mirror of https://github.com/PurpleI2P/i2pd.git
I2P: End-to-End encrypted and anonymous Internet
https://i2pd.website/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
297 lines
11 KiB
297 lines
11 KiB
/* |
|
* Copyright (c) 2013-2022, The PurpleI2P Project |
|
* |
|
* This file is part of Purple i2pd project and licensed under BSD3 |
|
* |
|
* See full license text in LICENSE file at top of project tree |
|
* |
|
*/ |
|
#ifndef NTCP2_H__ |
|
#define NTCP2_H__ |
|
|
|
#include <inttypes.h> |
|
#include <memory> |
|
#include <list> |
|
#include <map> |
|
#include <array> |
|
#include <openssl/bn.h> |
|
#include <openssl/evp.h> |
|
#include <boost/asio.hpp> |
|
#include "Crypto.h" |
|
#include "util.h" |
|
#include "RouterInfo.h" |
|
#include "TransportSession.h" |
|
|
|
namespace i2p |
|
{ |
|
namespace transport |
|
{ |
|
|
|
const size_t NTCP2_UNENCRYPTED_FRAME_MAX_SIZE = 65519; |
|
const size_t NTCP2_SESSION_REQUEST_MAX_SIZE = 287; |
|
const size_t NTCP2_SESSION_CREATED_MAX_SIZE = 287; |
|
const int NTCP2_MAX_PADDING_RATIO = 6; // in % |
|
|
|
const int NTCP2_CONNECT_TIMEOUT = 5; // 5 seconds |
|
const int NTCP2_ESTABLISH_TIMEOUT = 10; // 10 seconds |
|
const int NTCP2_TERMINATION_TIMEOUT = 120; // 2 minutes |
|
const int NTCP2_TERMINATION_CHECK_TIMEOUT = 30; // 30 seconds |
|
const int NTCP2_RECEIVE_BUFFER_DELETION_TIMEOUT = 3; // 3 seconds |
|
const int NTCP2_ROUTERINFO_RESEND_INTERVAL = 25*60; // 25 minuntes in seconds |
|
const int NTCP2_ROUTERINFO_RESEND_INTERVAL_THRESHOLD = 25*60; // 25 minuntes |
|
|
|
const int NTCP2_CLOCK_SKEW = 60; // in seconds |
|
const int NTCP2_MAX_OUTGOING_QUEUE_SIZE = 500; // how many messages we can queue up |
|
|
|
enum NTCP2BlockType |
|
{ |
|
eNTCP2BlkDateTime = 0, |
|
eNTCP2BlkOptions, // 1 |
|
eNTCP2BlkRouterInfo, // 2 |
|
eNTCP2BlkI2NPMessage, // 3 |
|
eNTCP2BlkTermination, // 4 |
|
eNTCP2BlkPadding = 254 |
|
}; |
|
|
|
enum NTCP2TerminationReason |
|
{ |
|
eNTCP2NormalClose = 0, |
|
eNTCP2TerminationReceived, // 1 |
|
eNTCP2IdleTimeout, // 2 |
|
eNTCP2RouterShutdown, // 3 |
|
eNTCP2DataPhaseAEADFailure, // 4 |
|
eNTCP2IncompatibleOptions, // 5 |
|
eNTCP2IncompatibleSignatureType, // 6 |
|
eNTCP2ClockSkew, // 7 |
|
eNTCP2PaddingViolation, // 8 |
|
eNTCP2AEADFramingError, // 9 |
|
eNTCP2PayloadFormatError, // 10 |
|
eNTCP2Message1Error, // 11 |
|
eNTCP2Message2Error, // 12 |
|
eNTCP2Message3Error, // 13 |
|
eNTCP2IntraFrameReadTimeout, // 14 |
|
eNTCP2RouterInfoSignatureVerificationFail, // 15 |
|
eNTCP2IncorrectSParameter, // 16 |
|
eNTCP2Banned, // 17 |
|
}; |
|
|
|
// RouterInfo flags |
|
const uint8_t NTCP2_ROUTER_INFO_FLAG_REQUEST_FLOOD = 0x01; |
|
|
|
struct NTCP2Establisher: private i2p::crypto::NoiseSymmetricState |
|
{ |
|
NTCP2Establisher (); |
|
~NTCP2Establisher (); |
|
|
|
const uint8_t * GetPub () const { return m_EphemeralKeys->GetPublicKey (); }; |
|
const uint8_t * GetRemotePub () const { return m_RemoteEphemeralPublicKey; }; // Y for Alice and X for Bob |
