#include #include #include #include #include "buffer.hpp" #include "router.hpp" namespace llarp { namespace service { Endpoint::Endpoint(const std::string& name, llarp_router* r) : path::Builder(r, r->dht, 4, 4), m_Router(r), m_Name(name) { m_Tag.Zero(); } bool Endpoint::SetOption(const std::string& k, const std::string& v) { if(k == "keyfile") { m_Keyfile = v; } if(k == "tag") { m_Tag = v; llarp::LogInfo("Setting tag to ", v); } if(k == "prefetch-tag") { m_PrefetchTags.insert(v); } if(k == "prefetch-addr") { Address addr; if(addr.FromString(v)) m_PrefetchAddrs.insert(addr); } if(k == "netns") { m_NetNS = v; m_OnInit.push_back(std::bind(&Endpoint::IsolateNetwork, this)); } if(k == "min-latency") { auto val = atoi(v.c_str()); if(val > 0) m_MinPathLatency = val; } return true; } bool Endpoint::IsolateNetwork() { llarp::LogInfo("isolating network to namespace ", m_NetNS); m_IsolatedWorker = llarp_init_isolated_net_threadpool( m_NetNS.c_str(), &SetupIsolatedNetwork, &RunIsolatedMainLoop, this); m_IsolatedLogic = llarp_init_single_process_logic(m_IsolatedWorker); return true; } llarp_ev_loop* Endpoint::EndpointNetLoop() { if(m_IsolatedNetLoop) return m_IsolatedNetLoop; else return m_Router->netloop; } bool Endpoint::NetworkIsIsolated() const { return m_IsolatedLogic && m_IsolatedWorker; } bool Endpoint::SetupIsolatedNetwork(void* user, bool failed) { return static_cast< Endpoint* >(user)->DoNetworkIsolation(!failed); } bool Endpoint::HasPendingPathToService(const Address& addr) const { return m_PendingServiceLookups.find(addr) != m_PendingServiceLookups.end(); } void Endpoint::RegenAndPublishIntroSet(llarp_time_t now) { std::set< Introduction > I; if(!GetCurrentIntroductions(I)) { llarp::LogWarn("could not publish descriptors for endpoint ", Name(), " because we couldn't get any introductions"); if(ShouldBuildMore()) ManualRebuild(1); return; } IntroSet introset = m_IntroSet; introset.I.clear(); for(const auto& intro : I) { llarp::LogInfo(intro); if(!intro.ExpiresSoon(now)) introset.I.push_back(intro); } if(introset.I.size() == 0) { llarp::LogWarn("not enough intros to publish introset for ", Name()); return; } introset.topic = m_Tag; if(!m_Identity.SignIntroSet(introset, &m_Router->crypto)) { llarp::LogWarn("failed to sign introset for endpoint ", Name()); return; } m_IntroSet = introset; if(PublishIntroSet(m_Router)) { llarp::LogInfo("(re)publishing introset for endpoint ", Name()); } else { llarp::LogWarn("failed to publish intro set for endpoint ", Name()); } } void Endpoint::Tick(llarp_time_t now) { /// reset tx id for publish if(now - m_LastPublishAttempt >= INTROSET_PUBLISH_RETRY_INTERVAL) m_CurrentPublishTX = 0; // publish descriptors if(ShouldPublishDescriptors(now)) { RegenAndPublishIntroSet(now); } // expire pending tx { std::set< service::IntroSet > empty; auto itr = m_PendingLookups.begin(); while(itr != m_PendingLookups.end()) { if(itr->second->IsTimedOut(now)) { std::unique_ptr< IServiceLookup > lookup = std::move(itr->second); llarp::LogInfo(lookup->name, " timed out txid=", lookup->txid); lookup->HandleResponse(empty); itr = m_PendingLookups.erase(itr); } else ++itr; } } // expire pending router lookups { auto itr = m_PendingRouters.begin(); while(itr != m_PendingRouters.end()) { if(itr->second.IsExpired(now)) { llarp::LogInfo("lookup for ", itr->first, " timed out"); itr = m_PendingRouters.erase(itr); } else ++itr; } } // prefetch addrs for(const auto& addr : m_PrefetchAddrs) { if(!HasPathToService(addr)) { if(!EnsurePathToService( addr, [](Address addr, OutboundContext* ctx) {}, 10000)) { llarp::LogWarn("failed to ensure path to ", addr); } } } // prefetch tags for(const auto& tag : m_PrefetchTags) { auto itr = m_PrefetchedTags.find(tag); if(itr == m_PrefetchedTags.end()) { itr = m_PrefetchedTags.insert(std::make_pair(tag, CachedTagResult(tag))) .first; } for(const auto& introset : itr->second.result) { if(HasPendingPathToService(introset.A.Addr())) continue; if(!EnsurePathToService(introset.A.Addr(), [](Address addr, OutboundContext* ctx) {}, 10000)) { llarp::LogWarn("failed to ensure path to ", introset.A.Addr(), " for tag ", tag.ToString()); } } itr->second.Expire(now); if(itr->second.ShouldRefresh(now)) { auto path = PickRandomEstablishedPath(); if(path) { auto job = new TagLookupJob(this, &itr->second); job->SendRequestViaPath(path, Router()); } } } // tick remote sessions { auto itr = m_RemoteSessions.begin(); while(itr != m_RemoteSessions.end()) { if(itr->second->Tick(now)) { itr = m_RemoteSessions.erase(itr); } else ++itr; } } } uint64_t Endpoint::GenTXID() { uint64_t txid = llarp_randint(); while(m_PendingLookups.find(txid) != m_PendingLookups.end()) ++txid; return txid; } std::string Endpoint::Name() const { return m_Name + ":" + m_Identity.pub.Name(); } bool Endpoint::HasPathToService(const Address& addr) const { return m_RemoteSessions.find(addr) != m_RemoteSessions.end(); } void Endpoint::PutLookup(IServiceLookup* lookup, uint64_t txid) { m_PendingLookups.insert( std::make_pair(txid, std::unique_ptr< IServiceLookup >(lookup))); } bool Endpoint::HandleGotIntroMessage(const llarp::dht::GotIntroMessage* msg) { auto crypto = &m_Router->crypto; std::set< IntroSet > remote; for(const auto& introset : msg->I) { if(!introset.VerifySignature(crypto)) { llarp::LogInfo("invalid introset signature for ", introset, " on endpoint ", Name()); if(m_Identity.pub == introset.A && m_CurrentPublishTX == msg->T) { IntroSetPublishFail(); } return false; } if(m_Identity.pub == introset.A && m_CurrentPublishTX == msg->T) { llarp::LogInfo( "got introset publish confirmation for hidden service endpoint ", Name()); IntroSetPublished(); return true; } else { remote.insert(introset); } } auto itr = m_PendingLookups.find(msg->T); if(itr == m_PendingLookups.end()) { llarp::LogWarn("invalid lookup response for hidden service endpoint ", Name(), " txid=", msg->T); return true; } std::unique_ptr< IServiceLookup > lookup = std::move(itr->second); m_PendingLookups.erase(itr); lookup->HandleResponse(remote); return true; } void Endpoint::PutSenderFor(const ConvoTag& tag, const ServiceInfo& info) { auto itr = m_Sessions.find(tag); if(itr == m_Sessions.end()) { itr = m_Sessions.insert(std::make_pair(tag, Session{})).first; } itr->second.remote = info; itr->second.lastUsed = llarp_time_now_ms(); } bool Endpoint::GetSenderFor(const ConvoTag& tag, ServiceInfo& si) const { auto itr = m_Sessions.find(tag); if(itr == m_Sessions.end()) return false; si = itr->second.remote; return true; } void Endpoint::PutIntroFor(const ConvoTag& tag, const Introduction& intro) { auto itr = m_Sessions.find(tag); if(itr == m_Sessions.end()) { itr = m_Sessions.insert(std::make_pair(tag, Session{})).first; } itr->second.intro = intro; itr->second.lastUsed = llarp_time_now_ms(); } bool Endpoint::GetIntroFor(const ConvoTag& tag, Introduction& intro) const { auto itr = m_Sessions.find(tag); if(itr == m_Sessions.end()) return false; intro = itr->second.intro; return true; } bool Endpoint::GetConvoTagsForService(const ServiceInfo& info, std::set< ConvoTag >& tags) const { bool inserted = false; auto itr = m_Sessions.begin(); while(itr != m_Sessions.end()) { if(itr->second.remote == info) { inserted |= tags.insert(itr->first).second; } ++itr; } return inserted; } bool Endpoint::GetCachedSessionKeyFor(const ConvoTag& tag, const byte_t*& secret) const { auto itr = m_Sessions.find(tag); if(itr == m_Sessions.end()) return false; secret = itr->second.sharedKey.data(); return true; } void Endpoint::PutCachedSessionKeyFor(const ConvoTag& tag, const SharedSecret& k) { auto itr = m_Sessions.find(tag); if(itr == m_Sessions.end()) { itr = m_Sessions.insert(std::make_pair(tag, Session{})).first; } itr->second.sharedKey = k; itr->second.lastUsed = llarp_time_now_ms(); } bool Endpoint::Start() { auto crypto = &m_Router->crypto; if(m_Keyfile.size()) { if(!m_Identity.EnsureKeys(m_Keyfile, crypto)) return false; } else { m_Identity.RegenerateKeys(crypto); } if(!m_DataHandler) { m_DataHandler = this; } // this does network isolation while(m_OnInit.size()) { if(m_OnInit.front()()) m_OnInit.pop_front(); else return false; } return true; } Endpoint::~Endpoint() { } bool Endpoint::CachedTagResult::HandleResponse( const std::set< IntroSet >& introsets) { auto now = llarp_time_now_ms(); for(const auto& introset : introsets) if(result.insert(introset).second) lastModified = now; llarp::LogInfo("Tag result for ", tag.ToString(), " got ", introsets.size(), " results from lookup, have ", result.size(), " cached last modified at ", lastModified, " is ", now - lastModified, "ms old"); return true; } void Endpoint::CachedTagResult::Expire(llarp_time_t now) { auto itr = result.begin(); while(itr != result.end()) { if(itr->HasExpiredIntros(now)) { llarp::LogInfo("Removing expired tag Entry ", itr->A.Name()); itr = result.erase(itr); lastModified = now; } else { ++itr; } } } llarp::routing::IMessage* Endpoint::CachedTagResult::BuildRequestMessage(uint64_t txid) { llarp::routing::DHTMessage* msg = new llarp::routing::DHTMessage(); msg->M.emplace_back(new llarp::dht::FindIntroMessage(tag, txid)); lastRequest = llarp_time_now_ms(); return msg; } bool Endpoint::PublishIntroSet(llarp_router* r) { auto path = GetEstablishedPathClosestTo(m_Identity.pub.Addr().data()); if(path) { m_CurrentPublishTX = llarp_randint(); llarp::routing::DHTMessage msg; msg.M.emplace_back(new llarp::dht::PublishIntroMessage( m_IntroSet, m_CurrentPublishTX, 4)); if(path->SendRoutingMessage(&msg, r)) { m_LastPublishAttempt = llarp_time_now_ms(); llarp::LogInfo(Name(), " publishing introset"); return true; } } llarp::LogWarn(Name(), " publish introset failed, no path"); return false; } void Endpoint::IntroSetPublishFail() { llarp::LogWarn("failed to publish introset for ", Name()); m_CurrentPublishTX = 0; } bool Endpoint::ShouldPublishDescriptors(llarp_time_t now) const { if(m_IntroSet.HasExpiredIntros(now)) return now - m_LastPublishAttempt >= INTROSET_PUBLISH_RETRY_INTERVAL; return now - m_LastPublish >= INTROSET_PUBLISH_INTERVAL && m_CurrentPublishTX == 0; } void