Skip to content

Commit d898a94

Browse files
author
Corentin Mors
authored
Support Confidential SSO login (#243)
Confidential SSO makes use of secure enclaves and secure tunnel to send data to them. This PR aims to implement the different pieces to manage this flow.
1 parent 52b8d53 commit d898a94

22 files changed

+1116
-15
lines changed

package.json

+10-4
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@
2323
"lint": "eslint src",
2424
"format": "prettier --write src && eslint --fix src",
2525
"start": "node dist/index.cjs",
26-
"pkg:linux": "pkg . -t node18-linux-x64 -o bundle/dcli-linux -C GZip --public --public-packages tslib,thirty-two --no-bytecode",
27-
"pkg:macos": "pkg . -t node18-macos-x64 -o bundle/dcli-macos -C GZip --public --public-packages tslib,thirty-two --no-bytecode",
28-
"pkg:macos-arm": "pkg . -t node18-macos-arm64 -o bundle/dcli-macos-arm -C GZip --public --public-packages tslib,thirty-two --no-bytecode",
29-
"pkg:win": "pkg . -t node18-win-x64 -o bundle/dcli-win.exe -C GZip --public --public-packages tslib,thirty-two --no-bytecode",
26+
"pkg:linux": "pkg . -t node18-linux-x64 -o bundle/dcli-linux -C GZip --public --public-packages tslib,thirty-two,node-hkdf-sync,vows --no-bytecode",
27+
"pkg:macos": "pkg . -t node18-macos-x64 -o bundle/dcli-macos -C GZip --public --public-packages tslib,thirty-two,node-hkdf-sync,vows --no-bytecode",
28+
"pkg:macos-arm": "pkg . -t node18-macos-arm64 -o bundle/dcli-macos-arm -C GZip --public --public-packages tslib,thirty-two,node-hkdf-sync,vows --no-bytecode",
29+
"pkg:win": "pkg . -t node18-win-x64 -o bundle/dcli-win.exe -C GZip --public --public-packages tslib,thirty-two,node-hkdf-sync,vows --no-bytecode",
3030
"pkg": "yarn run build && yarn run pkg:linux && yarn run pkg:macos && yarn run pkg:win",
3131
"version:bump": "ts-node src/bumpVersion.ts",
3232
"prepare": "husky",
@@ -40,6 +40,7 @@
4040
"contributors": [],
4141
"license": "Apache-2.0",
4242
"nativeDependencies": {
43+
"@dashlane/nsm-attestation": "*",
4344
"better-sqlite3": "*",
4445
"@json2csv/plainjs": "*",
4546
"@json2csv/transforms": "*",
@@ -54,6 +55,7 @@
5455
"@types/better-sqlite3": "^7.6.10",
5556
"@types/chai": "^4.3.16",
5657
"@types/inquirer": "^9.0.7",
58+
"@types/libsodium-wrappers": "^0",
5759
"@types/mocha": "^10.0.6",
5860
"@types/node": "^18.19.33",
5961
"@typescript-eslint/eslint-plugin": "^7.8.0",
@@ -71,17 +73,21 @@
7173
"typescript": "^5.4.5"
7274
},
7375
"dependencies": {
76+
"@dashlane/nsm-attestation": "^1.0.1",
7477
"@json2csv/plainjs": "^7.0.6",
7578
"@json2csv/transforms": "^7.0.6",
7679
"@napi-rs/clipboard": "^1.1.2",
7780
"@napi-rs/keyring": "^1.1.6",
7881
"@node-rs/argon2": "^1.8.3",
82+
"ajv": "^8.13.0",
83+
"ajv-formats": "^3.0.1",
7984
"better-sqlite3": "^10.0.0",
8085
"commander": "^12.0.0",
8186
"got": "^14.2.1",
8287
"inquirer": "^9.2.21",
8388
"inquirer-search-list": "^1.2.6",
8489
"jsonpath-plus": "^9.0.0",
90+
"libsodium-wrappers": "^0.7.13",
8591
"node-mac-auth": "^1.0.0",
8692
"otplib": "^12.0.1",
8793
"playwright-core": "^1.44.0",
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
export class SAMLResponseNotFound extends Error {
2+
constructor() {
3+
super('SAML Response not found');
4+
}
5+
}
+67
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