|
uint8_t * GetRemotePub () { return m_RemoteEphemeralPublicKey; }; // to set |
|
|
|
const uint8_t * GetK () const { return m_CK + 32; }; |
|
const uint8_t * GetCK () const { return m_CK; }; |
|
const uint8_t * GetH () const { return m_H; }; |
|
|
|
void KDF1Alice (); |
|
void KDF1Bob (); |
|
void KDF2Alice (); |
|
void KDF2Bob (); |
|
void KDF3Alice (); // for SessionConfirmed part 2 |
|
void KDF3Bob (); |
|
|
|
void KeyDerivationFunction1 (const uint8_t * pub, i2p::crypto::X25519Keys& priv, const uint8_t * rs, const uint8_t * epub); // for SessionRequest, (pub, priv) for DH |
|
void KeyDerivationFunction2 (const uint8_t * sessionRequest, size_t sessionRequestLen, const uint8_t * epub); // for SessionCreate |
|
void CreateEphemeralKey (); |
|
|
|
void CreateSessionRequestMessage (); |
|
void CreateSessionCreatedMessage (); |
|
void CreateSessionConfirmedMessagePart1 (const uint8_t * nonce); |
|
void CreateSessionConfirmedMessagePart2 (const uint8_t * nonce); |
|
|
|
bool ProcessSessionRequestMessage (uint16_t& paddingLen, bool& clockSkew); |
|
bool ProcessSessionCreatedMessage (uint16_t& paddingLen); |
|
bool ProcessSessionConfirmedMessagePart1 (const uint8_t * nonce); |
|
bool ProcessSessionConfirmedMessagePart2 (const uint8_t * nonce, uint8_t * m3p2Buf); |
|
|
|
std::shared_ptr<i2p::crypto::X25519Keys> m_EphemeralKeys; |
|
uint8_t m_RemoteEphemeralPublicKey[32]; // x25519 |
|
uint8_t m_RemoteStaticKey[32], m_IV[16]; |
|
i2p::data::IdentHash m_RemoteIdentHash; |
|
uint16_t m3p2Len; |
|
|
|
uint8_t m_SessionRequestBuffer[NTCP2_SESSION_REQUEST_MAX_SIZE], |
|
m_SessionCreatedBuffer[NTCP2_SESSION_CREATED_MAX_SIZE], * m_SessionConfirmedBuffer; |
|
size_t m_SessionRequestBufferLen, m_SessionCreatedBufferLen; |
|
|
|
}; |
|
|
|
class NTCP2Server; |
|
class NTCP2Session: public TransportSession, public std::enable_shared_from_this<NTCP2Session> |
|
{ |
|
public: |
|
|
|
NTCP2Session (NTCP2Server& server, std::shared_ptr<const i2p::data::RouterInfo> in_RemoteRouter = nullptr, |
|
std::shared_ptr<const i2p::data::RouterInfo::Address> addr = nullptr); |
|
~NTCP2Session (); |
|
void Terminate (); |
|
void TerminateByTimeout (); |
|
void Done () override; |
|
void Close () { m_Socket.close (); }; // for accept |
|
void DeleteNextReceiveBuffer (uint64_t ts); |
|
|
|
boost::asio::ip::tcp::socket& GetSocket () { return m_Socket; }; |
|
const boost::asio::ip::tcp::endpoint& GetRemoteEndpoint () { return m_RemoteEndpoint; }; |
|
void SetRemoteEndpoint (const boost::asio::ip::tcp::endpoint& ep) { m_RemoteEndpoint = ep; }; |
|
|
|
bool IsEstablished () const override { return m_IsEstablished; }; |
|
bool IsTerminated () const { return m_IsTerminated; }; |
|
|
|
void ClientLogin (); // Alice |
|
void ServerLogin (); // Bob |
|
|
|
void SendLocalRouterInfo (bool update) override; // after handshake or by update |
|
