|
@@ -20,13 +20,13 @@ pub enum PacketHeader {
|
|
#[default]
|
|
#[default]
|
|
NoCrypto,
|
|
NoCrypto,
|
|
Signed(Signature),
|
|
Signed(Signature),
|
|
- // u64 here is the nonce
|
|
|
|
- Encrypted(u64),
|
|
|
|
|
|
+ // u128 here is the nonce
|
|
|
|
+ Encrypted(u128),
|
|
}
|
|
}
|
|
|
|
|
|
pub struct SymmetricKey {
|
|
pub struct SymmetricKey {
|
|
key: [u8; 16],
|
|
key: [u8; 16],
|
|
- nonce: [u8; 16],
|
|
|
|
|
|
+ nonce: u128,
|
|
}
|
|
}
|
|
|
|
|
|
pub(crate) struct VerifyPacketSignature {
|
|
pub(crate) struct VerifyPacketSignature {
|
|
@@ -38,39 +38,34 @@ impl Service for VerifyPacketSignature {
|
|
Self { api }
|
|
Self { api }
|
|
}
|
|
}
|
|
fn setup(self: &std::rc::Rc<Self>) {
|
|
fn setup(self: &std::rc::Rc<Self>) {
|
|
- self.api.channel::<fleck_core::ReceivePacketChannel>().sub_opt(
|
|
|
|
- fleck_core::ReceiveOrder::Verify,
|
|
|
|
- self,
|
|
|
|
- Self::check,
|
|
|
|
- );
|
|
|
|
|
|
+ self.api
|
|
|
|
+ .channel::<fleck_core::ReceivePacketChannel>()
|
|
|
|
+ .sub_opt(fleck_core::ReceiveOrder::Verify, self, Self::check);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
impl VerifyPacketSignature {
|
|
impl VerifyPacketSignature {
|
|
- fn check(
|
|
|
|
- &self,
|
|
|
|
- mut message: fleck_core::msg::Message,
|
|
|
|
- ) -> Option<fleck_core::msg::Message> {
|
|
|
|
- match message.crypto_header {
|
|
|
|
- PacketHeader::Signed(signature) => {
|
|
|
|
- // check that we have a pubkey for the node, reject if not
|
|
|
|
- let pubkey = message.node.as_ref().and_then(|n| Some(n.pubkey()));
|
|
|
|
- if pubkey.is_none() {
|
|
|
|
- return None
|
|
|
|
- }
|
|
|
|
- let pubkey = pubkey.unwrap();
|
|
|
|
-
|
|
|
|
- message.crypto_header = PacketHeader::NoCrypto;
|
|
|
|
- let to_verify = bincode::serialize(&message)
|
|
|
|
- .expect("assume that we can re-serialize the message");
|
|
|
|
-
|
|
|
|
- use ed25519_dalek::Verifier;
|
|
|
|
- pubkey.verify(&to_verify, &signature).ok()?;
|
|
|
|
- }
|
|
|
|
- _ => {}
|
|
|
|
|
|
+ fn check(&self, mut message: fleck_core::msg::Message) -> Option<fleck_core::msg::Message> {
|
|
|
|
+ // we don't care about the message if it isn't supposed to be signed
|
|
|
|
+ if !message.saved_params.unwrap().signed {
|
|
|
|
+ return Some(message);
|
|
}
|
|
}
|
|
|
|
|
|
- Some(message)
|
|
|
|
|
|
+ if let PacketHeader::Signed(signature) = message.crypto_header {
|
|
|
|
+ let pubkey = message.node.as_ref()?.pubkey();
|
|
|
|
+ // reset the crypto header for verification
|
|
|
|
+ message.crypto_header = PacketHeader::NoCrypto;
|
|
|
|
+ let to_verify =
|
|
|
|
+ bincode::serialize(&message).expect("assume that we can re-serialize the message");
|
|
|
|
+
|
|
|
|
+ use ed25519_dalek::Verifier;
|
|
|
|
+ pubkey.verify(&to_verify, &signature).ok()?;
|
|
|
|
+ // verification passed!
