1
0
mirror of https://github.com/bitwarden/browser synced 2025-12-11 13:53:34 +00:00

[PM-23627] Require publicKey for keyService getFingerprint (#15933)

* require public key on keyService getFingerprint

* Update consumers and add error handling & logging
This commit is contained in:
Thomas Avery
2025-08-21 15:49:19 -05:00
committed by GitHub
parent 805b6fe7aa
commit a6e7efddeb
9 changed files with 119 additions and 36 deletions

View File

@@ -24,7 +24,6 @@ import { EnvironmentService } from "@bitwarden/common/platform/abstractions/envi
import { I18nService } from "@bitwarden/common/platform/abstractions/i18n.service";
import { LogService } from "@bitwarden/common/platform/abstractions/log.service";
import { PlatformUtilsService } from "@bitwarden/common/platform/abstractions/platform-utils.service";
import { StateService } from "@bitwarden/common/platform/abstractions/state.service";
import { ValidationService } from "@bitwarden/common/platform/abstractions/validation.service";
import { MessageSender } from "@bitwarden/common/platform/messaging";
import { Utils } from "@bitwarden/common/platform/misc/utils";
@@ -79,7 +78,6 @@ describe("AccountSecurityComponent", () => {
{ provide: PlatformUtilsService, useValue: platformUtilsService },
{ provide: PolicyService, useValue: policyService },
{ provide: PopupRouterCacheService, useValue: mock<PopupRouterCacheService>() },
{ provide: StateService, useValue: mock<StateService>() },
{ provide: ToastService, useValue: mock<ToastService>() },
{ provide: UserVerificationService, useValue: mock<UserVerificationService>() },
{ provide: VaultTimeoutService, useValue: mock<VaultTimeoutService>() },

View File

@@ -44,9 +44,9 @@ import {
import { ConfigService } from "@bitwarden/common/platform/abstractions/config/config.service";
import { EnvironmentService } from "@bitwarden/common/platform/abstractions/environment.service";
import { I18nService } from "@bitwarden/common/platform/abstractions/i18n.service";
import { LogService } from "@bitwarden/common/platform/abstractions/log.service";
import { MessagingService } from "@bitwarden/common/platform/abstractions/messaging.service";
import { PlatformUtilsService } from "@bitwarden/common/platform/abstractions/platform-utils.service";
import { StateService } from "@bitwarden/common/platform/abstractions/state.service";
import { ValidationService } from "@bitwarden/common/platform/abstractions/validation.service";
import {
DialogRef,
@@ -149,7 +149,6 @@ export class AccountSecurityComponent implements OnInit, OnDestroy {
public messagingService: MessagingService,
private environmentService: EnvironmentService,
private keyService: KeyService,
private stateService: StateService,
private userVerificationService: UserVerificationService,
private dialogService: DialogService,
private changeDetectorRef: ChangeDetectorRef,
@@ -159,6 +158,7 @@ export class AccountSecurityComponent implements OnInit, OnDestroy {
private vaultNudgesService: NudgesService,
private validationService: ValidationService,
private configService: ConfigService,
private logService: LogService,
) {}
async ngOnInit() {
@@ -683,10 +683,16 @@ export class AccountSecurityComponent implements OnInit, OnDestroy {
}
async openAcctFingerprintDialog() {
const activeUserId = await firstValueFrom(
this.accountService.activeAccount$.pipe(map((a) => a?.id)),
);
const activeUserId = await firstValueFrom(getUserId(this.accountService.activeAccount$));
const publicKey = await firstValueFrom(this.keyService.userPublicKey$(activeUserId));
if (publicKey == null) {
this.logService.error(
"[AccountSecurityComponent] No public key available for the user: " +
activeUserId +
" fingerprint can't be displayed.",
);
return;
}
const fingerprint = await this.keyService.getFingerprint(activeUserId, publicKey);
const dialogRef = FingerprintDialogComponent.open(this.dialogService, {

View File

@@ -606,6 +606,9 @@ export class GetCommand extends DownloadCommand {
if (id === "me") {
const activeUserId = await firstValueFrom(this.accountService.activeAccount$.pipe(getUserId));
const publicKey = await firstValueFrom(this.keyService.userPublicKey$(activeUserId));
if (publicKey == null) {
return Response.error("No public key available for the active user.");
}
fingerprint = await this.keyService.getFingerprint(activeUserId, publicKey);
} else if (Utils.isGuid(id)) {
try {

