matrix_sdk_crypto/olm/
session.rs

1// Copyright 2020 The Matrix.org Foundation C.I.C.
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7//     http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15use std::{fmt, sync::Arc};
16
17use ruma::{serde::Raw, SecondsSinceUnixEpoch};
18use serde::{Deserialize, Serialize};
19use serde_json::Value;
20use tokio::sync::Mutex;
21use tracing::{debug, Span};
22use vodozemac::{
23    olm::{DecryptionError, OlmMessage, Session as InnerSession, SessionConfig, SessionPickle},
24    Curve25519PublicKey,
25};
26
27#[cfg(feature = "experimental-algorithms")]
28use crate::types::events::room::encrypted::OlmV2Curve25519AesSha2Content;
29use crate::{
30    error::{EventError, OlmResult, SessionUnpickleError},
31    types::{
32        events::{
33            olm_v1::DecryptedOlmV1Event,
34            room::encrypted::{OlmV1Curve25519AesSha2Content, ToDeviceEncryptedEventContent},
35            EventType,
36        },
37        DeviceKeys, EventEncryptionAlgorithm,
38    },
39    DeviceData,
40};
41
42/// Cryptographic session that enables secure communication between two
43/// `Account`s
44#[derive(Clone)]
45pub struct Session {
46    /// The OlmSession
47    pub inner: Arc<Mutex<InnerSession>>,
48    /// Our sessionId
49    pub session_id: Arc<str>,
50    /// The Key of the sender
51    pub sender_key: Curve25519PublicKey,
52    /// Our own signed device keys
53    pub our_device_keys: DeviceKeys,
54    /// Has this been created using the fallback key
55    pub created_using_fallback_key: bool,
56    /// When the session was created
57    pub creation_time: SecondsSinceUnixEpoch,
58    /// When the session was last used
59    pub last_use_time: SecondsSinceUnixEpoch,
60}
61
62#[cfg(not(tarpaulin_include))]
63impl fmt::Debug for Session {
64    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
65        f.debug_struct("Session")
66            .field("session_id", &self.session_id())
67            .field("sender_key", &self.sender_key)
68            .finish()
69    }
70}
71
72impl Session {
73    /// Decrypt the given Olm message.
74    ///
75    /// Returns the decrypted plaintext or a [`DecryptionError`] if decryption
76    /// failed.
77    ///
78    /// # Arguments
79    ///
80    /// * `message` - The Olm message that should be decrypted.
81    pub async fn decrypt(&mut self, message: &OlmMessage) -> Result<String, DecryptionError> {
82        let mut inner = self.inner.lock().await;
83        Span::current().record("session_id", inner.session_id());
84
85        let plaintext = inner.decrypt(message)?;
86        debug!(session=?inner, "Decrypted an Olm message");
87
88        let plaintext = String::from_utf8_lossy(&plaintext).to_string();
89
90        self.last_use_time = SecondsSinceUnixEpoch::now();
91
92        Ok(plaintext)
93    }
94
95    /// Get the sender key that was used to establish this Session.
96    pub fn sender_key(&self) -> Curve25519PublicKey {
97        self.sender_key
98    }
99
100    /// Get the [`SessionConfig`] that this session is using.
101    pub async fn session_config(&self) -> SessionConfig {
102        self.inner.lock().await.session_config()
103    }
104
105    /// Get the [`EventEncryptionAlgorithm`] of this [`Session`].
106    #[allow(clippy::unused_async)] // The experimental-algorithms feature uses async code.
107    pub async fn algorithm(&self) -> EventEncryptionAlgorithm {
108        #[cfg(feature = "experimental-algorithms")]
109        if self.session_config().await.version() == 2 {
110            EventEncryptionAlgorithm::OlmV2Curve25519AesSha2
111        } else {
112            EventEncryptionAlgorithm::OlmV1Curve25519AesSha2
113        }
114
115        #[cfg(not(feature = "experimental-algorithms"))]
116        EventEncryptionAlgorithm::OlmV1Curve25519AesSha2
117    }
118
119    /// Encrypt the given plaintext as a OlmMessage.
120    ///
121    /// Returns the encrypted Olm message.
122    ///
123    /// # Arguments
124    ///
125    /// * `plaintext` - The plaintext that should be encrypted.
126    pub(crate) async fn encrypt_helper(&mut self, plaintext: &str) -> OlmMessage {
127        let mut session = self.inner.lock().await;
128        let message = session.encrypt(plaintext);
129        self.last_use_time = SecondsSinceUnixEpoch::now();
130        debug!(?session, "Successfully encrypted an event");
131        message
132    }
133
134    /// Encrypt the given event content as an m.room.encrypted event
135    /// content.
136    ///
137    /// # Arguments
138    ///
139    /// * `recipient_device` - The device for which this message is going to be
140    ///   encrypted, this needs to be the device that was used to create this
141    ///   session with.
142    ///
143    /// * `event_type` - The type of the event content.
144    ///
145    /// * `content` - The content of the event.
