pypush/demo.py

226 lines
6.5 KiB
Python
Raw Normal View History

2023-07-26 11:50:48 +00:00
import gzip
2023-05-02 12:39:11 +00:00
import json
2023-07-26 11:50:48 +00:00
import logging
import plistlib
import threading
import time
from base64 import b64decode, b64encode
2023-05-09 21:03:27 +00:00
from getpass import getpass
2023-05-02 12:39:11 +00:00
2023-07-26 11:50:48 +00:00
from cryptography.hazmat.primitives import hashes, serialization
from cryptography.hazmat.primitives.asymmetric import padding, rsa
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives.serialization import load_pem_private_key
2023-07-23 22:55:13 +00:00
from rich.logging import RichHandler
2023-07-26 11:50:48 +00:00
import apns
import ids
2023-07-23 22:55:13 +00:00
logging.basicConfig(
2023-07-26 22:49:41 +00:00
level=logging.NOTSET, format="%(message)s", datefmt="[%X]", handlers=[RichHandler()]
2023-07-23 22:55:13 +00:00
)
# Set sane log levels
logging.getLogger("urllib3").setLevel(logging.WARNING)
logging.getLogger("jelly").setLevel(logging.INFO)
logging.getLogger("nac").setLevel(logging.INFO)
2023-07-25 22:56:36 +00:00
logging.getLogger("apns").setLevel(logging.INFO)
2023-07-24 13:18:21 +00:00
logging.getLogger("albert").setLevel(logging.INFO)
logging.getLogger("ids").setLevel(logging.DEBUG)
logging.getLogger("bags").setLevel(logging.DEBUG)
2023-05-03 00:53:18 +00:00
2023-05-09 21:03:27 +00:00
# Try and load config.json
try:
with open("config.json", "r") as f:
CONFIG = json.load(f)
except FileNotFoundError:
CONFIG = {}
2023-05-02 12:39:11 +00:00
2023-05-09 21:03:27 +00:00
conn = apns.APNSConnection(
CONFIG.get("push", {}).get("key"), CONFIG.get("push", {}).get("cert")
)
2023-05-02 17:40:06 +00:00
2023-07-26 11:50:48 +00:00
2023-05-09 22:48:44 +00:00
def safe_b64decode(s):
try:
return b64decode(s)
except:
return None
2023-07-26 11:50:48 +00:00
2023-05-09 22:48:44 +00:00
conn.connect(token=safe_b64decode(CONFIG.get("push", {}).get("token")))
2023-07-24 20:37:53 +00:00
conn.set_state(1)
2023-07-24 20:43:11 +00:00
conn.filter(["com.apple.madrid"])
2023-07-26 11:50:48 +00:00
2023-05-09 21:03:27 +00:00
user = ids.IDSUser(conn)
2023-05-02 17:40:06 +00:00
2023-05-09 21:03:27 +00:00
if CONFIG.get("auth", {}).get("cert") is not None:
auth_keypair = ids._helpers.KeyPair(CONFIG["auth"]["key"], CONFIG["auth"]["cert"])
user_id = CONFIG["auth"]["user_id"]
handles = CONFIG["auth"]["handles"]
user.restore_authentication(auth_keypair, user_id, handles)
2023-05-02 18:10:13 +00:00
else:
2023-05-09 21:03:27 +00:00
username = input("Username: ")
password = getpass("Password: ")
2023-05-03 00:53:18 +00:00
2023-05-09 21:03:27 +00:00
user.authenticate(username, password)
2023-07-27 15:04:57 +00:00
user.encryption_identity = ids.identity.IDSIdentity(encryption_key=CONFIG.get("encryption", {}).get("rsa_key"), signing_key=CONFIG.get("encryption", {}).get("ec_key"))
2023-07-25 22:46:50 +00:00
if (
CONFIG.get("id", {}).get("cert") is not None
2023-07-27 15:04:57 +00:00
and user.encryption_identity is not None
):
2023-05-09 21:03:27 +00:00
id_keypair = ids._helpers.KeyPair(CONFIG["id"]["key"], CONFIG["id"]["cert"])
user.restore_identity(id_keypair)
else:
2023-07-26 22:49:41 +00:00
logging.info("Registering new identity...")
2023-07-23 19:47:35 +00:00
import emulated.nac
2023-07-26 11:50:48 +00:00
2023-07-23 19:47:35 +00:00
vd = emulated.nac.generate_validation_data()
vd = b64encode(vd).decode()
2023-07-25 22:46:50 +00:00
2023-07-26 22:49:41 +00:00
user.register(vd)
2023-05-09 21:03:27 +00:00
2023-07-26 22:49:41 +00:00
logging.info("Waiting for incoming messages...")
