i2pd/libi2pd/LeaseSet.h

288 lines
12 KiB
C
Raw Normal View History

2013-11-25 03:10:27 +04:00
#ifndef LEASE_SET_H__
#define LEASE_SET_H__
#include <inttypes.h>
2013-11-29 16:52:09 +04:00
#include <string.h>
2014-01-02 03:19:03 +04:00
#include <vector>
2016-05-29 23:35:57 +03:00
#include <set>
2016-02-09 18:46:27 +03:00
#include <memory>
2013-12-20 07:05:45 +04:00
#include "Identity.h"
#include "Timestamp.h"
2019-02-06 21:36:03 +03:00
#include "I2PEndian.h"
#include "Blinding.h"
2013-11-25 03:10:27 +04:00
namespace i2p
{
2014-07-29 21:44:54 +04:00
namespace tunnel
{
2018-01-06 06:48:51 +03:00
class InboundTunnel;
2014-07-29 21:44:54 +04:00
}
2013-11-25 03:10:27 +04:00
namespace data
2018-01-06 06:48:51 +03:00
{
2016-02-29 05:43:18 +03:00
const int LEASE_ENDDATE_THRESHOLD = 51000; // in milliseconds
2013-11-25 03:10:27 +04:00
struct Lease
{
2015-03-23 19:55:42 +03:00
IdentHash tunnelGateway;
2013-11-25 03:10:27 +04:00
uint32_t tunnelID;
2016-02-09 23:27:23 +03:00
uint64_t endDate; // 0 means invalid
2019-04-10 19:04:19 +03:00
bool isUpdated; // transient
/* return true if this lease expires within t millisecond + fudge factor */
bool ExpiresWithin( const uint64_t t, const uint64_t fudge = 1000 ) const {
auto expire = i2p::util::GetMillisecondsSinceEpoch ();
if(fudge) expire += rand() % fudge;
2017-04-09 15:52:42 +03:00
if (endDate < expire) return true;
return (endDate - expire) < t;
}
2018-01-06 06:48:51 +03:00
};
2016-02-09 23:27:23 +03:00
struct LeaseCmp
{
bool operator() (std::shared_ptr<const Lease> l1, std::shared_ptr<const Lease> l2) const
2018-01-06 07:01:44 +03:00
{
2016-02-09 23:27:23 +03:00
if (l1->tunnelID != l2->tunnelID)
2018-01-06 06:48:51 +03:00
return l1->tunnelID < l2->tunnelID;
2016-02-09 23:27:23 +03:00
else
2018-01-06 06:48:51 +03:00
return l1->tunnelGateway < l2->tunnelGateway;
2016-02-09 23:27:23 +03:00
};
2018-01-06 06:48:51 +03:00
};
2013-11-25 03:10:27 +04:00
typedef std::function<bool(const Lease & l)> LeaseInspectFunc;
2018-01-06 06:48:51 +03:00
2016-05-25 21:17:34 +03:00
const size_t MAX_LS_BUFFER_SIZE = 3072;
const size_t LEASE_SIZE = 44; // 32 + 4 + 8
2019-01-10 19:52:34 +03:00
const size_t LEASE2_SIZE = 40; // 32 + 4 + 4
2018-01-06 06:48:51 +03:00
const uint8_t MAX_NUM_LEASES = 16;
2019-01-02 22:19:10 +03:00
const uint8_t NETDB_STORE_TYPE_LEASESET = 1;
2013-11-25 03:10:27 +04:00
class LeaseSet: public RoutingDestination
{
public:
2016-02-08 03:45:06 +03:00
LeaseSet (const uint8_t * buf, size_t len, bool storeLeases = true);
2019-01-14 21:49:27 +03:00
virtual ~LeaseSet () { delete[] m_EncryptionKey; delete[] m_Buffer; };
virtual void Update (const uint8_t * buf, size_t len, bool verifySignature = true);
2016-02-17 06:57:38 +03:00
bool IsNewer (const uint8_t * buf, size_t len) const;
2018-01-06 06:48:51 +03:00
void PopulateLeases (); // from buffer
2014-10-03 23:08:41 +04:00
2014-07-29 22:31:55 +04:00
const uint8_t * GetBuffer () const { return m_Buffer; };
2018-01-06 06:48:51 +03:00
size_t GetBufferLen () const { return m_BufferLen; };
2015-04-08 17:34:16 +03:00
bool IsValid () const { return m_IsValid; };
2016-02-11 06:51:08 +03:00
