1use anyhow::{Context as _, Error, Result, bail, ensure};
4use deltachat_contact_tools::ContactAddress;
5use percent_encoding::{AsciiSet, utf8_percent_encode};
6
7use crate::chat::{
8 self, Chat, ChatId, ChatIdBlocked, add_info_msg, get_chat_id_by_grpid, load_broadcast_secret,
9};
10use crate::config::Config;
11use crate::constants::{
12 BROADCAST_INCOMPATIBILITY_MSG, Blocked, Chattype, NON_ALPHANUMERIC_WITHOUT_DOT,
13};
14use crate::contact::mark_contact_id_as_verified;
15use crate::contact::{Contact, ContactId, Origin};
16use crate::context::Context;
17use crate::e2ee::ensure_secret_key_exists;
18use crate::events::EventType;
19use crate::headerdef::HeaderDef;
20use crate::key::{DcKey, Fingerprint, load_self_public_key, self_fingerprint};
21use crate::log::LogExt as _;
22use crate::log::warn;
23use crate::message::{self, Message, MsgId, Viewtype};
24use crate::mimeparser::{MimeMessage, SystemMessage};
25use crate::param::Param;
26use crate::qr::check_qr;
27use crate::securejoin::bob::JoinerProgress;
28use crate::sync::Sync::*;
29use crate::tools::{create_id, create_outgoing_rfc724_mid, time};
30use crate::{SecurejoinSource, mimefactory, stats};
31use crate::{SecurejoinUiPath, token};
32
33mod bob;
34mod qrinvite;
35
36pub(crate) use qrinvite::QrInvite;
37
38use crate::token::Namespace;
39
40const VERIFICATION_TIMEOUT_SECONDS: i64 = 7 * 24 * 3600;
48
49const DISALLOWED_CHARACTERS: &AsciiSet = &NON_ALPHANUMERIC_WITHOUT_DOT.remove(b'_');
50
51fn inviter_progress(
52 context: &Context,
53 contact_id: ContactId,
54 chat_id: ChatId,
55 chat_type: Chattype,
56) -> Result<()> {
57 let progress = 1000;
59 context.emit_event(EventType::SecurejoinInviterProgress {
60 contact_id,
61 chat_id,
62 chat_type,
63 progress,
64 });
65
66 Ok(())
67}
68
69fn shorten_name(name: &str, length: usize) -> String {
72 if name.chars().count() > length {
73 format!(
75 "{}_",
76 name.chars()
77 .take(length.saturating_sub(1))
78 .collect::<String>()
79 )
80 } else {
81 name.to_string()
82 }
83}
84
85pub async fn get_securejoin_qr(context: &Context, chat: Option<ChatId>) -> Result<String> {
90 ensure_secret_key_exists(context).await.ok();
96
97 let chat = match chat {
98 Some(id) => {
99 let chat = Chat::load_from_db(context, id).await?;
100 ensure!(
101 chat.typ == Chattype::Group || chat.typ == Chattype::OutBroadcast,
102 "Can't generate SecureJoin QR code for chat {id} of type {}",
103 chat.typ
104 );
105 if chat.grpid.is_empty() {
106 let err = format!("Can't generate QR code, chat {id} is a email thread");
107 error!(context, "get_securejoin_qr: {}.", err);
108 bail!(err);
109 }
110 if chat.typ == Chattype::OutBroadcast {
111 if load_broadcast_secret(context, chat.id).await?.is_none() {
114 error!(
115 context,
116 "Not creating securejoin QR for old broadcast {}, see chat for more info.",
117 chat.id,
118 );
119 let text = BROADCAST_INCOMPATIBILITY_MSG;
120 add_info_msg(context, chat.id, text).await?;
121 bail!(text.to_string());
122 }
123 }
124 Some(chat)
125 }
126 None => None,
127 };
128 let grpid = chat.as_ref().map(|c| c.grpid.as_str());
129 let invitenumber = token::lookup_or_new(context, Namespace::InviteNumber, grpid).await?;
131
132 let auth = create_id();
142 token::save(context, Namespace::Auth, grpid, &auth, time()).await?;
143
144 let fingerprint = self_fingerprint(context).await?;
145
146 let self_addr = context.get_primary_self_addr().await?;
147 let self_addr_urlencoded = utf8_percent_encode(&self_addr, DISALLOWED_CHARACTERS).to_string();
148
149 let self_name = context
150 .get_config(Config::Displayname)
151 .await?
