mirror of
https://github.com/bitwarden/browser
synced 2026-02-25 17:13:24 +00:00
* Fix biometrics button showing up when biometrics is not enabled * Fix tests * Fix timeout when desktop app is not started * Update comments for legacy biometrics removal
369 lines
14 KiB
TypeScript
369 lines
14 KiB
TypeScript
// FIXME: Update this file to be type safe and remove this and next line
|
|
// @ts-strict-ignore
|
|
import { Injectable, NgZone } from "@angular/core";
|
|
import { firstValueFrom, map } from "rxjs";
|
|
|
|
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
|
import { AuthService } from "@bitwarden/common/auth/abstractions/auth.service";
|
|
import { AuthenticationStatus } from "@bitwarden/common/auth/enums/authentication-status";
|
|
import { CryptoFunctionService } from "@bitwarden/common/platform/abstractions/crypto-function.service";
|
|
import { EncryptService } from "@bitwarden/common/platform/abstractions/encrypt.service";
|
|
import { LogService } from "@bitwarden/common/platform/abstractions/log.service";
|
|
import { MessagingService } from "@bitwarden/common/platform/abstractions/messaging.service";
|
|
import { Utils } from "@bitwarden/common/platform/misc/utils";
|
|
import { EncString } from "@bitwarden/common/platform/models/domain/enc-string";
|
|
import { SymmetricCryptoKey } from "@bitwarden/common/platform/models/domain/symmetric-crypto-key";
|
|
import { UserId } from "@bitwarden/common/types/guid";
|
|
import { DialogService } from "@bitwarden/components";
|
|
import {
|
|
BiometricStateService,
|
|
BiometricsCommands,
|
|
BiometricsService,
|
|
BiometricsStatus,
|
|
KeyService,
|
|
} from "@bitwarden/key-management";
|
|
|
|
import { BrowserSyncVerificationDialogComponent } from "../app/components/browser-sync-verification-dialog.component";
|
|
import { LegacyMessage } from "../models/native-messaging/legacy-message";
|
|
import { LegacyMessageWrapper } from "../models/native-messaging/legacy-message-wrapper";
|
|
import { DesktopSettingsService } from "../platform/services/desktop-settings.service";
|
|
|
|
const MessageValidTimeout = 10 * 1000;
|
|
const HashAlgorithmForAsymmetricEncryption = "sha1";
|
|
|
|
@Injectable()
|
|
export class BiometricMessageHandlerService {
|
|
constructor(
|
|
private cryptoFunctionService: CryptoFunctionService,
|
|
private keyService: KeyService,
|
|
private encryptService: EncryptService,
|
|
private logService: LogService,
|
|
private messagingService: MessagingService,
|
|
private desktopSettingService: DesktopSettingsService,
|
|
private biometricStateService: BiometricStateService,
|
|
private biometricsService: BiometricsService,
|
|
private dialogService: DialogService,
|
|
private accountService: AccountService,
|
|
private authService: AuthService,
|
|
private ngZone: NgZone,
|
|
) {}
|
|
|
|
async handleMessage(msg: LegacyMessageWrapper) {
|
|
const { appId, message: rawMessage } = msg as LegacyMessageWrapper;
|
|
|
|
// Request to setup secure encryption
|
|
if ("command" in rawMessage && rawMessage.command === "setupEncryption") {
|
|
const remotePublicKey = Utils.fromB64ToArray(rawMessage.publicKey);
|
|
|
|
// Validate the UserId to ensure we are logged into the same account.
