From: Bart Polot Date: Mon, 15 Dec 2014 07:18:02 +0000 (+0000) Subject: Fuse PING into KX_EPHEMERAL X-Git-Tag: initial-import-from-subversion-38251~2908 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=1f39de8b391b77e1da35cfcad3db0ad40e506d80;p=oweals%2Fgnunet.git Fuse PING into KX_EPHEMERAL --- diff --git a/src/cadet/cadet_common.c b/src/cadet/cadet_common.c index 28c5743de..ec2ed4735 100644 --- a/src/cadet/cadet_common.c +++ b/src/cadet/cadet_common.c @@ -172,13 +172,6 @@ GC_m2s (uint16_t m) t = "KX_EPHEMERAL"; break; - /** - * Challenge to test peer's session key. - */ - case GNUNET_MESSAGE_TYPE_CADET_KX_PING: - t = "KX_PING"; - break; - /** * Answer to session key challenge. */ diff --git a/src/cadet/cadet_protocol.h b/src/cadet/cadet_protocol.h index 19cdfe4a0..f5e684af6 100644 --- a/src/cadet/cadet_protocol.h +++ b/src/cadet/cadet_protocol.h @@ -150,43 +150,24 @@ struct GNUNET_CADET_KX_Ephemeral struct GNUNET_TIME_AbsoluteNBO expiration_time; /** - * Ephemeral public ECC key (always for NIST P-521) encoded in a format suitable - * for network transmission as created using 'gcry_sexp_sprint'. + * Ephemeral public ECC key (always for NIST P-521) encoded in a format + * suitable for network transmission as created using 'gcry_sexp_sprint'. */ struct GNUNET_CRYPTO_EcdhePublicKey ephemeral_key; /** - * Public key of the signing peer (persistent version, not the ephemeral public key). + * Public key of the signing peer + * (persistent version, not the ephemeral public key). */ struct GNUNET_PeerIdentity origin_identity; -}; - -/** - * We're sending an (encrypted) PING to the other peer to check if he - * can decrypt. The other peer should respond with a PONG with the - * same content, except this time encrypted with the receiver's key. - */ -struct GNUNET_CADET_KX_Ping -{ /** - * Message type is GNUNET_MESSAGE_TYPE_CADET_KX_PING. - */ - struct GNUNET_MessageHeader header; - - /** - * Seed for the IV + * Seed for the IV of nonce. */ uint32_t iv GNUNET_PACKED; /** - * Intended target of the PING, used primarily to check - * that decryption actually worked. - */ - struct GNUNET_PeerIdentity target; - - /** - * Random number chosen to make reply harder. + * Nonce to check liveness of peer. */ uint32_t nonce GNUNET_PACKED; }; diff --git a/src/cadet/gnunet-service-cadet_tunnel.c b/src/cadet/gnunet-service-cadet_tunnel.c index 98452ba6f..14d8b1d11 100644 --- a/src/cadet/gnunet-service-cadet_tunnel.c +++ b/src/cadet/gnunet-service-cadet_tunnel.c @@ -460,7 +460,7 @@ ephemeral_purpose_size (void) size_t ping_encryption_size (void) { - return sizeof (struct GNUNET_PeerIdentity) + sizeof (uint32_t); + return sizeof (uint32_t); } @@ -885,10 +885,10 @@ create_kx_ctx (struct CadetTunnel *t) else { t->kx_ctx = GNUNET_new (struct CadetTunnelKXCtx); + t->kx_ctx->challenge = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE, + UINT32_MAX); } - t->kx_ctx->challenge = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE, - UINT32_MAX); if (CADET_TUNNEL_KEY_OK == t->estate) { t->kx_ctx->d_key_old = t->d_key; @@ -1341,10 +1341,10 @@ send_kx (struct CadetTunnel *t, switch (type) { case GNUNET_MESSAGE_TYPE_CADET_KX_EPHEMERAL: - case GNUNET_MESSAGE_TYPE_CADET_KX_PING: case GNUNET_MESSAGE_TYPE_CADET_KX_PONG: memcpy (&msg[1], message, size); break; + default: LOG (GNUNET_ERROR_TYPE_DEBUG, "unkown type %s\n", GC_m2s (type)); @@ -1370,36 +1370,15 @@ send_ephemeral (struct CadetTunnel *t) LOG (GNUNET_ERROR_TYPE_INFO, "===> EPHM for %s\n", GCT_2s (t)); kx_msg.sender_status = htonl (t->estate); + kx_msg.iv = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE, UINT32_MAX); + kx_msg.nonce = t->kx_ctx->challenge; + LOG (GNUNET_ERROR_TYPE_DEBUG, " send nonce c %u\n", kx_msg.nonce); + t_encrypt (t, &kx_msg.nonce, &kx_msg.nonce, + ping_encryption_size(), kx_msg.iv, GNUNET_YES); + LOG (GNUNET_ERROR_TYPE_DEBUG, " send nonce e %u\n", kx_msg.nonce); send_kx (t, &kx_msg.header); } -/** - * Send a ping message on a tunnel. - * - * @param t Tunnel on which to send the ping. - */ -static void -send_ping (struct CadetTunnel *t) -{ - struct GNUNET_CADET_KX_Ping msg; - - LOG (GNUNET_ERROR_TYPE_INFO, "===> PING for %s\n", GCT_2s (t)); - msg.header.size = htons (sizeof (msg)); - msg.header.type = htons (GNUNET_MESSAGE_TYPE_CADET_KX_PING); - msg.iv = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE, UINT32_MAX); - msg.target = *GCP_get_id (t->peer); - msg.nonce = t->kx_ctx->challenge; - - LOG (GNUNET_ERROR_TYPE_DEBUG, " sending %u\n", msg.nonce); - LOG (GNUNET_ERROR_TYPE_DEBUG, " towards %s\n", GNUNET_i2s (&msg.target)); - t_encrypt (t, &msg.target, &msg.target, - ping_encryption_size(), msg.iv, GNUNET_YES); - LOG (GNUNET_ERROR_TYPE_DEBUG, " e sending %u\n", msg.nonce); - LOG (GNUNET_ERROR_TYPE_DEBUG, " e towards %s\n", GNUNET_i2s (&msg.target)); - - send_kx (t, &msg.header); -} - /** * Send a pong message on a tunnel. @@ -1473,15 +1452,18 @@ rekey_tunnel (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) case CADET_TUNNEL_KEY_UNINITIALIZED: GCT_change_estate (t, CADET_TUNNEL_KEY_SENT); break; + case CADET_TUNNEL_KEY_SENT: break; + case CADET_TUNNEL_KEY_OK: GCT_change_estate (t, CADET_TUNNEL_KEY_REKEY); - /* fall-thru */ + break; + case CADET_TUNNEL_KEY_PING: case CADET_TUNNEL_KEY_REKEY: - send_ping (t); break; + default: LOG (GNUNET_ERROR_TYPE_DEBUG, "Unexpected state %u\n", t->estate); } @@ -1529,6 +1511,9 @@ rekey_iterator (void *cls, r = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, (uint32_t) n * 100); delay = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MILLISECONDS, r); t->rekey_task = GNUNET_SCHEDULER_add_delayed (delay, &rekey_tunnel, t); + if (NULL != t->kx_ctx) + t->kx_ctx->challenge = + GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_NONCE, INT32_MAX); return GNUNET_YES; } @@ -1901,50 +1886,20 @@ handle_ephemeral (struct CadetTunnel *t, } if (CADET_TUNNEL_KEY_SENT == t->estate) { - LOG (GNUNET_ERROR_TYPE_DEBUG, " our key was sent, sending ping\n"); - send_ping (t); + LOG (GNUNET_ERROR_TYPE_DEBUG, " our key was sent, sending challenge\n"); + send_ephemeral (t); GCT_change_estate (t, CADET_TUNNEL_KEY_PING); } -} - - -/** - * Peer wants to check our symmetrical keys by sending an encrypted challenge. - * Answer with by retransmitting the challenge with the "opposite" key. - * - * @param t Tunnel this message came on. - * @param msg Key eXchange Ping message. - */ -static void -handle_ping (struct CadetTunnel *t, - const struct GNUNET_CADET_KX_Ping *msg) -{ - struct GNUNET_CADET_KX_Ping res; - if (ntohs (msg->header.size) != sizeof (res)) + if (CADET_TUNNEL_KEY_UNINITIALIZED != ntohl(msg->sender_status)) { - GNUNET_break_op (0); - return; - } + uint32_t nonce; - LOG (GNUNET_ERROR_TYPE_INFO, "<=== PING for %s\n", GCT_2s (t)); - t_decrypt (t, &res.target, &msg->target, ping_encryption_size (), msg->iv); - if (0 != memcmp (&my_full_id, &res.target, sizeof (my_full_id))) - { - /* probably peer hasn't got our new EPHM yet and derived the wrong keys */ - GNUNET_STATISTICS_update (stats, "# malformed PINGs", 1, GNUNET_NO); - LOG (GNUNET_ERROR_TYPE_INFO, " malformed PING on %s\n", GCT_2s (t)); - LOG (GNUNET_ERROR_TYPE_DEBUG, " e got %u\n", msg->nonce); - LOG (GNUNET_ERROR_TYPE_DEBUG, " e towards %s\n", GNUNET_i2s (&msg->target)); - LOG (GNUNET_ERROR_TYPE_DEBUG, " got %u\n", res.nonce); - LOG (GNUNET_ERROR_TYPE_DEBUG, " towards %s\n", GNUNET_i2s (&res.target)); - create_kx_ctx (t); - send_ephemeral (t); - send_ping (t); - return; + LOG (GNUNET_ERROR_TYPE_DEBUG, " recv nonce e %u\n", msg->nonce); + t_decrypt (t, &nonce, &msg->nonce, ping_encryption_size (), msg->iv); + LOG (GNUNET_ERROR_TYPE_DEBUG, " recv nonce c %u\n", nonce); + send_pong (t, nonce); } - - send_pong (t, res.nonce); } @@ -1976,7 +1931,6 @@ handle_pong (struct CadetTunnel *t, LOG (GNUNET_ERROR_TYPE_DEBUG, "PONG: %u (e: %u). Expected: %u.\n", challenge, msg->nonce, t->kx_ctx->challenge); send_ephemeral (t); - send_ping (t); return; } GNUNET_SCHEDULER_cancel (t->rekey_task); @@ -2131,10 +2085,6 @@ GCT_handle_kx (struct CadetTunnel *t, handle_ephemeral (t, (struct GNUNET_CADET_KX_Ephemeral *) message); break; - case GNUNET_MESSAGE_TYPE_CADET_KX_PING: - handle_ping (t, (struct GNUNET_CADET_KX_Ping *) message); - break; - case GNUNET_MESSAGE_TYPE_CADET_KX_PONG: handle_pong (t, (struct GNUNET_CADET_KX_Pong *) message); break; diff --git a/src/include/gnunet_protocols.h b/src/include/gnunet_protocols.h index 1279dd703..62f0331d1 100644 --- a/src/include/gnunet_protocols.h +++ b/src/include/gnunet_protocols.h @@ -840,11 +840,6 @@ extern "C" */ #define GNUNET_MESSAGE_TYPE_CADET_KX_EPHEMERAL 263 -/** - * Challenge to test peer's session key. - */ -#define GNUNET_MESSAGE_TYPE_CADET_KX_PING 264 - /** * Answer to session key challenge. */