152 .unwrap_or_default();
153
154 let qr = if let Some(chat) = chat {
155 context
156 .sync_qr_code_tokens(Some(chat.grpid.as_str()))
157 .await?;
158 context.scheduler.interrupt_smtp().await;
159
160 let chat_name = chat.get_name();
161 let chat_name_shortened = shorten_name(chat_name, 25);
162 let chat_name_urlencoded = utf8_percent_encode(&chat_name_shortened, DISALLOWED_CHARACTERS)
163 .to_string()
164 .replace("%20", "+");
165 let grpid = &chat.grpid;
166
167 let self_name_shortened = shorten_name(&self_name, 16);
168 let self_name_urlencoded = utf8_percent_encode(&self_name_shortened, DISALLOWED_CHARACTERS)
169 .to_string()
170 .replace("%20", "+");
171
172 if chat.typ == Chattype::OutBroadcast {
173 format!(
175 "https://i.delta.chat/#{fingerprint}&v=3&x={grpid}&j={invitenumber}&s={auth}&a={self_addr_urlencoded}&n={self_name_urlencoded}&b={chat_name_urlencoded}",
176 )
177 } else {
178 format!(
179 "https://i.delta.chat/#{fingerprint}&v=3&x={grpid}&i={invitenumber}&s={auth}&a={self_addr_urlencoded}&n={self_name_urlencoded}&g={chat_name_urlencoded}",
180 )
181 }
182 } else {
183 let self_name_shortened = shorten_name(&self_name, 25);
184 let self_name_urlencoded = utf8_percent_encode(&self_name_shortened, DISALLOWED_CHARACTERS)
185 .to_string()
186 .replace("%20", "+");
187
188 context.sync_qr_code_tokens(None).await?;
189 context.scheduler.interrupt_smtp().await;
190
191 format!(
192 "https://i.delta.chat/#{fingerprint}&v=3&i={invitenumber}&s={auth}&a={self_addr_urlencoded}&n={self_name_urlencoded}",
193 )
194 };
195
196 info!(context, "Generated QR code.");
197 Ok(qr)
198}
199
200async fn get_self_fingerprint(context: &Context) -> Result<Fingerprint> {
201 let key = load_self_public_key(context)
202 .await
203 .context("Failed to load key")?;
204 Ok(key.dc_fingerprint())
205}
206
207pub async fn join_securejoin(context: &Context, qr: &str) -> Result<ChatId> {
214 join_securejoin_with_ux_info(context, qr, None, None).await
215}
216
217pub async fn join_securejoin_with_ux_info(
228 context: &Context,
229 qr: &str,
230 source: Option<SecurejoinSource>,
231 uipath: Option<SecurejoinUiPath>,
232) -> Result<ChatId> {
233 let res = securejoin(context, qr).await.map_err(|err| {
234 warn!(context, "Fatal joiner error: {:#}", err);
235 error!(context, "QR process failed");
237 err
238 })?;
239
240 stats::count_securejoin_ux_info(context, source, uipath)
241 .await
242 .log_err(context)
243 .ok();
244
245 Ok(res)
246}
247
248async fn securejoin(context: &Context, qr: &str) -> Result<ChatId> {
249 info!(context, "Requesting secure-join ...",);
255 let qr_scan = check_qr(context, qr).await?;
256
257 let invite = QrInvite::try_from(qr_scan)?;
258
259 stats::count_securejoin_invite(context, &invite)
260 .await
261 .log_err(context)
262 .ok();
263
264 bob::start_protocol(context, invite).await
265}
266
267async fn send_alice_handshake_msg(
269 context: &Context,
270 contact_id: ContactId,
271 step: &str,
272) -> Result<()> {
273 let mut msg = Message {
274 viewtype: Viewtype::Text,
275 text: format!("Secure-Join: {step}"),
276 hidden: true,
277 ..Default::default()
278 };
279 msg.param.set_cmd(SystemMessage::SecurejoinMessage);
280 msg.param.set(Param::Arg, step);
281 msg.param.set_int(Param::GuaranteeE2ee, 1);
282 chat::send_msg(
283 context,
284 ChatIdBlocked::get_for_contact(context, contact_id, Blocked::Yes)
285 .await?
