2018-10-24 04:28:34 +03:00
|
|
|
package wtdb
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
|
2019-01-11 02:35:11 +03:00
|
|
|
"github.com/lightningnetwork/lnd/watchtower/wtpolicy"
|
2018-10-24 04:28:34 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
// ErrSessionNotFound is returned when querying by session id for a
|
|
|
|
// session that does not exist.
|
|
|
|
ErrSessionNotFound = errors.New("session not found in db")
|
|
|
|
|
|
|
|
// ErrSessionAlreadyExists signals that a session creation failed
|
|
|
|
// because a session with the same session id already exists.
|
|
|
|
ErrSessionAlreadyExists = errors.New("session already exists")
|
|
|
|
|
|
|
|
// ErrUpdateOutOfOrder is returned when the sequence number is not equal
|
|
|
|
// to the server's LastApplied+1.
|
|
|
|
ErrUpdateOutOfOrder = errors.New("update sequence number is not " +
|
|
|
|
"sequential")
|
|
|
|
|
|
|
|
// ErrLastAppliedReversion is returned when the client echos a
|
|
|
|
// last-applied value that is less than it claimed in a prior update.
|
|
|
|
ErrLastAppliedReversion = errors.New("update last applied must be " +
|
|
|
|
"non-decreasing")
|
|
|
|
|
|
|
|
// ErrSeqNumAlreadyApplied is returned when the client sends a sequence
|
|
|
|
// number for which they already claim to have an ACK.
|
|
|
|
ErrSeqNumAlreadyApplied = errors.New("update sequence number has " +
|
|
|
|
"already been applied")
|
|
|
|
|
|
|
|
// ErrSessionConsumed is returned if the client tries to send a sequence
|
|
|
|
// number larger than the session's max number of updates.
|
|
|
|
ErrSessionConsumed = errors.New("all session updates have been " +
|
|
|
|
"consumed")
|
|
|
|
)
|
|
|
|
|
|
|
|
// SessionInfo holds the negotiated session parameters for single session id,
|
|
|
|
// and handles the acceptance and validation of state updates sent by the
|
|
|
|
// client.
|
|
|
|
type SessionInfo struct {
|
|
|
|
// ID is the remote public key of the watchtower client.
|
|
|
|
ID SessionID
|
|
|
|
|
2019-01-11 02:35:11 +03:00
|
|
|
// Policy holds the negotiated session parameters.
|
|
|
|
Policy wtpolicy.Policy
|
2018-10-24 04:28:34 +03:00
|
|
|
|
|
|
|
// LastApplied the sequence number of the last successful state update.
|
|
|
|
LastApplied uint16
|
|
|
|
|
|
|
|
// ClientLastApplied the last last-applied the client has echoed back.
|
|
|
|
ClientLastApplied uint16
|
|
|
|
|
|
|
|
// RewardAddress the address that the tower's reward will be deposited
|
|
|
|
// to if a sweep transaction confirms.
|
|
|
|
RewardAddress []byte
|
|
|
|
|
|
|
|
// TODO(conner): store client metrics, DOS score, etc
|
|
|
|
}
|
|
|
|
|
|
|
|
// AcceptUpdateSequence validates that a state update's sequence number and last
|
|
|
|
// applied are valid given our past history with the client. These checks ensure
|
|
|
|
// that clients are properly in sync and following the update protocol properly.
|
|
|
|
// If validation is successful, the receiver's LastApplied and ClientLastApplied
|
|
|
|
// are updated with the latest values presented by the client. Any errors
|
|
|
|
// returned from this method are converted into an appropriate
|
|
|
|
// wtwire.StateUpdateCode.
|
|
|
|
func (s *SessionInfo) AcceptUpdateSequence(seqNum, lastApplied uint16) error {
|
|
|
|
switch {
|
|
|
|
|
|
|
|
// Client already claims to have an ACK for this seqnum.
|
|
|
|
case seqNum <= lastApplied:
|
|
|
|
return ErrSeqNumAlreadyApplied
|
|
|
|
|
|
|
|
// Client echos a last applied that is lower than previously sent.
|
|
|
|
case lastApplied < s.ClientLastApplied:
|
|
|
|
return ErrLastAppliedReversion
|
|
|
|
|
|
|
|
// Client update exceeds capacity of session.
|
2019-01-11 02:35:11 +03:00
|
|
|
case seqNum > s.Policy.MaxUpdates:
|
2018-10-24 04:28:34 +03:00
|
|
|
return ErrSessionConsumed
|
|
|
|
|
|
|
|
// Client update does not match our expected next seqnum.
|
|
|
|
case seqNum != s.LastApplied+1:
|
|
|
|
return ErrUpdateOutOfOrder
|
|
|
|
}
|
|
|
|
|
|
|
|
s.LastApplied = seqNum
|
|
|
|
s.ClientLastApplied = lastApplied
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2018-11-01 06:42:04 +03:00
|
|
|
|
|
|
|
// Match is returned in response to a database query for a breach hints
|
|
|
|
// contained in a particular block. The match encapsulates all data required to
|
|
|
|
// properly decrypt a client's encrypted blob, and pursue action on behalf of
|
|
|
|
// the victim by reconstructing the justice transaction and broadcasting it to
|
|
|
|
// the network.
|
|
|
|
//
|
|
|
|
// NOTE: It is possible for a match to cause a false positive, since they are
|
|
|
|
// matched on a prefix of the txid. In such an event, the likely behavior is
|
|
|
|
// that the payload will fail to decrypt.
|
|
|
|
type Match struct {
|
|
|
|
// ID is the session id of the client who uploaded the state update.
|
|
|
|
ID SessionID
|
|
|
|
|
|
|
|
// SeqNum is the session sequence number occupied by the client's state
|
|
|
|
// update. Together with ID, this allows the tower to derive the
|
|
|
|
// appropriate nonce for decryption.
|
|
|
|
SeqNum uint16
|
|
|
|
|
|
|
|
// Hint is the breach hint that triggered the match.
|
|
|
|
Hint BreachHint
|
|
|
|
|
|
|
|
// EncryptedBlob is the encrypted payload containing the justice kit
|
|
|
|
// uploaded by the client.
|
|
|
|
EncryptedBlob []byte
|
|
|
|
|
|
|
|
// SessionInfo is the contract negotiated between tower and client, that
|
|
|
|
// provides input parameters such as fee rate, reward rate, and reward
|
|
|
|
// address when attempting to reconstruct the justice transaction.
|
|
|
|
SessionInfo *SessionInfo
|
|
|
|
}
|