Endpoint::IntroSetPublished() { m_CurrentPublishTX = 0; m_LastPublish = llarp_time_now_ms(); llarp::LogInfo(Name(), " IntroSet publish confirmed"); } struct HiddenServiceAddressLookup : public IServiceLookup { ~HiddenServiceAddressLookup() { } Address remote; typedef std::function< bool(const Address&, const IntroSet*) > HandlerFunc; HandlerFunc handle; HiddenServiceAddressLookup(Endpoint* p, HandlerFunc h, const Address& addr, uint64_t tx) : IServiceLookup(p, tx, "HSLookup"), remote(addr), handle(h) { } bool HandleResponse(const std::set< IntroSet >& results) { llarp::LogInfo("found ", results.size(), " for ", remote.ToString()); if(results.size() > 0) { return handle(remote, &*results.begin()); } return handle(remote, nullptr); } llarp::routing::IMessage* BuildRequestMessage() { llarp::routing::DHTMessage* msg = new llarp::routing::DHTMessage(); msg->M.emplace_back(new llarp::dht::FindIntroMessage(txid, remote, 5)); llarp::LogInfo("build request for ", remote); return msg; } }; bool Endpoint::DoNetworkIsolation(bool failed) { if(failed) return IsolationFailed(); llarp_ev_loop_alloc(&m_IsolatedNetLoop); return SetupNetworking(); } void Endpoint::RunIsolatedMainLoop(void* user) { Endpoint* self = static_cast< Endpoint* >(user); llarp_ev_loop_run_single_process(self->m_IsolatedNetLoop, self->m_IsolatedWorker, self->m_IsolatedLogic); } void Endpoint::PutNewOutboundContext(const llarp::service::IntroSet& introset) { Address addr; introset.A.CalculateAddress(addr.data()); // only add new session if it's not there if(m_RemoteSessions.find(addr) == m_RemoteSessions.end()) { OutboundContext* ctx = new OutboundContext(introset, this); m_RemoteSessions.insert( std::make_pair(addr, std::unique_ptr< OutboundContext >(ctx))); llarp::LogInfo("Created New outbound context for ", addr.ToString()); } // inform pending auto itr = m_PendingServiceLookups.find(addr); if(itr != m_PendingServiceLookups.end()) { auto f = itr->second; m_PendingServiceLookups.erase(itr); f(itr->first, m_RemoteSessions.at(addr).get()); } } bool Endpoint::HandleGotRouterMessage(const llarp::dht::GotRouterMessage* msg) { bool success = false; if(msg->R.size() == 1) { auto itr = m_PendingRouters.find(msg->R[0].pubkey); if(itr == m_PendingRouters.end()) return false; llarp_async_verify_rc* job = new llarp_async_verify_rc; job->nodedb = m_Router->nodedb; job->cryptoworker = m_Router->tp; job->diskworker = m_Router->disk; job->logic = nullptr; job->hook = nullptr; job->rc = msg->R[0]; llarp_nodedb_async_verify(job); return true; } return success; } void Endpoint::EnsureRouterIsKnown(const RouterID& router) { if(router.IsZero()) return; RouterContact rc; if(!llarp_nodedb_get_rc(m_Router->nodedb, router, rc)) { if(m_PendingRouters.find(router) == m_PendingRouters.end()) { auto path = GetEstablishedPathClosestTo(router); routing::DHTMessage msg; auto txid = GenTXID(); msg.M.emplace_back( new dht::FindRouterMessage({}, dht::Key_t(router), txid)); if(path && path->SendRoutingMessage(&msg, m_Router)) { llarp::LogInfo(Name(), " looking up ", router); m_PendingRouters.insert( std::make_pair(router, RouterLookupJob(this))); } else { llarp::LogError("failed to send request for router lookup"); } } } } void