|
|
const accounts = await firstValueFrom(this.accountService.accounts$);
|
|
const userIds = Object.keys(accounts);
|
|
if (!userIds.includes(rawMessage.userId)) {
|
|
this.logService.info(
|
|
"[Native Messaging IPC] Received message for user that is not logged into the desktop app.",
|
|
);
|
|
ipc.platform.nativeMessaging.sendMessage({
|
|
command: "wrongUserId",
|
|
appId: appId,
|
|
});
|
|
return;
|
|
}
|
|
|
|
if (await firstValueFrom(this.desktopSettingService.browserIntegrationFingerprintEnabled$)) {
|
|
this.logService.info("[Native Messaging IPC] Requesting fingerprint verification.");
|
|
ipc.platform.nativeMessaging.sendMessage({
|
|
command: "verifyFingerprint",
|
|
appId: appId,
|
|
});
|
|
|
|
const fingerprint = await this.keyService.getFingerprint(
|
|
rawMessage.userId,
|
|
remotePublicKey,
|
|
);
|
|
|
|
this.messagingService.send("setFocus");
|
|
|
|
const dialogRef = this.ngZone.run(() =>
|
|
BrowserSyncVerificationDialogComponent.open(this.dialogService, { fingerprint }),
|
|
);
|
|
|
|
const browserSyncVerified = await firstValueFrom(dialogRef.closed);
|
|
|
|
if (browserSyncVerified !== true) {
|
|
this.logService.info("[Native Messaging IPC] Fingerprint verification failed.");
|
|
return;
|
|
}
|
|
}
|
|
|
|
await this.secureCommunication(remotePublicKey, appId);
|
|
return;
|
|
}
|
|
|
|
if ((await ipc.platform.ephemeralStore.getEphemeralValue(appId)) == null) {
|
|
this.logService.info(
|
|
"[Native Messaging IPC] Epheremal secret for secure channel is missing. Invalidating encryption...",
|
|
);
|
|
ipc.platform.nativeMessaging.sendMessage({
|
|
command: "invalidateEncryption",
|
|
appId: appId,
|
|
});
|
|
return;
|
|
}
|
|
|
|
const message: LegacyMessage = JSON.parse(
|
|
await this.encryptService.decryptToUtf8(
|
|
rawMessage as EncString,
|
|
SymmetricCryptoKey.fromString(await ipc.platform.ephemeralStore.getEphemeralValue(appId)),
|
|
),
|
|
);
|
|
|
|
// Shared secret is invalidated, force re-authentication
|
|
if (message == null) {
|
|
this.logService.info(
|
|
"[Native Messaging IPC] Secure channel failed to decrypt message. Invalidating encryption...",
|
|
);
|
|
ipc.platform.nativeMessaging.sendMessage({
|
|
command: "invalidateEncryption",
|
|
appId: appId,
|
|
});
|
|
return;
|
|
}
|
|
|
|
if (Math.abs(message.timestamp - Date.now()) > MessageValidTimeout) {
|
|
this.logService.info("[Native Messaging IPC] Received a too old message. Ignoring.");
|
|
return;
|
|
}
|
|
|
|
const messageId = message.messageId;
|
|
|
|
switch (message.command) {
|
|
case BiometricsCommands.UnlockWithBiometricsForUser: {
|
|
await this.handleUnlockWithBiometricsForUser(message, messageId, appId);
|
|
break;
|
|
}
|
|
case BiometricsCommands.AuthenticateWithBiometrics: {
|
|
try {
|
|
const unlocked = await this.biometricsService.authenticateWithBiometrics();
|
|
await this.send(
|
|
{
|
|
command: BiometricsCommands.AuthenticateWithBiometrics,
|
|
messageId,
|
|
response: unlocked,
|
|
},
|
|
appId,
|
|
);
|
|
} catch (e) {
|
|
this.logService.error("[Native Messaging IPC] Biometric authentication failed", e);
|
|
await this.send(
|
|
{ command: BiometricsCommands.AuthenticateWithBiometrics, messageId, response: false },
|
|
appId,
|
|
);
|
|
}
|
|
break;
|
|
}
|
|
case BiometricsCommands.GetBiometricsStatus: {
|
|
const status = await this.biometricsService.getBiometricsStatus();
