lokinet/doc/proto_v0.txt

842 lines
19 KiB
Plaintext
Raw Normal View History

2017-10-27 17:22:10 +00:00
LLARP v0
2017-10-27 17:22:10 +00:00
LLARP (Low Latency Anon Routing Protocol) is a protocol for anonymizing senders and
recipiants of encrypted messages sent over the internet without a centralied
trusted party.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
basic structures:
all structures are key, value dictionaries encoded with bittorrent encoding
2017-10-27 17:22:10 +00:00
notation:
2017-10-27 17:22:10 +00:00
a + b is a concatanated with b
a ^ b is a bitwise XOR b
x[a:b] is a memory slice of x from index a to b
BE(x) is bittorrent encode x
BD(x) is bittorrent decode x
{ a: b, y: z } is a dictionary with two keys a and y
who's values are b and z respectively
[ a, b, c ... ] is a list containing a b c and more items in that order
"<description>" is a bytestring who's contents and length is described by the
quoted value <description>
"<value>" * N is a bytestring containing the <value> concatenated N times.
2017-10-27 17:22:10 +00:00
cryptography:
2018-04-30 11:26:01 +00:00
see crypto_v0.txt
2017-10-27 17:22:10 +00:00
---
2018-02-16 12:25:35 +00:00
wire protocol
see iwp-v0.txt
---
datastructures:
all datastructures are assumed version 0 if they lack a v value
otherwise version is provided by the v value
2018-01-30 13:38:29 +00:00
all ip addresses can be ipv4 via hybrid dual stack ipv4 mapped ipv6 addresses,
i.e ::ffff.8.8.8.8. The underlying implementation MAY implement ipv4 as native
ipv4 instead of using a hybrid dual stack.
2018-02-15 16:32:11 +00:00
net address:
net addresses are a variable length byte string, if between 7 and 15 bytes it's
treated as a dot notation ipv4 address (xxx.xxx.xxx.xxx)
if it's exactly 16 bytes it's treated as a big endian encoding ipv6 address.
address info (AI)
2018-02-15 16:32:11 +00:00
An address info (AI) defines a publically reachable endpoint
2017-10-27 17:22:10 +00:00
{
c: transport_rank_uint16,
d: "<transport dialect name>",
2018-02-16 12:30:41 +00:00
e: "<32 bytes public encryption key>",
2018-02-15 16:32:11 +00:00
i: "<net address>",
p: port_uint16,
v: 0
}
2018-02-16 12:25:35 +00:00
example iwp address info:
2018-02-15 16:32:11 +00:00
{
c: 1,
2018-02-16 12:25:35 +00:00
d: "iwp",
2018-02-16 12:30:41 +00:00
e: "<32 bytes of 0x61>",
2018-02-15 16:32:11 +00:00
i: "123.123.123.123",
p: 1234,
v: 0
}
2018-02-16 12:30:41 +00:00
bencoded form:
2018-02-22 16:48:31 +00:00
d1:ci1e1:d3:iwp1:e32:aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa1:d3:iwp1:i15:123.123.123.1231:pi1234e1:vi0ee
2018-02-15 16:32:11 +00:00
2017-09-28 17:02:05 +00:00
Exit Info (XI)
2018-01-30 13:38:29 +00:00
An exit info (XI) defines a exit address that can relay exit traffic to the
internet.
2017-09-28 17:02:05 +00:00
{
2018-04-04 16:10:27 +00:00
a: "<net address exit address>",
b: "<net address exit netmask>",
2018-01-29 20:02:23 +00:00
k: "<32 bytes public encryption/signing key>",
v: 0
2017-09-28 17:02:05 +00:00
}
2018-01-30 13:38:29 +00:00
Exit Route (XR)
An exit route (XR) define an allocated exit address and any additional
information required to access the internet via that exit address.