View File

@@ -299,12 +299,22 @@ export class AppComponent implements OnInit, OnDestroy {
break;
case "showFingerprintPhrase": {
const activeUserId = await firstValueFrom(
this.accountService.activeAccount$.pipe(map((a) => a?.id)),
getUserId(this.accountService.activeAccount$),
);
const publicKey = await firstValueFrom(this.keyService.userPublicKey$(activeUserId));
const fingerprint = await this.keyService.getFingerprint(activeUserId, publicKey);
const dialogRef = FingerprintDialogComponent.open(this.dialogService, { fingerprint });
await firstValueFrom(dialogRef.closed);
if (publicKey == null) {
this.logService.error(
"[AppComponent] No public key available for the user: " +
activeUserId +
" fingerprint can't be displayed.",
);
} else {
const fingerprint = await this.keyService.getFingerprint(activeUserId, publicKey);
const dialogRef = FingerprintDialogComponent.open(this.dialogService, {
fingerprint,
});
await firstValueFrom(dialogRef.closed);
}
break;
}
case "deleteAccount":

View File

@@ -46,11 +46,14 @@
<i class="bwi bwi-question-circle" aria-hidden="true"></i>
</a>
</div>
<app-account-fingerprint
[fingerprintMaterial]="fingerprintMaterial"
fingerprintLabel="{{ 'yourAccountsFingerprint' | i18n }}"
>
</app-account-fingerprint>
@if (fingerprintMaterial && userPublicKey) {
<app-account-fingerprint
[fingerprintMaterial]="fingerprintMaterial"
[publicKeyBuffer]="userPublicKey"
fingerprintLabel="{{ 'yourAccountsFingerprint' | i18n }}"
>
</app-account-fingerprint>
}
</div>
</div>
<button bitButton bitFormButton type="submit" buttonType="primary">{{ "save" | i18n }}</button>

View File

@@ -12,7 +12,10 @@ import { UpdateProfileRequest } from "@bitwarden/common/auth/models/request/upda
import { getUserId } from "@bitwarden/common/auth/services/account.service";
import { ProfileResponse } from "@bitwarden/common/models/response/profile.response";
import { I18nService } from "@bitwarden/common/platform/abstractions/i18n.service";
import { LogService } from "@bitwarden/common/platform/abstractions/log.service";
import { UserPublicKey } from "@bitwarden/common/types/key";
import { DialogService, ToastService } from "@bitwarden/components";
import { KeyService } from "@bitwarden/key-management";
import { DynamicAvatarComponent } from "../../../components/dynamic-avatar.component";
import { SharedModule } from "../../../shared";
@@ -29,6 +32,7 @@ export class ProfileComponent implements OnInit, OnDestroy {
loading = true;
profile: ProfileResponse;
fingerprintMaterial: string;
userPublicKey: UserPublicKey;
managingOrganization$: Observable<Organization>;
private destroy$ = new Subject<void>();
@@ -44,16 +48,24 @@ export class ProfileComponent implements OnInit, OnDestroy {
private dialogService: DialogService,
private toastService: ToastService,
private organizationService: OrganizationService,
private keyService: KeyService,
private logService: LogService,
) {}
async ngOnInit() {
this.profile = await this.apiService.getProfile();
this.loading = false;
this.fingerprintMaterial = await firstValueFrom(
this.accountService.activeAccount$.pipe(map((a) => a?.id)),
);
const userId = await firstValueFrom(getUserId(this.accountService.activeAccount$));
this.fingerprintMaterial = userId;
const publicKey = await firstValueFrom(this.keyService.userPublicKey$(userId));
if (publicKey == null) {
this.logService.error(
"[ProfileComponent] No public key available for the user: " +
userId +
" fingerprint can't be displayed.",
);
} else {
this.userPublicKey = publicKey;
}
this.managingOrganization$ = this.organizationService
.organizations$(userId)
@@ -70,6 +82,8 @@ export class ProfileComponent implements OnInit, OnDestroy {
.subscribe((name) => {
this.profile.name = name;
});
this.loading = false;
}
openChangeAvatar = async () => {