|
|
return this.send(
|
|
{
|
|
command: BiometricsCommands.GetBiometricsStatus,
|
|
messageId,
|
|
response: status,
|
|
},
|
|
appId,
|
|
);
|
|
}
|
|
case BiometricsCommands.GetBiometricsStatusForUser: {
|
|
let status = await this.biometricsService.getBiometricsStatusForUser(
|
|
message.userId as UserId,
|
|
);
|
|
if (status == BiometricsStatus.NotEnabledLocally) {
|
|
status = BiometricsStatus.NotEnabledInConnectedDesktopApp;
|
|
}
|
|
return this.send(
|
|
{
|
|
command: BiometricsCommands.GetBiometricsStatusForUser,
|
|
messageId,
|
|
response: status,
|
|
},
|
|
appId,
|
|
);
|
|
}
|
|
// TODO: legacy, remove after 2025.3
|
|
case BiometricsCommands.IsAvailable: {
|
|
const available =
|
|
(await this.biometricsService.getBiometricsStatus()) == BiometricsStatus.Available;
|
|
return this.send(
|
|
{
|
|
command: BiometricsCommands.IsAvailable,
|
|
response: available ? "available" : "not available",
|
|
},
|
|
appId,
|
|
);
|
|
}
|
|
// TODO: legacy, remove after 2025.3
|
|
case BiometricsCommands.Unlock: {
|
|
const isTemporarilyDisabled =
|
|
(await this.biometricStateService.getBiometricUnlockEnabled(message.userId as UserId)) &&
|
|
!((await this.biometricsService.getBiometricsStatus()) == BiometricsStatus.Available);
|
|
if (isTemporarilyDisabled) {
|
|
return this.send({ command: "biometricUnlock", response: "not available" }, appId);
|
|
}
|
|
|
|
if (!((await this.biometricsService.getBiometricsStatus()) == BiometricsStatus.Available)) {
|
|
return this.send({ command: "biometricUnlock", response: "not supported" }, appId);
|
|
}
|
|
|
|
const userId =
|
|
(message.userId as UserId) ??
|
|
(await firstValueFrom(this.accountService.activeAccount$.pipe(map((a) => a?.id))));
|
|
|
|
if (userId == null) {
|
|
return this.send({ command: "biometricUnlock", response: "not unlocked" }, appId);
|
|
}
|
|
|
|
const biometricUnlockPromise =
|
|
message.userId == null
|
|
? firstValueFrom(this.biometricStateService.biometricUnlockEnabled$)
|
|
: this.biometricStateService.getBiometricUnlockEnabled(message.userId as UserId);
|
|
if (!(await biometricUnlockPromise)) {
|
|
await this.send({ command: "biometricUnlock", response: "not enabled" }, appId);
|
|
|
|
return this.ngZone.run(() =>
|
|
this.dialogService.openSimpleDialog({
|
|
type: "warning",
|
|
title: { key: "biometricsNotEnabledTitle" },
|
|
content: { key: "biometricsNotEnabledDesc" },
|
|
cancelButtonText: null,
|
|
acceptButtonText: { key: "cancel" },
|
|
}),
|
|
);
|
|
}
|
|
|
|
try {
|
|
const userKey = await this.biometricsService.unlockWithBiometricsForUser(userId);
|
|
|
|
if (userKey != null) {
|
|
await this.send(
|
|
{
|
|
command: "biometricUnlock",
|
|
response: "unlocked",
|
|
userKeyB64: userKey.keyB64,
|
|
},
|
|
appId,
|
|
);
|
|
|
|
const currentlyActiveAccountId = (
|
|
await firstValueFrom(this.accountService.activeAccount$)
|
|
).id;
|
|
const isCurrentlyActiveAccountUnlocked =
|
|
(await this.authService.getAuthStatus(userId)) == AuthenticationStatus.Unlocked;
|
|
|
|
// prevent proc reloading an active account, when it is the same as the browser
|
|
if (currentlyActiveAccountId != message.userId || !isCurrentlyActiveAccountUnlocked) {
|
|
await ipc.platform.reloadProcess();
|
|
}
|
|
} else {
|
|
await this.send({ command: "biometricUnlock", response: "canceled" }, appId);
