1
1
Fork 0
mirror of https://github.com/oxen-io/lokinet synced 2023-12-14 06:53:00 +01:00
lokinet/llarp/service/intro_set.hpp

225 lines
5.3 KiB
C++
Raw Normal View History

#pragma once
#include "info.hpp"
#include "intro.hpp"
#include "protocol_type.hpp"
#include "tag.hpp"
#include <llarp/crypto/types.hpp>
#include <llarp/dns/srv_data.hpp>
2021-04-14 17:07:06 +02:00
#include <llarp/net/ip_range.hpp>
#include <llarp/net/traffic_policy.hpp>
#include <llarp/util/bencode.hpp>
#include <llarp/util/status.hpp>
#include <llarp/util/time.hpp>
#include <algorithm>
2019-01-22 02:14:02 +01:00
#include <functional>
2018-12-12 03:15:08 +01:00
#include <iostream>
#include <optional>
2018-12-12 03:15:08 +01:00
#include <vector>
2018-07-09 19:32:11 +02:00
namespace llarp::service
2018-07-09 19:32:11 +02:00
{
constexpr std::size_t MAX_INTROSET_SIZE = 4096;
// 10 seconds clock skew permitted for introset expiration
constexpr llarp_time_t MAX_INTROSET_TIME_DELTA = 10s;
2020-01-27 22:30:41 +01:00
struct IntroSet
{
ServiceInfo address_keys;
std::vector<Introduction> intros;
PQPubKey sntru_pubkey;
Tag topic;
std::vector<llarp::dns::SRVTuple> SRVs;
llarp_time_t time_signed = 0s;
2023-10-03 22:00:23 +02:00
IntroSet() = default;
explicit IntroSet(std::string bt_payload);
/// ethertypes we advertise that we speak
std::vector<ProtocolType> supported_protocols;
/// aonnuce that these ranges are reachable via our endpoint
/// only set when we support exit traffic ethertype is supported
std::set<IPRange> owned_ranges;
/// policies about traffic that we are willing to carry
/// a protocol/range whitelist or blacklist
/// only set when we support exit traffic ethertype
std::optional<net::TrafficPolicy> exit_policy;
Signature signature;
uint64_t version = llarp::constants::proto_version;
bool
OtherIsNewer(const IntroSet& other) const
2018-07-09 19:32:11 +02:00
{
return time_signed < other.time_signed;
}
2021-04-14 17:07:06 +02:00
std::string
ToString() const;
2021-04-14 17:07:06 +02:00
llarp_time_t
GetNewestIntroExpiration() const;
2021-04-14 17:07:06 +02:00
bool
GetNewestIntro(Introduction& intro) const;
2018-07-09 19:32:11 +02:00
bool
HasExpiredIntros(llarp_time_t now) const;
2018-09-10 19:37:28 +02:00
/// return true if any of our intros expires soon given a delta
bool
HasStaleIntros(llarp_time_t now, llarp_time_t delta) const;
2018-07-09 19:32:11 +02:00
bool
IsExpired(llarp_time_t now) const;
2018-08-10 23:34:11 +02:00
std::vector<llarp::dns::SRVData>
GetMatchingSRVRecords(std::string_view service_proto) const;
std::string
bt_encode() const;
2018-07-17 08:17:13 +02:00
bool
BDecode(llarp_buffer_t* buf)
{
return bencode_decode_dict(*this, buf);
}
bool
decode_key(const llarp_buffer_t& key, llarp_buffer_t* buf);
2018-07-18 02:25:24 +02:00
bool
verify(llarp_time_t now) const;
util::StatusObject
ExtractStatus() const;
};
2018-07-09 19:32:11 +02:00
inline bool
operator<(const IntroSet& lhs, const IntroSet& rhs)
{
return lhs.address_keys < rhs.address_keys;
