mirror of
https://github.com/PurpleI2P/i2pd
synced 2024-11-10 08:00:38 +03:00
handle offline signature
This commit is contained in:
parent
841452cb9e
commit
6d9e5147b5
@ -217,60 +217,16 @@ namespace stream
|
|||||||
|
|
||||||
void Stream::ProcessPacket (Packet * packet)
|
void Stream::ProcessPacket (Packet * packet)
|
||||||
{
|
{
|
||||||
// process flags
|
|
||||||
uint32_t receivedSeqn = packet->GetSeqn ();
|
uint32_t receivedSeqn = packet->GetSeqn ();
|
||||||
uint16_t flags = packet->GetFlags ();
|
uint16_t flags = packet->GetFlags ();
|
||||||
LogPrint (eLogDebug, "Streaming: Process seqn=", receivedSeqn, ", flags=", flags);
|
LogPrint (eLogDebug, "Streaming: Process seqn=", receivedSeqn, ", flags=", flags);
|
||||||
|
|
||||||
const uint8_t * optionData = packet->GetOptionData ();
|
if (!ProcessOptions (flags, packet))
|
||||||
|
|
||||||
if (flags & PACKET_FLAG_DELAY_REQUESTED)
|
|
||||||
optionData += 2;
|
|
||||||
|
|
||||||
if (flags & PACKET_FLAG_FROM_INCLUDED)
|
|
||||||
{
|
{
|
||||||
m_RemoteIdentity = std::make_shared<i2p::data::IdentityEx>(optionData, packet->GetOptionSize ());
|
|
||||||
if (m_RemoteIdentity->IsRSA ())
|
|
||||||
{
|
|
||||||
LogPrint (eLogInfo, "Streaming: Incoming stream from RSA destination ", m_RemoteIdentity->GetIdentHash ().ToBase64 (), " Discarded");
|
|
||||||
m_LocalDestination.DeletePacket (packet);
|
m_LocalDestination.DeletePacket (packet);
|
||||||
Terminate ();
|
Terminate ();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
optionData += m_RemoteIdentity->GetFullLen ();
|
|
||||||
if (!m_RemoteLeaseSet)
|
|
||||||
LogPrint (eLogDebug, "Streaming: Incoming stream from ", m_RemoteIdentity->GetIdentHash ().ToBase64 (), ", sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (flags & PACKET_FLAG_MAX_PACKET_SIZE_INCLUDED)
|
|
||||||
{
|
|
||||||
uint16_t maxPacketSize = bufbe16toh (optionData);
|
|
||||||
LogPrint (eLogDebug, "Streaming: Max packet size ", maxPacketSize);
|
|
||||||
optionData += 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (flags & PACKET_FLAG_SIGNATURE_INCLUDED)
|
|
||||||
{
|
|
||||||
uint8_t signature[256];
|
|
||||||
auto signatureLen = m_RemoteIdentity->GetSignatureLen ();
|
|
||||||
if(signatureLen <= sizeof(signature))
|
|
||||||
{
|
|
||||||
memcpy (signature, optionData, signatureLen);
|
|
||||||
memset (const_cast<uint8_t *>(optionData), 0, signatureLen);
|
|
||||||
if (!m_RemoteIdentity->Verify (packet->GetBuffer (), packet->GetLength (), signature))
|
|
||||||
{
|
|
||||||
LogPrint (eLogError, "Streaming: Signature verification failed, sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID);
|
|
||||||
Close ();
|
|
||||||
flags |= PACKET_FLAG_CLOSE;
|
|
||||||
}
|
|
||||||
memcpy (const_cast<uint8_t *>(optionData), signature, signatureLen);
|
|
||||||
optionData += signatureLen;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
LogPrint(eLogError, "Streaming: Signature too big, ", signatureLen, " bytes");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
packet->offset = packet->GetPayload () - packet->buf;
|
packet->offset = packet->GetPayload () - packet->buf;
|
||||||
if (packet->GetLength () > 0)
|
if (packet->GetLength () > 0)
|
||||||
@ -298,6 +254,98 @@ namespace stream
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool Stream::ProcessOptions (uint16_t flags, Packet * packet)
