1
0
Fork 0
This commit is contained in:
Mason Simon 2018-03-30 17:47:17 -07:00
commit 21582cc86a
21 changed files with 677 additions and 0 deletions

3
.gitignore vendored Normal file
View File

@ -0,0 +1,3 @@
dest/
.vscode/
nginx/

14
Dockerfile Normal file
View File

@ -0,0 +1,14 @@
FROM ubuntu:latest
WORKDIR .
RUN apt-get update && apt-get install -y curl gcc make git libpcre3-dev zlib1g-dev
ADD ipscrub /ipscrub/
ADD Makefile /
EXPOSE 8081
RUN make nginx/objs/nginx
CMD make start && tail -f dest/logs/access.log

63
Makefile Normal file
View File

@ -0,0 +1,63 @@
nginx/:
-git clone --branch release-1.13.9 --depth 1 https://github.com/nginx/nginx.git
nginx/objs/nginx: nginx/Makefile ipscrub/src/ngx_ipscrub_module.c
cd nginx && make
nginx/Makefile: nginx/
cd nginx && ./auto/configure --prefix=$(PWD)/dest --add-module=../ipscrub --add-dynamic-module=../ipscrub --with-compat
nginx/objs/ngx_ipscrub_module.so: nginx/Makefile
cd nginx && make modules
dest/conf/nginx.conf: ipscrub/nginx.conf dest/
cp $< $@
restart: nginx/objs/nginx dest/conf/nginx.conf
pkill nginx && $<
start: nginx/objs/nginx dest/conf/nginx.conf
@mkdir -p dest/logs/
$<
dest/:
mkdir -p dest/conf/
mkdir -p dest/logs/
test: clean test-sha1hash test-saltedhash test-ipv46hash test-dynmodule
test-sha1hash: ipscrub/test/sha1hash/test.sh ipscrub/test/sha1hash/nginx.conf dest/ nginx/objs/nginx
cp ipscrub/test/sha1hash/nginx.conf dest/conf/nginx.conf
-pkill nginx
nginx/objs/nginx
bash $<
test-saltedhash: ipscrub/test/saltedsha/test.sh ipscrub/test/saltedsha/nginx.conf dest/ nginx/objs/nginx
cp ipscrub/test/saltedsha/nginx.conf dest/conf/nginx.conf
-pkill nginx
nginx/objs/nginx
bash $<
test-ipv46hash: ipscrub/test/ipv46hash/test.sh ipscrub/test/ipv46hash/nginx.conf dest/ nginx/objs/nginx
cp ipscrub/test/ipv46hash/nginx.conf dest/conf/nginx.conf
-pkill nginx
nginx/objs/nginx
bash $<
test-dynmodule: ipscrub/test/dynmodule/test.sh nginx/objs/ngx_ipscrub_module.so
cd nginx && ./auto/configure --prefix=$(PWD)/dest --with-compat && make
cp nginx/objs/ngx_ipscrub_module.so dest/
cp ipscrub/test/dynmodule/nginx.conf dest/conf/nginx.conf
-pkill nginx
nginx/objs/nginx
bash $<
clean:
-rm -f nginx/Makefile
-rm -f nginx/objs/nginx
-rm -rf dest/
run-demo:
docker build -t ipscrub .
docker build -t ipscrub-demo-client demo/
docker-compose up --abort-on-container-exit

