4 * @file mod/dfrn_notify.php
5 * @brief The dfrn notify endpoint
6 * @see PDF with dfrn specs: https://github.com/friendica/friendica/blob/master/spec/dfrn2.pdf
10 use Friendica\Core\Config;
11 use Friendica\Database\DBM;
12 use Friendica\Protocol\DFRN;
14 require_once('include/items.php');
15 require_once('include/event.php');
17 require_once('library/defuse/php-encryption-1.2.1/Crypto.php');
19 function dfrn_notify_post(App $a) {
20 logger(__function__, LOGGER_TRACE);
21 $dfrn_id = ((x($_POST,'dfrn_id')) ? notags(trim($_POST['dfrn_id'])) : '');
22 $dfrn_version = ((x($_POST,'dfrn_version')) ? (float) $_POST['dfrn_version'] : 2.0);
23 $challenge = ((x($_POST,'challenge')) ? notags(trim($_POST['challenge'])) : '');
24 $data = ((x($_POST,'data')) ? $_POST['data'] : '');
25 $key = ((x($_POST,'key')) ? $_POST['key'] : '');
26 $rino_remote = ((x($_POST,'rino')) ? intval($_POST['rino']) : 0);
27 $dissolve = ((x($_POST,'dissolve')) ? intval($_POST['dissolve']) : 0);
28 $perm = ((x($_POST,'perm')) ? notags(trim($_POST['perm'])) : 'r');
29 $ssl_policy = ((x($_POST,'ssl_policy')) ? notags(trim($_POST['ssl_policy'])): 'none');
30 $page = ((x($_POST,'page')) ? intval($_POST['page']) : 0);
32 $forum = (($page == 1) ? 1 : 0);
33 $prv = (($page == 2) ? 1 : 0);
36 if ($dfrn_version >= 2.21) {
37 $writable = (($perm === 'rw') ? 1 : 0);
41 if (strpos($dfrn_id, ':') == 1) {
42 $direction = intval(substr($dfrn_id, 0, 1));
43 $dfrn_id = substr($dfrn_id, 2);
46 $r = q("SELECT * FROM `challenge` WHERE `dfrn-id` = '%s' AND `challenge` = '%s' LIMIT 1",
50 if (! DBM::is_result($r)) {
51 logger('dfrn_notify: could not match challenge to dfrn_id ' . $dfrn_id . ' challenge=' . $challenge);
52 xml_status(3, 'Could not match challenge');
55 $r = q("DELETE FROM `challenge` WHERE `dfrn-id` = '%s' AND `challenge` = '%s'",
60 // find the local user who owns this relationship.
65 $sql_extra = sprintf(" AND ( `issued-id` = '%s' OR `dfrn-id` = '%s' ) ", dbesc($dfrn_id), dbesc($dfrn_id));
68 $sql_extra = sprintf(" AND `issued-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
71 $sql_extra = sprintf(" AND `dfrn-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
74 xml_status(3, 'Invalid direction');
79 * be careful - $importer will contain both the contact information for the contact
80 * sending us the post, and also the user information for the person receiving it.
81 * since they are mixed together, it is easy to get them confused.
84 $r = q("SELECT `contact`.*, `contact`.`uid` AS `importer_uid`,
85 `contact`.`pubkey` AS `cpubkey`,
86 `contact`.`prvkey` AS `cprvkey`,
87 `contact`.`thumb` AS `thumb`,
88 `contact`.`url` as `url`,
89 `contact`.`name` as `senderName`,
92 LEFT JOIN `user` ON `contact`.`uid` = `user`.`uid`
93 WHERE `contact`.`blocked` = 0 AND `contact`.`pending` = 0
94 AND `user`.`nickname` = '%s' AND `user`.`account_expired` = 0 AND `user`.`account_removed` = 0 $sql_extra LIMIT 1",
98 if (! DBM::is_result($r)) {
99 logger('dfrn_notify: contact not found for dfrn_id ' . $dfrn_id);
100 xml_status(3, 'Contact not found');
104 // $importer in this case contains the contact record for the remote contact joined with the user record of our user.