2023-07-25 22:46:50 +00:00
# Create a thread to send keepalive messages
2023-07-26 11:50:48 +00:00
2023-07-25 22:46:50 +00:00
def keepalive():
while True:
time.sleep(5)
conn.keep_alive()
2023-07-26 11:50:48 +00:00
threading.Thread(target=keepalive, daemon=True).start()
2023-05-09 22:01:32 +00:00
2023-05-09 21:03:27 +00:00
# Write config.json
2023-07-26 22:49:41 +00:00
CONFIG["encryption"] = {
2023-07-27 15:04:57 +00:00
"rsa_key": user.encryption_identity.encryption_key,
"ec_key": user.encryption_identity.signing_key,
2023-07-26 22:49:41 +00:00
}
2023-07-25 22:46:50 +00:00
CONFIG["id"] = {
2023-07-26 11:50:48 +00:00
"key": user._id_keypair.key,
"cert": user._id_keypair.cert,
2023-07-25 22:46:50 +00:00
}
2023-05-09 21:03:27 +00:00
CONFIG["auth"] = {
"key": user._auth_keypair.key,
"cert": user._auth_keypair.cert,
"user_id": user.user_id,
"handles": user.handles,
}
CONFIG["push"] = {
"token": b64encode(user.push_connection.token).decode(),
"key": user.push_connection.private_key,
"cert": user.push_connection.cert,
}
2023-07-26 11:50:48 +00:00
2023-05-09 22:48:44 +00:00
with open("config.json", "w") as f:
2023-05-03 00:53:18 +00:00
json.dump(CONFIG, f, indent=4)
2023-07-25 22:46:50 +00:00
2023-07-27 15:04:57 +00:00
user_rsa_key = ids._helpers.parse_key(user.encryption_identity.encryption_key)
NORMAL_NONCE = b"\x00" * 15 + b"\x01"
def decrypt(payload, sender_token, rsa_key: rsa.RSAPrivateKey = user_rsa_key):
"""
iMessage payload format:
0x00 - ?
0x01-0x02 - length of payload
0x03-0xA0 - RSA encrypted payload portion
0x00-0x0F - AES key
0x0F-0x?? - AES encrypted payload portion
0xA1-0xlength of payload+3 - AES encrypted payload portion
0xlength of payload+3 - length of signature
0xLEN+4-0xLEN+4+length of signature - signature
"""
from io import BytesIO
payload = BytesIO(payload)
tag = payload.read(1)
length = int.from_bytes(payload.read(2), "big")
body = payload.read(length)
body_io = BytesIO(body)
rsa_body = rsa_key.decrypt(
body_io.read(160),
2023-07-26 11:50:48 +00:00
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA1()),
algorithm=hashes.SHA1(),
label=None,
),
)
cipher = Cipher(algorithms.AES(rsa_body[:16]), modes.CTR(NORMAL_NONCE))
decrypted = cipher.decryptor().update(rsa_body[16:] + body_io.read())
# Try to gzip decompress the payload
try:
decrypted = gzip.decompress(decrypted)
except:
logging.debug("Failed to decompress payload")
pass
decrypted = plistlib.loads(decrypted)
signature_len = payload.read(1)[0]
signature = payload.read(signature_len)
2023-07-27 00:23:45 +00:00
#logging.info(f"Signature: {signature}")
#logging.info(f"Decrypted: {decrypted}")
# Verify the signature
sender = decrypted["p"][-1]
# Lookup the public key for the sender
lookup = user.lookup([sender])[sender]
2023-07-27 00:23:45 +00:00
#logging.debug(f"Lookup: {lookup}")
sender = None
for identity in lookup['identities']:
if identity['push-token'] == sender_token:
sender = identity
break
if sender is None:
logging.error(f"Failed to find identity for {sender_token}")
identity_keys = sender['client-data']['public-message-identity-key']
2023-07-27 15:04:57 +00:00
identity_keys = ids.identity.IDSIdentity.decode(identity_keys)
2023-07-27 15:04:57 +00:00
sender_ec_key = ids._helpers.parse_key(identity_keys.signing_public_key)
from cryptography.hazmat.primitives.asymmetric import ec
#logging.debug(f"Verifying signature {signature} with key {sender_ec_key.public_numbers()} and data {body}")
# Verify the signature (will throw an exception if it fails)
sender_ec_key.verify(
signature,
body,
ec.ECDSA(hashes.SHA1()),
)
return decrypted
2023-07-25 22:46:50 +00:00
while True:
2023-07-26 11:50:48 +00:00
2023-07-25 22:46:50 +00:00
def check_response(x):
if x[0] != 0x0A:
return False
resp_body = apns._get_field(x[1], 3)
if resp_body is None:
return False
resp_body = plistlib.loads(resp_body)
if "P" not in resp_body:
return False
return True
2023-07-26 11:50:48 +00:00
2023-07-25 22:46:50 +00:00
payload = conn.incoming_queue.wait_pop_find(check_response)
resp_body = apns._get_field(payload[1], 3)
2023-07-25 23:07:29 +00:00
id = apns._get_field(payload[1], 4)
conn._send_ack(id)
2023-07-25 22:46:50 +00:00
resp_body = plistlib.loads(resp_body)
2023-07-26 11:50:48 +00:00
# logging.info(f"Got response: {resp_body}")
2023-07-27 00:23:45 +00:00
logging.debug(f"Got message: {resp_body}")
token = resp_body['t']
2023-07-25 22:46:50 +00:00
payload = resp_body["P"]
payload = decrypt(payload, token)
2023-07-25 22:56:36 +00:00
logging.info(f"Got message: {payload['t']} from {payload['p'][1]}")