Zenflows is a tool to leverage commons-based peer production by documenting and monitoring the life cycle of products. The goal is that of enabling a federated network of organizations to bundle, systematize and share data, information and knowledge about physical artifacts.
This repository contains the cryptographic functions used in Zenflows.
Zencode is executed by the Zenroom VM running inside a crypto-provider micro-service locally reachable by Zenflows.
The language documentation is found on dev.zenroom.org.
The src
directory contains scripts called by the running Zenflows instance.
The test
directory contains unit tests (single scripts tested in local) and integration tests (shell scripts that call zenflows staging instances to test its api).
Below are detailed the most complex crypto exchanges taking place in Zenflows.
sequenceDiagram
autonumber
participant U as 🤓User
participant C as 📱Client
participant S as Server
S->>S: Configured with secret salt
C->>U: Greets, asks email, name and challenges
U->>C: Answers email, name
C->>+S: Sends name and email to server (ASAP)
S->>S: Verifies email is not a duplicate
S->>S: Compute HMAC of email with secret salt
S->>-C: Sends HMAC (ASAP)
U->>C: User provides answers to challenges
C->>C: Generate SEED with PBKDF of HASH(answers) with HMAC
C->>S: (Optional) Generate KDF dictionary of individual answers
C->>C: Generate public keys from SEED
C->>S: Sends public keys
Detail of each query
Uploader Agent is known by the Server and Client signs this query
UploadRequest {
hash: Url64! # sha512
name: String!
description: String
date: DateTime
mimeType: String!
extension: String!
size: Integer! # bytes
}
Server is known to Storage and signs this query
The eddsa_pk is the one associated to the Client Agent who has made the Upload Request
UploadWindow {
eddsa_pk: Base58!
expiry: DateTime! # decided by Server
{ File:: } # sent by Server
}
The Client is unknown to storage, its public key was communicated by the Server
Upload {
hash: Url64! # header
signature: Base58! # header
bin: Base64! # multi-part body
}
The Storage will end up saving this data associated to a hash in url
File {
hash: Url64! # sha512
name: String!
description: String
date: DateTime
uploadDate: DateTime! # Storage fills after upload
mimeType: String!
extension: String!
size: Integer! # bytes
bin: Base64!
}
Upload sequence to the File Storage service (same server or separate CDN)
sequenceDiagram
autonumber
participant C as 📱Client
participant S as 🐧Server
participant F as 💽Storage
C->>S: Mutate (GQL) requesting upload of File::
S->>S: Associate uploader Agent to public key (::eddsa_pk)
S->>F: Marks File:: plus ::eddsa_pk accepted for upload on ::expiry
C->>F: Upload ::bin in body with ::hash ::signature in header
F->>F: Check ::hash ::signature and ::size
C->>F: Allow upload until ::size
F->>F: Check matching ::hash of uploaded ::bin
F->>C: Serve File::bin as :mime content of ::hash URI
The only authenticated communication happens between Client and Server and between Server and Storage, not between Client and Storage.
The Storage has the public key of the server, not that of clients, which simplifies key exchange.
Any Client may hit the upload API endpoint of Storage without signaing, verification is made on expiring key/value of hash and size.
This section illustrates the communication protocol with the FabAccess API implemented in BFFHD to authenticate users and allow them to execute commands on connected Fab machines within an authenticated session.
The Zenflows federated instance operates in a trustless way and leverages our W3C-DID as authentication trust anchor (client public keys).
sequenceDiagram
autonumber
participant C as Client
participant WS as Interfacer-proxy
participant FA as Fabaccess
C->>WS: Sign Open Session
WS->>FA: Forward Signed Open Session from Client
FA->>FA: Client PK verification (public DID)
FA->>WS: Session token - foreach req
WS->>C: Session token
C->>+WS: Sign token + counter + API req
WS->>FA: Forward signed token + counter + API req
FA->>FA: Verify session and exec req
FA->>WS: Return req execution result
WS->>-C: Report result
C->>WS: Sign end session or timeout
WS->>FA: Signed token end session
Now we describe the structure of packets sent from the client using the provided zencode.
To open a session the zencode requires the signature of the current timestamp (to prevent replay attacks)
{
"timestamp": "1234567"
}
The return value is a dictionary with: the command (OPEN
), the identity, the signature and the timestamp. E.g.
{
"command": "OPEN",
"eddsa_public_key": "EdDja2UdyPPEduFhXLEzzRHuW9TdaG7g16oVFAXWYvHt",
"eddsa_signature": "4YApLBq9KMytJZmcRUdU2Ltn6QqLiDCPWshziBJymeP88vRg63VNWL19PM8TxZjcQvkBU6g7ABmwXdCyPnzWsNjM",
"timestamp": "1234567"
}
We are signing the string "OPEN:<timestamp>"
The supported commands are ON
, OFF
, CLOSE
. The service
key descrive the resource we want to change the state of, in case of the CLOSE
command it must be the string "shutdown"
. E.g.
{
"token": "ZmFiYWNjZXNzIHRva2Vu",
"command": "CLOSE",
"service": "shutdown",
"timestamp": 1234567
}
The value that will have to be sent is analogous to the previous one
{
"command":"CLOSE",
"eddsa_public_key":"BmW1a6x43P4Rae9B4hS67PhHTCUShXAGy4K8tQtUfa8L",
"eddsa_signature":"2wCGyeAmaLmgkJPFdCEig5khWYmSeGrEHnnmMDS4Ysm62o544p1ucJUL7VXDX6ko6zae4NTFKtgyb2HrwtwkMpEr",
"service":"shutdown",
"timestamp":"123456",
"token":"ZmFiYWNjZXNzIHRva2Vu"
}
We are signing the string "<command>:<counter>:<token>:<service>"
Zenflows crypto
Copyright (c) 2021-2022 Dyne.org foundation, Amsterdam
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as
published by the Free Software Foundation, either version 3 of the
License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.