backup: make hmac verification more defensive
Check HMAC file size, read it as binary or with 'ascii' encoding only.
This commit is contained in:
parent
a6c7da6061
commit
751415434c
@ -61,6 +61,8 @@ CURRENT_BACKUP_FORMAT_VERSION = '4'
|
||||
MAX_STDERR_BYTES = 1024
|
||||
# header + qubes.xml max size
|
||||
HEADER_QUBES_XML_MAX_SIZE = 1024 * 1024
|
||||
# hmac file max size - regardless of backup format version!
|
||||
HMAC_MAX_SIZE = 4096
|
||||
|
||||
BLKSIZE = 512
|
||||
|
||||
@ -1597,6 +1599,11 @@ class BackupRestore(object):
|
||||
passphrase = self.passphrase.encode('utf-8')
|
||||
self.log.debug("Verifying file {}".format(filename))
|
||||
|
||||
if os.stat(os.path.join(self.tmpdir, hmacfile)).st_size > \
|
||||
HMAC_MAX_SIZE:
|
||||
raise qubes.exc.QubesException('HMAC file {} too large'.format(
|
||||
hmacfile))
|
||||
|
||||
if hmacfile != filename + ".hmac":
|
||||
raise qubes.exc.QubesException(
|
||||
"ERROR: expected hmac for {}, but got {}".
|
||||
@ -1606,8 +1613,9 @@ class BackupRestore(object):
|
||||
# in case of 'scrypt' _verify_hmac is only used for backup header
|
||||
assert filename == HEADER_FILENAME
|
||||
self._verify_and_decrypt(hmacfile, HEADER_FILENAME + '.dec')
|
||||
if open(os.path.join(self.tmpdir, filename)).read() != \
|
||||
open(os.path.join(self.tmpdir, filename + '.dec')).read():
|
||||
if open(os.path.join(self.tmpdir, filename), 'rb').read() != \
|
||||
open(os.path.join(self.tmpdir, filename + '.dec'),
|
||||
'rb').read():
|
||||
raise qubes.exc.QubesException(
|
||||
'Invalid hmac on {}'.format(filename))
|
||||
else:
|
||||
@ -1625,7 +1633,7 @@ class BackupRestore(object):
|
||||
else:
|
||||
self.log.debug("Loading hmac for file {}".format(filename))
|
||||
hmac = load_hmac(open(os.path.join(self.tmpdir, hmacfile),
|
||||
'r').read())
|
||||
'r', encoding='ascii').read())
|
||||
|
||||
if len(hmac) > 0 and load_hmac(hmac_stdout.decode('ascii')) == hmac:
|
||||
os.unlink(os.path.join(self.tmpdir, hmacfile))
|
||||
|
Loading…
Reference in New Issue
Block a user