electrum

Electrum Bitcoin wallet
git clone https://git.parazyd.org/electrum
Log | Files | Refs | Submodules

commit f3c4a55e77ef648310b835f95197776cb2584661
parent 652f0d0b7fc33f53679628ac73e9e43062e50319
Author: ThomasV <thomasv@gitorious>
Date:   Tue,  7 Jul 2015 08:59:03 +0200

add dnssec verification to payment requests

Diffstat:
Mgui/qt/main_window.py | 18++++++++++++++----
Mlib/bitcoin.py | 12++++++++----
Mlib/paymentrequest.py | 70+++++++++++++++++++++++++++++++++++++++++++++++++++++-----------------
3 files changed, 75 insertions(+), 25 deletions(-)

diff --git a/gui/qt/main_window.py b/gui/qt/main_window.py @@ -720,8 +720,18 @@ class ElectrumWindow(QMainWindow): self.save_request_button.setEnabled(False) def export_payment_request(self, addr): + alias = str(self.config.get('alias')) + alias_privkey = None + if alias: + alias_info = self.contacts.resolve_openalias(alias) + if alias_info: + alias_addr, alias_name = alias_info + if alias_addr and self.wallet.is_mine(alias_addr): + password = self.password_dialog() + alias_privkey = self.wallet.get_private_key(alias_addr, password)[0] + r = self.wallet.get_payment_request(addr, self.config) - pr = paymentrequest.make_request(self.config, r) + pr = paymentrequest.make_request(self.config, r, alias, alias_privkey) name = r['id'] + '.bip70' fileName = self.getSaveFileName(_("Select where to save your payment request"), name, "*.bip70") if fileName: @@ -1272,7 +1282,7 @@ class ElectrumWindow(QMainWindow): def get_payment_request_thread(): self.payment_request = get_payment_request(request_url) - if self.payment_request.verify(): + if self.payment_request.verify(self.contacts): self.emit(SIGNAL('payment_request_ok')) else: self.emit(SIGNAL('payment_request_error')) @@ -1485,7 +1495,7 @@ class ElectrumWindow(QMainWindow): def show_invoice(self, key): pr = self.invoices.get(key) - pr.verify() + pr.verify(self.contacts) self.show_pr_details(pr) def show_pr_details(self, pr): @@ -1521,7 +1531,7 @@ class ElectrumWindow(QMainWindow): pr = self.invoices.get(key) self.payment_request = pr self.prepare_for_payment_request() - if pr.verify(): + if pr.verify(self.contacts): self.payment_request_ok() else: self.payment_request_error() diff --git a/lib/bitcoin.py b/lib/bitcoin.py @@ -478,11 +478,15 @@ class EC_KEY(object): def get_public_key(self, compressed=True): return point_to_ser(self.pubkey.point, compressed).encode('hex') - def sign_message(self, message, compressed, address): - private_key = ecdsa.SigningKey.from_secret_exponent( self.secret, curve = SECP256k1 ) + def sign(self, msg_hash): + private_key = ecdsa.SigningKey.from_secret_exponent(self.secret, curve = SECP256k1) public_key = private_key.get_verifying_key() - signature = private_key.sign_digest_deterministic( Hash( msg_magic(message) ), hashfunc=hashlib.sha256, sigencode = ecdsa.util.sigencode_string ) - assert public_key.verify_digest( signature, Hash( msg_magic(message) ), sigdecode = ecdsa.util.sigdecode_string) + signature = private_key.sign_digest_deterministic(msg_hash, hashfunc=hashlib.sha256, sigencode = ecdsa.util.sigencode_string) + assert public_key.verify_digest(signature, msg_hash, sigdecode = ecdsa.util.sigdecode_string) + return signature + + def sign_message(self, message, compressed, address): + signature = self.sign(Hash(msg_magic(message))) for i in range(4): sig = base64.b64encode(chr(27 + i + (4 if compressed else 0)) + signature) try: diff --git a/lib/paymentrequest.py b/lib/paymentrequest.py @@ -98,19 +98,29 @@ class PaymentRequest: self.memo = self.details.memo self.payment_url = self.details.payment_url - def verify(self): - """ verify chain of certificates. The last certificate is the CA""" - if not ca_list: - self.error = "Trusted certificate authorities list not found" - return False + def