1use anyhow::{Context as _, Error, Result, bail, ensure};
4use deltachat_contact_tools::ContactAddress;
5use percent_encoding::{AsciiSet, utf8_percent_encode};
6
7use crate::chat::{
8 self, Chat, ChatId, ChatIdBlocked, add_info_msg, get_chat_id_by_grpid, load_broadcast_secret,
9};
10use crate::config::Config;
11use crate::constants::{
12 BROADCAST_INCOMPATIBILITY_MSG, Blocked, Chattype, NON_ALPHANUMERIC_WITHOUT_DOT,
13};
14use crate::contact::mark_contact_id_as_verified;
15use crate::contact::{Contact, ContactId, Origin};
16use crate::context::Context;
17use crate::e2ee::ensure_secret_key_exists;
18use crate::events::EventType;
19use crate::headerdef::HeaderDef;
20use crate::key::{DcKey, Fingerprint, load_self_public_key};
21use crate::log::LogExt as _;
22use crate::log::warn;
23use crate::message::{Message, Viewtype};
24use crate::mimeparser::{MimeMessage, SystemMessage};
25use crate::param::Param;
26use crate::qr::check_qr;
27use crate::securejoin::bob::JoinerProgress;
28use crate::sync::Sync::*;
29use crate::tools::{create_id, time};
30use crate::{SecurejoinSource, stats};
31use crate::{SecurejoinUiPath, token};
32
33mod bob;
34mod qrinvite;
35
36pub(crate) use qrinvite::QrInvite;
37
38use crate::token::Namespace;
39
40const VERIFICATION_TIMEOUT_SECONDS: i64 = 7 * 24 * 3600;
48
49const DISALLOWED_CHARACTERS: &AsciiSet = &NON_ALPHANUMERIC_WITHOUT_DOT.remove(b'_');
50
51fn inviter_progress(
52 context: &Context,
53 contact_id: ContactId,
54 chat_id: ChatId,
55 chat_type: Chattype,
56) -> Result<()> {
57 let progress = 1000;
59 context.emit_event(EventType::SecurejoinInviterProgress {
60 contact_id,
61 chat_id,
62 chat_type,
63 progress,
64 });
65
66 Ok(())
67}
68
69fn shorten_name(name: &str, length: usize) -> String {
72 if name.chars().count() > length {
73 format!(
75 "{}_",
76 &name
77 .chars()
78 .take(length.saturating_sub(1))
79 .collect::<String>()
80 )
81 } else {
82 name.to_string()
83 }
84}
85
86pub async fn get_securejoin_qr(context: &Context, chat: Option<ChatId>) -> Result<String> {
91 ensure_secret_key_exists(context).await.ok();
97
98 let chat = match chat {
99 Some(id) => {
100 let chat = Chat::load_from_db(context, id).await?;
101 ensure!(
102 chat.typ == Chattype::Group || chat.typ == Chattype::OutBroadcast,
103 "Can't generate SecureJoin QR code for chat {id} of type {}",
104 chat.typ
105 );
106 if chat.grpid.is_empty() {
107 let err = format!("Can't generate QR code, chat {id} is a email thread");
108 error!(context, "get_securejoin_qr: {}.", err);
109 bail!(err);
110 }
111 if chat.typ == Chattype::OutBroadcast {
112 if load_broadcast_secret(context, chat.id).await?.is_none() {
115 error!(
116 context,
117 "Not creating securejoin QR for old broadcast {}, see chat for more info.",
118 chat.id,
119 );
120 let text = BROADCAST_INCOMPATIBILITY_MSG;
121 add_info_msg(context, chat.id, text, time()).await?;
122 bail!(text.to_string());
123 }
124 }
125 Some(chat)
126 }
127 None => None,
128 };
129 let grpid = chat.as_ref().map(|c| c.grpid.as_str());
130 let sync_token = token::lookup(context, Namespace::InviteNumber, grpid)
131 .await?