const std::vector<std::shared_ptr<const Lease> > GetNonExpiredLeases (bool withThreshold = true) const;
const std::vector<std::shared_ptr<const Lease> > GetNonExpiredLeasesExcluding (LeaseInspectFunc exclude, bool withThreshold = true) const;
2014-01-15 05:57:33 +04:00
bool HasExpiredLeases () const;
2016-02-08 03:45:06 +03:00
bool IsExpired () const;
2016-02-10 06:42:01 +03:00
bool IsEmpty () const { return m_Leases.empty (); };
2016-02-08 03:45:06 +03:00
uint64_t GetExpirationTime () const { return m_ExpirationTime; };
bool ExpiresSoon(const uint64_t dlt=1000 * 5, const uint64_t fudge = 0) const ;
2018-01-06 06:48:51 +03:00
bool operator== (const LeaseSet& other) const
{ return m_BufferLen == other.m_BufferLen && !memcmp (m_Buffer, other.m_Buffer, m_BufferLen); };
2019-01-02 22:19:10 +03:00
virtual uint8_t GetStoreType () const { return NETDB_STORE_TYPE_LEASESET; };
virtual uint32_t GetPublishedTimestamp () const { return 0; }; // should be set for LeaseSet2 only
2019-02-06 21:36:03 +03:00
virtual std::shared_ptr<const i2p::crypto::Verifier> GetTransientVerifier () const { return nullptr; };
2019-08-07 22:43:03 +03:00
virtual bool IsPublishedEncrypted () const { return false; };
2019-02-06 21:36:03 +03:00
2016-02-09 18:46:27 +03:00
// implements RoutingDestination
2017-11-02 21:50:57 +03:00
std::shared_ptr<const IdentityEx> GetIdentity () const { return m_Identity; };
void Encrypt (const uint8_t * data, uint8_t * encrypted, BN_CTX * ctx) const;
bool IsDestination () const { return true; };
2014-07-22 04:14:11 +04:00
2018-12-21 23:00:03 +03:00
protected:
2019-01-09 20:47:47 +03:00
void UpdateLeasesBegin ();
void UpdateLeasesEnd ();
2019-01-02 23:40:48 +03:00
void UpdateLease (const Lease& lease, uint64_t ts);
2018-12-21 23:00:03 +03:00
// called from LeaseSet2
2019-01-09 20:47:47 +03:00
LeaseSet (bool storeLeases);
2018-12-21 23:00:03 +03:00
void SetBuffer (const uint8_t * buf, size_t len);
void SetIdentity (std::shared_ptr<const IdentityEx> identity) { m_Identity = identity; };
void SetExpirationTime (uint64_t t) { m_ExpirationTime = t; };
void SetIsValid (bool isValid) { m_IsValid = isValid; };
2019-01-09 20:47:47 +03:00
bool IsStoreLeases () const { return m_StoreLeases; };
2018-12-21 23:00:03 +03:00
2014-07-22 04:14:11 +04:00
private:
2018-01-25 18:09:34 +03:00
void ReadFromBuffer (bool readIdentity = true, bool verifySignature = true);
2019-01-14 21:49:27 +03:00
virtual uint64_t ExtractTimestamp (const uint8_t * buf, size_t len) const; // returns max expiration time
2018-01-06 06:48:51 +03:00
2013-11-25 03:10:27 +04:00
private:
2016-02-08 03:45:06 +03:00
bool m_IsValid, m_StoreLeases; // we don't need to store leases for floodfill
2016-02-09 23:27:23 +03:00
std::set<std::shared_ptr<Lease>, LeaseCmp> m_Leases;
2016-02-08 03:45:06 +03:00
uint64_t m_ExpirationTime; // in milliseconds
2015-11-03 17:15:49 +03:00
std::shared_ptr<const IdentityEx> m_Identity;
2019-01-14 21:49:27 +03:00
uint8_t * m_EncryptionKey;
2015-04-08 16:39:02 +03:00
uint8_t * m_Buffer;
2014-07-29 21:44:54 +04:00
size_t m_BufferLen;
2018-01-06 06:48:51 +03:00
};
2016-05-25 21:17:34 +03:00
/**
validate lease set buffer signature and extract expiration timestamp
