|
@@ -1,3 +1,6 @@
|
|
|
|
+use std::{cell::RefCell, collections::HashMap};
|
|
|
|
+
|
|
|
|
+use aes_gcm::aes::cipher::BlockEncrypt;
|
|
pub use ed25519_dalek::{Keypair, PublicKey, Signature, Signer};
|
|
pub use ed25519_dalek::{Keypair, PublicKey, Signature, Signer};
|
|
|
|
|
|
use crate::prelude::*;
|
|
use crate::prelude::*;
|
|
@@ -12,18 +15,6 @@ pub enum TrustLevel {
|
|
|
|
|
|
pub struct TrustDB {}
|
|
pub struct TrustDB {}
|
|
|
|
|
|
-pub struct KeyExchangeInitiate {}
|
|
|
|
-
|
|
|
|
-impl fleck_core::msg::MessageParams for KeyExchangeInitiate {
|
|
|
|
- const NAME: &'static str = "KeyExchangeInitiate";
|
|
|
|
- const ENCRYPTED: bool = false;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-pub enum KeyExchange {
|
|
|
|
- WaitForResponse(x25519_dalek::PublicKey),
|
|
|
|
- Completed(SymmetricKey),
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
#[derive(serde::Serialize, serde::Deserialize, Default, Debug)]
|
|
#[derive(serde::Serialize, serde::Deserialize, Default, Debug)]
|
|
pub enum PacketHeader {
|
|
pub enum PacketHeader {
|
|
#[default]
|
|
#[default]
|
|
@@ -109,3 +100,131 @@ impl SignPacket {
|
|
});
|
|
});
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
+
|
|
|
|
+#[derive(serde::Serialize, serde::Deserialize)]
|
|
|
|
+pub struct KeyExchange {
|
|
|
|
+ key: x25519_dalek::PublicKey,
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+impl fleck_core::msg::MessageParams for KeyExchange {
|
|
|
|
+ const NAME: &'static str = "KeyExchange";
|
|
|
|
+ const ENCRYPTED: bool = false;
|
|
|
|
+ const SIGNED: bool = true;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+pub enum KeyExchangeState {
|
|
|
|
+ NoState,
|
|
|
|
+ Given(x25519_dalek::PublicKey),
|
|
|
|
+ WaitForResponse(x25519_dalek::EphemeralSecret),
|
|
|
|
+ Completed(x25519_dalek::PublicKey, SymmetricKey),
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+pub struct EncryptionService {
|
|
|
|
+ state: RefCell<HashMap<fleck_core::peer::Peer, KeyExchangeState>>,
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+impl Default for EncryptionService {
|
|
|
|
+ fn default() -> Self {
|
|
|
|
+ Self {
|
|
|
|
+ state: Default::default(),
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+impl Service for std::rc::Rc<EncryptionService> {
|
|
|
|
+ fn setup(&self, api: &crate::Fleck) {
|
|
|
|
+ api.channel::<fleck_core::node::NodeRegistrationChannel>().sub_ref(self, EncryptionService::new_node);
|
|
|
|
+ api.channel::<fleck_core::msg::MessageChannel<KeyExchange>>().sub_eat(self, EncryptionService::incoming);
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+impl EncryptionService {
|
|
|
|
+ fn new_node(&self, api: &crate::Fleck, node: &mut std::rc::Rc<fleck_core::node::Node>) {
|
|
|
|
+ match node.peer().as_ref() {
|
|
|
|
+ Some(peer) => self.begin_handshake(api, peer),
|
|
|
|
+ None => (),
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ fn begin_handshake(&self, api: &crate::Fleck, with: &fleck_core::peer::Peer) {
|
|
|
|
+ use rand::SeedableRng;
|
|
|
|
+ let mut csprng = rand::rngs::StdRng::from_entropy();
|
|
|
|
+ let secret = x25519_dalek::EphemeralSecret::new(&mut csprng);