}
2019-05-24 04:01:36 +02:00
inline bool
operator==(const IntroSet& lhs, const IntroSet& rhs)
{
return std::tie(
lhs.address_keys,
lhs.intros,
lhs.sntru_pubkey,
lhs.time_signed,
lhs.version,
lhs.topic,
lhs.signature)
== std::tie(
rhs.address_keys,
rhs.intros,
rhs.sntru_pubkey,
rhs.time_signed,
rhs.version,
rhs.topic,
rhs.signature);
}
inline bool
operator!=(const IntroSet& lhs, const IntroSet& rhs)
{
return !(lhs == rhs);
}
2018-07-09 19:32:11 +02:00
/// public version of the introset that is encrypted
struct EncryptedIntroSet
{
PubKey derivedSigningKey;
llarp_time_t signedAt = 0s;
2023-10-03 22:00:23 +02:00
ustring introsetPayload;
SymmNonce nonce;
std::optional<Tag> topic;
Signature sig;
2019-01-22 02:14:02 +01:00
EncryptedIntroSet() = default;
explicit EncryptedIntroSet(
std::string signing_key,
std::chrono::milliseconds signed_at,
std::string enc_payload,
std::string nonce,
std::string sig);
2023-10-03 22:00:23 +02:00
explicit EncryptedIntroSet(std::string bt_payload);
bool
Sign(const PrivateKey& k);
2019-04-23 11:25:03 +02:00
bool
IsExpired(llarp_time_t now) const;
2019-04-23 11:25:03 +02:00
std::string
bt_encode() const;
2019-04-23 11:25:03 +02:00
bool
BDecode(llarp_buffer_t* buf)
2020-01-27 22:30:41 +01:00
{
return bencode_decode_dict(*this, buf);
}
2020-01-27 22:30:41 +01:00
bool
decode_key(const llarp_buffer_t& key, llarp_buffer_t* buf);
2020-01-27 22:30:41 +01:00
bool
OtherIsNewer(const EncryptedIntroSet& other) const;
2020-01-27 22:30:41 +01:00
/// verify signature and timestamp
bool
verify(llarp_time_t now) const;
static bool
verify(uint8_t* introset, size_t introset_size, uint8_t* key, uint8_t* sig);
static bool
verify(std::string introset, std::string key, std::string sig);
2020-01-27 22:30:41 +01:00
std::string
ToString() const;
2020-01-27 22:30:41 +01:00
util::StatusObject
ExtractStatus() const;
2020-01-27 22:30:41 +01:00
2023-10-03 22:00:23 +02:00
IntroSet
decrypt(const PubKey& root) const;
};
2020-01-27 22:30:41 +01:00
inline bool
operator<(const EncryptedIntroSet& lhs, const EncryptedIntroSet& rhs)
{
return lhs.derivedSigningKey < rhs.derivedSigningKey;
}
2020-01-27 22:30:41 +01:00
inline bool
operator==(const EncryptedIntroSet& lhs, const EncryptedIntroSet& rhs)
{
return std::tie(lhs.signedAt, lhs.derivedSigningKey, lhs.nonce, lhs.sig)
== std::tie(rhs.signedAt, rhs.derivedSigningKey, rhs.nonce, rhs.sig);
}
2020-01-27 22:30:41 +01:00
inline bool
operator!=(const EncryptedIntroSet& lhs, const EncryptedIntroSet& rhs)
{
return !(lhs == rhs);
}
2020-01-27 22:30:41 +01:00
using EncryptedIntroSetLookupHandler = std::function<void(const std::vector<EncryptedIntroSet>&)>;
using IntroSetLookupHandler = std::function<void(const std::vector<IntroSet>&)>;
2019-01-22 02:14:02 +01:00
} // namespace llarp::service
template <>
constexpr inline bool llarp::IsToStringFormattable<llarp::service::IntroSet> = true;
template <>
constexpr inline bool llarp::IsToStringFormattable<llarp::service::EncryptedIntroSet> = true;