pypush/imessage.py

206 lines
5.8 KiB
Python
Raw Normal View History

2023-07-27 15:04:57 +00:00
# LOW LEVEL imessage function, decryption etc
# Don't handle APNS etc, accept it already setup
## HAVE ANOTHER FILE TO SETUP EVERYTHING AUTOMATICALLY, etc
# JSON parsing of keys, don't pass around strs??
import apns
import ids
2023-07-27 15:52:20 +00:00
import plistlib
from io import BytesIO
from cryptography.hazmat.primitives.asymmetric import ec, padding
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
import gzip
2023-07-27 21:34:38 +00:00
import logging
logger = logging.getLogger("imessage")
2023-07-27 15:52:20 +00:00
NORMAL_NONCE = b"\x00" * 15 + b"\x01"
2023-07-27 15:04:57 +00:00
class iMessageUser:
2023-07-27 15:52:20 +00:00
def __init__(self, connection: apns.APNSConnection, user: ids.IDSUser):
self.connection = connection
self.user = user
2023-07-27 15:04:57 +00:00
2023-07-27 15:52:20 +00:00
def _get_raw_message(self):
"""
Returns a raw APNs message corresponding to the next conforming notification in the queue
"""
def check_response(x):
if x[0] != 0x0A:
return False
resp_body = apns._get_field(x[1], 3)
if resp_body is None:
return False
resp_body = plistlib.loads(resp_body)
if "P" not in resp_body:
return False
return True
payload = self.connection.incoming_queue.wait_pop_find(check_response)
id = apns._get_field(payload[1], 4)
self.connection._send_ack(id)
return payload
2023-07-27 15:04:57 +00:00
2023-07-27 15:52:20 +00:00
def _send_raw_message(self, message: dict):
2023-07-27 15:04:57 +00:00
pass
def _encrypt_message(self, message: dict) -> dict:
pass
def _sign_message(self, message: dict) -> dict:
pass
2023-07-27 15:52:20 +00:00
def _parse_payload(payload: bytes) -> tuple[bytes, bytes]:
payload = BytesIO(payload)
2023-07-27 15:04:57 +00:00
2023-07-27 15:52:20 +00:00
tag = payload.read(1)
body_length = int.from_bytes(payload.read(2), "big")
body = payload.read(body_length)
signature_len = payload.read(1)[0]
signature = payload.read(signature_len)
return (body, signature)
def _decrypt_payload(self, payload: bytes) -> dict:
payload = iMessageUser._parse_payload(payload)
body = BytesIO(payload[0])
rsa_body = ids._helpers.parse_key(self.user.encryption_identity.encryption_key).decrypt(
body.read(160),
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA1()),
algorithm=hashes.SHA1(),
label=None,
),
)
cipher = Cipher(algorithms.AES(rsa_body[:16]), modes.CTR(NORMAL_NONCE))
decrypted = cipher.decryptor().update(rsa_body[16:] + body.read())
# Try to gzip decompress the payload
try:
decrypted = gzip.decompress(decrypted)
except:
pass
return plistlib.loads(decrypted)
def _verify_payload(self, payload: bytes, sender: str, sender_token: str) -> bool:
# Get the public key for the sender
lookup = self.user.lookup([sender])[sender]
sender_iden = None
for identity in lookup['identities']:
if identity['push-token'] == sender_token:
sender_iden = identity
break
identity_keys = sender_iden['client-data']['public-message-identity-key']
identity_keys = ids.identity.IDSIdentity.decode(identity_keys)
sender_ec_key = ids._helpers.parse_key(identity_keys.signing_public_key)
payload = iMessageUser._parse_payload(payload)
try:
# Verify the signature (will throw an exception if it fails)
sender_ec_key.verify(
payload[1],
payload[0],
ec.ECDSA(hashes.SHA1()),
)
return True
except:
return False
2023-07-27 21:34:38 +00:00
def receive(self) -> 'iMessage':
2023-07-27 15:52:20 +00:00
raw = self._get_raw_message()
body = apns._get_field(raw[1], 3)
body = plistlib.loads(body)
payload = body["P"]
decrypted = self._decrypt_payload(payload)
2023-07-27 21:34:38 +00:00
if "p" in decrypted:
if not self._verify_payload(payload, decrypted["p"][-1], body["t"]):
raise Exception("Failed to verify payload")
else:
logger.warning("Unable to verify, couldn't determine sender! Dropping message! (TODO work out a way to verify these anyway)")
return self.receive() # Call again to get the next message
return iMessage.from_raw(decrypted)
def send(self, message: dict):
logger.error(f"Sending {message}")
def receive_message(self) -> str:
pass
def send_message(self, message: str, to: str):
pass
class ExtendedBody:
def __init__(self, type: str, data: bytes):
self.type = type
self.data = data
# TODO : Register handlers based on type id
class iMessage:
text: str
xml: str | None = None
participants: list[str]
sender: str
id: str
group_id: str
body: ExtendedBody | None = None
_raw: dict | None = None
def from_raw(message: dict) -> 'iMessage':
self = iMessage()
self._raw = message
self.text = message.get('t')
self.xml = message.get('x')
self.participants = message.get('p', [])
if self.participants != []:
self.sender = self.participants[-1]
else:
self.sender = None
self.id = message.get('r')
self.group_id = message.get('gid')
if 'bid' in message:
# This is a message extension body
self.body = ExtendedBody(message['bid'], message['b'])
return self
def to_raw(self) -> dict:
return {
"t": self.text,
"x": self.xml,
"p": self.participants,
"r": self.id,
"gid": self.group_id,
}
def __str__(self):
if self._raw is not None:
return str(self._raw)
else:
return f"iMessage({self.text} from {self.sender})"