1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
/**
* part of Hachette
* Functions related to "signing" of data, refactored to a separate file.
*
* Copyright (C) 2021 Wojtek Kosior
* Redistribution terms are gathered in the `copyright' file.
*/
/*
* IMPORTS_START
* IMPORT sha256
* IMPORT browser
* IMPORT is_chrome
* IMPORTS_END
*/
/*
* In order to make certain data synchronously accessible in certain contexts,
* hachette smuggles it in string form in places like cookies, URLs and headers.
* When using the smuggled data, we first need to make sure it isn't spoofed.
* For that, we use this pseudo-signing mechanism.
*
* Despite what name suggests, no assymetric cryptography is involved, as it
* would bring no additional benefits and would incur bigger performance
* overhead. Instead, we hash the string data together with some secret value
* that is supposed to be known only by this browser instance. Resulting hash
* sum plays the role of the signature. In the hash we also include current
* time. This way, even if signed data leaks (which shouldn't happen in the
* first place), an attacker won't be able to re-use it indefinitely.
*
* The secret shared between execution contexts has to be available
* synchronously. Under Mozilla, this is the extension's per-session id. Under
* Chromium, this is the key that resides in the manifest.
*
* An idea to (under Chromium) instead store the secret in a file fetched
* synchronously using XMLHttpRequest is being considered.
*/
function get_secret()
{
if (is_chrome)
return browser.runtime.getManifest().key.substring(0, 50);
else
return browser.runtime.getURL("dummy");
}
function extract_signed(signature, signed_data)
{
const match = /^([1-9][0-9]{12}|0)_(.*)$/.exec(signed_data);
if (!match)
return {fail: "bad format"};
const result = {time: parseInt(match[1]), data: match[2]};
if (sign_data(result.data, result.time)[0] !== signature)
result.fail = "bad signature";
return result;
}
/*
* Sign a given string for a given time. Time should be either 0 or in the range
* 10^12 <= time < 10^13.
*/
function sign_data(data, time) {
return [sha256(get_secret() + time + data), `${time}_${data}`];
}
/*
* EXPORTS_START
* EXPORT extract_signed
* EXPORT sign_data
* EXPORTS_END
*/
|