132 .is_none();
133 let invitenumber = token::lookup_or_new(context, Namespace::InviteNumber, grpid).await?;
135
136 let auth = create_id();
146 token::save(context, Namespace::Auth, grpid, &auth, time()).await?;
147
148 let fingerprint = get_self_fingerprint(context).await?.hex();
149
150 let self_addr = context.get_primary_self_addr().await?;
151 let self_addr_urlencoded = utf8_percent_encode(&self_addr, DISALLOWED_CHARACTERS).to_string();
152
153 let self_name = context
154 .get_config(Config::Displayname)
155 .await?
156 .unwrap_or_default();
157
158 let qr = if let Some(chat) = chat {
159 if sync_token {
160 context
161 .sync_qr_code_tokens(Some(chat.grpid.as_str()))
162 .await?;
163 context.scheduler.interrupt_inbox().await;
164 }
165
166 let chat_name = chat.get_name();
167 let chat_name_shortened = shorten_name(chat_name, 25);
168 let chat_name_urlencoded = utf8_percent_encode(&chat_name_shortened, DISALLOWED_CHARACTERS)
169 .to_string()
170 .replace("%20", "+");
171 let grpid = &chat.grpid;
172
173 let self_name_shortened = shorten_name(&self_name, 16);
174 let self_name_urlencoded = utf8_percent_encode(&self_name_shortened, DISALLOWED_CHARACTERS)
175 .to_string()
176 .replace("%20", "+");
177
178 if chat.typ == Chattype::OutBroadcast {
179 format!(
181 "https://i.delta.chat/#{fingerprint}&x={grpid}&j={invitenumber}&s={auth}&a={self_addr_urlencoded}&n={self_name_urlencoded}&b={chat_name_urlencoded}",
182 )
183 } else {
184 format!(
185 "https://i.delta.chat/#{fingerprint}&x={grpid}&i={invitenumber}&s={auth}&a={self_addr_urlencoded}&n={self_name_urlencoded}&g={chat_name_urlencoded}",
186 )
187 }
188 } else {
189 let self_name_shortened = shorten_name(&self_name, 25);
190 let self_name_urlencoded = utf8_percent_encode(&self_name_shortened, DISALLOWED_CHARACTERS)
191 .to_string()
192 .replace("%20", "+");
193 if sync_token {
194 context.sync_qr_code_tokens(None).await?;
195 context.scheduler.interrupt_inbox().await;
196 }
197 format!(
198 "https://i.delta.chat/#{fingerprint}&i={invitenumber}&s={auth}&a={self_addr_urlencoded}&n={self_name_urlencoded}",
199 )
200 };
201
202 info!(context, "Generated QR code.");
203 Ok(qr)
204}
205
206async fn get_self_fingerprint(context: &Context) -> Result<Fingerprint> {
207 let key = load_self_public_key(context)
208 .await
209 .context("Failed to load key")?;
210 Ok(key.dc_fingerprint())
211}
212
213pub async fn join_securejoin(context: &Context, qr: &str) -> Result<ChatId> {
220 join_securejoin_with_ux_info(context, qr, None, None).await
221}
222
223pub async fn join_securejoin_with_ux_info(
234 context: &Context,
235 qr: &str,
236 source: Option<SecurejoinSource>,
237 uipath: Option<SecurejoinUiPath>,
238) -> Result<ChatId> {
239 let res = securejoin(context, qr).await.map_err(|err| {
240 warn!(context, "Fatal joiner error: {:#}", err);
241 error!(context, "QR process failed");
243 err
244 })?;
245
246 stats::count_securejoin_ux_info(context, source, uipath)
247 .await
248 .log_err(context)
249 .ok();
250
251 Ok(res)
252}
253
254async fn securejoin(context: &Context, qr: &str) -> Result<ChatId> {
255 info!(context, "Requesting secure-join ...",);
261 let qr_scan = check_qr(context, qr).await?;
262
263 let invite = QrInvite::try_from(qr_scan)?;
264
265 stats::count_securejoin_invite(context, &invite)
266 .await
267 .log_err(context)
268 .ok();
269
270 bob::start_protocol(context, invite).await
271}
272
273async fn send_alice_handshake_msg(
275 context: &Context,
276 contact_id: ContactId,
277 step: &str,
278) -> Result<()> {
279 let mut msg = Message {
280 viewtype: Viewtype::Text,
281 text: format!("Secure-Join: {step}"),
282 hidden: true,
283 ..Default::default()
284 };
285 msg.param.set_cmd(SystemMessage::SecurejoinMessage);
286 msg.param.set(Param::Arg, step);
287 msg.param.set_int(Param::GuaranteeE2ee, 1);
288 chat::send_msg(
289 context,
290 ChatIdBlocked::get_for_contact(context, contact_id, Blocked::Yes)
291 .await?
