pypush-plus-plus/pypush/ids/identity.py

189 lines
7.4 KiB
Python
Raw Normal View History

2023-05-09 15:09:28 -05:00
import plistlib
2023-05-09 16:03:27 -05:00
from base64 import b64decode
2023-05-09 15:09:28 -05:00
import requests
from ._helpers import PROTOCOL_VERSION, KeyPair, parse_key, serialize_key
2023-05-09 16:03:27 -05:00
from .signing import add_auth_signature, armour_cert
2023-07-27 10:04:57 -05:00
from io import BytesIO
from cryptography.hazmat.primitives.asymmetric import ec, rsa
2023-05-09 16:03:27 -05:00
from typing import Self
2023-07-24 08:18:21 -05:00
import logging
logger = logging.getLogger("ids")
2023-07-27 10:04:57 -05:00
class IDSIdentity:
def __init__(
self,
signing_key: str | None = None,
encryption_key: str | None = None,
signing_public_key: str | None = None,
encryption_public_key: str | None = None
):
2023-07-27 10:04:57 -05:00
if signing_key is not None:
self.signing_key = signing_key
self.signing_public_key = serialize_key(parse_key(signing_key).public_key())# type: ignore
2023-07-27 10:04:57 -05:00
elif signing_public_key is not None:
self.signing_key = None
self.signing_public_key = signing_public_key
else:
# Generate a new key
self.signing_key = serialize_key(ec.generate_private_key(ec.SECP256R1()))
self.signing_public_key = serialize_key(parse_key(self.signing_key).public_key())# type: ignore
2023-07-27 10:04:57 -05:00
if encryption_key is not None:
self.encryption_key = encryption_key
self.encryption_public_key = serialize_key(parse_key(encryption_key).public_key())# type: ignore
2023-07-27 10:04:57 -05:00
elif encryption_public_key is not None:
self.encryption_key = None
self.encryption_public_key = encryption_public_key
else:
self.encryption_key = serialize_key(rsa.generate_private_key(65537, 1280))
self.encryption_public_key = serialize_key(parse_key(self.encryption_key).public_key())# type: ignore
@classmethod
def decode(cls, inp: bytes) -> Self:
input = BytesIO(inp)
2023-07-27 10:04:57 -05:00
assert input.read(5) == b'\x30\x81\xF6\x81\x43' # DER header
raw_ecdsa = input.read(67)
assert input.read(3) == b'\x82\x81\xAE' # DER header
raw_rsa = input.read(174)
# Parse the RSA key
raw_rsa = BytesIO(raw_rsa)
assert raw_rsa.read(2) == b'\x00\xAC' # Not sure what this is
assert raw_rsa.read(3) == b'\x30\x81\xA9' # Inner DER header
assert raw_rsa.read(3) == b'\x02\x81\xA1'
rsa_modulus = raw_rsa.read(161)
rsa_modulus = int.from_bytes(rsa_modulus, "big")
assert raw_rsa.read(5) == b'\x02\x03\x01\x00\x01' # Exponent, should always be 65537
# Parse the EC key
assert raw_ecdsa[:3] == b'\x00\x41\x04'
raw_ecdsa = raw_ecdsa[3:]
ec_x = int.from_bytes(raw_ecdsa[:32], "big")
ec_y = int.from_bytes(raw_ecdsa[32:], "big")
ec_key = ec.EllipticCurvePublicNumbers(ec_x, ec_y, ec.SECP256R1())
ec_key = ec_key.public_key()
rsa_key = rsa.RSAPublicNumbers(e=65537, n=rsa_modulus)
rsa_key = rsa_key.public_key()
return IDSIdentity(signing_public_key=serialize_key(ec_key), encryption_public_key=serialize_key(rsa_key))
def encode(self) -> bytes:
output = BytesIO()
raw_rsa = BytesIO()
raw_rsa.write(b'\x00\xAC')
raw_rsa.write(b'\x30\x81\xA9')
raw_rsa.write(b'\x02\x81\xA1')
raw_rsa.write(parse_key(self.encryption_public_key).public_numbers().n.to_bytes(161, "big")) # type: ignore
2023-07-27 10:04:57 -05:00
raw_rsa.write(b'\x02\x03\x01\x00\x01') # Hardcode the exponent
output.write(b'\x30\x81\xF6\x81\x43')
output.write(b'\x00\x41\x04')
output.write(parse_key(self.signing_public_key).public_numbers().x.to_bytes(32, "big"))# type: ignore
