i2pd/libi2pd/NTCP2.h

263 lines
9.1 KiB
C
Raw Normal View History

2018-08-16 20:46:59 +03:00
/*
2020-02-03 01:05:30 +03:00
* Copyright (c) 2013-2020, The PurpleI2P Project
2018-08-16 20:46:59 +03:00
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*
*/
2018-06-05 19:53:13 +03:00
#ifndef NTCP2_H__
#define NTCP2_H__
#include <inttypes.h>
#include <memory>
2018-06-11 21:05:30 +03:00
#include <thread>
2018-07-18 18:16:40 +03:00
#include <list>
2018-07-18 19:58:29 +03:00
#include <map>
2018-08-08 23:23:44 +03:00
#include <array>
2018-07-03 23:26:02 +03:00
#include <openssl/bn.h>
2018-09-11 20:26:29 +03:00
#include <openssl/evp.h>
2018-06-06 22:38:18 +03:00
#include <boost/asio.hpp>
2018-09-08 23:52:42 +03:00
#include "Crypto.h"
2018-08-08 23:23:44 +03:00
#include "util.h"
2018-06-05 19:53:13 +03:00
#include "RouterInfo.h"
#include "TransportSession.h"
namespace i2p
{
namespace transport
{
2018-07-18 18:16:40 +03:00
const size_t NTCP2_UNENCRYPTED_FRAME_MAX_SIZE = 65519;
const int NTCP2_MAX_PADDING_RATIO = 6; // in %
2018-08-03 20:10:32 +03:00
const int NTCP2_CONNECT_TIMEOUT = 5; // 5 seconds
const int NTCP2_ESTABLISH_TIMEOUT = 10; // 10 seconds
const int NTCP2_TERMINATION_TIMEOUT = 120; // 2 minutes
const int NTCP2_TERMINATION_CHECK_TIMEOUT = 30; // 30 seconds
2018-08-15 18:42:56 +03:00
const int NTCP2_CLOCK_SKEW = 60; // in seconds
2018-09-28 16:54:42 +03:00
const int NTCP2_MAX_OUTGOING_QUEUE_SIZE = 500; // how many messages we can queue up
2018-08-15 18:42:56 +03:00
2018-07-17 22:17:05 +03:00
enum NTCP2BlockType
{
eNTCP2BlkDateTime = 0,
eNTCP2BlkOptions, // 1
eNTCP2BlkRouterInfo, // 2
eNTCP2BlkI2NPMessage, // 3
eNTCP2BlkTermination, // 4
eNTCP2BlkPadding = 254
};
2018-08-01 16:43:48 +03:00
enum NTCP2TerminationReason
{
eNTCP2NormalClose = 0,
eNTCP2TerminationReceived, // 1
eNTCP2IdleTimeout, // 2
eNTCP2RouterShutdown, // 3
eNTCP2DataPhaseAEADFailure, // 4
eNTCP2IncompatibleOptions, // 5
eNTCP2IncompatibleSignatureType, // 6
eNTCP2ClockSkew, // 7
eNTCP2PaddingViolation, // 8
2018-08-03 20:10:32 +03:00
eNTCP2AEADFramingError, // 9
2018-08-02 22:31:15 +03:00
eNTCP2PayloadFormatError, // 10
2018-08-01 16:43:48 +03:00
eNTCP2Message1Error, // 11
eNTCP2Message2Error, // 12
eNTCP2Message3Error, // 13
eNTCP2IntraFrameReadTimeout, // 14
eNTCP2RouterInfoSignatureVerificationFail, // 15
eNTCP2IncorrectSParameter, // 16
eNTCP2Banned, // 17
};
2018-11-21 19:23:48 +03:00
// RouterInfo flags
const uint8_t NTCP2_ROUTER_INFO_FLAG_REQUEST_FLOOD = 0x01;
2018-08-01 16:43:48 +03:00
2018-07-03 23:26:02 +03:00
struct NTCP2Establisher
{
2018-07-04 21:15:40 +03:00
NTCP2Establisher ();
~NTCP2Establisher ();
2018-07-03 23:26:02 +03:00
2018-09-08 23:52:42 +03:00
const uint8_t * GetPub () const { return m_EphemeralKeys.GetPublicKey (); };
2018-07-04 21:15:40 +03:00
const uint8_t * GetRemotePub () const { return m_RemoteEphemeralPublicKey; }; // Y for Alice and X for Bob
