crypto.rs 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434
  1. use std::{cell::RefCell, collections::HashMap, rc::Rc};
  2. use aes_gcm::{
  3. aead::{Aead, KeyInit},
  4. Aes128Gcm, Nonce,
  5. };
  6. pub use ed25519_dalek::{Keypair, Signature, Signer};
  7. use crate::prelude::*;
  8. pub enum TrustLevel {
  9. Unknown,
  10. Distrusted,
  11. // Future extension
  12. // Transitively,
  13. Ultimately,
  14. }
  15. pub struct TrustDB {}
  16. #[derive(serde::Serialize, serde::Deserialize, Default, Debug)]
  17. pub enum PacketHeader {
  18. #[default]
  19. NoCrypto,
  20. Signed(Signature),
  21. // u128 here is the nonce
  22. Encrypted(u128),
  23. }
  24. #[derive(Default, Clone, PartialEq, serde::Serialize, serde::Deserialize)]
  25. pub struct PublicKey(ed25519_dalek::PublicKey);
  26. impl PublicKey {
  27. pub fn wrap(pkey: ed25519_dalek::PublicKey) -> Self {
  28. Self(pkey)
  29. }
  30. }
  31. // *technically* there may be equivalence classes, but we really don't care about those in this
  32. // context.
  33. impl Eq for PublicKey {
  34. fn assert_receiver_is_total_eq(&self) {}
  35. }
  36. impl std::hash::Hash for PublicKey {
  37. fn hash<H: std::hash::Hasher>(&self, state: &mut H) {
  38. state.write(self.0.as_bytes())
  39. }
  40. }
  41. impl std::fmt::Debug for PublicKey {
  42. fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
  43. f.write_str("PublicKey {")?;
  44. self.0.as_bytes().fmt(f)?;
  45. f.write_str("}")
  46. }
  47. }
  48. pub struct SymmetricKey {
  49. key: [u8; 16],
  50. nonce: u128,
  51. }
  52. pub(crate) struct VerifyPacketSignature {
  53. api: std::rc::Rc<crate::API>,
  54. }
  55. impl Service for VerifyPacketSignature {
  56. fn new(api: std::rc::Rc<crate::API>) -> Self {
  57. Self { api }
  58. }
  59. fn setup(self: &std::rc::Rc<Self>) {
  60. self.api
  61. .channel::<fleck_core::ReceivePacketChannel>()
  62. .sub_opt(fleck_core::ReceiveOrder::Verify, self, Self::check);
  63. }
  64. }
  65. impl VerifyPacketSignature {
  66. fn check(&self, mut message: fleck_core::msg::Message) -> Option<fleck_core::msg::Message> {
  67. // we don't care about the message if it isn't supposed to be signed
  68. if !message.saved_params.unwrap().signed {
  69. return Some(message);
  70. }
  71. if let PacketHeader::Signed(signature) = message.crypto_header {
  72. let pubkey = message.node.as_ref()?.pubkey();
  73. // reset the crypto header for verification
  74. message.crypto_header = PacketHeader::NoCrypto;
  75. let to_verify =
  76. bincode::serialize(&message).expect("assume that we can re-serialize the message");
  77. use ed25519_dalek::Verifier;
  78. pubkey.0.verify(&to_verify, &signature).ok()?;
  79. // verification passed!
  80. Some(message)
  81. } else {
  82. // it was supposed to have a signature, but it didn't...
