HOME 5 месяцев назад
Родитель
Сommit
58ca58c0cd

+ 37 - 37
PCC.DevClient/DevClientApp.cs

@@ -2,7 +2,7 @@
 using PCC.App.Security;
 using PCC.Common.AssemblyInject.Interfaces;
 using PCC.Common.EventBus;
-using PCC.App;
+using PCC.App.Tpm;
 
 namespace PCC.DevClient;
 
@@ -11,10 +11,10 @@ internal class DevClientApp(DevClientPccConfigManager configManager, TrustedPeer
     public void Init()
     {
         logger.LogInformation("init");
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_CX>(OnConnected);
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_RX>(OnRx);
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_DX>(OnDx);
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_XX>(OnXx);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_CX>(OnConnected);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_RX>(OnRx);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_DX>(OnDx);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_XX>(OnXx);
     }
 
     public void Start()
@@ -37,49 +37,49 @@ internal class DevClientApp(DevClientPccConfigManager configManager, TrustedPeer
             myPub = Convert.FromBase64String(configManager.Instance.MyKeyPublic);
         }
 
-        eventBus.Publish(new TrustedPeerManager.TPM_EVT_CMD_INIT(myPub, myPri));
-        logger.LogInformation("Your public key for share to trusted peer: " + configManager.Instance.MyKeyPublic);
+        //eventBus.Publish(new TrustedPeerManager.TPM_EVT_CMD_INIT(myPub, myPri));
+        //logger.LogInformation("Your public key for share to trusted peer: " + configManager.Instance.MyKeyPublic);
 
-        if (configManager.Instance.TrustPeerKeyPub == null || configManager.Instance.TrustPeerHost == null || configManager.Instance.TrustPeerPort == null)
-        {
-            logger.LogError($"Missing config one of `{nameof(configManager.Instance.TrustPeerKeyPub)}' or `{nameof(configManager.Instance.TrustPeerHost)}' or `{nameof(configManager.Instance.TrustPeerPort)}', please obtain from trusted peer, HALT");
-            return;
-        }
+        //if (configManager.Instance.TrustPeerKeyPub == null || configManager.Instance.TrustPeerHost == null || configManager.Instance.TrustPeerPort == null)
+        //{
+        //    logger.LogError($"Missing config one of `{nameof(configManager.Instance.TrustPeerKeyPub)}' or `{nameof(configManager.Instance.TrustPeerHost)}' or `{nameof(configManager.Instance.TrustPeerPort)}', please obtain from trusted peer, HALT");
+        //    return;
+        //}
 
-        var tpk = Convert.FromBase64String(configManager.Instance.TrustPeerKeyPub);
-        var tph = configManager.Instance.TrustPeerHost!;
-        var tpp = configManager.Instance.TrustPeerPort!.Value;
+        //var tpk = Convert.FromBase64String(configManager.Instance.TrustPeerKeyPub);
+        //var tph = configManager.Instance.TrustPeerHost!;
+        //var tpp = configManager.Instance.TrustPeerPort!.Value;
 
-        var peerId = tpm.AddPeer(tpk, tph, tpp);
-        tpm.ConnectToPeerAsync(peerId);
+        //var peerId = tpm.AddPeer(tpk, tph, tpp);
+        //tpm.ConnectToPeerAsync(peerId);
     }
 
-    private void OnConnected(TrustedPeerManager.TPM_EVT_PEER_CX obj)
-    {
-        logger.LogInformation("Connected");
-        var payload = "Brr连上了?"u8.ToArray();
-        logger.LogInformation($"Send payload {Convert.ToHexString(SHA256.HashData(payload))}");
-        tpm.SendToPeer(obj.PeerId, payload);
-    }
+    //private void OnConnected(TrustedPeerManager.TPM_EVT_PEER_CX obj)
+    //{
+    //    logger.LogInformation("Connected");
+    //    var payload = "Brr连上了?"u8.ToArray();
+    //    logger.LogInformation($"Send payload {Convert.ToHexString(SHA256.HashData(payload))}");
+    //    tpm.SendToPeer(obj.PeerId, payload);
+    //}
 
