2019-01-07 11:33:07 +01:00
|
|
|
// Copyright 2015-2019 Parity Technologies (UK) Ltd.
|
|
|
|
// This file is part of Parity Ethereum.
|
2016-02-05 13:40:41 +01:00
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is free software: you can redistribute it and/or modify
|
2016-02-05 13:40:41 +01:00
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is distributed in the hope that it will be useful,
|
2016-02-05 13:40:41 +01:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
|
|
|
|
// You should have received a copy of the GNU General Public License
|
2019-01-07 11:33:07 +01:00
|
|
|
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
|
2016-02-05 13:40:41 +01:00
|
|
|
|
2018-04-14 21:35:58 +02:00
|
|
|
use std::time::Duration;
|
2019-06-03 19:21:29 +02:00
|
|
|
|
|
|
|
use ethereum_types::{H256, H520};
|
2019-06-19 12:20:50 +02:00
|
|
|
use keccak_hash::write_keccak;
|
|
|
|
use log::{debug, trace};
|
2015-11-30 16:38:55 +01:00
|
|
|
use mio::tcp::*;
|
Delete crates from parity-ethereum and fetch them from parity-common instead (#9083)
Use crates from parity-common: hashdb, keccak-hash, kvdb, kvdb-memorydb, kvdb-rocksdb, memorydb, parity-bytes, parity-crypto, path, patricia_trie, plain_hasher, rlp, target, test-support, trie-standardmap, triehash
2018-07-10 14:59:19 +02:00
|
|
|
use parity_bytes::Bytes;
|
2019-06-03 19:21:29 +02:00
|
|
|
use rand::random;
|
2018-04-16 15:52:12 +02:00
|
|
|
use rlp::{Rlp, RlpStream};
|
2019-06-03 19:21:29 +02:00
|
|
|
|
2019-06-19 12:20:50 +02:00
|
|
|
use ethcore_io::{IoContext, StreamToken};
|
2019-06-03 19:21:29 +02:00
|
|
|
use ethkey::{Generator, KeyPair, Public, Random, recover, Secret, sign};
|
2018-05-05 11:02:33 +02:00
|
|
|
use ethkey::crypto::{ecdh, ecies};
|
2019-06-17 08:44:59 +02:00
|
|
|
use network::Error;
|
2019-06-19 12:20:50 +02:00
|
|
|
|
|
|
|
use crate::connection::Connection;
|
|
|
|
use crate::host::HostInfo;
|
|
|
|
use crate::node_table::NodeId;
|
2015-11-30 16:38:55 +01:00
|
|
|
|
2015-12-17 11:42:30 +01:00
|
|
|
#[derive(PartialEq, Eq, Debug)]
|
2015-11-30 16:38:55 +01:00
|
|
|
enum HandshakeState {
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Just created
|
2015-11-30 16:38:55 +01:00
|
|
|
New,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Waiting for auth packet
|
2015-11-30 16:38:55 +01:00
|
|
|
ReadingAuth,
|
2016-02-22 23:05:27 +01:00
|
|
|
/// Waiting for extended auth packet
|
|
|
|
ReadingAuthEip8,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Waiting for ack packet
|
2015-11-30 16:38:55 +01:00
|
|
|
ReadingAck,
|
2016-02-22 23:05:27 +01:00
|
|
|
/// Waiting for extended ack packet
|
|
|
|
ReadingAckEip8,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Ready to start a session
|
2015-11-30 16:38:55 +01:00
|
|
|
StartSession,
|
|
|
|
}
|
|
|
|
|
2018-08-17 16:04:03 +02:00
|
|
|
/// `RLPx` protocol handshake. See https://github.com/ethereum/devp2p/blob/master/rlpx.md#encrypted-handshake
|
2015-11-30 16:38:55 +01:00
|
|
|
pub struct Handshake {
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Remote node public key
|
2015-11-30 16:38:55 +01:00
|
|
|
pub id: NodeId,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Underlying connection
|
2015-11-30 16:38:55 +01:00
|
|
|
pub connection: Connection,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Handshake state
|
2015-11-30 16:38:55 +01:00
|
|
|
state: HandshakeState,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Outgoing or incoming connection
|
2015-12-02 12:07:46 +01:00
|
|
|
pub originated: bool,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// ECDH ephemeral
|
2015-12-02 12:07:46 +01:00
|
|
|
pub ecdhe: KeyPair,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Connection nonce
|
2015-12-02 12:07:46 +01:00
|
|
|
pub nonce: H256,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Handshake public key
|
2016-02-22 23:05:27 +01:00
|
|
|
pub remote_ephemeral: Public,
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Remote connection nonce.
|
2015-12-02 12:07:46 +01:00
|
|
|
pub remote_nonce: H256,
|
2016-04-06 10:07:24 +02:00
|
|
|
/// Remote `RLPx` protocol version.
|
2016-02-22 23:05:27 +01:00
|
|
|
pub remote_version: u64,
|
2018-08-17 16:04:03 +02:00
|
|
|
/// A copy of received encrypted auth packet
|
2015-12-02 12:07:46 +01:00
|
|
|
pub auth_cipher: Bytes,
|
2018-08-17 16:04:03 +02:00
|
|
|
/// A copy of received encrypted ack packet
|
2016-02-20 01:10:27 +01:00
|
|
|
pub ack_cipher: Bytes,
|
2015-11-30 16:38:55 +01:00
|
|
|
}
|
|
|
|
|
2016-02-22 23:05:27 +01:00
|
|
|
const V4_AUTH_PACKET_SIZE: usize = 307;
|
|
|
|
const V4_ACK_PACKET_SIZE: usize = 210;
|
2018-04-14 21:35:58 +02:00
|
|
|
const HANDSHAKE_TIMEOUT: Duration = Duration::from_secs(5);
|
2016-02-22 23:05:27 +01:00
|
|
|
const PROTOCOL_VERSION: u64 = 4;
|
|
|
|
// Amount of bytes added when encrypting with encryptECIES.