|
|
}
|
|
} catch (e) {
|
|
await this.send({ command: "biometricUnlock", response: "canceled" }, appId);
|
|
}
|
|
break;
|
|
}
|
|
default:
|
|
this.logService.error("NativeMessage, got unknown command: " + message.command);
|
|
break;
|
|
}
|
|
}
|
|
|
|
private async send(message: any, appId: string) {
|
|
message.timestamp = Date.now();
|
|
|
|
const encrypted = await this.encryptService.encrypt(
|
|
JSON.stringify(message),
|
|
SymmetricCryptoKey.fromString(await ipc.platform.ephemeralStore.getEphemeralValue(appId)),
|
|
);
|
|
|
|
ipc.platform.nativeMessaging.sendMessage({
|
|
appId: appId,
|
|
messageId: message.messageId,
|
|
message: encrypted,
|
|
});
|
|
}
|
|
|
|
private async secureCommunication(remotePublicKey: Uint8Array, appId: string) {
|
|
const secret = await this.cryptoFunctionService.randomBytes(64);
|
|
await ipc.platform.ephemeralStore.setEphemeralValue(
|
|
appId,
|
|
new SymmetricCryptoKey(secret).keyB64,
|
|
);
|
|
|
|
this.logService.info("[Native Messaging IPC] Setting up secure channel");
|
|
const encryptedSecret = await this.cryptoFunctionService.rsaEncrypt(
|
|
secret,
|
|
remotePublicKey,
|
|
HashAlgorithmForAsymmetricEncryption,
|
|
);
|
|
ipc.platform.nativeMessaging.sendMessage({
|
|
appId: appId,
|
|
command: "setupEncryption",
|
|
messageId: -1, // to indicate to the other side that this is a new desktop client. refactor later to use proper versioning
|
|
sharedSecret: Utils.fromBufferToB64(encryptedSecret),
|
|
});
|
|
}
|
|
|
|
private async handleUnlockWithBiometricsForUser(
|
|
message: LegacyMessage,
|
|
messageId: number,
|
|
appId: string,
|
|
) {
|
|
const messageUserId = message.userId as UserId;
|
|
try {
|
|
const userKey = await this.biometricsService.unlockWithBiometricsForUser(messageUserId);
|
|
if (userKey != null) {
|
|
this.logService.info("[Native Messaging IPC] Biometric unlock for user: " + messageUserId);
|
|
await this.send(
|
|
{
|
|
command: BiometricsCommands.UnlockWithBiometricsForUser,
|
|
response: true,
|
|
messageId,
|
|
userKeyB64: userKey.keyB64,
|
|
},
|
|
appId,
|
|
);
|
|
await this.processReloadWhenRequired(messageUserId);
|
|
} else {
|
|
await this.send(
|
|
{
|
|
command: BiometricsCommands.UnlockWithBiometricsForUser,
|
|
messageId,
|
|
response: false,
|
|
},
|
|
appId,
|
|
);
|
|
}
|
|
} catch (e) {
|
|
await this.send(
|
|
{ command: BiometricsCommands.UnlockWithBiometricsForUser, messageId, response: false },
|
|
appId,
|
|
);
|
|
}
|
|
}
|
|
|
|
/** A process reload after a biometric unlock should happen if the userkey that was used for biometric unlock is for a different user than the
|
|
* currently active account. The userkey for the active account was in memory anyways. Further, if the desktop app is locked, a reload should occur (since the userkey was not already in memory).
|
|
*/
|
|
async processReloadWhenRequired(messageUserId: UserId) {
|
|
const currentlyActiveAccountId = (await firstValueFrom(this.accountService.activeAccount$)).id;
|
|
const isCurrentlyActiveAccountUnlocked =
|
|
(await firstValueFrom(this.authService.authStatusFor$(currentlyActiveAccountId))) ==
|
|
AuthenticationStatus.Unlocked;
|
|
|
|
if (currentlyActiveAccountId !== messageUserId || !isCurrentlyActiveAccountUnlocked) {
|
|
if (!ipc.platform.isDev) {
|
|
ipc.platform.reloadProcess();
|
|
}
|
|
}
|
|
}
|
|
}
|