verify(self, contacts): if not self.raw: self.error = "Empty request" return - paymntreq = pb2.PaymentRequest() - paymntreq.ParseFromString(self.raw) - if not paymntreq.signature: + pr = pb2.PaymentRequest() + pr.ParseFromString(self.raw) + if not pr.signature: self.error = "No signature" return + + if pr.pki_type in ["x509+sha256", "x509+sha1"]: + return self.verify_x509(pr) + elif pr.pki_type in ["dnssec+btc", "dnssec+ecdsa"]: + return self.verify_dnssec(pr, contacts) + else: + self.error = "ERROR: Unsupported PKI Type for Message Signature" + return False + + def verify_x509(self, paymntreq): + """ verify chain of certificates. The last certificate is the CA""" + if not ca_list: + self.error = "Trusted certificate authorities list not found" + return False cert = pb2.X509Certificates() cert.ParseFromString(paymntreq.pki_data) cert_num = len(cert.certificate) @@ -184,9 +194,6 @@ class PaymentRequest: verify = pubkey0.verify(sigBytes, x509.PREFIX_RSA_SHA256 + hashBytes) elif paymntreq.pki_type == "x509+sha1": verify = pubkey0.hashAndVerify(sigBytes, msgBytes) - else: - self.error = "ERROR: Unsupported PKI Type for Message Signature" - return False if not verify: self.error = "ERROR: Invalid Signature for Payment Request Data" return False @@ -194,6 +201,28 @@ class PaymentRequest: self.error = 'Signed by Trusted CA: ' + ca.get_common_name() return True + def verify_dnssec(self, pr, contacts): + sig = pr.signature + alias = pr.pki_data + info = contacts.resolve(alias) + if info.get('validated') is not True: + self.error = "Alias verification failed (DNSSEC)" + return False + if pr.pki_type == "dnssec+btc": + self.requestor = alias + address = info.get('address') + pr.signature = '' + message = pr.SerializeToString() + if bitcoin.verify_message(address, sig, message): + self.error = 'Verified with DNSSEC' + return True + else: + self.error = "verify failed" + return False + else: + self.error = "unknown algo" + return False + def has_expired(self): return self.details.expires and self.details.expires < int(time.time()) @@ -258,7 +287,7 @@ class PaymentRequest: -def make_payment_request(outputs, memo, time, expires, key_path, cert_path): +def make_payment_request(outputs, memo, time, expires, key_path, cert_path, alias, alias_privkey): pd = pb2.PaymentDetails() for script, amount in outputs: pd.outputs.add(amount=amount, script=script) @@ -268,9 +297,16 @@ def make_payment_request(outputs, memo, time, expires, key_path, cert_path): pr = pb2.PaymentRequest() pr.serialized_payment_details = pd.SerializeToString() pr.signature = '' - pr = pb2.PaymentRequest() - pr.serialized_payment_details = pd.SerializeToString() - pr.signature = '' + + if alias and alias_privkey: + pr.pki_type = 'dnssec+btc' + pr.pki_data = str(alias) + message = pr.SerializeToString() + ec_key = bitcoin.regenerate_key(alias_privkey) + address = bitcoin.address_from_private_key(alias_privkey) + compressed = bitcoin.is_compressed(alias_privkey) + pr.signature = ec_key.sign_message(message, compressed, address) + if key_path and cert_path: import tlslite with open(key_path, 'r') as f: @@ -289,7 +325,7 @@ def make_payment_request(outputs, memo, time, expires, key_path, cert_path): return pr.SerializeToString() -def make_request(config, req): +def make_request(config, req, alias=None, alias_privkey=None): from transaction import Transaction addr = req['address'] time = req['timestamp'] @@ -300,7 +336,7 @@ def make_request(config, req): outputs = [(script, amount)] key_path = config.get('ssl_privkey') cert_path = config.get('ssl_chain') - return make_payment_request(outputs, message, time, time + expiration if expiration else None, key_path, cert_path) + return make_payment_request(outputs, message, time, time + expiration if expiration else None, key_path, cert_path, alias, alias_privkey)