|
|
|
|
const ECIES_OVERHEAD: usize = 113;
|
2015-12-02 12:07:46 +01:00
|
|
|
|
2015-11-30 16:38:55 +01:00
|
|
|
impl Handshake {
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Create a new handshake object
|
2018-03-28 08:45:36 +02:00
|
|
|
pub fn new(token: StreamToken, id: Option<&NodeId>, socket: TcpStream, nonce: &H256) -> Result<Handshake, Error> {
|
2015-11-30 16:38:55 +01:00
|
|
|
Ok(Handshake {
|
2019-06-03 15:36:21 +02:00
|
|
|
id: if let Some(id) = id { *id } else { NodeId::default() },
|
2018-03-28 08:45:36 +02:00
|
|
|
connection: Connection::new(token, socket),
|
2015-12-02 12:07:46 +01:00
|
|
|
originated: false,
|
2015-11-30 16:38:55 +01:00
|
|
|
state: HandshakeState::New,
|
2016-12-27 12:53:56 +01:00
|
|
|
ecdhe: Random.generate()?,
|
2018-05-31 13:38:46 +02:00
|
|
|
nonce: *nonce,
|
2019-06-03 15:36:21 +02:00
|
|
|
remote_ephemeral: Public::default(),
|
|
|
|
remote_nonce: H256::zero(),
|
2016-02-22 23:05:27 +01:00
|
|
|
remote_version: PROTOCOL_VERSION,
|
2015-12-02 12:07:46 +01:00
|
|
|
auth_cipher: Bytes::new(),
|
|
|
|
ack_cipher: Bytes::new(),
|
2015-11-30 16:38:55 +01:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-08-17 16:04:03 +02:00
|
|
|
/// Start a handshake
|
2017-11-13 14:37:08 +01:00
|
|
|
pub fn start<Message>(&mut self, io: &IoContext<Message>, host: &HostInfo, originated: bool) -> Result<(), Error> where Message: Send + Clone+ Sync + 'static {
|
2015-12-02 12:07:46 +01:00
|
|
|
self.originated = originated;
|
2016-01-21 16:48:37 +01:00
|
|
|
io.register_timer(self.connection.token, HANDSHAKE_TIMEOUT).ok();
|
2015-11-30 16:38:55 +01:00
|
|
|
if originated {
|
2016-12-27 12:53:56 +01:00
|
|
|
self.write_auth(io, host.secret(), host.id())?;
|
2015-12-03 15:11:40 +01:00
|
|
|
}
|
2015-11-30 16:38:55 +01:00
|
|
|
else {
|
2015-12-02 12:07:46 +01:00
|
|
|
self.state = HandshakeState::ReadingAuth;
|
2016-02-22 23:05:27 +01:00
|
|
|
self.connection.expect(V4_AUTH_PACKET_SIZE);
|
2015-11-30 16:38:55 +01:00
|
|
|
};
|
2015-12-02 12:07:46 +01:00
|
|
|
Ok(())
|
2015-11-30 16:38:55 +01:00
|
|
|
}
|
|
|
|
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Check if handshake is complete
|
2015-11-30 16:38:55 +01:00
|
|
|
pub fn done(&self) -> bool {
|
|
|
|
self.state == HandshakeState::StartSession
|
|
|
|
}
|
|
|
|
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Readable IO handler. Drives the state change.
|
2017-11-13 14:37:08 +01:00
|
|
|
pub fn readable<Message>(&mut self, io: &IoContext<Message>, host: &HostInfo) -> Result<(), Error> where Message: Send + Clone + Sync + 'static {
|
2018-10-10 23:17:17 +02:00
|
|
|
while let Some(data) = self.connection.readable()? {
|
|
|
|
match self.state {
|
|
|
|
HandshakeState::New => {},
|
|
|
|
HandshakeState::StartSession => {},
|
|
|
|
HandshakeState::ReadingAuth => {
|
|
|
|
self.read_auth(io, host.secret(), &data)?;
|
|
|
|
},
|
|
|
|
HandshakeState::ReadingAuthEip8 => {
|
|
|
|
self.read_auth_eip8(io, host.secret(), &data)?;
|
|
|
|
},
|
|
|
|
HandshakeState::ReadingAck => {
|
|
|
|
self.read_ack(host.secret(), &data)?;
|
|
|
|
},
|
|
|
|
HandshakeState::ReadingAckEip8 => {
|
|
|
|
self.read_ack_eip8(host.secret(), &data)?;
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if self.state == HandshakeState::StartSession {
|
|
|
|
io.clear_timer(self.connection.token).ok();
|
|
|
|
break;
|
2016-02-20 01:10:27 +01:00
|
|
|
}
|
2015-12-03 15:11:40 +01:00
|
|
|
}
|
2015-11-30 16:38:55 +01:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-08-17 16:04:03 +02:00
|
|
|
/// Writable IO handler.
