diff options
author | Matthias Schiffer <mschiffer@universe-factory.net> | 2012-03-26 03:06:03 +0200 |
---|---|---|
committer | Matthias Schiffer <mschiffer@universe-factory.net> | 2012-03-26 03:06:03 +0200 |
commit | a02fb0711ba496877c111b118b78d404151a8b8d (patch) | |
tree | 7537bd38a88e0f46751f93871bb44f66829d23af | |
parent | 44742f8aadb7a8a969f11d9b1d50c8be2573a576 (diff) | |
download | fastd-a02fb0711ba496877c111b118b78d404151a8b8d.tar fastd-a02fb0711ba496877c111b118b78d404151a8b8d.zip |
Initial implementation of the FHMQV-C handshake
-rw-r--r-- | src/CMakeLists.txt | 1 | ||||
-rw-r--r-- | src/config.c | 3 | ||||
-rw-r--r-- | src/fastd.h | 9 | ||||
-rw-r--r-- | src/peer.c | 6 | ||||
-rw-r--r-- | src/peer.h | 2 | ||||
-rw-r--r-- | src/protocol_ec25519_fhmqvc_xsalsa20_poly1305.c | 505 | ||||
-rw-r--r-- | src/protocol_null.c | 17 | ||||
-rw-r--r-- | src/random.c | 61 | ||||
-rw-r--r-- | src/types.h | 4 |
9 files changed, 570 insertions, 38 deletions
diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt index bd97f31..b2f360c 100644 --- a/src/CMakeLists.txt +++ b/src/CMakeLists.txt @@ -20,6 +20,7 @@ add_executable(fastd peer.c printf.c queue.c + random.c task.c ${FLEX_fastd_config_lex_OUTPUTS} ${BISON_fastd_config_parse_OUTPUTS} diff --git a/src/config.c b/src/config.c index db178df..f21e875 100644 --- a/src/config.c +++ b/src/config.c @@ -345,9 +345,6 @@ void fastd_configure(fastd_context *ctx, fastd_config *conf, int argc, char *con ok = false; } - if (ok) - ok = conf->protocol->check_config(ctx, conf); - if (!ok) exit_error(ctx, "config error"); } diff --git a/src/fastd.h b/src/fastd.h index 8aed925..8bd04ec 100644 --- a/src/fastd.h +++ b/src/fastd.h @@ -59,9 +59,6 @@ struct _fastd_eth_addr { struct _fastd_protocol { const char *name; - bool (*handle_config)(fastd_context *ctx, const fastd_config *conf, const char *option); - bool (*check_config)(fastd_context *ctx, const fastd_config *conf); - void (*init)(fastd_context *ctx); size_t (*max_packet_size)(fastd_context *ctx); @@ -73,7 +70,7 @@ struct _fastd_protocol { void (*handle_recv)(fastd_context *ctx, fastd_peer *peer, fastd_buffer buffer); void (*send)(fastd_context *ctx, fastd_peer *peer, fastd_buffer buffer); - void (*free_peer_private)(fastd_context *ctx, fastd_peer *peer); + void (*free_peer_state)(fastd_context *ctx, fastd_peer *peer); }; struct _fastd_config { @@ -117,7 +114,7 @@ struct _fastd_context { size_t n_eth_addr; fastd_peer_eth_addr *eth_addr; - void *protocol_context; + fastd_protocol_context *protocol_context; }; @@ -126,6 +123,8 @@ void fastd_printf(const fastd_context *ctx, const char *format, ...); void fastd_read_config(fastd_context *ctx, fastd_config *conf, const char *filename, int depth); void fastd_configure(fastd_context *ctx, fastd_config *conf, int argc, char *const argv[]); +void fastd_random_bytes(fastd_context *ctx, void *buffer, size_t len, bool secure); + #define pr_log(ctx, level, prefix, args...) if ((ctx)->conf == NULL || (level) <= (ctx)->conf->loglevel) \ do { fputs(prefix, stderr); fastd_printf(ctx, args); fputs("\n", stderr); } while(0) @@ -50,8 +50,8 @@ const fastd_eth_addr* fastd_get_dest_address(const fastd_context *ctx, fastd_buf } static inline void reset_peer(fastd_context *ctx, fastd_peer *peer) { - ctx->conf->protocol->free_peer_private(ctx, peer); - peer->protocol_private = NULL; + ctx->conf->protocol->free_peer_state(ctx, peer); + peer->protocol_state = NULL; int i, deleted = 0; for (i = 0; i < ctx->n_eth_addr; i++) { @@ -95,7 +95,7 @@ static fastd_peer* add_peer(fastd_context *ctx) { peer->next = ctx->peers; peer->last_req_id = 0; - peer->protocol_private = NULL; + peer->protocol_state = NULL; ctx->peers = peer; @@ -49,7 +49,7 @@ struct _fastd_peer { struct timespec seen; - void *protocol_private; + fastd_protocol_peer_state *protocol_state; }; struct _fastd_peer_config { diff --git a/src/protocol_ec25519_fhmqvc_xsalsa20_poly1305.c b/src/protocol_ec25519_fhmqvc_xsalsa20_poly1305.c index 4152601..c729428 100644 --- a/src/protocol_ec25519_fhmqvc_xsalsa20_poly1305.c +++ b/src/protocol_ec25519_fhmqvc_xsalsa20_poly1305.c @@ -29,34 +29,165 @@ #include "fastd.h" #include "peer.h" +#include "task.h" #include <arpa/inet.h> #include <libuecc/ecc.h> +#include <crypto_auth_hmacsha256.h> +#include <crypto_hash_sha256.h> #include <crypto_secretbox_xsalsa20poly1305.h> -typedef struct _protocol_context { - ecc_secret_key_256 secret_key; -} protocol_context; +#define NONCEBYTES crypto_secretbox_xsalsa20poly1305_NONCEBYTES +#define PUBLICKEYBYTES 32 +#define SECRETKEYBYTES 32 +#define HMACBYTES crypto_auth_hmacsha256_BYTES +#define HASHBYTES crypto_hash_sha256_BYTES + + +#if HASHBYTES != crypto_auth_hmacsha256_KEYBYTES +#error bug: HASHBYTES != crypto_auth_hmacsha256_KEYBYTES +#endif + +#if HASHBYTES != crypto_secretbox_xsalsa20poly1305_KEYBYTES +#error bug: HASHBYTES != crypto_secretbox_xsalsa20poly1305_KEYBYTES +#endif + +#if HASHBYTES != SECRETKEYBYTES +#error bug: HASHBYTES != SECRETKEYBYTES +#endif -typedef struct _protocol_peer_config { + +struct _fastd_protocol_context { + ecc_secret_key_256 secret_key; ecc_public_key_256 public_key; -} protocol_peer_config; +}; + +typedef enum _handshake_state { + HANDSHAKE_STATE_INIT = 0, + HANDSHAKE_STATE_RESPONSE, + HANDSHAKE_STATE_FINISH, + HANDSHAKE_STATE_ESTABLISHED +} handshake_state; + +struct _fastd_protocol_peer_state { + ecc_public_key_256 peer_public_key; + + handshake_state state; + ecc_secret_key_256 handshake_secret_key; + ecc_public_key_256 handshake_public_key; + ecc_public_key_256 peer_handshake_key; + ecc_public_key_256 sigma; + + uint8_t shared_handshake_key[HASHBYTES]; + uint8_t shared_session_key[HASHBYTES]; + uint8_t send_nonce[NONCEBYTES]; + uint8_t receive_nonce[NONCEBYTES]; +}; -typedef struct _protocol_peer_state { -} protocol_peer_state; +typedef enum _handshake_packet_type { + HANDSHAKE_PACKET_INIT = 0, + HANDSHAKE_PACKET_RESPONSE, + HANDSHAKE_PACKET_FINISH +} handshake_packet_type; + +typedef struct __attribute__ ((__packed__)) _protocol_handshake_init_packet { + uint8_t noncepad[NONCEBYTES]; + uint8_t type; + + uint8_t sender_key[PUBLICKEYBYTES]; + uint8_t receipient_key[PUBLICKEYBYTES]; + uint8_t handshake_key[PUBLICKEYBYTES]; +} protocol_handshake_init_packet; + +typedef struct __attribute__ ((__packed__)) _protocol_handshake_response_finish_packet { + uint8_t noncepad[NONCEBYTES]; + uint8_t type; + + uint8_t sender_key[PUBLICKEYBYTES]; + uint8_t receipient_key[PUBLICKEYBYTES]; + uint8_t handshake_key[PUBLICKEYBYTES]; + uint8_t handshake_key2[PUBLICKEYBYTES]; + uint8_t t[HMACBYTES]; +} protocol_handshake_response_packet, protocol_handshake_finish_packet; + +typedef union _protocol_handshake_packet { + struct { + uint8_t noncepad[NONCEBYTES]; + uint8_t type; + }; + protocol_handshake_init_packet init; + protocol_handshake_response_packet response; + protocol_handshake_finish_packet finish; +} protocol_handshake_packet; + + +static inline bool read_key(uint8_t key[32], const char *hexkey) { + if ((strlen(hexkey) != 64) || (strspn(hexkey, "0123456789abcdefABCDEF") != 64)) + return false; + + int i; + for (i = 0; i < 32; i++) + sscanf(&hexkey[2*i], "%02hhx", &key[i]); + return true; +} + +static inline bool is_nonce_zero(const uint8_t nonce[NONCEBYTES]) { + int i; + for (i = 0; i < NONCEBYTES; i++) { + if (nonce[i] != 0) + return false; + } -static bool