diff --git a/openpgp.d.ts b/openpgp.d.ts index 58c63de1..46966373 100644 --- a/openpgp.d.ts +++ b/openpgp.d.ts @@ -366,10 +366,10 @@ export class AEADEncryptedDataPacket extends BasePacket { private crypt(fn: Function, sessionKey: Uint8Array, data: MaybeStream): MaybeStream } -export class PublicKeyEncryptedSessionKeyPaclet extends BasePacket { +export class PublicKeyEncryptedSessionKeyPacket extends BasePacket { static readonly tag: enums.packet.publicKeyEncryptedSessionKey; - private decrypt(keyPacket: SecretKeyPacket): Promise; // throws on error - private encrypt(keyPacket: PublicKeyPacket): Promise; // throws on error + private decrypt(keyPacket: SecretKeyPacket): void; // throws on error + private encrypt(keyPacket: PublicKeyPacket): void; // throws on error } export class SymEncryptedSessionKey extends BasePacket { diff --git a/src/packet/aead_encrypted_data.js b/src/packet/aead_encrypted_data.js index 3fb53c48..d913cb85 100644 --- a/src/packet/aead_encrypted_data.js +++ b/src/packet/aead_encrypted_data.js @@ -20,6 +20,7 @@ import crypto from '../crypto'; import enums from '../enums'; import util from '../util'; import defaultConfig from '../config'; +import { UnsupportedError } from './packet'; import LiteralDataPacket from './literal_data'; import CompressedDataPacket from './compressed_data'; @@ -66,8 +67,9 @@ class AEADEncryptedDataPacket { */ async read(bytes) { await stream.parse(bytes, async reader => { - if (await reader.readByte() !== VERSION) { // The only currently defined value is 1. - throw new Error('Invalid packet version.'); + const version = await reader.readByte(); + if (version !== VERSION) { // The only currently defined value is 1. + throw new UnsupportedError(`Version ${version} of the AEAD-encrypted data packet is not supported.`); } this.cipherAlgo = await reader.readByte(); this.aeadAlgo = await reader.readByte(); diff --git a/src/packet/one_pass_signature.js b/src/packet/one_pass_signature.js index e5ebbe4d..5572fce8 100644 --- a/src/packet/one_pass_signature.js +++ b/src/packet/one_pass_signature.js @@ -20,6 +20,9 @@ import SignaturePacket from './signature'; import KeyID from '../type/keyid'; import enums from '../enums'; import util from '../util'; +import { UnsupportedError } from './packet'; + +const VERSION = 3; /** * Implementation of the One-Pass Signature Packets (Tag 4) @@ -74,6 +77,9 @@ class OnePassSignaturePacket { let mypos = 0; // A one-octet version number. The current version is 3. this.version = bytes[mypos++]; + if (this.version !== VERSION) { + throw new UnsupportedError(`Version ${this.version} of the one-pass signature packet is unsupported.`); + } // A one-octet signature type. Signature types are described in // Section 5.2.1. diff --git a/src/packet/packet.js b/src/packet/packet.js index b99ee3aa..1a083a7f 100644 --- a/src/packet/packet.js +++ b/src/packet/packet.js @@ -97,17 +97,17 @@ export function writeHeader(tag_type, length) { /** * Whether the packet type supports partial lengths per RFC4880 - * @param {Integer} tag_type - Tag type + * @param {Integer} tag - Tag type * @returns {Boolean} String of the header. */ -export function supportsStreaming(tag_type) { +export function supportsStreaming(tag) { return [ enums.packet.literalData, enums.packet.compressedData, enums.packet.symmetricallyEncryptedData, enums.packet.symEncryptedIntegrityProtectedData, enums.packet.aeadEncryptedData - ].includes(tag_type); + ].includes(tag); } /** @@ -296,3 +296,16 @@ export async function readPackets(input, callback) { reader.releaseLock(); } } + +export class UnsupportedError extends Error { + constructor(...params) { + super(...params); + + if (Error.captureStackTrace) { + Error.captureStackTrace(this, UnsupportedError); + } + + this.name = 'UnsupportedError'; + } +} + diff --git a/src/packet/packetlist.js b/src/packet/packetlist.js index a5c29169..9d42bc16 100644 --- a/src/packet/packetlist.js +++ b/src/packet/packetlist.js @@ -2,7 +2,8 @@ import * as stream from '@openpgp/web-stream-tools'; import { readPackets, supportsStreaming, writeTag, writeHeader, - writePartialLength, writeSimpleLength + writePartialLength, writeSimpleLength, + UnsupportedError } from './packet'; import util from '../util'; import enums from '../enums'; @@ -17,7 +18,14 @@ import defaultConfig from '../config'; */ export function newPacketFromTag(tag, allowedPackets) { if (!allowedPackets[tag]) { - throw new Error(`Packet not allowed in this context: ${enums.read(enums.packet, tag)}`); + // distinguish between disallowed packets and unknown ones + let packetType; + try { + packetType = enums.read(enums.packet, tag); + } catch (e) { + throw new UnsupportedError(`Unknown packet type with tag: ${tag}`); + } + throw new UnsupportedError(`Packet not allowed in this context: ${packetType}`); } return new allowedPackets[tag](); } @@ -67,10 +75,11 @@ class PacketList extends Array { await packet.read(parsed.packet, config); await writer.write(packet); } catch (e) { - if (!config.tolerant || supportsStreaming(parsed.tag)) { - // The packets that support streaming are the ones that contain - // message data. Those are also the ones we want to be more strict - // about and throw on parse errors for. + const isTolerableError = config.tolerant && e instanceof UnsupportedError; + if (!isTolerableError || supportsStreaming(parsed.tag)) { + // The packets that support streaming are the ones that contain message data. + // Those are also the ones we want to be more strict about and throw on parse errors + // (since we likely cannot process the message without these packets anyway). await writer.abort(e); } util.printDebugError(e); diff --git a/src/packet/public_key.js b/src/packet/public_key.js index b03d5d2b..141eb95c 100644 --- a/src/packet/public_key.js +++ b/src/packet/public_key.js @@ -22,6 +22,7 @@ import defaultConfig from '../config'; import crypto from '../crypto'; import enums from '../enums'; import util from '../util'; +import { UnsupportedError } from './packet'; /** * Implementation of the Key Material Packet (Tag 5,6,7,14) @@ -137,7 +138,7 @@ class PublicKeyPacket { await this.computeFingerprintAndKeyID(); return pos; } - throw new Error('Version ' + this.version + ' of the key packet is unsupported.'); + throw new UnsupportedError(`Version ${this.version} of the key packet is unsupported.`); } /** diff --git a/src/packet/public_key_encrypted_session_key.js b/src/packet/public_key_encrypted_session_key.js index 7f7f4978..582d355d 100644 --- a/src/packet/public_key_encrypted_session_key.js +++ b/src/packet/public_key_encrypted_session_key.js @@ -19,6 +19,9 @@ import KeyID from '../type/keyid'; import crypto from '../crypto'; import enums from '../enums'; import util from '../util'; +import { UnsupportedError } from './packet'; + +const VERSION = 3; /** * Public-Key Encrypted Session Key Packets (Tag 1) @@ -61,6 +64,9 @@ class PublicKeyEncryptedSessionKeyPacket { */ read(bytes) { this.version = bytes[0]; + if (this.version !== VERSION) { + throw new UnsupportedError(`Version ${this.version} of the PKESK packet is unsupported.