/
chrome.go
354 lines (308 loc) · 8.92 KB
/
chrome.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
package chrome
import (
"bytes"
"crypto/aes"
"crypto/cipher"
"crypto/sha1"
"errors"
"fmt"
"runtime"
"sync"
"golang.org/x/crypto/pbkdf2"
"github.com/zellyn/kooky"
"github.com/zellyn/kooky/internal/utils"
)
// Thanks to https://gist.github.com/dacort/bd6a5116224c594b14db
func (s *CookieStore) ReadCookies(filters ...kooky.Filter) ([]*kooky.Cookie, error) {
if s == nil {
return nil, errors.New(`cookie store is nil`)
}
if err := s.Open(); err != nil {
return nil, err
} else if s.Database == nil {
return nil, errors.New(`database is nil`)
}
var cookies []*kooky.Cookie
headerMappings := map[string]string{
"secure": "is_secure",
"httponly": "is_httponly",
}
err := utils.VisitTableRows(s.Database, `cookies`, headerMappings, func(rowID *int64, row utils.TableRow) error {
/*
-- taken from chrome 80's cookies' sqlite_master
CREATE TABLE cookies(
creation_utc INTEGER NOT NULL,
host_key TEXT NOT NULL,
name TEXT NOT NULL,
value TEXT NOT NULL,
path TEXT NOT NULL,
expires_utc INTEGER NOT NULL,
is_secure INTEGER NOT NULL,
is_httponly INTEGER NOT NULL,
last_access_utc INTEGER NOT NULL,
has_expires INTEGER NOT NULL DEFAULT 1,
is_persistent INTEGER NOT NULL DEFAULT 1,
priority INTEGER NOT NULL DEFAULT 1,
encrypted_value BLOB DEFAULT '',
samesite INTEGER NOT NULL DEFAULT -1,
source_scheme INTEGER NOT NULL DEFAULT 0,
UNIQUE (host_key, name, path)
)
*/
cookie := &kooky.Cookie{
Creation: utils.FromFILETIME(*rowID * 10),
}
var err error
cookie.Domain, err = row.String(`host_key`)
if err != nil {
return err
}
cookie.Name, err = row.String(`name`)
if err != nil {
return err
}
cookie.Path, err = row.String(`path`)
if err != nil {
return err
}
if expires_utc, err := row.Int64(`expires_utc`); err == nil {
// https://cs.chromium.org/chromium/src/base/time/time.h?l=452&rcl=fceb9a030c182e939a436a540e6dacc70f161cb1
if expires_utc != 0 {
cookie.Expires = utils.FromFILETIME(expires_utc * 10)
}
} else {
return err
}
cookie.Secure, err = row.Bool(`is_secure`)
if err != nil {
return err
}
cookie.HttpOnly, err = row.Bool(`is_httponly`)
if err != nil {
return err
}
encrypted_value, err := row.BlobOrFallback(`encrypted_value`, nil)
if err != nil {
return err
} else if len(encrypted_value) > 0 {
if decrypted, err := s.decrypt(encrypted_value); err == nil {
cookie.Value = string(decrypted)
} else {
return fmt.Errorf("decrypting cookie %v: %w", cookie, err)
}
} else {
cookie.Value, err = row.String(`value`)
if err != nil {
return err
}
}
if kooky.FilterCookie(cookie, filters...) {
cookies = append(cookies, cookie)
}
return nil
})
if err != nil {
return nil, err
}
return cookies, nil
}
// "mock_password" from https://github.com/chromium/chromium/blob/34f6b421d6d255b27e01d82c3c19f49a455caa06/crypto/mock_apple_keychain.cc#L75
var (
fallbackPasswordLinux = [...]byte{'p', 'e', 'a', 'n', 'u', 't', 's'}
fallbackPasswordMacOS = [...]byte{'m', 'o', 'c', 'k', '_', 'p', 'a', 's', 's', 'w', 'o', 'r', 'd'} // mock keychain
prefixDPAPI = [...]byte{1, 0, 0, 0, 208, 140, 157, 223, 1, 21, 209, 17, 140, 122, 0, 192, 79, 194, 151, 235} // 0x01000000D08C9DDF0115D1118C7A00C04FC297EB
)
// key might be the absolute path of the `Local State` file containing the encrypted key
// or a similar identifier
var keyringPasswordMap = keyringPasswordMapType{
v: make(map[string][]byte),
}
type keyringPasswordMapType struct {
mu sync.RWMutex
v map[string][]byte
}
func (k *keyringPasswordMapType) get(key string) (val []byte, ok bool) {
if k == nil {
return
}
k.mu.RLock()
defer k.mu.RUnlock()
val, ok = k.v[key]
return val, ok
}
func (k *keyringPasswordMapType) set(key string, val []byte) {
k.mu.Lock()
defer k.mu.Unlock()
k.v[key] = val
}
func (s *CookieStore) decrypt(encrypted []byte) ([]byte, error) {
if s == nil {
return nil, errors.New(`cookie store is nil`)
}
if len(encrypted) == 0 {
return nil, errors.New(`empty encrypted value`)
}
if len(encrypted) <= 3 {
return nil, fmt.Errorf(`encrypted value is too short (%d<=3)`, len(encrypted))
}
// try to reuse previously successful decryption method
if s.DecryptionMethod != nil {
decrypted, err := s.DecryptionMethod(encrypted, s.PasswordBytes)
if err == nil {
return decrypted, nil
} else {
s.DecryptionMethod = nil