import { chromium } from 'playwright-core';
2+
import { ConfirmLogin2Request, RequestLogin2Request } from './types';
3+
import { SAMLResponseNotFound } from './errors';
4+
import { apiConnect } from '../../tunnel-api-connect';
5+
import { performSSOVerification } from '../../../endpoints/performSSOVerification';
6+
7+
interface ConfidentialSSOParams {
8+
requestedLogin: string;
9+
}
10+
11+
export const doConfidentialSSOVerification = async ({ requestedLogin }: ConfidentialSSOParams) => {
12+
const api = await apiConnect({
13+
isProduction: true,
14+
enclavePcrList: [
15+
[3, 'dfb6428f132530b8c021bea8cbdba2c87c96308ba7e81c7aff0655ec71228122a9297fd31fe5db7927a7322e396e4c16'],
16+
[8, '4dbb92401207e019e132d86677857081d8e4d21f946f3561b264b7389c6982d3a86bcf9560cef4a2327eac5c5c6ab820'],
17+
],
18+
});
19+
const requestLoginResponse = await api.sendSecureContent<RequestLogin2Request>({
20+
...api,
21+
path: 'authentication/RequestLogin2',
22+
payload: { login: requestedLogin },
23+
});
24+
25+
const { idpAuthorizeUrl, spCallbackUrl, teamUuid, domainName } = requestLoginResponse;
26+
27+
const browser = await chromium.launch({ headless: false, channel: 'chrome' });
28+
const context = await browser.newContext();
29+
const page = await context.newPage();
30+
31+
await page.goto(idpAuthorizeUrl);
32+
33+
let samlResponseData;
34+
const samlResponsePromise = new Promise((resolve) => {
35+
page.on('request', (req) => {
36+
const reqURL = req.url();
37+
if (reqURL === spCallbackUrl) {
38+
samlResponseData = req.postData();
39+
if (browser) {
40+
void browser.close();
41+
}
42+
resolve(undefined);
43+
}
44+
});
45+
});
46+
47+
await samlResponsePromise;
48+
49+
const samlResponse = new URLSearchParams(samlResponseData).get('SAMLResponse');
50+
51+
if (!samlResponse) {
52+
throw new SAMLResponseNotFound();
53+
}
54+
55+
const confirmLoginResponse = await api.sendSecureContent<ConfirmLogin2Request>({
56+
...api,
57+
path: 'authentication/ConfirmLogin2',
58+
payload: { teamUuid, domainName, samlResponse },
59+
});
60+
61+
const ssoVerificationResult = await performSSOVerification({
62+
login: requestedLogin,
63+
ssoToken: confirmLoginResponse.ssoToken,
64+
});
65+
66+
return { ...ssoVerificationResult, ssoSpKey: confirmLoginResponse.userServiceProviderKey };
67+
};
+37
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
export interface RequestLogin2Data {
2+
login: string;
3+
}
4+
5+
export interface RequestLogin2Output {
6+
domainName: string;
7+
idpAuthorizeUrl: string;
8+
spCallbackUrl: string;
9+
teamUuid: string;
10+
validatedDomains: string[];
11+
}
12+
13+
export interface RequestLogin2Request {
14+
path: 'authentication/RequestLogin2';
15+
input: RequestLogin2Data;
16+
output: RequestLogin2Output;
17+
}
18+
19+
export interface ConfirmLogin2Data {
20+
teamUuid: string;
21+
domainName: string;
22+
samlResponse: string;
23+
}
24+
25+
export interface ConfirmLogin2Output {
26+
ssoToken: string;
27+
userServiceProviderKey: string;
28+
exists: boolean;
29+
currentAuthenticationMethods: string[];
30+
expectedAuthenticationMethods: string[];
31+
}
32+
33+
export interface ConfirmLogin2Request {
34+
path: 'authentication/ConfirmLogin2';
35+
input: ConfirmLogin2Data;
36+
output: ConfirmLogin2Output;
37+
}

