Line data Source code
1 : /*
2 : This file is part of TALER
3 : Copyright (C) 2014-2023 Taler Systems SA
4 :
5 : TALER is free software; you can redistribute it and/or modify it under the
6 : terms of the GNU Affero General Public License as published by the Free Software
7 : Foundation; either version 3, or (at your option) any later version.
8 :
9 : TALER is distributed in the hope that it will be useful, but WITHOUT ANY
10 : WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
11 : A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.
12 :
13 : You should have received a copy of the GNU Affero General Public License along with
14 : TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
15 : */
16 : /**
17 : * @file taler-auditor-httpd_deposit-confirmation.c
18 : * @brief Handle /deposit-confirmation requests; parses the POST and JSON and
19 : * verifies the coin signature before handing things off
20 : * to the database.
21 : * @author Christian Grothoff
22 : */
23 : #include "platform.h"
24 : #include <gnunet/gnunet_util_lib.h>
25 : #include <gnunet/gnunet_json_lib.h>
26 : #include <jansson.h>
27 : #include <microhttpd.h>
28 : #include <pthread.h>
29 : #include "taler_json_lib.h"
30 : #include "taler_mhd_lib.h"
31 : #include "taler-auditor-httpd.h"
32 : #include "taler-auditor-httpd_deposit-confirmation.h"
33 :
34 : GNUNET_NETWORK_STRUCT_BEGIN
35 :
36 : /**
37 : * @brief Information about a signing key of the exchange. Signing keys are used
38 : * to sign exchange messages other than coins, i.e. to confirm that a
39 : * deposit was successful or that a refresh was accepted.
40 : */
41 : struct ExchangeSigningKeyDataP
42 : {
43 :
44 : /**
45 : * When does this signing key begin to be valid?
46 : */
47 : struct GNUNET_TIME_TimestampNBO start;
48 :
49 : /**
50 : * When does this signing key expire? Note: This is currently when
51 : * the Exchange will definitively stop using it. Signatures made with
52 : * the key remain valid until @e end. When checking validity periods,
53 : * clients should allow for some overlap between keys and tolerate
54 : * the use of either key during the overlap time (due to the
55 : * possibility of clock skew).
56 : */
57 : struct GNUNET_TIME_TimestampNBO expire;
58 :
59 : /**
60 : * When do signatures with this signing key become invalid? After
61 : * this point, these signatures cannot be used in (legal) disputes
62 : * anymore, as the Exchange is then allowed to destroy its side of the
63 : * evidence. @e end is expected to be significantly larger than @e
64 : * expire (by a year or more).
65 : */
66 : struct GNUNET_TIME_TimestampNBO end;
67 :
68 : /**
69 : * The public online signing key that the exchange will use
70 : * between @e start and @e expire.
71 : */
72 : struct TALER_ExchangePublicKeyP signkey_pub;
73 : };
74 :
75 : GNUNET_NETWORK_STRUCT_END
76 :
77 :
78 : /**
79 : * Cache of already verified exchange signing keys. Maps the hash of the
80 : * `struct TALER_ExchangeSigningKeyValidityPS` to the (static) string
81 : * "verified" or "revoked". Access to this map is guarded by the #lock.
82 : */
83 : static struct GNUNET_CONTAINER_MultiHashMap *cache;
84 :
85 : /**
86 : * Lock for operations on #cache.
87 : */
88 : static pthread_mutex_t lock;
89 :
90 :
91 : /**
92 : * We have parsed the JSON information about the deposit, do some
93 : * basic sanity checks (especially that the signature on the coin is
94 : * valid, and that this type of coin exists) and then execute the
95 : * deposit.
