/* * Copyright (c) 2013-2021, The PurpleI2P Project * * This file is part of Purple i2pd project and licensed under BSD3 * * See full license text in LICENSE file at top of project tree */ #ifndef ECIES_X25519_AEAD_RATCHET_SESSION_H__ #define ECIES_X25519_AEAD_RATCHET_SESSION_H__ #include #include #include #include #include #include #include #include "Identity.h" #include "Crypto.h" #include "Garlic.h" #include "Tag.h" namespace i2p { namespace garlic { const int ECIESX25519_RESTART_TIMEOUT = 120; // number of second since session creation we can restart session after const int ECIESX25519_INACTIVITY_TIMEOUT = 90; // number of seconds we receive nothing and should restart if we can const int ECIESX25519_SEND_INACTIVITY_TIMEOUT = 5000; // number of milliseconds we can send empty(pyaload only) packet after const int ECIESX25519_SEND_EXPIRATION_TIMEOUT = 480; // in seconds const int ECIESX25519_RECEIVE_EXPIRATION_TIMEOUT = 600; // in seconds const int ECIESX25519_PREVIOUS_TAGSET_EXPIRATION_TIMEOUT = 180; // 180 const int ECIESX25519_TAGSET_MAX_NUM_TAGS = 8192; // number of tags we request new tagset after const int ECIESX25519_MIN_NUM_GENERATED_TAGS = 24; const int ECIESX25519_MAX_NUM_GENERATED_TAGS = 320; const int ECIESX25519_NSR_NUM_GENERATED_TAGS = 12; const size_t ECIESX25519_OPTIMAL_PAYLOAD_SIZE = 1912; // 1912 = 1956 /* to fit 2 tunnel messages */ // - 16 /* I2NP header */ - 16 /* poly hash */ - 8 /* tag */ - 4 /* garlic length */ class RatchetTagSet { public: RatchetTagSet() {}; virtual ~RatchetTagSet() {}; void DHInitialize(const uint8_t *rootKey, const uint8_t *k); void NextSessionTagRatchet(); uint64_t GetNextSessionTag(); const uint8_t *GetNextRootKey() const { return m_NextRootKey; }; int GetNextIndex() const { return m_NextIndex; }; void GetSymmKey(int index, uint8_t *key); void DeleteSymmKey(int index); int GetTagSetID() const { return m_TagSetID; }; void SetTagSetID(int tagsetID) { m_TagSetID = tagsetID; }; private: i2p::data::Tag<64> m_SessionTagKeyData; uint8_t m_SessTagConstant[32], m_SymmKeyCK[32], m_CurrentSymmKeyCK[64], m_NextRootKey[32]; int m_NextIndex, m_NextSymmKeyIndex; std::unordered_map > m_ItermediateSymmKeys; int m_TagSetID = 0; }; class ECIESX25519AEADRatchetSession; class ReceiveRatchetTagSet : public RatchetTagSet, public std::enable_shared_from_this { public: ReceiveRatchetTagSet(std::shared_ptr session, bool isNS = false) : m_Session(session), m_IsNS(isNS) {}; bool IsNS() const { return m_IsNS; }; std::shared_ptr GetSession() { return m_Session; }; void SetTrimBehind(int index) { if (index > m_TrimBehindIndex) m_TrimBehindIndex = index; }; int GetTrimBehind() const { return m_TrimBehindIndex; }; void Expire(); bool IsExpired(uint64_t ts) const; virtual bool IsIndexExpired(int index) const; virtual bool HandleNextMessage(uint8_t *buf, size_t len, int index); private: int m_TrimBehindIndex = 0; std::shared_ptr m_Session; bool m_IsNS; uint64_t m_ExpirationTimestamp = 0; }; class SymmetricKeyTagSet : public ReceiveRatchetTagSet { public: SymmetricKeyTagSet(GarlicDestination *destination, const uint8_t *key); bool IsIndexExpired(int index) const { return false; }; bool HandleNextMessage(uint8_t *buf, size_t len, int index); private: GarlicDestination *m_Destination; uint8_t m_Key[32]; }; enum ECIESx25519BlockType { eECIESx25519BlkDateTime = 0, eECIESx25519BlkSessionID = 1, eECIESx25519BlkTermination = 4, eECIESx25519BlkOptions = 5, eECIESx25519BlkNextKey = 7, eECIESx25519BlkAck = 8, eECIESx25519BlkAckRequest = 9, eECIESx25519BlkGalicClove = 11, eECIESx25519BlkPadding = 254 }; const uint8_t ECIESX25519_NEXT_KEY_KEY_PRESENT_FLAG = 0x01; const uint8_t ECIESX25519_NEXT_KEY_REVERSE_KEY_FLAG = 0x02; const uint8_t ECIESX25519_NEXT_KEY_REQUEST_REVERSE_KEY_FLAG = 0x04; class ECIESX25519AEADRatchetSession : public GarlicRoutingSession, private i2p::crypto::NoiseSymmetricState, public std::enable_shared_from_this { enum SessionState { eSessionStateNew = 0, eSessionStateNewSessionReceived, eSessionStateNewSessionSent, eSessionStateNewSessionReplySent, eSessionStateEstablished, eSessionStateOneTime }; struct DHRatchet { int keyID = 0; std::shared_ptr key; uint8_t remote[32]; // last remote public key bool newKey = true; }; public: ECIESX25519AEADRatchetSession(GarlicDestination *owner, bool attachLeaseSetNS); ~ECIESX25519AEADRatchetSession(); bool HandleNextMessage(uint8_t *buf, size_t len, std::shared_ptr receiveTagset, int index = 0); std::shared_ptr WrapSingleMessage(std::shared_ptr msg); std::shared_ptr WrapOneTimeMessage(std::shared_ptr msg); const uint8_t *GetRemoteStaticKey() const { return m_RemoteStaticKey; } void SetRemoteStaticKey(const uint8_t *key) { memcpy(m_RemoteStaticKey, key, 32); } void Terminate() { m_IsTerminated = true; } void SetDestination(const i2p::data::IdentHash &dest) // TODO: { if (!m_Destination) m_Destination.reset(new i2p::data::IdentHash(dest)); } bool CheckExpired(uint64_t ts); // true is expired bool CanBeRestarted(uint64_t ts) const { return ts > m_SessionCreatedTimestamp + ECIESX25519_RESTART_TIMEOUT; } bool IsInactive(uint64_t ts) const { return ts > m_LastActivityTimestamp + ECIESX25519_INACTIVITY_TIMEOUT && CanBeRestarted(ts); } bool IsRatchets() const { return true; }; bool IsReadyToSend() const { return m_State != eSessionStateNewSessionSent; }; bool IsTerminated() const { return m_IsTerminated; } uint64_t GetLastActivityTimestamp() const { return m_LastActivityTimestamp; }; protected: i2p::crypto::NoiseSymmetricState &GetNoiseState() { return *this; }; void SetNoiseState(const i2p::crypto::NoiseSymmetricState &state) { GetNoiseState() = state; }; void CreateNonce(uint64_t seqn, uint8_t *nonce); void HandlePayload(const uint8_t *buf, size_t len, const std::shared_ptr &receiveTagset, int index); private: bool GenerateEphemeralKeysAndEncode(uint8_t *buf); // buf is 32 bytes void InitNewSessionTagset(std::shared_ptr tagsetNsr) const; bool HandleNewIncomingSession(const uint8_t *buf, size_t len); bool HandleNewOutgoingSessionReply(uint8_t *buf, size_t len); bool HandleExistingSessionMessage(uint8_t *buf, size_t len, std::shared_ptr receiveTagset, int index); void HandleNextKey(const uint8_t *buf, size_t len, const std::shared_ptr &receiveTagset); bool NewOutgoingSessionMessage(const uint8_t *payload, size_t len, uint8_t *out, size_t outLen, bool isStatic = true); bool NewSessionReplyMessage(const uint8_t *payload, size_t len, uint8_t *out, size_t outLen); bool NextNewSessionReplyMessage(const uint8_t *payload, size_t len, uint8_t *out, size_t outLen); bool NewExistingSessionMessage(const uint8_t *payload, size_t len, uint8_t *out, size_t outLen); size_t CreatePayload(std::shared_ptr msg, bool first, uint8_t *payload); size_t CreateGarlicClove(std::shared_ptr msg, uint8_t *buf, size_t len); size_t CreateLeaseSetClove(std::shared_ptr ls, uint64_t ts, uint8_t *buf, size_t len); void GenerateMoreReceiveTags(std::shared_ptr receiveTagset, int numTags); void NewNextSendRatchet(); private: uint8_t m_RemoteStaticKey[32]; uint8_t m_Aepk[32]; // Alice's ephemeral keys, for incoming only uint8_t m_NSREncodedKey[32], m_NSRH[32], m_NSRKey[32]; // new session reply, for incoming only std::shared_ptr m_EphemeralKeys; SessionState m_State = eSessionStateNew; uint64_t m_SessionCreatedTimestamp = 0, m_LastActivityTimestamp = 0, // incoming (in seconds) m_LastSentTimestamp = 0; // in milliseconds std::shared_ptr m_SendTagset, m_NSRSendTagset; std::unique_ptr m_Destination;// TODO: might not need it std::list > m_AckRequests; // (tagsetid, index) bool m_SendReverseKey = false, m_SendForwardKey = false, m_IsTerminated = false; std::unique_ptr m_NextReceiveRatchet, m_NextSendRatchet; uint8_t m_PaddingSizes[32], m_NextPaddingSize; public: // for HTTP only int GetState() const { return (int) m_State; } i2p::data::IdentHash GetDestination() const { return m_Destination ? *m_Destination : i2p::data::IdentHash(); } }; // single session for all incoming messages class RouterIncomingRatchetSession : public ECIESX25519AEADRatchetSession { public: RouterIncomingRatchetSession(const i2p::crypto::NoiseSymmetricState &initState); bool HandleNextMessage(const uint8_t *buf, size_t len); i2p::crypto::NoiseSymmetricState &GetCurrentNoiseState() { return m_CurrentNoiseState; }; private: i2p::crypto::NoiseSymmetricState m_CurrentNoiseState; }; std::shared_ptr WrapECIESX25519Message(std::shared_ptr msg, const uint8_t *key, uint64_t tag); std::shared_ptr WrapECIESX25519MessageForRouter(std::shared_ptr msg, const uint8_t *routerPublicKey); } } #endif