support for server verification of clients that do not pass x-amz-content-sha256
AWS-Zig Build / build-zig-0.11.0-amd64-host (push) Successful in 5m17s Details

This commit is contained in:
Emil Lerch 2024-02-24 09:43:36 -08:00
parent ed48901c92
commit 31324c7e83
Signed by: lobo
GPG Key ID: A7B62D657EF764F8
1 changed files with 133 additions and 17 deletions

View File

@ -167,31 +167,45 @@ pub fn signRequest(allocator: std.mem.Allocator, request: base.Request, config:
var additional_header_count: u3 = 3;
if (config.credentials.session_token != null)
additional_header_count += 1;
if (config.signed_body_header == .none)
additional_header_count -= 1;
const newheaders = try allocator.alloc(base.Header, rc.headers.len + additional_header_count);
errdefer allocator.free(newheaders);
const oldheaders = rc.headers;
if (config.credentials.session_token) |t| {
newheaders[newheaders.len - 4] = base.Header{
newheaders[newheaders.len - additional_header_count] = base.Header{
.name = "X-Amz-Security-Token",
.value = try allocator.dupe(u8, t),
};
additional_header_count -= 1;
}
errdefer freeSignedRequest(allocator, &rc, config);
std.mem.copy(base.Header, newheaders, oldheaders);
newheaders[newheaders.len - 3] = base.Header{
newheaders[newheaders.len - additional_header_count] = base.Header{
.name = "X-Amz-Date",
.value = signing_iso8601,
};
// From the AWS nitro enclaves SDK, it appears that there is no reason
// to avoid *ALWAYS* adding the x-amz-content-sha256 header
// https://github.com/aws/aws-nitro-enclaves-sdk-c/blob/9ecb83d07fe953636e3c0b861d6dac0a15d00f82/source/rest.c#L464
const payload_hash = try hash(allocator, request.body, config.signed_body_header);
// This will be freed in freeSignedRequest
// defer allocator.free(payload_hash);
newheaders[newheaders.len - 2] = base.Header{
.name = "x-amz-content-sha256",
.value = payload_hash,
};
additional_header_count -= 1;
// We always need the sha256 of the payload for the signature,
// regardless of whether we're sticking the header on the request
std.debug.assert(config.signed_body_header == .none or
config.signed_body_header == .sha256);
const payload_hash = try hash(allocator, request.body, .sha256);
if (config.signed_body_header == .sha256) {
// From the AWS nitro enclaves SDK, it appears that there is no reason
// to avoid *ALWAYS* adding the x-amz-content-sha256 header
// https://github.com/aws/aws-nitro-enclaves-sdk-c/blob/9ecb83d07fe953636e3c0b861d6dac0a15d00f82/source/rest.c#L464
// However, for signature verification, we need to accomodate clients that
// may not add this header
// This will be freed in freeSignedRequest
// defer allocator.free(payload_hash);
newheaders[newheaders.len - additional_header_count] = base.Header{
.name = "x-amz-content-sha256",
.value = payload_hash,
};
additional_header_count -= 1;
}
rc.headers = newheaders[0 .. newheaders.len - 1];
log.debug("Signing with access key: {s}", .{config.credentials.access_key});
@ -301,6 +315,9 @@ pub const UnverifiedRequest = struct {
};
pub fn verify(allocator: std.mem.Allocator, request: UnverifiedRequest, request_body_reader: anytype, credentials_fn: credentialsFn) !bool {
var arena = std.heap.ArenaAllocator.init(allocator);
defer arena.deinit();
var aa = arena.allocator();
// Authorization: AWS4-HMAC-SHA256 Credential=ACCESS/20230908/us-west-2/s3/aws4_request, SignedHeaders=accept;content-length;content-type;host;x-amz-content-sha256;x-amz-date;x-amz-storage-class, Signature=fcc43ce73a34c9bd1ddf17e8a435f46a859812822f944f9eeb2aabcd64b03523
const auth_header_or_null = request.headers.getFirstValue("Authorization");
const auth_header = if (auth_header_or_null) |a| a else return error.AuthorizationHeaderMissing;
@ -328,7 +345,7 @@ pub fn verify(allocator: std.mem.Allocator, request: UnverifiedRequest, request_
if (signed_headers == null) return error.AuthorizationHeaderMissingSignedHeaders;
if (signature == null) return error.AuthorizationHeaderMissingSignature;
return verifyParsedAuthorization(
allocator,
aa,
request,
request_body_reader,
credential.?,
@ -364,13 +381,13 @@ fn verifyParsedAuthorization(
const service = credential_iterator.next().?;
const aws4_request = credential_iterator.next().?;
if (!std.mem.eql(u8, aws4_request, "aws4_request")) return error.UnexpectedCredentialValue;
const config = Config{
var config = Config{
.service = service,
.credentials = credentials,
.region = region,
.algorithm = .v4,
.signature_type = .headers,
.signed_body_header = .sha256,
.signed_body_header = .none,
.expiration_in_seconds = 0,
.signing_time = try date.dateTimeToTimestamp(try date.parseIso8601ToDateTime(normalized_iso_date)),
};
@ -380,6 +397,8 @@ fn verifyParsedAuthorization(
var signed_headers_iterator = std.mem.splitSequence(u8, signed_headers, ";");
var inx: usize = 0;
while (signed_headers_iterator.next()) |signed_header| {
if (std.ascii.eqlIgnoreCase(signed_header, "x-amz-content-sha256"))
config.signed_body_header = .sha256;
var is_forbidden = false;
inline for (forbidden_headers) |forbidden| {
if (std.ascii.eqlIgnoreCase(forbidden.name, signed_header)) {