|
2017-11-13 14:37:08 +01:00
|
|
|
pub fn writable<Message>(&mut self, io: &IoContext<Message>) -> Result<(), Error> where Message: Send + Clone + Sync + 'static {
|
2018-10-10 23:17:17 +02:00
|
|
|
self.connection.writable(io)?;
|
2015-11-30 16:38:55 +01:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2017-11-13 14:37:08 +01:00
|
|
|
fn set_auth(&mut self, host_secret: &Secret, sig: &[u8], remote_public: &[u8], remote_nonce: &[u8], remote_version: u64) -> Result<(), Error> {
|
2019-06-03 15:36:21 +02:00
|
|
|
// TODO: assign_from_slice will panic if sizes differ
|
|
|
|
self.id.assign_from_slice(remote_public);
|
|
|
|
self.remote_nonce.assign_from_slice(remote_nonce);
|
2016-02-22 23:05:27 +01:00
|
|
|
self.remote_version = remote_version;
|
2017-01-11 12:16:47 +01:00
|
|
|
let shared = *ecdh::agree(host_secret, &self.id)?;
|
2016-08-24 18:35:21 +02:00
|
|
|
let signature = H520::from_slice(sig);
|
2018-05-31 13:38:46 +02:00
|
|
|
self.remote_ephemeral = recover(&signature.into(), &(shared ^ self.remote_nonce))?;
|
2016-02-22 23:05:27 +01:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Parse, validate and confirm auth message
|
2017-11-13 14:37:08 +01:00
|
|
|
fn read_auth<Message>(&mut self, io: &IoContext<Message>, secret: &Secret, data: &[u8]) -> Result<(), Error> where Message: Send + Clone + Sync + 'static {
|
2016-07-26 16:04:14 +02:00
|
|
|
trace!(target: "network", "Received handshake auth from {:?}", self.connection.remote_addr_str());
|
2016-02-22 23:05:27 +01:00
|
|
|
if data.len() != V4_AUTH_PACKET_SIZE {
|
2016-07-26 16:04:14 +02:00
|
|
|
debug!(target: "network", "Wrong auth packet size");
|
2019-06-17 08:44:59 +02:00
|
|
|
return Err(Error::BadProtocol);
|
2016-01-24 18:53:54 +01:00
|
|
|
}
|
2015-12-02 12:07:46 +01:00
|
|
|
self.auth_cipher = data.to_vec();
|
2016-02-22 23:05:27 +01:00
|
|
|
match ecies::decrypt(secret, &[], data) {
|
|
|
|
Ok(auth) => {
|
|
|
|
let (sig, rest) = auth.split_at(65);
|
|
|
|
let (_, rest) = rest.split_at(32);
|
|
|
|
let (pubk, rest) = rest.split_at(64);
|
|
|
|
let (nonce, _) = rest.split_at(32);
|
2016-12-27 12:53:56 +01:00
|
|
|
self.set_auth(secret, sig, pubk, nonce, PROTOCOL_VERSION)?;
|
|
|
|
self.write_ack(io)?;
|
2016-02-22 23:05:27 +01:00
|
|
|
}
|
|
|
|
Err(_) => {
|
|
|
|
// Try to interpret as EIP-8 packet
|
2018-05-31 13:38:46 +02:00
|
|
|
let total = ((u16::from(data[0]) << 8 | (u16::from(data[1]))) as usize) + 2;
|
2016-02-27 15:07:21 +01:00
|
|
|
if total < V4_AUTH_PACKET_SIZE {
|
2016-07-26 16:04:14 +02:00
|
|
|
debug!(target: "network", "Wrong EIP8 auth packet size");
|
2019-06-17 08:44:59 +02:00
|
|
|
return Err(Error::BadProtocol);
|
2016-02-22 23:05:27 +01:00
|
|
|
}
|
2016-02-27 15:07:21 +01:00
|
|
|
let rest = total - data.len();
|
2016-02-22 23:05:27 +01:00
|
|
|
self.state = HandshakeState::ReadingAuthEip8;
|
|
|
|
self.connection.expect(rest);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2017-11-13 14:37:08 +01:00
|
|
|
fn read_auth_eip8<Message>(&mut self, io: &IoContext<Message>, secret: &Secret, data: &[u8]) -> Result<(), Error> where Message: Send + Clone + Sync + 'static {
|
2016-07-26 16:04:14 +02:00
|
|
|
trace!(target: "network", "Received EIP8 handshake auth from {:?}", self.connection.remote_addr_str());
|
2016-02-22 23:05:27 +01:00
|
|
|
self.auth_cipher.extend_from_slice(data);
|
2016-12-27 12:53:56 +01:00
|
|
|
let auth = ecies::decrypt(secret, &self.auth_cipher[0..2], &self.auth_cipher[2..])?;
|
2018-04-16 15:52:12 +02:00
|
|
|
let rlp = Rlp::new(&auth);
|
2016-12-27 12:53:56 +01:00
|
|
|
let signature: H520 = rlp.val_at(0)?;
|
|
|
|
let remote_public: Public = rlp.val_at(1)?;
|
|
|
|
let remote_nonce: H256 = rlp.val_at(2)?;
|
|
|
|
let remote_version: u64 = rlp.val_at(3)?;
|
2019-06-03 15:36:21 +02:00
|
|
|
self.set_auth(secret, signature.as_bytes(), remote_public.as_bytes(), remote_nonce.as_bytes(), remote_version)?;
|
2016-12-27 12:53:56 +01:00
|
|
|
self.write_ack_eip8(io)?;
|
2016-01-24 18:53:54 +01:00
|
|
|
Ok(())
|