protocol_check_config(fastd_context *ctx, const fastd_config *conf) { return true; } +static inline void increment_nonce(uint8_t nonce[NONCEBYTES]) { + nonce[0] += 2; + + if (nonce[0] == 0 || nonce[0] == 1) { + int i; + for (i = 1; i < NONCEBYTES; i++) { + nonce[i]++; + if (nonce[i] != 0) + break; + } + } +} + +static inline bool is_nonce_valid(const uint8_t nonce[NONCEBYTES], const uint8_t old_nonce[NONCEBYTES]) { + if ((nonce[0] & 1) != (old_nonce[0] & 1)) + return false; + + int i; + for (i = NONCEBYTES-1; i >= 0; i--) { + if (nonce[i] > old_nonce[i]) + return true; + if (nonce[i] < old_nonce[i]) + return false; + } + + return false; +} + static void protocol_init(fastd_context *ctx) { + ctx->protocol_context = malloc(sizeof(fastd_protocol_context)); + + if (!ctx->conf->secret) + exit_error(ctx, "no secret key configured"); + + if (!read_key(ctx->protocol_context->secret_key.s, ctx->conf->secret)) + exit_error(ctx, "invalid secret key"); + + ecc_25519_work work; + ecc_25519_scalarmult_base(&work, &ctx->protocol_context->secret_key); + ecc_25519_store(&ctx->protocol_context->public_key, &work); } static size_t protocol_max_packet_size(fastd_context *ctx) { - return (fastd_max_packet_size(ctx) - crypto_secretbox_xsalsa20poly1305_NONCEBYTES); + return (fastd_max_packet_size(ctx) - NONCEBYTES); } static char* protocol_peer_str(const fastd_context *ctx, const fastd_peer *peer) { @@ -92,11 +223,360 @@ static char* protocol_peer_str(const fastd_context *ctx, const fastd_peer *peer) return NULL; } +static bool create_peer_state(fastd_context *ctx, fastd_peer *peer) { + peer->protocol_state = malloc(sizeof(fastd_protocol_peer_state)); + + if (!peer->config->key) { + pr_warn(ctx, "no public key configured - ignoring peer %P", peer); + return false; + } + + if (!read_key(peer->protocol_state->peer_public_key.p, peer->config->key)) { + pr_warn(ctx, "invalid public key configured - ignoring peer %P", peer); + return false; + } + + peer->protocol_state->state = HANDSHAKE_STATE_INIT; + + return true; +} + static void protocol_init_peer(fastd_context *ctx, fastd_peer *peer) { pr_info(ctx, "Initializing session with %P...", peer); + + if (peer->protocol_state) { + pr_warn(ctx, "trying to reinitialize session with %P", peer); + return; + } + + if (!create_peer_state(ctx, peer)) + return; /* TODO disable peer */ + + fastd_random_bytes(ctx, peer->protocol_state->handshake_secret_key.s, 32, false); + ecc_25519_secret_sanitize(&peer->protocol_state->handshake_secret_key, &peer->protocol_state->handshake_secret_key); + + ecc_25519_work work; + ecc_25519_scalarmult_base(&work, &peer->protocol_state->handshake_secret_key); + ecc_25519_store(&peer->protocol_state->handshake_public_key, &work); + + fastd_buffer buffer = fastd_buffer_alloc(sizeof(protocol_handshake_init_packet), 0, 0); + protocol_handshake_init_packet *packet = buffer.data; + + memset(packet->noncepad, 0, NONCEBYTES); + packet->type = HANDSHAKE_PACKET_INIT; + memcpy(packet->sender_key, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(packet->receipient_key, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(packet->handshake_key, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + + fastd_task_put_send(ctx, peer, buffer); +} + +static void respond_handshake(fastd_context *ctx, fastd_peer *peer) { + pr_info(ctx, "Responding protocol handshake with %P...", peer); + + fastd_random_bytes(ctx, peer->protocol_state->handshake_secret_key.s, 32, false); + ecc_25519_secret_sanitize(&peer->protocol_state->handshake_secret_key, &peer->protocol_state->handshake_secret_key); + + ecc_25519_work