@ -427,6 +446,11 @@ fn verifySignedRequest(signed_request: base.Request, signature: []const u8) !boo
}
break :blk null;
};
log.debug(
\\Signature Verification
\\Request Signature: {s}
\\Calculated Signat: {s}
, .{ signature, calculated_signature.? });
return std.mem.eql(u8, signature, calculated_signature.?);
}
@ -463,7 +487,6 @@ fn getSigningKey(allocator: std.mem.Allocator, signing_date: []const u8, config:
}
fn validateConfig(config: Config) SigningError!void {
if (config.signature_type != .headers or
config.signed_body_header != .sha256 or
config.expiration_in_seconds != 0 or
config.algorithm != .v4)
return SigningError.NotImplemented;
@ -519,7 +542,7 @@ fn createCanonicalRequest(allocator: std.mem.Allocator, request: base.Request, p
});
errdefer allocator.free(canonical_request);
log.debug("Canonical_request (just calculated):\n{s}", .{canonical_request});
const hashed = try hash(allocator, canonical_request, config.signed_body_header);
const hashed = try hash(allocator, canonical_request, .sha256);
return Hashed{
.arr = canonical_request,
.hash = hashed,
@ -1091,3 +1114,96 @@ test "can verify server request" {
}
}.getCreds));
}
test "can verify server request without x-amz-content-sha256" {
const allocator = std.testing.allocator;
const access_key = try allocator.dupe(u8, "ACCESS");
const secret_key = try allocator.dupe(u8, "SECRET");
test_credential = Credentials.init(allocator, access_key, secret_key, null);
defer test_credential.?.deinit();
var headers = std.http.Headers.init(allocator);
defer headers.deinit();
try headers.append("Connection", "keep-alive");
try headers.append("Accept-Encoding", "gzip, deflate, zstd");
try headers.append("TE", "gzip, deflate, trailers");
try headers.append("Accept", "application/json");
try headers.append("X-Amz-Target", "DynamoDB_20120810.CreateTable");
try headers.append("Host", "dynamodb.us-west-2.amazonaws.com");
try headers.append("User-Agent", "zig-aws 1.0");
try headers.append("Content-Type", "application/x-amz-json-1.0");
try headers.append("Content-Length", "403");
try headers.append("X-Amz-Date", "20240224T154944Z");
try headers.append("x-amz-content-sha256", "fcde2b2edba56bf408601fb721fe9b5c338d10ee429ea04fae5511b68fbf8fb9");
try headers.append("Authorization", "AWS4-HMAC-SHA256 Credential=ACCESS/20240224/us-west-2/dynamodb/aws4_request, SignedHeaders=content-type;host;x-amz-date;x-amz-target, Signature=8fd23dc7dbcb36c4aa54207a7118f8b9fcd680da73a0590b498e9577ff68ec33");
const body =
\\{"AttributeDefinitions": [{"AttributeName": "Artist", "AttributeType": "S"}, {"AttributeName": "SongTitle", "AttributeType": "S"}], "TableName": "MusicCollection", "KeySchema": [{"AttributeName": "Artist", "KeyType": "HASH"}, {"AttributeName": "SongTitle", "KeyType": "RANGE"}], "ProvisionedThroughput": {"ReadCapacityUnits": 5, "WriteCapacityUnits": 5}, "Tags": [{"Key": "Owner", "Value": "blueTeam"}]}
;
{
var h = try std.ArrayList(base.Header).initCapacity(allocator, headers.list.items.len);
defer h.deinit();
const signed_headers = &[_][]const u8{ "content-type", "host", "x-amz-date", "x-amz-target" };
for (headers.list.items) |source| {
var match = false;
for (signed_headers) |s| {
match = std.ascii.eqlIgnoreCase(s, source.name);
if (match) break;
}
if (match) h.appendAssumeCapacity(.{ .name = source.name, .value = source.value });
}
const req = base.Request{
.path = "/",
.method = "POST",
.headers = h.items,
};
const body_hash = try hash(allocator, body, .sha256);
defer allocator.free(body_hash);
try std.testing.expectEqualStrings("ebc5118b053c75178df0aa1f10d0443f5efb527a5589df943635834016c9b3bc", body_hash);
const canonical_request = try createCanonicalRequest(allocator, req, body_hash, .{
.region = "us-west-2",
.service = "dynamodb", // service
.credentials = test_credential.?,
.signing_time = 1708789784, // 20240224T154944Z (https://www.unixtimestamp.com)
});
defer allocator.free(canonical_request.arr);
defer allocator.free(canonical_request.hash);
defer allocator.free(canonical_request.headers.str);
defer allocator.free(canonical_request.headers.signed_headers);
// Canonical request:
const expected =
\\POST
\\/
\\
\\content-type:application/x-amz-json-1.0
\\host:dynamodb.us-west-2.amazonaws.com
\\x-amz-date:20240224T154944Z
\\x-amz-target:DynamoDB_20120810.CreateTable
\\
\\content-type;host;x-amz-date;x-amz-target
\\ebc5118b053c75178df0aa1f10d0443f5efb527a5589df943635834016c9b3bc
;
try std.testing.expectEqualStrings(expected, canonical_request.arr);
}
{ // verification
var fis = std.io.fixedBufferStream(body[0..]);
const request = std.http.Server.Request{
.method = std.http.Method.POST,
.target = "/",
.version = .@"HTTP/1.1",
.content_length = 403,
.headers = headers,
.parser = std.http.protocol.HeadersParser.initDynamic(std.math.maxInt(usize)),
};
try std.testing.expect(try verifyServerRequest(allocator, request, fis.reader(), struct {
cred: Credentials,
const Self = @This();
fn getCreds(access: []const u8) ?Credentials {
if (std.mem.eql(u8, access, "ACCESS")) return test_credential.?;
return null;
}
}.getCreds));
}
}