292 .id,
293 &mut msg,
294 )
295 .await?;
296 Ok(())
297}
298
299async fn info_chat_id(context: &Context, contact_id: ContactId) -> Result<ChatId> {
301 let chat_id_blocked = ChatIdBlocked::get_for_contact(context, contact_id, Blocked::Not).await?;
302 Ok(chat_id_blocked.id)
303}
304
305async fn verify_sender_by_fingerprint(
308 context: &Context,
309 fingerprint: &Fingerprint,
310 contact_id: ContactId,
311) -> Result<bool> {
312 let contact = Contact::get_by_id(context, contact_id).await?;
313 let is_verified = contact.fingerprint().is_some_and(|fp| &fp == fingerprint);
314 if is_verified {
315 mark_contact_id_as_verified(context, contact_id, Some(ContactId::SELF)).await?;
316 }
317 Ok(is_verified)
318}
319
320#[derive(Debug, PartialEq, Eq)]
327pub(crate) enum HandshakeMessage {
328 Done,
332 Ignore,
339 Propagate,
344}
345
346pub(crate) async fn handle_securejoin_handshake(
358 context: &Context,
359 mime_message: &mut MimeMessage,
360 contact_id: ContactId,
361) -> Result<HandshakeMessage> {
362 if contact_id.is_special() {
363 return Err(Error::msg("Can not be called with special contact ID"));
364 }
365 let step = mime_message
366 .get_header(HeaderDef::SecureJoin)
367 .context("Not a Secure-Join message")?;
368
369 info!(context, "Received secure-join message {step:?}.");
370
371 if !matches!(step, "vg-request" | "vc-request") {
387 let mut self_found = false;
388 let self_fingerprint = load_self_public_key(context).await?.dc_fingerprint();
389 for (addr, key) in &mime_message.gossiped_keys {
390 if key.public_key.dc_fingerprint() == self_fingerprint
391 && context.is_self_addr(addr).await?
392 {
393 self_found = true;
394 break;
395 }
396 }
397 if !self_found {
398 warn!(context, "Step {step}: No self addr+pubkey gossip found.");
401 return Ok(HandshakeMessage::Ignore);
402 }
403 }
404
405 match step {
406 "vg-request" | "vc-request" => {
407 let invitenumber = match mime_message.get_header(HeaderDef::SecureJoinInvitenumber) {
417 Some(n) => n,
418 None => {
419 warn!(context, "Secure-join denied (invitenumber missing)");
420 return Ok(HandshakeMessage::Ignore);
421 }
422 };
423 if !token::exists(context, token::Namespace::InviteNumber, invitenumber).await? {
424 warn!(context, "Secure-join denied (bad invitenumber).");
425 return Ok(HandshakeMessage::Ignore);
426 }
427
428 let from_addr = ContactAddress::new(&mime_message.from.addr)?;
429 let autocrypt_fingerprint = mime_message.autocrypt_fingerprint.as_deref().unwrap_or("");
430 let (autocrypt_contact_id, _) = Contact::add_or_lookup_ex(
431 context,
432 "",
433 &from_addr,
434 autocrypt_fingerprint,
435 Origin::IncomingUnknownFrom,
436 )
437 .await?;
438
439 send_alice_handshake_msg(
441 context,
442 autocrypt_contact_id,
443 &format!("{}-auth-required", &step.get(..2).unwrap_or_default()),
444 )
445 .await
446 .context("failed sending auth-required handshake message")?;
447 Ok(HandshakeMessage::Done)
448 }
449 "vg-auth-required" | "vc-auth-required" => {
450 bob::handle_auth_required(context, mime_message).await
455 }
456 "vg-request-with-auth" | "vc-request-with-auth" => {
457 let Some(fp) = mime_message.get_header(HeaderDef::SecureJoinFingerprint) else {
465 warn!(
466 context,
467 "Ignoring {step} message because fingerprint is not provided."