2015-11-30 16:38:55 +01:00
|
|
|
}
|
|
|
|
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Parse and validate ack message
|
2017-11-13 14:37:08 +01:00
|
|
|
fn read_ack(&mut self, secret: &Secret, data: &[u8]) -> Result<(), Error> {
|
2016-07-26 16:04:14 +02:00
|
|
|
trace!(target: "network", "Received handshake ack from {:?}", self.connection.remote_addr_str());
|
2016-02-22 23:05:27 +01:00
|
|
|
if data.len() != V4_ACK_PACKET_SIZE {
|
2016-07-26 16:04:14 +02:00
|
|
|
debug!(target: "network", "Wrong ack packet size");
|
2019-06-17 08:44:59 +02:00
|
|
|
return Err(Error::BadProtocol);
|
2016-01-24 18:53:54 +01:00
|
|
|
}
|
2015-12-02 12:07:46 +01:00
|
|
|
self.ack_cipher = data.to_vec();
|
2016-02-22 23:05:27 +01:00
|
|
|
match ecies::decrypt(secret, &[], data) {
|
|
|
|
Ok(ack) => {
|
2019-06-03 15:36:21 +02:00
|
|
|
self.remote_ephemeral.assign_from_slice(&ack[0..64]);
|
|
|
|
self.remote_nonce.assign_from_slice(&ack[64..(64+32)]);
|
2016-02-22 23:05:27 +01:00
|
|
|
self.state = HandshakeState::StartSession;
|
|
|
|
}
|
|
|
|
Err(_) => {
|
|
|
|
// Try to interpret as EIP-8 packet
|
2018-05-31 13:38:46 +02:00
|
|
|
let total = (((u16::from(data[0])) << 8 | (u16::from(data[1]))) as usize) + 2;
|
2016-02-27 15:05:13 +01:00
|
|
|
if total < V4_ACK_PACKET_SIZE {
|
2016-07-26 16:04:14 +02:00
|
|
|
debug!(target: "network", "Wrong EIP8 ack packet size");
|
2019-06-17 08:44:59 +02:00
|
|
|
return Err(Error::BadProtocol);
|
2016-02-22 23:05:27 +01:00
|
|
|
}
|
2016-02-27 15:05:13 +01:00
|
|
|
let rest = total - data.len();
|
2016-02-22 23:05:27 +01:00
|
|
|
self.state = HandshakeState::ReadingAckEip8;
|
|
|
|
self.connection.expect(rest);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2017-11-13 14:37:08 +01:00
|
|
|
fn read_ack_eip8(&mut self, secret: &Secret, data: &[u8]) -> Result<(), Error> {
|
2016-07-26 16:04:14 +02:00
|
|
|
trace!(target: "network", "Received EIP8 handshake auth from {:?}", self.connection.remote_addr_str());
|
2016-02-22 23:05:27 +01:00
|
|
|
self.ack_cipher.extend_from_slice(data);
|
2016-12-27 12:53:56 +01:00
|
|
|
let ack = ecies::decrypt(secret, &self.ack_cipher[0..2], &self.ack_cipher[2..])?;
|
2018-04-16 15:52:12 +02:00
|
|
|
let rlp = Rlp::new(&ack);
|
2016-12-27 12:53:56 +01:00
|
|
|
self.remote_ephemeral = rlp.val_at(0)?;
|
|
|
|
self.remote_nonce = rlp.val_at(1)?;
|
|
|
|
self.remote_version = rlp.val_at(2)?;
|
2016-02-22 23:05:27 +01:00
|
|
|
self.state = HandshakeState::StartSession;
|
2015-11-30 16:38:55 +01:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Sends auth message
|
2017-11-13 14:37:08 +01:00
|
|
|
fn write_auth<Message>(&mut self, io: &IoContext<Message>, secret: &Secret, public: &Public) -> Result<(), Error> where Message: Send + Clone + Sync + 'static {
|
2016-07-26 16:04:14 +02:00
|
|
|
trace!(target: "network", "Sending handshake auth to {:?}", self.connection.remote_addr_str());
|
2015-11-30 16:38:55 +01:00
|
|
|
let mut data = [0u8; /*Signature::SIZE*/ 65 + /*H256::SIZE*/ 32 + /*Public::SIZE*/ 64 + /*H256::SIZE*/ 32 + 1]; //TODO: use associated constants
|
|
|
|
let len = data.len();
|
|
|
|
{
|
|
|
|
data[len - 1] = 0x0;
|
|
|
|
let (sig, rest) = data.split_at_mut(65);
|
|
|
|
let (hepubk, rest) = rest.split_at_mut(32);
|
2015-12-02 12:07:46 +01:00
|
|
|
let (pubk, rest) = rest.split_at_mut(64);
|
|
|
|
let (nonce, _) = rest.split_at_mut(32);
|
2015-12-03 15:11:40 +01:00
|
|
|
|
2015-11-30 16:38:55 +01:00
|
|
|
// E(remote-pubk, S(ecdhe-random, ecdh-shared-secret^nonce) || H(ecdhe-random-pubk) || pubk || nonce || 0x0)
|
2017-01-11 12:16:47 +01:00
|
|
|
let shared = *ecdh::agree(secret, &self.id)?;
|
2018-08-21 11:55:31 +02:00
|
|
|
sig.copy_from_slice(&*sign(self.ecdhe.secret(), &(shared ^ self.nonce))?);
|
2017-08-31 12:38:53 +02:00
|
|
|
write_keccak(self.ecdhe.public(), hepubk);
|
2019-06-03 15:36:21 +02:00
|
|
|
pubk.copy_from_slice(public.as_bytes());
|
|
|
|
nonce.copy_from_slice(self.nonce.as_bytes());
|
2015-11-30 16:38:55 +01:00
|
|
|
}
|
2016-12-27 12:53:56 +01:00