{
a: "<16 bytes big endian ipv6 gateway address>",
b: "<16 bytes big endian ipv6 netmask>",
c: "<16 bytes big endian ipv6 source address>",
2018-04-04 16:10:27 +00:00
l: lifetime_in_seconds_uint64,
2018-01-30 13:38:29 +00:00
v: 0
}
router contact (RC)
2018-04-06 15:48:28 +00:00
router's full identity
{
a: [ one, or, many, AI, here ... ],
2018-05-28 20:51:15 +00:00
k: "<32 bytes public long term identity signing key>",
p: "<32 bytes public path encryption key>",
2018-01-30 13:38:29 +00:00
u: last_updated_seconds_since_epoch_uint64,
2018-01-19 16:51:27 +00:00
v: 0,
2018-01-26 14:17:51 +00:00
x: [ Exit, Infos ],
2018-01-19 16:51:27 +00:00
z: "<64 bytes signature using identity key>"
}
service info (SI)
2018-04-06 15:48:28 +00:00
public information blob for a hidden service
n is the claimed fqdn of the service
2018-04-06 15:48:28 +00:00
s is the long term public signing key
v is the protocol version
x is a nounce value for generating vanity addresses that can be omitted
if x is included it MUST be less than or equal to 16 bytes, any larger and it is
considered invalid.
{
s: "<32 bytes public signing key>",
2018-01-19 16:51:27 +00:00
v: 0,
x: "<optional nounce for vanity>"
}
service address (SA)
2018-04-06 15:48:28 +00:00
the "network address" of a hidden service, which is computed as the blake2b
256 bit hash of the public infomration blob.
HS(BE(SI))
2017-10-27 17:22:10 +00:00
introducer (I)
2018-04-06 15:48:28 +00:00
a descriptor annoucing a path to a hidden service
i is the rc.k value of the router to contact
2018-04-06 15:48:28 +00:00
p is the path id on the router that is owned by the service
v is the protocol version
x is the timestamp seconds since epoch that this introducer expires at
{
i: "<32 bytes public identity key of router>",
p: path_id_uint64,
2018-01-19 16:51:27 +00:00
v: 0,
x: time_expires_seconds_since_epoch_uint64
}
2017-10-27 17:22:10 +00:00
introducer set (IS)
2018-04-06 15:48:28 +00:00
a signed set of introducers for a hidden service
a is the service info
e is the ephemeral public encryption key
2018-04-06 15:48:28 +00:00
i is the list of introducers that this service is advertising with
v is the protocol version
z is the signature of the entire IS where z is set to zero signed by the hidden
service's signing key.
{
2018-04-06 15:48:28 +00:00
a: SI,
e: "<52 bytes curve41417 public encryption key>",
2018-01-08 13:49:05 +00:00
i: [ I, I, I, ... ],
2018-01-19 16:51:27 +00:00
v: 0,
z: "<64 bytes signature using service info signing key>"
}
2018-01-25 17:54:16 +00:00
---
Encrypted frames:
2018-02-22 20:04:42 +00:00
{
v: 0,
2018-02-22 20:05:09 +00:00
w: "<32+32+32+N bytes payload>"
2018-02-22 20:04:42 +00:00
}
2018-01-25 17:54:16 +00:00
Encrypted frames are encrypted containers for link message records like LRCR.
32 bytes hmac, h
32 bytes nounce, n
32 bytes ephmeral sender's public encryption key, k
remaining bytes ciphertext, x
decryption:
0) verify hmac
S = PKE(n, k, our_RC.K)
verify h == MDS(n + k + x, S)
If the hmac verification fails the entire parent message is discarded
1) decrypt and decode
new_x = SD(S, n[0:24], x)
msg = BD(new_x)
If the decoding fails the entire parent message is discarded
encryption:
to encrypt a frame to a router with public key B.k
0) prepare nounce n, ephemeral keypair (A.k, s) and derive shared secret S
A.k, s = ECKG()
n = RAND(32)
S = PKE(p, A.k, B.k)
1) encode and encrypt
x = BE(msg)
new_x = SE(S, n[0:24], x)
2) generate hmac
2018-02-16 12:24:25 +00:00
h = MDS(n + A.k + new_x, S)
2018-01-25 17:54:16 +00:00
resulting frame is h + n + A.k + new_x
---
link layer messages:
the link layer is responsible for anonymising the source and destination of
routing layer messages.
any link layer message without a key v is assumed to be version 0 otherwise
indicates the protocol version in use.
2018-01-30 13:38:29 +00:00
link introduce message (LIM)
This message MUST be the first link message sent before any others. This message
identifies the sender as having the RC contained in r. The recipiant MUST
validate the RC's signature and ensure that the public key in use is listed in
the RC.a matching the ipv6 address it originated from.