108 logger("Remote rino version: ".$rino_remote." for ".$importer["url"], LOGGER_DEBUG);
110 if ((($writable != (-1)) && ($writable != $importer['writable'])) || ($importer['forum'] != $forum) || ($importer['prv'] != $prv)) {
111 q("UPDATE `contact` SET `writable` = %d, forum = %d, prv = %d WHERE `id` = %d",
112 intval(($writable == (-1)) ? $importer['writable'] : $writable),
115 intval($importer['id'])
117 if ($writable != (-1)) {
118 $importer['writable'] = $writable;
120 $importer['forum'] = $page;
124 // if contact's ssl policy changed, update our links
126 fix_contact_ssl_policy($importer,$ssl_policy);
128 logger('dfrn_notify: received notify from ' . $importer['name'] . ' for ' . $importer['username']);
129 logger('dfrn_notify: data: ' . $data, LOGGER_DATA);
131 if ($dissolve == 1) {
134 * Relationship is dissolved permanently
137 require_once('include/Contact.php');
138 contact_remove($importer['id']);
139 logger('relationship dissolved : ' . $importer['name'] . ' dissolved ' . $importer['username']);
140 xml_status(0, 'relationship dissolved');
143 $rino = Config::get('system', 'rino_encrypt');
144 $rino = intval($rino);
146 logger("Local rino version: " . $rino, LOGGER_DEBUG);
150 // if local rino is lower than remote rino, abort: should not happen!
151 // but only for $remote_rino > 1, because old code did't send rino version
152 if ($rino_remote_version > 1 && $rino < $rino_remote) {
153 logger("rino version '$rino_remote' is lower than supported '$rino'");
154 xml_status(0, "rino version '$rino_remote' is lower than supported '$rino'");
157 $rawkey = hex2bin(trim($key));
158 logger('rino: md5 raw key: ' . md5($rawkey));
161 if ($dfrn_version >= 2.1) {
162 if ((($importer['duplex']) && strlen($importer['cprvkey'])) || (! strlen($importer['cpubkey']))) {
163 openssl_private_decrypt($rawkey, $final_key, $importer['cprvkey']);
165 openssl_public_decrypt($rawkey, $final_key, $importer['cpubkey']);
168 if ((($importer['duplex']) && strlen($importer['cpubkey'])) || (! strlen($importer['cprvkey']))) {
169 openssl_public_decrypt($rawkey, $final_key, $importer['cpubkey']);
171 openssl_private_decrypt($rawkey, $final_key, $importer['cprvkey']);
175 #logger('rino: received key : ' . $final_key);
177 switch($rino_remote) {
181 *we got a key. old code send only the key, without RINO version.
182 * we assume RINO 1 if key and no RINO version
184 $data = DFRN::aes_decrypt(hex2bin($data), $final_key);
188 $data = Crypto::decrypt(hex2bin($data), $final_key);
189 } catch (InvalidCiphertext $ex) { // VERY IMPORTANT
192 * 1. The ciphertext was modified by the attacker,
193 * 2. The key is wrong, or
194 * 3. $ciphertext is not a valid ciphertext or was corrupted.
197 logger('The ciphertext has been tampered with!');
198 xml_status(0, 'The ciphertext has been tampered with!');
199 } catch (Ex\CryptoTestFailed $ex) {
200 logger('Cannot safely perform dencryption');
201 xml_status(0, 'CryptoTestFailed');
202 } catch (Ex\CannotPerformOperation $ex) {
203 logger('Cannot safely perform decryption');
204 xml_status(0, 'Cannot safely perform decryption');
208 logger("rino: invalid sent version '$rino_remote'");
209 xml_status(0, "Invalid sent version '$rino_remote'");
213 logger('rino: decrypted data: ' . $data, LOGGER_DATA);
216 $ret = DFRN::import($data, $importer);
217 xml_status($ret, 'Processed');
223 function dfrn_notify_content(App $a) {
225 if(x($_GET,'dfrn_id')) {
228 * initial communication from external contact, $direction is their direction.
229 * If this is a duplex communication, ours will be the opposite.