|
|
|
let message = ecies::encrypt(&self.id, &[], &data)?;
|
2015-12-02 20:11:13 +01:00
|
|
|
self.auth_cipher = message.clone();
|
2016-06-13 18:55:24 +02:00
|
|
|
self.connection.send(io, message);
|
2016-02-22 23:05:27 +01:00
|
|
|
self.connection.expect(V4_ACK_PACKET_SIZE);
|
2015-12-17 11:42:30 +01:00
|
|
|
self.state = HandshakeState::ReadingAck;
|
2015-11-30 16:38:55 +01:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2016-01-10 22:42:27 +01:00
|
|
|
/// Sends ack message
|
2017-11-13 14:37:08 +01:00
|
|
|
fn write_ack<Message>(&mut self, io: &IoContext<Message>) -> Result<(), Error> where Message: Send + Clone + Sync + 'static {
|
2016-07-26 16:04:14 +02:00
|
|
|
trace!(target: "network", "Sending handshake ack to {:?}", self.connection.remote_addr_str());
|
2015-12-02 12:07:46 +01:00
|
|
|
let mut data = [0u8; 1 + /*Public::SIZE*/ 64 + /*H256::SIZE*/ 32]; //TODO: use associated constants
|
|
|
|
let len = data.len();
|
|
|
|
{
|
|
|
|
data[len - 1] = 0x0;
|
|
|
|
let (epubk, rest) = data.split_at_mut(64);
|
|
|
|
let (nonce, _) = rest.split_at_mut(32);
|
2019-06-03 15:36:21 +02:00
|
|
|
epubk.copy_from_slice(self.ecdhe.public().as_bytes());
|
|
|
|
nonce.copy_from_slice(self.nonce.as_bytes());
|
2015-12-02 12:07:46 +01:00
|
|
|
}
|
2016-12-27 12:53:56 +01:00
|
|
|
let message = ecies::encrypt(&self.id, &[], &data)?;
|
2015-12-02 20:11:13 +01:00
|
|
|
self.ack_cipher = message.clone();
|
2016-06-13 18:55:24 +02:00
|
|
|
self.connection.send(io, message);
|
2015-12-17 11:42:30 +01:00
|
|
|
self.state = HandshakeState::StartSession;
|
2015-11-30 16:38:55 +01:00
|
|
|
Ok(())
|
|
|
|
}
|
2016-02-22 23:05:27 +01:00
|
|
|
|
|
|
|
/// Sends EIP8 ack message
|
2017-11-13 14:37:08 +01:00
|
|
|
fn write_ack_eip8<Message>(&mut self, io: &IoContext<Message>) -> Result<(), Error> where Message: Send + Clone + Sync + 'static {
|
2016-07-26 16:04:14 +02:00
|
|
|
trace!(target: "network", "Sending EIP8 handshake ack to {:?}", self.connection.remote_addr_str());
|
2016-02-22 23:05:27 +01:00
|
|
|
let mut rlp = RlpStream::new_list(3);
|
|
|
|
rlp.append(self.ecdhe.public());
|
|
|
|
rlp.append(&self.nonce);
|
|
|
|
rlp.append(&PROTOCOL_VERSION);
|
|
|
|
|
|
|
|
let pad_array = [0u8; 200];
|
|
|
|
let pad = &pad_array[0 .. 100 + random::<usize>() % 100];
|
|
|
|
rlp.append_raw(pad, 0);
|
|
|
|
|
|
|
|
let encoded = rlp.drain();
|
|
|
|
let len = (encoded.len() + ECIES_OVERHEAD) as u16;
|
2016-02-27 16:40:22 +01:00
|
|
|
let prefix = [ (len >> 8) as u8, (len & 0xff) as u8 ];
|
2016-12-27 12:53:56 +01:00
|
|
|
let message = ecies::encrypt(&self.id, &prefix, &encoded)?;
|
2016-02-22 23:05:27 +01:00
|
|
|
self.ack_cipher.extend_from_slice(&prefix);
|
|
|
|
self.ack_cipher.extend_from_slice(&message);
|
2016-06-13 18:55:24 +02:00
|
|
|
self.connection.send(io, self.ack_cipher.clone());
|
2016-02-22 23:05:27 +01:00
|
|
|
self.state = HandshakeState::StartSession;
|
|
|
|
Ok(())
|
|
|
|
}
|
2015-11-30 16:38:55 +01:00
|
|
|
}
|
2016-02-22 23:05:27 +01:00
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod test {
|
2019-06-19 12:20:50 +02:00
|
|
|
use std::str::FromStr;
|
2019-06-03 19:21:29 +02:00
|
|
|
|
2019-06-19 12:20:50 +02:00
|
|
|
use ethereum_types::{H256, H512};
|
|
|
|
use mio::tcp::TcpStream;
|
|
|
|
use rustc_hex::FromHex;
|
2019-06-03 19:21:29 +02:00
|
|
|
|
2019-06-19 12:20:50 +02:00
|
|
|
use ethcore_io::*;
|
|
|
|
use ethkey::Public;
|
2019-06-03 19:21:29 +02:00
|
|
|
|
2019-06-19 12:20:50 +02:00
|
|
|
use super::*;
|
2016-02-22 23:05:27 +01:00
|
|
|
|
2019-06-19 12:20:50 +02:00
|
|
|
fn check_auth(h: &Handshake, version: u64) {
|
2019-06-03 15:36:21 +02:00
|
|
|
assert_eq!(
|
|
|
|
h.id,
|
|
|
|
H512::from_str("fda1cff674c90c9a197539fe3dfb53086ace64f83ed7c6eabec741f7f381cc803e52ab2cd55d5569bce4347107a310dfd5f88a010cd2ffd1005ca406f1842877").unwrap(),
|
|
|
|
);
|
|
|
|
assert_eq!(h.remote_nonce, H256::from_str("7e968bba13b6c50e2c4cd7f241cc0d64d1ac25c7f5952df231ac6a2bda8ee5d6").unwrap());
|
|
|
|
assert_eq!(
|
|
|