2018-05-19 13:36:42 +00:00
if r is not present in sessions made by clients.
2018-01-30 13:38:29 +00:00
{
a: "i",
r: RC,
v: 0
}
link relay commit message (LRCM)
2018-01-30 13:38:29 +00:00
request a commit to relay traffic to another node.
{
a: "c",
b: [ list, of, encrypted, frames ],
2018-02-22 20:11:06 +00:00
v: 0
2017-10-27 17:22:10 +00:00
}
2018-01-19 16:51:27 +00:00
2018-01-25 17:54:16 +00:00
link relay commit record (LRCR)
2017-10-27 17:22:10 +00:00
record requesting path with id p relay messages for o seconds to router
2018-02-22 20:11:06 +00:00
on network who's i is equal to RC.k and decrypt data any messages using
2018-01-19 16:51:27 +00:00
PKE(n, rc.K, c) as symettric key for encryption and decryption.
2017-10-27 17:22:10 +00:00
{
c: "<32 byte public signing/encryption key used for further communication>",
2018-01-08 13:49:05 +00:00
i: "<32 byte RC.k of next hop>",
n: "<32 bytes nounce for key exchange>",
o: seconds_lifetime_uint64,
p: path_id_uint64,
v: 0
}
2017-10-27 17:22:10 +00:00
if i is equal to RC.k then any LRDM.z values are decrypted and interpreted as
routing layer messages.
2017-10-27 17:22:10 +00:00
if i is not equal to RC.k then forward the LRCM with first element removed
and the last element holding our hop's reply. this ensures that the first entry
in the forwarded LRCM is for the next hop in the requested path.
if i is equal to RC.k unconditionally send a LRDM with encrypted payload
holding a LRSM with our record at the end and the previous ones in the front.
2018-05-30 20:53:55 +00:00
link relay reject record (LRRR)
2018-05-30 20:53:55 +00:00
sent in reply to a LRCM indicating we have rejected the request to relay data
for path with id p, the recipiant of this message MUST backoff sending LRCM for
b milliseconds or recipiant MAY get banned by recipiant router for an undefined
amount of time. r contains a bytestring of 7 bit clean ascii metadata indicating
why the commit was rejected. if included r MUST be logged or collected for later
review by node operator. inclusion of r is OPTIONAL. review of collected events
is RECOMMENDED.
{
b: miliseconds_backoff_uint64,
c: "r",
p: path_id_uint64,
r: "<optional reason metadata here>",
v: 0,
x: "<N bytes arbirary padding>"
}
link relay accept record (LRAR)
2017-10-27 17:22:10 +00:00
sent in reply to a LRCM indicating we have accepted the request to relay data
for path with id p.
2018-05-30 20:53:55 +00:00
{
c: "a",
p: path_id_uint64,
v: 0,
x: "<N bytes arbitrary padding>"
2018-05-30 20:53:55 +00:00
}
link relay status message (LRSM)
2018-05-30 20:53:55 +00:00
sent inside a LRDM after build has reached the end of the path to finish the
path build and send the result of the build.
2017-10-27 17:22:10 +00:00
{
a: "s",
p: [list, of, encrypted, replies],
2018-02-22 20:11:06 +00:00
v: 0
2017-10-27 17:22:10 +00:00
}
link relay upstream message (LRUM)
sent to relay data via upstream direction of a previously created path.
decrypt z using previously derived key and nounce y. Relay with new_y and new_z
in upstream direction as a LRUM.
new_z = SD(k, y, z)
new_y = y ^ new_z[0:24]
{
a: "u",
p: path_id_uint64,
2018-01-19 16:51:27 +00:00
v: 0,
2017-10-27 17:22:10 +00:00
y: "<insert 24 bytes nounce here>",
z: "<insert N bytes payload here>"
}
link relay downstream message (LRDM)
sent to relay data via downstream direction of a previously created path.
encrypt z using previously derived key and nonce new_y and relay in downstream
direction as a LRDM.
new_y = y ^ z[0:24]
new_z = SE(k, new_y, z)
{
a: "d",
p: path_id_uint64,
2018-01-19 16:51:27 +00:00
v: 0,
2017-10-27 17:22:10 +00:00
y: "<insert 24 bytes nounce here>",
z: "<insert N bytes payload here>"
}
link relay exit message (LRXM)
sent to exit a previously commited path before it expires.
verify signature using cancel key c in relay commit message.