|
|
|
|
+
|
|
|
|
+ // send notification with new secret
|
|
|
|
+ api.queue::<fleck_core::SendPacketChannel>(fleck_core::msg::Message::build(
|
|
|
|
+ KeyExchange {
|
|
|
|
+ key: x25519_dalek::PublicKey::from(&secret)
|
|
|
|
+ }
|
|
|
|
+ ));
|
|
|
|
+
|
|
|
|
+ let mut states = self.state.borrow_mut();
|
|
|
|
+ let state = states.remove(&with).unwrap_or(KeyExchangeState::NoState);
|
|
|
|
+ match state {
|
|
|
|
+ KeyExchangeState::NoState => {
|
|
|
|
+ states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
|
|
+ },
|
|
|
|
+ KeyExchangeState::Given(pubkey) => {
|
|
|
|
+ let result = secret.diffie_hellman(&pubkey);
|
|
|
|
+
|
|
|
|
+ let sk = SymmetricKey {
|
|
|
|
+ key: result.as_bytes()[0..16].try_into().unwrap(),
|
|
|
|
+ nonce: result.as_bytes()[16..32].try_into().unwrap(),
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+ states.insert(with.clone(), KeyExchangeState::Completed(pubkey, sk));
|
|
|
|
+ },
|
|
|
|
+ KeyExchangeState::WaitForResponse(secret) => {
|
|
|
|
+ states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
|
|
+ },
|
|
|
|
+ KeyExchangeState::Completed(_pubkey, _symmetric_key) => {
|
|
|
|
+ log::error!("asked to begin handshake when already have a good encryption key?");
|
|
|
|
+ },
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ fn incoming(&self, api: &crate::Fleck, msg: (fleck_core::msg::Metadata, KeyExchange)) {
|
|
|
|
+ let mut states = self.state.borrow_mut();
|
|
|
|
+ let peer = msg.0.peer.expect("incoming KeyExchange should have a peer?");
|
|
|
|
+ // let state = states.entry(peer.clone()).or_insert(KeyExchangeState::NoState);
|
|
|
|
+ let state = states.remove(&peer).unwrap_or(KeyExchangeState::NoState);
|
|
|
|
+ match state {
|
|
|
|
+ KeyExchangeState::NoState => {
|
|
|
|
+ states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
|
+
|
|
|
|
+ drop(states);
|
|
|
|
+ self.begin_handshake(api, &peer);
|
|
|
|
+ },
|
|
|
|
+ KeyExchangeState::Given(peer_pubkey) => {
|
|
|
|
+ if peer_pubkey != msg.1.key {
|
|
|
|
+ log::info!("peer DH key changed!");
|
|
|
|
+ states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ drop(states);
|
|
|
|
+ self.begin_handshake(api, &peer);
|
|
|
|
+ },
|
|
|
|
+ KeyExchangeState::WaitForResponse(secret) => {
|
|
|
|
+ // key handshake is finished!
|
|
|
|
+ let result = secret.diffie_hellman(&msg.1.key);
|
|
|
|
+
|
|
|
|
+ let sk = SymmetricKey {
|
|
|
|
+ key: result.as_bytes()[0..16].try_into().unwrap(),
|
|
|
|
+ nonce: result.as_bytes()[16..32].try_into().unwrap(),
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+ states.insert(peer.clone(), KeyExchangeState::Completed(msg.1.key, sk));
|
|
|
|
+ },
|
|
|
|
+ KeyExchangeState::Completed(peer_pubkey, _symmetric_key) => {
|
|
|
|
+ if peer_pubkey == msg.1.key {
|
|
|
|
+ // it's a repeat, so nothing to do
|
|
|
|
+ return;
|
|
|
|
+ }
|
|
|
|
+ // it's a new pubkey, so we want to restart the handshake
|
|
|
|
+ states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
|
+ drop(states);
|
|
|
|
+ self.begin_handshake(api, &peer);
|
|
|
|
+ },
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+}
|