src/modules/auth/registerDevice.ts

+9-6
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
import winston from 'winston';
22
import { doSSOVerification } from './sso';
3+
import { doConfidentialSSOVerification } from './confidential-sso';
34
import {
45
completeDeviceRegistration,
56
performDashlaneAuthenticatorVerification,
@@ -63,13 +64,15 @@ export const registerDevice = async (params: RegisterDevice) => {
6364
}));
6465
} else if (selectedVerificationMethod.type === 'sso') {
6566
if (selectedVerificationMethod.ssoInfo.isNitroProvider) {
66-
throw new Error('Confidential SSO is currently not supported');
67+
({ authTicket, ssoSpKey } = await doConfidentialSSOVerification({
68+
requestedLogin: login,
69+
}));
70+
} else {
71+
({ authTicket, ssoSpKey } = await doSSOVerification({
72+
requestedLogin: login,
73+
serviceProviderURL: selectedVerificationMethod.ssoInfo.serviceProviderUrl,
74+
}));
6775
}
68-
69-
({ authTicket, ssoSpKey } = await doSSOVerification({
70-
requestedLogin: login,
71-
serviceProviderURL: selectedVerificationMethod.ssoInfo.serviceProviderUrl,
72-
}));
7376
} else {
7477
throw new Error('Auth verification method not supported: ' + selectedVerificationMethod.type);
7578
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
import * as sodium from 'libsodium-wrappers';
2+
import { clientHello, terminateHello, SendSecureContentParams, sendSecureContent } from './steps';
3+
import { ApiConnectParams, ApiConnect, ApiData, ApiRequestsDefault } from './types';
4+
import { makeClientKeyPair, makeOrRefreshSession } from './utils';
5+
6+
/** Type predicates
7+
* https://www.typescriptlang.org/docs/handbook/2/narrowing.html#using-type-predicates
8+
*
9+
* From Partial<ApiData> to ApiData
10+
*/
11+
const hasFullApiData = (data: Partial<ApiData>): data is ApiData => {
12+
if (data.clientHello && data.terminateHello) {
13+
return true;
14+
}
15+
return false;
16+
};
17+
18+
/** Return an object that can be used to send secure content through the tunnel
19+
*/
20+
export const apiConnect = async (apiParametersIn: ApiConnectParams): Promise<ApiConnect> => {
21+
await sodium.ready;
22+
23+
const apiParameters = {
24+
...apiParametersIn,
25+
...{ clientKeyPair: apiParametersIn.clientKeyPair ?? makeClientKeyPair() },
26+
};
27+
28+
const apiData: Partial<ApiData> = {};
29+
const api: ApiConnect = {
30+
apiData,
31+
apiParameters,
32+
clientHello: () => clientHello(apiParameters),
33+
terminateHello: ({ attestation }: { attestation: Buffer }, apiData: Partial<ApiData>) =>
34+
terminateHello({ ...apiParameters, attestation }, apiData),
35+
makeOrRefreshSession,
36+
sendSecureContent: async <R extends ApiRequestsDefault>(
37+
params: Pick<SendSecureContentParams<R>, 'path' | 'payload'>
38+
) => {
39+
await api.makeOrRefreshSession({ api, apiData });
40+
if (!hasFullApiData(apiData)) {
41+
throw new Error('ShouldNotHappen');
42+
}
43+
return sendSecureContent({ ...apiParameters, ...apiData.terminateHello, ...params }, apiData);
44+
},
45+
};
46+
return api;
47+
};
+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
export class HTTPError extends Error {
2+
constructor(
3+
readonly statusCode: number,
4+
readonly message: string
5+
) {
6+
super(`HTTP error: ${statusCode}`);
7+
}
8+
}
9+
10+
export class ApiError extends Error {
11+
constructor(
12+
readonly status: string,
13+
readonly code: string,
14+
readonly message: string
15+
) {
16+
super(`Api error: ${code}`);
17+
}
18+
}
19+
20+