void SendI2NPMessages (const std::vector<std::shared_ptr<I2NPMessage> >& msgs) override; |
|
|
|
private: |
|
|
|
void Established (); |
|
|
|
void CreateNonce (uint64_t seqn, uint8_t * nonce); |
|
void CreateNextReceivedBuffer (size_t size); |
|
void KeyDerivationFunctionDataPhase (); |
|
void SetSipKeys (const uint8_t * sendSipKey, const uint8_t * receiveSipKey); |
|
|
|
// establish |
|
void SendSessionRequest (); |
|
void SendSessionCreated (); |
|
void SendSessionConfirmed (); |
|
|
|
void HandleSessionRequestSent (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void HandleSessionRequestReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void HandleSessionRequestPaddingReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void HandleSessionCreatedSent (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void HandleSessionCreatedReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void HandleSessionCreatedPaddingReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void HandleSessionConfirmedSent (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void HandleSessionConfirmedReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
|
|
// data |
|
void ReceiveLength (); |
|
void HandleReceivedLength (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void Receive (); |
|
void HandleReceived (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
void ProcessNextFrame (const uint8_t * frame, size_t len); |
|
|
|
void SetNextSentFrameLength (size_t frameLen, uint8_t * lengthBuf); |
|
void SendI2NPMsgs (std::vector<std::shared_ptr<I2NPMessage> >& msgs); |
|
void HandleI2NPMsgsSent (const boost::system::error_code& ecode, std::size_t bytes_transferred, std::vector<std::shared_ptr<I2NPMessage> > msgs); |
|
void EncryptAndSendNextBuffer (size_t payloadLen); |
|
void HandleNextFrameSent (const boost::system::error_code& ecode, std::size_t bytes_transferred); |
|
size_t CreatePaddingBlock (size_t msgLen, uint8_t * buf, size_t len); |
|
void SendQueue (); |
|
void SendRouterInfo (); |
|
void SendTermination (NTCP2TerminationReason reason); |
|
void SendTerminationAndTerminate (NTCP2TerminationReason reason); |
|
void PostI2NPMessages (std::vector<std::shared_ptr<I2NPMessage> > msgs); |
|
|
|
private: |
|
|
|
NTCP2Server& m_Server; |
|
boost::asio::ip::tcp::socket m_Socket; |
|
boost::asio::ip::tcp::endpoint m_RemoteEndpoint; |
|
bool m_IsEstablished, m_IsTerminated; |
|
|
|
std::unique_ptr<NTCP2Establisher> m_Establisher; |
|
// data phase |
|
uint8_t m_Kab[32], m_Kba[32], m_Sipkeysab[32], m_Sipkeysba[32]; |
|
const uint8_t * m_SendKey, * m_ReceiveKey; |
|
#if OPENSSL_SIPHASH |
|
EVP_MD_CTX * m_SendMDCtx, * m_ReceiveMDCtx; |
|
#else |
|
const uint8_t * m_SendSipKey, * m_ReceiveSipKey; |
|
#endif |
|
uint16_t m_NextReceivedLen; |
|
uint8_t * m_NextReceivedBuffer, * m_NextSendBuffer; |
|
size_t m_NextReceivedBufferSize; |
|
union |
|
{ |
|
uint8_t buf[8]; |
|
uint16_t key; |
|
