2016-10-18 05:41:20 +03:00
|
|
|
package brontide
|
|
|
|
|
|
|
|
import (
|
2018-04-01 17:00:33 +03:00
|
|
|
"errors"
|
2018-06-28 06:39:19 +03:00
|
|
|
"fmt"
|
2016-10-18 05:41:20 +03:00
|
|
|
"io"
|
|
|
|
"net"
|
2017-10-05 00:56:31 +03:00
|
|
|
"time"
|
2016-10-18 05:41:20 +03:00
|
|
|
|
2018-06-05 04:34:16 +03:00
|
|
|
"github.com/btcsuite/btcd/btcec"
|
2016-10-18 05:41:20 +03:00
|
|
|
)
|
|
|
|
|
2018-04-01 17:00:33 +03:00
|
|
|
// defaultHandshakes is the maximum number of handshakes that can be done in
|
|
|
|
// parallel.
|
|
|
|
const defaultHandshakes = 1000
|
|
|
|
|
2016-10-18 05:41:20 +03:00
|
|
|
// Listener is an implementation of a net.Conn which executes an authenticated
|
2017-08-02 03:17:55 +03:00
|
|
|
// key exchange and message encryption protocol dubbed "Machine" after
|
2017-02-23 22:56:47 +03:00
|
|
|
// initial connection acceptance. See the Machine struct for additional
|
2016-10-18 05:41:20 +03:00
|
|
|
// details w.r.t the handshake and encryption scheme used within the
|
|
|
|
// connection.
|
|
|
|
type Listener struct {
|
|
|
|
localStatic *btcec.PrivateKey
|
|
|
|
|
|
|
|
tcp *net.TCPListener
|
2018-04-01 17:00:33 +03:00
|
|
|
|
|
|
|
handshakeSema chan struct{}
|
|
|
|
conns chan maybeConn
|
|
|
|
quit chan struct{}
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// A compile-time assertion to ensure that Conn meets the net.Listener interface.
|
|
|
|
var _ net.Listener = (*Listener)(nil)
|
|
|
|
|
|
|
|
// NewListener returns a new net.Listener which enforces the Brontide scheme
|
|
|
|
// during both initial connection establishment and data transfer.
|
|
|
|
func NewListener(localStatic *btcec.PrivateKey, listenAddr string) (*Listener,
|
|
|
|
error) {
|
|
|
|
addr, err := net.ResolveTCPAddr("tcp", listenAddr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
l, err := net.ListenTCP("tcp", addr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-04-01 17:00:33 +03:00
|
|
|
brontideListener := &Listener{
|
|
|
|
localStatic: localStatic,
|
|
|
|
tcp: l,
|
|
|
|
handshakeSema: make(chan struct{}, defaultHandshakes),
|
|
|
|
conns: make(chan maybeConn),
|
|
|
|
quit: make(chan struct{}),
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < defaultHandshakes; i++ {
|
|
|
|
brontideListener.handshakeSema <- struct{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
go brontideListener.listen()
|
|
|
|
|
|
|
|
return brontideListener, nil
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
|
2018-04-01 17:00:33 +03:00
|
|
|
// listen accepts connection from the underlying tcp conn, then performs
|
|
|
|
// the brontinde handshake procedure asynchronously. A maximum of
|
|
|
|
// defaultHandshakes will be active at any given time.
|
2016-10-18 05:41:20 +03:00
|
|
|
//
|
2018-04-01 17:00:33 +03:00
|
|
|
// NOTE: This method must be run as a goroutine.
|
|
|
|
func (l *Listener) listen() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-l.handshakeSema:
|
|
|
|
case <-l.quit:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
conn, err := l.tcp.Accept()
|
|
|
|
if err != nil {
|
|
|
|
l.rejectConn(err)
|
|
|
|
l.handshakeSema <- struct{}{}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
go l.doHandshake(conn)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-28 06:39:19 +03:00
|
|
|
// rejectedConnErr is a helper function that prepends the remote address of the
|
|
|
|
// failed connection attempt to the original error message.