|
h.remote_ephemeral,
|
|
|
|
H512::from_str("654d1044b69c577a44e5f01a1209523adb4026e70c62d1c13a067acabc09d2667a49821a0ad4b634554d330a15a58fe61f8a8e0544b310c6de7b0c8da7528a8d").unwrap(),
|
|
|
|
);
|
2016-02-22 23:05:27 +01:00
|
|
|
assert_eq!(h.remote_version, version);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn check_ack(h: &Handshake, version: u64) {
|
2019-06-03 15:36:21 +02:00
|
|
|
assert_eq!(h.remote_nonce, H256::from_str("559aead08264d5795d3909718cdd05abd49572e84fe55590eef31a88a08fdffd").unwrap());
|
|
|
|
assert_eq!(
|
|
|
|
h.remote_ephemeral,
|
|
|
|
H512::from_str("b6d82fa3409da933dbf9cb0140c5dde89f4e64aec88d476af648880f4a10e1e49fe35ef3e69e93dd300b4797765a747c6384a6ecf5db9c2690398607a86181e4").unwrap(),
|
|
|
|
);
|
2016-02-22 23:05:27 +01:00
|
|
|
assert_eq!(h.remote_version, version);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create_handshake(to: Option<&Public>) -> Handshake {
|
2016-08-24 18:35:21 +02:00
|
|
|
let addr = "127.0.0.1:50556".parse().unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
let socket = TcpStream::connect(&addr).unwrap();
|
2019-06-03 15:36:21 +02:00
|
|
|
let nonce = H256::zero();
|
2018-03-28 08:45:36 +02:00
|
|
|
Handshake::new(0, to, socket, &nonce).unwrap()
|
2016-02-22 23:05:27 +01:00
|
|
|
}
|
|
|
|
|
2016-06-13 18:55:24 +02:00
|
|
|
fn test_io() -> IoContext<i32> {
|
|
|
|
IoContext::new(IoChannel::disconnected(), 0)
|
|
|
|
}
|
|
|
|
|
2016-02-22 23:05:27 +01:00
|
|
|
#[test]
|
|
|
|
fn test_handshake_auth_plain() {
|
|
|
|
let mut h = create_handshake(None);
|
2017-01-11 12:16:47 +01:00
|
|
|
let secret = "b71c71a67e1177ad4e901695e1b4b9ee17ae16c6668d313eac2f96dbcda3f291".parse().unwrap();
|
2016-04-06 10:07:24 +02:00
|
|
|
let auth =
|
2016-02-22 23:05:27 +01:00
|
|
|
"\
|
|
|
|
048ca79ad18e4b0659fab4853fe5bc58eb83992980f4c9cc147d2aa31532efd29a3d3dc6a3d89eaf\
|
|
|
|
913150cfc777ce0ce4af2758bf4810235f6e6ceccfee1acc6b22c005e9e3a49d6448610a58e98744\
|
|
|
|
ba3ac0399e82692d67c1f58849050b3024e21a52c9d3b01d871ff5f210817912773e610443a9ef14\
|
|
|
|
2e91cdba0bd77b5fdf0769b05671fc35f83d83e4d3b0b000c6b2a1b1bba89e0fc51bf4e460df3105\
|
|
|
|
c444f14be226458940d6061c296350937ffd5e3acaceeaaefd3c6f74be8e23e0f45163cc7ebd7622\
|
|
|
|
0f0128410fd05250273156d548a414444ae2f7dea4dfca2d43c057adb701a715bf59f6fb66b2d1d2\
|
|
|
|
0f2c703f851cbf5ac47396d9ca65b6260bd141ac4d53e2de585a73d1750780db4c9ee4cd4d225173\
|
|
|
|
a4592ee77e2bd94d0be3691f3b406f9bba9b591fc63facc016bfa8\
|
|
|
|
".from_hex().unwrap();
|
|
|
|
|
2016-06-13 18:55:24 +02:00
|
|
|
h.read_auth(&test_io(), &secret, &auth).unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
assert_eq!(h.state, super::HandshakeState::StartSession);
|
|
|
|
check_auth(&h, 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_handshake_auth_eip8() {
|
|
|
|
let mut h = create_handshake(None);
|
2017-01-11 12:16:47 +01:00
|
|
|
let secret = "b71c71a67e1177ad4e901695e1b4b9ee17ae16c6668d313eac2f96dbcda3f291".parse().unwrap();
|
2016-04-06 10:07:24 +02:00
|
|
|
let auth =
|
2016-02-22 23:05:27 +01:00
|
|
|
"\
|
|
|
|
01b304ab7578555167be8154d5cc456f567d5ba302662433674222360f08d5f1534499d3678b513b\
|
|
|
|
0fca474f3a514b18e75683032eb63fccb16c156dc6eb2c0b1593f0d84ac74f6e475f1b8d56116b84\
|
|
|
|
9634a8c458705bf83a626ea0384d4d7341aae591fae42ce6bd5c850bfe0b999a694a49bbbaf3ef6c\
|
|
|
|
da61110601d3b4c02ab6c30437257a6e0117792631a4b47c1d52fc0f8f89caadeb7d02770bf999cc\
|
|
|
|
147d2df3b62e1ffb2c9d8c125a3984865356266bca11ce7d3a688663a51d82defaa8aad69da39ab6\
|
|
|
|
d5470e81ec5f2a7a47fb865ff7cca21516f9299a07b1bc63ba56c7a1a892112841ca44b6e0034dee\
|
|
|
|
70c9adabc15d76a54f443593fafdc3b27af8059703f88928e199cb122362a4b35f62386da7caad09\
|
|
|
|
c001edaeb5f8a06d2b26fb6cb93c52a9fca51853b68193916982358fe1e5369e249875bb8d0d0ec3\
|
|
|
|
6f917bc5e1eafd5896d46bd61ff23f1a863a8a8dcd54c7b109b771c8e61ec9c8908c733c0263440e\
|
|
|
|
2aa067241aaa433f0bb053c7b31a838504b148f570c0ad62837129e547678c5190341e4f1693956c\
|
|
|
|