`); + } this.publicKeyID.read(bytes.subarray(1, bytes.length)); this.publicKeyAlgorithm = enums.read(enums.publicKey, bytes[9]); @@ -89,7 +95,7 @@ class PublicKeyEncryptedSessionKeyPacket { /** * Encrypt session key packet * @param {PublicKeyPacket} key - Public key - * @returns {Promise} + * @throws {Error} if encryption failed * @async */ async encrypt(key) { @@ -101,16 +107,13 @@ class PublicKeyEncryptedSessionKeyPacket { const algo = enums.write(enums.publicKey, this.publicKeyAlgorithm); this.encrypted = await crypto.publicKeyEncrypt( algo, key.publicParams, data, key.getFingerprintBytes()); - return true; } /** * Decrypts the session key (only for public key encrypted session key * packets (tag 1) - * - * @param {SecretKeyPacket} key - * Private key with secret params unlocked - * @returns {Promise} + * @param {SecretKeyPacket} key - decrypted private key + * @throws {Error} if decryption failed * @async */ async decrypt(key) { @@ -129,7 +132,6 @@ class PublicKeyEncryptedSessionKeyPacket { this.sessionKey = sessionKey; this.sessionKeyAlgorithm = enums.read(enums.symmetric, decoded[0]); } - return true; } } diff --git a/src/packet/signature.js b/src/packet/signature.js index bf2f8a56..bb679202 100644 --- a/src/packet/signature.js +++ b/src/packet/signature.js @@ -16,7 +16,7 @@ // Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA import * as stream from '@openpgp/web-stream-tools'; -import { readSimpleLength, writeSimpleLength } from './packet'; +import { readSimpleLength, UnsupportedError, writeSimpleLength } from './packet'; import KeyID from '../type/keyid.js'; import crypto from '../crypto'; import enums from '../enums'; @@ -99,7 +99,7 @@ class SignaturePacket { this.version = bytes[i++]; if (this.version !== 4 && this.version !== 5) { - throw new Error('Version ' + this.version + ' of the signature is unsupported.'); + throw new UnsupportedError(`Version ${this.version} of the signature packet is unsupported.`); } this.signatureType = bytes[i++]; diff --git a/src/packet/sym_encrypted_integrity_protected_data.js b/src/packet/sym_encrypted_integrity_protected_data.js index 5d5c85b7..e081aff7 100644 --- a/src/packet/sym_encrypted_integrity_protected_data.js +++ b/src/packet/sym_encrypted_integrity_protected_data.js @@ -26,6 +26,7 @@ import CompressedDataPacket from './compressed_data'; import OnePassSignaturePacket from './one_pass_signature'; import SignaturePacket from './signature'; import PacketList from './packetlist'; +import { UnsupportedError } from './packet'; // A SEIP packet can contain the following packet types const allowedPackets = /*#__PURE__*/ util.constructAllowedPackets([ @@ -60,10 +61,10 @@ class SymEncryptedIntegrityProtectedDataPacket { async read(bytes) { await stream.parse(bytes, async reader => { - + const version = await reader.readByte(); // - A one-octet version number. The only currently defined value is 1. - if (await reader.readByte() !== VERSION) { - throw new Error('Invalid packet version.'); + if (version !== VERSION) { + throw new UnsupportedError(`Version ${version} of the SEIP packet is unsupported.`); } // - Encrypted data, the output of the selected symmetric-key cipher diff --git a/src/packet/sym_encrypted_session_key.js b/src/packet/sym_encrypted_session_key.js index afd528d2..ceaaeb9b 100644 --- a/src/packet/sym_encrypted_session_key.js +++ b/src/packet/sym_encrypted_session_key.js @@ -20,6 +20,7 @@ import defaultConfig from '../config'; import crypto from '../crypto'; import enums from '../enums'; import util from '../util'; +import { UnsupportedError } from './packet'; /** * Symmetric-Key Encrypted Session Key Packets (Tag 3) @@ -63,6 +64,9 @@ class SymEncryptedSessionKeyPacket { // A one-octet version number. The only currently defined version is 4. this.version = bytes[offset++]; + if (this.version !== 4 && this.version !== 5) { + throw new UnsupportedError(`Version ${this.version} of the SKESK packet is unsupported.