-    private void OnRx(TrustedPeerManager.TPM_EVT_PEER_RX obj)
-    {
-        logger.LogInformation("Rx:" + Convert.ToHexString(obj.payload.Span));
-    }
+    //private void OnRx(TrustedPeerManager.TPM_EVT_PEER_RX obj)
+    //{
+    //    logger.LogInformation("Rx:" + Convert.ToHexString(obj.payload.Span));
+    //}
 
-    private void OnDx(TrustedPeerManager.TPM_EVT_PEER_DX obj)
-    {
-        logger.LogInformation("Dx:" + obj.PeerId);
-    }
+    //private void OnDx(TrustedPeerManager.TPM_EVT_PEER_DX obj)
+    //{
+    //    logger.LogInformation("Dx:" + obj.PeerId);
+    //}
 
-    private void OnXx(TrustedPeerManager.TPM_EVT_PEER_XX obj)
-    {
-        logger.LogWarning($"有内鬼,终止交易! {obj.Kind} {obj.PeerId}");
-    }
+    //private void OnXx(TrustedPeerManager.TPM_EVT_PEER_XX obj)
+    //{
+    //    logger.LogWarning($"有内鬼,终止交易! {obj.Kind} {obj.PeerId}");
+    //}
 
     public void Stop()
     {
         logger.LogInformation("stop");
-        eventBus.Publish<TrustedPeerManager.TPM_EVT_CMD_SHUTDOWN>();
+    //    eventBus.Publish<TrustedPeerManager.TPM_EVT_CMD_SHUTDOWN>();
     }
 }

+ 3 - 3
PCC.DevClient/DevClientAssemblyInjectImplement.cs

@@ -1,5 +1,5 @@
-using PCC.App;
-using PCC.App.Configuration;
+using PCC.App.Configuration;
+using PCC.App.Tpm;
 using PCC.Common.AssemblyInject.Interfaces;
 using PCC.Common.EventBus;
 
@@ -7,4 +7,4 @@ namespace PCC.DevClient;
 
 internal class DevClientPccConfigManager : PccConfigManagerBase;
 internal class DevClientEventBus(ILogger<DevClientEventBus> logger) : InProcessEventBusBase(logger), IAssemblyInjectSingleton<IEventBus>;
-internal class DevClientTpm(IEventBus eventBus, ILogger<DevClientTpm> tpm) : TrustedPeerManager(eventBus, tpm), IAssemblyInjectSingleton<TrustedPeerManager>;
+internal class DevClientTpm(IPeerInfoProvider provider, IEventBus eventBus, ILogger<DevClientTpm> tpm) : TrustedPeerManager(provider, eventBus, tpm), IAssemblyInjectSingleton<TrustedPeerManager>;

+ 57 - 57
PCC.DevServer/DevServerApp.cs

@@ -1,8 +1,8 @@
 using System.Net;
 using System.Security.Cryptography;
 using System.Text;
-using PCC.App;
 using PCC.App.Security;
+using PCC.App.Tpm;
 using PCC.Common.AssemblyInject.Interfaces;
 using PCC.Common.EventBus;
 using PCC.Common.Networking;
@@ -21,10 +21,10 @@ internal class DevServerApp(
     public void Init()
     {
         logger.LogInformation("init");
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_IX>(OnIncome);
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_RX>(OnRx);
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_DX>(OnDx);
-        eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_XX>(OnXx);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_IX>(OnIncome);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_RX>(OnRx);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_DX>(OnDx);
+        //eventBus.Subscript<TrustedPeerManager.TPM_EVT_PEER_XX>(OnXx);
     }
 
     public void Start()
@@ -47,65 +47,65 @@ internal class DevServerApp(
             myPub = Convert.FromBase64String(configManager.Instance.MyKeyPublic);
         }
 