|
|
|
|
+ Some(message)
|
|
|
|
+ } else {
|
|
|
|
+ // it was supposed to have a signature, but it didn't...
|
|
|
|
+ None
|
|
|
|
+ }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
@@ -132,18 +127,18 @@ pub enum KeyExchangeState {
|
|
impl std::fmt::Debug for KeyExchangeState {
|
|
impl std::fmt::Debug for KeyExchangeState {
|
|
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
match self {
|
|
match self {
|
|
- Self::NoState => {
|
|
|
|
- f.write_str("KeyExchangeState::NoState")
|
|
|
|
- },
|
|
|
|
- Self::Given(pkey) => {
|
|
|
|
- f.write_fmt(format_args!("KeyExchangeState::Given {{ pkey: {:?} }}", pkey))
|
|
|
|
- },
|
|
|
|
|
|
+ Self::NoState => f.write_str("KeyExchangeState::NoState"),
|
|
|
|
+ Self::Given(pkey) => f.write_fmt(format_args!(
|
|
|
|
+ "KeyExchangeState::Given {{ pkey: {:?} }}",
|
|
|
|
+ pkey
|
|
|
|
+ )),
|
|
Self::WaitForResponse(_) => {
|
|
Self::WaitForResponse(_) => {
|
|
f.write_str("KeyExchangeState::WaitForResponse { redacted }")
|
|
f.write_str("KeyExchangeState::WaitForResponse { redacted }")
|
|
- },
|
|
|
|
- Self::Completed(pkey, _) => {
|
|
|
|
- f.write_fmt(format_args!("KeyExchangeState::Completed {{ pkey: {:?}, redacted }}", pkey))
|
|
|
|
- },
|
|
|
|
|
|
+ }
|
|
|
|
+ Self::Completed(pkey, _) => f.write_fmt(format_args!(
|
|
|
|
+ "KeyExchangeState::Completed {{ pkey: {:?}, redacted }}",
|
|
|
|
+ pkey
|
|
|
|
+ )),
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -155,15 +150,22 @@ pub struct EncryptionService {
|
|
|
|
|
|
impl Service for EncryptionService {
|
|
impl Service for EncryptionService {
|
|
fn new(api: std::rc::Rc<crate::API>) -> Self {
|
|
fn new(api: std::rc::Rc<crate::API>) -> Self {
|
|
- Self { api, state: Default::default() }
|
|
|
|
|
|
+ Self {
|
|
|
|
+ api,
|
|
|
|
+ state: Default::default(),
|
|
|
|
+ }
|
|
}
|
|
}
|
|
|
|
|
|
fn setup(self: &std::rc::Rc<Self>) {
|
|
fn setup(self: &std::rc::Rc<Self>) {
|
|
self.api.with_service(|msg: &fleck_core::MessageService| {
|
|
self.api.with_service(|msg: &fleck_core::MessageService| {
|
|
msg.add_message_type::<KeyExchange>();
|
|
msg.add_message_type::<KeyExchange>();
|
|
});
|
|
});
|
|
- self.api.channel::<fleck_core::node::NodeRegistrationChannel>().sub_ref(self, Self::new_node);
|
|
|
|
- self.api.channel::<fleck_core::msg::MessageChannel<KeyExchange>>().sub_eat(self, Self::incoming);
|
|
|
|
|
|
+ self.api
|
|
|
|
+ .channel::<fleck_core::node::NodeRegistrationChannel>()
|
|
|
|
+ .sub_ref(self, Self::new_node);
|
|
|
|
+ self.api
|
|
|
|
+ .channel::<fleck_core::msg::MessageChannel<KeyExchange>>()
|
|
|
|
+ .sub_eat(self, Self::incoming);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
@@ -183,11 +185,12 @@ impl EncryptionService {
|
|
// send notification with new secret
|
|
// send notification with new secret
|
|