work; + ecc_25519_scalarmult_base(&work, &peer->protocol_state->handshake_secret_key); + ecc_25519_store(&peer->protocol_state->handshake_public_key, &work); + + uint8_t hashinput[5*PUBLICKEYBYTES]; + uint8_t hashbuf[HASHBYTES]; + + memcpy(hashinput, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + memcpy(hashinput+2*PUBLICKEYBYTES, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+3*PUBLICKEYBYTES, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + + crypto_hash_sha256(hashbuf, hashinput, 4*PUBLICKEYBYTES); + + ecc_secret_key_256 d = {{0}}, e = {{0}}, eb, s; + + memcpy(d.s, hashbuf, HASHBYTES/2); + memcpy(e.s, hashbuf+HASHBYTES/2, HASHBYTES/2); + + d.s[15] |= 0x80; + e.s[15] |= 0x80; + + ecc_25519_secret_mult(&eb, &e, &ctx->protocol_context->secret_key); + ecc_25519_secret_add(&s, &eb, &peer->protocol_state->handshake_secret_key); + + ecc_25519_work workX; + ecc_25519_load(&work, &peer->protocol_state->peer_public_key); + ecc_25519_load(&workX, &peer->protocol_state->peer_handshake_key); + + ecc_25519_scalarmult(&work, &d, &work); + ecc_25519_add(&work, &workX, &work); + ecc_25519_scalarmult(&work, &s, &work); + + ecc_25519_store(&peer->protocol_state->sigma, &work); + + memcpy(hashinput+4*PUBLICKEYBYTES, peer->protocol_state->sigma.p, PUBLICKEYBYTES); + crypto_hash_sha256(peer->protocol_state->shared_handshake_key, hashinput, 5*PUBLICKEYBYTES); + + memcpy(hashinput, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + + fastd_buffer buffer = fastd_buffer_alloc(sizeof(protocol_handshake_response_packet), 0, 0); + protocol_handshake_response_packet *packet = buffer.data; + + memset(packet->noncepad, 0, NONCEBYTES); + packet->type = HANDSHAKE_PACKET_RESPONSE; + memcpy(packet->sender_key, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(packet->receipient_key, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(packet->handshake_key, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + memcpy(packet->handshake_key2, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + + crypto_auth_hmacsha256(packet->t, hashinput, 2*PUBLICKEYBYTES, peer->protocol_state->shared_handshake_key); + + fastd_task_put_send(ctx, peer, buffer); + + peer->protocol_state->state = HANDSHAKE_STATE_RESPONSE; +} + +static void establish(fastd_context *ctx, fastd_peer *peer, bool initiator) { + peer->protocol_state->state = HANDSHAKE_STATE_ESTABLISHED; + + int i; + + peer->protocol_state->send_nonce[0] = initiator ? 3 : 2; + peer->protocol_state->receive_nonce[0] = initiator ? 0 : 1; + for (i = 1; i < NONCEBYTES; i++) { + peer->protocol_state->send_nonce[i] = 0; + peer->protocol_state->receive_nonce[i] = 0; + } + + pr_info(ctx, "Connection with %P established.", peer); +} + +static void finish_handshake(fastd_context *ctx, fastd_peer *peer, uint8_t t[HMACBYTES]) { + pr_info(ctx, "Finishing protocol handshake with %P...", peer); + + uint8_t hashinput[5*PUBLICKEYBYTES]; + uint8_t hashbuf[HASHBYTES]; + + memcpy(hashinput, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+2*PUBLICKEYBYTES, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+3*PUBLICKEYBYTES, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + + crypto_hash_sha256(hashbuf, hashinput, 4*PUBLICKEYBYTES); + + ecc_secret_key_256 d = {{0}}, e = {{0}}, da, s; + + memcpy(d.s, hashbuf, HASHBYTES/2); + memcpy(e.s, hashbuf+HASHBYTES/2, HASHBYTES/2); + + d.s[15] |= 0x80; + e.s[15] |= 0x80; + + ecc_25519_secret_mult(&da, &d, &ctx->protocol_context->secret_key); + ecc_25519_secret_add(&s, &da, &peer->protocol_state->handshake_secret_key); + + ecc_25519_work