@returns true if the leaseset is well formed and signature is valid
*/
bool LeaseSetBufferValidate(const uint8_t * ptr, size_t sz, uint64_t & expires);
2019-01-02 22:19:10 +03:00
const uint8_t NETDB_STORE_TYPE_STANDARD_LEASESET2 = 3;
2019-01-08 19:26:50 +03:00
const uint8_t NETDB_STORE_TYPE_ENCRYPTED_LEASESET2 = 5;
2019-01-02 22:19:10 +03:00
const uint8_t NETDB_STORE_TYPE_META_LEASESET2 = 7;
2019-02-12 22:56:39 +03:00
const uint16_t LEASESET2_FLAG_OFFLINE_KEYS = 0x0001;
const uint16_t LEASESET2_FLAG_UNPUBLISHED_LEASESET = 0x0002;
2019-08-07 22:43:03 +03:00
const uint16_t LEASESET2_FLAG_PUBLISHED_ENCRYPTED = 0x0004;
2018-12-21 23:00:03 +03:00
class LeaseSet2: public LeaseSet
{
public:
2020-02-12 19:09:20 +03:00
LeaseSet2 (uint8_t storeType, const uint8_t * buf, size_t len, bool storeLeases = true, CryptoKeyType preferredCrypto = CRYPTO_KEY_TYPE_ELGAMAL);
LeaseSet2 (const uint8_t * buf, size_t len, std::shared_ptr<const BlindedPublicKey> key, const uint8_t * secret = nullptr, CryptoKeyType preferredCrypto = CRYPTO_KEY_TYPE_ELGAMAL); // store type 5, called from local netdb only
uint8_t GetStoreType () const { return m_StoreType; };
uint32_t GetPublishedTimestamp () const { return m_PublishedTimestamp; };
bool IsPublic () const { return m_IsPublic; };
2019-08-07 22:43:03 +03:00
bool IsPublishedEncrypted () const { return m_IsPublishedEncrypted; };
2019-02-06 21:36:03 +03:00
std::shared_ptr<const i2p::crypto::Verifier> GetTransientVerifier () const { return m_TransientVerifier; };
void Update (const uint8_t * buf, size_t len, bool verifySignature);
2019-02-06 21:36:03 +03:00
2019-01-09 20:47:47 +03:00
// implements RoutingDestination
void Encrypt (const uint8_t * data, uint8_t * encrypted, BN_CTX * ctx) const;
CryptoKeyType GetEncryptionType () const { return m_EncryptionType; };
2019-01-09 20:47:47 +03:00
private:
2019-02-01 20:55:13 +03:00
void ReadFromBuffer (const uint8_t * buf, size_t len, bool readIdentity = true, bool verifySignature = true);
2019-06-06 19:33:33 +03:00
void ReadFromBufferEncrypted (const uint8_t * buf, size_t len, std::shared_ptr<const BlindedPublicKey> key, const uint8_t * secret);
2019-01-02 22:19:10 +03:00
size_t ReadStandardLS2TypeSpecificPart (const uint8_t * buf, size_t len);
size_t ReadMetaLS2TypeSpecificPart (const uint8_t * buf, size_t len);
2018-12-21 23:00:03 +03:00
2019-01-08 19:26:50 +03:00
template<typename Verifier>
bool VerifySignature (Verifier& verifier, const uint8_t * buf, size_t len, size_t signatureOffset);
2019-01-14 21:49:27 +03:00
uint64_t ExtractTimestamp (const uint8_t * buf, size_t len) const;
2019-06-05 22:57:20 +03:00
size_t ExtractClientAuthData (const uint8_t * buf, size_t len, const uint8_t * secret, const uint8_t * subcredential, uint8_t * authCookie) const; // subcredential is subcredential + timestamp, return length of autData without flag
2019-01-14 21:49:27 +03:00
2018-12-21 23:00:03 +03:00
private:
uint8_t m_StoreType;
2019-02-27 23:52:47 +03:00
uint32_t m_PublishedTimestamp = 0;
2019-08-07 22:43:03 +03:00
bool m_IsPublic = true, m_IsPublishedEncrypted = false;
2019-02-06 21:36:03 +03:00
std::shared_ptr<i2p::crypto::Verifier> m_TransientVerifier;
