName(key.name), uint8ArrayFromString(keyAsPEM)); batch.put(DsInfoName(key.name), uint8ArrayFromString(JSON.stringify(keyInfo))); await batch.commit(); } this.log('keychain reconstructed'); } } //# sourceMappingURL=keychain.js.map