2015-04-10 04:58:31 +00:00
|
|
|
# Magic Wormhole
|
2015-09-28 23:23:19 +00:00
|
|
|
[![Build Status](https://travis-ci.org/warner/magic-wormhole.svg?branch=master)](https://travis-ci.org/warner/magic-wormhole)
|
2016-03-02 22:42:19 +00:00
|
|
|
[![codecov.io](https://codecov.io/github/warner/magic-wormhole/coverage.svg?branch=master)](https://codecov.io/github/warner/magic-wormhole?branch=master)
|
2015-03-24 06:38:47 +00:00
|
|
|
|
2015-04-10 04:58:31 +00:00
|
|
|
Get things from one computer to another, safely.
|
|
|
|
|
|
|
|
This package provides a library and a command-line tool named `wormhole`,
|
|
|
|
which makes it possible to get short pieces of text (and arbitrary-sized
|
2015-12-03 23:02:34 +00:00
|
|
|
files and directories) from one computer to another. The two endpoints are
|
|
|
|
identified by using identical "wormhole codes": in general, the sending
|
|
|
|
machine generates and displays the code, which must then be typed into the
|
|
|
|
receiving machine.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
The codes are short and human-pronounceable, using a phonetically-distinct
|
|
|
|
wordlist. The receiving side offers tab-completion on the codewords, so
|
|
|
|
usually only a few characters must be typed. Wormhole codes are single-use
|
|
|
|
and do not need to be memorized.
|
|
|
|
|
2015-10-05 20:52:32 +00:00
|
|
|
## Installation
|
|
|
|
|
|
|
|
```$ pip install magic-wormhole```
|
|
|
|
|
2016-05-31 06:57:08 +00:00
|
|
|
On Debian/Ubuntu systems, you may first need `apt-get python-dev
|
|
|
|
libffi-dev`. On Fedora it's `libffi-devel` and `python-devel`. On OS-X,
|
|
|
|
you may need to install `pip` and run `xcode-select --install` to get
|
|
|
|
GCC.
|
2015-12-08 23:05:16 +00:00
|
|
|
|
2016-02-27 22:39:56 +00:00
|
|
|
Developers can clone the source tree and run `tox` to run the unit tests on
|
|
|
|
all supported (and installed) versions of python: 2.7, 3.3, 3.4, and 3.5.
|
|
|
|
|
2015-04-10 04:58:31 +00:00
|
|
|
## Motivation
|
|
|
|
|
|
|
|
* Moving a file to a friend's machine, when the humans can speak to each
|
2016-01-12 23:03:55 +00:00
|
|
|
other (directly) but the computers cannot
|
2015-04-10 04:58:31 +00:00
|
|
|
* Delivering a properly-random password to a new user via the phone
|
|
|
|
* Supplying an SSH public key for future login use
|
|
|
|
|
|
|
|
Copying files onto a USB stick requires physical proximity, and is
|
2015-10-08 00:10:33 +00:00
|
|
|
uncomfortable for transferring long-term secrets because flash memory is hard
|
|
|
|
to erase. Copying files with ssh/scp is fine, but requires previous
|
|
|
|
arrangements and an account on the target machine, and how do you bootstrap
|
|
|
|
the account? Copying files through email first requires transcribing an email
|
|
|
|
address in the opposite direction, and is even worse for secrets, because
|
|
|
|
email is unencrypted. Copying files through encrypted email requires
|
|
|
|
bootstrapping a GPG key as well as an email address. Copying files through
|
|
|
|
Dropbox is not secure against the Dropbox server and results in a large URL
|
2016-01-12 23:03:55 +00:00
|
|
|
that must be transcribed. Using a URL shortener adds an extra step, reveals
|
|
|
|
the full URL to the shortening service, and leaves a short URL that can be
|
|
|
|
guessed by outsiders.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
Many common use cases start with a human-mediated communication channel, such
|
2015-10-08 00:10:33 +00:00
|
|
|
as IRC, IM, email, a phone call, or a face-to-face conversation. Some of
|
|
|
|
these are basically secret, or are "secret enough" to last until the code is
|
2015-04-10 04:58:31 +00:00
|
|
|
delivered and used. If this does not feel strong enough, users can turn on
|
|
|
|
additional verification that doesn't depend upon the secrecy of the channel.
|
|
|
|
|
|
|
|
The notion of a "magic wormhole" comes from the image of two distant wizards
|
2016-05-26 03:58:53 +00:00
|
|
|
speaking the same enchanted phrase at the same time, and causing a mystical
|
|
|
|
connection to pop into existence between them. The wizards then throw books
|
|
|
|
into the wormhole and they fall out the other side. Transferring files
|
|
|
|
securely should be that easy.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
## Design
|
|
|
|
|
|
|
|
The `wormhole` tool uses PAKE "Password-Authenticated Key Exchange", a family
|
|
|
|
of cryptographic algorithms that uses a short low-entropy password to
|
|
|
|
establish a strong high-entropy shared key. This key can then be used to
|
|
|
|
encrypt data. `wormhole` uses the SPAKE2 algorithm, due to Abdalla and
|
|
|
|
Pointcheval[1].