2020-02-12 19:09:20 +03:00
CryptoKeyType m_EncryptionType;
2019-01-09 20:47:47 +03:00
std::shared_ptr<i2p::crypto::CryptoKeyEncryptor> m_Encryptor; // for standardLS2
2018-12-21 23:00:03 +03:00
};
2019-02-06 21:36:03 +03:00
// also called from Streaming.cpp
template<typename Verifier>
std::shared_ptr<i2p::crypto::Verifier> ProcessOfflineSignature (const Verifier& verifier, const uint8_t * buf, size_t len, size_t& offset)
{
if (offset + 6 >= len) return nullptr;
const uint8_t * signedData = buf + offset;
uint32_t expiresTimestamp = bufbe32toh (buf + offset); offset += 4; // expires timestamp
if (expiresTimestamp < i2p::util::GetSecondsSinceEpoch ()) return nullptr;
uint16_t keyType = bufbe16toh (buf + offset); offset += 2;
std::shared_ptr<i2p::crypto::Verifier> transientVerifier (i2p::data::IdentityEx::CreateVerifier (keyType));
if (!transientVerifier) return nullptr;
auto keyLen = transientVerifier->GetPublicKeyLen ();
if (offset + keyLen >= len) return nullptr;
transientVerifier->SetPublicKey (buf + offset); offset += keyLen;
if (offset + verifier->GetSignatureLen () >= len) return nullptr;
if (!verifier->Verify (signedData, keyLen + 6, buf + offset)) return nullptr;
offset += verifier->GetSignatureLen ();
return transientVerifier;
}
//------------------------------------------------------------------------------------
2016-05-25 21:17:34 +03:00
class LocalLeaseSet
{
public:
LocalLeaseSet (std::shared_ptr<const IdentityEx> identity, const uint8_t * encryptionPublicKey, std::vector<std::shared_ptr<i2p::tunnel::InboundTunnel> > tunnels);
2016-05-30 19:56:42 +03:00
LocalLeaseSet (std::shared_ptr<const IdentityEx> identity, const uint8_t * buf, size_t len);
2019-01-10 19:52:34 +03:00
virtual ~LocalLeaseSet () { delete[] m_Buffer; };
2016-05-25 21:17:34 +03:00
2019-01-10 19:52:34 +03:00
virtual uint8_t * GetBuffer () const { return m_Buffer; };
uint8_t * GetSignature () { return GetBuffer () + GetBufferLen () - GetSignatureLen (); };
virtual size_t GetBufferLen () const { return m_BufferLen; };
2016-05-25 21:17:34 +03:00
size_t GetSignatureLen () const { return m_Identity->GetSignatureLen (); };
2018-01-06 06:48:51 +03:00
uint8_t * GetLeases () { return m_Leases; };
2016-05-25 21:17:34 +03:00
const IdentHash& GetIdentHash () const { return m_Identity->GetIdentHash (); };
2019-04-09 16:21:38 +03:00
std::shared_ptr<const IdentityEx> GetIdentity () const { return m_Identity; };
2016-05-25 22:10:28 +03:00
bool IsExpired () const;
2016-05-30 19:56:42 +03:00
uint64_t GetExpirationTime () const { return m_ExpirationTime; };
void SetExpirationTime (uint64_t expirationTime) { m_ExpirationTime = expirationTime; };
2018-01-06 06:48:51 +03:00
bool operator== (const LeaseSet& other) const
2019-01-10 19:52:34 +03:00
{ return GetBufferLen () == other.GetBufferLen () && !memcmp (GetBuffer (), other.GetBuffer (), GetBufferLen ()); };
2016-05-25 22:10:28 +03:00
2019-01-09 22:51:47 +03:00
virtual uint8_t GetStoreType () const { return NETDB_STORE_TYPE_LEASESET; };
2019-04-09 22:36:10 +03:00
virtual const IdentHash& GetStoreHash () const { return GetIdentHash (); }; // differ from ident hash for encrypted LeaseSet2
