Bug 903123: Add HawkAuthHeaderProvider for Android Background Services. r=rnewman

Hawk is an HTTP authentication scheme using a message authentication
code (MAC) algorithm to provide partial HTTP request cryptographic
verification.  Hawk is the successor to the HMAC authentication
scheme.  The Hawk scheme is descripted at
https://github.com/hueniverse/hawk

Hawk is under-specified; this implementation interoperates with the
git hash at
871cc59797
This commit is contained in:
Nick Alexander 2013-08-12 11:10:03 -07:00
parent 78a2559c81
commit 5a99f8d881
4 changed files with 357 additions and 0 deletions

View File

@ -128,6 +128,7 @@ SYNC_JAVA_FILES := \
sync/net/BrowserIDAuthHeaderProvider.java \
sync/net/ConnectionMonitorThread.java \
sync/net/HandleProgressException.java \
sync/net/HawkAuthHeaderProvider.java \
sync/net/HMACAuthHeaderProvider.java \
sync/net/HttpResponseObserver.java \
sync/net/Resource.java \

View File

@ -178,13 +178,21 @@ public class Utils {
// Truncates towards 0.
return (long)(decimal * 1000);
}
public static long decimalSecondsToMilliseconds(Long decimal) {
return decimal * 1000;
}
public static long decimalSecondsToMilliseconds(Integer decimal) {
return (long)(decimal * 1000);
}
public static byte[] sha256(byte[] in)
throws NoSuchAlgorithmException {
MessageDigest sha1 = MessageDigest.getInstance("SHA-256");
return sha1.digest(in);
}
protected static byte[] sha1(final String utf8)
throws NoSuchAlgorithmException, UnsupportedEncodingException {
MessageDigest sha1 = MessageDigest.getInstance("SHA-1");

