1// Copyright 2019 Parity Technologies (UK) Ltd.
2//
3// Permission is hereby granted, free of charge, to any person obtaining a
4// copy of this software and associated documentation files (the "Software"),
5// to deal in the Software without restriction, including without limitation
6// the rights to use, copy, modify, merge, publish, distribute, sublicense,
7// and/or sell copies of the Software, and to permit persons to whom the
8// Software is furnished to do so, subject to the following conditions:
9//
10// The above copyright notice and this permission notice shall be included in
11// all copies or substantial portions of the Software.
12//
13// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
14// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
15// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
16// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
17// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
18// FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
19// DEALINGS IN THE SOFTWARE.
2021//! Noise protocol handshake I/O.
2223pub(super) mod proto {
24#![allow(unreachable_pub)]
25include!("../generated/mod.rs");
26pub use self::payload::proto::{NoiseExtensions, NoiseHandshakePayload};
27}
2829use std::{collections::HashSet, io, mem};
3031use asynchronous_codec::Framed;
32use futures::prelude::*;
33use libp2p_identity as identity;
34use multihash::Multihash;
35use quick_protobuf::MessageWrite;
3637use super::framed::Codec;
38use crate::{
39 io::Output,
40 protocol::{KeypairIdentity, PublicKey, STATIC_KEY_DOMAIN},
41 Error,
42};
4344//////////////////////////////////////////////////////////////////////////////
45// Internal
4647/// Handshake state.
48pub(crate) struct State<T> {
49/// The underlying I/O resource.
50io: Framed<T, Codec<snow::HandshakeState>>,
51/// The associated public identity of the local node's static DH keypair,
52 /// which can be sent to the remote as part of an authenticated handshake.
53identity: KeypairIdentity,
54/// The received signature over the remote's static DH public key, if any.
55dh_remote_pubkey_sig: Option<Vec<u8>>,
56/// The known or received public identity key of the remote, if any.
57id_remote_pubkey: Option<identity::PublicKey>,
58/// The WebTransport certhashes of the responder, if any.
59responder_webtransport_certhashes: Option<HashSet<Multihash<64>>>,
60/// The received extensions of the remote, if any.
61remote_extensions: Option<Extensions>,
62}
6364/// Extensions
65struct Extensions {
66 webtransport_certhashes: HashSet<Multihash<64>>,
67}
6869impl<T> State<T>
70where
71T: AsyncRead + AsyncWrite,
72{
73/// Initializes the state for a new Noise handshake, using the given local
74 /// identity keypair and local DH static public key. The handshake messages
75 /// will be sent and received on the given I/O resource and using the
76 /// provided session for cryptographic operations according to the chosen
77 /// Noise handshake pattern.
78pub(crate) fn new(
79 io: T,
80 session: snow::HandshakeState,
81 identity: KeypairIdentity,
82 expected_remote_key: Option<identity::PublicKey>,
83 responder_webtransport_certhashes: Option<HashSet<Multihash<64>>>,
84 ) -> Self {
85Self {
86 identity,
87 io: Framed::new(io, Codec::new(session)),
88 dh_remote_pubkey_sig: None,
89 id_remote_pubkey: expected_remote_key,
90 responder_webtransport_certhashes,
91 remote_extensions: None,
92 }
93 }
94}
9596impl<T> State<T>
97where
98T: AsyncRead + AsyncWrite,
99{
100/// Finish a handshake, yielding the established remote identity and the
101 /// [`Output`] for communicating on the encrypted channel.
102pub(crate) fn finish(self) -> Result<(identity::PublicKey, Output<T>), Error> {
103let is_initiator = self.io.codec().is_initiator();
104105let (pubkey, framed) = map_into_transport(self.io)?;
106107let id_pk = self
108.id_remote_pubkey
109 .ok_or_else(|| Error::AuthenticationFailed)?;
110111let is_valid_signature = self.dh_remote_pubkey_sig.as_ref().is_some_and(|s| {
112 id_pk.verify(&[STATIC_KEY_DOMAIN.as_bytes(), pubkey.as_ref()].concat(), s)
113 });
114115if !is_valid_signature {
116return Err(Error::BadSignature);
117 }
118119// Check WebTransport certhashes that responder reported back to us.
120if is_initiator {
121// We check only if we care (i.e. Config::with_webtransport_certhashes was used).
122if let Some(expected_certhashes) = self.responder_webtransport_certhashes {
123let ext = self.remote_extensions.ok_or_else(|| {
124 Error::UnknownWebTransportCerthashes(
125 expected_certhashes.to_owned(),
126 HashSet::new(),
127 )
128 })?;
129130let received_certhashes = ext.webtransport_certhashes;
131132// Expected WebTransport certhashes must be a strict subset
133 // of the reported ones.
