|
@@ -1,8 +1,10 @@
|
|
|
-use std::{cell::RefCell, collections::HashMap};
|
|
|
+use std::{cell::RefCell, collections::HashMap, rc::Rc};
|
|
|
|
|
|
-// use aes_gcm::aes::cipher::BlockEncrypt;
|
|
|
-use aes_gcm::{Aes128Gcm, aead::{KeyInit, Aead}, Nonce};
|
|
|
-pub use ed25519_dalek::{Keypair, PublicKey, Signature, Signer};
|
|
|
+use aes_gcm::{
|
|
|
+ aead::{Aead, KeyInit},
|
|
|
+ Aes128Gcm, Nonce,
|
|
|
+};
|
|
|
+pub use ed25519_dalek::{Keypair, Signature, Signer};
|
|
|
|
|
|
use crate::prelude::*;
|
|
|
|
|
@@ -25,6 +27,35 @@ pub enum PacketHeader {
|
|
|
Encrypted(u128),
|
|
|
}
|
|
|
|
|
|
+#[derive(Default, Clone, PartialEq, serde::Serialize, serde::Deserialize)]
|
|
|
+pub struct PublicKey(ed25519_dalek::PublicKey);
|
|
|
+
|
|
|
+impl PublicKey {
|
|
|
+ pub fn wrap(pkey: ed25519_dalek::PublicKey) -> Self {
|
|
|
+ Self(pkey)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+// *technically* there may be equivalence classes, but we really don't care about those in this
|
|
|
+// context.
|
|
|
+impl Eq for PublicKey {
|
|
|
+ fn assert_receiver_is_total_eq(&self) {}
|
|
|
+}
|
|
|
+
|
|
|
+impl std::hash::Hash for PublicKey {
|
|
|
+ fn hash<H: std::hash::Hasher>(&self, state: &mut H) {
|
|
|
+ state.write(self.0.as_bytes())
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+impl std::fmt::Debug for PublicKey {
|
|
|
+ fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
|
+ f.write_str("PublicKey {")?;
|
|
|
+ self.0.as_bytes().fmt(f)?;
|
|
|
+ f.write_str("}")
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
pub struct SymmetricKey {
|
|
|
key: [u8; 16],
|
|
|
nonce: u128,
|
|
@@ -60,7 +91,7 @@ impl VerifyPacketSignature {
|
|
|
bincode::serialize(&message).expect("assume that we can re-serialize the message");
|
|
|
|
|
|
use ed25519_dalek::Verifier;
|
|
|
- pubkey.verify(&to_verify, &signature).ok()?;
|
|
|
+ pubkey.0.verify(&to_verify, &signature).ok()?;
|
|
|
// verification passed!
|
|
|
Some(message)
|
|
|
} else {
|
|
@@ -145,9 +176,25 @@ impl std::fmt::Debug for KeyExchangeState {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
+#[derive(Clone)]
|
|
|
+struct EncryptionStateKey(Rc<fleck_core::Node>);
|
|
|
+impl PartialEq for EncryptionStateKey {
|
|
|
+ fn eq(&self, other: &Self) -> bool {
|
|
|
+ Rc::as_ptr(&self.0) == Rc::as_ptr(&other.0)
|
|
|
+ }
|
|
|
+}
|
|
|
+impl Eq for EncryptionStateKey {
|
|
|
+ fn assert_receiver_is_total_eq(&self) {}
|
|
|
+}
|
|
|
+impl std::hash::Hash for EncryptionStateKey {
|
|
|
+ fn hash<H: std::hash::Hasher>(&self, state: &mut H) {
|
|
|
+ Rc::as_ptr(&self.0).hash(state);
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
pub struct EncryptionService {
|
|
|
- api: std::rc::Rc<crate::API>,
|
|
|
- state: RefCell<HashMap<fleck_core::peer::Peer, KeyExchangeState>>,
|
|
|
+ api: Rc<crate::API>,
|
|
|
+ state: RefCell<HashMap<EncryptionStateKey, KeyExchangeState>>,
