lokinet/doc/iwp_v0.txt

226 lines
4.9 KiB
Plaintext
Raw Normal View History

2018-02-15 16:32:11 +00:00
2018-07-09 12:30:01 +00:00
invisible wire protocol version 0:
2018-02-15 16:32:11 +00:00
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
2018-04-30 11:19:31 +00:00
cryptography:
2018-04-30 11:26:01 +00:00
see crypto_v0.txt
2018-04-30 11:19:31 +00:00
2018-02-15 16:32:11 +00:00
wire decryption:
the first 32 bytes are message authentication bytes, h
the next 32 bytes are nouce for cipher, n
2018-02-15 16:32:11 +00:00
the remaining bytes are interpreted as ciphertext, x
a shared secret S is generated in the session start message
next the integrity of the ciphertext is done by checking MDS(n + x, S) == h
if the ciphertext is valid then the frame is decrypted via SD(S, x, n)
2018-02-15 16:32:11 +00:00
wire encryption:
given variadic sized payload p, 32 byte nounce n and public encryption keys A
and B
x = SE(S, p, n[0:24])
h = MDS(n + x, S)
2018-02-15 16:32:11 +00:00
the resulting data is:
h + n + x
handshake:
0) intro
2018-05-20 13:43:42 +00:00
32 bytes hmac, h
2018-02-15 16:32:11 +00:00
32 bytes nounce, n
2018-04-05 15:27:22 +00:00
32 bytes encrypted alice's transport public encryption key e
2018-02-15 16:32:11 +00:00
variadic bytes padding, w0
2018-05-18 16:08:47 +00:00
Alice transmits ( h + n + e + w0 ) to Bob from the transport address matching
2018-02-25 21:08:42 +00:00
his public transport encryption key (b.k).
2018-02-15 16:32:11 +00:00
2018-02-25 21:08:42 +00:00
w0 = "[insert variable length random padding here]"
2018-04-05 15:27:22 +00:00
n = RAND(32)
2018-05-18 16:08:47 +00:00
e = SE(a.k, HS(b.k + n), n[0:24])
S = TKE(a.k, b.k, n)
2018-05-20 13:43:42 +00:00
h = MDS(n + e + w0, S)
2018-02-25 21:08:42 +00:00
2018-05-18 16:08:47 +00:00
Bob recieves ( s + n + e + w0 )
2018-02-15 16:32:11 +00:00
1) intro ack
sent in reply to an intro, bob sends an intro ack encrypted to Alice using
2018-05-20 13:43:42 +00:00
32 bytes hmac, h
2018-02-15 16:32:11 +00:00
32 bytes nounce, n
32 bytes ciphertext, x
variadic bytes padding, w1
2018-02-25 21:08:42 +00:00
w1 = "[insert variable length random padding here]"
2018-02-15 16:32:11 +00:00
token = RAND(32)
2018-05-20 13:43:42 +00:00
S = TKE(a.k, b.k, n)
2018-02-15 16:32:11 +00:00
x = SE(k, token, n[0:24])
2018-05-20 13:43:42 +00:00
h = MDS(n + x + w1, S)
2018-02-15 16:32:11 +00:00
2018-05-18 16:08:47 +00:00
Bob transmits ( s + n + x + w1 ), r is ignored and discarded
Alice recieves ( s + n + x + w1 ) and verifies the signature silently
2018-02-15 16:32:11 +00:00
dropping if it does not match.