|
|
|
|
func rejectedConnErr(err error, remoteAddr string) error {
|
|
|
|
return fmt.Errorf("unable to accept connection from %v: %v", remoteAddr,
|
|
|
|
err)
|
|
|
|
}
|
|
|
|
|
2018-04-01 17:00:33 +03:00
|
|
|
// doHandshake asynchronously performs the brontide handshake, so that it does
|
|
|
|
// not block the main accept loop. This prevents peers that delay writing to the
|
|
|
|
// connection from block other connection attempts.
|
|
|
|
func (l *Listener) doHandshake(conn net.Conn) {
|
|
|
|
defer func() { l.handshakeSema <- struct{}{} }()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-l.quit:
|
|
|
|
return
|
|
|
|
default:
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
|
2018-06-28 06:39:19 +03:00
|
|
|
remoteAddr := conn.RemoteAddr().String()
|
|
|
|
|
2016-10-18 05:41:20 +03:00
|
|
|
brontideConn := &Conn{
|
|
|
|
conn: conn,
|
|
|
|
noise: NewBrontideMachine(false, l.localStatic, nil),
|
|
|
|
}
|
|
|
|
|
2017-10-05 00:56:31 +03:00
|
|
|
// We'll ensure that we get ActOne from the remote peer in a timely
|
2018-04-03 01:56:41 +03:00
|
|
|
// manner. If they don't respond within 1s, then we'll kill the
|
2017-10-05 00:56:31 +03:00
|
|
|
// connection.
|
2018-04-03 01:56:41 +03:00
|
|
|
conn.SetReadDeadline(time.Now().Add(handshakeReadTimeout))
|
2017-10-05 00:56:31 +03:00
|
|
|
|
2016-10-18 05:41:20 +03:00
|
|
|
// Attempt to carry out the first act of the handshake protocol. If the
|
|
|
|
// connecting node doesn't know our long-term static public key, then
|
|
|
|
// this portion will fail with a non-nil error.
|
|
|
|
var actOne [ActOneSize]byte
|
|
|
|
if _, err := io.ReadFull(conn, actOne[:]); err != nil {
|
2016-12-01 06:11:49 +03:00
|
|
|
brontideConn.conn.Close()
|
2018-06-28 06:39:19 +03:00
|
|
|
l.rejectConn(rejectedConnErr(err, remoteAddr))
|
2018-04-01 17:00:33 +03:00
|
|
|
return
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
if err := brontideConn.noise.RecvActOne(actOne); err != nil {
|
2016-12-01 06:11:49 +03:00
|
|
|
brontideConn.conn.Close()
|
2018-06-28 06:39:19 +03:00
|
|
|
l.rejectConn(rejectedConnErr(err, remoteAddr))
|
2018-04-01 17:00:33 +03:00
|
|
|
return
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Next, progress the handshake processes by sending over our ephemeral
|
|
|
|
// key for the session along with an authenticating tag.
|
|
|
|
actTwo, err := brontideConn.noise.GenActTwo()
|
|
|
|
if err != nil {
|
2016-12-01 06:11:49 +03:00
|
|
|
brontideConn.conn.Close()
|
2018-06-28 06:39:19 +03:00
|
|
|
l.rejectConn(rejectedConnErr(err, remoteAddr))
|
2018-04-01 17:00:33 +03:00
|
|
|
return
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
if _, err := conn.Write(actTwo[:]); err != nil {
|
2016-12-01 06:11:49 +03:00
|
|
|
brontideConn.conn.Close()
|
2018-06-28 06:39:19 +03:00
|
|
|
l.rejectConn(rejectedConnErr(err, remoteAddr))
|
2018-04-01 17:00:33 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-l.quit:
|
|
|
|
return
|
|
|
|
default:
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
|
2017-10-05 00:56:31 +03:00
|
|
|
// We'll ensure that we get ActTwo from the remote peer in a timely
|
2018-04-03 01:56:41 +03:00
|
|
|
// manner. If they don't respond within 1 second, then we'll kill the
|
2017-10-05 00:56:31 +03:00
|
|
|
// connection.
