-
Notifications
You must be signed in to change notification settings - Fork 0
/
main.py
100 lines (82 loc) · 3.22 KB
/
main.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
# Imports
from fido2.hid import CtapHidDevice
from fido2.client import Fido2Client, UserInteraction
from getpass import getpass
import libs.cred_manager as cred_manager
import libs.mem_gen as mem_gen
import hashlib
import sys
import os
# Utilities
def sha256(data):
enc = hashlib.sha256()
enc.update(data.encode())
return enc.digest()
# FIDO2
try:
from fido2.pcsc import CtapPcscDevice
except ImportError:
CtapPcscDevice = None
def enumerate_devices():
for dev in CtapHidDevice.list_devices():
yield dev
if CtapPcscDevice:
for dev in CtapPcscDevice.list_devices():
yield dev
# Handle user interaction
class CliInteraction(UserInteraction):
def prompt_up(self):
print("\nTouch your authenticator device now...\n")
def request_pin(self, permissions, rd_id):
return getpass("Enter PIN: ")
def request_uv(self, permissions, rd_id):
print("User Verification required.")
return True
def locate_device():
# Locate a device
for dev in enumerate_devices():
client = Fido2Client(dev, "https://localhost", user_interaction=CliInteraction())
if "hmac-secret" in client.info.extensions:
break
else:
print("No Authenticator with the HmacSecret extension found!")
sys.exit(1)
return client
# Main
if __name__ == "__main__":
# Prepare parameters for makeCredential and getAssertion
rp = {"id": "localhost", "name": "HMyWallet"}
user = {"id": b"1", "name": "HMyWalletUser"}
# Locate a device
client = CliInteraction.locate_device()
# Loading or creating a new credential
credential = cred_manager.load_credential()
if not credential:
credential = cred_manager.create_credential(client, rp, user)
# Prepare parameters for getAssertion
challenge = os.urandom(16) # Use a new challenge for each call.
allow_list = [{"type": "public-key", "id": credential.credential_id}]
# Ask user for password
password = getpass("[+] Enter your password: ")
# Generate a salt for HmacSecret:
password_hash = sha256(password) #os.urandom(32)
print("[OK] Password hashed and ready for authentication")
# Authenticate the credential
result = client.get_assertion(
{
"rpId": rp["id"],
"challenge": challenge,
"allowCredentials": allow_list,
"extensions": {"hmacGetSecret": {"salt1": password_hash}},
},
).get_response(
0
) # Only one cred in allowList, only one response.
secret = result.extension_results["hmacGetSecret"]["output1"]
print("[OK] Authenticated and secret retrieved")
mnemonic_string = mem_gen.gen_mnemonic(secret)
print("\nALERT: This is your mnemonic seed. Keep it in a safe place. You will need it to recover your wallet.")
print("If you lose it, you will lose access to your wallet. There is no way to recover it later.")
print("Anyone with access to your mnemonic seed can recover your wallet. Keep it in a secure location.")
print("For security reasons, it is adviced to not save it in plain text: you can use your password and this script to recover it.")
print("\nMnemonic words:\n", mnemonic_string)