3bf7678318e2d5b5340c9e488eefea198576344afbdf66db5f51204a6961a63ce072c8926c\
|
|
|
|
".from_hex().unwrap();
|
|
|
|
|
2016-06-13 18:55:24 +02:00
|
|
|
h.read_auth(&test_io(), &secret, &auth[0..super::V4_AUTH_PACKET_SIZE]).unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
assert_eq!(h.state, super::HandshakeState::ReadingAuthEip8);
|
2016-06-13 18:55:24 +02:00
|
|
|
h.read_auth_eip8(&test_io(), &secret, &auth[super::V4_AUTH_PACKET_SIZE..]).unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
assert_eq!(h.state, super::HandshakeState::StartSession);
|
|
|
|
check_auth(&h, 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_handshake_auth_eip8_2() {
|
|
|
|
let mut h = create_handshake(None);
|
2017-01-11 12:16:47 +01:00
|
|
|
let secret = "b71c71a67e1177ad4e901695e1b4b9ee17ae16c6668d313eac2f96dbcda3f291".parse().unwrap();
|
2016-04-06 10:07:24 +02:00
|
|
|
let auth =
|
2016-02-22 23:05:27 +01:00
|
|
|
"\
|
|
|
|
01b8044c6c312173685d1edd268aa95e1d495474c6959bcdd10067ba4c9013df9e40ff45f5bfd6f7\
|
|
|
|
2471f93a91b493f8e00abc4b80f682973de715d77ba3a005a242eb859f9a211d93a347fa64b597bf\
|
|
|
|
280a6b88e26299cf263b01b8dfdb712278464fd1c25840b995e84d367d743f66c0e54a586725b7bb\
|
|
|
|
f12acca27170ae3283c1073adda4b6d79f27656993aefccf16e0d0409fe07db2dc398a1b7e8ee93b\
|
|
|
|
cd181485fd332f381d6a050fba4c7641a5112ac1b0b61168d20f01b479e19adf7fdbfa0905f63352\
|
|
|
|
bfc7e23cf3357657455119d879c78d3cf8c8c06375f3f7d4861aa02a122467e069acaf513025ff19\
|
|
|
|
6641f6d2810ce493f51bee9c966b15c5043505350392b57645385a18c78f14669cc4d960446c1757\
|
|
|
|
1b7c5d725021babbcd786957f3d17089c084907bda22c2b2675b4378b114c601d858802a55345a15\
|
|
|
|
116bc61da4193996187ed70d16730e9ae6b3bb8787ebcaea1871d850997ddc08b4f4ea668fbf3740\
|
|
|
|
7ac044b55be0908ecb94d4ed172ece66fd31bfdadf2b97a8bc690163ee11f5b575a4b44e36e2bfb2\
|
|
|
|
f0fce91676fd64c7773bac6a003f481fddd0bae0a1f31aa27504e2a533af4cef3b623f4791b2cca6\
|
|
|
|
d490\
|
|
|
|
".from_hex().unwrap();
|
|
|
|
|
2016-06-13 18:55:24 +02:00
|
|
|
h.read_auth(&test_io(), &secret, &auth[0..super::V4_AUTH_PACKET_SIZE]).unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
assert_eq!(h.state, super::HandshakeState::ReadingAuthEip8);
|
2016-06-13 18:55:24 +02:00
|
|
|
h.read_auth_eip8(&test_io(), &secret, &auth[super::V4_AUTH_PACKET_SIZE..]).unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
assert_eq!(h.state, super::HandshakeState::StartSession);
|
|
|
|
check_auth(&h, 56);
|
2016-04-06 10:07:24 +02:00
|
|
|
let ack = h.ack_cipher.clone();
|
2016-02-27 16:44:47 +01:00
|
|
|
let total = (((ack[0] as u16) << 8 | (ack[1] as u16)) as usize) + 2;
|
|
|
|
assert_eq!(ack.len(), total);
|
2016-02-22 23:05:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_handshake_ack_plain() {
|
2019-06-03 15:36:21 +02:00
|
|
|
let remote = H512::from_str("fda1cff674c90c9a197539fe3dfb53086ace64f83ed7c6eabec741f7f381cc803e52ab2cd55d5569bce4347107a310dfd5f88a010cd2ffd1005ca406f1842877").unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
let mut h = create_handshake(Some(&remote));
|
2017-01-11 12:16:47 +01:00
|
|
|
let secret = "49a7b37aa6f6645917e7b807e9d1c00d4fa71f18343b0d4122a4d2df64dd6fee".parse().unwrap();
|
2016-04-06 10:07:24 +02:00
|
|
|
let ack =
|
2016-02-22 23:05:27 +01:00
|
|
|
"\
|
|
|
|
049f8abcfa9c0dc65b982e98af921bc0ba6e4243169348a236abe9df5f93aa69d99cadddaa387662\
|
|
|
|
b0ff2c08e9006d5a11a278b1b3331e5aaabf0a32f01281b6f4ede0e09a2d5f585b26513cb794d963\
|
|
|
|
5a57563921c04a9090b4f14ee42be1a5461049af4ea7a7f49bf4c97a352d39c8d02ee4acc416388c\
|
|
|
|
1c66cec761d2bc1c72da6ba143477f049c9d2dde846c252c111b904f630ac98e51609b3b1f58168d\
|
|
|
|
dca6505b7196532e5f85b259a20c45e1979491683fee108e9660edbf38f3add489ae73e3dda2c71b\
|
|
|
|
d1497113d5c755e942d1\
|
|
|
|
".from_hex().unwrap();
|
|
|
|
|
|
|
|
h.read_ack(&secret, &ack).unwrap();
|
|
|
|
assert_eq!(h.state, super::HandshakeState::StartSession);
|
|
|
|
check_ack(&h, 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_handshake_ack_eip8() {
|
2019-06-03 15:36:21 +02:00
|
|
|
