Source code for poezio.plugin_e2ee

#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# vim:fenc=utf-8 et ts=4 sts=4 sw=4
#
# Copyright © 2019 Maxime “pep” Buquet <pep@bouah.net>
#
# Distributed under terms of the GPL-3.0+ license. See COPYING file.

"""
    Interface for E2EE (End-to-end Encryption) plugins.
"""

from typing import (
    Callable,
    Dict,
    List,
    Optional,
    Union,
    Tuple,
    Set,
    Type,
)

from slixmpp import InvalidJID, JID, Message
from slixmpp.xmlstream import StanzaBase
from slixmpp.xmlstream.handler import CoroutineCallback
from slixmpp.xmlstream.matcher import MatchXPath
from poezio.tabs import (
    ChatTab,
    ConversationTab,
    DynamicConversationTab,
    MucTab,
    PrivateTab,
    RosterInfoTab,
    StaticConversationTab,
)
from poezio.plugin import BasePlugin
from poezio.theming import Theme, get_theme, dump_tuple
from poezio.config import config
from poezio.decorators import command_args_parser

import asyncio
from asyncio import iscoroutinefunction

import logging
log = logging.getLogger(__name__)


ChatTabs = Union[
    MucTab,
    DynamicConversationTab,
    StaticConversationTab,
    PrivateTab,
]

EME_NS = 'urn:xmpp:eme:0'
EME_TAG = 'encryption'

JCLIENT_NS = 'jabber:client'
HINTS_NS = 'urn:xmpp:hints'

class NothingToEncrypt(Exception):
    """
    Exception to raise inside the _encrypt filter on stanzas that do not need
    to be processed.
    """