2019-04-10 19:04:19 +03:00
virtual std::shared_ptr<const LocalLeaseSet> GetInnerLeaseSet () const { return nullptr; }; // non-null for encrypted LeaseSet2
2019-01-09 22:51:47 +03:00
2016-05-25 21:17:34 +03:00
private:
2018-01-06 06:48:51 +03:00
2016-05-25 22:10:28 +03:00
uint64_t m_ExpirationTime; // in milliseconds
2016-05-25 21:17:34 +03:00
std::shared_ptr<const IdentityEx> m_Identity;
2016-05-29 23:35:57 +03:00
uint8_t * m_Buffer, * m_Leases;
2016-05-25 21:17:34 +03:00
size_t m_BufferLen;
2018-01-06 06:48:51 +03:00
};
2019-01-09 22:51:47 +03:00
class LocalLeaseSet2: public LocalLeaseSet
{
public:
2019-02-12 22:56:39 +03:00
LocalLeaseSet2 (uint8_t storeType, const i2p::data::PrivateKeys& keys,
2019-01-09 22:51:47 +03:00
uint16_t keyType, uint16_t keyLen, const uint8_t * encryptionPublicKey,
2019-08-07 22:43:03 +03:00
std::vector<std::shared_ptr<i2p::tunnel::InboundTunnel> > tunnels,
bool isPublic, bool isPublishedEncrypted = false);
LocalLeaseSet2 (uint8_t storeType, std::shared_ptr<const IdentityEx> identity, const uint8_t * buf, size_t len); // from I2CP
2019-04-05 23:03:58 +03:00
2019-01-10 19:52:34 +03:00
virtual ~LocalLeaseSet2 () { delete[] m_Buffer; };
uint8_t * GetBuffer () const { return m_Buffer + 1; };
size_t GetBufferLen () const { return m_BufferLen; };
2019-01-09 22:51:47 +03:00
2019-01-10 19:52:34 +03:00
uint8_t GetStoreType () const { return m_Buffer[0]; };
2019-01-09 22:51:47 +03:00
2019-04-10 19:04:19 +03:00
protected:
LocalLeaseSet2 (std::shared_ptr<const IdentityEx> identity): LocalLeaseSet (identity, nullptr, 0), m_Buffer (nullptr), m_BufferLen(0) {}; // called from LocalEncryptedLeaseSet2
protected:
2019-01-09 22:51:47 +03:00
2019-01-10 19:52:34 +03:00
uint8_t * m_Buffer; // 1 byte store type + actual buffer
size_t m_BufferLen;
2019-04-10 19:04:19 +03:00
};
2019-07-16 23:31:17 +03:00
const int ENCRYPTED_LEASESET_AUTH_TYPE_NONE = 0;
const int ENCRYPTED_LEASESET_AUTH_TYPE_DH = 1;
const int ENCRYPTED_LEASESET_AUTH_TYPE_PSK = 2;
2019-04-10 19:04:19 +03:00
2019-07-16 23:31:17 +03:00
typedef i2p::data::Tag<32> AuthPublicKey;
2019-07-16 23:31:17 +03:00
class LocalEncryptedLeaseSet2: public LocalLeaseSet2
{
public:
2019-07-16 23:31:17 +03:00
LocalEncryptedLeaseSet2 (std::shared_ptr<const LocalLeaseSet2> ls, const i2p::data::PrivateKeys& keys, int authType = ENCRYPTED_LEASESET_AUTH_TYPE_NONE, std::shared_ptr<std::vector<AuthPublicKey> > authKeys = nullptr);
2019-04-10 19:04:19 +03:00
LocalEncryptedLeaseSet2 (std::shared_ptr<const IdentityEx> identity, const uint8_t * buf, size_t len); // from I2CP
2019-04-10 19:04:19 +03:00
const IdentHash& GetStoreHash () const { return m_StoreHash; };
std::shared_ptr<const LocalLeaseSet> GetInnerLeaseSet () const { return m_InnerLeaseSet; };
private:
2019-08-26 03:51:15 +03:00
void CreateClientAuthData (const uint8_t * subcredential, int authType, std::shared_ptr<std::vector<AuthPublicKey> > authKeys, const uint8_t * authCookie, uint8_t * authData) const;
2019-04-10 19:04:19 +03:00
private:
IdentHash m_StoreHash;
std::shared_ptr<const LocalLeaseSet2> m_InnerLeaseSet;
2019-01-09 22:51:47 +03:00
};
2018-01-06 06:48:51 +03:00
}
}
2013-11-25 03:10:27 +04:00
#endif