134if !expected_certhashes.is_subset(&received_certhashes) {
135return Err(Error::UnknownWebTransportCerthashes(
136 expected_certhashes,
137 received_certhashes,
138 ));
139 }
140 }
141 }
142143Ok((id_pk, Output::new(framed)))
144 }
145}
146147/// Maps the provided [`Framed`] from the [`snow::HandshakeState`] into the
148/// [`snow::TransportState`].
149///
150/// This is a bit tricky because [`Framed`] cannot just be de-composed but only into its
151/// [`FramedParts`](asynchronous_codec::FramedParts). However, we need to retain the original
152/// [`FramedParts`](asynchronous_codec::FramedParts) because they contain the active read & write
153/// buffers.
154///
155/// Those are likely **not** empty because the remote may directly write to the stream again after
156/// the noise handshake finishes.
157fn map_into_transport<T>(
158 framed: Framed<T, Codec<snow::HandshakeState>>,
159) -> Result<(PublicKey, Framed<T, Codec<snow::TransportState>>), Error>
160where
161T: AsyncRead + AsyncWrite,
162{
163let mut parts = framed.into_parts().map_codec(Some);
164165let (pubkey, codec) = mem::take(&mut parts.codec)
166 .expect("We just set it to `Some`")
167 .into_transport()?;
168169let parts = parts.map_codec(|_| codec);
170let framed = Framed::from_parts(parts);
171172Ok((pubkey, framed))
173}
174175impl From<proto::NoiseExtensions> for Extensions {
176fn from(value: proto::NoiseExtensions) -> Self {
177 Extensions {
178 webtransport_certhashes: value
179 .webtransport_certhashes
180 .into_iter()
181 .filter_map(|bytes| Multihash::read(&bytes[..]).ok())
182 .collect(),
183 }
184 }
185}
186187//////////////////////////////////////////////////////////////////////////////
188// Handshake Message Futures
189190/// A future for receiving a Noise handshake message.
191async fn recv<T>(state: &mut State<T>) -> Result<proto::NoiseHandshakePayload, Error>
192where
193T: AsyncRead + Unpin,
194{
195match state.io.next().await {
196None => Err(io::Error::new(io::ErrorKind::UnexpectedEof, "eof").into()),
197Some(Err(e)) => Err(e.into()),
198Some(Ok(p)) => Ok(p),
199 }
200}
201202/// A future for receiving a Noise handshake message with an empty payload.
203pub(crate) async fn recv_empty<T>(state: &mut State<T>) -> Result<(), Error>
204where
205T: AsyncRead + Unpin,
206{
207let payload = recv(state).await?;
208if payload.get_size() != 0 {
209return Err(io::Error::new(io::ErrorKind::InvalidData, "Expected empty payload.").into());
210 }
211212Ok(())
213}
214215/// A future for sending a Noise handshake message with an empty payload.
216pub(crate) async fn send_empty<T>(state: &mut State<T>) -> Result<(), Error>
217where
218T: AsyncWrite + Unpin,
219{
220 state
221 .io
222 .send(&proto::NoiseHandshakePayload::default())
223 .await?;
224Ok(())
225}
226227/// A future for receiving a Noise handshake message with a payload identifying the remote.
228pub(crate) async fn recv_identity<T>(state: &mut State<T>) -> Result<(), Error>
229where
230T: AsyncRead + Unpin,
231{
232let pb = recv(state).await?;
233 state.id_remote_pubkey = Some(identity::PublicKey::try_decode_protobuf(&pb.identity_key)?);
234235if !pb.identity_sig.is_empty() {
236 state.dh_remote_pubkey_sig = Some(pb.identity_sig);
237 }
238239if let Some(extensions) = pb.extensions {
240 state.remote_extensions = Some(extensions.into());
241 }
242243Ok(())
244}
245246/// Send a Noise handshake message with a payload identifying the local node to the remote.
247pub(crate) async fn send_identity<T>(state: &mut State<T>) -> Result<(), Error>
248where
249T: AsyncRead + AsyncWrite + Unpin,
250{
251let mut pb = proto::NoiseHandshakePayload {
252 identity_key: state.identity.public.encode_protobuf(),
253 ..Default::default()
254 };
255256 pb.identity_sig.clone_from(&state.identity.signature);
257258// If this is the responder then send WebTransport certhashes to initiator, if any.
259if state.io.codec().is_responder() {
260if let Some(ref certhashes) = state.responder_webtransport_certhashes {
261let ext = pb
262 .extensions
263 .get_or_insert_with(proto::NoiseExtensions::default);
264265 ext.webtransport_certhashes = certhashes.iter().map(|hash| hash.to_bytes()).collect();
266 }
267 }
268269 state.io.send(&pb).await?;
270271Ok(())
272}