146    pub async fn encrypt(
147        &mut self,
148        recipient_device: &DeviceData,
149        event_type: &str,
150        content: impl Serialize,
151        message_id: Option<String>,
152    ) -> OlmResult<Raw<ToDeviceEncryptedEventContent>> {
153        #[derive(Debug)]
154        struct Content<'a> {
155            event_type: &'a str,
156            content: Raw<Value>,
157        }
158
159        impl EventType for Content<'_> {
160            // This is a bit of a hack: usually we just define the `EVENT_TYPE` and use the
161            // default implementation of `event_type()`. We can't do this here
162            // because the event type isn't static.
163            //
164            // We have to provide `EVENT_TYPE` to conform to the `EventType` trait, but
165            // don't actually use it, so we just leave it empty.
166            //
167            // This works because the serialization uses `event_type()` and this type is
168            // contained to this function.
169            const EVENT_TYPE: &'static str = "";
170
171            fn event_type(&self) -> &str {
172                self.event_type
173            }
174        }
175
176        impl Serialize for Content<'_> {
177            fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
178            where
179                S: serde::Serializer,
180            {
181                self.content.serialize(serializer)
182            }
183        }
184
185        let plaintext = {
186            let content = serde_json::to_value(content)?;
187            let content = Content { event_type, content: Raw::new(&content)? };
188
189            let recipient_signing_key =
190                recipient_device.ed25519_key().ok_or(EventError::MissingSigningKey)?;
191
192            let content = DecryptedOlmV1Event {
193                sender: self.our_device_keys.user_id.clone(),
194                recipient: recipient_device.user_id().into(),
195                keys: crate::types::events::olm_v1::OlmV1Keys {
196                    ed25519: self
197                        .our_device_keys
198                        .ed25519_key()
199                        .expect("Our own device should have an Ed25519 public key"),
200                },
201                recipient_keys: crate::types::events::olm_v1::OlmV1Keys {
202                    ed25519: recipient_signing_key,
203                },
204                sender_device_keys: Some(self.our_device_keys.clone()),
205                content,
206            };
207
208            serde_json::to_string(&content)?
209        };
210
211        let ciphertext = self.encrypt_helper(&plaintext).await;
212
213        let content = self.build_encrypted_event(ciphertext, message_id).await?;
214        let content = Raw::new(&content)?;
215        Ok(content)
216    }
217
218    /// Take the given ciphertext, and package it into an `m.room.encrypted`
219    /// to-device message content.
220    ///
221    /// # Arguments
222    ///
223    /// * `ciphertext` - The encrypted message content.
224    /// * `message_id` - The ID to use for this to-device message, as
225    ///   `org.matrix.msgid`.
226    pub(crate) async fn build_encrypted_event(
227        &self,
228        ciphertext: OlmMessage,
229        message_id: Option<String>,
230    ) -> OlmResult<ToDeviceEncryptedEventContent> {
231        let content = match self.algorithm().await {
232            EventEncryptionAlgorithm::OlmV1Curve25519AesSha2 => OlmV1Curve25519AesSha2Content {
233                ciphertext,
234                recipient_key: self.sender_key,
235                sender_key: self
236                    .our_device_keys
237                    .curve25519_key()
238                    .expect("Device doesn't have curve25519 key"),
239                message_id,
240            }
241            .into(),
242            #[cfg(feature = "experimental-algorithms")]
243            EventEncryptionAlgorithm::OlmV2Curve25519AesSha2 => OlmV2Curve25519AesSha2Content {
244                ciphertext,
245                sender_key: self
246                    .our_device_keys
247                    .curve25519_key()
248                    .expect("Device doesn't have curve25519 key"),
249                message_id,
250            }
251            .into(),
252            _ => unreachable!(),
253        };
254
255        Ok(content)
256    }
257
258    /// Returns the unique identifier for this session.
259    pub fn session_id(&self) -> &str {
260        &self.session_id
261    }
262
263    /// Store the session as a base64 encoded string.
264    ///
265    /// # Arguments
266    ///
267    /// * `pickle_mode` - The mode that was used to pickle the session, either
268    ///   an unencrypted mode or an encrypted using passphrase.
269    pub async fn pickle(&self) -> PickledSession {
270        let pickle = self.inner.lock().await.pickle();
271
272        PickledSession {
273            pickle,
274            sender_key: self.sender_key,
275            created_using_fallback_key: self.created_using_fallback_key,
276            creation_time: self.creation_time,
277            last_use_time: self.last_use_time,
278        }
279    }
280
281    /// Restore a Session from a previously pickled string.
282    ///
283    /// Returns the restored Olm Session or a `SessionUnpicklingError` if there
284    /// was an error.
285    ///
286    /// # Arguments
287    ///
288    /// * `our_device_keys` - Our own signed device keys.
289    ///
290    /// * `pickle` - The pickled version of the `Session`.