286 .id,
287 &mut msg,
288 )
289 .await?;
290 Ok(())
291}
292
293async fn info_chat_id(context: &Context, contact_id: ContactId) -> Result<ChatId> {
295 let chat_id_blocked = ChatIdBlocked::get_for_contact(context, contact_id, Blocked::Not).await?;
296 Ok(chat_id_blocked.id)
297}
298
299async fn verify_sender_by_fingerprint(
302 context: &Context,
303 fingerprint: &Fingerprint,
304 contact_id: ContactId,
305) -> Result<bool> {
306 let Some(contact) = Contact::get_by_id_optional(context, contact_id).await? else {
307 return Ok(false);
308 };
309 let is_verified = contact.fingerprint().is_some_and(|fp| &fp == fingerprint);
310 if is_verified {
311 mark_contact_id_as_verified(context, contact_id, Some(ContactId::SELF)).await?;
312 }
313 Ok(is_verified)
314}
315
316#[derive(Debug, PartialEq, Eq)]
323pub(crate) enum HandshakeMessage {
324 Done,
328 Ignore,
335 Propagate,
340}
341
342#[derive(Debug, Display, PartialEq, Eq)]
344pub(crate) enum SecureJoinStep {
345 Request { invitenumber: String },
347
348 AuthRequired,
350
351 RequestPubkey,
353
354 Pubkey,
356
357 RequestWithAuth,
359
360 ContactConfirm,
362
363 MemberAdded,
365
366 Deprecated,
368
369 Unknown { step: String },
371}
372
373pub(crate) fn get_secure_join_step(mime_message: &MimeMessage) -> Option<SecureJoinStep> {
377 if let Some(invitenumber) = mime_message.get_header(HeaderDef::SecureJoinInvitenumber) {
378 Some(SecureJoinStep::Request {
382 invitenumber: invitenumber.to_string(),
383 })
384 } else if let Some(step) = mime_message.get_header(HeaderDef::SecureJoin) {
385 match step {
386 "vc-request-pubkey" => Some(SecureJoinStep::RequestPubkey),
387 "vc-pubkey" => Some(SecureJoinStep::Pubkey),
388 "vg-auth-required" | "vc-auth-required" => Some(SecureJoinStep::AuthRequired),
389 "vg-request-with-auth" | "vc-request-with-auth" => {
390 Some(SecureJoinStep::RequestWithAuth)
391 }
392 "vc-contact-confirm" => Some(SecureJoinStep::ContactConfirm),
393 "vg-member-added" => Some(SecureJoinStep::MemberAdded),
394 "vg-member-added-received" | "vc-contact-confirm-received" => {
395 Some(SecureJoinStep::Deprecated)
396 }
397 step => Some(SecureJoinStep::Unknown {
398 step: step.to_string(),
399 }),
400 }
401 } else {
402 None
403 }
404}
405
406#[expect(clippy::arithmetic_side_effects)]
418pub(crate) async fn handle_securejoin_handshake(
419 context: &Context,
420 mime_message: &mut MimeMessage,
421 contact_id: ContactId,
422) -> Result<HandshakeMessage> {
423 if contact_id.is_special() {
424 return Err(Error::msg("Can not be called with special contact ID"));
425 }
426
427 let step = get_secure_join_step(mime_message).context("Not a Secure-Join message")?;
428
429 info!(context, "Received secure-join message {step:?}.");
430
431 if !matches!(
447 step,
448 SecureJoinStep::Request { .. } | SecureJoinStep::RequestPubkey | SecureJoinStep::Pubkey
449 ) {
450 let mut self_found = false;
451 let self_fingerprint = load_self_public_key(context).await?.dc_fingerprint();
452 for key in mime_message.gossiped_keys.values() {
453 if key.public_key.dc_fingerprint() == self_fingerprint {
454 self_found = true;
455 break;
456 }
457 }
458 if !self_found {
459 warn!(context, "Step {step}: No self addr+pubkey gossip found.");
