1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191

use server::ProducesTickets;
use rand;

use time;
use std::mem;
use std::sync::Mutex;
use ring::aead;

/// This is a ProducesTickets implementation which uses
/// any *ring* aead::Algorithm to encrypt and authentication
/// the ticket payload.  It does not enforce any lifetime
/// constraint.
pub struct AEADTicketer {
  alg: &'static aead::Algorithm,
  enc: aead::SealingKey,
  dec: aead::OpeningKey,
  lifetime: u32
}

impl AEADTicketer {
  /// Make a new AEADTicketer using the given `alg`, `key` material
  /// and advertised `lifetime_seconds`.  Note that `lifetime_seconds`
  /// does not affect the lifetime of the key.  `key` must be the
  /// right length for `alg` or this will panic.
  pub fn new_custom(alg: &'static aead::Algorithm,
                    key: &[u8],
                    lifetime_seconds: u32) -> AEADTicketer {
    AEADTicketer {
      alg: alg,
      enc: aead::SealingKey::new(alg, key).unwrap(),
      dec: aead::OpeningKey::new(alg, key).unwrap(),
      lifetime: lifetime_seconds
    }
  }

  /// Make a ticketer with recommended configuration and a random key.
  pub fn new() -> AEADTicketer {
    let mut key = [0u8; 32];
    rand::fill_random(&mut key);
    AEADTicketer::new_custom(&aead::CHACHA20_POLY1305, &key, 60 * 60 * 12)
  }
}

impl ProducesTickets for AEADTicketer {
  fn enabled(&self) -> bool { true }
  fn get_lifetime(&self) -> u32 { self.lifetime }

  /// Encrypt `message` and return the ciphertext.
  fn encrypt(&self, message: &[u8]) -> Option<Vec<u8>> {
    // Random nonce, because a counter is a privacy leak.
    let mut nonce = [0u8; 12];
    rand::fill_random(&mut nonce);

    let mut out = Vec::new();
    out.extend_from_slice(&nonce);
    out.extend_from_slice(&message);
    out.resize(nonce.len() + message.len() + self.alg.max_overhead_len(), 0u8);

    let rc = aead::seal_in_place(&self.enc,
                                 &nonce,
                                 &mut out[nonce.len()..],
                                 self.alg.max_overhead_len(),
                                 &[0u8; 0]);
    if rc.is_err() {
      None
    } else {
      Some(out)
    }
  }

  /// Decrypt `ciphertext` and recover the original message.
  fn decrypt(&self, ciphertext: &[u8]) -> Option<Vec<u8>> {
    let nonce_len = self.alg.nonce_len();
    let tag_len = self.alg.max_overhead_len();

    if ciphertext.len() < nonce_len + tag_len {
      return None;
    }

    let nonce = &ciphertext[0..nonce_len];
    let mut out = Vec::new();
    out.extend_from_slice(&ciphertext[nonce_len..]);

    let len = aead::open_in_place(&self.dec,
                                  nonce,
                                  0,
                                  &mut out,
                                  &[0u8; 0]);

    if len.is_err() {
      return None;
    }

    out.truncate(len.unwrap());
    Some(out)
  }
}

struct TicketSwitcherState {
  current: Box<ProducesTickets>,
  previous: Option<Box<ProducesTickets>>,
  next_switch_time: i64
}

/// A ticketer that has a 'current' sub-ticketer and a single
/// 'previous' ticketer.  It creates a new ticketer every so
/// often, demoting the current ticketer.
pub struct TicketSwitcher {
  generator: fn() -> Box<ProducesTickets>,
  lifetime: u32,
  state: Mutex<TicketSwitcherState>
}

impl TicketSwitcher {
  /// `lifetime` is in seconds, and is how long the current ticketer
  /// is used to generate new tickets.  Tickets are accepted for no
  /// longer than twice this duration.  `generator` produces a new
  /// `ProducesTickets` implementation.
  pub fn new(lifetime: u32, generator: fn() -> Box<ProducesTickets>) -> TicketSwitcher {
    TicketSwitcher {
      generator: generator,
      lifetime: lifetime,
      state: Mutex::new(
        TicketSwitcherState {
          current: generator(),
          previous: None,
          next_switch_time: time::get_time().sec + lifetime as i64
        }
      )
    }
  }

  /// If it's time, demote the `current` ticketer to `previous` (so it
  /// does no new encryptions but can do decryptions) and make a fresh
  /// `current` ticketer.
  ///
  /// Calling this regularly will ensure timely key erasure.  Otherwise,
  /// key erasure will be delayed until the next encrypt/decrypt call.
  pub fn maybe_roll(&self) {
    let mut state = self.state.lock().unwrap();
    let now = time::get_time().sec;

    if now > state.next_switch_time {
      state.previous = Some(mem::replace(&mut state.current, (self.generator)()));
      state.next_switch_time = now + self.lifetime as i64;
    }
  }
}

impl ProducesTickets for TicketSwitcher {
  fn get_lifetime(&self) -> u32 { self.lifetime * 2 }
  fn enabled(&self) -> bool { true }

  fn encrypt(&self, message: &[u8]) -> Option<Vec<u8>> {
    self.maybe_roll();

    self.state.lock()
      .unwrap()
      .current.encrypt(message)
  }

  fn decrypt(&self, ciphertext: &[u8]) -> Option<Vec<u8>> {
    self.maybe_roll();

    let state = self.state.lock().unwrap();
    let rc = state.current.decrypt(ciphertext);

    if rc.is_none() && state.previous.is_some() {
      state.previous.as_ref().unwrap().decrypt(ciphertext)
    } else {
      rc
    }
  }
}

pub struct Ticketer {}

fn generate_inner() -> Box<ProducesTickets> {
  Box::new(AEADTicketer::new())
}

impl Ticketer {
  /// Make the recommended Ticketer.  This produces tickets
  /// with a 12 hour life and randomly generated keys.
  pub fn new() -> Box<ProducesTickets> {
    Box::new(
      TicketSwitcher::new(6 * 60 * 60, generate_inner)
    )
  }
}