|
|
|
}
|
|
|
|
|
|
impl Service for EncryptionService {
|
|
@@ -159,9 +206,13 @@ impl Service for EncryptionService {
|
|
|
}
|
|
|
|
|
|
fn setup(self: &std::rc::Rc<Self>) {
|
|
|
- self.api.channel::<fleck_core::SendPacketChannel>()
|
|
|
- .sub_opt(fleck_core::SendOrder::Encrypt, self, Self::encrypt);
|
|
|
- self.api.channel::<fleck_core::ReceivePacketChannel>()
|
|
|
+ self.api.channel::<fleck_core::SendPacketChannel>().sub_opt(
|
|
|
+ fleck_core::SendOrder::Encrypt,
|
|
|
+ self,
|
|
|
+ Self::encrypt,
|
|
|
+ );
|
|
|
+ self.api
|
|
|
+ .channel::<fleck_core::ReceivePacketChannel>()
|
|
|
.sub_opt(fleck_core::ReceiveOrder::Decrypt, self, Self::decrypt);
|
|
|
|
|
|
self.api.with_service(|msg: &fleck_core::MessageService| {
|
|
@@ -179,15 +230,15 @@ impl Service for EncryptionService {
|
|
|
impl EncryptionService {
|
|
|
fn encrypt(&self, mut packet: fleck_core::Message) -> Option<fleck_core::Message> {
|
|
|
if !packet.saved_params.unwrap().encrypted {
|
|
|
- return Some(packet)
|
|
|
+ return Some(packet);
|
|
|
}
|
|
|
|
|
|
let mut state = self.state.borrow_mut();
|
|
|
- let mut keyexchange = state.get_mut(packet.peer.as_ref()?)?;
|
|
|
+ let mut keyexchange = state.get_mut(&EncryptionStateKey(packet.node.as_ref().cloned()?))?;
|
|
|
if let KeyExchangeState::Completed(_, symkey) = &mut keyexchange {
|
|
|
let cipher = Aes128Gcm::new_from_slice(&symkey.key).expect("key length mismatch?");
|
|
|
- let nonce_bytes : [u8; 12] = u128::to_be_bytes(symkey.nonce)[0..12].try_into().unwrap();
|
|
|
- let nonce : Nonce<_> = nonce_bytes.into();
|
|
|
+ let nonce_bytes: [u8; 12] = u128::to_be_bytes(symkey.nonce)[0..12].try_into().unwrap();
|
|
|
+ let nonce: Nonce<_> = nonce_bytes.into();
|
|
|
|
|
|
// serialize+encrypt with the message type so we don't leak that
|
|
|
let plaintext = bincode::serialize(&packet.content).ok()?;
|
|
@@ -200,8 +251,7 @@ impl EncryptionService {
|
|
|
symkey.nonce += 1;
|
|
|
|
|
|
Some(packet)
|
|
|
- }
|
|
|
- else {
|
|
|
+ } else {
|
|
|
log::info!("Tried to send packet before encryption handshake was finished");
|
|
|
None
|
|
|
}
|
|
@@ -210,7 +260,7 @@ impl EncryptionService {
|
|
|
fn decrypt(&self, mut packet: fleck_core::Message) -> Option<fleck_core::Message> {
|
|
|
// no peer = pass along
|
|
|
if packet.peer.is_none() {
|
|
|
- return Some(packet)
|
|
|
+ return Some(packet);
|
|
|
}
|
|
|
|
|
|
// check for an encryption header
|
|
@@ -227,33 +277,38 @@ impl EncryptionService {
|
|
|
|
|
|
// There shouldn't be anything wrong with decrypting a message that claims to be encrypted
|
|
|
// and is authenticated, right?... TODO: double-check this assertion.
|
|
|
- if let KeyExchangeState::Completed(_, symkey) = state.get_mut(packet.peer.as_ref()?)? {
|
|
|
+ if let KeyExchangeState::Completed(_, symkey) =
|
|
|
+ state.get_mut(&EncryptionStateKey(packet.node.as_ref().cloned()?))?