468 );
469 return Ok(HandshakeMessage::Ignore);
470 };
471 let fingerprint: Fingerprint = fp.parse()?;
472 if !encrypted_and_signed(context, mime_message, &fingerprint) {
473 warn!(
474 context,
475 "Ignoring {step} message because the message is not encrypted."
476 );
477 return Ok(HandshakeMessage::Ignore);
478 }
479 let Some(auth) = mime_message.get_header(HeaderDef::SecureJoinAuth) else {
481 warn!(
482 context,
483 "Ignoring {step} message because of missing auth code."
484 );
485 return Ok(HandshakeMessage::Ignore);
486 };
487 let Some((grpid, timestamp)) = context
488 .sql
489 .query_row_optional(
490 "SELECT foreign_key, timestamp FROM tokens WHERE namespc=? AND token=?",
491 (Namespace::Auth, auth),
492 |row| {
493 let foreign_key: String = row.get(0)?;
494 let timestamp: i64 = row.get(1)?;
495 Ok((foreign_key, timestamp))
496 },
497 )
498 .await?
499 else {
500 warn!(
501 context,
502 "Ignoring {step} message because of invalid auth code."
503 );
504 return Ok(HandshakeMessage::Ignore);
505 };
506 let joining_chat_id = match grpid.as_str() {
507 "" => None,
508 id => {
509 let Some((chat_id, ..)) = get_chat_id_by_grpid(context, id).await? else {
510 warn!(context, "Ignoring {step} message: unknown grpid {id}.",);
511 return Ok(HandshakeMessage::Ignore);
512 };
513 Some(chat_id)
514 }
515 };
516
517 let sender_contact = Contact::get_by_id(context, contact_id).await?;
518 if sender_contact
519 .fingerprint()
520 .is_none_or(|fp| fp != fingerprint)
521 {
522 warn!(
523 context,
524 "Ignoring {step} message because of fingerprint mismatch."
525 );
526 return Ok(HandshakeMessage::Ignore);
527 }
528 info!(context, "Fingerprint verified via Auth code.",);
529
530 if time() < timestamp + VERIFICATION_TIMEOUT_SECONDS {
532 mark_contact_id_as_verified(context, contact_id, Some(ContactId::SELF)).await?;
533 }
534 contact_id.regossip_keys(context).await?;
535 ContactId::scaleup_origin(context, &[contact_id], Origin::SecurejoinInvited).await?;
536 if grpid.is_empty() {
539 ChatId::create_for_contact(context, contact_id).await?;
540 }
541 context.emit_event(EventType::ContactsChanged(Some(contact_id)));
542 if let Some(joining_chat_id) = joining_chat_id {
543 chat::add_contact_to_chat_ex(context, Nosync, joining_chat_id, contact_id, true)
545 .await?;
546 let chat = Chat::load_from_db(context, joining_chat_id).await?;
547
548 inviter_progress(context, contact_id, joining_chat_id, chat.typ)?;
549 Ok(HandshakeMessage::Done)
552 } else {
553 let chat_id = info_chat_id(context, contact_id).await?;
554 send_alice_handshake_msg(context, contact_id, "vc-contact-confirm")
556 .await
557 .context("failed sending vc-contact-confirm message")?;
558
559 inviter_progress(context, contact_id, chat_id, Chattype::Single)?;
560 Ok(HandshakeMessage::Ignore) }
562 }
563 "vc-contact-confirm" => {
568 context.emit_event(EventType::SecurejoinJoinerProgress {
569 contact_id,
570 progress: JoinerProgress::Succeeded.to_usize(),
571 });
572 Ok(HandshakeMessage::Ignore)
573 }
574 "vg-member-added" => {
575 let Some(member_added) = mime_message.get_header(HeaderDef::ChatGroupMemberAdded)
576 else {
577 warn!(
578 context,
579 "vg-member-added without Chat-Group-Member-Added header."