2018-01-08 13:49:05 +00:00
{
a: "x",
b: [ list, of, exit, records, as, encrpyted, frames ],
2018-02-22 20:11:06 +00:00
v: 0
2018-01-08 13:49:05 +00:00
}
2018-01-08 13:49:05 +00:00
link relay exit record (LRXR)
{
2018-01-08 13:49:05 +00:00
c: "x",
p: path_id_uint64,
2018-01-19 16:51:27 +00:00
v: 0,
2018-01-08 13:49:05 +00:00
x: "<N bytes padding>",
z: "<64 bytes signature>"
}
2018-02-06 17:02:06 +00:00
link immediate dht message (LIDM):
transfer one or more dht messages directly without a previously made path.
{
2018-05-31 23:10:48 +00:00
a: "m",
2018-06-01 14:08:54 +00:00
m: [many, dht, messages],
2018-02-22 20:11:06 +00:00
v: 0
2018-02-06 17:02:06 +00:00
}
2018-01-19 16:51:27 +00:00
2018-02-06 17:02:06 +00:00
link stateless relay message (LSRM)
2018-01-19 16:51:27 +00:00
2018-02-06 17:02:06 +00:00
statelessly relay a link message.
{
a: "r",
c: r5n_counter_uint8,
2018-02-06 17:02:06 +00:00
d: "<32 bytes rc.K of destination>",
s: "<32 bytes rc.K of source>",
v: 0,
x: "<N bytes encrypted link message>",
y: "<24 bytes nounce>",
z: "<64 bytes signature>"
}
ONLY exchanged over ethernet, if recieved from an IP link it MUST be discarded.
relay an encrypted link message from source s to destination d.
check signature z using public key s and discard if invalid signature.
if d is equal to ourRC.k then decrypt x via SD(KE(d, s), y, x) and process it as
a link message. if the inner decrypted link message is a LRCM forward all
following LRUM, LRDM and LRSM to s via a LSRM. LIDM and LSRM are discarded.
if d is not equal to ourRC.k then forward it to an ethernet peer that is cloeser
to d than you are. if you are closer to d than all of your other ethernet peers
then increment c and send to the ethernet peer with the lowest detected latency
that isn't the peer that this message was recieved from but ONLY if c is less
than 128. if c is equal to or greater than 128 then the message is discarded.
2018-01-19 16:51:27 +00:00
---
routing layer:
2018-01-19 16:51:27 +00:00
the routing layer provides inter network communication between the LLARP link
layer and ip (internet protocol) for exit traffic or ap (anonymous protocol) for
hidden services. replies to messages are sent back via the path they
originated from inside a LRDM.
2018-01-30 13:38:29 +00:00
ipv4 addresses are allowed via ipv4 mapped ipv6 addresses, i.e. ::ffff.10.0.0.1
obtain exit address message (OXAM)
sent to an exit router to obtain a NAT ip address for ip exit traffic.
replies are sent down the path that messages originate from.
{
2017-10-27 17:22:10 +00:00
A: "X",
I: "<32 bytes signing public key for future communication>",
2018-01-19 16:51:27 +00:00
V: 0,
2017-09-28 17:02:05 +00:00
X: lifetime_of_address_mapping_in_seconds_uint64,
}
grant exit address messsage (GXAM)
2018-01-29 20:02:23 +00:00
sent in response to an OXAM to grant an ip for exit traffic from an external
ip address used for exit traffic.
{
A: "G",
2018-01-30 13:38:29 +00:00
E: XR,
I: "<32 bytes signing public key of requester>",
2018-01-29 20:02:23 +00:00
T: transaction_id_uint64,
2018-01-19 16:51:27 +00:00
V: 0,
2018-01-29 20:02:23 +00:00
Z: "<64 bytes signature using exit info's signing key>"
}
2018-01-30 13:38:29 +00:00
E contains an exit route that was granted to the requester that can be used with
2018-01-29 20:02:23 +00:00
IP exit traffic.