|
|
|
+ {
|
|
|
let cipher = Aes128Gcm::new_from_slice(&symkey.key).expect("key length mismatch?");
|
|
|
- let nonce_bytes : [u8; 12] = u128::to_be_bytes(nonce)[0..12].try_into().unwrap();
|
|
|
- let nonce : Nonce<_> = nonce_bytes.into();
|
|
|
+ let nonce_bytes: [u8; 12] = u128::to_be_bytes(nonce)[0..12].try_into().unwrap();
|
|
|
+ let nonce: Nonce<_> = nonce_bytes.into();
|
|
|
|
|
|
- let plaintext = cipher.decrypt(&nonce, packet.content.data.as_slice()).ok()?;
|
|
|
+ let plaintext = cipher
|
|
|
+ .decrypt(&nonce, packet.content.data.as_slice())
|
|
|
+ .ok()?;
|
|
|
packet.content = bincode::deserialize(&plaintext).ok()?;
|
|
|
|
|
|
packet.crypto_header = PacketHeader::NoCrypto;
|
|
|
|
|
|
Some(packet)
|
|
|
- }
|
|
|
- else {
|
|
|
+ } else {
|
|
|
None
|
|
|
}
|
|
|
}
|
|
|
|
|
|
fn new_node(&self, node: &mut std::rc::Rc<fleck_core::node::Node>) {
|
|
|
// we may want to initiate a handshake, if we're not already doing that...
|
|
|
- if let Some(peer) = node.peer().as_ref() {
|
|
|
- if !self.state.borrow().contains_key(peer) {
|
|
|
- self.begin_handshake(peer)
|
|
|
- }
|
|
|
+ if !self
|
|
|
+ .state
|
|
|
+ .borrow()
|
|
|
+ .contains_key(&EncryptionStateKey(node.clone()))
|
|
|
+ {
|
|
|
+ self.begin_handshake(node)
|
|
|
}
|
|
|
}
|
|
|
|
|
|
- fn begin_handshake(&self, with: &fleck_core::peer::Peer) {
|
|
|
+ fn begin_handshake(&self, with: &Rc<fleck_core::Node>) {
|
|
|
use rand::SeedableRng;
|
|
|
let csprng = rand::rngs::StdRng::from_entropy();
|
|
|
let secret = x25519_dalek::EphemeralSecret::new(csprng);
|
|
@@ -263,21 +318,22 @@ impl EncryptionService {
|
|
|
log::trace!("sending KeyExchange message");
|
|
|
self.api.queue::<fleck_core::SendPacketChannel>(
|
|
|
fleck_core::msg::Message::build(KeyExchange {
|
|
|
- pubkey: self.api.with_service(|ns: &fleck_core::NodeService| {
|
|
|
- *ns.self_node().pubkey()
|
|
|
- }),
|
|
|
+ pubkey: self
|
|
|
+ .api
|
|
|
+ .with_service(|ns: &fleck_core::NodeService| ns.self_node().pubkey().0),
|
|
|
key: x25519_dalek::PublicKey::from(&secret),
|
|
|
})
|
|
|
- .with_peer(with.clone()),
|
|
|
+ .with_node(with.clone()),
|
|
|
);
|
|
|
};
|
|
|
|
|
|
let mut states = self.state.borrow_mut();
|
|
|
- let state = states.remove(with).unwrap_or(KeyExchangeState::NoState);
|
|
|
+ let key = EncryptionStateKey(with.clone());
|
|
|
+ let state = states.remove(&key).unwrap_or(KeyExchangeState::NoState);
|
|
|
match state {
|
|
|
KeyExchangeState::NoState => {
|
|
|
send();
|
|
|
- states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
|
+ states.insert(key, KeyExchangeState::WaitForResponse(secret));
|
|
|
},
|
|
|
KeyExchangeState::Given(pubkey) => {
|
|
|
send();
|
|
@@ -289,11 +345,11 @@ impl EncryptionService {
|
|
|
};
|
|
|
|
|
|
log::trace!("Completed key negotiation with peer!");
|
|
|
- states.insert(with.clone(), KeyExchangeState::Completed(pubkey, sk));
|
|
|
+ states.insert(key, KeyExchangeState::Completed(pubkey, sk));
|
|
|
},
|
|
|
KeyExchangeState::WaitForResponse(secret) => {
|
|
|
send();
|
|
|
- states.insert(with.clone(), KeyExchangeState::WaitForResponse(secret));
|
|
|
+ states.insert(key, KeyExchangeState::WaitForResponse(secret));
|
|
|
},
|
|
|
KeyExchangeState::Completed(_pubkey, _symmetric_key) => {
|
|
|
log::warn!("asked to begin handshake when already have a good encryption key --- did the peer die?");
|