96 : *
97 : * @param connection the MHD connection to handle
98 : * @param dc information about the deposit confirmation
99 : * @param es information about the exchange's signing key
100 : * @return MHD result code
101 : */
102 : static MHD_RESULT
103 10 : verify_and_execute_deposit_confirmation (
104 : struct MHD_Connection *connection,
105 : const struct TALER_AUDITORDB_DepositConfirmation *dc,
106 : const struct TALER_AUDITORDB_ExchangeSigningKey *es)
107 10 : {
108 : enum GNUNET_DB_QueryStatus qs;
109 : struct GNUNET_HashCode h;
110 : const char *cached;
111 10 : struct ExchangeSigningKeyDataP skv = {
112 10 : .start = GNUNET_TIME_timestamp_hton (es->ep_start),
113 10 : .expire = GNUNET_TIME_timestamp_hton (es->ep_expire),
114 10 : .end = GNUNET_TIME_timestamp_hton (es->ep_end),
115 : .signkey_pub = es->exchange_pub
116 : };
117 0 : const struct TALER_CoinSpendSignatureP *coin_sigps[
118 10 : GNUNET_NZL (dc->num_coins)];
119 :
120 20 : for (unsigned int i = 0; i < dc->num_coins; i++)
121 10 : coin_sigps[i] = &dc->coin_sigs[i];
122 :
123 20 : if (GNUNET_TIME_absolute_is_future (es->ep_start.abs_time) ||
124 10 : GNUNET_TIME_absolute_is_past (es->ep_expire.abs_time))
125 : {
126 : /* Signing key expired */
127 0 : TALER_LOG_WARNING ("Expired exchange signing key\n");
128 0 : return TALER_MHD_reply_with_error (connection,
129 : MHD_HTTP_FORBIDDEN,
130 : TALER_EC_AUDITOR_DEPOSIT_CONFIRMATION_SIGNATURE_INVALID,
131 : "master signature expired");
132 : }
133 :
134 : /* check our cache */
135 10 : GNUNET_CRYPTO_hash (&skv,
136 : sizeof(skv),
137 : &h);
138 10 : GNUNET_assert (0 == pthread_mutex_lock (&lock));
139 10 : cached = GNUNET_CONTAINER_multihashmap_get (cache,
140 : &h);
141 10 : GNUNET_assert (0 == pthread_mutex_unlock (&lock));
142 10 : if (GNUNET_SYSERR ==
143 10 : TAH_plugin->preflight (TAH_plugin->cls))
144 : {
145 0 : GNUNET_break (0);
146 0 : return TALER_MHD_reply_with_error (connection,
147 : MHD_HTTP_INTERNAL_SERVER_ERROR,
148 : TALER_EC_GENERIC_DB_SETUP_FAILED,
149 : NULL);
150 : }
151 10 : if (NULL == cached)
152 : {
153 : /* Not in cache, need to verify the signature, persist it, and possibly cache it */
154 4 : if (GNUNET_OK !=
155 4 : TALER_exchange_offline_signkey_validity_verify (
156 : &es->exchange_pub,
157 : es->ep_start,
158 : es->ep_expire,
159 : es->ep_end,
160 : &TAH_master_public_key,
161 : &es->master_sig))
162 : {
163 0 : TALER_LOG_WARNING ("Invalid signature on exchange signing key\n");
164 0 : return TALER_MHD_reply_with_error (connection,
165 : MHD_HTTP_FORBIDDEN,
166 : TALER_EC_AUDITOR_DEPOSIT_CONFIRMATION_SIGNATURE_INVALID,
167 : "master signature invalid");
168 : }
169 :
170 : /* execute transaction */
171 4 : qs = TAH_plugin->insert_exchange_signkey (TAH_plugin->cls,
172 : es);
173 4 : if (0 > qs)
174 : {
175 0 : GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs);
176 0 : TALER_LOG_WARNING ("Failed to store exchange signing key in database\n");
177 0 : return TALER_MHD_reply_with_error (connection,
178 : MHD_HTTP_INTERNAL_SERVER_ERROR,
179 : TALER_EC_GENERIC_DB_STORE_FAILED,
180 : "exchange signing key");
181 : }
182 4 : cached = "verified";
183 : }
184 :
185 10 : if (0 == strcmp (cached,
186 : "verified"))
187 : {
188 : struct TALER_MasterSignatureP master_sig;
189 :
190 : /* check for revocation */
191 10 : qs = TAH_eplugin->lookup_signkey_revocation (TAH_eplugin->cls,
192 : &es->exchange_pub,
193 : &master_sig);
194 10 : if (0 > qs)
195 : {
196 0 : GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs);
197 0 : TALER_LOG_WARNING (
198 : "Failed to check for signing key revocation in database\n");
199 0 : return TALER_MHD_reply_with_error (connection,
200 : MHD_HTTP_INTERNAL_SERVER_ERROR,
201 : TALER_EC_GENERIC_DB_FETCH_FAILED,
202 : "exchange signing key revocation");
203 : }
