python libopaque wrapper
Project description
libopaque Python bindings
These bindings provide access to libopaque which implements the IRTF CFRG RFC draft or you can read the original paper.
Dependencies
These bindings depend on the following:
- libopaque: https://github.com/stef/libopaque/
- libsodium
- pysodium
API
There is one data structure that is used by libopaque:
Ids
The IDs of the peers are passed around as a struct:
# wrap the IDs into an opaque.Ids struct:
ids=opaque.Ids("user", "server")
1-step registration
1-step registration is only specified in the original paper. It is not specified by the IRTF
CFRG draft. 1-step registration has the benefit that the supplied password (pwdU) can be checked
on the server for password rules (e.g., occurrence in common password
lists). It has the drawback that the password is exposed to the server.
rec, export_key = opaque.Register(pwdU, ids, skS)
pwdUis the user's password.idsis anIdsstruct that contains the IDs of the user and the server.skSis an optional server long-term private-key
4-step registration
Registration as specified in the IRTF CFRG draft consists of the following 4 steps:
Step 1: The user creates a registration request.
secU, M = opaque.CreateRegistrationRequest(pwdU)
pwdUis the user's password.
The user should hold on to secU securely until step 3 of the registration process.
M needs to be passed to the server running step 2.
Step 2: The server responds to the registration request.
secS, pub = opaque.CreateRegistrationResponse(M, skS)
Mcomes from the user running the previous step.skSis an optional server long-term private-key
The server should hold onto secS securely until step 4 of the registration process.
pub should be passed to the user running step 3.
Step 3: The user finalizes the registration using the response from the server.
rec0, export_key = opaque.FinalizeRequest(secU, pub, ids)
-
secUcontains sensitive data and should be disposed securely after usage in this step. -
pubcomes from the server running the previous step. -
idsis anIdsstruct that contains the IDs of the user and the server. -
rec0should be passed to the server running step 4. -
export_keyis an extra secret that can be used to encrypt additional data that you might want to store on the server next to your record.
Step 4: The server finalizes the user's record.
rec1 = opaque.StoreUserRecord(secS, rec0)
-
rec0comes from the user running the previous step. -
secScontains sensitive data and should be disposed securely after usage in this step. -
rec1should be stored by the server associated with the ID of the user.
Important Note: Confusingly this function is called StoreUserRecord, yet it
does not do any storage. How you want to store the record (rec1) is up
to the implementor using this API.
Establishing an opaque session
After a user has registered with a server, the user can initiate the AKE and thus request its credentials in the following 3(+1)-step protocol:
Step 1: The user initiates a credential request.
pub, secU = opaque.CreateCredentialRequest(pwdU)
pwdUis the user's password.
The user should hold onto secU securely until step 3 of the protocol.
pub needs to be passed to the server running step 2.
Step 2: The server responds to the credential request.
resp, sk, secS = opaque.CreateCredentialResponse(pub, rec, ids, context)
-
pubcomes from the user running the previous step. -
recis the user's record stored by the server at the end of the registration protocol. -
idsis anIdsstruct that contains the IDs of the user and the server. -
contextis a string distinguishing this instantiation of the protocol from others, e.g. "MyApp-v0.2" -
respneeds to be passed to the user running step 3. -
skis a shared secret, the result of the AKE. -
The server should hold onto
secSsecurely until the optional step 4 of the protocol, if needed. otherwise this value should be discarded securely.
Step 3: The user recovers its credentials from the server's response.
sk, authU, export_key = opaque.RecoverCredentials(resp, secU, ctx, ids)
-
respcomes from the server running the previous step. -
secUcontains sensitive data and should be disposed securely after usage in this step. -
contextis a string distinguishing this instantiation of the protocol from others, e.g. "MyApp-v0.2" -
skis a shared secret, the result of the AKE. -
authUis an authentication tag that can be passed in step 4 for explicit user authentication. -
export_keycan be used to decrypt additional data stored by the server.
Step 4 (Optional): The server authenticates the user.
This step is only needed if there is no encrypted channel setup towards the server using the shared secret.
opaque.UserAuth(secS, authU)
secScontains sensitive data and should be disposed securely after usage in this step.authUcomes from the user running the previous step.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file opaque-1.0.0.tar.gz.
File metadata
- Download URL: opaque-1.0.0.tar.gz
- Upload date:
- Size: 10.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.12.8
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5b8a3e52624e6c9a43c784116cffac6af31788afdece3aa625eb7f99a20ebe32
|
|
| MD5 |
ca645a4aeaf819b4edc683c244c0ea7e
|
|
| BLAKE2b-256 |
ce470269e26df66f407b758d77b73648b150b920c1f093c018ca93dffd619162
|