let send = || {
|
|
let send = || {
|
|
log::trace!("sending KeyExchange message");
|
|
log::trace!("sending KeyExchange message");
|
|
- self.api.queue::<fleck_core::SendPacketChannel>(fleck_core::msg::Message::build(
|
|
|
|
- KeyExchange {
|
|
|
|
- key: x25519_dalek::PublicKey::from(&secret)
|
|
|
|
- }
|
|
|
|
- ).with_peer(with.clone()));
|
|
|
|
|
|
+ self.api.queue::<fleck_core::SendPacketChannel>(
|
|
|
|
+ fleck_core::msg::Message::build(KeyExchange {
|
|
|
|
+ key: x25519_dalek::PublicKey::from(&secret),
|
|
|
|
+ })
|
|
|
|
+ .with_peer(with.clone()),
|
|
|
|
+ );
|
|
};
|
|
};
|
|
|
|
|
|
let mut states = self.state.borrow_mut();
|
|
let mut states = self.state.borrow_mut();
|
|
@@ -196,43 +199,50 @@ impl EncryptionService {
|
|
KeyExchangeState::NoState => {
|
|
KeyExchangeState::NoState => {
|
|
send();
|
|
send();
|
|
states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
- },
|
|
|
|
|
|
+ }
|
|
KeyExchangeState::Given(pubkey) => {
|
|
KeyExchangeState::Given(pubkey) => {
|
|
send();
|
|
send();
|
|
let result = secret.diffie_hellman(&pubkey);
|
|
let result = secret.diffie_hellman(&pubkey);
|
|
|
|
|
|
let sk = SymmetricKey {
|
|
let sk = SymmetricKey {
|
|
key: result.as_bytes()[0..16].try_into().unwrap(),
|
|
key: result.as_bytes()[0..16].try_into().unwrap(),
|
|
- nonce: result.as_bytes()[16..32].try_into().unwrap(),
|
|
|
|
|
|
+ nonce: u128::from_be_bytes(result.as_bytes()[16..32].try_into().unwrap()),
|
|
};
|
|
};
|
|
|
|
|
|
log::trace!("Completed key negotiation with peer!");
|
|
log::trace!("Completed key negotiation with peer!");
|
|
states.insert(with.clone(), KeyExchangeState::Completed(pubkey, sk));
|
|
states.insert(with.clone(), KeyExchangeState::Completed(pubkey, sk));
|
|
- },
|
|
|
|
|
|
+ }
|
|
KeyExchangeState::WaitForResponse(secret) => {
|
|
KeyExchangeState::WaitForResponse(secret) => {
|
|
send();
|
|
send();
|
|
states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
- },
|
|
|
|
|
|
+ }
|
|
KeyExchangeState::Completed(_pubkey, _symmetric_key) => {
|
|
KeyExchangeState::Completed(_pubkey, _symmetric_key) => {
|
|
- log::error!("asked to begin handshake when already have a good encryption key?");
|
|
|
|
- return
|
|
|
|
- },
|
|
|
|
|
|
+ log::warn!("asked to begin handshake when already have a good encryption key --- did the peer die?");
|
|
|
|
+ return;
|
|
|
|
+ }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
fn incoming(&self, msg: (fleck_core::msg::Metadata, KeyExchange)) {
|
|
fn incoming(&self, msg: (fleck_core::msg::Metadata, KeyExchange)) {
|
|
let mut states = self.state.borrow_mut();
|
|
let mut states = self.state.borrow_mut();
|
|
- let peer = msg.0.peer.expect("incoming KeyExchange should have a peer?");
|
|
|
|
|
|
+ let peer = msg
|
|
|
|
+ .0
|
|
|
|
+ .peer
|
|
|
|
