Use signature-level signature for TemporaryStorageProvider and describe the security model

This commit is contained in:
Dominik Schürmann
2015-06-29 10:54:04 +02:00
parent 99c06b085b
commit 93e6b6f9b5
2 changed files with 50 additions and 18 deletions

View File

@@ -48,9 +48,10 @@
android:name="android.hardware.screen.portrait" android:name="android.hardware.screen.portrait"
android:required="false" /> android:required="false" />
<permission android:name="${applicationId}.WRITE_TEMPORARY_STORAGE" /> <!-- TemporaryStorageProvider should be writable by OpenKeychain only, thus signature-level permission -->
<permission
<uses-permission android:name="${applicationId}.WRITE_TEMPORARY_STORAGE" /> android:name="${applicationId}.WRITE_TEMPORARY_STORAGE"
android:protectionLevel="signature" />
<uses-permission android:name="android.permission.INTERNET" /> <uses-permission android:name="android.permission.INTERNET" />
<uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" /> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />

View File

@@ -19,23 +19,15 @@
package org.sufficientlysecure.keychain.provider; package org.sufficientlysecure.keychain.provider;
import java.io.File;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.util.UUID;
import android.content.ClipDescription; import android.content.ClipDescription;
import android.content.ContentProvider; import android.content.ContentProvider;
import android.content.ContentValues; import android.content.ContentValues;
import android.content.Context; import android.content.Context;
import android.content.res.AssetFileDescriptor;
import android.database.Cursor; import android.database.Cursor;
import android.database.MatrixCursor; import android.database.MatrixCursor;
import android.database.sqlite.SQLiteDatabase; import android.database.sqlite.SQLiteDatabase;
import android.database.sqlite.SQLiteOpenHelper; import android.database.sqlite.SQLiteOpenHelper;
import android.net.Uri; import android.net.Uri;
import android.os.Bundle;
import android.os.CancellationSignal;
import android.os.ParcelFileDescriptor; import android.os.ParcelFileDescriptor;
import android.provider.OpenableColumns; import android.provider.OpenableColumns;
@@ -43,6 +35,30 @@ import org.sufficientlysecure.keychain.Constants;
import org.sufficientlysecure.keychain.util.DatabaseUtil; import org.sufficientlysecure.keychain.util.DatabaseUtil;
import org.sufficientlysecure.keychain.util.Log; import org.sufficientlysecure.keychain.util.Log;
import java.io.File;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.util.UUID;
/**
* TemporaryStorageProvider stores decrypted files inside the app's cache directory previously to
* sharing them with other applications.
*
* Security:
* - It is writable by OpenKeychain only (see Manifest), but exported for reading files
* - It uses UUIDs as identifiers which makes predicting files from outside impossible
* - Querying a number of files is not allowed, only querying single files
* -> You can only open a file if you know the Uri containing the precise UUID, this Uri is only
* revealed when the user shares a decrypted file with another app.
*
* Why is support lib's FileProvider not used?
* Because granting Uri permissions temporarily does not work correctly. See
* - https://code.google.com/p/android/issues/detail?id=76683
* - https://github.com/nmr8acme/FileProvider-permission-bug
* - http://stackoverflow.com/q/24467696
* - http://stackoverflow.com/q/18249007
* - Comments at http://www.blogc.at/2014/03/23/share-private-files-with-other-apps-fileprovider/
*/
public class TemporaryStorageProvider extends ContentProvider { public class TemporaryStorageProvider extends ContentProvider {
private static final String DB_NAME = "tempstorage.db"; private static final String DB_NAME = "tempstorage.db";
