2017-12-02 14:32:45 +00:00
|
|
|
<?php
|
|
|
|
/**
|
2021-03-29 06:40:20 +00:00
|
|
|
* @copyright Copyright (C) 2010-2021, the Friendica project
|
2020-02-09 15:18:46 +00:00
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
2017-12-02 14:32:45 +00:00
|
|
|
*/
|
2020-02-09 15:18:46 +00:00
|
|
|
|
2017-12-02 14:32:45 +00:00
|
|
|
namespace Friendica\Protocol;
|
|
|
|
|
2018-10-29 21:20:46 +00:00
|
|
|
use Friendica\Core\Logger;
|
2020-07-27 11:50:36 +00:00
|
|
|
use Friendica\DI;
|
2017-12-02 14:32:45 +00:00
|
|
|
use Friendica\Network\Probe;
|
2017-12-30 16:51:49 +00:00
|
|
|
use Friendica\Util\Crypto;
|
2018-11-08 15:37:08 +00:00
|
|
|
use Friendica\Util\Strings;
|
2017-12-02 14:32:45 +00:00
|
|
|
use Friendica\Util\XML;
|
|
|
|
|
|
|
|
/**
|
2020-01-19 06:05:23 +00:00
|
|
|
* Salmon Protocol class
|
|
|
|
*
|
2017-12-02 14:32:45 +00:00
|
|
|
* The Salmon Protocol is a message exchange protocol running over HTTP designed to decentralize commentary
|
|
|
|
* and annotations made against newsfeed articles such as blog posts.
|
|
|
|
*/
|
|
|
|
class Salmon
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* @param string $uri Uniform Resource Identifier
|
|
|
|
* @param string $keyhash encoded key
|
|
|
|
* @return mixed
|
2019-01-06 21:06:53 +00:00
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
2017-12-02 14:32:45 +00:00
|
|
|
*/
|
|
|
|
public static function getKey($uri, $keyhash)
|
|
|
|
{
|
2018-01-15 13:05:12 +00:00
|
|
|
$ret = [];
|
2017-12-02 14:32:45 +00:00
|
|
|
|
2018-10-29 21:20:46 +00:00
|
|
|
Logger::log('Fetching salmon key for '.$uri);
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
$arr = Probe::lrdd($uri);
|
|
|
|
|
|
|
|
if (is_array($arr)) {
|
|
|
|
foreach ($arr as $a) {
|
|
|
|
if ($a['@attributes']['rel'] === 'magic-public-key') {
|
|
|
|
$ret[] = $a['@attributes']['href'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
// We have found at least one key URL
|
|
|
|
// If it's inline, parse it - otherwise get the key
|
|
|
|
|
|
|
|
if (count($ret) > 0) {
|
|
|
|
for ($x = 0; $x < count($ret); $x ++) {
|
|
|
|
if (substr($ret[$x], 0, 5) === 'data:') {
|
|
|
|
if (strstr($ret[$x], ',')) {
|
|
|
|
$ret[$x] = substr($ret[$x], strpos($ret[$x], ',') + 1);
|
|
|
|
} else {
|
|
|
|
$ret[$x] = substr($ret[$x], 5);
|
|
|
|
}
|
2018-11-08 16:28:29 +00:00
|
|
|
} elseif (Strings::normaliseLink($ret[$x]) == 'http://') {
|
2020-07-27 11:50:36 +00:00
|
|
|
$ret[$x] = DI::httpRequest()->fetch($ret[$x]);
|
2017-12-02 14:32:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-06-29 20:22:00 +00:00
|
|
|
Logger::notice('Key located', ['ret' => $ret]);
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
if (count($ret) == 1) {
|
|
|
|
// We only found one one key so we don't care if the hash matches.
|
|
|
|
// If it's the wrong key we'll find out soon enough because
|
|
|
|
// message verification will fail. This also covers some older
|
|
|
|
// software which don't supply a keyhash. As long as they only
|
|
|
|
// have one key we'll be right.