204 10 : if (0 < qs)
205 0 : cached = "revoked";
206 : }
207 :
208 : /* Cache it, due to concurreny it might already be in the cache,
209 : so we do not cache it twice but also don't insist on the 'put' to
210 : succeed. */
211 10 : GNUNET_assert (0 == pthread_mutex_lock (&lock));
212 10 : (void) GNUNET_CONTAINER_multihashmap_put (cache,
213 : &h,
214 : (void *) cached,
215 : GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
216 10 : GNUNET_assert (0 == pthread_mutex_unlock (&lock));
217 :
218 10 : if (0 == strcmp (cached,
219 : "revoked"))
220 : {
221 0 : TALER_LOG_WARNING (
222 : "Invalid signature on /deposit-confirmation request: key was revoked\n");
223 0 : return TALER_MHD_reply_with_error (connection,
224 : MHD_HTTP_GONE,
225 : TALER_EC_AUDITOR_EXCHANGE_SIGNING_KEY_REVOKED,
226 : "exchange signing key was revoked");
227 : }
228 :
229 : /* check deposit confirmation signature */
230 10 : if (GNUNET_OK !=
231 10 : TALER_exchange_online_deposit_confirmation_verify (
232 : &dc->h_contract_terms,
233 : &dc->h_wire,
234 : &dc->h_policy,
235 : dc->exchange_timestamp,
236 : dc->wire_deadline,
237 : dc->refund_deadline,
238 : &dc->total_without_fee,
239 10 : dc->num_coins,
240 : coin_sigps,
241 : &dc->merchant,
242 : &dc->exchange_pub,
243 : &dc->exchange_sig))
244 : {
245 0 : TALER_LOG_WARNING (
246 : "Invalid signature on /deposit-confirmation request\n");
247 0 : return TALER_MHD_reply_with_error (connection,
248 : MHD_HTTP_FORBIDDEN,
249 : TALER_EC_AUDITOR_DEPOSIT_CONFIRMATION_SIGNATURE_INVALID,
250 : "exchange signature invalid");
251 : }
252 :
253 : /* execute transaction */
254 10 : qs = TAH_plugin->insert_deposit_confirmation (TAH_plugin->cls,
255 : dc);
256 10 : if (0 > qs)
257 : {
258 0 : GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs);
259 0 : TALER_LOG_WARNING ("Failed to store /deposit-confirmation in database\n");
260 0 : return TALER_MHD_reply_with_error (connection,
261 : MHD_HTTP_INTERNAL_SERVER_ERROR,
262 : TALER_EC_GENERIC_DB_STORE_FAILED,
263 : "deposit confirmation");
264 : }
265 10 : return TALER_MHD_REPLY_JSON_PACK (connection,
266 : MHD_HTTP_OK,
267 : GNUNET_JSON_pack_string ("status",
268 : "DEPOSIT_CONFIRMATION_OK"));
269 : }
270 :
271 :
272 : MHD_RESULT
273 30 : TAH_DEPOSIT_CONFIRMATION_handler (
274 : struct TAH_RequestHandler *rh,
275 : struct MHD_Connection *connection,
276 : void **connection_cls,
277 : const char *upload_data,
278 : size_t *upload_data_size,
279 : const char *const args[])
280 : {
281 30 : struct TALER_AUDITORDB_DepositConfirmation dc = {
282 : .refund_deadline = GNUNET_TIME_UNIT_ZERO_TS
283 : };
284 : struct TALER_AUDITORDB_ExchangeSigningKey es;
285 : const json_t *jcoin_sigs;
286 : const json_t *jcoin_pubs;
287 : struct GNUNET_JSON_Specification spec[] = {
288 30 : GNUNET_JSON_spec_fixed_auto ("h_contract_terms",
289 : &dc.h_contract_terms),
290 30 : GNUNET_JSON_spec_fixed_auto ("h_policy",
291 : &dc.h_policy),
292 30 : GNUNET_JSON_spec_fixed_auto ("h_wire",
293 : &dc.h_wire),
294 30 : GNUNET_JSON_spec_timestamp ("exchange_timestamp",
295 : &dc.exchange_timestamp),
296 30 : GNUNET_JSON_spec_mark_optional (
297 : GNUNET_JSON_spec_timestamp ("refund_deadline",
298 : &dc.refund_deadline),
299 : NULL),
300 30 : GNUNET_JSON_spec_timestamp ("wire_deadline",
301 : &dc.wire_deadline),
302 30 : TALER_JSON_spec_amount ("total_without_fee",
303 : TAH_currency,
304 : &dc.total_without_fee),
305 30 : GNUNET_JSON_spec_array_const ("coin_pubs",
306 : &jcoin_pubs),
307 30 : GNUNET_JSON_spec_array_const ("coin_sigs",
308 : &jcoin_sigs),
309 30 : GNUNET_JSON_spec_fixed_auto ("merchant_pub",
310 : &dc.merchant),
311 30 : GNUNET_JSON_spec_fixed_auto ("exchange_sig",
312 : &dc.exchange_sig),
313 30 : GNUNET_JSON_spec_fixed_auto ("exchange_pub",
314 : &dc.exchange_pub),
315 30 : GNUNET_JSON_spec_timestamp ("ep_start",