uint8_t * GetRemotePub () { return m_RemoteEphemeralPublicKey; }; // to set
2020-01-18 22:43:36 +03:00
const uint8_t * GetK () const { return m_CK + 32; };
2018-07-03 23:26:02 +03:00
const uint8_t * GetCK () const { return m_CK; };
const uint8_t * GetH () const { return m_H; };
2018-07-04 21:15:40 +03:00
void KDF1Alice ();
void KDF1Bob ();
void KDF2Alice ();
void KDF2Bob ();
2018-07-09 22:56:23 +03:00
void KDF3Alice (); // for SessionConfirmed part 2
void KDF3Bob ();
2018-07-31 22:41:13 +03:00
2018-11-01 23:06:39 +03:00
void MixKey (const uint8_t * inputKeyMaterial);
void MixHash (const uint8_t * buf, size_t len);
2018-09-09 05:08:08 +03:00
void KeyDerivationFunction1 (const uint8_t * pub, i2p::crypto::X25519Keys& priv, const uint8_t * rs, const uint8_t * epub); // for SessionRequest, (pub, priv) for DH
2018-07-31 22:41:13 +03:00
void KeyDerivationFunction2 (const uint8_t * sessionRequest, size_t sessionRequestLen, const uint8_t * epub); // for SessionCreate
2018-07-04 21:15:40 +03:00
void CreateEphemeralKey ();
void CreateSessionRequestMessage ();
void CreateSessionCreatedMessage ();
void CreateSessionConfirmedMessagePart1 (const uint8_t * nonce);
void CreateSessionConfirmedMessagePart2 (const uint8_t * nonce);
2018-07-03 23:26:02 +03:00
bool ProcessSessionRequestMessage (uint16_t& paddingLen);
bool ProcessSessionCreatedMessage (uint16_t& paddingLen);
bool ProcessSessionConfirmedMessagePart1 (const uint8_t * nonce);
bool ProcessSessionConfirmedMessagePart2 (const uint8_t * nonce, uint8_t * m3p2Buf);
2018-09-08 23:52:42 +03:00
i2p::crypto::X25519Keys m_EphemeralKeys;
uint8_t m_RemoteEphemeralPublicKey[32]; // x25519
2020-01-18 22:43:36 +03:00
uint8_t m_RemoteStaticKey[32], m_IV[16], m_H[32] /*h*/, m_CK[64] /* [ck, k]*/;
i2p::data::IdentHash m_RemoteIdentHash;
2018-07-09 22:56:23 +03:00
uint16_t m3p2Len;
uint8_t * m_SessionRequestBuffer, * m_SessionCreatedBuffer, * m_SessionConfirmedBuffer;
size_t m_SessionRequestBufferLen, m_SessionCreatedBufferLen;
2018-07-03 23:26:02 +03:00
};
2018-06-06 22:38:18 +03:00
class NTCP2Server;
2018-06-05 19:53:13 +03:00
class NTCP2Session: public TransportSession, public std::enable_shared_from_this<NTCP2Session>
{
public:
2018-06-11 21:05:30 +03:00
NTCP2Session (NTCP2Server& server, std::shared_ptr<const i2p::data::RouterInfo> in_RemoteRouter = nullptr);
2018-06-05 19:53:13 +03:00
~NTCP2Session ();
2018-06-11 19:29:30 +03:00
void Terminate ();
2018-08-03 20:10:32 +03:00
void TerminateByTimeout ();
2018-06-11 21:05:30 +03:00
void Done ();
2019-11-20 21:00:50 +03:00
void Close () { m_Socket.close (); }; // for accept
2018-06-05 19:53:13 +03:00
2018-06-06 22:38:18 +03:00
boost::asio::ip::tcp::socket& GetSocket () { return m_Socket; };
2018-07-18 19:58:29 +03:00
bool IsEstablished () const { return m_IsEstablished; };
bool IsTerminated () const { return m_IsTerminated; };
2018-06-06 22:38:18 +03:00