@@ -143,6 +159,10 @@ public class TemporaryStorageProvider extends ContentProvider {
@Override @Override
public Cursor query(Uri uri, String[] projection, String selection, String[] selectionArgs, String sortOrder) { public Cursor query(Uri uri, String[] projection, String selection, String[] selectionArgs, String sortOrder) {
if (uri.getLastPathSegment() == null) {
throw new SecurityException("Listing temporary files is not allowed, only querying single files.");
}
File file; File file;
try { try {
file = getFile(uri); file = getFile(uri);
@@ -153,9 +173,15 @@ public class TemporaryStorageProvider extends ContentProvider {
new String[]{uri.getLastPathSegment()}, null, null, null); new String[]{uri.getLastPathSegment()}, null, null, null);
if (fileName != null) { if (fileName != null) {
if (fileName.moveToNext()) { if (fileName.moveToNext()) {
MatrixCursor cursor = MatrixCursor cursor = new MatrixCursor(new String[]{
new MatrixCursor(new String[]{OpenableColumns.DISPLAY_NAME, OpenableColumns.SIZE, "_data"}); OpenableColumns.DISPLAY_NAME,
cursor.newRow().add(fileName.getString(0)).add(file.length()).add(file.getAbsolutePath()); OpenableColumns.SIZE,
"_data"
});
cursor.newRow()
.add(fileName.getString(0))
.add(file.length())
.add(file.getAbsolutePath());
fileName.close(); fileName.close();
return cursor; return cursor;
} }
@@ -167,8 +193,8 @@ public class TemporaryStorageProvider extends ContentProvider {
@Override @Override
public String getType(Uri uri) { public String getType(Uri uri) {
Cursor cursor = db.getReadableDatabase().query(TABLE_FILES, Cursor cursor = db.getReadableDatabase().query(TABLE_FILES,
new String[]{ COLUMN_TYPE }, COLUMN_ID + "=?", new String[]{COLUMN_TYPE}, COLUMN_ID + "=?",
new String[]{ uri.getLastPathSegment() }, null, null, null); new String[]{uri.getLastPathSegment()}, null, null, null);
if (cursor != null) { if (cursor != null) {
try { try {
if (cursor.moveToNext()) { if (cursor.moveToNext()) {
@@ -187,7 +213,7 @@ public class TemporaryStorageProvider extends ContentProvider {
public String[] getStreamTypes(Uri uri, String mimeTypeFilter) { public String[] getStreamTypes(Uri uri, String mimeTypeFilter) {
String type = getType(uri); String type = getType(uri);
if (ClipDescription.compareMimeTypes(type, mimeTypeFilter)) { if (ClipDescription.compareMimeTypes(type, mimeTypeFilter)) {
return new String[] { type }; return new String[]{type};
} }
return null; return null;
} }
@@ -200,9 +226,14 @@ public class TemporaryStorageProvider extends ContentProvider {
String uuid = UUID.randomUUID().toString(); String uuid = UUID.randomUUID().toString();
values.put(COLUMN_ID, uuid); values.put(COLUMN_ID, uuid);
int insert = (int) db.getWritableDatabase().insert(TABLE_FILES, null, values); int insert = (int) db.getWritableDatabase().insert(TABLE_FILES, null, values);
if (insert == -1) {
Log.e(Constants.TAG, "Insert failed!");
return null;
}
try { try {
getFile(uuid).createNewFile(); getFile(uuid).createNewFile();
} catch (IOException e) { } catch (IOException e) {
Log.e(Constants.TAG, "File creation failed!");
return null; return null;
} }
return Uri.withAppendedPath(BASE_URI, uuid); return Uri.withAppendedPath(BASE_URI, uuid);
@@ -238,7 +269,7 @@ public class TemporaryStorageProvider extends ContentProvider {
throw new UnsupportedOperationException("Update supported only for plain uri!"); throw new UnsupportedOperationException("Update supported only for plain uri!");
} }
return db.getWritableDatabase().update(TABLE_FILES, values, return db.getWritableDatabase().update(TABLE_FILES, values,
COLUMN_ID + " = ?", new String[]{ uri.getLastPathSegment() }); COLUMN_ID + " = ?", new String[]{uri.getLastPathSegment()});
} }
@Override @Override