316 : &es.ep_start),
317 30 : GNUNET_JSON_spec_timestamp ("ep_expire",
318 : &es.ep_expire),
319 30 : GNUNET_JSON_spec_timestamp ("ep_end",
320 : &es.ep_end),
321 30 : GNUNET_JSON_spec_fixed_auto ("master_sig",
322 : &es.master_sig),
323 30 : GNUNET_JSON_spec_end ()
324 : };
325 : unsigned int num_coins;
326 : json_t *json;
327 :
328 : (void) rh;
329 : (void) connection_cls;
330 : (void) upload_data;
331 : (void) upload_data_size;
332 : {
333 : enum GNUNET_GenericReturnValue res;
334 :
335 30 : res = TALER_MHD_parse_post_json (connection,
336 : connection_cls,
337 : upload_data,
338 : upload_data_size,
339 : &json);
340 30 : if (GNUNET_SYSERR == res)
341 0 : return MHD_NO;
342 30 : if ((GNUNET_NO == res) ||
343 30 : (NULL == json))
344 20 : return MHD_YES;
345 10 : dc.master_sig = es.master_sig;
346 10 : res = TALER_MHD_parse_json_data (connection,
347 : json,
348 : spec);
349 10 : if (GNUNET_SYSERR == res)
350 : {
351 0 : json_decref (json);
352 0 : return MHD_NO; /* hard failure */
353 : }
354 10 : if (GNUNET_NO == res)
355 : {
356 0 : json_decref (json);
357 0 : return MHD_YES; /* failure */
358 : }
359 : }
360 10 : num_coins = json_array_size (jcoin_sigs);
361 10 : if (num_coins != json_array_size (jcoin_pubs))
362 : {
363 0 : GNUNET_break_op (0);
364 0 : json_decref (json);
365 0 : return TALER_MHD_reply_with_ec (
366 : connection,
367 : TALER_EC_GENERIC_PARAMETER_MALFORMED,
368 : "coin_pubs.length != coin_sigs.length");
369 : }
370 10 : if (0 == num_coins)
371 : {
372 0 : GNUNET_break_op (0);
373 0 : json_decref (json);
374 0 : return TALER_MHD_reply_with_ec (
375 : connection,
376 : TALER_EC_GENERIC_PARAMETER_MALFORMED,
377 : "coin_pubs array is empty");
378 : }
379 10 : {
380 10 : struct TALER_CoinSpendPublicKeyP coin_pubs[num_coins];
381 10 : struct TALER_CoinSpendSignatureP coin_sigs[num_coins];
382 : MHD_RESULT res;
383 :
384 20 : for (unsigned int i = 0; i < num_coins; i++)
385 : {
386 10 : json_t *jpub = json_array_get (jcoin_pubs,
387 : i);
388 10 : json_t *jsig = json_array_get (jcoin_sigs,
389 : i);
390 10 : const char *ps = json_string_value (jpub);
391 10 : const char *ss = json_string_value (jsig);
392 :
393 20 : if ((NULL == ps) ||
394 : (GNUNET_OK !=
395 10 : GNUNET_STRINGS_string_to_data (ps,
396 : strlen (ps),
397 10 : &coin_pubs[i],
398 : sizeof(coin_pubs[i]))))
399 : {
400 0 : GNUNET_break_op (0);
401 0 : json_decref (json);
402 0 : return TALER_MHD_reply_with_ec (
403 : connection,
404 : TALER_EC_GENERIC_PARAMETER_MALFORMED,
405 : "coin_pub[] malformed");
406 : }
407 20 : if ((NULL == ss) ||
408 : (GNUNET_OK !=
409 10 : GNUNET_STRINGS_string_to_data (ss,
410 : strlen (ss),
411 10 : &coin_sigs[i],
412 : sizeof(coin_sigs[i]))))
413 : {
414 0 : GNUNET_break_op (0);
415 0 : json_decref (json);
416 0 : return TALER_MHD_reply_with_ec (
417 : connection,
418 : TALER_EC_GENERIC_PARAMETER_MALFORMED,
419 : "coin_sig[] malformed");
420 : }
421 : }
422 10 : dc.num_coins = num_coins;
423 10 : dc.coin_pubs = coin_pubs;
424 10 : dc.coin_sigs = coin_sigs;
425 10 : es.exchange_pub = dc.exchange_pub; /* used twice! */
426 10 : res = verify_and_execute_deposit_confirmation (connection,
427 : &dc,
428 : &es);
429 10 : GNUNET_JSON_parse_free (spec);
430 10 : json_decref (json);
431 10 : return res;
432 : }
433 : }
434 :
435 :
436 : void
437 36 : TEAH_DEPOSIT_CONFIRMATION_init (void)
438 : {
439 36 : cache = GNUNET_CONTAINER_multihashmap_create (32,
440 : GNUNET_NO);
441 36 : GNUNET_assert (0 == pthread_mutex_init (&lock, NULL));
442 36 : }
443 :
444 :
445 : void
446 36 : TEAH_DEPOSIT_CONFIRMATION_done (void)
447 : {
448 36 : if (NULL != cache)
449 : {
450 36 : GNUNET_CONTAINER_multihashmap_destroy (cache);
451 36 : cache = NULL;
452 36 : GNUNET_assert (0 == pthread_mutex_destroy (&lock));
453 : }
454 36 : }
|