291    pub fn from_pickle(
292        our_device_keys: DeviceKeys,
293        pickle: PickledSession,
294    ) -> Result<Self, SessionUnpickleError> {
295        if our_device_keys.curve25519_key().is_none() {
296            return Err(SessionUnpickleError::MissingIdentityKey);
297        }
298        if our_device_keys.ed25519_key().is_none() {
299            return Err(SessionUnpickleError::MissingSigningKey);
300        }
301
302        let session: vodozemac::olm::Session = pickle.pickle.into();
303        let session_id = session.session_id();
304
305        Ok(Session {
306            inner: Arc::new(Mutex::new(session)),
307            session_id: session_id.into(),
308            created_using_fallback_key: pickle.created_using_fallback_key,
309            sender_key: pickle.sender_key,
310            our_device_keys,
311            creation_time: pickle.creation_time,
312            last_use_time: pickle.last_use_time,
313        })
314    }
315}
316
317impl PartialEq for Session {
318    fn eq(&self, other: &Self) -> bool {
319        self.session_id() == other.session_id()
320    }
321}
322
323/// A pickled version of a `Session`.
324///
325/// Holds all the information that needs to be stored in a database to restore
326/// a Session.
327#[derive(Serialize, Deserialize)]
328#[allow(missing_debug_implementations)]
329pub struct PickledSession {
330    /// The pickle string holding the Olm Session.
331    pub pickle: SessionPickle,
332    /// The curve25519 key of the other user that we share this session with.
333    pub sender_key: Curve25519PublicKey,
334    /// Was the session created using a fallback key.
335    #[serde(default)]
336    pub created_using_fallback_key: bool,
337    /// The Unix timestamp when the session was created.
338    pub creation_time: SecondsSinceUnixEpoch,
339    /// The Unix timestamp when the session was last used.
340    pub last_use_time: SecondsSinceUnixEpoch,
341}
342
343#[cfg(test)]
344mod tests {
345    use assert_matches2::assert_let;
346    use matrix_sdk_test::async_test;
347    use ruma::{device_id, user_id};
348    use serde_json::{self, Value};
349    use vodozemac::olm::{OlmMessage, SessionConfig};
350
351    use crate::{
352        identities::DeviceData,
353        olm::Account,
354        types::events::{
355            dummy::DummyEventContent, olm_v1::DecryptedOlmV1Event,
356            room::encrypted::ToDeviceEncryptedEventContent,
357        },
358    };
359
360    #[async_test]
361    async fn test_encryption_and_decryption() {
362        use ruma::events::dummy::ToDeviceDummyEventContent;
363
364        // Given users Alice and Bob
365        let alice =
366            Account::with_device_id(user_id!("@alice:localhost"), device_id!("ALICEDEVICE"));
367        let mut bob = Account::with_device_id(user_id!("@bob:localhost"), device_id!("BOBDEVICE"));
368
369        // When Alice creates an Olm session with Bob
370        bob.generate_one_time_keys(1);
371        let one_time_key = *bob.one_time_keys().values().next().unwrap();
372        let sender_key = bob.identity_keys().curve25519;
373        let mut alice_session = alice.create_outbound_session_helper(
374            SessionConfig::default(),
375            sender_key,
376            one_time_key,
377            false,
378            alice.device_keys(),
379        );
380
381        let alice_device = DeviceData::from_account(&alice);
382
383        // and encrypts a message
384        let message = alice_session
385            .encrypt(&alice_device, "m.dummy", ToDeviceDummyEventContent::new(), None)
386            .await
387            .unwrap()
388            .deserialize()
389            .unwrap();
390
391        #[cfg(feature = "experimental-algorithms")]
392        assert_let!(ToDeviceEncryptedEventContent::OlmV2Curve25519AesSha2(content) = message);
393        #[cfg(not(feature = "experimental-algorithms"))]
394        assert_let!(ToDeviceEncryptedEventContent::OlmV1Curve25519AesSha2(content) = message);
395
396        let prekey = if let OlmMessage::PreKey(m) = content.ciphertext {
397            m
398        } else {
399            panic!("Wrong Olm message type");
400        };
401
402        // Then Bob should be able to create a session from the message and decrypt it.
403        let bob_session_result = bob
404            .create_inbound_session(
405                alice_device.curve25519_key().unwrap(),
406                bob.device_keys(),
407                &prekey,
408            )
409            .unwrap();
410
411        // Also ensure that the encrypted payload has the device keys under the unstable
412        // prefix
413        let plaintext: Value = serde_json::from_str(&bob_session_result.plaintext).unwrap();
414        assert_eq!(
415            plaintext["org.matrix.msc4147.device_keys"]["user_id"].as_str(),
416            Some("@alice:localhost")
417        );
418
419        // And the serialized object matches the format as specified in
420        // DecryptedOlmV1Event
421        let event: DecryptedOlmV1Event<DummyEventContent> =
422            serde_json::from_str(&bob_session_result.plaintext).unwrap();
423        assert_eq!(event.sender_device_keys.unwrap(), alice.device_keys());
424    }
425}