-        eventBus.Publish(new TrustedPeerManager.TPM_EVT_CMD_INIT(myPub, myPri));
-
-        logger.LogInformation("Your public key for share to trusted peer: " + configManager.Instance.MyKeyPublic);
-
-        if (configManager.Instance.ListenPort == null || false == IPAddress.TryParse(configManager.Instance.ListenAddress, out _))
-        {
-            logger.LogError($"Missing config `{nameof(configManager.Instance.ListenPort)}' or `{nameof(configManager.Instance.ListenAddress)}', HALT");
-            return;
-        }
-
-        if (configManager.Instance.TrustPeerKeyPub == null)
-        {
-            logger.LogError($"Missing config `{nameof(configManager.Instance.TrustPeerKeyPub)}',  please obtain from trusted peer, HALT");
-            return;
-        }
-
-        //warn just example for server
-        tpm.AddPeer(Convert.FromBase64String(configManager.Instance.TrustPeerKeyPub), "", 0);
-
-        _tcpServer = new KestrelTcpServer(configManager.Instance.ListenAddress, configManager.Instance.ListenPort.Value, tpm.HandleIncomingPeerAsync, ktsLogger);
-        Task.Run(async () =>
-        {
-            try
-            {
-                await _tcpServer.StartAsync();
-            }
-            catch (Exception e)
-            {
-                logger.LogError(e, "Start TCP server");
-            }
-        });
+        //eventBus.Publish(new TrustedPeerManager.TPM_EVT_CMD_INIT(myPub, myPri));
+
+        //logger.LogInformation("Your public key for share to trusted peer: " + configManager.Instance.MyKeyPublic);
+
+        //if (configManager.Instance.ListenPort == null || false == IPAddress.TryParse(configManager.Instance.ListenAddress, out _))
+        //{
+        //    logger.LogError($"Missing config `{nameof(configManager.Instance.ListenPort)}' or `{nameof(configManager.Instance.ListenAddress)}', HALT");
+        //    return;
+        //}
+
+        //if (configManager.Instance.TrustPeerKeyPub == null)
+        //{
+        //    logger.LogError($"Missing config `{nameof(configManager.Instance.TrustPeerKeyPub)}',  please obtain from trusted peer, HALT");
+        //    return;
+        //}
+
+        ////warn just example for server
+        //tpm.AddPeer(Convert.FromBase64String(configManager.Instance.TrustPeerKeyPub), "", 0);
+
+        //_tcpServer = new KestrelTcpServer(configManager.Instance.ListenAddress, configManager.Instance.ListenPort.Value, tpm.HandleIncomingPeerAsync, ktsLogger);
+        //Task.Run(async () =>
+        //{
+        //    try
+        //    {
+        //        await _tcpServer.StartAsync();
+        //    }
+        //    catch (Exception e)
+        //    {
+        //        logger.LogError(e, "Start TCP server");
+        //    }
+        //});
     }
 
-    private void OnIncome(TrustedPeerManager.TPM_EVT_PEER_IX obj)
-    {
-        logger.LogInformation("Income:" + obj.PeerId);
-    }
+    //private void OnIncome(TrustedPeerManager.TPM_EVT_PEER_IX obj)
+    //{
+    //    logger.LogInformation("Income:" + obj.PeerId);
+    //}
 
-    private void OnRx(TrustedPeerManager.TPM_EVT_PEER_RX obj)
-    {
-        logger.LogInformation($"Rx from <{obj.PeerId}>");
-        logger.LogInformation($"Rx content: {Encoding.UTF8.GetString(obj.payload.Span)}");
-        tpm.SendToPeer(obj.PeerId, SHA256.HashData(obj.payload.Span));
-    }
+    //private void OnRx(TrustedPeerManager.TPM_EVT_PEER_RX obj)
+    //{
+    //    logger.LogInformation($"Rx from <{obj.PeerId}>");
+    //    logger.LogInformation($"Rx content: {Encoding.UTF8.GetString(obj.payload.Span)}");
+    //    tpm.SendToPeer(obj.PeerId, SHA256.HashData(obj.payload.Span));
+    //}
 
-    private void OnDx(TrustedPeerManager.TPM_EVT_PEER_DX obj)
-    {
-        logger.LogInformation("Disconnected:" + obj.PeerId);
-    }
+    //private void OnDx(TrustedPeerManager.TPM_EVT_PEER_DX obj)
+    //{
+    //    logger.LogInformation("Disconnected:" + obj.PeerId);
+    //}
 