70
README.md Normal file
View File

@ -0,0 +1,70 @@
# `ipscrub`
`ipscrub` is an IP address anonymizer for [nginx](https://www.nginx.com) log files. It's an nginx module that generates an IP-based hash. You can use this hash to link requests from the same source, without identifying your users by IP address.
## TOC
* [Security Model](#security-model)
* [Threat Model](#threat-model)
* [Usage](#usage)
* [GDPR](#gdpr)
* [YAGNI](#yagni)
* [License](#license)
## Security Model
1. On initialization, and again every `PERIOD`, generate `salt` as `HASH(ngx_random() ++ timestamp)`.
2. On each request, generate masked IP address as `HASH(salt ++ IP address)`.
3. Log masked IP address.
`ipscrub` uses `ngx_random` to generate random nonces. `ngx_random` is defined as the C `random()` function on non-Windows platforms, and `rand()` on Windows. NOTE: this is not a cryptographically secure RNG, but for the following threat model, that is ok.
ALSO NOTE: the generated hash WILL change on each `PERIOD` transition, so you will only have continuity within each `PERIOD`. But because users can transition between networks at any time (e.g. wifi -> cellular), you'd have this type of issue even if you were storing raw IPs.
## Threat Model
1. Government presents you with an IP address and demands identification of user corresponding to that address.
2. Government identifies a user e.g. by email address, and demands IP address they had at some point in time.
In threat scenario (1), the goal is to compute the masked IP corresponding to a target IP address. This will only be possible if the demand is made before the end of the current `PERIOD`.
Scenario (2) is defended against because the server operator does not know the salt, and cannot infer it based on the request timestamp, because the salt is generated from a nonce that is only stored in memory. The server operator would have to be an accomplice in this case, but that is more simply accomplished by the server operator just recording the unmasked IP. So this security/threat model does not defend against a malicious server operator, but that is not the point. It does defend against an honest server operator being compelled in threat scenarios (1) and (2).
## Usage
`ipscrub` can be built statically with nginx or as a [dynamic module](https://www.nginx.com/blog/compiling-dynamic-modules-nginx-plus/). See the `Makefile` for examples of both ways.
In your `nginx.conf`,
1. At the top-level, load the module by adding the line `load_module ngx_ipscrub_module.so;` (NOTE: only if you built as a dynamic module).
1. Set `ipscrub_period_seconds <NUM SECONDS PER PERIOD>;` (optional).
1. In your `log_format` directives, replace `$remote_addr` with `$remote_addr_ipscrub`.
1. Reload your nginx config.
## GDPR
[GDPR](https://www.eugdpr.org) goes into effect on May 25, 2018. It legislates the handling of personal data about your users, including IP addresses.
From https://www.eugdpr.org/gdpr-faqs.html:
What constitutes personal data?
Any information related to a natural person or Data Subject, that can be used to directly or indirectly identify the person. It can be anything from a name, a photo, [...], or a computer IP address.
The hashes generated by `ipscrub` let you correlate nginx log entries by IP address, without actually storing IP addresses, reducing your GDPR surface area.
## YAGNI
Why are you logging IP addresses anyway? [You Ain't Gonna Need It](https://en.wikipedia.org/wiki/You_aren%27t_gonna_need_it). If you want geolocation, just use [MaxMind's GeoIP module](https://nginx.org/en/docs/http/ngx_http_geoip_module.html) in conjunction with `ipscrub`.
# License
Copyright 2018 Mason Simon
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

5
demo/Dockerfile Normal file
View File

@ -0,0 +1,5 @@
FROM ubuntu:latest
RUN apt-get update && apt-get install -y curl
CMD while true; do curl --silent http://nginx:8081/ > /dev/null; sleep 0.5; done

24
docker-compose.yml Normal file
View File

@ -0,0 +1,24 @@
version: "3"
services:
nginx:
image: ipscrub
# deploy:
# replicas: 1
ports:
- "31337:8081"
networks:
- net
client1:
image: ipscrub-demo-client
# deploy:
# replicas: 2
networks:
- net
client2:
image: ipscrub-demo-client
# deploy:
# replicas: 2
networks:
- net
networks:
net:

11
ipscrub/config Normal file
View File

@ -0,0 +1,11 @@
# Reference: https://www.nginx.com/resources/wiki/extending/new_config/.
ngx_module_type=HTTP
ngx_module_name=ngx_ipscrub_module
ngx_module_deps="$ngx_addon_dir/src/ngx_ipscrub_support.h $ngx_addon_dir/src/ngx_ipscrub_debug.h"
ngx_module_srcs="$ngx_addon_dir/src/ngx_ipscrub_module.c $ngx_addon_dir/src/ngx_ipscrub_support.c $ngx_addon_dir/src/ngx_ipscrub_debug.c"
ngx_module_libs=SHA1
. auto/module
ngx_addon_name=$ngx_module_name