462 return Ok(HandshakeMessage::Ignore);
463 }
464 }
465
466 match step {
467 SecureJoinStep::Request { ref invitenumber } => {
468 if !token::exists(context, token::Namespace::InviteNumber, invitenumber).await? {
478 warn!(context, "Secure-join denied (bad invitenumber).");
479 return Ok(HandshakeMessage::Ignore);
480 }
481
482 let from_addr = ContactAddress::new(&mime_message.from.addr)?;
483 let autocrypt_fingerprint = mime_message.autocrypt_fingerprint.as_deref().unwrap_or("");
484 let (autocrypt_contact_id, _) = Contact::add_or_lookup_ex(
485 context,
486 "",
487 &from_addr,
488 autocrypt_fingerprint,
489 Origin::IncomingUnknownFrom,
490 )
491 .await?;
492
493 let prefix = mime_message
494 .get_header(HeaderDef::SecureJoin)
495 .and_then(|step| step.get(..2))
496 .unwrap_or("vc");
497
498 send_alice_handshake_msg(
500 context,
501 autocrypt_contact_id,
502 &format!("{prefix}-auth-required"),
503 )
504 .await
505 .context("failed sending auth-required handshake message")?;
506 Ok(HandshakeMessage::Done)
507 }
508 SecureJoinStep::AuthRequired => {
509 bob::handle_auth_required_or_pubkey(context, mime_message).await
514 }
515 SecureJoinStep::RequestPubkey => {
516 debug_assert!(
522 mime_message.signature.is_none(),
523 "RequestPubkey is not supposed to be signed"
524 );
525 let Some(auth) = mime_message.get_header(HeaderDef::SecureJoinAuth) else {
526 warn!(
527 context,
528 "Ignoring {step} message because of missing auth code."
529 );
530 return Ok(HandshakeMessage::Ignore);
531 };
532 if !token::exists(context, token::Namespace::Auth, auth).await? {
533 warn!(context, "Secure-join denied (bad auth).");
534 return Ok(HandshakeMessage::Ignore);
535 }
536
537 let rfc724_mid = create_outgoing_rfc724_mid();
538 let addr = ContactAddress::new(&mime_message.from.addr)?;
539 let attach_self_pubkey = true;
540 let self_fp = self_fingerprint(context).await?;
541 let shared_secret = format!("securejoin/{self_fp}/{auth}");
542 let rendered_message = mimefactory::render_symm_encrypted_securejoin_message(
543 context,
544 "vc-pubkey",
545 &rfc724_mid,
546 attach_self_pubkey,
547 auth,
548 &shared_secret,
549 )
550 .await?;
551
552 let msg_id = message::insert_tombstone(context, &rfc724_mid).await?;
553 insert_into_smtp(context, &rfc724_mid, &addr, rendered_message, msg_id).await?;
554 context.scheduler.interrupt_smtp().await;
555
556 Ok(HandshakeMessage::Done)
557 }
558 SecureJoinStep::Pubkey => {
559 bob::handle_auth_required_or_pubkey(context, mime_message).await
564 }
565 SecureJoinStep::RequestWithAuth => {
566 let Some(fp) = mime_message.get_header(HeaderDef::SecureJoinFingerprint) else {
574 warn!(
575 context,
576 "Ignoring {step} message because fingerprint is not provided."
577 );
578 return Ok(HandshakeMessage::Ignore);
579 };
580 let fingerprint: Fingerprint = fp.parse()?;
581 if !encrypted_and_signed(context, mime_message, &fingerprint) {
582 warn!(
583 context,
584 "Ignoring {step} message because the message is not encrypted."
585 );
586 return Ok(HandshakeMessage::Ignore);
587 }
588 let Some(auth) = mime_message.get_header(HeaderDef::SecureJoinAuth) else {
590 warn!(
591 context,
592 "Ignoring {step} message because of missing auth code."