-    private void OnXx(TrustedPeerManager.TPM_EVT_PEER_XX obj)
-    {
-        logger.LogWarning($"有内鬼,终止交易! {obj.Kind} {obj.PeerId}");
-    }
+    //private void OnXx(TrustedPeerManager.TPM_EVT_PEER_XX obj)
+    //{
+    //    logger.LogWarning($"有内鬼,终止交易! {obj.Kind} {obj.PeerId}");
+    //}
 
     public void Stop()
     {
-        logger.LogInformation("stop");
-        _ = _tcpServer.StopAsync(); //FAF
-        eventBus.Publish(new TrustedPeerManager.TPM_EVT_CMD_SHUTDOWN());
+    //    logger.LogInformation("stop");
+    //    _ = _tcpServer.StopAsync(); //FAF
+    //    eventBus.Publish(new TrustedPeerManager.TPM_EVT_CMD_SHUTDOWN());
     }
 }

+ 3 - 3
PCC.DevServer/DevServerAssemblyInjectImplement.cs

@@ -1,5 +1,5 @@
-using PCC.App;
-using PCC.App.Configuration;
+using PCC.App.Configuration;
+using PCC.App.Tpm;
 using PCC.Common.AssemblyInject.Interfaces;
 using PCC.Common.EventBus;
 
@@ -7,4 +7,4 @@ namespace PCC.DevServer;
 
 internal class DevServerPccConfigManager : PccConfigManagerBase;
 internal class DevServerEventBus(ILogger<DevServerEventBus> logger) : InProcessEventBusBase(logger), IAssemblyInjectSingleton<IEventBus>;
-internal class DevServerTpm(IEventBus eventBus, ILogger<DevServerTpm> tpm) : TrustedPeerManager(eventBus, tpm), IAssemblyInjectSingleton<TrustedPeerManager>;
+internal class DevServerTpm(IPeerInfoProvider provider, IEventBus eventBus, ILogger<DevServerTpm> tpm) : TrustedPeerManager(provider, eventBus, tpm), IAssemblyInjectSingleton<TrustedPeerManager>;

+ 16 - 8
PCC.Shared/App/Security/TimestampNonceManager.cs

@@ -64,8 +64,7 @@ public class TimestampNonceManager : IDisposable
         return (new ReadOnlyMemory<byte>(payloadAndNonce), timestamp);
     }
 
-    /// <summary> 验证nonce: null时间误差过大,false检测到重放攻击,true没问题 </summary>
-    public bool? CheckValid(ReadOnlyMemory<byte> timestampNonce, out DateTimeOffset timestamp)
+    public TimestampNonceResult CheckValid(ReadOnlyMemory<byte> timestampNonce, out DateTimeOffset timestamp)
     {
         ThrowIfDisposed();
 
@@ -74,17 +73,19 @@ public class TimestampNonceManager : IDisposable
         timestamp = DateTimeOffset.FromUnixTimeMilliseconds(BinaryPrimitives.ReadInt64LittleEndian(timestampNonce.Span[..TimestampLength]));
 
         // 检查时间戳是否在允许的时间窗口内,超过最大时间差则拒绝
-        if (Math.Abs((DateTimeOffset.UtcNow - timestamp).TotalMilliseconds) > _maxTimeSkew.TotalMilliseconds) return null;
+        if (Math.Abs((DateTimeOffset.UtcNow - timestamp).TotalMilliseconds) > _maxTimeSkew.TotalMilliseconds) return TimestampNonceResult.TimestampSkew;
 
         // 剩下的部分为真正的随机 nonce
         var nonce = Convert.ToHexString(timestampNonce[TimestampLength..].Span);
 
-        // 如果 nonce 已存在,则为重放攻击,返回 false;否则添加并返回 true
-        return _holds.TryAdd(nonce, DateTime.UtcNow);
+        // 如果 nonce 已存在,则为重放攻击
+        return _holds.TryAdd(nonce, DateTime.UtcNow)
+            ? TimestampNonceResult.OK
+            : TimestampNonceResult.ReplayAttackDetected;
     }
 
     /// <summary> 验证nonce并提取payload: null时间误差过大,false检测到重放攻击,true没问题 </summary>
-    public (bool?, DateTimeOffset timestamp, ReadOnlyMemory<byte> payload) CheckValidAndExtractPayload(ReadOnlyMemory<byte> payloadAndNonce)
+    public (TimestampNonceResult, DateTimeOffset timestamp, ReadOnlyMemory<byte> payload) CheckValidAndExtractPayload(ReadOnlyMemory<byte> payloadAndNonce)
     {
         ThrowIfDisposed();
 