|
|
|
|
|
|
|
|
return $ret[0];
|
|
|
|
} else {
|
|
|
|
foreach ($ret as $a) {
|
2018-11-08 15:37:08 +00:00
|
|
|
$hash = Strings::base64UrlEncode(hash('sha256', $a));
|
2017-12-02 14:32:45 +00:00
|
|
|
if ($hash == $keyhash) {
|
|
|
|
return $a;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param array $owner owner
|
|
|
|
* @param string $url url
|
|
|
|
* @param string $slap slap
|
|
|
|
* @return integer
|
2019-01-06 21:06:53 +00:00
|
|
|
* @throws \Friendica\Network\HTTPException\InternalServerErrorException
|
2017-12-02 14:32:45 +00:00
|
|
|
*/
|
|
|
|
public static function slapper($owner, $url, $slap)
|
|
|
|
{
|
|
|
|
// does contact have a salmon endpoint?
|
|
|
|
|
2020-04-25 07:29:02 +00:00
|
|
|
if (!strlen($url)) {
|
2017-12-02 14:32:45 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-04-25 07:29:02 +00:00
|
|
|
if (!$owner['sprvkey']) {
|
2018-10-29 21:20:46 +00:00
|
|
|
Logger::log(sprintf("user '%s' (%d) does not have a salmon private key. Send failed.",
|
2020-04-25 07:29:02 +00:00
|
|
|
$owner['name'], $owner['uid']));
|
2017-12-02 14:32:45 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-10-29 21:20:46 +00:00
|
|
|
Logger::log('slapper called for '.$url.'. Data: ' . $slap);
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// create a magic envelope
|
|
|
|
|
2018-11-08 15:37:08 +00:00
|
|
|
$data = Strings::base64UrlEncode($slap);
|
2017-12-02 14:32:45 +00:00
|
|
|
$data_type = 'application/atom+xml';
|
|
|
|
$encoding = 'base64url';
|
|
|
|
$algorithm = 'RSA-SHA256';
|
2018-11-08 15:37:08 +00:00
|
|
|
$keyhash = Strings::base64UrlEncode(hash('sha256', self::salmonKey($owner['spubkey'])), true);
|
2017-12-02 14:32:45 +00:00
|
|
|
|
2018-11-08 15:37:08 +00:00
|
|
|
$precomputed = '.' . Strings::base64UrlEncode($data_type) . '.' . Strings::base64UrlEncode($encoding) . '.' . Strings::base64UrlEncode($algorithm);
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// GNU Social format
|
2018-11-08 15:37:08 +00:00
|
|
|
$signature = Strings::base64UrlEncode(Crypto::rsaSign($data . $precomputed, $owner['sprvkey']));
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// Compliant format
|
2018-11-08 15:37:08 +00:00
|
|
|
$signature2 = Strings::base64UrlEncode(Crypto::rsaSign(str_replace('=', '', $data . $precomputed), $owner['sprvkey']));
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// Old Status.net format
|
2018-11-08 15:37:08 +00:00
|
|
|
$signature3 = Strings::base64UrlEncode(Crypto::rsaSign($data, $owner['sprvkey']));
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// At first try the non compliant method that works for GNU Social
|
2018-01-15 13:05:12 +00:00
|
|
|
$xmldata = ["me:env" => ["me:data" => $data,
|
|
|
|
"@attributes" => ["type" => $data_type],
|
2017-12-02 14:32:45 +00:00
|
|
|
"me:encoding" => $encoding,
|
|
|
|
"me:alg" => $algorithm,
|
|
|
|
"me:sig" => $signature,
|
2018-01-15 13:05:12 +00:00
|
|
|
"@attributes2" => ["key_id" => $keyhash]]];
|
2017-12-02 14:32:45 +00:00
|
|
|
|
2018-01-15 13:05:12 +00:00
|
|
|
$namespaces = ["me" => "http://salmon-protocol.org/ns/magic-env"];
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
$salmon = XML::fromArray($xmldata, $xml, false, $namespaces);
|
|
|
|
|
|
|
|
// slap them
|
2020-03-04 21:18:28 +00:00
|
|
|
$postResult = DI::httpRequest()->post($url, $salmon, [
|
2017-12-02 14:32:45 +00:00
|
|
|
'Content-type: application/magic-envelope+xml',
|
|
|
|
'Content-length: ' . strlen($salmon)
|
2018-01-15 13:05:12 +00:00
|
|
|
]);
|
2017-12-02 14:32:45 +00:00
|
|
|
|
2018-10-10 19:15:26 +00:00
|
|
|
$return_code = $postResult->getReturnCode();