2018-01-30 13:38:29 +00:00
The requester will now have any ip traffic going to address S forwarded to them
via the path that originally sent the OXAM and any TDFM will is recieved on the
same path will be forwarded out to the internet, given that they have
2018-01-29 20:02:23 +00:00
valid signatures and addresses.
reject exit address message (RXAM)
2018-01-29 20:02:23 +00:00
sent in response to an OXAM to indicate that exit traffic is not allowed or
was denied.
{
A: "R",
B: backoff_milliseconds_uint64,
I: "<32 bytes signing public key of requester>",
R: "<optional reject metadata>",
2018-01-29 20:02:23 +00:00
T: transaction_id_uint64,
2018-01-19 16:51:27 +00:00
V: 0,
2018-01-29 20:02:23 +00:00
Z: "<64 bytes signature signed by exit info's signing key>"
}
2018-01-29 20:02:23 +00:00
B is set to a backoff value.
R contains additional metadata text describing why the exit was rejected.
2017-09-28 17:02:05 +00:00
transfer data fragment message (TDFM)
variant 1 (with path id):
2018-01-29 20:02:23 +00:00
transfer data between paths.
2017-09-28 17:02:05 +00:00
{
A: "T",
P: path_id_uint64,
2018-01-19 16:51:27 +00:00
V: 0,
2017-09-28 17:02:05 +00:00
X: "<N bytes payload>",
2017-10-27 17:22:10 +00:00
Y: "<24 bytes nounce>",
2018-02-22 20:11:06 +00:00
Z: "<64 bytes signature>"
2017-09-28 17:02:05 +00:00
}
2018-01-29 20:02:23 +00:00
transfer data to another path with id P on the local router place Y and X values
into y and z values into a LRDM message (respectively) and send it in the
downstream direction.
2017-09-28 17:02:05 +00:00
variant 2 (no path id):
transfer ip traffic for exit
{
A: "T",
2018-01-19 16:51:27 +00:00
V: 0,
2017-10-27 17:22:10 +00:00
X: "<N bytes ipv6 packet>",
2018-01-29 20:02:23 +00:00
Y: "<16 bytes nounce>",
Z: "<64 bytes signature using previously provided signing key>"
2017-09-28 17:02:05 +00:00
}
2018-01-29 20:02:23 +00:00
X is parsed as an IPv6 packet and the source addresss is extracted.
Next we find the corrisponding signing key for a previously granted exit address
and use it to validate the siganture of the entire message. If the signing key
cannot be found or the signature is invalid this message is dropped, otherwise
the X value is sent on the appropriate exit network interface.
When we recieve an ip packet from the internet to an exit address, we put it
into a TDFM, signed with the exit info's signing key and send it downstream the
2018-02-06 17:02:06 +00:00
corrisponding path in an LRDM.
2018-01-29 20:02:23 +00:00
update exit path message (UXPM)
sent from a new path by client to indicate that a previously established exit
should use the new path that this message came from.
{
A: "U",
T: transaction_id_uint64,
V: 0,
Y: "<16 bytes nounce>",
Z: "<64 bytes signature using previously provided signing key>"
}
T is the transaction ID from the GXAM
close exit path message (CXPM)
client sends a CXPM when the exit is no longer needed.
The address used in exit MAY be reused later.
{
A: "C",
T: transaction_id_uint64,
V: 0,
Y: "<16 bytes nounce>",
Z: "<64 bytes signagure using previously provided signing key>"
}
---
DHT messages
find introduction message (FIM)
recursively find an IS.
variant 1, by SA
{
A: "F",
R: r5n_counter,
S: "<32 bytes SA>",
T: transaction_id_uint64,
V: 0
}
variant 2, by claimed name
{
A: "F",
N: "service.name.tld",
R: r5n_counter,
T: transaction_id_uin64,
V: 0
}
Transactions will persist until replied to by a GIM or 60 seconds, whichever
is reached first.