  83. None
  84. }
  85. }
  86. }
  87. pub(crate) struct SignPacket {
  88. api: std::rc::Rc<crate::API>,
  89. }
  90. impl Service for SignPacket {
  91. fn new(api: std::rc::Rc<crate::API>) -> Self {
  92. Self { api }
  93. }
  94. fn setup(self: &std::rc::Rc<Self>) {
  95. self.api.channel::<fleck_core::SendPacketChannel>().sub_ref(
  96. fleck_core::SendOrder::Sign,
  97. self,
  98. Self::sign,
  99. );
  100. }
  101. }
  102. impl SignPacket {
  103. fn sign(&self, message: &mut fleck_core::msg::Message) {
  104. let params = message
  105. .saved_params
  106. .expect("packet got to signing stage without saved parameters?");
  107. // don't do anything if the packet doesn't want a signature
  108. if !params.signed {
  109. return;
  110. }
  111. self.api.with_service(|ns: &fleck_core::NodeService| {
  112. let ns = ns.self_node();
  113. let keypair = ns.keypair().unwrap();
  114. let sign_data = bincode::serialize(&message.content).unwrap();
  115. message.crypto_header = PacketHeader::Signed(keypair.sign(&sign_data));
  116. });
  117. }
  118. }
  119. #[derive(serde::Serialize, serde::Deserialize, Debug)]
  120. pub struct KeyExchange {
  121. pubkey: ed25519_dalek::PublicKey,
  122. key: x25519_dalek::PublicKey,
  123. }
  124. impl fleck_core::msg::MessageParams for KeyExchange {
  125. const NAME: &'static str = "KeyExchange";
  126. const ENCRYPTED: bool = false;
  127. const SIGNED: bool = true;
  128. }
  129. pub enum KeyExchangeState {
  130. NoState,
  131. Given(x25519_dalek::PublicKey),
  132. WaitForResponse(x25519_dalek::EphemeralSecret),
  133. Completed(x25519_dalek::PublicKey, SymmetricKey),
  134. }
  135. impl std::fmt::Debug for KeyExchangeState {
  136. fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
  137. match self {
  138. Self::NoState => f.write_str("KeyExchangeState::NoState"),
  139. Self::Given(pkey) => f.write_fmt(format_args!(
  140. "KeyExchangeState::Given {{ pkey: {:?} }}",
  141. pkey
  142. )),
  143. Self::WaitForResponse(_) => {
  144. f.write_str("KeyExchangeState::WaitForResponse { redacted }")
  145. },
  146. Self::Completed(pkey, _) => f.write_fmt(format_args!(
  147. "KeyExchangeState::Completed {{ pkey: {:?}, redacted }}",
  148. pkey
  149. )),
  150. }
  151. }
  152. }
  153. #[derive(Clone)]
  154. struct EncryptionStateKey(Rc<fleck_core::Node>);
  155. impl PartialEq for EncryptionStateKey {
  156. fn eq(&self, other: &Self) -> bool {
  157. Rc::as_ptr(&self.0) == Rc::as_ptr(&other.0)
  158. }
  159. }
  160. impl Eq for EncryptionStateKey {
  161. fn assert_receiver_is_total_eq(&self) {}
  162. }
  163. impl std::hash::Hash for EncryptionStateKey {
  164. fn hash<H: std::hash::Hasher>(&self, state: &mut H) {
  165. Rc::as_ptr(&self.0).hash(state);
  166. }
  167. }
  168. pub struct EncryptionService {
  169. api: Rc<crate::API>,
  170. state: RefCell<HashMap<EncryptionStateKey, KeyExchangeState>>,
  171. }
  172. impl Service for EncryptionService {
  173. fn new(api: std::rc::Rc<crate::API>) -> Self {
  174. Self {
  175. api,
  176. state: Default::default(),
  177. }
  178. }
  179. fn setup(self: &std::rc::Rc<Self>) {
  180. self.api.channel::<fleck_core::SendPacketChannel>().sub_opt(
  181. fleck_core::SendOrder::Encrypt,
  182. self,
  183. Self::encrypt,
  184. );
  185. self.api