593 );
594 return Ok(HandshakeMessage::Ignore);
595 };
596 let Some((grpid, timestamp)) = context
597 .sql
598 .query_row_optional(
599 "SELECT foreign_key, timestamp FROM tokens WHERE namespc=? AND token=?",
600 (Namespace::Auth, auth),
601 |row| {
602 let foreign_key: String = row.get(0)?;
603 let timestamp: i64 = row.get(1)?;
604 Ok((foreign_key, timestamp))
605 },
606 )
607 .await?
608 else {
609 warn!(
610 context,
611 "Ignoring {step} message because of invalid auth code."
612 );
613 return Ok(HandshakeMessage::Ignore);
614 };
615 let joining_chat_id = match grpid.as_str() {
616 "" => None,
617 id => {
618 let Some((chat_id, ..)) = get_chat_id_by_grpid(context, id).await? else {
619 warn!(context, "Ignoring {step} message: unknown grpid {id}.",);
620 return Ok(HandshakeMessage::Ignore);
621 };
622 Some(chat_id)
623 }
624 };
625
626 let sender_contact = Contact::get_by_id(context, contact_id).await?;
627 if sender_contact
628 .fingerprint()
629 .is_none_or(|fp| fp != fingerprint)
630 {
631 warn!(
632 context,
633 "Ignoring {step} message because of fingerprint mismatch."
634 );
635 return Ok(HandshakeMessage::Ignore);
636 }
637 info!(context, "Fingerprint verified via Auth code.",);
638
639 if time() < timestamp + VERIFICATION_TIMEOUT_SECONDS {
641 mark_contact_id_as_verified(context, contact_id, Some(ContactId::SELF)).await?;
642 }
643 contact_id.regossip_keys(context).await?;
644 if grpid.is_empty() {
647 ChatId::create_for_contact(context, contact_id).await?;
648 }
649 if let Some(joining_chat_id) = joining_chat_id {
650 chat::add_contact_to_chat_ex(context, Nosync, joining_chat_id, contact_id, true)
651 .await?;
652
653 let chat = Chat::load_from_db(context, joining_chat_id).await?;
654
655 if chat.typ == Chattype::OutBroadcast {
656 chat.sync_contacts(context).await.log_err(context).ok();
659 } else {
660 ContactId::scaleup_origin(context, &[contact_id], Origin::SecurejoinInvited)
661 .await?;
662 context.emit_event(EventType::ContactsChanged(Some(contact_id)));
663 }
664
665 inviter_progress(context, contact_id, joining_chat_id, chat.typ)?;
666 Ok(HandshakeMessage::Done)
669 } else {
670 let chat_id = info_chat_id(context, contact_id).await?;
671 send_alice_handshake_msg(context, contact_id, "vc-contact-confirm")
673 .await
674 .context("failed sending vc-contact-confirm message")?;
675
676 inviter_progress(context, contact_id, chat_id, Chattype::Single)?;
677 Ok(HandshakeMessage::Ignore) }
679 }
680 SecureJoinStep::ContactConfirm => {
685 context.emit_event(EventType::SecurejoinJoinerProgress {
686 contact_id,
687 progress: JoinerProgress::Succeeded.into_u16(),
688 });
689 Ok(HandshakeMessage::Ignore)
690 }
691 SecureJoinStep::MemberAdded => {
692 let Some(member_added) = mime_message.get_header(HeaderDef::ChatGroupMemberAdded)
693 else {
694 warn!(
695 context,
696 "vg-member-added without Chat-Group-Member-Added header."
697 );
698 return Ok(HandshakeMessage::Propagate);
699 };
700 if !context.is_self_addr(member_added).await? {
701 info!(
702 context,
703 "Member {member_added} added by unrelated SecureJoin process."