} m_ReceiveIV, m_SendIV; |
|
uint64_t m_ReceiveSequenceNumber, m_SendSequenceNumber; |
|
|
|
i2p::I2NPMessagesHandler m_Handler; |
|
|
|
bool m_IsSending, m_IsReceiving; |
|
std::list<std::shared_ptr<I2NPMessage> > m_SendQueue; |
|
uint64_t m_NextRouterInfoResendTime; // seconds since epoch |
|
|
|
uint16_t m_PaddingSizes[16]; |
|
int m_NextPaddingSize; |
|
}; |
|
|
|
class NTCP2Server: private i2p::util::RunnableServiceWithWork |
|
{ |
|
public: |
|
|
|
enum ProxyType |
|
{ |
|
eNoProxy, |
|
eSocksProxy, |
|
eHTTPProxy |
|
}; |
|
|
|
NTCP2Server (); |
|
~NTCP2Server (); |
|
|
|
void Start (); |
|
void Stop (); |
|
boost::asio::io_service& GetService () { return GetIOService (); }; |
|
|
|
bool AddNTCP2Session (std::shared_ptr<NTCP2Session> session, bool incoming = false); |
|
void RemoveNTCP2Session (std::shared_ptr<NTCP2Session> session); |
|
std::shared_ptr<NTCP2Session> FindNTCP2Session (const i2p::data::IdentHash& ident); |
|
|
|
void ConnectWithProxy (std::shared_ptr<NTCP2Session> conn); |
|
void Connect(std::shared_ptr<NTCP2Session> conn); |
|
|
|
bool UsingProxy() const { return m_ProxyType != eNoProxy; }; |
|
void UseProxy(ProxyType proxy, const std::string& address, uint16_t port, const std::string& user, const std::string& pass); |
|
|
|
void SetLocalAddress (const boost::asio::ip::address& localAddress); |
|
|
|
private: |
|
|
|
void HandleAccept (std::shared_ptr<NTCP2Session> conn, const boost::system::error_code& error); |
|
void HandleAcceptV6 (std::shared_ptr<NTCP2Session> conn, const boost::system::error_code& error); |
|
|
|
void HandleConnect (const boost::system::error_code& ecode, std::shared_ptr<NTCP2Session> conn, std::shared_ptr<boost::asio::deadline_timer> timer); |
|
void HandleProxyConnect(const boost::system::error_code& ecode, std::shared_ptr<NTCP2Session> conn, std::shared_ptr<boost::asio::deadline_timer> timer); |
|
void AfterSocksHandshake(std::shared_ptr<NTCP2Session> conn, std::shared_ptr<boost::asio::deadline_timer> timer); |
|
|
|
// timer |
|
void ScheduleTermination (); |
|
void HandleTerminationTimer (const boost::system::error_code& ecode); |
|
|
|
private: |
|
|
|
boost::asio::deadline_timer m_TerminationTimer; |
|
std::unique_ptr<boost::asio::ip::tcp::acceptor> m_NTCP2Acceptor, m_NTCP2V6Acceptor; |
|
std::map<i2p::data::IdentHash, std::shared_ptr<NTCP2Session> > m_NTCP2Sessions; |
|
std::list<std::shared_ptr<NTCP2Session> > m_PendingIncomingSessions; |
|
|
|
ProxyType m_ProxyType; |
|
std::string m_ProxyAddress, m_ProxyAuthorization; |
|
uint16_t m_ProxyPort; |
|
boost::asio::ip::tcp::resolver m_Resolver; |
|
std::unique_ptr<boost::asio::ip::tcp::endpoint> m_ProxyEndpoint; |
|
std::shared_ptr<boost::asio::ip::tcp::endpoint> m_Address4, m_Address6, m_YggdrasilAddress; |
|
|
|
public: |
|
|
|
// for HTTP/I2PControl |
|
const decltype(m_NTCP2Sessions)& GetNTCP2Sessions () const { return m_NTCP2Sessions; }; |
|
}; |
|
} |
|
} |
|
|
|
#endif
|
|
|