work, workY; + ecc_25519_load(&work, &peer->protocol_state->peer_public_key); + ecc_25519_load(&workY, &peer->protocol_state->peer_handshake_key); + + ecc_25519_scalarmult(&work, &e, &work); + ecc_25519_add(&work, &workY, &work); + ecc_25519_scalarmult(&work, &s, &work); + + ecc_25519_store(&peer->protocol_state->sigma, &work); + + memcpy(hashinput+4*PUBLICKEYBYTES, peer->protocol_state->sigma.p, PUBLICKEYBYTES); + crypto_hash_sha256(peer->protocol_state->shared_handshake_key, hashinput, 5*PUBLICKEYBYTES); + + memcpy(hashinput, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + + if(crypto_auth_hmacsha256_verify(t, hashinput, 2*PUBLICKEYBYTES, peer->protocol_state->shared_handshake_key) != 0) { + pr_warn(ctx, "received invalid protocol handshake response from %P", peer); + return; + } + + memcpy(hashinput, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + + fastd_buffer buffer = fastd_buffer_alloc(sizeof(protocol_handshake_finish_packet), 0, 0); + protocol_handshake_finish_packet *packet = buffer.data; + + memset(packet->noncepad, 0, NONCEBYTES); + packet->type = HANDSHAKE_PACKET_FINISH; + memcpy(packet->sender_key, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(packet->receipient_key, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(packet->handshake_key, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + memcpy(packet->handshake_key2, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + + crypto_auth_hmacsha256(packet->t, hashinput, 2*PUBLICKEYBYTES, peer->protocol_state->shared_handshake_key); + + fastd_task_put_send(ctx, peer, buffer); + + memcpy(hashinput, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + memcpy(hashinput+2*PUBLICKEYBYTES, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+3*PUBLICKEYBYTES, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+4*PUBLICKEYBYTES, peer->protocol_state->sigma.p, PUBLICKEYBYTES); + crypto_hash_sha256(peer->protocol_state->shared_session_key, hashinput, 5*PUBLICKEYBYTES); + + establish(ctx, peer, true); +} + +static void handle_finish_handshake(fastd_context *ctx, fastd_peer *peer, uint8_t t[HMACBYTES]) { + uint8_t hashinput[5*PUBLICKEYBYTES]; + + memcpy(hashinput, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + + if(crypto_auth_hmacsha256_verify(t, hashinput, 2*PUBLICKEYBYTES, peer->protocol_state->shared_handshake_key) != 0) { + pr_warn(ctx, "received invalid protocol handshake finish from %P", peer); + return; + } + + memcpy(hashinput, peer->protocol_state->peer_handshake_key.p, PUBLICKEYBYTES); + memcpy(hashinput+PUBLICKEYBYTES, peer->protocol_state->handshake_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+2*PUBLICKEYBYTES, peer->protocol_state->peer_public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+3*PUBLICKEYBYTES, ctx->protocol_context->public_key.p, PUBLICKEYBYTES); + memcpy(hashinput+4*PUBLICKEYBYTES, peer->protocol_state->sigma.p, PUBLICKEYBYTES); + crypto_hash_sha256(peer->protocol_state->shared_session_key, hashinput, 5*PUBLICKEYBYTES); + + establish(ctx, peer, false); } static void protocol_handle_recv(fastd_context *ctx, fastd_peer *peer, fastd_buffer buffer) { + if (buffer.len < NONCEBYTES) + goto end; + + /* protocol handshake */ + if (is_nonce_zero(buffer.data)) { + if (buffer.len < NONCEBYTES+1) { + pr_debug(ctx, "received short protocol handshake from %P", peer); + goto end; + } + + protocol_handshake_packet *packet = buffer.data; + + if (!peer->config) { + pr_debug(ctx, "received protocol handshake from temporary peer %P", peer); + goto end; + } + + if (!peer->protocol_state) { + if (!create_peer_state(ctx, peer)) + goto end; /* TODO disable peer */ + } + + switch (packet->type) { + case HANDSHAKE_PACKET_INIT: + if (buffer.len < sizeof(protocol_handshake_init_packet)) { + pr_debug(ctx, "received short protocol handshake init from %P", peer); + goto end; + } + + if (memcmp(ctx->protocol_context->public_key.p, packet->init.receipient_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake init with wrong receipient key from %P", peer); + goto end; + } + + if (memcmp(peer->protocol_state->peer_public_key.p, packet->init.sender_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake init with wrong sender key from %P", peer); + goto end; + } + + if (peer->protocol_state->state != HANDSHAKE_STATE_INIT) { + pr_debug(ctx, "received unexpected protocol handshake init from %P", peer); + goto end; + } + + pr_debug(ctx, "received protocol handshake init from %P", peer); + memcpy(peer->protocol_state->peer_handshake_key.p, packet->init.handshake_key, PUBLICKEYBYTES); + + fastd_peer_set_established(ctx, peer); + respond_handshake(ctx, peer); + + break; + + case HANDSHAKE_PACKET_RESPONSE: + if (buffer.len < sizeof(protocol_handshake_response_packet)) { + pr_debug(ctx, "received short protocol handshake response from %P", peer); + goto end; + } + + if (memcmp(ctx->protocol_context->public_key.p, packet->response.receipient_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake response with wrong receipient key from %P", peer); + goto end; + } + + if (memcmp(peer->protocol_state->peer_public_key.p, packet->response.sender_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake response with wrong sender key from %P", peer); + goto end; + } + + if (memcmp(peer->protocol_state->handshake_public_key.p, packet->response.handshake_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake response with unexpected handshake key from %P", peer); + goto end; + } + + if (peer->protocol_state->state != HANDSHAKE_STATE_INIT) { + pr_debug(ctx, "received unexpected protocol handshake response from %P", peer); + goto end; + } + + + pr_debug(ctx, "received protocol handshake response from %P", peer); + memcpy(peer->protocol_state->peer_handshake_key.p, packet->response.handshake_key2, PUBLICKEYBYTES); + + finish_handshake(ctx, peer, packet->response.t); + + break; + + case HANDSHAKE_PACKET_FINISH: + if (buffer.len < sizeof(protocol_handshake_finish_packet)) { + pr_debug(ctx, "received short protocol handshake finish from %P", peer); + goto end; + } + + if (memcmp(ctx->protocol_context->public_key.p, packet->finish.receipient_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake finish with wrong receipient key from %P", peer); + goto end; + } + + if (memcmp(peer->protocol_state->peer_public_key.p, packet->finish.sender_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake finish with wrong sender key from %P", peer); + goto end; + } + + if (memcmp(peer->protocol_state->handshake_public_key.p, packet->finish.handshake_key, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake finish with unexpected handshake key from %P", peer); + goto end; + } + + if (memcmp(peer->protocol_state->peer_handshake_key.p, packet->finish.handshake_key2, PUBLICKEYBYTES) != 0) { + pr_debug(ctx, "received protocol handshake finish with unexpected peer handshake key from %P", peer); + goto end; + } + + if (peer->protocol_state->state != HANDSHAKE_STATE_RESPONSE) { + pr_debug(ctx, "received unexpected protocol handshake finish from %P", peer); + goto end; + } + + + pr_debug(ctx, "received protocol handshake finish from %P", peer); + + handle_finish_handshake(ctx, peer, packet->finish.t); + + break; + } + } + else { + if (!peer->protocol_state || peer->protocol_state->state != HANDSHAKE_STATE_ESTABLISHED) { + pr_debug(ctx, "received unexpected non-handshake packet from %P", peer); + goto end; + } + } + + end: fastd_buffer_free(buffer); } @@ -104,15 +584,14 @@ static void protocol_send(fastd_context *ctx, fastd_peer *peer, fastd_buffer buf