[docs]class E2EEPlugin(BasePlugin): """Interface for E2EE plugins. This is a wrapper built on top of BasePlugin. It provides a base for End-to-end Encryption mechanisms in poezio. Plugin developers are excepted to implement the `decrypt` and `encrypt` function, provide an encryption name (and/or short name), and an eme namespace. Once loaded, the plugin will attempt to decrypt any message that contains an EME message that matches the one set. The plugin will also register a command (using the short name) to enable encryption per tab. It is only possible to have one encryption mechanism per tab, even if multiple e2ee plugins are loaded. The encryption status will be displayed in the status bar, using the plugin short name, alongside the JID, nickname etc. """ #: Specifies that the encryption mechanism does more than encrypting #: `<body/>`. stanza_encryption = False #: Whitelist applied to messages when `stanza_encryption` is `False`. tag_whitelist = [ (JCLIENT_NS, 'body'), (EME_NS, EME_TAG), (HINTS_NS, 'store'), (HINTS_NS, 'no-copy'), (HINTS_NS, 'no-store'), (HINTS_NS, 'no-permanent-store'), # TODO: Add other encryption mechanisms tags here ] #: Replaces body with `eme <https://xmpp.org/extensions/xep-0380.html>`_ #: if set. Should be suitable for most plugins except those using #: `<body/>` directly as their encryption container, like OTR, or the #: example base64 plugin in poezio. replace_body_with_eme = True #: Encryption name, used in command descriptions, and logs. At least one #: of `encryption_name` and `encryption_short_name` must be set. encryption_name: Optional[str] = None #: Encryption short name, used as command name, and also to display #: encryption status in a tab. At least one of `encryption_name` and #: `encryption_short_name` must be set. encryption_short_name: Optional[str] = None #: Required. https://xmpp.org/extensions/xep-0380.html. eme_ns: Optional[str] = None #: Used to figure out what messages to attempt decryption for. Also used #: in combination with `tag_whitelist` to avoid removing encrypted tags #: before sending. If multiple tags are present, a handler will be #: registered for each invididual tag/ns pair under <message/>, as opposed #: to a single handler for all tags combined. encrypted_tags: Optional[List[Tuple[str, str]]] = None # Static map, to be able to limit to one encryption mechanism per tab at a # time _enabled_tabs: Dict[JID, Callable] = {} # Tabs that support this encryption mechanism supported_tab_types: Tuple[Type[ChatTab], ...] = tuple() # States for each remote entity trust_states: Dict[str, Set[str]] = {'accepted': set(), 'rejected': set()} def init(self): self._all_trust_states = self.trust_states['accepted'].union( self.trust_states['rejected'] ) if self.encryption_name is None and self.encryption_short_name is None: raise NotImplementedError if self.eme_ns is None: raise NotImplementedError if self.encryption_name is None: self.encryption_name = self.encryption_short_name if self.encryption_short_name is None: self.encryption_short_name = self.encryption_name if not self.supported_tab_types: raise NotImplementedError # Ensure decryption is done before everything, so that other handlers # don't have to know about the encryption mechanism. self.api.add_event_handler('muc_msg', self._decrypt_wrapper, priority=0) self.api.add_event_handler('conversation_msg', self._decrypt_wrapper, priority=0) self.api.add_event_handler('private_msg', self._decrypt_wrapper, priority=0) # Register a handler for each invididual tag/ns pair in encrypted_tags # as well. as _msg handlers only include messages with a <body/>. if self.encrypted_tags is not None: default_ns = self.core.xmpp.default_ns for i, (namespace, tag) in enumerate(self.encrypted_tags): self.core.xmpp.register_handler(CoroutineCallback(f'EncryptedTag{i}', MatchXPath(f'{{{default_ns}}}message/{{{namespace}}}{tag}'), self._decrypt_encryptedtag, )) # Ensure encryption is done after everything, so that whatever can be # encrypted is encrypted, and no plain element slips in. # Using a stream filter might be a bit too much, but at least we're # sure poezio is not sneaking anything past us. self.core.xmpp.add_filter('out', self._encrypt_wrapper) for tab_t in self.supported_tab_types: self.api.add_tab_command( tab_t, self.encryption_short_name, self._toggle_tab, usage='', short='Toggle {} encryption for tab.'.format(self.encryption_name), help='Toggle automatic {} encryption for tab.'.format(self.encryption_name), ) trust_msg = 'Set {name} state to {state} for this fingerprint on this JID.' for state in self._all_trust_states: for tab_t in self.supported_tab_types: self.api.add_tab_command( tab_t, self.encryption_short_name + '_' + state, lambda args: self.__command_set_state_local(args, state), usage='<fingerprint>', short=trust_msg.format(name=self.encryption_short_name, state=state), help=trust_msg.format(name=self.encryption_short_name, state=state), ) self.api.add_command( self.encryption_short_name + '_' + state, lambda args: self.