mirror of
https://github.com/NixOS/nix
synced 2025-07-05 12:21:48 +02:00
Ensure error messages don't leak private key
Since #8766, invalid base64 is rendered in errors, but we don't actually want to show this in the case of an invalid private keys. Co-Authored-By: Eelco Dolstra <edolstra@gmail.com>
This commit is contained in:
parent
d0c351bf43
commit
2b6b03d8df
10 changed files with 68 additions and 22 deletions
|
@ -245,7 +245,12 @@ Hash::Hash(std::string_view rest, HashAlgorithm algo, bool isSRI)
|
|||
}
|
||||
|
||||
else if (isSRI || rest.size() == base64Len()) {
|
||||
auto d = base64Decode(rest);
|
||||
std::string d;
|
||||
try {
|
||||
d = base64Decode(rest);
|
||||
} catch (Error & e) {
|
||||
e.addTrace({}, "While decoding hash '%s'", rest);
|
||||
}
|
||||
if (d.size() != hashSize)
|
||||
throw BadHash("invalid %s hash '%s'", isSRI ? "SRI" : "base-64", rest);
|
||||
assert(hashSize);
|
||||
|
|
|
@ -14,17 +14,25 @@ BorrowedCryptoValue BorrowedCryptoValue::parse(std::string_view s)
|
|||
return {s.substr(0, colon), s.substr(colon + 1)};
|
||||
}
|
||||
|
||||
Key::Key(std::string_view s)
|
||||
Key::Key(std::string_view s, bool sensitiveValue)
|
||||
{
|
||||
auto ss = BorrowedCryptoValue::parse(s);
|
||||
|
||||
name = ss.name;
|
||||
key = ss.payload;
|
||||
|
||||
if (name == "" || key == "")
|
||||
throw Error("key is corrupt");
|
||||
try {
|
||||
if (name == "" || key == "")
|
||||
throw FormatError("key is corrupt");
|
||||
|
||||
key = base64Decode(key);
|
||||
key = base64Decode(key);
|
||||
} catch (Error & e) {
|
||||
std::string extra;
|
||||
if (!sensitiveValue)
|
||||
extra = fmt(" with raw value '%s'", key);
|
||||
e.addTrace({}, "while decoding key named '%s'%s", name, extra);
|
||||
throw;
|
||||
}
|
||||
}
|
||||
|
||||
std::string Key::to_string() const
|
||||
|
@ -33,7 +41,7 @@ std::string Key::to_string() const
|
|||
}
|
||||
|
||||
SecretKey::SecretKey(std::string_view s)
|
||||
: Key(s)
|
||||
: Key{s, true}
|
||||
{
|
||||
if (key.size() != crypto_sign_SECRETKEYBYTES)
|
||||
throw Error("secret key is not valid");
|
||||
|
@ -66,7 +74,7 @@ SecretKey SecretKey::generate(std::string_view name)
|
|||
}
|
||||
|
||||
PublicKey::PublicKey(std::string_view s)
|
||||
: Key(s)
|
||||
: Key{s, false}
|
||||
{
|
||||
if (key.size() != crypto_sign_PUBLICKEYBYTES)
|
||||
throw Error("public key is not valid");
|
||||
|
@ -83,7 +91,12 @@ bool PublicKey::verifyDetached(std::string_view data, std::string_view sig) cons
|
|||
|
||||
bool PublicKey::verifyDetachedAnon(std::string_view data, std::string_view sig) const
|
||||
{
|
||||
auto sig2 = base64Decode(sig);
|
||||
std::string sig2;
|
||||
try {
|
||||
sig2 = base64Decode(sig);
|
||||
} catch (Error & e) {
|
||||
e.addTrace({}, "while decoding signature '%s'", sig);
|
||||
}
|
||||
if (sig2.size() != crypto_sign_BYTES)
|
||||
throw Error("signature is not valid");
|
||||
|
||||
|
|
|
@ -31,15 +31,19 @@ struct Key
|
|||
std::string name;
|
||||
std::string key;
|
||||
|
||||
/**
|
||||
* Construct Key from a string in the format
|
||||
* ‘<name>:<key-in-base64>’.
|
||||
*/
|
||||
Key(std::string_view s);
|
||||
|
||||
std::string to_string() const;
|
||||
|
||||
protected:
|
||||
|
||||
/**
|
||||
* Construct Key from a string in the format
|
||||
* ‘<name>:<key-in-base64>’.
|
||||
*
|
||||
* @param sensitiveValue Avoid displaying the raw Base64 in error
|
||||
* messages to avoid leaking private keys.
|
||||
*/
|
||||
Key(std::string_view s, bool sensitiveValue);
|
||||
|
||||
Key(std::string_view name, std::string && key)
|
||||
: name(name), key(std::move(key)) { }
|
||||
};
|
||||
|
|
|
@ -244,7 +244,7 @@ std::string base64Decode(std::string_view s)
|
|||
|
||||
char digit = base64DecodeChars[(unsigned char) c];
|
||||
if (digit == npos)
|
||||
throw Error("invalid character in Base64 string: '%c'", c);
|
||||
throw FormatError("invalid character in Base64 string: '%c'", c);
|
||||
|
||||
bits += 6;
|
||||
d = d << 6 | digit;
|
||||
|
|
|
@ -172,9 +172,13 @@ constexpr char treeNull[] = " ";
|
|||
|
||||
|
||||
/**
|
||||
* Base64 encoding/decoding.
|
||||
* Encode arbitrary bytes as Base64.
|
||||
*/
|
||||
std::string base64Encode(std::string_view s);
|
||||
|
||||
/**
|
||||
* Decode arbitrary bytes to Base64.
|
||||
*/
|
||||
std::string base64Decode(std::string_view s);
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue