summaryrefslogtreecommitdiff
path: root/src/Network
diff options
context:
space:
mode:
authorjoe <joe@jerkface.net>2017-10-24 01:35:33 -0400
committerjoe <joe@jerkface.net>2017-10-24 01:35:33 -0400
commitc31ed656d55bbdb387d91464e51840e90503223a (patch)
tree360a0810d8681c2eed836cde13e23b2a9b3d1662 /src/Network
parentffe298780ce5945dd7a3a5fa957cf2770ca34b56 (diff)
Implemented "dhtkey" publish method.
Diffstat (limited to 'src/Network')
-rw-r--r--src/Network/Tox.hs24
-rw-r--r--src/Network/Tox/DHT/Transport.hs7
-rw-r--r--src/Network/Tox/Onion/Handlers.hs8
-rw-r--r--src/Network/Tox/Onion/Transport.hs103
-rw-r--r--src/Network/Tox/Transport.hs2
5 files changed, 115 insertions, 29 deletions
diff --git a/src/Network/Tox.hs b/src/Network/Tox.hs
index eb4c6027..c0e1dee0 100644
--- a/src/Network/Tox.hs
+++ b/src/Network/Tox.hs
@@ -196,7 +196,7 @@ newClient drg net classify selfAddr handlers modifytbl modifynet = do
196 mkclient (tbl,var) handlers = 196 mkclient (tbl,var) handlers =
197 let client = Client 197 let client = Client
198 { clientNet = addHandler eprinter (handleMessage client) $ modifynet client net 198 { clientNet = addHandler eprinter (handleMessage client) $ modifynet client net
199 , clientDispatcher = dispatch tbl var handlers -- (fmap (contramapAddr (\(ToxPath ni _) -> ni)) . handlers) 199 , clientDispatcher = dispatch tbl var handlers
200 , clientErrorReporter = eprinter { reportTimeout = reportTimeout ignoreErrors } 200 , clientErrorReporter = eprinter { reportTimeout = reportTimeout ignoreErrors }
201 , clientPending = var 201 , clientPending = var
202 , clientAddress = selfAddr 202 , clientAddress = selfAddr
@@ -208,7 +208,7 @@ newClient drg net classify selfAddr handlers modifytbl modifynet = do
208data Tox = Tox 208data Tox = Tox
209 { toxDHT :: DHT.Client 209 { toxDHT :: DHT.Client
210 , toxOnion :: Onion.Client RouteId 210 , toxOnion :: Onion.Client RouteId
211 , toxToRoute :: Transport String Onion.Rendezvous Onion.DataToRoute 211 , toxToRoute :: Transport String Onion.AnnouncedRendezvous (PublicKey,Onion.OnionData)
212 , toxCrypto :: Transport String SockAddr NetCrypto 212 , toxCrypto :: Transport String SockAddr NetCrypto
213 , toxCryptoKeys :: TransportCrypto 213 , toxCryptoKeys :: TransportCrypto
214 , toxRouting :: DHT.Routing 214 , toxRouting :: DHT.Routing
@@ -217,6 +217,26 @@ data Tox = Tox
217 , toxOnionRoutes :: OnionRouter 217 , toxOnionRoutes :: OnionRouter
218 } 218 }
219 219
220getContactInfo :: Tox -> IO DHT.DHTPublicKey
221getContactInfo Tox{toxCryptoKeys,toxRouting} = join $ atomically $ do
222 r4 <- readTVar $ DHT.routing4 toxRouting
223 r6 <- readTVar $ DHT.routing6 toxRouting
224 nonce <- transportNewNonce toxCryptoKeys
225 let self = nodeId n4
226 n4 = R.thisNode r4
227 n6 = R.thisNode r6
228 n4s = R.kclosest DHT.toxSpace 4 self r4
229 n6s = R.kclosest DHT.toxSpace 4 self r6
230 ns = filter (DHT.isGlobal . nodeIP) [n4,n6]
231 ++ concat (zipWith (\a b -> [a,b]) n4s n6s)
232 return $ do
233 timestamp <- round . (* 1000000) <$> getPOSIXTime
234 return DHT.DHTPublicKey
235 { dhtpkNonce = timestamp
236 , dhtpk = id2key self
237 , dhtpkNodes = DHT.SendNodes $ take 4 ns
238 }
239
220isLocalHost :: SockAddr -> Bool 240isLocalHost :: SockAddr -> Bool
221isLocalHost (SockAddrInet _ host32) = (fromBE32 host32 == 0x7f000001) 241isLocalHost (SockAddrInet _ host32) = (fromBE32 host32 == 0x7f000001)
222isLocalHost _ = False 242isLocalHost _ = False
diff --git a/src/Network/Tox/DHT/Transport.hs b/src/Network/Tox/DHT/Transport.hs
index 5bd9caa1..0787c2c1 100644
--- a/src/Network/Tox/DHT/Transport.hs
+++ b/src/Network/Tox/DHT/Transport.hs
@@ -43,6 +43,7 @@ import Data.Monoid
43import Data.Serialize as S 43import Data.Serialize as S
44import Data.Tuple 44import Data.Tuple
45import Data.Word 45import Data.Word
46import Foreign.C (CTime(..))
46import Network.Socket 47import Network.Socket
47 48
48type DHTTransport = Transport String NodeInfo (DHTMessage Encrypted8) 49type DHTTransport = Transport String NodeInfo (DHTMessage Encrypted8)
@@ -201,7 +202,11 @@ instance Serialize DHTRequest where
201-- | `32` | Our DHT public key | 202-- | `32` | Our DHT public key |
202-- | `[39, 204]` | Maximum of 4 nodes in packed format | 203-- | `[39, 204]` | Maximum of 4 nodes in packed format |
203data DHTPublicKey = DHTPublicKey 204data DHTPublicKey = DHTPublicKey
204 { dhtpkNonce :: Nonce8 -- no_replay 205 { dhtpkNonce :: Word64 -- ^ The `no_replay` number is protection if
206 -- someone tries to replay an older packet and
207 -- should be set to an always increasing number.
208 -- It is 8 bytes so you should set a high
209 -- resolution monotonic time as the value.
205 , dhtpk :: PublicKey -- dht public key 210 , dhtpk :: PublicKey -- dht public key
206 , dhtpkNodes :: SendNodes -- other reachable nodes 211 , dhtpkNodes :: SendNodes -- other reachable nodes
207 } 212 }
diff --git a/src/Network/Tox/Onion/Handlers.hs b/src/Network/Tox/Onion/Handlers.hs
index 0c137bf5..3eec0390 100644
--- a/src/Network/Tox/Onion/Handlers.hs
+++ b/src/Network/Tox/Onion/Handlers.hs
@@ -242,14 +242,6 @@ sendOnion getTimeout client req oaddr unwrap =
242 $ join mb 242 $ join mb
243 243
244-- | Lookup the secret counterpart for a given alias key. 244-- | Lookup the secret counterpart for a given alias key.
245selectAlias :: TransportCrypto -> NodeId -> STM AliasSelector
246selectAlias crypto pkey = do
247 ks <- filter (\(sk,pk) -> pk == id2key pkey)
248 <$> readTVar (userKeys crypto)
249 maybe (return SearchingAlias)
250 (return . uncurry AnnouncingAlias)
251 (listToMaybe ks)
252
253getRendezvous :: (TransactionId -> OnionDestination r -> STM (OnionDestination r, Int)) 245getRendezvous :: (TransactionId -> OnionDestination r -> STM (OnionDestination r, Int))
254 -> TransportCrypto 246 -> TransportCrypto
255 -> Client r 247 -> Client r
diff --git a/src/Network/Tox/Onion/Transport.hs b/src/Network/Tox/Onion/Transport.hs
index 4c3de3e6..6635fad1 100644
--- a/src/Network/Tox/Onion/Transport.hs
+++ b/src/Network/Tox/Onion/Transport.hs
@@ -25,6 +25,8 @@ module Network.Tox.Onion.Transport
25 , OnionMessage(..) 25 , OnionMessage(..)
26 , Rendezvous(..) 26 , Rendezvous(..)
27 , DataToRoute(..) 27 , DataToRoute(..)
28 , OnionData(..)
29 , AnnouncedRendezvous(..)
28 , AnnounceResponse(..) 30 , AnnounceResponse(..)
29 , AnnounceRequest(..) 31 , AnnounceRequest(..)
30 , Forwarding(..) 32 , Forwarding(..)
@@ -41,6 +43,7 @@ module Network.Tox.Onion.Transport
41 , N3 43 , N3
42 , onionKey 44 , onionKey
43 , onionAliasSelector 45 , onionAliasSelector
46 , selectAlias
44 ) where 47 ) where
45 48
46import Network.Address (fromSockAddr,toSockAddr,setPort,either4or6,sockAddrPort) 49import Network.Address (fromSockAddr,toSockAddr,setPort,either4or6,sockAddrPort)
@@ -50,13 +53,12 @@ import Network.Tox.NodeId
50import qualified Crypto.Tox as ToxCrypto 53import qualified Crypto.Tox as ToxCrypto
51import Network.Tox.DHT.Transport (NodeInfo(..),NodeId(..),SendNodes(..),nodeInfo,DHTPublicKey,FriendRequest,asymNodeInfo) 54import Network.Tox.DHT.Transport (NodeInfo(..),NodeId(..),SendNodes(..),nodeInfo,DHTPublicKey,FriendRequest,asymNodeInfo)
52 55
53import Debug.Trace
54import Control.Arrow
55import Control.Applicative 56import Control.Applicative
57import Control.Arrow
56import Control.Concurrent.STM 58import Control.Concurrent.STM
57import Control.Monad 59import Control.Monad
58import qualified Data.ByteString as B 60import qualified Data.ByteString as B
59 ;import Data.ByteString (ByteString) 61 ;import Data.ByteString (ByteString)
60import Data.Coerce 62import Data.Coerce
61import Data.Function 63import Data.Function
62import Data.Functor.Contravariant 64import Data.Functor.Contravariant
@@ -64,14 +66,16 @@ import Data.Functor.Identity
64import Data.IP 66import Data.IP
65import Data.Maybe 67import Data.Maybe
66import Data.Monoid 68import Data.Monoid
67import Data.Serialize as S 69import Data.Serialize as S
68import Data.Type.Equality 70import Data.Type.Equality
69import Data.Typeable 71import Data.Typeable
70import Data.Word 72import Data.Word
71import GHC.Generics () 73import Debug.Trace
74import GHC.Generics ()
72import GHC.TypeLits 75import GHC.TypeLits
73import Network.Socket 76import Network.Socket
74import System.IO 77import System.IO
78import qualified Text.ParserCombinators.ReadP as RP
75 79
76type HandleLo a = Maybe (Either String (ByteString, SockAddr)) -> IO a 80type HandleLo a = Maybe (Either String (ByteString, SockAddr)) -> IO a
77 81
@@ -609,6 +613,15 @@ instance Sized OnionData where
609 ConstSize n -> n 613 ConstSize n -> n
610 VarSize f -> f req 614 VarSize f -> f req
611 615
616instance Serialize OnionData where
617 get = do
618 tag <- get
619 case tag :: Word8 of
620 0x9c -> OnionDHTPublicKey <$> get
621 0x20 -> OnionFriendRequest <$> get
622 _ -> fail $ "Unknown onion data: "++show tag
623 put (OnionDHTPublicKey dpk) = put (0x9c :: Word8) >> put dpk
624 put (OnionFriendRequest fr) = put (0x20 :: Word8) >> put fr
612 625
613selectKey :: TransportCrypto -> OnionMessage f -> OnionDestination r -> IO (SecretKey, PublicKey) 626selectKey :: TransportCrypto -> OnionMessage f -> OnionDestination r -> IO (SecretKey, PublicKey)
614selectKey crypto _ rpath@(OnionDestination (AnnouncingAlias skey pkey) _ _) 627selectKey crypto _ rpath@(OnionDestination (AnnouncingAlias skey pkey) _ _)
@@ -731,30 +744,86 @@ data Rendezvous = Rendezvous
731 deriving Eq 744 deriving Eq
732 745
733instance Show Rendezvous where 746instance Show Rendezvous where
734 show (Rendezvous k ni) = concat [show $ key2id k, ":", show ni] 747 showsPrec d (Rendezvous k ni)
735 748 = showsPrec d (key2id k)
749 . (':' :)
750 . showsPrec d ni
751
752data AnnouncedRendezvous = AnnouncedRendezvous
753 { remoteUserKey :: PublicKey
754 , rendezvous :: Rendezvous
755 }
756 deriving Eq
757
758instance Show AnnouncedRendezvous where
759 showsPrec d (AnnouncedRendezvous remote rendez)
760 = showsPrec d (key2id remote)
761 . (':' :)
762 . showsPrec d rendez
763
764instance Read AnnouncedRendezvous where
765 readsPrec d = RP.readP_to_S $ do
766 ukstr <- RP.munch (/=':')
767 RP.char ':'
768 rkstr <- RP.munch (/=':')
769 RP.char ':'
770 nistr <- RP.munch (const True)
771 return AnnouncedRendezvous
772 { remoteUserKey = id2key $ read ukstr
773 , rendezvous = Rendezvous
774 { rendezvousKey = id2key $ read rkstr
775 , rendezvousNode = read nistr
776 }
777 }
778
779
780selectAlias :: TransportCrypto -> NodeId -> STM AliasSelector
781selectAlias crypto pkey = do
782 ks <- filter (\(sk,pk) -> pk == id2key pkey)
783 <$> readTVar (userKeys crypto)
784 maybe (return SearchingAlias)
785 (return . uncurry AnnouncingAlias)
786 (listToMaybe ks)
736 787
737 788
738parseDataToRoute 789parseDataToRoute
739 :: TransportCrypto 790 :: TransportCrypto
740 -> (OnionMessage Encrypted,OnionDestination r) 791 -> (OnionMessage Encrypted,OnionDestination r)
741 -> IO (Either (DataToRoute,Rendezvous) (OnionMessage Encrypted, OnionDestination r)) 792 -> IO (Either ((PublicKey,OnionData),AnnouncedRendezvous) (OnionMessage Encrypted, OnionDestination r))
742parseDataToRoute crypto (OnionToRouteResponse dta, od) = 793parseDataToRoute crypto (OnionToRouteResponse dta, od) =
743 return $ either (const $ Right (OnionToRouteResponse dta,od)) Left $ do 794 return $ either (const $ Right (OnionToRouteResponse dta,od)) Left $ do
744 -- XXX: Do something with decryption failure? 795 -- XXX: Do something with decryption failure?