18
ipscrub/nginx.conf Normal file
View File

@ -0,0 +1,18 @@
error_log logs/error.log;
events {}
http {
log_format main '[$time_local] $remote_addr $remote_addr_ipscrub';
access_log logs/access.log main;
ipscrub_period_seconds 2;
server {
listen 8081;
# listen [::]:8081 ipv6only=off;
server_name localhost;
}
}

View File

@ -0,0 +1,85 @@
// Debug support code for ipscrub module.
// Copyright Mason Simon 2018
#include <ngx_http.h>
#include <ngx_crypt.h>
#include "ngx_ipscrub_support.h"
#include "ngx_ipscrub_debug.h"
// This function hashes the request URI, for testing.
ngx_int_t
ngx_http_variable_remote_addr_ipscrub_debug(ngx_http_request_t *r, ngx_http_variable_value_t *v, uintptr_t data)
{
u_char *uri;
ngx_int_t rc;
u_char *hashed;
u_char *salt = (u_char *) "{SHA}";
// ngx_crypt computes the length of its second param using ngx_strlen, which requires a null-terminated string.
rc = null_terminate(r->pool, r->uri, &uri);
if (rc != NGX_OK) {
return NGX_HTTP_INTERNAL_SERVER_ERROR;
}
rc = ngx_crypt(r->pool, uri, salt, &hashed);
if (rc != NGX_OK) {
return NGX_HTTP_INTERNAL_SERVER_ERROR;
}
// Strip prefix.
u_char *obscured = hashed + (sizeof("{SHA}") - 1);
v->len = 28; // SHA-1 is 160 bits. Base64 is 6 bits per char. ceil(160/6) = 27, but Base64 always groups into chunks of 4, so 28 chars total.
v->valid = 1;
v->no_cacheable = 0;
v->not_found = 0;
v->data = obscured;
return NGX_OK;
}
// This function hashes the request URI, for testing, using the first 4 chars, excluding the initial slash, as a salt.
ngx_int_t
ngx_http_variable_ipscrub_salted_hash_debug(ngx_http_request_t *r, ngx_http_variable_value_t *v, uintptr_t data)
{
ngx_str_t salt;
ngx_str_t plaintext;
ngx_int_t rc;
u_char *combined;
u_char *hashed;
u_int saltlen = 4;
// First 4 chars of URL, excluding initial "/" are interpreted as the salt--they must be present.
if (r->uri.len < saltlen + 1) {
return NGX_HTTP_INTERNAL_SERVER_ERROR;
}
salt.data = r->uri.data + 1;
salt.len = saltlen;
plaintext.data = r->uri.data + saltlen + 1;
plaintext.len = r->uri.len - (saltlen + 1);
// ngx_crypt computes the length of its second param using ngx_strlen, which requires a null-terminated string.
rc = concat(r->pool, plaintext, salt, &combined);
if (rc != NGX_OK) {
return NGX_HTTP_INTERNAL_SERVER_ERROR;
}
rc = ngx_crypt(r->pool, combined, (u_char *) "{SHA}", &hashed);
if (rc != NGX_OK) {
return NGX_HTTP_INTERNAL_SERVER_ERROR;
}
// Strip prefix.
u_char *obscured = hashed + (sizeof("{SHA}") - 1);
v->len = 28; // SHA-1 is 160 bits. Base64 is 6 bits per char. ceil(160/6) = 27, but Base64 always groups into chunks of 4, so 28 chars total.
v->valid = 1;
v->no_cacheable = 0;
v->not_found = 0;
v->data = obscured;
return NGX_OK;
}

View File

@ -0,0 +1,14 @@
// Debug support code for ipscrub module.
// Copyright Mason Simon 2018
#ifndef _IPSCRUB_DEBUG_H_INCLUDED_
#define _IPSCRUB_DEBUG_H_INCLUDED_
#include <ngx_core.h>
ngx_int_t ngx_http_variable_remote_addr_ipscrub_debug(ngx_http_request_t *r,
ngx_http_variable_value_t *v, uintptr_t data);
ngx_int_t ngx_http_variable_ipscrub_salted_hash_debug(ngx_http_request_t *r,
ngx_http_variable_value_t *v, uintptr_t data);
#endif /* _IPSCRUB_DEBUG_H_INCLUDED_ */