void ClientLogin (); // Alice
void ServerLogin (); // Bob
2018-08-14 18:27:27 +03:00
void SendLocalRouterInfo (); // after handshake
2018-07-18 18:16:40 +03:00
void SendI2NPMessages (const std::vector<std::shared_ptr<I2NPMessage> >& msgs);
2018-06-06 22:38:18 +03:00
2018-06-05 19:53:13 +03:00
private:
2018-07-13 22:59:28 +03:00
void Established ();
2018-06-25 19:28:07 +03:00
void CreateNonce (uint64_t seqn, uint8_t * nonce);
2018-06-21 19:39:24 +03:00
void KeyDerivationFunctionDataPhase ();
2018-09-11 20:26:29 +03:00
void SetSipKeys (const uint8_t * sendSipKey, const uint8_t * receiveSipKey);
// establish
2018-06-06 22:38:18 +03:00
void SendSessionRequest ();
void SendSessionCreated ();
2018-06-14 22:29:36 +03:00
void SendSessionConfirmed ();
2018-06-06 22:38:18 +03:00
void HandleSessionRequestSent (const boost::system::error_code& ecode, std::size_t bytes_transferred);
void HandleSessionRequestReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred);
void HandleSessionRequestPaddingReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred);
void HandleSessionCreatedSent (const boost::system::error_code& ecode, std::size_t bytes_transferred);
2018-06-11 19:29:30 +03:00
void HandleSessionCreatedReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred);
2018-06-14 22:29:36 +03:00
void HandleSessionCreatedPaddingReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred);
void HandleSessionConfirmedSent (const boost::system::error_code& ecode, std::size_t bytes_transferred);
2018-07-09 22:56:23 +03:00
void HandleSessionConfirmedReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred);
2018-06-05 19:53:13 +03:00
// data
void ReceiveLength ();
void HandleReceivedLength (const boost::system::error_code& ecode, std::size_t bytes_transferred);
void Receive ();
void HandleReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred);
void ProcessNextFrame (const uint8_t * frame, size_t len);
2018-12-02 22:24:39 +03:00
void SetNextSentFrameLength (size_t frameLen, uint8_t * lengthBuf);
void SendI2NPMsgs (std::vector<std::shared_ptr<I2NPMessage> >& msgs);
void HandleI2NPMsgsSent (const boost::system::error_code& ecode, std::size_t bytes_transferred, std::vector<std::shared_ptr<I2NPMessage> > msgs);
void EncryptAndSendNextBuffer (size_t payloadLen);
2018-12-04 23:23:43 +03:00
void HandleNextFrameSent (const boost::system::error_code& ecode, std::size_t bytes_transferred);
2018-12-02 22:24:39 +03:00
size_t CreatePaddingBlock (size_t msgLen, uint8_t * buf, size_t len);
2018-07-18 18:16:40 +03:00
void SendQueue ();
2018-08-02 19:42:39 +03:00
void SendRouterInfo ();
2018-08-02 22:31:15 +03:00
void SendTermination (NTCP2TerminationReason reason);
void SendTerminationAndTerminate (NTCP2TerminationReason reason);
2018-07-19 19:46:19 +03:00
void PostI2NPMessages (std::vector<std::shared_ptr<I2NPMessage> > msgs);
2018-06-25 19:28:07 +03:00
2018-06-05 19:53:13 +03:00