`); + } // A one-octet number describing the symmetric algorithm used. const algo = enums.read(enums.symmetric, bytes[offset++]); diff --git a/src/packet/trust.js b/src/packet/trust.js index 8d1bc93b..a315af1c 100644 --- a/src/packet/trust.js +++ b/src/packet/trust.js @@ -1,6 +1,7 @@ /* eslint class-methods-use-this: ["error", { "exceptMethods": ["read"] }] */ import enums from '../enums'; +import { UnsupportedError } from './packet'; /** * Implementation of the Trust Packet (Tag 12) @@ -25,13 +26,14 @@ class TrustPacket { /** * Parsing function for a trust packet (tag 12). * Currently not implemented as we ignore trust packets - * @param {String} byptes - Payload of a tag 12 packet */ - read() {} // TODO + read() { + throw new UnsupportedError('Trust packets are not supported'); + } // eslint-disable-next-line class-methods-use-this write() { - throw new Error('Trust packets are not supported'); + throw new UnsupportedError('Trust packets are not supported'); } } diff --git a/test/general/config.js b/test/general/config.js index 9950b81d..279f0683 100644 --- a/test/general/config.js +++ b/test/general/config.js @@ -359,5 +359,4 @@ qDEdLyNWF30o6wD/fZYCV8aS4dAu2U3fpN5y5+PbuXFRYljA5gQ/1zrGN/UA await expect(sig4.valid).to.be.false; await expect(sig4.error).to.match(/eddsa keys are considered too weak/); }); - }); diff --git a/test/general/packet.js b/test/general/packet.js index adef8676..f5f61bba 100644 --- a/test/general/packet.js +++ b/test/general/packet.js @@ -67,21 +67,6 @@ module.exports = () => describe("Packet", function() { '=KXkj\n' + '-----END PGP PRIVATE KEY BLOCK-----'; - it('Ignores disallowed packet with tolerant mode enabled', async function() { - const packets = new openpgp.PacketList(); - packets.push(new openpgp.MarkerPacket()); - const bytes = packets.write(); - const parsed = await openpgp.PacketList.fromBinary(bytes, {}, { ...openpgp.config, tolerant: true }); - expect(parsed.length).to.equal(0); - }); - - it('Throws on disallowed packet with tolerant mode disabled', async function() { - const packets = new openpgp.PacketList(); - packets.push(new openpgp.MarkerPacket()); - const bytes = packets.write(); - await expect(openpgp.PacketList.fromBinary(bytes, {}, { ...openpgp.config, tolerant: false })).to.be.rejectedWith(/Packet not allowed in this context/); - }); - it('Symmetrically encrypted packet without integrity protection - allow decryption', async function() { const aeadProtectVal = openpgp.config.aeadProtect; const allowUnauthenticatedMessagesVal = openpgp.config.allowUnauthenticatedMessages; @@ -963,4 +948,28 @@ V+HOQJQxXJkVRYa3QrFUehiMzTeqqMdgC6ZqJy7+ }); }); }); + + describe('PacketList parsing', function () { + it('Ignores disallowed packet with tolerant mode enabled', async function() { + const packets = new openpgp.PacketList(); + packets.push(new openpgp.MarkerPacket()); + const bytes = packets.write(); + const parsed = await openpgp.PacketList.fromBinary(bytes, {}, { ...openpgp.config, tolerant: true }); + expect(parsed.length).to.equal(0); + }); + + it('Throws on disallowed packet with tolerant mode disabled', async function() { + const packets = new openpgp.PacketList(); + packets.push(new openpgp.MarkerPacket()); + const bytes = packets.write(); + await expect(openpgp.PacketList.fromBinary(bytes, {}, { ...openpgp.config, tolerant: false })).to.be.rejectedWith(/Packet not allowed in this context/); + }); + + it('Throws on parsing errors even with tolerant mode enabled', async function () { + const { privateKeyArmored: armoredKey } = await openpgp.generateKey({ userIDs:[{ name:'test', email:'test@a.it' }] }); + await expect( + openpgp.readKey({ armoredKey, config: { tolerant: true, maxUserIDLength: 2 } }) + ).to.be.rejectedWith(/User ID string is too long/); + }); + }); });