Endpoint::HandlePathBuilt(path::Path* p) { p->SetDataHandler(std::bind(&Endpoint::HandleHiddenServiceFrame, this, std::placeholders::_1)); p->SetDropHandler(std::bind(&Endpoint::HandleDataDrop, this, std::placeholders::_1, std::placeholders::_2, std::placeholders::_3)); p->SetDeadChecker(std::bind(&Endpoint::CheckPathIsDead, this, std::placeholders::_1, std::placeholders::_2)); RegenAndPublishIntroSet(llarp_time_now_ms()); } bool Endpoint::HandleDataDrop(path::Path* p, const PathID_t& dst, uint64_t seq) { llarp::LogWarn(Name(), " message ", seq, " dropped by endpoint ", p->Endpoint(), " via ", dst); return true; } bool Endpoint::OutboundContext::HandleDataDrop(path::Path* p, const PathID_t& dst, uint64_t seq) { llarp::LogWarn(Name(), " message ", seq, " dropped by endpoint ", p->Endpoint(), " via ", dst); // pick another intro if(remoteIntro.router == p->Endpoint() && remoteIntro.pathID == dst) { auto now = llarp_time_now_ms(); for(const auto& intro : currentIntroSet.I) { if(intro.ExpiresSoon(now)) continue; if(intro.pathID != dst) { bool shift = remoteIntro.router != intro.router; remoteIntro = intro; if(shift) ManualRebuild(1); return true; } } llarp::LogError(Name(), " has no more usable intros"); UpdateIntroSet(); } return true; } bool Endpoint::HandleHiddenServiceFrame(const ProtocolFrame* frame) { return frame->AsyncDecryptAndVerify(EndpointLogic(), Crypto(), Worker(), m_Identity, m_DataHandler); } Endpoint::SendContext::SendContext(const ServiceInfo& ident, const Introduction& intro, PathSet* send, Endpoint* ep) : remoteIdent(ident) , remoteIntro(intro) , m_PathSet(send) , m_DataHandler(ep) , m_Endpoint(ep) { } void Endpoint::OutboundContext::HandlePathBuilt(path::Path* p) { p->SetDataHandler( std::bind(&Endpoint::OutboundContext::HandleHiddenServiceFrame, this, std::placeholders::_1)); p->SetDropHandler(std::bind( &Endpoint::OutboundContext::HandleDataDrop, this, std::placeholders::_1, std::placeholders::_2, std::placeholders::_3)); p->SetDeadChecker(std::bind(&Endpoint::CheckPathIsDead, m_Endpoint, std::placeholders::_1, std::placeholders::_2)); } void Endpoint::HandlePathDead(void* user) { Endpoint* self = static_cast< Endpoint* >(user); self->RegenAndPublishIntroSet(llarp_time_now_ms()); } bool Endpoint::CheckPathIsDead(path::Path*, llarp_time_t latency) { if(latency >= m_MinPathLatency) { // rebuild path next tick llarp_logic_queue_job(EndpointLogic(), {this, &HandlePathDead}); return true; } return false; } bool Endpoint::OutboundContext::HandleHiddenServiceFrame( const ProtocolFrame* frame) { return m_Endpoint->HandleHiddenServiceFrame(frame); } bool Endpoint::OnOutboundLookup(const Address& addr, const IntroSet* introset) { if(!introset) { auto itr = m_PendingServiceLookups.find(addr); if(itr != m_PendingServiceLookups.end()) { m_PendingServiceLookups.erase(itr); itr->second(addr, nullptr); } return false; } PutNewOutboundContext(*introset); return true; } bool Endpoint::EnsurePathToService(const Address& remote, PathEnsureHook hook, llarp_time_t timeoutMS) { auto path = GetEstablishedPathClosestTo(remote.ToRouter()); if(!path) { llarp::LogWarn("No outbound path for lookup yet"); return false; } llarp::LogInfo(Name(), " Ensure Path to ", remote.ToString()); { auto itr = m_RemoteSessions.find(remote); if(itr != m_RemoteSessions.end()) { hook(itr->first, itr->second.get()); return true; } } auto itr = m_PendingServiceLookups.find(remote); if(itr != m_PendingServiceLookups.end()) { // duplicate llarp::LogWarn("duplicate pending service lookup to ", remote.ToString()); return false; } m_PendingServiceLookups.insert(std::make_pair(remote, hook)); HiddenServiceAddressLookup* job = new HiddenServiceAddressLookup( this, std::bind(&Endpoint::OnOutboundLookup, this, std::placeholders::_1, std::placeholders::_2), remote, GenTXID()); if(job->SendRequestViaPath(path, Router())) return true; llarp::LogError("send via path failed"); return false; } Endpoint::OutboundContext::OutboundContext(const IntroSet& intro, Endpoint* parent) : path::Builder(parent->m_Router, parent->m_Router->dht, 2, 4) , SendContext(intro.A, {}, this, parent) , currentIntroSet(intro) { updatingIntroSet = false; ShiftIntroduction(); } Endpoint::OutboundContext::~OutboundContext() { } bool Endpoint::OutboundContext::OnIntroSetUpdate(const Address& addr, const IntroSet* i) { if(i) { currentIntroSet = *i; ShiftIntroduction(); } updatingIntroSet = false; return true; } bool Endpoint::SendToOrQueue(const Address& remote, llarp_buffer_t data, ProtocolType t) { llarp::LogInfo(Name(), " send ", data.sz, " to ", remote); { auto itr = m_AddressToService.find(remote); if(itr != m_AddressToService.end()) { routing::PathTransferMessage transfer; ProtocolFrame& f = transfer.T; path::Path* p = nullptr; std::set< ConvoTag > tags; if(!GetConvoTagsForService(itr->second, tags)) { llarp::LogError("no convo tag"); return false; } Introduction intro; const byte_t* K = nullptr; for(const auto& tag : tags) { if(p == nullptr && GetIntroFor(tag, intro)) { p = GetPathByRouter(intro.router); if(p) { f.T = tag; if(!GetCachedSessionKeyFor(tag, K)) { llarp::LogError("no cached session key"); return false; } } } } if(p == nullptr) { llarp::LogError("no path found"); return false; } ProtocolMessage m(f.T); m.proto = t; m.introReply = p->intro; m.sender = m_Identity.pub; m.PutBuffer(data); f.N.Randomize(); f.S = GetSeqNoForConvo(f.T); f.C.Zero(); transfer.Y.Randomize(); transfer.P = intro.pathID; if(!f.EncryptAndSign(&Router()->crypto, m, K, m_Identity)) { llarp::LogError("failed to encrypt and sign"); return false; } llarp::LogInfo(Name(), " send ", data.sz, " via ", intro); return p->SendRoutingMessage(&transfer, Router()); } } if(HasPathToService(remote)) { m_RemoteSessions[remote]->AsyncEncryptAndSendTo(data, t); return true; } auto itr = m_PendingTraffic.find(remote); if(itr == m_PendingTraffic.end()) { m_PendingTraffic.insert(std::make_pair(remote, PendingBufferQueue())); EnsurePathToService( remote, [&](Address addr, OutboundContext* ctx) { if(ctx) { auto itr = m_PendingTraffic.find(addr); if(itr != m_PendingTraffic.end()) { while(itr->second.size()) { auto& front = itr->second.front(); ctx->AsyncEncryptAndSendTo(front.Buffer(), front.protocol); itr->second.pop(); } } } else { llarp::LogWarn("failed to obtain outbound context to ", addr, " within timeout"); } m_PendingTraffic.erase(addr); }, 10000); } m_PendingTraffic[remote].emplace(data, t); return true; } void Endpoint::OutboundContext::ShiftIntroduction() { bool shifted = false; for(const auto& intro : currentIntroSet.I) { m_Endpoint->EnsureRouterIsKnown(remoteIntro.router); if(remoteIntro.expiresAt < intro.expiresAt) { remoteIntro = intro; shifted = true; } } if(!shifted) { RouterID orig = remoteIntro.router; remoteIntro.Clear(); for(const auto& intro : currentIntroSet.I) { if(remoteIntro.expiresAt < intro.expiresAt && intro.router == orig) { shifted = orig != intro.router; remoteIntro = intro; } } } if(shifted) { llarp::LogInfo("shifted intro to ", remoteIntro); ManualRebuild(1); } } void Endpoint::SendContext::AsyncEncryptAndSendTo(PathID_t path, llarp_buffer_t data, ProtocolType protocol) { if(sequenceNo) { EncryptAndSendTo(path, data, protocol); } else { AsyncGenIntro(path, data, protocol); } } struct AsyncKeyExchange { llarp_logic* logic; llarp_crypto* crypto; SharedSecret sharedKey; ServiceInfo remote; const Identity& m_LocalIdentity; ProtocolMessage msg; ProtocolFrame frame; Introduction intro; const PQPubKey introPubKey; std::function< void(ProtocolFrame&) > hook; IDataHandler* handler; AsyncKeyExchange(llarp_logic* l, llarp_crypto* c, const ServiceInfo& r, const Identity& localident, const PQPubKey& introsetPubKey, const Introduction& us, IDataHandler* h) : logic(l) , crypto(c) , remote(r) , m_LocalIdentity(localident) , intro(us) , introPubKey(introsetPubKey) , handler(h) { } static void Result(void* user) { AsyncKeyExchange* self = static_cast< AsyncKeyExchange* >(user); // put values self->handler->PutCachedSessionKeyFor(self->msg.tag, self->sharedKey); self->handler->PutIntroFor(self->msg.tag, self->intro); self->handler->PutSenderFor(self->msg.tag, self->remote); self->hook(self->frame); delete self; } /// given protocol message make protocol frame static void Encrypt(void* user) { AsyncKeyExchange* self = static_cast< AsyncKeyExchange* >(user); // derive ntru session key component SharedSecret K; self->crypto->pqe_encrypt(self->frame.C, K, self->introPubKey); // randomize Nounce self->frame.N.Randomize(); // compure post handshake session key byte_t tmp[64]; // K memcpy(tmp, K, 32); // PKE (A, B, N) if(!self->m_LocalIdentity.KeyExchange(self->crypto->dh_client, tmp + 32, self->remote, self->frame.N)) llarp::LogError("failed to derive x25519 shared key component"); // H (K + PKE(A, B, N)) self->crypto->shorthash(self->sharedKey, llarp::StackBuffer< decltype(tmp) >(tmp)); // randomize tag self->msg.tag.Randomize(); // set sender self->msg.sender = self->m_LocalIdentity.pub; // set our introduction self->msg.introReply = self->intro; // set version self->msg.version = LLARP_PROTO_VERSION; // set protocol self->msg.proto = eProtocolTraffic; // encrypt and sign if(self->frame.EncryptAndSign(self->crypto, self->msg, K, self->m_LocalIdentity)) llarp_logic_queue_job(self->logic, {self, &Result}); else { llarp::LogError("failed to encrypt and sign"); delete self; } } }; void Endpoint::EnsureReplyPath(const ServiceInfo& ident) { auto itr = m_AddressToService.find(ident.Addr()); if(itr == m_AddressToService.end()) m_AddressToService.insert(std::make_pair(ident.Addr(), ident)); } void Endpoint::OutboundContext::AsyncGenIntro(PathID_t p, llarp_buffer_t payload, ProtocolType t) { auto path = m_PathSet->GetPathByID(p); if(path == nullptr) return; AsyncKeyExchange* ex = new AsyncKeyExchange(m_Endpoint->RouterLogic(), m_Endpoint->Crypto(), remoteIdent, m_Endpoint->GetIdentity(), currentIntroSet.K, remoteIntro, m_DataHandler); ex->hook = std::bind(&Endpoint::OutboundContext::Send, this, p, std::placeholders::_1); ex->msg.PutBuffer(payload); ex->msg.introReply = path->intro; llarp_threadpool_queue_job(m_Endpoint->Worker(), {ex, &AsyncKeyExchange::Encrypt}); } void Endpoint::SendContext::Send(PathID_t p, ProtocolFrame& msg) { auto path = m_PathSet->GetPathByID(p); if(path) { routing::PathTransferMessage transfer(msg, remoteIntro.pathID); if(!path->SendRoutingMessage(&transfer, m_Endpoint->Router())) llarp::LogError("Failed to send frame on path"); } else llarp::LogError("cannot send becuase we have no path ", p); } std::string Endpoint::OutboundContext::Name() const { return "OBContext:" + m_Endpoint->Name() + "-" + currentIntroSet.A.Addr().ToString(); } void Endpoint::OutboundContext::UpdateIntroSet() { if(updatingIntroSet) return; auto addr = currentIntroSet.A.Addr(); auto path = m_Endpoint->GetEstablishedPathClosestTo(addr.data()); if(path) { HiddenServiceAddressLookup* job = new HiddenServiceAddressLookup( m_Endpoint, std::bind(&Endpoint::OutboundContext::OnIntroSetUpdate, this, std::placeholders::_1, std::placeholders::_2), addr, m_Endpoint->GenTXID()); updatingIntroSet = job->SendRequestViaPath(path, m_Endpoint->Router()); } else { llarp::LogWarn( "Cannot update introset no path for outbound session to ", currentIntroSet.A.Addr().ToString()); } } bool Endpoint::OutboundContext::Tick(llarp_time_t now) { if(remoteIntro.ExpiresSoon(now)) { ShiftIntroduction(); } m_Endpoint->EnsureRouterIsKnown(remoteIntro.router); // TODO: check for expiration of outbound context return false; } bool Endpoint::OutboundContext::SelectHop(llarp_nodedb* db, const RouterContact& prev, RouterContact& cur, size_t hop) { if(hop == numHops - 1) { if(llarp_nodedb_get_rc(db, remoteIntro.router, cur)) { return true; } else { // we don't have it? llarp::LogError( "cannot build aligned path, don't have router for " "introduction ", remoteIntro); m_Endpoint->EnsureRouterIsKnown(remoteIntro.router); return false; } } return path::Builder::SelectHop(db, prev, cur, hop); } uint64_t Endpoint::GetSeqNoForConvo(const ConvoTag& tag) { auto itr = m_Sessions.find(tag); if(itr == m_Sessions.end()) return 0; return ++(itr->second.seqno); } void Endpoint::SendContext::EncryptAndSendTo(const PathID_t& p, llarp_buffer_t payload, ProtocolType t) { std::set< ConvoTag > tags; if(!m_DataHandler->GetConvoTagsForService(remoteIdent, tags)) { llarp::LogError("no open converstations with remote endpoint?"); return; } auto crypto = m_Endpoint->Router()->crypto; const byte_t* shared = nullptr; routing::PathTransferMessage msg; ProtocolFrame& f = msg.T; f.N.Randomize(); f.T = *tags.begin(); f.S = m_Endpoint->GetSeqNoForConvo(f.T); auto path = m_PathSet->GetPathByID(p); if(!path) { llarp::LogError("cannot encrypt and send: no path with rxid=", p); return; } if(m_DataHandler->GetCachedSessionKeyFor(f.T, shared)) { ProtocolMessage m; m.proto = t; m.introReply = path->intro; m.sender = m_Endpoint->m_Identity.pub; m.PutBuffer(payload); if(!f.EncryptAndSign(&crypto, m, shared, m_Endpoint->m_Identity)) { llarp::LogError("failed to sign"); return; } } else { llarp::LogError("No cached session key"); return; } msg.P = remoteIntro.pathID; msg.Y.Randomize(); if(!path->SendRoutingMessage(&msg, m_Endpoint->Router())) { llarp::LogWarn("Failed to send routing message for data"); } } llarp_logic* Endpoint::RouterLogic() { return m_Router->logic; } llarp_logic* Endpoint::EndpointLogic() { return m_IsolatedLogic ? m_IsolatedLogic : m_Router->logic; } llarp_crypto* Endpoint::Crypto() { return &m_Router->crypto; } llarp_threadpool* Endpoint::Worker() { return m_Router->tp; } } // namespace service } // namespace llarp