__command_set_state_global(args, state), usage='<JID> <fingerprint>', short=trust_msg.format(name=self.encryption_short_name, state=state), help=trust_msg.format(name=self.encryption_short_name, state=state), ) self.api.add_command( self.encryption_short_name + '_fingerprint', self._command_show_fingerprints, usage='[jid]', short=f'Show {self.encryption_short_name} fingerprint(s) for a JID.', help=f'Show {self.encryption_short_name} fingerprint(s) for a JID.', ) ConversationTab.add_information_element( self.encryption_short_name, self._display_encryption_status, ) MucTab.add_information_element( self.encryption_short_name, self._display_encryption_status, ) PrivateTab.add_information_element( self.encryption_short_name, self._display_encryption_status, ) self.__load_encrypted_states() def __load_encrypted_states(self) -> None: """Load previously stored encryption states for jids.""" for section in config.sections(): value = config.getstr('encryption', section=section) if value and value == self.encryption_short_name: section_jid = JID(section) self._enabled_tabs[section_jid] = self.encrypt def cleanup(self): ConversationTab.remove_information_element(self.encryption_short_name) MucTab.remove_information_element(self.encryption_short_name) PrivateTab.remove_information_element(self.encryption_short_name) def _display_encryption_status(self, jid_s: str) -> str: """ Return information to display in the infobar if encryption is enabled for the JID. """ try: jid = JID(jid_s) except InvalidJID: return "" if self._encryption_enabled(jid) and self.encryption_short_name: return " " + self.encryption_short_name return "" def _toggle_tab(self, _input: str) -> None: tab = self.api.current_tab() jid: JID = tab.jid if self._encryption_enabled(jid): del self._enabled_tabs[jid] tab.e2e_encryption = None config.remove_and_save('encryption', section=jid) self.api.information( f'{self.encryption_name} encryption disabled for {jid}', 'Info', ) elif self.encryption_short_name: self._enabled_tabs[jid] = self.encrypt tab.e2e_encryption = self.encryption_name config.set_and_save('encryption', self.encryption_short_name, section=jid) self.api.information( f'{self.encryption_name} encryption enabled for {jid}', 'Info', ) @staticmethod def format_fingerprint(fingerprint: str, own: bool, theme: Theme) -> str: return fingerprint async def _show_fingerprints(self, jid: JID) -> None: """Display encryption fingerprints for a JID.""" theme = get_theme() fprs = await self.get_fingerprints(jid) if len(fprs) == 1: fp, own = fprs[0] fingerprint = self.format_fingerprint(fp, own, theme) self.api.information( f'Fingerprint for {jid}:\n{fingerprint}', 'Info', ) elif fprs: fmt_fprs = map(lambda fp: self.format_fingerprint(fp[0], fp[1], theme), fprs) self.api.information( 'Fingerprints for %s:\n%s' % (jid, '\n\n'.join(fmt_fprs)), 'Info', ) else: self.api.information( f'{jid}: No fingerprints to display', 'Info', ) @command_args_parser.quoted(0, 1) def _command_show_fingerprints(self, args: List[str]) -> None: tab = self.api.current_tab() if not args and isinstance(tab, self.supported_tab_types): jid = tab.jid if isinstance(tab, MucTab): jid = self.core.xmpp.boundjid.bare elif not args and isinstance(tab, RosterInfoTab): # Allow running the command without arguments in roster tab jid = self.core.xmpp.boundjid.bare elif args: jid = args[0] else: shortname = self.encryption_short_name self.api.information( f'{shortname}_fingerprint: Couldn\'t deduce JID from context', 'Error', ) return None asyncio.create_task(self._show_fingerprints(JID(jid))) @command_args_parser.quoted(2) def __command_set_state_global(self, args, state='') -> None: if not args: self.api.information( 'No fingerprint provided to the command..', 'Error', ) return jid, fpr = args if state not in self._all_trust_states: shortname = self.encryption_short_name self.api.information( f'Unknown state for plugin {shortname}: {state}', 'Error' ) return self.store_trust(jid, state, fpr) @command_args_parser.quoted(1) def __command_set_state_local(self, args, state='') -> None: if isinstance(self.api.current_tab(), MucTab): self.api.information( 'You can only trust each participant of a MUC individually.', 'Info', ) return jid = self.api.current_tab().jid if not args: self.api.information( 'No fingerprint provided to the command..', 'Error', ) return fpr = args[0] if state not in self._all_trust_states: shortname = self.encryption_short_name self.api.information( f'Unknown state for plugin {shortname}: {state}', 'Error', ) return self.store_trust(jid, state, fpr) def _encryption_enabled(self, jid: JID) -> bool: return self._enabled_tabs.get(jid) == self.encrypt async def _encrypt_wrapper(self, stanza: StanzaBase) -> Optional[StanzaBase]: """ Wrapper around _encrypt() to handle errors and display the message after