|
||||||
|
{
|
||||||
|
const uint8_t * optionData = packet->GetOptionData ();
|
||||||
|
size_t optionSize = packet->GetOptionSize ();
|
||||||
|
if (flags & PACKET_FLAG_DELAY_REQUESTED)
|
||||||
|
optionData += 2;
|
||||||
|
|
||||||
|
if (flags & PACKET_FLAG_FROM_INCLUDED)
|
||||||
|
{
|
||||||
|
m_RemoteIdentity = std::make_shared<i2p::data::IdentityEx>(optionData, optionSize);
|
||||||
|
if (m_RemoteIdentity->IsRSA ())
|
||||||
|
{
|
||||||
|
LogPrint (eLogInfo, "Streaming: Incoming stream from RSA destination ", m_RemoteIdentity->GetIdentHash ().ToBase64 (), " Discarded");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
optionData += m_RemoteIdentity->GetFullLen ();
|
||||||
|
if (!m_RemoteLeaseSet)
|
||||||
|
LogPrint (eLogDebug, "Streaming: Incoming stream from ", m_RemoteIdentity->GetIdentHash ().ToBase64 (), ", sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (flags & PACKET_FLAG_MAX_PACKET_SIZE_INCLUDED)
|
||||||
|
{
|
||||||
|
uint16_t maxPacketSize = bufbe16toh (optionData);
|
||||||
|
LogPrint (eLogDebug, "Streaming: Max packet size ", maxPacketSize);
|
||||||
|
optionData += 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (flags & PACKET_FLAG_OFFLINE_SIGNATURE)
|
||||||
|
{
|
||||||
|
if (!m_RemoteIdentity)
|
||||||
|
{
|
||||||
|
LogPrint (eLogInfo, "Streaming: offline signature without identity");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
const uint8_t * signedData = optionData;
|
||||||
|
uint32_t expiresTimestamp = bufbe32toh (optionData); optionData += 4; // expires timestamp
|
||||||
|
if (expiresTimestamp < i2p::util::GetSecondsSinceEpoch ())
|
||||||
|
{
|
||||||
|
LogPrint (eLogInfo, "Streaming: offline signature transient key expired");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
uint16_t keyType = bufbe16toh (optionData); optionData += 2; // key type
|
||||||
|
m_TransientVerifier.reset (i2p::data::IdentityEx::CreateVerifier (keyType));
|
||||||
|
if (!m_TransientVerifier)
|
||||||
|
{
|
||||||
|
LogPrint (eLogInfo, "Streaming: Unknown transient key type ", (int)keyType);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
auto keyLen = m_TransientVerifier->GetPublicKeyLen ();
|
||||||
|
if ((optionData - packet->GetOptionData ()) + keyLen + m_RemoteIdentity->GetSignatureLen () > optionSize)
|
||||||
|
{
|
||||||
|
LogPrint (eLogInfo, "Streaming: Option data is too short ", (int)optionSize);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
m_TransientVerifier->SetPublicKey (optionData); optionData += keyLen; // key
|
||||||
|
if (!m_RemoteIdentity->Verify (signedData, keyLen + 6, optionData))
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "Streaming: Transient key signature verification failed");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
optionData += m_RemoteIdentity->GetSignatureLen (); // signature
|
||||||
|
}
|
||||||
|
|
||||||
|
if (flags & PACKET_FLAG_SIGNATURE_INCLUDED)
|
||||||
|
{
|
||||||
|
uint8_t signature[256];
|
||||||
|
auto signatureLen = m_RemoteIdentity->GetSignatureLen ();
|
||||||
|
if(signatureLen <= sizeof(signature))
|
||||||
|
{
|
||||||
|
memcpy (signature, optionData, signatureLen);
|
||||||
|
memset (const_cast<uint8_t *>(optionData), 0, signatureLen);
|
||||||
|
bool verified = m_TransientVerifier ?