let remote = H512::from_str("fda1cff674c90c9a197539fe3dfb53086ace64f83ed7c6eabec741f7f381cc803e52ab2cd55d5569bce4347107a310dfd5f88a010cd2ffd1005ca406f1842877").unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
let mut h = create_handshake(Some(&remote));
|
2017-01-11 12:16:47 +01:00
|
|
|
let secret = "49a7b37aa6f6645917e7b807e9d1c00d4fa71f18343b0d4122a4d2df64dd6fee".parse().unwrap();
|
2016-04-06 10:07:24 +02:00
|
|
|
let ack =
|
2016-02-22 23:05:27 +01:00
|
|
|
"\
|
|
|
|
01ea0451958701280a56482929d3b0757da8f7fbe5286784beead59d95089c217c9b917788989470\
|
|
|
|
b0e330cc6e4fb383c0340ed85fab836ec9fb8a49672712aeabbdfd1e837c1ff4cace34311cd7f4de\
|
|
|
|
05d59279e3524ab26ef753a0095637ac88f2b499b9914b5f64e143eae548a1066e14cd2f4bd7f814\
|
|
|
|
c4652f11b254f8a2d0191e2f5546fae6055694aed14d906df79ad3b407d94692694e259191cde171\
|
|
|
|
ad542fc588fa2b7333313d82a9f887332f1dfc36cea03f831cb9a23fea05b33deb999e85489e645f\
|
|
|
|
6aab1872475d488d7bd6c7c120caf28dbfc5d6833888155ed69d34dbdc39c1f299be1057810f34fb\
|
|
|
|
e754d021bfca14dc989753d61c413d261934e1a9c67ee060a25eefb54e81a4d14baff922180c395d\
|
|
|
|
3f998d70f46f6b58306f969627ae364497e73fc27f6d17ae45a413d322cb8814276be6ddd13b885b\
|
|
|
|
201b943213656cde498fa0e9ddc8e0b8f8a53824fbd82254f3e2c17e8eaea009c38b4aa0a3f306e8\
|
|
|
|
797db43c25d68e86f262e564086f59a2fc60511c42abfb3057c247a8a8fe4fb3ccbadde17514b7ac\
|
|
|
|
8000cdb6a912778426260c47f38919a91f25f4b5ffb455d6aaaf150f7e5529c100ce62d6d92826a7\
|
|
|
|
1778d809bdf60232ae21ce8a437eca8223f45ac37f6487452ce626f549b3b5fdee26afd2072e4bc7\
|
|
|
|
5833c2464c805246155289f4\
|
|
|
|
".from_hex().unwrap();
|
|
|
|
|
|
|
|
h.read_ack(&secret, &ack[0..super::V4_ACK_PACKET_SIZE]).unwrap();
|
|
|
|
assert_eq!(h.state, super::HandshakeState::ReadingAckEip8);
|
|
|
|
h.read_ack_eip8(&secret, &ack[super::V4_ACK_PACKET_SIZE..]).unwrap();
|
|
|
|
assert_eq!(h.state, super::HandshakeState::StartSession);
|
|
|
|
check_ack(&h, 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_handshake_ack_eip8_2() {
|
2019-06-03 15:36:21 +02:00
|
|
|
let remote = H512::from_str("fda1cff674c90c9a197539fe3dfb53086ace64f83ed7c6eabec741f7f381cc803e52ab2cd55d5569bce4347107a310dfd5f88a010cd2ffd1005ca406f1842877").unwrap();
|
2016-02-22 23:05:27 +01:00
|
|
|
let mut h = create_handshake(Some(&remote));
|
2017-01-11 12:16:47 +01:00
|
|
|
let secret = "49a7b37aa6f6645917e7b807e9d1c00d4fa71f18343b0d4122a4d2df64dd6fee".parse().unwrap();
|
2016-04-06 10:07:24 +02:00
|
|
|
let ack =
|
2016-02-22 23:05:27 +01:00
|
|
|
"\
|
|
|
|
01f004076e58aae772bb101ab1a8e64e01ee96e64857ce82b1113817c6cdd52c09d26f7b90981cd7\
|
|
|
|
ae835aeac72e1573b8a0225dd56d157a010846d888dac7464baf53f2ad4e3d584531fa203658fab0\
|
|
|
|
3a06c9fd5e35737e417bc28c1cbf5e5dfc666de7090f69c3b29754725f84f75382891c561040ea1d\
|
|
|
|
dc0d8f381ed1b9d0d4ad2a0ec021421d847820d6fa0ba66eaf58175f1b235e851c7e2124069fbc20\
|
|
|
|
2888ddb3ac4d56bcbd1b9b7eab59e78f2e2d400905050f4a92dec1c4bdf797b3fc9b2f8e84a482f3\
|
|
|
|
d800386186712dae00d5c386ec9387a5e9c9a1aca5a573ca91082c7d68421f388e79127a5177d4f8\
|
|
|
|
590237364fd348c9611fa39f78dcdceee3f390f07991b7b47e1daa3ebcb6ccc9607811cb17ce51f1\
|
|
|
|
c8c2c5098dbdd28fca547b3f58c01a424ac05f869f49c6a34672ea2cbbc558428aa1fe48bbfd6115\
|
|
|
|
8b1b735a65d99f21e70dbc020bfdface9f724a0d1fb5895db971cc81aa7608baa0920abb0a565c9c\
|
|
|
|
436e2fd13323428296c86385f2384e408a31e104670df0791d93e743a3a5194ee6b076fb6323ca59\
|
|
|
|
3011b7348c16cf58f66b9633906ba54a2ee803187344b394f75dd2e663a57b956cb830dd7a908d4f\
|
|
|
|
39a2336a61ef9fda549180d4ccde21514d117b6c6fd07a9102b5efe710a32af4eeacae2cb3b1dec0\
|
|
|
|
35b9593b48b9d3ca4c13d245d5f04169b0b1\
|
|
|
|
".from_hex().unwrap();
|
|
|
|
|
|
|
|
h.read_ack(&secret, &ack[0..super::V4_ACK_PACKET_SIZE]).unwrap();
|
|
|
|
assert_eq!(h.state, super::HandshakeState::ReadingAckEip8);
|
|
|
|
h.read_ack_eip8(&secret, &ack[super::V4_ACK_PACKET_SIZE..]).unwrap();
|
|
|
|
assert_eq!(h.state, super::HandshakeState::StartSession);
|
|
|
|
check_ack(&h, 57);
|
|
|
|
}
|
|
|
|
}
|