}
}
var decrypt func(encrypted, password []byte) ([]byte, error)
// prioritize previously selected platform then current platform and then other platforms in order of usage on non-server computers
// TODO: mobile
var osMap = map[string]struct{}{} // used for deduplication
var oss []string
for _, opsys := range []string{s.OSStr, runtime.GOOS, `windows`, `darwin`, `linux`} {
if _, ok := osMap[opsys]; ok {
continue
}
oss = append(oss, opsys)
osMap[opsys] = struct{}{}
}
for _, opsys := range oss {
// "useSavedKeyringPassword" and "tryNr" have to preserve state between retries
var useSavedKeyringPassword bool = true
var tryNr int
tryAgain:
var password, keyringPassword, fallbackPassword []byte
var needsKeyringQuerying bool
switch opsys {
case `windows`:
switch {
case bytes.HasPrefix(encrypted, prefixDPAPI[:]):
// present before Chrome v80 on Windows
decrypt = func(encrypted, _ []byte) ([]byte, error) {
return decryptDPAPI(encrypted)
}
case bytes.HasPrefix(encrypted, []byte(`v10`)):
fallthrough
default:
needsKeyringQuerying = true
decrypt = decryptAES256GCM
}
case `darwin`:
needsKeyringQuerying = true
fallbackPassword = fallbackPasswordMacOS[:]
decrypt = func(encrypted, password []byte) ([]byte, error) {
return decryptAESCBC(encrypted, password, aescbcIterationsMacOS)
}
case `linux`:
switch {
case bytes.HasPrefix(encrypted, []byte(`v11`)):
needsKeyringQuerying = true
fallbackPassword = fallbackPasswordLinux[:]
case bytes.HasPrefix(encrypted, []byte(`v10`)):
password = fallbackPasswordLinux[:]
default:
password = fallbackPasswordLinux[:]
}
decrypt = func(encrypted, password []byte) ([]byte, error) {
return decryptAESCBC(encrypted, password, aescbcIterationsLinux)
}
}
if decrypt == nil {
continue
}
if needsKeyringQuerying {
switch tryNr {
case 0, 1:
pw, err := s.getKeyringPassword(useSavedKeyringPassword)
if err == nil {
password = pw
} else {
password = fallbackPassword
tryNr = 2 // skip querying
}
// query keyring passwords on try #1 without simply returning saved ones
useSavedKeyringPassword = false
case 2:
password = fallbackPassword
}
tryNr++
}
decrypted, err := decrypt(encrypted, password)
if err == nil {
s.DecryptionMethod = decrypt
s.OSStr = opsys
s.PasswordBytes = password
if len(keyringPassword) > 0 {
s.KeyringPasswordBytes = keyringPassword
}
return decrypted, nil
} else if tryNr > 0 && tryNr < 3 {
goto tryAgain
}
}
return nil, errors.New(`unknown encryption method`)
}
const (
aescbcSalt = `saltysalt`
aescbcIV = ` `
aescbcIterationsLinux = 1
aescbcIterationsMacOS = 1003
aescbcLength = 16
)
func decryptAESCBC(encrypted, password []byte, iterations int) ([]byte, error) {
if len(encrypted) == 0 {
return nil, errors.New("empty encrypted value")
}
if len(encrypted) <= 3 {
return nil, fmt.Errorf("too short encrypted value (%d<=3)", len(encrypted))
}
// strip "v##"
encrypted = encrypted[3:]
key := pbkdf2.Key(password, []byte(aescbcSalt), iterations, aescbcLength, sha1.New)
block, err := aes.NewCipher(key)
if err != nil {
return nil, err
}
decrypted := make([]byte, len(encrypted))
cbc := cipher.NewCBCDecrypter(block, []byte(aescbcIV))
cbc.CryptBlocks(decrypted, encrypted)
// In the padding scheme the last <padding length> bytes
// have a value equal to the padding length, always in (1,16]
if len(decrypted)%aescbcLength != 0 {
return nil, fmt.Errorf("decrypted data block length is not a multiple of %d", aescbcLength)
}
paddingLen := int(decrypted[len(decrypted)-1])
if paddingLen > 16 {
return nil, fmt.Errorf("invalid last block padding length: %d", paddingLen)
}
return decrypted[:len(decrypted)-paddingLen], nil
}
func decryptAES256GCM(encrypted, password []byte) ([]byte, error) {
// https://stackoverflow.com/a/60423699
if len(encrypted) < 3+12+16 {
return nil, errors.New(`encrypted value too short`)
}
/* encoded value consists of: {
"v10" (3 bytes)
nonce (12 bytes)
ciphertext (variable size)
tag (16 bytes)
}
*/
nonce := encrypted[3 : 3+12]
ciphertextWithTag := encrypted[3+12:]
block, err := aes.NewCipher(password)
if err != nil {
return nil, err
}
// default size for nonce and tag match
aesgcm, err := cipher.NewGCM(block)
if err != nil {
return nil, err
}
plaintext, err := aesgcm.Open(nil, nonce, ciphertextWithTag, nil)
if err != nil {
return nil, err
}
return plaintext, nil
}