  186. .channel::<fleck_core::ReceivePacketChannel>()
  187. .sub_opt(fleck_core::ReceiveOrder::Decrypt, self, Self::decrypt);
  188. self.api.with_service(|msg: &fleck_core::MessageService| {
  189. msg.add_message_type::<KeyExchange>();
  190. });
  191. self.api
  192. .channel::<fleck_core::node::NodeRegistrationChannel>()
  193. .sub_ref(self, Self::new_node);
  194. self.api
  195. .channel::<fleck_core::msg::MessageChannel<KeyExchange>>()
  196. .sub_eat(self, Self::incoming);
  197. }
  198. }
  199. impl EncryptionService {
  200. fn encrypt(&self, mut packet: fleck_core::Message) -> Option<fleck_core::Message> {
  201. if !packet.saved_params.unwrap().encrypted {
  202. return Some(packet);
  203. }
  204. let mut state = self.state.borrow_mut();
  205. let mut keyexchange = state.get_mut(&EncryptionStateKey(packet.node.as_ref().cloned()?))?;
  206. if let KeyExchangeState::Completed(_, symkey) = &mut keyexchange {
  207. let cipher = Aes128Gcm::new_from_slice(&symkey.key).expect("key length mismatch?");
  208. let nonce_bytes: [u8; 12] = u128::to_be_bytes(symkey.nonce)[0..12].try_into().unwrap();
  209. let nonce: Nonce<_> = nonce_bytes.into();
  210. // serialize+encrypt with the message type so we don't leak that
  211. let plaintext = bincode::serialize(&packet.content).ok()?;
  212. packet.content.ty = 0;
  213. packet.content.data = cipher.encrypt(&nonce, plaintext.as_slice()).ok()?;
  214. packet.crypto_header = PacketHeader::Encrypted(symkey.nonce);
  215. // advance the nonce
  216. symkey.nonce += 1;
  217. Some(packet)
  218. } else {
  219. log::info!("Tried to send packet before encryption handshake was finished");
  220. None
  221. }
  222. }
  223. fn decrypt(&self, mut packet: fleck_core::Message) -> Option<fleck_core::Message> {
  224. // no peer = pass along
  225. if packet.peer.is_none() {
  226. return Some(packet);
  227. }
  228. // check for an encryption header
  229. let nonce = match packet.crypto_header {
  230. PacketHeader::Encrypted(nonce) => nonce,
  231. _ => return Some(packet),
  232. };
  233. let mut state = self.state.borrow_mut();
  234. // we don't have saved_params or anything yet, or even know what the message type is, so
  235. // we'll just have to trust that if we have an encryption key and there's a crypto header,
  236. // we should decrypt it.
  237. // There shouldn't be anything wrong with decrypting a message that claims to be encrypted
  238. // and is authenticated, right?... TODO: double-check this assertion.
  239. if let KeyExchangeState::Completed(_, symkey) =
  240. state.get_mut(&EncryptionStateKey(packet.node.as_ref().cloned()?))?
  241. {
  242. let cipher = Aes128Gcm::new_from_slice(&symkey.key).expect("key length mismatch?");
  243. let nonce_bytes: [u8; 12] = u128::to_be_bytes(nonce)[0..12].try_into().unwrap();
  244. let nonce: Nonce<_> = nonce_bytes.into();
  245. let plaintext = cipher
  246. .decrypt(&nonce, packet.content.data.as_slice())
  247. .ok()?;
  248. packet.content = bincode::deserialize(&plaintext).ok()?;
  249. packet.crypto_header = PacketHeader::NoCrypto;
  250. Some(packet)
  251. } else {
  252. None
  253. }
  254. }
  255. fn new_node(&self, node: &mut std::rc::Rc<fleck_core::node::Node>) {
  256. // we may want to initiate a handshake, if we're not already doing that...