fastd_buffer_free(buffer); } -static void protocol_free_peer_private(fastd_context *ctx, fastd_peer *peer) { +static void protocol_free_peer_state(fastd_context *ctx, fastd_peer *peer) { + free(peer->protocol_state); } const fastd_protocol fastd_protocol_ec25519_fhmqvc_xsalsa20_poly1305 = { .name = "ec25519-fhmqvc-xsalsa20-poly1305", - .check_config = protocol_check_config, - .init = protocol_init, .max_packet_size = protocol_max_packet_size, @@ -123,5 +602,5 @@ const fastd_protocol fastd_protocol_ec25519_fhmqvc_xsalsa20_poly1305 = { .handle_recv = protocol_handle_recv, .send = protocol_send, - .free_peer_private = protocol_free_peer_private, + .free_peer_state = protocol_free_peer_state, }; diff --git a/src/protocol_null.c b/src/protocol_null.c index 410d848..ffe6ad1 100644 --- a/src/protocol_null.c +++ b/src/protocol_null.c @@ -34,16 +34,9 @@ #include <arpa/inet.h> -static bool protocol_check_config(fastd_context *ctx, const fastd_config *conf) { - if (conf->n_floating > 1) { - pr_error(ctx, "with protocol `null' use can't define more than one floating peer"); - return false; - } - - return true; -} - static void protocol_init(fastd_context *ctx) { + if (ctx->conf->n_floating > 1) + exit_error(ctx, "with protocol `null' use can't define more than one floating peer"); } static size_t protocol_max_packet_size(fastd_context *ctx) { @@ -121,15 +114,13 @@ static void protocol_send(fastd_context *ctx, fastd_peer *peer, fastd_buffer buf fastd_task_put_send(ctx, peer, buffer); } -static void protocol_free_peer_private(fastd_context *ctx, fastd_peer *peer) { +static void protocol_free_peer_state(fastd_context *ctx, fastd_peer *peer) { } const fastd_protocol fastd_protocol_null = { .name = "null", - .check_config = protocol_check_config, - .init = protocol_init, .max_packet_size = protocol_max_packet_size, @@ -140,5 +131,5 @@ const fastd_protocol fastd_protocol_null = { .handle_recv = protocol_handle_recv, .send = protocol_send, - .free_peer_private = protocol_free_peer_private, + .free_peer_state = protocol_free_peer_state, }; diff --git a/src/random.c b/src/random.c new file mode 100644 index 0000000..0681d77 --- /dev/null +++ b/src/random.c @@ -0,0 +1,61 @@ +/* + Copyright (c) 2012, Matthias Schiffer <mschiffer@universe-factory.net> + Partly based on QuickTun Copyright (c) 2010, Ivo Smits <Ivo@UCIS.nl>. + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + 2. Redistributions in binary form must reproduce the above copyright notice, + this list of conditions and the following disclaimer in the documentation + and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +*/ + + +#include "fastd.h" + +#include <fcntl.h> +#include <sys/stat.h> +#include <unistd.h> + + +void fastd_random_bytes(fastd_context *ctx, void *buffer, size_t len, bool secure) { + int fd; + size_t read_bytes = 0; + + if (secure) + fd = open("/dev/random", O_RDONLY); + else + fd = open("/dev/urandom", O_RDONLY); + + if (fd < 0) + exit_errno(ctx, "unable to open random device"); + + while (read_bytes < len) { + ssize_t ret = read(fd, ((char*)buffer)+read_bytes, len-read_bytes); + + if (ret < 0) { + if (errno == EINTR) + continue; + + exit_errno(ctx, "unable to read from random device"); + } + + read_bytes += ret; + } + + close(fd); +} diff --git a/src/types.h b/src/types.h index 2f6b36a..9e6e668 100644 --- a/src/types.h +++ b/src/types.h @@ -68,4 +68,8 @@ typedef struct _fastd_context fastd_context; typedef struct _fastd_protocol fastd_protocol; +/* May be defined by the protocol however it likes */ +typedef struct _fastd_protocol_context fastd_protocol_context; +typedef struct _fastd_protocol_peer_state fastd_protocol_peer_state; + #endif /* _FASTD_TYPES_H_ */ |