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// check for success, e.g. 2xx
|
|
|
|
|
|
|
|
if ($return_code > 299) {
|
2018-10-29 21:20:46 +00:00
|
|
|
Logger::log('GNU Social salmon failed. Falling back to compliant mode');
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// Now try the compliant mode that normally isn't used for GNU Social
|
2018-01-15 13:05:12 +00:00
|
|
|
$xmldata = ["me:env" => ["me:data" => $data,
|
|
|
|
"@attributes" => ["type" => $data_type],
|
2017-12-02 14:32:45 +00:00
|
|
|
"me:encoding" => $encoding,
|
|
|
|
"me:alg" => $algorithm,
|
|
|
|
"me:sig" => $signature2,
|
2018-01-15 13:05:12 +00:00
|
|
|
"@attributes2" => ["key_id" => $keyhash]]];
|
2017-12-02 14:32:45 +00:00
|
|
|
|
2018-01-15 13:05:12 +00:00
|
|
|
$namespaces = ["me" => "http://salmon-protocol.org/ns/magic-env"];
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
$salmon = XML::fromArray($xmldata, $xml, false, $namespaces);
|
|
|
|
|
|
|
|
// slap them
|
2020-03-04 21:18:28 +00:00
|
|
|
$postResult = DI::httpRequest()->post($url, $salmon, [
|
2017-12-02 14:32:45 +00:00
|
|
|
'Content-type: application/magic-envelope+xml',
|
|
|
|
'Content-length: ' . strlen($salmon)
|
2018-01-15 13:05:12 +00:00
|
|
|
]);
|
2018-10-10 19:15:26 +00:00
|
|
|
$return_code = $postResult->getReturnCode();
|
2017-12-02 14:32:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ($return_code > 299) {
|
2018-10-29 21:20:46 +00:00
|
|
|
Logger::log('compliant salmon failed. Falling back to old status.net');
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
// Last try. This will most likely fail as well.
|
2018-01-15 13:05:12 +00:00
|
|
|
$xmldata = ["me:env" => ["me:data" => $data,
|
|
|
|
"@attributes" => ["type" => $data_type],
|
2017-12-02 14:32:45 +00:00
|
|
|
"me:encoding" => $encoding,
|
|
|
|
"me:alg" => $algorithm,
|
|
|
|
"me:sig" => $signature3,
|
2018-01-15 13:05:12 +00:00
|
|
|
"@attributes2" => ["key_id" => $keyhash]]];
|
2017-12-02 14:32:45 +00:00
|
|
|
|
2018-01-15 13:05:12 +00:00
|
|
|
$namespaces = ["me" => "http://salmon-protocol.org/ns/magic-env"];
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
$salmon = XML::fromArray($xmldata, $xml, false, $namespaces);
|
|
|
|
|
|
|
|
// slap them
|
2020-03-04 21:18:28 +00:00
|
|
|
$postResult = DI::httpRequest()->post($url, $salmon, [
|
2017-12-02 14:32:45 +00:00
|
|
|
'Content-type: application/magic-envelope+xml',
|
2018-01-27 04:24:23 +00:00
|
|
|
'Content-length: ' . strlen($salmon)]);
|
2018-10-10 19:15:26 +00:00
|
|
|
$return_code = $postResult->getReturnCode();
|
2017-12-02 14:32:45 +00:00
|
|
|
}
|
|
|
|
|
2018-10-29 21:20:46 +00:00
|
|
|
Logger::log('slapper for '.$url.' returned ' . $return_code);
|
2017-12-02 14:32:45 +00:00
|
|
|
|
|
|
|
if (! $return_code) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-10-11 21:26:03 +00:00
|
|
|
if (($return_code == 503) && (stristr($postResult->getHeader(), 'retry-after'))) {
|
2017-12-02 14:32:45 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (($return_code >= 200) && ($return_code < 300)) ? 0 : 1;
|
|
|
|
}
|
2017-12-31 13:04:36 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $pubkey public key
|
|
|
|
* @return string
|
2019-01-06 21:06:53 +00:00
|
|
|
* @throws \Exception
|
2017-12-31 13:04:36 +00:00
|
|
|
*/
|
|
|
|
public static function salmonKey($pubkey)
|
|
|
|
{
|
2020-09-12 09:57:37 +00:00
|
|
|
Crypto::pemToMe($pubkey, $modulus, $exponent);
|
|
|
|
return 'RSA' . '.' . Strings::base64UrlEncode($modulus, true) . '.' . Strings::base64UrlEncode($exponent, true);
|
2017-12-31 13:04:36 +00:00
|
|
|
}
|
2017-12-02 14:32:45 +00:00
|
|
|
}
|