mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-01-22 12:24:19 +00:00
check RouterInfo from SessionConfirmed
This commit is contained in:
parent
f96bfa6afa
commit
6cf158ac63
@ -150,7 +150,7 @@ namespace transport
|
|||||||
if (in_RemoteRouter) // Alice
|
if (in_RemoteRouter) // Alice
|
||||||
{
|
{
|
||||||
auto addr = in_RemoteRouter->GetNTCP2Address ();
|
auto addr = in_RemoteRouter->GetNTCP2Address ();
|
||||||
if (addr->ntcp2)
|
if (addr)
|
||||||
{
|
{
|
||||||
memcpy (m_Establisher->m_RemoteStaticKey, addr->ntcp2->staticKey, 32);
|
memcpy (m_Establisher->m_RemoteStaticKey, addr->ntcp2->staticKey, 32);
|
||||||
memcpy (m_Establisher->m_IV, addr->ntcp2->iv, 16);
|
memcpy (m_Establisher->m_IV, addr->ntcp2->iv, 16);
|
||||||
@ -469,7 +469,7 @@ namespace transport
|
|||||||
{
|
{
|
||||||
LogPrint (eLogDebug, "NTCP2: SessionConfirmed sent");
|
LogPrint (eLogDebug, "NTCP2: SessionConfirmed sent");
|
||||||
KeyDerivationFunctionDataPhase ();
|
KeyDerivationFunctionDataPhase ();
|
||||||
// Alice
|
// Alice data phase keys
|
||||||
m_SendKey = m_Kab;
|
m_SendKey = m_Kab;
|
||||||
m_ReceiveKey = m_Kba;
|
m_ReceiveKey = m_Kba;
|
||||||
m_SendSipKey = m_Sipkeysab;
|
m_SendSipKey = m_Sipkeysab;
|
||||||
@ -540,35 +540,63 @@ namespace transport
|
|||||||
memset (nonce, 0, 12); // set nonce to 0 again
|
memset (nonce, 0, 12); // set nonce to 0 again
|
||||||
if (i2p::crypto::AEADChaCha20Poly1305 (m_SessionConfirmedBuffer + 48, m_Establisher->m3p2Len - 16, m_Establisher->GetH (), 32, m_Establisher->GetK (), nonce, buf.data (), m_Establisher->m3p2Len - 16, false)) // decrypt
|
if (i2p::crypto::AEADChaCha20Poly1305 (m_SessionConfirmedBuffer + 48, m_Establisher->m3p2Len - 16, m_Establisher->GetH (), 32, m_Establisher->GetK (), nonce, buf.data (), m_Establisher->m3p2Len - 16, false)) // decrypt
|
||||||
{
|
{
|
||||||
// process RI
|
|
||||||
if (buf[0] == eNTCP2BlkRouterInfo)
|
|
||||||
{
|
|
||||||
auto size = bufbe16toh (buf.data () + 1);
|
|
||||||
if (size <= buf.size () - 3)
|
|
||||||
{
|
|
||||||
// TODO: check flag
|
|
||||||
i2p::data::netdb.AddRouterInfo (buf.data () + 4, size - 1); // 1 byte block type + 2 bytes size + 1 byte flag
|
|
||||||
// TODO: process options
|
|
||||||
}
|
|
||||||
else
|
|
||||||
LogPrint (eLogError, "NTCP2: Unexpected RouterInfo size ", size, " in SessionConfirmed");
|
|
||||||
}
|
|
||||||
else
|
|
||||||
LogPrint (eLogWarning, "NTCP2: unexpected block ", (int)buf[0], " in SessionConfirmed");
|
|
||||||
// caclulate new h again for KDF data
|
// caclulate new h again for KDF data
|
||||||
memcpy (m_SessionConfirmedBuffer + 16, m_Establisher->GetH (), 32); // h || ciphertext
|
memcpy (m_SessionConfirmedBuffer + 16, m_Establisher->GetH (), 32); // h || ciphertext
|
||||||
SHA256 (m_SessionConfirmedBuffer + 16, m_Establisher->m3p2Len + 32, m_Establisher->m_H); //h = SHA256(h || ciphertext);
|
SHA256 (m_SessionConfirmedBuffer + 16, m_Establisher->m3p2Len + 32, m_Establisher->m_H); //h = SHA256(h || ciphertext);
|
||||||
KeyDerivationFunctionDataPhase ();
|
KeyDerivationFunctionDataPhase ();
|
||||||
// Bob
|
// Bob data phase keys
|
||||||
m_SendKey = m_Kba;
|
m_SendKey = m_Kba;
|
||||||
m_ReceiveKey = m_Kab;
|
m_ReceiveKey = m_Kab;
|
||||||
m_SendSipKey = m_Sipkeysba;
|
m_SendSipKey = m_Sipkeysba;
|
||||||
m_ReceiveSipKey = m_Sipkeysab;
|
m_ReceiveSipKey = m_Sipkeysab;
|
||||||
memcpy (m_ReceiveIV, m_Sipkeysab + 16, 8);
|
memcpy (m_ReceiveIV, m_Sipkeysab + 16, 8);
|
||||||
memcpy (m_SendIV, m_Sipkeysba + 16, 8);
|
memcpy (m_SendIV, m_Sipkeysba + 16, 8);
|
||||||
|
|
||||||
|
// process RI
|
||||||
|
if (buf[0] != eNTCP2BlkRouterInfo)
|
||||||
|
{
|
||||||
|
LogPrint (eLogWarning, "NTCP2: unexpected block ", (int)buf[0], " in SessionConfirmed");
|
||||||
|
Terminate ();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
auto size = bufbe16toh (buf.data () + 1);
|
||||||
|
if (size > buf.size () - 3)
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "NTCP2: Unexpected RouterInfo size ", size, " in SessionConfirmed");
|
||||||
|
Terminate ();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
// TODO: check flag
|
||||||
|
i2p::data::RouterInfo ri (buf.data () + 4, size - 1); // 1 byte block type + 2 bytes size + 1 byte flag
|
||||||
|
if (ri.IsUnreachable ())
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "NTCP2: Signature verification failed in SessionConfirmed");
|
||||||
|
Terminate ();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
auto addr = ri.GetNTCP2Address ();
|
||||||
|
if (!addr)
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "NTCP2: No NTCP2 address found in SessionConfirmed");
|
||||||
|
Terminate ();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
if (memcmp (addr->ntcp2->staticKey, m_Establisher->m_RemoteStaticKey, 32))
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "NTCP2: Static key mistmatch in SessionConfirmed");
|
||||||
|
Terminate ();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
i2p::data::netdb.AddRouterInfo (buf.data () + 4, size - 1); // TODO: should insert ri and not parse it twice
|
||||||
|
// TODO: process options
|
||||||
|
|
||||||
|
// ready to communicate
|
||||||
|
auto existing = i2p::data::netdb.FindRouter (ri.GetRouterIdentity ()->GetIdentHash ()); // check if exists already
|
||||||
|
SetRemoteIdentity (existing ? existing->GetRouterIdentity () : ri.GetRouterIdentity ());
|
||||||
Established ();
|
Established ();
|
||||||
SendRouterInfo ();
|
SendRouterInfo ();
|
||||||
ReceiveLength ();
|
ReceiveLength ();
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user