|
||||||
|
m_TransientVerifier->Verify (packet->GetBuffer (), packet->GetLength (), signature) :
|
||||||
|
m_RemoteIdentity->Verify (packet->GetBuffer (), packet->GetLength (), signature);
|
||||||
|
if (!verified)
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "Streaming: Signature verification failed, sSID=", m_SendStreamID, ", rSID=", m_RecvStreamID);
|
||||||
|
Close ();
|
||||||
|
flags |= PACKET_FLAG_CLOSE;
|
||||||
|
}
|
||||||
|
memcpy (const_cast<uint8_t *>(optionData), signature, signatureLen);
|
||||||
|
optionData += signatureLen;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "Streaming: Signature too big, ", signatureLen, " bytes");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
void Stream::ProcessAck (Packet * packet)
|
void Stream::ProcessAck (Packet * packet)
|
||||||
{
|
{
|
||||||
bool acknowledged = false;
|
bool acknowledged = false;
|
||||||
|
@ -38,6 +38,7 @@ namespace stream
|
|||||||
const uint16_t PACKET_FLAG_PROFILE_INTERACTIVE = 0x0100;
|
const uint16_t PACKET_FLAG_PROFILE_INTERACTIVE = 0x0100;
|
||||||
const uint16_t PACKET_FLAG_ECHO = 0x0200;
|
const uint16_t PACKET_FLAG_ECHO = 0x0200;
|
||||||
const uint16_t PACKET_FLAG_NO_ACK = 0x0400;
|
const uint16_t PACKET_FLAG_NO_ACK = 0x0400;
|
||||||
|
const uint16_t PACKET_FLAG_OFFLINE_SIGNATURE = 0x0800;
|
||||||
|
|
||||||
const size_t STREAMING_MTU = 1730;
|
const size_t STREAMING_MTU = 1730;
|
||||||
const size_t MAX_PACKET_SIZE = 4096;
|
const size_t MAX_PACKET_SIZE = 4096;
|
||||||
@ -195,6 +196,7 @@ namespace stream
|
|||||||
|
|
||||||
void SavePacket (Packet * packet);
|
void SavePacket (Packet * packet);
|
||||||
void ProcessPacket (Packet * packet);
|
void ProcessPacket (Packet * packet);
|
||||||
|
bool ProcessOptions (uint16_t flags, Packet * packet);
|
||||||
void ProcessAck (Packet * packet);
|
void ProcessAck (Packet * packet);
|
||||||
size_t ConcatenatePackets (uint8_t * buf, size_t len);
|
size_t ConcatenatePackets (uint8_t * buf, size_t len);
|
||||||
|
|
||||||
@ -216,6 +218,7 @@ namespace stream
|
|||||||
bool m_IsAckSendScheduled;
|
bool m_IsAckSendScheduled;
|
||||||
StreamingDestination& m_LocalDestination;
|
StreamingDestination& m_LocalDestination;
|
||||||
std::shared_ptr<const i2p::data::IdentityEx> m_RemoteIdentity;
|
std::shared_ptr<const i2p::data::IdentityEx> m_RemoteIdentity;
|
||||||
|
std::unique_ptr<i2p::crypto::Verifier> m_TransientVerifier; // in case of offline key
|
||||||
std::shared_ptr<const i2p::data::LeaseSet> m_RemoteLeaseSet;
|
std::shared_ptr<const i2p::data::LeaseSet> m_RemoteLeaseSet;
|
||||||
std::shared_ptr<i2p::garlic::GarlicRoutingSession> m_RoutingSession;
|
std::shared_ptr<i2p::garlic::GarlicRoutingSession> m_RoutingSession;
|
||||||
std::shared_ptr<const i2p::data::Lease> m_CurrentRemoteLease;
|
std::shared_ptr<const i2p::data::Lease> m_CurrentRemoteLease;
|
||||||
|
Loading…
Reference in New Issue
Block a user