#tor #arti #typestate

tor-checkable

Types to ensure that signed or time-bound data is validated before use

23 unstable releases (8 breaking)

0.8.0 Mar 4, 2024
0.6.1 Jan 9, 2024
0.6.0 Dec 4, 2023
0.5.5 Oct 2, 2023
0.0.0 Jun 24, 2021

#605 in Cryptography

Download history 330/week @ 2023-11-20 275/week @ 2023-11-27 327/week @ 2023-12-04 238/week @ 2023-12-11 240/week @ 2023-12-18 166/week @ 2023-12-25 103/week @ 2024-01-01 405/week @ 2024-01-08 437/week @ 2024-01-15 160/week @ 2024-01-22 137/week @ 2024-01-29 334/week @ 2024-02-05 199/week @ 2024-02-12 143/week @ 2024-02-19 489/week @ 2024-02-26 2062/week @ 2024-03-04

2,931 downloads per month
Used in 28 crates (7 directly)

MIT/Apache

110KB
1.5K SLoC

tor-checkable

Traits for wrapping up signed and/or time-bound objects

Overview

Frequently (for testing reasons or otherwise), we want to ensure that an object can only be used if a signature is valid, or if some timestamp is recent enough.

As an example, consider a self-signed certificate. You can parse it cheaply enough (and find its key by doing so), but you probably want to make sure that nobody will use that certificate unless its signature is correct and its timestamps are not expired.

With the tor-checkable crate, you can instead return an object that represents the certificate in its unchecked state. The caller can access the certificate, but only after checking the signature and the time.

This crate is part of Arti, a project to implement Tor in Rust. Many other crates in Arti depend on it, but it should be generally useful outside of Arti.

Design notes and alternatives

The types in this crate provide functions to return the underlying objects without checking them. This is very convenient for testing, though you wouldn't want to do it in production code. To prevent mistakes, these functions all begin with the word dangerously.

Another approach you might take is to put signature and timeliness checks inside your parsing function. But if you do that, it will get hard to test your code: you will only be able to parse certificates that are valid when the parser is running. And if you want to test parsing a new kind of certificate, you'll need to make sure to put a valid signature on it. (And all of this signature parsing will slow down any attempts to fuzz your parser.)

You could have your parser take a flag to tell it whether to check signatures and timeliness, but that could be error prone: if anybody sets the flag wrong, they will skip doing the checks.

License: MIT OR Apache-2.0

Dependencies

~9MB
~172K SLoC