704 );
705 return Ok(HandshakeMessage::Propagate);
706 }
707
708 context.emit_event(EventType::SecurejoinJoinerProgress {
709 contact_id,
710 progress: JoinerProgress::Succeeded.into_u16(),
711 });
712 Ok(HandshakeMessage::Propagate)
713 }
714 SecureJoinStep::Deprecated => {
715 Ok(HandshakeMessage::Done)
717 }
718 SecureJoinStep::Unknown { ref step } => {
719 warn!(context, "Invalid SecureJoin step: {step:?}.");
720 Ok(HandshakeMessage::Ignore)
721 }
722 }
723}
724
725async fn insert_into_smtp(
726 context: &Context,
727 rfc724_mid: &str,
728 recipient: &str,
729 rendered_message: String,
730 msg_id: MsgId,
731) -> Result<(), Error> {
732 context
733 .sql
734 .execute(
735 "INSERT INTO smtp (rfc724_mid, recipients, mime, msg_id)
736 VALUES (?1, ?2, ?3, ?4)",
737 (&rfc724_mid, &recipient, &rendered_message, msg_id),
738 )
739 .await?;
740 Ok(())
741}
742
743pub(crate) async fn observe_securejoin_on_other_device(
761 context: &Context,
762 mime_message: &MimeMessage,
763 contact_id: ContactId,
764) -> Result<HandshakeMessage> {
765 if contact_id.is_special() {
766 return Err(Error::msg("Can not be called with special contact ID"));
767 }
768 let step = get_secure_join_step(mime_message).context("Not a Secure-Join message")?;
769 info!(context, "Observing secure-join message {step:?}.");
770
771 match step {
772 SecureJoinStep::Request { .. }
773 | SecureJoinStep::AuthRequired
774 | SecureJoinStep::RequestPubkey
775 | SecureJoinStep::Pubkey
776 | SecureJoinStep::Deprecated
777 | SecureJoinStep::Unknown { .. } => {
778 return Ok(HandshakeMessage::Ignore);
779 }
780 SecureJoinStep::RequestWithAuth
781 | SecureJoinStep::MemberAdded
782 | SecureJoinStep::ContactConfirm => {}
783 }
784
785 if !encrypted_and_signed(context, mime_message, &get_self_fingerprint(context).await?) {
786 warn!(
787 context,
788 "Observed SecureJoin message is not encrypted correctly."
789 );
790 return Ok(HandshakeMessage::Ignore);
791 }
792
793 let contact = Contact::get_by_id(context, contact_id).await?;
794 let addr = contact.get_addr().to_lowercase();
795
796 let Some(key) = mime_message.gossiped_keys.get(&addr) else {
797 warn!(context, "No gossip header for {addr} at step {step}.");
798 return Ok(HandshakeMessage::Ignore);
799 };
800
801 let Some(contact_fingerprint) = contact.fingerprint() else {
802 warn!(context, "Contact does not have a fingerprint.");
804 return Ok(HandshakeMessage::Ignore);
805 };
806
807 if key.public_key.dc_fingerprint() != contact_fingerprint {
808 warn!(context, "Fingerprint does not match.");
810 return Ok(HandshakeMessage::Ignore);
811 }
812
813 mark_contact_id_as_verified(context, contact_id, Some(ContactId::SELF)).await?;
814
815 if matches!(
816 step,
817 SecureJoinStep::MemberAdded | SecureJoinStep::ContactConfirm
818 ) {
819 let chat_type = if mime_message
820 .get_header(HeaderDef::ChatGroupMemberAdded)
821 .is_none()
822 {
823 Chattype::Single
824 } else if mime_message.get_header(HeaderDef::ListId).is_some() {
825 Chattype::OutBroadcast
826 } else {
827 Chattype::Group
828 };
829
830 let chat_id = ChatId::new(0);
838 inviter_progress(context, contact_id, chat_id, chat_type)?;
839 }
840
841 if matches!(step, SecureJoinStep::MemberAdded) {
842 Ok(HandshakeMessage::Propagate)
843 } else {
844 Ok(HandshakeMessage::Ignore)
845 }
846}
847
848fn encrypted_and_signed(
853 context: &Context,
854 mimeparser: &MimeMessage,
855 expected_fingerprint: &Fingerprint,
856) -> bool {
857 if let Some((signature, _)) = mimeparser.signature.as_ref() {
858 if signature == expected_fingerprint {
859 true
860 } else {
861 warn!(
862 context,
863 "Message does not match expected fingerprint {}.",
864 expected_fingerprint.human_readable()
865 );
866 false
867 }
868 } else {
869 warn!(context, "Message not encrypted.",);
870 false
871 }
872}
873
874#[cfg(test)]
875mod securejoin_tests;