private:
2018-06-06 22:38:18 +03:00
NTCP2Server& m_Server;
boost::asio::ip::tcp::socket m_Socket;
2018-06-11 19:29:30 +03:00
bool m_IsEstablished, m_IsTerminated;
2018-07-03 23:26:02 +03:00
std::unique_ptr<NTCP2Establisher> m_Establisher;
2018-06-21 19:39:24 +03:00
// data phase
uint8_t m_Kab[32], m_Kba[32], m_Sipkeysab[32], m_Sipkeysba[32];
2018-09-11 20:26:29 +03:00
const uint8_t * m_SendKey, * m_ReceiveKey;
#if OPENSSL_SIPHASH
EVP_PKEY * m_SendSipKey, * m_ReceiveSipKey;
EVP_MD_CTX * m_SendMDCtx, * m_ReceiveMDCtx;
#else
const uint8_t * m_SendSipKey, * m_ReceiveSipKey;
#endif
uint16_t m_NextReceivedLen;
2018-06-25 19:28:07 +03:00
uint8_t * m_NextReceivedBuffer, * m_NextSendBuffer;
2018-08-13 20:43:51 +03:00
union
{
uint8_t buf[8];
uint16_t key;
} m_ReceiveIV, m_SendIV;
2018-06-25 19:28:07 +03:00
uint64_t m_ReceiveSequenceNumber, m_SendSequenceNumber;
2018-07-17 22:17:05 +03:00
i2p::I2NPMessagesHandler m_Handler;
2018-07-18 18:16:40 +03:00
bool m_IsSending;
std::list<std::shared_ptr<I2NPMessage> > m_SendQueue;
2018-06-06 22:38:18 +03:00
};
class NTCP2Server: private i2p::util::RunnableServiceWithWork
2018-06-06 22:38:18 +03:00
{
public:
2018-06-11 19:29:30 +03:00
NTCP2Server ();
~NTCP2Server ();
void Start ();
void Stop ();
boost::asio::io_service& GetService () { return GetIOService (); };
2018-06-11 19:29:30 +03:00
bool AddNTCP2Session (std::shared_ptr<NTCP2Session> session, bool incoming = false);
2018-07-18 19:58:29 +03:00
void RemoveNTCP2Session (std::shared_ptr<NTCP2Session> session);
std::shared_ptr<NTCP2Session> FindNTCP2Session (const i2p::data::IdentHash& ident);
2018-06-11 19:29:30 +03:00
void Connect(const boost::asio::ip::address & address, uint16_t port, std::shared_ptr<NTCP2Session> conn);
private:
2018-07-23 22:30:51 +03:00
void HandleAccept (std::shared_ptr<NTCP2Session> conn, const boost::system::error_code& error);
void HandleAcceptV6 (std::shared_ptr<NTCP2Session> conn, const boost::system::error_code& error);
2018-08-03 20:10:32 +03:00
void HandleConnect (const boost::system::error_code& ecode, std::shared_ptr<NTCP2Session> conn, std::shared_ptr<boost::asio::deadline_timer> timer);
// timer
void ScheduleTermination ();
void HandleTerminationTimer (const boost::system::error_code& ecode);
2018-06-11 19:29:30 +03:00
2018-06-06 22:38:18 +03:00
private:
2018-08-03 20:10:32 +03:00
boost::asio::deadline_timer m_TerminationTimer;
2018-07-23 22:30:51 +03:00
std::unique_ptr<boost::asio::ip::tcp::acceptor> m_NTCP2Acceptor, m_NTCP2V6Acceptor;
2018-07-18 19:58:29 +03:00
std::map<i2p::data::IdentHash, std::shared_ptr<NTCP2Session> > m_NTCP2Sessions;
2018-07-23 22:30:51 +03:00
std::list<std::shared_ptr<NTCP2Session> > m_PendingIncomingSessions;
2018-07-18 19:58:29 +03:00
public:
// for HTTP/I2PControl
const decltype(m_NTCP2Sessions)& GetNTCP2Sessions () const { return m_NTCP2Sessions; };
2018-06-05 19:53:13 +03:00
};
}
}
#endif