View File

@@ -318,14 +318,14 @@ export abstract class KeyService {
): Observable<{ privateKey: UserPrivateKey; publicKey: UserPublicKey } | null>;
/**
* Generates a fingerprint phrase for the user based on their public key
* Generates a fingerprint phrase for the public key provided.
*
* @throws Error when publicKey is null and there is no active user, or the active user does not have a public key
* @throws Error when publicKey is null or undefined.
* @param fingerprintMaterial Fingerprint material
* @param publicKey The user's public key
* @returns The user's fingerprint phrase
* @param publicKey The public key to generate the fingerprint phrase for.
* @returns The fingerprint phrase
*/
abstract getFingerprint(fingerprintMaterial: string, publicKey?: Uint8Array): Promise<string[]>;
abstract getFingerprint(fingerprintMaterial: string, publicKey: Uint8Array): Promise<string[]>;
/**
* Generates a new keypair
* @param key A key to encrypt the private key with. If not provided,

View File

@@ -1227,6 +1227,63 @@ describe("keyService", () => {
});
});
describe("getFingerprint", () => {
const mockFingerprintMaterial = "test@example.com";
const mockPublicKey = new Uint8Array(256);
const mockKeyFingerprint = Utils.fromB64ToArray("nfG2jTrJilBEsSrg7ffe9exE9PlClem4P2bxlQ6rNbs=");
const mockUserFingerprint = Utils.fromB64ToArray(
"V5AQSk83YXd6kZqCncC6d9J72R7UZ60Xl1eIoDoWgTc=",
);
const expectedFingerprint = ["predefine", "hunting", "pastime", "enrich", "unhearing"];
beforeEach(() => {
cryptoFunctionService.hash.mockResolvedValue(mockKeyFingerprint);
cryptoFunctionService.hkdfExpand.mockResolvedValue(mockUserFingerprint);
});
test.each([null as unknown as Uint8Array, undefined as unknown as Uint8Array])(
"throws when publicKey is %s",
async (publicKey) => {
await expect(keyService.getFingerprint(mockFingerprintMaterial, publicKey)).rejects.toThrow(
"Public key is required to generate a fingerprint.",
);
expect(cryptoFunctionService.hash).not.toHaveBeenCalled();
expect(cryptoFunctionService.hkdfExpand).not.toHaveBeenCalled();
},
);
it("generates fingerprint successfully", async () => {
const result = await keyService.getFingerprint(mockFingerprintMaterial, mockPublicKey);
expect(result).toEqual(expectedFingerprint);
expect(cryptoFunctionService.hash).toHaveBeenCalledWith(mockPublicKey, "sha256");
expect(cryptoFunctionService.hkdfExpand).toHaveBeenCalledWith(
mockKeyFingerprint,
mockFingerprintMaterial,
32,
"sha256",
);
});
it("throws when entropy of hash function is too small", async () => {
const keyFingerprint = new Uint8Array(3);
cryptoFunctionService.hash.mockResolvedValue(keyFingerprint);
cryptoFunctionService.hkdfExpand.mockResolvedValue(new Uint8Array(3));
await expect(
keyService.getFingerprint(mockFingerprintMaterial, mockPublicKey),
).rejects.toThrow("Output entropy of hash function is too small");
expect(cryptoFunctionService.hash).toHaveBeenCalledWith(mockPublicKey, "sha256");
expect(cryptoFunctionService.hkdfExpand).toHaveBeenCalledWith(
keyFingerprint,
mockFingerprintMaterial,
32,
"sha256",
);
});
});
describe("makeKeyPair", () => {
test.each([null as unknown as SymmetricCryptoKey, undefined as unknown as SymmetricCryptoKey])(
"throws when the provided key is %s",

View File

@@ -473,19 +473,11 @@ export class DefaultKeyService implements KeyServiceAbstraction {
.update(() => encPrivateKey);
}
// TODO: Make public key required
async getFingerprint(fingerprintMaterial: string, publicKey?: Uint8Array): Promise<string[]> {
async getFingerprint(fingerprintMaterial: string, publicKey: Uint8Array): Promise<string[]> {
if (publicKey == null) {
const activeUserId = await firstValueFrom(this.stateProvider.activeUserId$);
if (activeUserId == null) {
throw new Error("No active user found.");
}
publicKey = (await firstValueFrom(this.userPublicKey$(activeUserId))) as Uint8Array;
throw new Error("Public key is required to generate a fingerprint.");
}
if (publicKey === null) {
throw new Error("No public key available.");
}
const keyFingerprint = await this.cryptoFunctionService.hash(publicKey, "sha256");
const userFingerprint = await this.cryptoFunctionService.hkdfExpand(
keyFingerprint,