View File

@ -0,0 +1,347 @@
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
package org.mozilla.gecko.sync.net;
import java.io.IOException;
import java.io.InputStream;
import java.io.UnsupportedEncodingException;
import java.net.URI;
import java.security.GeneralSecurityException;
import java.security.InvalidKeyException;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Locale;
import javax.crypto.Mac;
import javax.crypto.spec.SecretKeySpec;
import org.mozilla.apache.commons.codec.binary.Base64;
import org.mozilla.gecko.sync.Utils;
import ch.boye.httpclientandroidlib.Header;
import ch.boye.httpclientandroidlib.HttpEntity;
import ch.boye.httpclientandroidlib.HttpEntityEnclosingRequest;
import ch.boye.httpclientandroidlib.client.methods.HttpRequestBase;
import ch.boye.httpclientandroidlib.client.methods.HttpUriRequest;
import ch.boye.httpclientandroidlib.impl.client.DefaultHttpClient;
import ch.boye.httpclientandroidlib.message.BasicHeader;
import ch.boye.httpclientandroidlib.protocol.BasicHttpContext;
/**
* An <code>AuthHeaderProvider</code> that returns an Authorization header for
* Hawk: <a href="https://github.com/hueniverse/hawk">https://github.com/hueniverse/hawk</a>.
*
* Hawk is an HTTP authentication scheme using a message authentication code
* (MAC) algorithm to provide partial HTTP request cryptographic verification.
* Hawk is the successor to the HMAC authentication scheme.
*/
public class HawkAuthHeaderProvider implements AuthHeaderProvider {
public static final String LOG_TAG = HawkAuthHeaderProvider.class.getSimpleName();
public static final int HAWK_HEADER_VERSION = 1;
protected static final int NONCE_LENGTH_IN_BYTES = 8;
protected static final String HMAC_SHA256_ALGORITHM = "hmacSHA256";
protected final String id;
protected final byte[] key;
protected final boolean includePayloadHash;
/**
* Create a Hawk Authorization header provider.
* <p>
* Hawk specifies no mechanism by which a client receives an
* identifier-and-key pair from the server.
*
* @param id
* to name requests with.
* @param key
* to sign request with.
*
* @param includePayloadHash
* true if message integrity hash should be included in signed
* request header. See <a href="https://github.com/hueniverse/hawk#payload-validation">https://github.com/hueniverse/hawk#payload-validation</a>.
*/
public HawkAuthHeaderProvider(String id, byte[] key, boolean includePayloadHash) {
if (id == null) {
throw new IllegalArgumentException("id must not be null");
}
if (key == null) {
throw new IllegalArgumentException("key must not be null");
}
this.id = id;
this.key = key;
this.includePayloadHash = includePayloadHash;
}
@Override
public Header getAuthHeader(HttpRequestBase request, BasicHttpContext context, DefaultHttpClient client) throws GeneralSecurityException {
long timestamp = System.currentTimeMillis() / 1000;
String nonce = Base64.encodeBase64String(Utils.generateRandomBytes(NONCE_LENGTH_IN_BYTES));
String extra = "";
try {
return getAuthHeader(request, context, client, timestamp, nonce, extra, this.includePayloadHash);
} catch (Exception e) {
// We lie a little and make every exception a GeneralSecurityException.
throw new GeneralSecurityException(e);
}
}
/**
* Helper function that generates an HTTP Authorization: Hawk header given
* additional Hawk specific data.
*
* @throws NoSuchAlgorithmException
* @throws InvalidKeyException
* @throws IOException
*/
protected Header getAuthHeader(HttpRequestBase request, BasicHttpContext context, DefaultHttpClient client,
long timestamp, String nonce, String extra, boolean includePayloadHash)
throws InvalidKeyException, NoSuchAlgorithmException, IOException {
if (timestamp < 0) {
throw new IllegalArgumentException("timestamp must contain only [0-9].");
}
if (nonce == null) {
throw new IllegalArgumentException("nonce must not be null.");
}
if (nonce.length() == 0) {
throw new IllegalArgumentException("nonce must not be empty.");
}
String payloadHash = null;
if (includePayloadHash) {
if (!(request instanceof HttpEntityEnclosingRequest)) {
throw new IllegalArgumentException("cannot specify payload for request without an entity");
}
HttpEntity entity = ((HttpEntityEnclosingRequest) request).getEntity();
if (entity == null) {
throw new IllegalArgumentException("cannot specify payload for request with a null entity");
}
payloadHash = Base64.encodeBase64String(getPayloadHash(entity));
}
String app = null;
String dlg = null;
String requestString = getRequestString(request, "header", timestamp, nonce, payloadHash, extra, app, dlg);
String macString = getSignature(requestString.getBytes("UTF-8"), this.key);
StringBuilder sb = new StringBuilder();
sb.append("Hawk id=\"");
sb.append(this.id);
sb.append("\", ");
sb.append("ts=\"");
sb.append(timestamp);
sb.append("\", ");
sb.append("nonce=\"");
sb.append(nonce);
sb.append("\", ");
if (payloadHash != null) {
sb.append("hash=\"");
sb.append(payloadHash);
sb.append("\", ");
}
if (extra != null && extra.length() > 0) {
sb.append("ext=\"");
sb.append(escapeExtraHeaderAttribute(extra));
sb.append("\", ");
}
sb.append("mac=\"");
sb.append(macString);
sb.append("\"");
return new BasicHeader("Authorization", sb.toString());
}
/**
* Escape the user-provided extra string for the ext="" header attribute.
* <p>
* Hawk escapes the header ext="" attribute differently than it does the extra
* line in the normalized request string.
* <p>
* See <a href="https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/browser.js#L385">https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/browser.js#L385</a>.
*
* @param extra to escape.
* @return extra escaped for the ext="" header attribute.
*/