export class SecureTunnelNotInitialized extends Error {
21+
constructor() {
22+
super('Secure tunnel not initialized');
23+
}
24+
}
25+
26+
export class SendSecureContentDataDecryptionError extends Error {
27+
constructor() {
28+
super('Send secure content data decryption error');
29+
}
30+
}
+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
export * from './apiconnect';
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
import sodium from 'libsodium-wrappers';
2+
import type { ClientHelloParsedResponse, ClientHelloRequest, ClientHelloResponse } from './types';
3+
import { clientHelloResponseSchema } from './schemas';
4+
import type { ApiConnectInternalParams } from '../types';
5+
import { TypeCheck, TypeCheckError } from '../../typecheck';
6+
import { requestAppApi } from '../../../requestApi';
7+
8+
export const clientHelloRequestSchemaValidator = new TypeCheck<ClientHelloResponse>(clientHelloResponseSchema);
9+
10+
export const clientHello = async (params: ApiConnectInternalParams): Promise<ClientHelloParsedResponse> => {
11+
const { clientKeyPair } = params;
12+
13+
const payload = {
14+
clientPublicKey: sodium.to_hex(clientKeyPair.publicKey),
15+
} satisfies ClientHelloRequest;
16+
17+
const response = await requestAppApi<ClientHelloResponse>({
18+
path: `tunnel/ClientHello`,
19+
payload,
20+
isNitroEncryptionService: true,
21+
});
22+
23+
const validated = clientHelloRequestSchemaValidator.validate(response);
24+
if (validated instanceof TypeCheckError) {
25+
throw validated;
26+
}
27+
28+
return {
29+
attestation: Buffer.from(validated.attestation, 'hex'),
30+
tunnelUuid: validated.tunnelUuid,
31+
};
32+
};
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
export * from './clientHello';
2+
export * from './sendSecureContent';
3+
export * from './terminateHello';
4+
export * from './types';
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
import { JSONSchema4 } from 'json-schema';
2+
3+
/**
4+
* https://docs.aws.amazon.com/enclaves/latest/user/verify-root.html
5+
* Attestation document specification
6+
* - user_data = bytes .size (0..1024)
7+
* To accommodate base64 encoding 1024 * 1.3 ~= 1332
8+
*/
9+
export const attestationUserDataSchema: JSONSchema4 = {
10+
type: 'object',
11+
description: 'User data from verifyAttestation',
12+
properties: {
13+
publicKey: {
14+
type: 'string',
15+
base64: true,
16+
maxLength: 1500,
17+
minLength: 4,
18+
},
19+
header: {
20+
type: 'string',
21+
base64: true,
22+
maxLength: 1500,
23+
minLength: 4,
24+
},
25+
},
26+
required: ['publicKey', 'header'],
27+
additionalProperties: false,
28+
};
29+
30+
export const clientHelloResponseSchema: JSONSchema4 = {
31+
type: 'object',
32+
properties: {
33+
attestation: {
34+
type: 'string',
35+
pattern: '^[A-Fa-f0-9]+$',
36+
description: 'NSM enclave attestation in hexadecimal format',
37+
},
38+
tunnelUuid: {
39+
type: 'string',
40+
description: 'The UUID of the tunnel used for the cryptographic session',
41+
},
42+
},
43+
required: ['attestation', 'tunnelUuid'],
44+
additionalProperties: false,
45+
};
46+
47+
export const secureContentBodyDataSchema: JSONSchema4 = {
48+
type: 'object',
49+
description: 'Send secure content data',
50+
properties: {
51+
encryptedData: {
52+
type: 'string',
53+
// TODO: Extends AJV with an `encoding` keyword to support base64 | hex
54+
pattern: '^[A-Fa-f0-9]+$',
55+
},
56+
},
57+
required: ['encryptedData'],
58+
additionalProperties: false,
59+
};

0 commit comments

Comments
 (0)