aboutsummaryrefslogtreecommitdiff
path: root/client
diff options
context:
space:
mode:
Diffstat (limited to 'client')
-rw-r--r--client/client.go24
-rw-r--r--client/get-entries/main.go36
-rw-r--r--client/verify.go17
3 files changed, 61 insertions, 16 deletions
diff --git a/client/client.go b/client/client.go
index 43386b0..a7f8abb 100644
--- a/client/client.go
+++ b/client/client.go
@@ -193,6 +193,13 @@ func (c *Client) GetProofByHash(ctx context.Context, treeSize uint64, rootHash,
return item, nil
}
+// GetEntries fetches a range of entries from the log, verifying that they are
+// of type checksum_v1 and signed by a valid certificate chain in the appendix.
+// Fewer entries may be returned if too large range, in which case the end is
+// truncated. Safe to use without a client chain and corresponding private key.
+//
+// Note that a certificate chain is considered valid if it is chained correctly.
+// In other words, the caller may want to check whether the anchor is trusted.
func (c *Client) GetEntries(ctx context.Context, start, end uint64) ([]*stfe.GetEntryResponse, error) {
req, err := http.NewRequest("GET", c.protocol()+c.Log.BaseUrl+"/get-entries", nil)
if err != nil {
@@ -209,7 +216,22 @@ func (c *Client) GetEntries(ctx context.Context, start, end uint64) ([]*stfe.Get
if err := c.doRequest(ctx, req, &rsp); err != nil {
return nil, err
}
- // TODO: verify signature over leaf data
+ for _, entry := range rsp {
+ var item stfe.StItem
+ if err := item.Unmarshal(entry.Item); err != nil {
+ return nil, fmt.Errorf("unmarshal failed: %v (%v)", err, entry)
+ }
+ if item.Format != stfe.StFormatChecksumV1 {
+ return nil, fmt.Errorf("bad StFormat: %v (%v)", err, entry)
+ }
+ if chain, err := x509util.ParseDerChainToList(entry.Chain); err != nil {
+ return nil, fmt.Errorf("bad certificate chain: %v (%v)", err, entry)
+ } else if err := x509util.VerifyChain(chain); err != nil {
+ return nil, fmt.Errorf("invalid certificate chain: %v (%v)", err, entry)
+ } else if err := VerifyChecksumV1(&item, chain[0].PublicKey, entry.Signature, tls.SignatureScheme(entry.SignatureScheme)); err != nil {
+ return nil, fmt.Errorf("invalid signature: %v (%v)", err, entry)
+ }
+ }
return rsp, nil
}
diff --git a/client/get-entries/main.go b/client/get-entries/main.go
index 6a45707..511d53d 100644
--- a/client/get-entries/main.go
+++ b/client/get-entries/main.go
@@ -22,39 +22,47 @@ var (
func main() {
flag.Parse()
- client, err := client.NewClientFromPath(*logId, "", "", *operators, &http.Client{}, true)
- if err != nil {
+ if client, err := client.NewClientFromPath(*logId, "", "", *operators, &http.Client{}, true); err != nil {
+ glog.Fatal(err)
+ } else if items, err := getRange(client, *start, *end); err != nil {
+ glog.Fatal(err)
+ } else if err := printRange(items); err != nil {
glog.Fatal(err)
}
- items := make([]*stfe.StItem, 0, *end-*start+1)
- i := *start
+ glog.Flush()
+}
+
+func getRange(client *client.Client, start, end uint64) ([]*stfe.StItem, error) {
+ items := make([]*stfe.StItem, 0, end-start+1)
for len(items) != cap(items) {
- rsps, err := client.GetEntries(context.Background(), i, *end)
+ rsps, err := client.GetEntries(context.Background(), start, end)
if err != nil {
- glog.Fatal(err)
+ return nil, fmt.Errorf("fetching entries failed: %v", err)
}
for _, rsp := range rsps {
var item stfe.StItem
- if err := item.Unmarshal(rsp.Leaf); err != nil {
- glog.Fatalf("bad StItem: unmarshal failed: %v", err)
+ if err := item.Unmarshal(rsp.Item); err != nil {
+ return nil, fmt.Errorf("expected valid StItem but unmarshal failed: %v", err)
} else if item.Format != stfe.StFormatChecksumV1 {
- glog.Fatalf("bad StFormat: %v", item.Format)
+ return nil, fmt.Errorf("expected checksum_v1 but got: %v", item.Format)
}
items = append(items, &item)
}
- i += uint64(len(rsps))
+ start += uint64(len(rsps))
}
+ return items, nil
+}
+func printRange(items []*stfe.StItem) error {
for i, item := range items {
- glog.V(2).Infof("Index(%d): %s", *start+uint64(i), item)
+ glog.V(3).Infof("Index(%d): %s", *start+uint64(i), item)
str, err := item.MarshalB64()
if err != nil {
- glog.Fatalf("bad StItem: marshal failed: %v", err)
+ glog.Fatalf("expected valid StItem but marshal failed: %v", err)
}
fmt.Printf("Index(%d): %s\n", *start+uint64(i), str)
}
-
- glog.Flush()
+ return nil
}
diff --git a/client/verify.go b/client/verify.go
index 8d64211..d9c18bf 100644
--- a/client/verify.go
+++ b/client/verify.go
@@ -12,6 +12,7 @@ import (
"github.com/system-transparency/stfe"
)
+// VerifySignedDebugInfoV1 verifies an SDI signature
func VerifySignedDebugInfoV1(sdi *stfe.StItem, scheme tls.SignatureScheme, key crypto.PublicKey, message []byte) error {
if err := supportedScheme(scheme, key); err != nil {
return err
@@ -31,13 +32,27 @@ func VerifySignedTreeHeadV1(sth *stfe.StItem, scheme tls.SignatureScheme, key cr
if err := supportedScheme(scheme, key); err != nil {
return err
}
-
if !ed25519.Verify(key.(ed25519.PublicKey), serialized, sth.SignedTreeHeadV1.Signature) {
return fmt.Errorf("bad signature")
}
return nil
}
+// VerifyChecksumV1 verifies a checksum signature
+func VerifyChecksumV1(checksum *stfe.StItem, key crypto.PublicKey, signature []byte, scheme tls.SignatureScheme) error {
+ serialized, err := checksum.Marshal()
+ if err != nil {
+ return fmt.Errorf("failed marshaling StItem: %v", err)
+ }
+ if err := supportedScheme(scheme, key); err != nil {
+ return err
+ }
+ if !ed25519.Verify(key.(ed25519.PublicKey), serialized, signature) {
+ return fmt.Errorf("bad signature")
+ }
+ return nil
+}
+
// VerifyConsistencyProofV1 verifies that a consistency proof is valid without
// checking any sth signature
func VerifyConsistencyProofV1(proof, first, second *stfe.StItem) error {