@@ -96,10 +97,10 @@ public class TimestampNonceManager : IDisposable
         var payload = payloadAndNonce[NonceLength..];
 
         // 检查时间戳是否在允许的时间窗口内, 超过最大时间差则拒绝
-        if (Math.Abs((DateTimeOffset.UtcNow - timestamp).TotalMilliseconds) > _maxTimeSkew.TotalMilliseconds) return (null, timestamp, payload);
+        if (Math.Abs((DateTimeOffset.UtcNow - timestamp).TotalMilliseconds) > _maxTimeSkew.TotalMilliseconds) return (TimestampNonceResult.TimestampSkew, timestamp, payload);
 
         // 如果 nonce 已存在,则为重放攻击,返回 false;否则添加并返回 true
-        return (_holds.TryAdd(nonce, DateTime.UtcNow), timestamp, payload);
+        return (_holds.TryAdd(nonce, DateTime.UtcNow) ? TimestampNonceResult.OK : TimestampNonceResult.ReplayAttackDetected, timestamp, payload);
     }
 
     private void CleanupTimerCallback(object? state)
@@ -118,3 +119,10 @@ public class TimestampNonceManager : IDisposable
         GC.SuppressFinalize(this);
     }
 }
+
+public enum TimestampNonceResult
+{
+    OK = 0,
+    TimestampSkew,
+    ReplayAttackDetected,
+}

+ 48 - 0
PCC.Shared/App/Tpm/Configs.cs

@@ -0,0 +1,48 @@
+using PCC.App.Security;
+using System.Security.Cryptography;
+
+namespace PCC.App.Tpm;
+
+public interface IPeerInfoProvider
+{
+    public ICollection<ILocalPeerInfo> PeerInfo { get; }
+}
+
+public interface ILocalPeerInfo
+{
+    //RSA PublicKey { get; }
+    RSA PrivateKey { get; }
+
+    string PeerId { get; }
+    string Address { get; }
+    int Port { get; }
+
+    ICollection<IRemotePeerInfo> TrustedRemotePeers { get; }
+}
+
+public class LocalPeerInfo(byte[] publicKey, byte[] privateKey, string address, int port, ICollection<IRemotePeerInfo> remotePeers) : ILocalPeerInfo
+{
+    //public RSA PublicKey { get; } = RsaUtility.FromPKCS1PublicKey(publicKey);
+    public RSA PrivateKey { get; } = RsaUtility.FromPKCS1PublicKey(privateKey);
+
+    public string PeerId { get; } = Convert.ToHexString(SHA256.HashData(publicKey));
+    public string Address { get; } = address;
+    public int Port { get; } = port;
+    public ICollection<IRemotePeerInfo> TrustedRemotePeers { get; } = remotePeers;
+}
+
+public interface IRemotePeerInfo
+{
+    RSA PublicKey { get; }
+    string PeerId { get; }
+    string Host { get; }
+    int Port { get; }
+}
+
+public class RemotePeerInfo(byte[] publicKey, string host, int port) : IRemotePeerInfo
+{
+    public RSA PublicKey { get; } = RsaUtility.FromPKCS1PublicKey(publicKey);
+    public string PeerId { get; } = Convert.ToHexString(SHA256.HashData(publicKey));
+    public string Host { get; } = host;
+    public int Port { get; } = port;
+}