View File

@ -0,0 +1,191 @@
// nginx module that anonymizes IP addresses (e.g. for logging).
// Copyright Mason Simon 2018
#include <ngx_http.h>
#include <ngx_crypt.h>
#include <time.h>
#include "ngx_ipscrub_support.h"
#include "ngx_ipscrub_debug.h"
typedef struct {
ngx_int_t period_seconds;
} ngx_ipscrub_conf_t;
static void * ngx_ipscrub_create_conf(ngx_conf_t *cf);
static char * ngx_ipscrub_conf(ngx_conf_t *cf, void *conf);
static ngx_int_t ngx_http_variable_remote_addr_ipscrub(ngx_http_request_t *r,
ngx_http_variable_value_t *v, uintptr_t data);
static ngx_int_t ngx_ipscrub_init(ngx_conf_t *cf);
static ngx_int_t ngx_ipscrub_add_variables(ngx_conf_t *cf);
static ngx_http_variable_t ngx_http_ipscrub_vars[] = {
{ngx_string("remote_addr_ipscrub"), NULL, ngx_http_variable_remote_addr_ipscrub, 0, 0, 0},
{ngx_string("ipscrub_hash_debug"), NULL, ngx_http_variable_remote_addr_ipscrub_debug, 0, 0, 0},
{ngx_string("ipscrub_salted_hash_debug"), NULL, ngx_http_variable_ipscrub_salted_hash_debug, 0, 0, 0},
ngx_http_null_variable};
static ngx_command_t ngx_ipscrub_commands[] = {
{ ngx_string("ipscrub_period_seconds"),
NGX_HTTP_MAIN_CONF|NGX_CONF_TAKE1,
ngx_conf_set_num_slot,
NGX_HTTP_MAIN_CONF_OFFSET,
offsetof(ngx_ipscrub_conf_t, period_seconds),
NULL },
ngx_null_command
};
// Globals.
const int default_period_seconds = 10 * 60; // Period between salt changes.
time_t period_start = -1;
long nonce = -1; // Input to salt generation.
static ngx_http_module_t ngx_ipscrub_module_ctx = {
ngx_ipscrub_init, /* preconfiguration */
NULL, /* postconfiguration */
ngx_ipscrub_create_conf, /* create main configuration */
ngx_ipscrub_conf, /* init main configuration */
NULL, /* create server configuration */
NULL, /* merge server configuration */
NULL, /* create location configuration */
NULL /* merge location configuration */
};
ngx_module_t ngx_ipscrub_module = {
NGX_MODULE_V1,
&ngx_ipscrub_module_ctx, /* module context */
ngx_ipscrub_commands, /* module directives */
NGX_HTTP_MODULE, /* module type */
NULL, /* init master */
NULL, /* init module */
NULL, /* init process */
NULL, /* init thread */
NULL, /* exit thread */
NULL, /* exit process */
NULL, /* exit master */
NGX_MODULE_V1_PADDING
};
/* Configuration support. */
static void *
ngx_ipscrub_create_conf(ngx_conf_t *cf)
{
ngx_ipscrub_conf_t *icf;
icf = ngx_pcalloc(cf->pool, sizeof(ngx_ipscrub_conf_t));
if (icf == NULL) {
return NULL;
}
icf->period_seconds = NGX_CONF_UNSET;