protected static String escapeExtraHeaderAttribute(String extra) {
return extra.replaceAll("\\\\", "\\\\").replaceAll("\"", "\\\"");
}
/**
* Escape the user-provided extra string for inserting into the normalized
* request string.
* <p>
* Hawk escapes the header ext="" attribute differently than it does the extra
* line in the normalized request string.
* <p>
* See <a href="https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/crypto.js#L67">https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/crypto.js#L67</a>.
*
* @param extra to escape.
* @return extra escaped for the normalized request string.
*/
protected static String escapeExtraString(String extra) {
return extra.replaceAll("\\\\", "\\\\").replaceAll("\n", "\\n");
}
/**
* Return the content type with no parameters (pieces following ;).
*
* @param contentTypeHeader to interrogate.
* @return base content type.
*/
protected static String getBaseContentType(Header contentTypeHeader) {
if (contentTypeHeader == null) {
throw new IllegalArgumentException("contentTypeHeader must not be null.");
}
String contentType = contentTypeHeader.getValue();
if (contentType == null) {
throw new IllegalArgumentException("contentTypeHeader value must not be null.");
}
int index = contentType.indexOf(";");
if (index < 0) {
return contentType.trim();
}
return contentType.substring(0, index).trim();
}
/**
* Generate the SHA-256 hash of a normalized Hawk payload generated from an
* HTTP entity.
* <p>
* <b>Warning:</b> the entity <b>must</b> be repeatable. If it is not, this
* code throws an <code>IllegalArgumentException</code>.
* <p>
* This is under-specified; the code here was reverse engineered from the code
* at
* <a href="https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/crypto.js#L81">https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/crypto.js#L81</a>.
* @param entity to normalize and hash.
* @return hash.
* @throws IllegalArgumentException if entity is not repeatable.
*/
protected static byte[] getPayloadHash(HttpEntity entity) throws UnsupportedEncodingException, IOException, NoSuchAlgorithmException {
if (!entity.isRepeatable()) {
throw new IllegalArgumentException("entity must be repeatable");
}
final MessageDigest digest = MessageDigest.getInstance("SHA-256");
digest.update(("hawk." + HAWK_HEADER_VERSION + ".payload\n").getBytes("UTF-8"));
digest.update(getBaseContentType(entity.getContentType()).getBytes("UTF-8"));
digest.update("\n".getBytes("UTF-8"));
InputStream stream = entity.getContent();
try {
int numRead;
byte[] buffer = new byte[4096];
while (-1 != (numRead = stream.read(buffer))) {
if (numRead > 0) {
digest.update(buffer, 0, numRead);
}
}
digest.update("\n".getBytes("UTF-8")); // Trailing newline is specified by Hawk.
return digest.digest();
} finally {
stream.close();
}
}
/**
* Generate a normalized Hawk request string. This is under-specified; the
* code here was reverse engineered from the code at
* <a href="https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/crypto.js#L55">https://github.com/hueniverse/hawk/blob/871cc597973110900467bd3dfb84a3c892f678fb/lib/crypto.js#L55</a>.
* <p>
* This method trusts its inputs to be valid.
*/
protected static String getRequestString(HttpUriRequest request, String type, long timestamp, String nonce, String hash, String extra, String app, String dlg) {
String method = request.getMethod().toUpperCase(Locale.US);
URI uri = request.getURI();
String host = uri.getHost();
String path = uri.getRawPath();
if (uri.getRawQuery() != null) {
path += "?";
path += uri.getRawQuery();
}
if (uri.getRawFragment() != null) {
path += "#";
path += uri.getRawFragment();
}
int port = uri.getPort();
String scheme = uri.getScheme();
if (port != -1) {
} else if ("http".equalsIgnoreCase(scheme)) {
port = 80;
} else if ("https".equalsIgnoreCase(scheme)) {
port = 443;
} else {
throw new IllegalArgumentException("Unsupported URI scheme: " + scheme + ".");
}
StringBuilder sb = new StringBuilder();
sb.append("hawk.");
sb.append(HAWK_HEADER_VERSION);
sb.append('.');
sb.append(type);
sb.append('\n');
sb.append(timestamp);
sb.append('\n');
sb.append(nonce);
sb.append('\n');
sb.append(method);
sb.append('\n');
sb.append(path);
sb.append('\n');
sb.append(host);
sb.append('\n');
sb.append(port);
sb.append('\n');
if (hash != null) {
sb.append(hash);
}
sb.append("\n");
if (extra != null && extra.length() > 0) {
sb.append(escapeExtraString(extra));
}
sb.append("\n");
if (app != null) {
sb.append(app);
sb.append("\n");
if (dlg != null) {
sb.append(dlg);
}
sb.append("\n");
}
return sb.toString();
}
protected static byte[] hmacSha256(byte[] message, byte[] key)
throws NoSuchAlgorithmException, InvalidKeyException {
SecretKeySpec keySpec = new SecretKeySpec(key, HMAC_SHA256_ALGORITHM);
Mac hasher = Mac.getInstance(HMAC_SHA256_ALGORITHM);
hasher.init(keySpec);
hasher.update(message);
return hasher.doFinal();
}
/**
* Sign a Hawk request string.
*
* @param requestString to sign.
* @param key as <code>String</code>.
* @return signature as base-64 encoded string.
* @throws InvalidKeyException
* @throws NoSuchAlgorithmException
* @throws UnsupportedEncodingException
*/
protected static String getSignature(byte[] requestString, byte[] key)
throws InvalidKeyException, NoSuchAlgorithmException, UnsupportedEncodingException {
return Base64.encodeBase64String(hmacSha256(requestString, key));
}
}

View File

@ -115,6 +115,7 @@ sync/net/BasicAuthHeaderProvider.java
sync/net/BrowserIDAuthHeaderProvider.java
sync/net/ConnectionMonitorThread.java
sync/net/HandleProgressException.java
sync/net/HawkAuthHeaderProvider.java
sync/net/HMACAuthHeaderProvider.java
sync/net/HttpResponseObserver.java
sync/net/Resource.java