output.write(parse_key(self.signing_public_key).public_numbers().y.to_bytes(32, "big"))# type: ignore
2023-07-27 10:04:57 -05:00
output.write(b'\x82\x81\xAE')
output.write(raw_rsa.getvalue())
2023-05-09 16:03:27 -05:00
2023-07-27 10:04:57 -05:00
return output.getvalue()
2023-05-09 16:03:27 -05:00
def register(
2023-07-27 10:04:57 -05:00
push_token, handles, user_id, auth_key: KeyPair, push_key: KeyPair, identity: IDSIdentity, validation_data
2023-05-09 15:09:28 -05:00
):
2023-07-24 08:18:21 -05:00
logger.debug(f"Registering IDS identity for {handles}")
2023-05-09 15:09:28 -05:00
uris = [{"uri": handle} for handle in handles]
import uuid
2023-05-09 15:09:28 -05:00
body = {
2023-08-11 14:45:17 -05:00
"device-name": "pypush",
2023-05-09 15:09:28 -05:00
"hardware-version": "MacBookPro18,3",
"language": "en-US",
"os-version": "macOS,13.2.1,22D68",
"software-version": "22D68",
"private-device-data": {
"u": uuid.uuid4().hex.upper(),
},
2023-05-09 15:09:28 -05:00
"services": [
{
2023-08-11 14:45:17 -05:00
"capabilities": [{"flags": 1, "name": "Messenger", "version": 1}],
2023-05-09 15:09:28 -05:00
"service": "com.apple.madrid",
2023-08-11 14:45:17 -05:00
"sub-services": ["com.apple.private.alloy.sms",
"com.apple.private.alloy.gelato",
"com.apple.private.alloy.biz",
"com.apple.private.alloy.gamecenter.imessage"],
2023-05-09 15:09:28 -05:00
"users": [
{
2023-07-24 15:37:53 -05:00
"client-data": {
'is-c2k-equipment': True,
'optionally-receive-typing-indicators': True,
2023-07-27 10:04:57 -05:00
'public-message-identity-key': identity.encode(),
2023-07-25 17:46:50 -05:00
'public-message-identity-version':2,
'show-peer-errors': True,
'supports-ack-v1': True,
'supports-activity-sharing-v1': True,
'supports-audio-messaging-v2': True,
"supports-autoloopvideo-v1": True,
'supports-be-v1': True,
'supports-ca-v1': True,
'supports-fsm-v1': True,
'supports-fsm-v2': True,
'supports-fsm-v3': True,
'supports-ii-v1': True,
'supports-impact-v1': True,
'supports-inline-attachments': True,
'supports-keep-receipts': True,
"supports-location-sharing": True,
'supports-media-v2': True,
'supports-photos-extension-v1': True,
'supports-st-v1': True,
'supports-update-attachments-v1': True,
2023-07-24 15:37:53 -05:00
},
2023-05-09 15:09:28 -05:00
"uris": uris,
2023-05-09 16:03:27 -05:00
"user-id": user_id,
2023-05-09 15:09:28 -05:00
}
],
}
],
"validation-data": b64decode(validation_data),
}
body = plistlib.dumps(body)
headers = {
"x-protocol-version": PROTOCOL_VERSION,
2023-05-09 16:03:27 -05:00
"x-auth-user-id-0": user_id,
2023-05-09 15:09:28 -05:00
}
2023-05-09 16:03:27 -05:00
add_auth_signature(headers, body, "id-register", auth_key, push_key, push_token, 0)
2023-05-09 15:09:28 -05:00
r = requests.post(
"https://identity.ess.apple.com/WebObjects/TDIdentityService.woa/wa/register",
headers=headers,
data=body,
verify=False,
)
r = plistlib.loads(r.content)
2023-07-24 08:18:21 -05:00
#print(f'Response code: {r["status"]}')
logger.debug(f"Recieved response to IDS registration: {r}")
2023-05-09 15:09:28 -05:00
if "status" in r and r["status"] == 6004:
raise Exception("Validation data expired!")
# TODO: Do validation of nested statuses
2023-05-09 16:03:27 -05:00
if "status" in r and r["status"] != 0:
raise Exception(f"Failed to register: {r}")
if not "services" in r:
raise Exception(f"No services in response: {r}")
if not "users" in r["services"][0]:
raise Exception(f"No users in response: {r}")
if not "cert" in r["services"][0]["users"][0]:
raise Exception(f"No cert in response: {r}")
return armour_cert(r["services"][0]["users"][0]["cert"])