|
2018-04-03 01:56:41 +03:00
|
|
|
conn.SetReadDeadline(time.Now().Add(handshakeReadTimeout))
|
2017-10-05 00:56:31 +03:00
|
|
|
|
2017-07-30 03:40:27 +03:00
|
|
|
// Finally, finish the handshake processes by reading and decrypting
|
|
|
|
// the connection peer's static public key. If this succeeds then both
|
2016-10-18 05:41:20 +03:00
|
|
|
// sides have mutually authenticated each other.
|
|
|
|
var actThree [ActThreeSize]byte
|
|
|
|
if _, err := io.ReadFull(conn, actThree[:]); err != nil {
|
2016-12-01 06:11:49 +03:00
|
|
|
brontideConn.conn.Close()
|
2018-06-28 06:39:19 +03:00
|
|
|
l.rejectConn(rejectedConnErr(err, remoteAddr))
|
2018-04-01 17:00:33 +03:00
|
|
|
return
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
if err := brontideConn.noise.RecvActThree(actThree); err != nil {
|
2016-12-01 06:11:49 +03:00
|
|
|
brontideConn.conn.Close()
|
2018-06-28 06:39:19 +03:00
|
|
|
l.rejectConn(rejectedConnErr(err, remoteAddr))
|
2018-04-01 17:00:33 +03:00
|
|
|
return
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
|
2017-10-05 00:56:31 +03:00
|
|
|
// We'll reset the deadline as it's no longer critical beyond the
|
|
|
|
// initial handshake.
|
|
|
|
conn.SetReadDeadline(time.Time{})
|
|
|
|
|
2018-04-01 17:00:33 +03:00
|
|
|
l.acceptConn(brontideConn)
|
|
|
|
}
|
|
|
|
|
|
|
|
// maybeConn holds either a brontide connection or an error returned from the
|
|
|
|
// handshake.
|
|
|
|
type maybeConn struct {
|
|
|
|
conn *Conn
|
|
|
|
err error
|
|
|
|
}
|
|
|
|
|
|
|
|
// acceptConn returns a connection that successfully performed a handshake.
|
|
|
|
func (l *Listener) acceptConn(conn *Conn) {
|
|
|
|
select {
|
|
|
|
case l.conns <- maybeConn{conn: conn}:
|
|
|
|
case <-l.quit:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// rejectConn returns any errors encountered during connection or handshake.
|
|
|
|
func (l *Listener) rejectConn(err error) {
|
|
|
|
select {
|
|
|
|
case l.conns <- maybeConn{err: err}:
|
|
|
|
case <-l.quit:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Accept waits for and returns the next connection to the listener. All
|
|
|
|
// incoming connections are authenticated via the three act Brontide
|
|
|
|
// key-exchange scheme. This function will fail with a non-nil error in the
|
|
|
|
// case that either the handshake breaks down, or the remote peer doesn't know
|
|
|
|
// our static public key.
|
|
|
|
//
|
|
|
|
// Part of the net.Listener interface.
|
|
|
|
func (l *Listener) Accept() (net.Conn, error) {
|
|
|
|
select {
|
|
|
|
case result := <-l.conns:
|
|
|
|
return result.conn, result.err
|
|
|
|
case <-l.quit:
|
|
|
|
return nil, errors.New("brontide connection closed")
|
|
|
|
}
|
2016-10-18 05:41:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close closes the listener. Any blocked Accept operations will be unblocked
|
|
|
|
// and return errors.
|
|
|
|
//
|
|
|
|
// Part of the net.Listener interface.
|
|
|
|
func (l *Listener) Close() error {
|
2018-04-01 17:00:33 +03:00
|
|
|
select {
|
|
|
|
case <-l.quit:
|
|
|
|
default:
|
|
|
|
close(l.quit)
|
|
|
|
}
|
|
|
|
|
2016-10-18 05:41:20 +03:00
|
|
|
return l.tcp.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Addr returns the listener's network address.
|
|
|
|
//
|
|
|
|
// Part of the net.Listener interface.
|
|
|
|
func (l *Listener) Addr() net.Addr {
|
|
|
|
return l.tcp.Addr()
|
|
|
|
}
|