+ .expect("incoming KeyExchange should have a peer?");
|
|
|
|
|
|
let state = states.remove(&peer).unwrap_or(KeyExchangeState::NoState);
|
|
let state = states.remove(&peer).unwrap_or(KeyExchangeState::NoState);
|
|
- log::trace!("incoming key exchange message: {:?}, state: {:?}", msg.1, &state);
|
|
|
|
|
|
+ log::trace!(
|
|
|
|
+ "incoming key exchange message: {:?}, state: {:?}",
|
|
|
|
+ msg.1,
|
|
|
|
+ &state
|
|
|
|
+ );
|
|
match state {
|
|
match state {
|
|
KeyExchangeState::NoState => {
|
|
KeyExchangeState::NoState => {
|
|
states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
|
|
|
drop(states);
|
|
drop(states);
|
|
self.begin_handshake(&peer);
|
|
self.begin_handshake(&peer);
|
|
- },
|
|
|
|
|
|
+ }
|
|
KeyExchangeState::Given(peer_pubkey) => {
|
|
KeyExchangeState::Given(peer_pubkey) => {
|
|
if peer_pubkey != msg.1.key {
|
|
if peer_pubkey != msg.1.key {
|
|
log::info!("peer DH key changed!");
|
|
log::info!("peer DH key changed!");
|
|
@@ -241,19 +251,19 @@ impl EncryptionService {
|
|
|
|
|
|
drop(states);
|
|
drop(states);
|
|
self.begin_handshake(&peer);
|
|
self.begin_handshake(&peer);
|
|
- },
|
|
|
|
|
|
+ }
|
|
KeyExchangeState::WaitForResponse(secret) => {
|
|
KeyExchangeState::WaitForResponse(secret) => {
|
|
// key handshake is finished!
|
|
// key handshake is finished!
|
|
let result = secret.diffie_hellman(&msg.1.key);
|
|
let result = secret.diffie_hellman(&msg.1.key);
|
|
|
|
|
|
let sk = SymmetricKey {
|
|
let sk = SymmetricKey {
|
|
key: result.as_bytes()[0..16].try_into().unwrap(),
|
|
key: result.as_bytes()[0..16].try_into().unwrap(),
|
|
- nonce: result.as_bytes()[16..32].try_into().unwrap(),
|
|
|
|
|
|
+ nonce: u128::from_be_bytes(result.as_bytes()[16..32].try_into().unwrap()),
|
|
};
|
|
};
|
|
|
|
|
|
states.insert(peer.clone(), KeyExchangeState::Completed(msg.1.key, sk));
|
|
states.insert(peer.clone(), KeyExchangeState::Completed(msg.1.key, sk));
|
|
drop(states);
|
|
drop(states);
|
|
- },
|
|
|
|
|
|
+ }
|
|
KeyExchangeState::Completed(peer_pubkey, _symmetric_key) => {
|
|
KeyExchangeState::Completed(peer_pubkey, _symmetric_key) => {
|
|
if peer_pubkey == msg.1.key {
|
|
if peer_pubkey == msg.1.key {
|
|
// it's a repeat, so nothing to do
|
|
// it's a repeat, so nothing to do
|
|
@@ -263,9 +273,11 @@ impl EncryptionService {
|
|
states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
drop(states);
|
|
drop(states);
|
|
self.begin_handshake(&peer);
|
|
self.begin_handshake(&peer);
|
|
- },
|
|
|
|
|
|
+ }
|
|
}
|
|
}
|
|
- log::trace!("after processing incoming key exchange message, state: {:?}", self.state.borrow().get(&peer));
|
|
|
|
-
|
|
|
|
|
|
+ log::trace!(
|
|
|
|
+ "after processing incoming key exchange message, state: {:?}",
|
|
|
|
+ self.state.borrow().get(&peer)
|
|
|
|
+ );
|
|
}
|
|
}
|
|
}
|
|
}
|