2018-05-19 13:36:42 +00:00
2) session start
2018-02-15 16:32:11 +00:00
2018-05-20 15:35:59 +00:00
Alice uses the token from the previous message to start the wire session
2018-02-15 16:32:11 +00:00
32 bytes hmac, h
32 bytes nounce, n
32 bytes ciphertext, x
variadic byttes padding, w2
2018-02-25 21:08:42 +00:00
w2 = "[insert variable length random padding here]"
2018-05-20 15:35:59 +00:00
e_K = TKE(a.k, b.k, n)
x = SE(e_K, token, n[0:24])
h = MDS(n + x + w2, e_K)
T = HS(token + n)
2018-05-19 13:36:42 +00:00
K = TKE(a.k, b.k, T)
2018-02-15 16:32:11 +00:00
Alice transmits ( h + n + x + w2 )
Bob recieves ( h + n + x + w2) and verifies that h == MDS(n + x, k) silently
drops if not matching
2018-05-19 13:36:42 +00:00
the session is now established with session key K,
Bob replies by transmitting a LIM
2018-02-15 16:32:11 +00:00
IWP payload format:
ciphertext:
32 bytes hmac, h
32 bytes nounce, n
N bytes of ciphertext, x
plaintext header, H
8 bits protocol version, v (currently 0)
8 bits message type, t
16 bits payload size, s
8 bits reserved, r (currently 0)
8 bits flags, f
2018-02-15 16:32:11 +00:00
plaintext payload: P
s bytes of data
N bytes remaining data is discarded
2018-02-25 21:08:42 +00:00
Encryption:
2018-02-15 16:32:11 +00:00
D = H + P
x = SE(D, S, n)
h = MDS(n + x, S)
Alice transmits h + n + x
Bob recieves recieve h + n + x
Bob checks hmac by verifying h == MDS(n + x, S)
if the hmac fails the data is silently dropped
2018-02-25 21:08:42 +00:00
Decryption:
verify h == MDS(n + x, S)
D = SD(x, S, n)
2018-07-16 04:55:46 +00:00
H = D[0:6]
P = D[6:6+H.s]
2018-02-25 21:08:42 +00:00
2018-02-15 16:32:11 +00:00
message types:
2018-05-19 17:21:56 +00:00
ALIV = 0x00
keepalive message
2018-02-15 16:32:11 +00:00
XMIT = 0x01
begin link layer message transmission
ACKS = 0x02
acknolege link layer message fragment
FRAG = 0x03
transmit link layer message fragment
flags:
SESSION_INVALIDATED = 1 << 0
this session is now invalidated and a new session is required
HIGH_PACKET_DROP = 1 << 1
high packet drop detected
HIGH_MTU_DETECTED = 1 << 2
the network uses an mtu greater than 1488 bytes
PROTOCOL_UPGRADE = 1 << 3
indicates we want to do protocol upgrade (future use)
XMIT payload:
start transmiting a link layer message
msg_bytes = BE(msg)
32 bytes hash of message computed by HS(msg_bytes)
64 bits unsigned int message id
2018-05-24 14:38:39 +00:00
16 bits unsigned int fragment size bytes, S
16 bits size of last fragment in bytes, L
16 bits reserved for future, currently zero
2018-05-24 14:38:39 +00:00
8 bits unsigned int nonzero number of fragments, n
2018-02-25 21:08:42 +00:00
8 bits reserved flags, f
2018-05-24 14:39:32 +00:00
if f LSB is set then last fragment is included and is l bytes long
2018-02-25 21:08:42 +00:00
2018-05-24 14:39:32 +00:00
f's LSB MUST be set as of protocol version 0.
2018-02-15 16:32:11 +00:00
2018-05-24 14:38:39 +00:00
msg_bytes is S * (n - 1) + L bytes long
2018-02-15 16:32:11 +00:00
FRAG payload:
transmit a link layer message fragment
64 bits message id
2018-05-24 14:38:39 +00:00
8 bits unsigned int fragment number
S bytes of payload fragment data
remaining bytes discarded
2018-02-15 16:32:11 +00:00
ACKS payload:
indicates we which chunks we have recieved
64 bits message id
2018-05-24 14:38:39 +00:00
32 bits bitmask of chunks we have received
2018-02-15 16:32:11 +00:00
remaining bytes discarded
control flow:
To transmit link message over an established session the transmitter sends an
XMIT frame.
In reply to an XMIT frame the recipiant MUST send an ACKS frame with an emtpy
bitmask.
After the transmitter recieves the first ACKS frame it is allowed to start
sending FRAG messages.
When all fragmenets are obtained by the recipiant, the recipiant sends an ACKS
frame with a full bitfield (0xFFFF), to indicate the link message was recieved.
In the event of packet drop the sender decides when to retransmit FRAG frames
with expontential backoff.
In the event of packet loss greater than 50% over 10 second the session is
invalidated and must be renegotiated with a new handshake.