  257. if !self
  258. .state
  259. .borrow()
  260. .contains_key(&EncryptionStateKey(node.clone()))
  261. {
  262. self.begin_handshake(node)
  263. }
  264. }
  265. fn begin_handshake(&self, with: &Rc<fleck_core::Node>) {
  266. use rand::SeedableRng;
  267. let csprng = rand::rngs::StdRng::from_entropy();
  268. let secret = x25519_dalek::EphemeralSecret::new(csprng);
  269. // send notification with new secret
  270. let send = || {
  271. log::trace!("sending KeyExchange message");
  272. self.api.queue::<fleck_core::SendPacketChannel>(
  273. fleck_core::msg::Message::build(KeyExchange {
  274. pubkey: self
  275. .api
  276. .with_service(|ns: &fleck_core::NodeService| ns.self_node().pubkey().0),
  277. key: x25519_dalek::PublicKey::from(&secret),
  278. })
  279. .with_node(with.clone()),
  280. );
  281. };
  282. let mut states = self.state.borrow_mut();
  283. let key = EncryptionStateKey(with.clone());
  284. let state = states.remove(&key).unwrap_or(KeyExchangeState::NoState);
  285. match state {
  286. KeyExchangeState::NoState => {
  287. send();
  288. states.insert(key, KeyExchangeState::WaitForResponse(secret));
  289. },
  290. KeyExchangeState::Given(pubkey) => {
  291. send();
  292. let result = secret.diffie_hellman(&pubkey);
  293. let sk = SymmetricKey {
  294. key: result.as_bytes()[0..16].try_into().unwrap(),
  295. nonce: u128::from_be_bytes(result.as_bytes()[16..32].try_into().unwrap()),
  296. };
  297. log::trace!("Completed key negotiation with peer!");
  298. states.insert(key, KeyExchangeState::Completed(pubkey, sk));
  299. },
  300. KeyExchangeState::WaitForResponse(secret) => {
  301. send();
  302. states.insert(key, KeyExchangeState::WaitForResponse(secret));
  303. },
  304. KeyExchangeState::Completed(_pubkey, _symmetric_key) => {
  305. log::warn!("asked to begin handshake when already have a good encryption key --- did the peer die?");
  306. },
  307. }
  308. }
  309. fn incoming(&self, msg: (fleck_core::msg::Metadata, KeyExchange)) {
  310. let mut states = self.state.borrow_mut();
  311. // cases:
  312. // 1. we already know about this node, and have a Node instance for it
  313. // 2. we don't know about this node yet, and it has a Peer
  314. // 3. we don't know about this node yet, and it has no Peer
  315. let node = if let Some(node) = msg.0.node {
  316. node
  317. } else {
  318. // exciting! let's tell the node service about it, with all the info we have right now:
  319. // the pubkey, and potentially a peer
  320. self.api.with_service(|ns: &fleck_core::NodeService| {
  321. let pk = PublicKey::wrap(msg.1.pubkey);
  322. ns.inform_of(pk.clone(), msg.0.peer);
  323. ns.node_by_pubkey(&pk)
  324. .expect("we just told the service about this node")
  325. })
  326. };
  327. let skey = EncryptionStateKey(node.clone());
  328. let state = states.remove(&skey).unwrap_or(KeyExchangeState::NoState);
  329. log::trace!(
  330. "incoming key exchange message: {:?}, state: {:?}",
  331. msg.1,
  332. &state
  333. );
  334. match state {
  335. KeyExchangeState::NoState => {
  336. states.insert(skey.clone(), KeyExchangeState::Given(msg.1.key));
  337. drop(states);
  338. self.begin_handshake(&node);
  339. },
  340. KeyExchangeState::Given(peer_pubkey) => {
  341. if peer_pubkey != msg.1.key {
  342. log::info!("peer DH key changed!");
  343. states.insert(skey.clone(), KeyExchangeState::Given(msg.1.key));
  344. }
  345. drop(states);
  346. self.begin_handshake(&node);
  347. },
  348. KeyExchangeState::WaitForResponse(secret) => {
  349. // key handshake is finished!
  350. let result = secret.diffie_hellman(&msg.1.key);
  351. let sk = SymmetricKey {
  352. key: result.as_bytes()[0..16].try_into().unwrap(),
  353. nonce: u128::from_be_bytes(result.as_bytes()[16..32].try_into().unwrap()),
  354. };
  355. states.insert(skey.clone(), KeyExchangeState::Completed(msg.1.key, sk));
  356. drop(states);
  357. },
  358. KeyExchangeState::Completed(peer_pubkey, _symmetric_key) => {
  359. if peer_pubkey == msg.1.key {
  360. // it's a repeat, so nothing to do
  361. return;
  362. }
  363. // it's a new pubkey, so we want to restart the handshake
  364. states.insert(skey.clone(), KeyExchangeState::Given(msg.1.key));
  365. drop(states);
  366. self.begin_handshake(&node);
  367. },
  368. }
  369. log::trace!(
  370. "after processing incoming key exchange message, state: {:?}",
  371. self.state.borrow().get(&skey)
  372. );
  373. }
  374. }