encryption. """ try: # pylint: disable=unexpected-keyword-arg result = await self._encrypt(stanza, passthrough=True) except NothingToEncrypt: return stanza except Exception as exc: jid = stanza['from'] tab = self.core.tabs.by_name_and_class(jid, ChatTab) msg = ' \n\x19%s}Could not decrypt message: %s' % ( dump_tuple(get_theme().COLOR_CHAR_NACK), exc, ) # XXX: check before commit. Do we not nack in MUCs? if tab and not isinstance(tab, MucTab): tab.nack_message(msg, stanza['id'], stanza['to']) # TODO: display exceptions to the user properly log.error('Exception in encrypt:', exc_info=True) return None return result async def _decrypt_wrapper(self, stanza: Message, tab: Optional[ChatTabs]) -> None: """ Wrapper around _decrypt() to handle errors and display the message after encryption. """ try: # pylint: disable=unexpected-keyword-arg await self._decrypt(stanza, tab, passthrough=True) except Exception as exc: jid = stanza['to'] tab = self.core.tabs.by_name_and_class(jid, ChatTab) msg = ' \n\x19%s}Could not send message: %s' % ( dump_tuple(get_theme().COLOR_CHAR_NACK), exc, ) # XXX: check before commit. Do we not nack in MUCs? if tab and not isinstance(tab, MucTab): tab.nack_message(msg, stanza['id'], stanza['from']) # TODO: display exceptions to the user properly log.error('Exception in decrypt:', exc_info=True) return None return None async def _decrypt_encryptedtag(self, stanza: Message) -> None: """ Handler to decrypt encrypted_tags elements that are matched separately from other messages because the default 'message' handler that we use only matches messages containing a <body/>. """ # If the message contains a body, it will already be handled by the # other handler. If not, pass it to the handler. if stanza.xml.find(f'{{{self.core.xmpp.default_ns}}}body') is not None: return None mfrom = stanza['from'] # Find what tab this message corresponds to. if stanza['type'] == 'groupchat': # MUC tab = self.core.tabs.by_name_and_class( name=mfrom.bare, cls=MucTab, ) elif self.core.handler.is_known_muc_pm(stanza, mfrom): # MUC-PM tab = self.core.tabs.by_name_and_class( name=mfrom.full, cls=PrivateTab, ) else: # 1:1 tab = self.core.get_conversation_by_jid( jid=JID(mfrom.bare), create=False, fallback_barejid=True, ) log.debug('Found tab %r for encrypted message', tab) await self._decrypt_wrapper(stanza, tab) async def _decrypt(self, message: Message, tab: Optional[ChatTabs], passthrough: bool = True) -> None: has_eme: bool = False if message.xml.find(f'{{{EME_NS}}}{EME_TAG}') is not None and \ message['eme']['namespace'] == self.eme_ns: has_eme = True has_encrypted_tag: bool = False if not has_eme and self.encrypted_tags is not None: tmp: bool = True for (namespace, tag) in self.encrypted_tags: tmp = tmp and message.xml.find(f'{{{namespace}}}{tag}') is not None has_encrypted_tag = tmp if not has_eme and not has_encrypted_tag: return None log.debug('Received %s message: %r', self.encryption_name, message['body']) # Get the original JID of the sender. The JID might be None if it # comes from a semi-anonymous MUC for example. Some plugins might be # fine with this so let them handle it. jid = message['from'] muctab: Optional[MucTab] = None if isinstance(tab, PrivateTab): muctab = tab.parent_muc jid = None if muctab is not None or isinstance(tab, MucTab): if muctab is None: muctab = tab # type: ignore nick = message['from'].resource user = muctab.get_user_by_name(nick) # type: ignore if user is not None: jid = user.jid or None # Call the enabled encrypt method func = self.decrypt if iscoroutinefunction(func): # pylint: disable=unexpected-keyword-arg await func(message, jid, tab, passthrough=True) # type: ignore else: # pylint: disable=unexpected-keyword-arg func(message, jid, tab) # type: ignore log.debug('Decrypted %s message: %r', self.encryption_name, message['body']) return None async def _encrypt(self, stanza: StanzaBase, passthrough: bool = True) -> Optional[StanzaBase]: # TODO: Let through messages that contain elements that don't need to # be encrypted even in an encrypted context, such as MUC mediated # invites, etc. # What to do when they're mixed with other elements? It probably # depends on the element. Maybe they can be mixed with # `self.tag_whitelist` that are already assumed to be sent as plain by # the E2EE plugin. # They might not be accompanied by a <body/> most of the time, nor by # an encrypted tag. if not isinstance(stanza, Message) or stanza['type'] not in ('normal', 'chat', 'groupchat'): raise NothingToEncrypt() message = stanza # Is this message already encrypted? Do we need to do all these # checks? Such as an OMEMO heartbeat. has_encrypted_tag: bool = False if self.encrypted_tags is not None: tmp: bool = True for (namespace, tag) in self.encrypted_tags: tmp = tmp and message.xml.find(f'{{{namespace}}}{tag}') is not None has_encrypted_tag = tmp if has_encrypted_tag: log.debug('Message already contains encrypted