return icf;
}
static char *
ngx_ipscrub_conf(ngx_conf_t *cf, void *conf)
{
ngx_ipscrub_conf_t *icf = conf;
ngx_conf_init_value(icf->period_seconds, default_period_seconds);
return NGX_CONF_OK;
}
/* Variable support. */
static ngx_int_t
ngx_ipscrub_init(ngx_conf_t *cf)
{
return ngx_ipscrub_add_variables(cf);
}
static ngx_int_t
ngx_ipscrub_add_variables(ngx_conf_t *cf)
{
ngx_http_variable_t *var, *v;
for (v = ngx_http_ipscrub_vars; v->name.len; v++)
{
var = ngx_http_add_variable(cf, &v->name, v->flags);
if (var == NULL)
{
return NGX_ERROR;
}
var->get_handler = v->get_handler;
var->data = v->data;
}
return NGX_OK;
}
static ngx_int_t
ngx_http_variable_remote_addr_ipscrub(ngx_http_request_t *r, ngx_http_variable_value_t *v, uintptr_t data)
{
ngx_int_t rc;
u_char *hashed;
u_char *combined;
ngx_str_t salt;
u_int len;
// Get period_seconds from current configuration.
ngx_ipscrub_conf_t *icf;
icf = ngx_http_get_module_main_conf(r, ngx_ipscrub_module);
// Regenerate salt if past end of period.
time_t now = time(NULL);
if (period_start == -1 || now - period_start > icf->period_seconds) {
nonce = ngx_random();
// TODO: actually calculate when period_start should have been.
period_start = now;
}
salt.data = (u_char *) &nonce;
salt.len = sizeof(nonce);
// Although ngx_crypt provides a salted SHA function, specified by a salt beginning with {SSHA}, that function exposes the salt in its result. For our security model, this is inappropriate. Instead, we use the regular nginx SHA function specified by {SHA}, and manually combine the nonce and plaintext.
rc = concat(r->pool, r->connection->addr_text, salt, &combined);
if (rc != NGX_OK) {
return NGX_HTTP_INTERNAL_SERVER_ERROR;
}
rc = ngx_crypt(r->pool, combined, (u_char *) "{SHA}", &hashed);
if (rc != NGX_OK) {
return NGX_HTTP_INTERNAL_SERVER_ERROR;
}
// Strip prefix.
u_char *obscured = hashed + (sizeof("{SHA}") - 1);
// Compute number of bytes to represent hashed address.
if (r->connection->addr_text.data[3] == '.' ||
r->connection->addr_text.data[2] == '.' ||
r->connection->addr_text.data[1] == '.') {
// This is an IPv4 address.
// IPv4 has a 32-bit address space. Base64 is 6 bits-per-char. ceil(32/6) = 6.
len = 6;
} else {
// This is an IPv6 address.
// IPv6 has a 128-bit address space. Base64 is 6 bits-per-char. ceil(128/6) = 22.
len = 22;
}
v->len = len;
v->valid = 1;
v->no_cacheable = 0;
v->not_found = 0;
v->data = obscured;
return NGX_OK;
}