745 decrypted <- uncomposed 796 dtr <- fmap runIdentity
746 $ decryptMessage (rendezvousSecret crypto,rendezvousPublic crypto) 797 $ uncomposed
747 (asymmNonce dta) 798 $ decryptMessage (rendezvousSecret crypto,rendezvousPublic crypto)
748 (Right dta) 799 (asymmNonce dta)
749 return ( runIdentity decrypted 800 (Right dta)
750 , Rendezvous (rendezvousPublic crypto) $ onionNodeInfo od ) 801 let (sk,pk) = case onionAliasSelector od of
802 SearchingAlias -> (onionAliasSecret &&& onionAliasPublic) crypto
803 AnnouncingAlias sk pk -> (sk,pk)
804 omsg <- fmap runIdentity
805 $ uncomposed
806 $ decryptMessage (sk,pk)
807 (asymmNonce dta)
808 (Left (dataFromKey dtr, dataToRoute dtr))
809 return ( (pk, omsg)
810 , AnnouncedRendezvous
811 (dataFromKey dtr)
812 $ Rendezvous (rendezvousPublic crypto) $ onionNodeInfo od )
751parseDataToRoute _ msg = return $ Right msg 813parseDataToRoute _ msg = return $ Right msg
752 814
753encodeDataToRoute :: TransportCrypto 815encodeDataToRoute :: TransportCrypto
754 -> (DataToRoute,Rendezvous) 816 -> ((PublicKey,OnionData),AnnouncedRendezvous)
755 -> IO (Maybe (OnionMessage Encrypted,OnionDestination r)) 817 -> IO (Maybe (OnionMessage Encrypted,OnionDestination r))
756encodeDataToRoute crypto (plain, Rendezvous pub ni) = do 818encodeDataToRoute crypto ((me,omsg), AnnouncedRendezvous toxid (Rendezvous pub ni)) = do
757 nonce <- atomically $ transportNewNonce crypto 819 nonce <- atomically $ transportNewNonce crypto
820 asel <- atomically $ selectAlias crypto (key2id me)
821 let (sk,pk) = case asel of
822 AnnouncingAlias sk pk -> (sk,pk)
823 _ -> (onionAliasSecret crypto, onionAliasPublic crypto)
824 let plain = DataToRoute { dataFromKey = pk
825 , dataToRoute = encryptMessage sk toxid nonce omsg
826 }
758 let dta = encryptMessage (onionAliasSecret crypto) pub nonce plain 827 let dta = encryptMessage (onionAliasSecret crypto) pub nonce plain
759 return $ Just ( OnionToRoute pub -- Public key of destination node 828 return $ Just ( OnionToRoute pub -- Public key of destination node
760 Asymm { senderKey = onionAliasPublic crypto 829 Asymm { senderKey = onionAliasPublic crypto
diff --git a/src/Network/Tox/Transport.hs b/src/Network/Tox/Transport.hs
index 2a4e7eee..5cda1524 100644
--- a/src/Network/Tox/Transport.hs
+++ b/src/Network/Tox/Transport.hs
@@ -24,7 +24,7 @@ toxTransport ::
24 -> UDPTransport 24 -> UDPTransport
25 -> IO ( Transport String NodeInfo (DHTMessage Encrypted8) 25 -> IO ( Transport String NodeInfo (DHTMessage Encrypted8)
26 , Transport String (OnionDestination RouteId) (OnionMessage Encrypted) 26 , Transport String (OnionDestination RouteId) (OnionMessage Encrypted)
27 , Transport String Rendezvous DataToRoute 27 , Transport String AnnouncedRendezvous (PublicKey,OnionData)
28 , Transport String SockAddr NetCrypto ) 28 , Transport String SockAddr NetCrypto )
29toxTransport crypto orouter closeLookup udp = do 29toxTransport crypto orouter closeLookup udp = do
30 (dht,udp1) <- partitionTransport parseDHTAddr (Just . encodeDHTAddr) $ forwardOnions crypto udp 30 (dht,udp1) <- partitionTransport parseDHTAddr (Just . encodeDHTAddr) $ forwardOnions crypto udp