|
@@ -303,38 +359,49 @@ impl EncryptionService {
|
|
|
|
|
|
fn incoming(&self, msg: (fleck_core::msg::Metadata, KeyExchange)) {
|
|
|
let mut states = self.state.borrow_mut();
|
|
|
- let peer = msg
|
|
|
- .0
|
|
|
- .peer
|
|
|
- .expect("incoming KeyExchange should have a peer?");
|
|
|
|
|
|
- let state = states.remove(&peer).unwrap_or(KeyExchangeState::NoState);
|
|
|
+ // cases:
|
|
|
+ // 1. we already know about this node, and have a Node instance for it
|
|
|
+ // 2. we don't know about this node yet, and it has a Peer
|
|
|
+ // 3. we don't know about this node yet, and it has no Peer
|
|
|
+
|
|
|
+ let node = if let Some(node) = msg.0.node {
|
|
|
+ node
|
|
|
+ } else {
|
|
|
+ // exciting! let's tell the node service about it, with all the info we have right now:
|
|
|
+ // the pubkey, and potentially a peer
|
|
|
+
|
|
|
+ self.api.with_service(|ns: &fleck_core::NodeService| {
|
|
|
+ let pk = PublicKey::wrap(msg.1.pubkey);
|
|
|
+ ns.inform_of(pk.clone(), msg.0.peer);
|
|
|
+ ns.node_by_pubkey(&pk)
|
|
|
+ .expect("we just told the service about this node")
|
|
|
+ })
|
|
|
+ };
|
|
|
+
|
|
|
+ let skey = EncryptionStateKey(node.clone());
|
|
|
+ let state = states.remove(&skey).unwrap_or(KeyExchangeState::NoState);
|
|
|
log::trace!(
|
|
|
"incoming key exchange message: {:?}, state: {:?}",
|
|
|
msg.1,
|
|
|
&state
|
|
|
);
|
|
|
|
|
|
- // tell the node service about this peer, just in case they don't know already.
|
|
|
- self.api.with_service(|ns: &fleck_core::NodeService| {
|
|
|
- ns.inform_of(msg.1.pubkey, peer.clone());
|
|
|
- });
|
|
|
-
|
|
|
match state {
|
|
|
KeyExchangeState::NoState => {
|
|
|
- states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
+ states.insert(skey.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
|
|
|
drop(states);
|
|
|
- self.begin_handshake(&peer);
|
|
|
+ self.begin_handshake(&node);
|
|
|
},
|
|
|
KeyExchangeState::Given(peer_pubkey) => {
|
|
|
if peer_pubkey != msg.1.key {
|
|
|
log::info!("peer DH key changed!");
|
|
|
- states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
+ states.insert(skey.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
}
|
|
|
|
|
|
drop(states);
|
|
|
- self.begin_handshake(&peer);
|
|
|
+ self.begin_handshake(&node);
|
|
|
},
|
|
|
KeyExchangeState::WaitForResponse(secret) => {
|
|
|
// key handshake is finished!
|
|
@@ -345,7 +412,7 @@ impl EncryptionService {
|
|
|
nonce: u128::from_be_bytes(result.as_bytes()[16..32].try_into().unwrap()),
|
|
|
};
|
|
|
|
|
|
- states.insert(peer.clone(), KeyExchangeState::Completed(msg.1.key, sk));
|
|
|
+ states.insert(skey.clone(), KeyExchangeState::Completed(msg.1.key, sk));
|
|
|
drop(states);
|
|
|
},
|
|
|
KeyExchangeState::Completed(peer_pubkey, _symmetric_key) => {
|
|
@@ -354,14 +421,14 @@ impl EncryptionService {
|
|
|
return;
|
|
|
}
|
|
|
// it's a new pubkey, so we want to restart the handshake
|
|
|
- states.insert(peer.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
+ states.insert(skey.clone(), KeyExchangeState::Given(msg.1.key));
|
|
|
drop(states);
|
|
|
- self.begin_handshake(&peer);
|
|
|
+ self.begin_handshake(&node);
|
|
|
},
|
|
|
}
|
|
|
log::trace!(
|
|
|
"after processing incoming key exchange message, state: {:?}",
|
|
|
- self.state.borrow().get(&peer)
|
|
|
+ self.state.borrow().get(&skey)
|
|
|
);
|
|
|
}
|
|
|
}
|