If the timeout is reached before a GIM or the forwarding of the request fails:
* close transaction
* close linked transactions
if R is non-zero and less or equal to than 5:
* decrement R by 1
* open a transaction with id T for sender's RC.k
* pick random dht capable router, F
* generate new transaction id, U
* open a transaction with id U for F.k
* link transaction U to transaction T
* send FIM with transaction id U to F
if R is greater than 5 or less than 0:
* increment shitlist value of sender's RC.k by 1
* if the shitlist value for sender's RC.k is less than 10 reply with a GIM with
an X
* if the shitlist value for sender's RC.k is equal to or greater than 10 drop
the message
if R is zero and we have 1 or more IS at position S in dht keyspace:
* reply with a GIM holding the IS who contains the introducer with the highest
expiration timestamp
if R is zero and we do not have any IS at position S in dht keyspace:
* find a router who's RC.k is closest to S, N
if N is our router:
* reply with a GIM with an empty X value
if N is not our router:
* open transaction with id T for sender's RC.k
* generate new transaction id, U
* open transaction with id U for N.k
* link transaction U to transaction T
* forward request to N using transaction id U
got introduction message (GIM)
{
A: "G",
T: transaction_id_uint64,
V: 0,
X: [ IS, IS, IS, ... ]
}
if we have a transaction with id T:
* forward the GIM to all linked transactions
* terminate transaction T
when a linked transaction gets a GIM:
* set T to the current transaction id
* foward the GIM to the requester of T
publish introduction message (PIM)
publish one or many IM into the dht at once.
each IS will be placed in the dht
version 0 uses the SA of each IS as the keyspace location.
in the future the location will be determined by the dht kdf
which uses a shared random source to obfuscate keyspace location.
R is currently set to 3 +/- 2 by the sender.
{
A: "P",
R: r5n_counter,
V: 0,
X: [ IS, IS, IS, ... ]
}
The following steps happen in order:
first stage: reduction
if X's length is divisble by 2:
* split X in half as J and K
* generate 2 new PIM with the same values as the parent with empty X
* put J and K into the new PIM's X values
* associate the 2 new PIM with the current PIM batch
if X's length is not divisible by 2 and greater than 1:
* pop off an IS from X as A
* generate a new PIM with the same values as the parent with an X value of A
* associate the new PIM with the current PIM batch
* associate the old PIM having A removed from X with the current PIM batch
if X's length is 1:
* associate the PIM with the current PIM batch
any other cases for X are ignored.
for each PIM in the current batch:
if R is greater than 0:
* decrement R by 1
* queue the PIM for shuffle (second stage)
if R is 0:
* queue the PIM for distribution (third stage)
if R is less than 0:
* drop the message entirely
second stage: shuffle
* The dht node waits until we have collected 10 or more PIM or for 5 seconds,
which ever comes first.
* shuffle the list of IS randomly
* re-combine the IS into new PIMs
* queue each newly shuffled PIM for distribution (third stage)
if we collected 10 or more PIM:
* X holds 5 IS at most
if we collected less than 10 but more than 1 PIM:
* X holds 2 IS at most
if we only collected 1 PIM:
* the single PIM is unmodified
third stage: distribution
if R is less than 0:
* drop message and terminate current transaction, this should never happen but
this case is left here in the event of implementation bugs.
if R is greater than 0:
* pick a random dht capable router, N
* forward the PIM to N
if R is equal to 0:
for each IS in X as A:
* find the router closest to the SA in A, N
if N is our router:
* create dht positon S from SA in A
* store A for lookup at S
if N is not our router:
* send a PIM with X value containing just A to N
In the future post random walk keyspace batching may be done here.
As of version 0, none is done.
find router contact message (FRCM)
find a router by long term RC.k public key
{
2018-05-31 23:10:48 +00:00
A: "R",
K: "<32 byte public key of router>",
T: transaction_id_uint64,
V: 0
}
find RC who's RC.k is closest to K:
if A.k is equal to K:
* reply with a GRCM with an R value of just A
if A.k is not equal to K and we are closesr to A.k than anyone we know:
* reply with a GRCM with an empty R value
find a pending transaction id for K, P
if P exists:
* link transaction T to P
if P does not exist:
* generate a new transaction id, U
* start transaction U for A.k
* link transaction U to transaction T
* send FRCM to A.k requesting K
got router contact message (GRCM)
R is a list containing a single RC if found or is an empty list if not found
sent in reply to FRCM only
{
2018-05-31 23:10:48 +00:00
A: "S",
R: [RC],
T: transaction_id_uint64,
V: 0
}
* send a GRCM with R to requesters in all linked transactions
* terminate transaction with id T
notes:
if we get a GRCM with empty R on one Tx and then one with a filled R on another
with the same K, the request is terminated by the first message as not found.
A backtrack case is needed.