580 );
581 return Ok(HandshakeMessage::Propagate);
582 };
583 if !context.is_self_addr(member_added).await? {
584 info!(
585 context,
586 "Member {member_added} added by unrelated SecureJoin process."
587 );
588 return Ok(HandshakeMessage::Propagate);
589 }
590
591 context.emit_event(EventType::SecurejoinJoinerProgress {
592 contact_id,
593 progress: JoinerProgress::Succeeded.to_usize(),
594 });
595 Ok(HandshakeMessage::Propagate)
596 }
597
598 "vg-member-added-received" | "vc-contact-confirm-received" => {
599 Ok(HandshakeMessage::Done)
601 }
602 _ => {
603 warn!(context, "invalid step: {}", step);
604 Ok(HandshakeMessage::Ignore)
605 }
606 }
607}
608
609pub(crate) async fn observe_securejoin_on_other_device(
627 context: &Context,
628 mime_message: &MimeMessage,
629 contact_id: ContactId,
630) -> Result<HandshakeMessage> {
631 if contact_id.is_special() {
632 return Err(Error::msg("Can not be called with special contact ID"));
633 }
634 let step = mime_message
635 .get_header(HeaderDef::SecureJoin)
636 .context("Not a Secure-Join message")?;
637 info!(context, "Observing secure-join message {step:?}.");
638
639 if !matches!(
640 step,
641 "vg-request-with-auth" | "vc-request-with-auth" | "vg-member-added" | "vc-contact-confirm"
642 ) {
643 return Ok(HandshakeMessage::Ignore);
644 };
645
646 if !encrypted_and_signed(context, mime_message, &get_self_fingerprint(context).await?) {
647 warn!(
648 context,
649 "Observed SecureJoin message is not encrypted correctly."
650 );
651 return Ok(HandshakeMessage::Ignore);
652 }
653
654 let contact = Contact::get_by_id(context, contact_id).await?;
655 let addr = contact.get_addr().to_lowercase();
656
657 let Some(key) = mime_message.gossiped_keys.get(&addr) else {
658 warn!(context, "No gossip header for {addr} at step {step}.");
659 return Ok(HandshakeMessage::Ignore);
660 };
661
662 let Some(contact_fingerprint) = contact.fingerprint() else {
663 warn!(context, "Contact does not have a fingerprint.");
665 return Ok(HandshakeMessage::Ignore);
666 };
667
668 if key.public_key.dc_fingerprint() != contact_fingerprint {
669 warn!(context, "Fingerprint does not match.");
671 return Ok(HandshakeMessage::Ignore);
672 }
673
674 mark_contact_id_as_verified(context, contact_id, Some(ContactId::SELF)).await?;
675
676 if step == "vg-member-added" || step == "vc-contact-confirm" {
677 let chat_type = if mime_message
678 .get_header(HeaderDef::ChatGroupMemberAdded)
679 .is_none()
680 {
681 Chattype::Single
682 } else if mime_message.get_header(HeaderDef::ListId).is_some() {
683 Chattype::OutBroadcast
684 } else {
685 Chattype::Group
686 };
687
688 let chat_id = ChatId::new(0);
696 inviter_progress(context, contact_id, chat_id, chat_type)?;
697 }
698
699 if step == "vg-request-with-auth" || step == "vc-request-with-auth" {
700 ChatId::create_for_contact_with_blocked(context, contact_id, Blocked::Not).await?;
704 }
705
706 if step == "vg-member-added" {
707 Ok(HandshakeMessage::Propagate)
708 } else {
709 Ok(HandshakeMessage::Ignore)
710 }
711}
712
713fn encrypted_and_signed(
718 context: &Context,
719 mimeparser: &MimeMessage,
720 expected_fingerprint: &Fingerprint,
721) -> bool {
722 if let Some(signature) = mimeparser.signature.as_ref() {
723 if signature == expected_fingerprint {
724 true
725 } else {
726 warn!(
727 context,
728 "Message does not match expected fingerprint {expected_fingerprint}.",
729 );
730 false
731 }
732 } else {
733 warn!(context, "Message not encrypted.",);
734 false
735 }
736}
737
738#[cfg(test)]
739mod securejoin_tests;