232 $dfrn_id = notags(trim($_GET['dfrn_id']));
233 $dfrn_version = (float) $_GET['dfrn_version'];
234 $rino_remote = ((x($_GET,'rino')) ? intval($_GET['rino']) : 0);
238 logger('dfrn_notify: new notification dfrn_id=' . $dfrn_id);
241 if(strpos($dfrn_id,':') == 1) {
242 $direction = intval(substr($dfrn_id,0,1));
243 $dfrn_id = substr($dfrn_id,2);
246 $hash = random_string();
250 $r = q("DELETE FROM `challenge` WHERE `expire` < " . intval(time()));
252 $r = q("INSERT INTO `challenge` ( `challenge`, `dfrn-id`, `expire` , `type`, `last_update` )
253 VALUES( '%s', '%s', %d, '%s', '%s' ) ",
256 intval(time() + 90 ),
261 logger('dfrn_notify: challenge=' . $hash, LOGGER_DEBUG);
266 $sql_extra = sprintf(" AND ( `issued-id` = '%s' OR `dfrn-id` = '%s' ) ", dbesc($dfrn_id), dbesc($dfrn_id));
270 $sql_extra = sprintf(" AND `issued-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
271 $my_id = '1:' . $dfrn_id;
274 $sql_extra = sprintf(" AND `dfrn-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
275 $my_id = '0:' . $dfrn_id;
282 $r = q("SELECT `contact`.*, `user`.`nickname`, `user`.`page-flags` FROM `contact` LEFT JOIN `user` ON `user`.`uid` = `contact`.`uid`
283 WHERE `contact`.`blocked` = 0 AND `contact`.`pending` = 0 AND `user`.`nickname` = '%s'
284 AND `user`.`account_expired` = 0 AND `user`.`account_removed` = 0 $sql_extra LIMIT 1",
288 if (! DBM::is_result($r)) {
292 logger("Remote rino version: ".$rino_remote." for ".$r[0]["url"], LOGGER_DEBUG);
296 $id_str = $my_id . '.' . mt_rand(1000,9999);
298 $prv_key = trim($r[0]['prvkey']);
299 $pub_key = trim($r[0]['pubkey']);
300 $dplx = intval($r[0]['duplex']);
302 if ((($dplx) && (strlen($prv_key))) || ((strlen($prv_key)) && (!(strlen($pub_key))))) {
303 openssl_private_encrypt($hash, $challenge, $prv_key);
304 openssl_private_encrypt($id_str, $encrypted_id, $prv_key);
305 } elseif (strlen($pub_key)) {
306 openssl_public_encrypt($hash, $challenge, $pub_key);
307 openssl_public_encrypt($id_str, $encrypted_id, $pub_key);
309 /// @TODO these kind of else-blocks are making the code harder to understand
313 $challenge = bin2hex($challenge);
314 $encrypted_id = bin2hex($encrypted_id);
317 $rino = Config::get('system', 'rino_encrypt');
318 $rino = intval($rino);
320 logger("Local rino version: ". $rino, LOGGER_DEBUG);
322 // if requested rino is lower than enabled local rino, lower local rino version
323 // if requested rino is higher than enabled local rino, reply with local rino
324 if ($rino_remote < $rino) {
325 $rino = $rino_remote;
328 if((($r[0]['rel']) && ($r[0]['rel'] != CONTACT_IS_SHARING)) || ($r[0]['page-flags'] == PAGE_COMMUNITY)) {
334 header("Content-type: text/xml");
336 echo '<?xml version="1.0" encoding="UTF-8"?>' . "\r\n"
337 . '<dfrn_notify>' . "\r\n"
338 . "\t" . '<status>' . $status . '</status>' . "\r\n"
339 . "\t" . '<dfrn_version>' . DFRN_PROTOCOL_VERSION . '</dfrn_version>' . "\r\n"
340 . "\t" . '<rino>' . $rino . '</rino>' . "\r\n"
341 . "\t" . '<perm>' . $perm . '</perm>' . "\r\n"
342 . "\t" . '<dfrn_id>' . $encrypted_id . '</dfrn_id>' . "\r\n"
343 . "\t" . '<challenge>' . $challenge . '</challenge>' . "\r\n"
344 . '</dfrn_notify>' . "\r\n" ;