View File

@ -0,0 +1,38 @@
// Support library for ipscrub module.
// Copyright Mason Simon 2018
#include "ngx_ipscrub_support.h"
// null_terminate allocates a new, null-terminated string based on input.
ngx_int_t null_terminate(ngx_pool_t *pool, ngx_str_t input, u_char **out)
{
*out = ngx_pnalloc(pool, input.len + 1);
if (*out == NULL) {
return NGX_ERROR;
}
(void) ngx_cpymem(*out, input.data, input.len);
(*out)[input.len] = '\0';
return NGX_OK;
}
// concat concatenates prefix and suffix then null-terminates the result.
ngx_int_t concat(ngx_pool_t *pool, ngx_str_t prefix, ngx_str_t suffix, u_char **out)
{
// Allocate.
*out = ngx_pnalloc(pool, prefix.len + suffix.len + 1);
if (*out == NULL) {
return NGX_ERROR;
}
// Write prefix.
(void) ngx_cpymem(*out, prefix.data, prefix.len);
// Write suffix.
(void) ngx_cpymem(*out + prefix.len, suffix.data, suffix.len);
// Terminate.
(*out)[prefix.len + suffix.len] = '\0';
return NGX_OK;
}

View File

@ -0,0 +1,12 @@
// Support library for ipscrub module.
// Copyright Mason Simon 2018
#ifndef _IPSCRUB_SUPPORT_H_INCLUDED_
#define _IPSCRUB_SUPPORT_H_INCLUDED_
#include <ngx_core.h>
ngx_int_t null_terminate(ngx_pool_t *pool, ngx_str_t input, u_char **hashed);
ngx_int_t concat(ngx_pool_t *pool, ngx_str_t prefix, ngx_str_t suffix, u_char **out);
#endif /* _IPSCRUB_SUPPORT_H_INCLUDED_ */

View File

@ -0,0 +1,22 @@
load_module ngx_ipscrub_module.so;
error_log logs/error.log;
events {}
http {
log_format main '$remote_addr_ipscrub';
access_log logs/access.log main;
ipscrub_period_seconds 2;
server {
# listen 8081;
# listen [::]:8081 ipv6only=off;
listen 8081;
listen [::]:8081;
server_name localhost;
}
}

View File

@ -0,0 +1,7 @@
red=$'\e[1;31m'
grn=$'\e[1;32m'
end=$'\e[0m'
curl "http://localhost:8081/" > /dev/null 2> /dev/null
[[ $? == 0 ]] && printf "%s\n" "${grn}PASS${end}" || printf "%s\n" "${red}FAIL${end}"

View File

@ -0,0 +1,20 @@
error_log logs/error.log;
events {}
http {
log_format main '$remote_addr_ipscrub';
access_log logs/access.log main;
ipscrub_period_seconds 2;
server {
# listen 8081;
# listen [::]:8081 ipv6only=off;
listen 8081;
listen [::]:8081;
server_name localhost;
}
}

View File

@ -0,0 +1,11 @@
red=$'\e[1;31m'
grn=$'\e[1;32m'
end=$'\e[0m'
curl -6 "http://localhost:8081/" > /dev/null 2> /dev/null
output6=$(tail -n 1 dest/logs/access.log)
curl -4 "http://localhost:8081/" > /dev/null 2> /dev/null
output4=$(tail -n 1 dest/logs/access.log)
[[ "${#output6}" == 22 && "${#output4}" == 6 ]] && printf "%s\n" "${grn}PASS${end}" || printf "%s\n" "${red}FAIL${end}"

View File

@ -0,0 +1,18 @@
error_log logs/error.log;
events {}
http {
log_format main '$ipscrub_salted_hash_debug';
access_log logs/access.log main;
ipscrub_period_seconds 2;
server {
listen 8081;
# listen [::]:8081 ipv6only=off;
server_name localhost;
}
}

View File

@ -0,0 +1,17 @@
red=$'\e[1;31m'
grn=$'\e[1;32m'
end=$'\e[0m'
salt="SALT"
input="abcdef"
curl "http://localhost:8081/$salt$input" > /dev/null 2> /dev/null
output=$(tail -n 1 dest/logs/access.log)
# -n excludes newline
# cut -c-40 takes first 40 chars (shasum outputs 160 bits in hex)
# xxd converts hex to binary
# base64 converts binary to ascii
clihash=$(echo -n "$input$salt" | shasum | cut -c-40 | xxd -r -p | base64)
[[ $clihash == $output ]] && printf "%s\n" "${grn}PASS${end}" || printf "%s\n" "${red}FAIL${end}"

View File

@ -0,0 +1,18 @@
error_log logs/error.log;
events {}
http {
log_format main '$ipscrub_hash_debug';
access_log logs/access.log main;
ipscrub_period_seconds 2;
server {
listen 8081;
# listen [::]:8081 ipv6only=off;
server_name localhost;
}
}

View File

@ -0,0 +1,16 @@
red=$'\e[1;31m'
grn=$'\e[1;32m'
end=$'\e[0m'
input="asdf"
curl "http://localhost:8081/$input" > /dev/null 2> /dev/null
output=$(tail -n 1 dest/logs/access.log)
# -n excludes newline
# cut -c-40 takes first 40 chars (shasum outputs 160 bits in hex)
# xxd converts hex to binary
# base64 converts binary to ascii
clihash=$(echo -n "/$input" | shasum | cut -c-40 | xxd -r -p | base64)
[[ $clihash == $output ]] && printf "%s\n" "${grn}PASS${end}" || printf "%s\n" "${red}FAIL${end}"