137 lines
6.4 KiB
C#
137 lines
6.4 KiB
C#
/*
|
|
* Copyright (c) Contributors, http://www.openmetaverse.org/
|
|
* See CONTRIBUTORS.TXT for a full list of copyright holders.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* * Neither the name of the OpenSim Project nor the
|
|
* names of its contributors may be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS AND ANY
|
|
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
*/
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.Text;
|
|
using System.Security.Cryptography;
|
|
|
|
namespace OpenSim.Framework
|
|
{
|
|
/// <summary>
|
|
/// NEEDS AUDIT.
|
|
/// </summary>
|
|
/// <remarks>
|
|
/// Suggested implementation
|
|
/// <para>Store two digests for each foreign host. A local copy of the local hash using the local challenge (when issued), and a local copy of the remote hash using the remote challenge.</para>
|
|
/// <para>When sending data to the foreign host - run 'Sign' on the data and affix the returned byte[] to the message.</para>
|
|
/// <para>When recieving data from the foreign host - run 'Authenticate' against the data and the attached byte[].</para>
|
|
/// <para>Both hosts should be performing these operations for this to be effective.</para>
|
|
/// </remarks>
|
|
class RemoteDigest
|
|
{
|
|
private byte[] currentHash;
|
|
private byte[] secret;
|
|
|
|
private SHA512Managed SHA512;
|
|
|
|
/// <summary>
|
|
/// Initialises a new RemoteDigest authentication mechanism
|
|
/// </summary>
|
|
/// <remarks>Needs an audit by a cryptographic professional - was not "roll your own"'d by choice but rather a serious lack of decent authentication mechanisms in .NET remoting</remarks>
|
|
/// <param name="sharedSecret">The shared secret between systems (for inter-sim, this is provided in encrypted form during connection, for grid this is input manually in setup)</param>
|
|
/// <param name="salt">Binary salt - some common value - to be decided what</param>
|
|
/// <param name="challenge">The challenge key provided by the third party</param>
|
|
public RemoteDigest(string sharedSecret, byte[] salt, string challenge)
|
|
{
|
|
SHA512 = new SHA512Managed();
|
|
Rfc2898DeriveBytes RFC2898 = new Rfc2898DeriveBytes(sharedSecret,salt);
|
|
secret = RFC2898.GetBytes(512);
|
|
ASCIIEncoding ASCII = new ASCIIEncoding();
|
|
|
|
currentHash = SHA512.ComputeHash(AppendArrays(secret, ASCII.GetBytes(challenge)));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Authenticates a piece of incoming data against the local digest. Upon successful authentication, digest string is incremented.
|
|
/// </summary>
|
|
/// <param name="data">The incoming data</param>
|
|
/// <param name="digest">The remote digest</param>
|
|
/// <returns></returns>
|
|
public bool Authenticate(byte[] data, byte[] digest)
|
|
{
|
|
byte[] newHash = SHA512.ComputeHash(AppendArrays(AppendArrays(currentHash, secret), data));
|
|
if (digest == newHash)
|
|
{
|
|
currentHash = newHash;
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
throw new Exception("Hash comparison failed. Key resync required.");
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Signs a new bit of data with the current hash. Returns a byte array which should be affixed to the message.
|
|
/// Signing a piece of data will automatically increment the hash - if you sign data and do not send it, the
|
|
/// hashes will get out of sync and throw an exception when validation is attempted.
|
|
/// </summary>
|
|
/// <param name="data">The outgoing data</param>
|
|
/// <returns>The local digest</returns>
|
|
public byte[] Sign(byte[] data)
|
|
{
|
|
currentHash = SHA512.ComputeHash(AppendArrays(AppendArrays(currentHash, secret), data));
|
|
return currentHash;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Generates a new challenge string to be issued to a foreign host. Challenges are 1024-bit (effective strength of less than 512-bits) messages generated using the Crytographic Random Number Generator.
|
|
/// </summary>
|
|
/// <returns>A 128-character hexadecimal string containing the challenge.</returns>
|
|
public static string GenerateChallenge()
|
|
{
|
|
RNGCryptoServiceProvider RNG = new RNGCryptoServiceProvider();
|
|
byte[] bytes = new byte[64];
|
|
RNG.GetBytes(bytes);
|
|
|
|
StringBuilder sb = new StringBuilder(bytes.Length * 2);
|
|
foreach (byte b in bytes)
|
|
{
|
|
sb.AppendFormat("{0:x2}", b);
|
|
}
|
|
return sb.ToString();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Helper function, merges two byte arrays
|
|
/// </summary>
|
|
/// <remarks>Sourced from MSDN Forum</remarks>
|
|
/// <param name="a">A</param>
|
|
/// <param name="b">B</param>
|
|
/// <returns>C</returns>
|
|
private byte[] AppendArrays(byte[] a, byte[] b)
|
|
{
|
|
byte[] c = new byte[a.Length + b.Length];
|
|
Buffer.BlockCopy(a, 0, c, 0, a.Length);
|
|
Buffer.BlockCopy(b, 0, c, a.Length, b.Length);
|
|
return c;
|
|
}
|
|
|
|
}
|
|
}
|