|
|
|
|
|
|
|
|
PAKE effectively trades off interaction against offline attacks. The only way
|
|
|
|
for a network attacker to learn the shared key is to perform a
|
|
|
|
man-in-the-middle attack during the initial connection attempt, and to
|
|
|
|
correctly guess the code being used by both sides. Their chance of doing this
|
2016-01-12 23:03:55 +00:00
|
|
|
is inversely proportional to the entropy of the wormhole code. The default is
|
|
|
|
to use a 16-bit code (use --code-length= to change this), so for each use of
|
|
|
|
the tool, an attacker gets a 1-in-65536 chance of success. As such, users can
|
|
|
|
expect to see many error messages before the attacker has a reasonable chance
|
|
|
|
of success.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
## Timing
|
|
|
|
|
2016-05-26 03:58:53 +00:00
|
|
|
The program does not have any built-in timeouts, however it is expected that
|
|
|
|
both clients will be run within an hour or so of each other. This makes the
|
|
|
|
tool most useful for people who are having a real-time conversation already,
|
|
|
|
and want to graduate to a secure connection. Both clients must be left
|
|
|
|
running until the transfer has finished.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
## Relays
|
|
|
|
|
2016-05-26 03:58:53 +00:00
|
|
|
The wormhole library requires a "Rendezvous Server": a simple WebSocket-based
|
|
|
|
relay that delivers messages from one client to another. This allows the
|
|
|
|
wormhole codes to omit IP addresses and port numbers. The URL of a public
|
|
|
|
server is baked into the library for use as a default, and will be freely
|
|
|
|
available until volume or abuse makes it infeasible to support. Applications
|
|
|
|
which desire more reliability can easily run their own relay and configure
|
|
|
|
their clients to use it instead. Code for the Rendezvous Server is included
|
|
|
|
in the library.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
The file-transfer commands also use a "Transit Relay", which is another
|
|
|
|
simple server that glues together two inbound TCP connections and transfers
|
2015-10-08 00:10:33 +00:00
|
|
|
data on each to the other. The `wormhole send` file mode shares the IP
|
2015-04-10 04:58:31 +00:00
|
|
|
addresses of each client with the other (inside the encrypted message), and
|
|
|
|
both clients first attempt to connect directly. If this fails, they fall back
|
|
|
|
to using the transit relay. As before, the host/port of a public server is
|
|
|
|
baked into the library, and should be sufficient to handle moderate traffic.
|
|
|
|
|
|
|
|
The protocol includes provisions to deliver notices and error messages to
|
|
|
|
clients: if either relay must be shut down, these channels will be used to
|
|
|
|
provide information about alternatives.
|
|
|
|
|
|
|
|
## CLI tool
|
|
|
|
|
2015-10-08 00:10:33 +00:00
|
|
|
* `wormhole send --text TEXT`
|
2015-10-04 05:45:43 +00:00
|
|
|
* `wormhole send FILENAME`
|
2015-12-03 23:02:34 +00:00
|
|
|
* `wormhole send DIRNAME`
|
2015-10-04 05:45:43 +00:00
|
|
|
* `wormhole receive`
|
2015-04-10 04:58:31 +00:00
|
|
|
|
2015-10-08 00:10:33 +00:00
|
|
|
Both commands accept:
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
* `--relay-url URL` : override the rendezvous server URL
|
|
|
|
* `--transit-helper tcp:HOST:PORT`: override the Transit Relay
|
|
|
|
* `--code-length WORDS`: use more or fewer than 2 words for the code
|
2015-11-24 01:13:13 +00:00
|
|
|
* `--verify` : print (and ask user to compare) extra verification string
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
## Library
|
|
|
|
|
|
|
|
The `wormhole` module makes it possible for other applications to use these
|
2016-05-26 03:58:53 +00:00
|
|
|
code-protected channels. This includes Twisted support, and (in the future)
|
|
|
|
will include blocking/synchronous support too. See docs/api.md for details.
|
|
|
|
|
|
|
|
The file-transfer tools use a second module named `wormhole.transit`, which
|
|
|
|
provides an encrypted record-pipe. It knows how to use the Transit Relay as
|
|
|
|
well as direct connections, and attempts them all in parallel.
|
|
|
|
`TransitSender` and `TransitReceiver` are distinct, although once the
|
|
|
|
connection is established, data can flow in either direction. All data is
|
|
|
|
encrypted (using nacl/libsodium "secretbox") using a key derived from the
|
|
|
|
PAKE phase. See `src/wormhole/cli/cmd_send.py` for examples.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
## License, Compatibility
|
|
|
|
|
|
|
|
This library is released under the MIT license, see LICENSE for details.
|
|
|
|
|
2015-11-29 07:42:15 +00:00
|
|
|
This library is compatible with python2.7, 3.3, 3.4, and 3.5 . It is probably
|
2016-05-26 03:58:53 +00:00
|
|
|
compatible with py2.6, but the latest Twisted (>=15.5.0) is not. The
|
2015-12-01 06:15:24 +00:00
|
|
|
(daemonizing) 'wormhole server start' command does not yet work with py3, but
|
|
|
|
will in the future once Twisted itself is finished being ported.
|
2015-04-10 04:58:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
#### footnotes
|
|
|
|
|
|
|
|
[1]: http://www.di.ens.fr/~pointche/Documents/Papers/2005_rsa.pdf "RSA 2005"
|