Skip to content

Commit

Permalink
Fix processing LDSigned activities from actors with unknown public ke…
Browse files Browse the repository at this point in the history
…ys (#27474)
  • Loading branch information
ClearlyClaire committed Dec 4, 2023
1 parent ff3a9da commit 1210524
Show file tree
Hide file tree
Showing 2 changed files with 39 additions and 5 deletions.
10 changes: 5 additions & 5 deletions app/lib/activitypub/linked_data_signature.rb
Expand Up @@ -18,18 +18,18 @@ def verify_actor!

return unless type == 'RsaSignature2017'

creator = ActivityPub::TagManager.instance.uri_to_actor(creator_uri)
creator ||= ActivityPub::FetchRemoteKeyService.new.call(creator_uri, id: false)
creator = ActivityPub::TagManager.instance.uri_to_actor(creator_uri)
creator = ActivityPub::FetchRemoteKeyService.new.call(creator_uri, id: false) if creator&.public_key.blank?

return if creator.nil?

options_hash = hash(@json['signature'].without('type', 'id', 'signatureValue').merge('@context' => CONTEXT))
document_hash = hash(@json.without('signature'))
to_be_verified = options_hash + document_hash

if creator.keypair.public_key.verify(OpenSSL::Digest.new('SHA256'), Base64.decode64(signature), to_be_verified)
creator
end
creator if creator.keypair.public_key.verify(OpenSSL::Digest.new('SHA256'), Base64.decode64(signature), to_be_verified)
rescue OpenSSL::PKey::RSAError
false
end

def sign!(creator, sign_with: nil)
Expand Down
34 changes: 34 additions & 0 deletions spec/lib/activitypub/linked_data_signature_spec.rb
Expand Up @@ -36,6 +36,40 @@
end
end

context 'when local account record is missing a public key' do
let(:raw_signature) do
{
'creator' => 'http://example.com/alice',
'created' => '2017-09-23T20:21:34Z',
}
end

let(:signature) { raw_signature.merge('type' => 'RsaSignature2017', 'signatureValue' => sign(sender, raw_signature, raw_json)) }

let(:service_stub) { instance_double(ActivityPub::FetchRemoteKeyService) }

before do
# Ensure signature is computed with the old key
signature

# Unset key
old_key = sender.public_key
sender.update!(private_key: '', public_key: '')

allow(ActivityPub::FetchRemoteKeyService).to receive(:new).and_return(service_stub)

allow(service_stub).to receive(:call).with('http://example.com/alice', id: false) do
sender.update!(public_key: old_key)
sender
end
end

it 'fetches key and returns creator' do
expect(subject.verify_actor!).to eq sender
expect(service_stub).to have_received(:call).with('http://example.com/alice', id: false).once
end
end

context 'when signature is missing' do
let(:signature) { nil }

Expand Down

0 comments on commit 1210524

Please sign in to comment.