tags.') raise NothingToEncrypt() # Find who to encrypt to. If in a groupchat this can be multiple JIDs. # It is possible that we are not able to find a jid (e.g., semi-anon # MUCs). Let the plugin decide what to do with this information. jids: Optional[List[JID]] = [message['to']] tab = self.core.tabs.by_jid(message['to']) if tab is None and message['to'].resource: # Redo the search with the bare JID tab = self.core.tabs.by_jid(message['to'].bare) if tab is None: # Possible message sent directly by the e2ee lib? log.debug( 'A message we do not have a tab for ' 'is being sent to \'%s\'. \n%r.', message['to'], message, ) parent = None if isinstance(tab, PrivateTab): parent = tab.parent_muc nick = tab.jid.resource jids = None for user in parent.users: if user.nick == nick: jids = user.jid or None break if isinstance(tab, MucTab): jids = [] for user in tab.users: # If the JID of a user is None, assume all others are None and # we are in a (at least) semi-anon room. TODO: Really check if # the room is semi-anon. Currently a moderator of a semi-anon # room will possibly encrypt to everybody, leaking their # public key/identity, and they wouldn't be able to decrypt it # anyway if they don't know the moderator's JID. # TODO: Change MUC to give easier access to this information. if user.jid is None: jids = None break # If we encrypt to all of these JIDs is up to the plugin, we # just tell it who is in the room. # XXX: user.jid shouldn't be empty. That's a MucTab/slixmpp # bug. if user.jid.bare: jids.append(user.jid) if tab and not self._encryption_enabled(tab.jid): raise NothingToEncrypt() log.debug('Sending %s message', self.encryption_name) has_body = message.xml.find('{%s}%s' % (JCLIENT_NS, 'body')) is not None if not self._encryption_enabled(tab.jid): raise NothingToEncrypt() # Drop all messages that don't contain a body if the plugin doesn't do # Stanza Encryption if not self.stanza_encryption and not has_body: log.debug( '%s plugin: Dropping message as it contains no body, and ' 'doesn\'t do stanza encryption', self.encryption_name, ) return None # Call the enabled encrypt method func = self._enabled_tabs[tab.jid] if iscoroutinefunction(func): # pylint: disable=unexpected-keyword-arg await func(message, jids, tab, passthrough=True) else: # pylint: disable=unexpected-keyword-arg func(message, jids, tab, passthrough=True) if has_body: # Only add EME tag if the message has a body. # Per discussion in jdev@: # The receiving client needs to know the message contains # meaningful information or not to display notifications to the # user, and not display anything when it's e.g., a chatstate. # This does leak the fact that the encrypted payload contains a # message. message['eme']['namespace'] = self.eme_ns message['eme']['name'] = self.encryption_name if self.replace_body_with_eme: self.core.xmpp['xep_0380'].replace_body_with_eme(message) # Filter stanza with the whitelist. Plugins doing stanza encryption # will have to include these in their encrypted container beforehand. whitelist = self.tag_whitelist if self.encrypted_tags is not None: whitelist += self.encrypted_tags tag_whitelist = {f'{{{ns}}}{tag}' for (ns, tag) in whitelist} for elem in message.xml[:]: if elem.tag not in tag_whitelist: message.xml.remove(elem) log.debug('Encrypted %s message', self.encryption_name) return message def store_trust(self, jid: JID, state: str, fingerprint: str) -> None: """Store trust for a fingerprint and a jid.""" option_name = f'{self.encryption_short_name}:{fingerprint}' config.silent_set(option=option_name, value=state, section=jid) def fetch_trust(self, jid: JID, fingerprint: str) -> str: """Fetch trust of a fingerprint and a jid.""" option_name = f'{self.encryption_short_name}:{fingerprint}' return config.getstr(option=option_name, section=jid) async def decrypt(self, message: Message, jid: Optional[JID], tab: Optional[ChatTab]): """Decryption method This is a method the plugin must implement. It is expected that this method will edit the received message and return nothing. :param message: Message to be decrypted. :param jid: Real Jid of the sender if available. We might be talking through a semi-anonymous MUC where real JIDs are not available. :param tab: Tab the message is coming from. :returns: None """ raise NotImplementedError async def encrypt(self, message: Message, jids: Optional[List[JID]], tab: ChatTabs): """Encryption method This is a method the plugin must implement. It is expected that this method will edit the received message and return nothing. :param message: Message to be encrypted. :param jids: Real Jids of all possible recipients. :param tab: Tab the message is going to. :returns: None """ raise NotImplementedError async def get_fingerprints(self, jid: JID) -> List[Tuple[str, bool]]: """Show fingerprint(s) for this encryption method and JID. To overload in plugins. :returns: A list of fingerprints to display """ return []