+ 52 - 0
PCC.Shared/App/Tpm/Events.cs

@@ -0,0 +1,52 @@
+using System.Net;
+
+namespace PCC.App.Tpm;
+
+public record TPM_EVT_LISTENER_STATUS_CHANGED(string LocalPeerId, TPM_EVT_INBOUND_LISTEN_STATUS Status, Exception? Exception = null);
+
+public enum TPM_EVT_INBOUND_LISTEN_STATUS
+{
+    INVALID = 0,
+    STARTING,
+    START_FAIL,
+    STARTED,
+    STOPPING,
+    STOP_FAIL,
+    STOPPED,
+}
+
+public record TPM_EVT_INBOUND_CON_ACCEPTED(string LocalPeerId, string ConnectionId, EndPoint? RemoteEndpoint);
+
+public record TPM_EVT_INBOUND_CON_ERROR(string LocalPeerId, string ConnectionId, string? RemotePeerId, Exception? Exception = null);
+public record TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS Status, string LocalPeerId, string ConnectionId, string? RemotePeerId);
+
+public enum TPM_EVT_INBOUND_CON_STATUS
+{
+    INVALID = 0,
+    HANDSHAKE_FAIL_NOT_TRUSTED,
+    HANDSHAKE_OK,
+    SECURE_ALERT_REPLAY_ATTACK_DETECT,
+    SECURE_WARN_TIMESTAMP_SKEW,
+    DISCONNECTED
+}
+
+public record TPM_EVT_OUTBOUND_CON_ERROR(string LocalPeerId, string? RemotePeerId, Exception? Exception = null);
+public record TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS Status, string LocalPeerId, string? RemotePeerId);
+
+public enum TPM_EVT_OUTBOUND_CON_STATUS
+{
+    INVALID = 0,
+    CONNECTION_ATTEMPT,
+    HANDSHAKE_ATTEMPT,
+    HANDSHAKE_FAIL_ACK_NOT_MATCHED,
+    HANDSHAKE_OK,
+    SECURE_ALERT_REPLAY_ATTACK_DETECT,
+    SECURE_WARN_TIMESTAMP_SKEW,
+    DISCONNECTED
+}
+
+public record TPM_EVT_INBOUND_RX(string LocalPeerId, string RemotePeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);
+public record TPM_EVT_INBOUND_TX(string LocalPeerId, string RemotePeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);
+
+public record TPM_EVT_OUTBOUND_RX(string LocalPeerId, string RemotePeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);
+public record TPM_EVT_OUTBOUND_TX(string LocalPeerId, string RemotePeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);

+ 336 - 0
PCC.Shared/App/Tpm/LocalPeerManager.cs

@@ -0,0 +1,336 @@
+using System.Collections.Concurrent;
+using System.Net.Sockets;
+using System.Security.Cryptography;
+using Microsoft.AspNetCore.Connections;
+using Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets;
+using PCC.App.Networking;
+using PCC.App.Security;
+using PCC.Common.EventBus;
+using PCC.Common.Networking;
+
+namespace PCC.App.Tpm;
+
+internal class LocalPeerManager
+{
+    private readonly KestrelTcpServer _listener;
+
+    private readonly SocketConnectionContextFactory _sckConnectionContextFactory;
+    private readonly TimestampNonceManager _nonceManager;
+    private readonly IEventBus _eventBus;
+
+    private readonly ILocalPeerInfo _localPeer;
+
+    private readonly ConcurrentDictionary<string, IRemotePeerInfo> _trustedRemotePeers;
+
+    private readonly ConcurrentDictionary<string, EncryptedTcpPeer> _connectedInbound = new();
+    private readonly ConcurrentDictionary<string, EncryptedTcpPeer> _connectedOutbound = new();
+
+    public LocalPeerManager(SocketConnectionContextFactory sckConnectionContextFactory, TimestampNonceManager nonceManager, ILocalPeerInfo localPeer, IEventBus eventBus, ILogger<TrustedPeerManager> logger)
+    {
+        _sckConnectionContextFactory = sckConnectionContextFactory;
+        _nonceManager = nonceManager;
+        _localPeer = localPeer;
+        _eventBus = eventBus;
+
+        _listener = new(localPeer.Address, localPeer.Port, HandleInboundConnection, (ILogger<KestrelTcpServer>)logger);
+        _trustedRemotePeers = new(localPeer.TrustedRemotePeers.ToDictionary(p => p.PeerId));
+    }
+
+    private async Task HandleInboundConnection(ConnectionContext connection)
+    {
+        _eventBus.Publish(new TPM_EVT_INBOUND_CON_ACCEPTED(_localPeer.PeerId, connection.ConnectionId, connection.RemoteEndPoint));
+
+        string? remotePeerId = null;
+        EncryptedTcpPeer? epRemote = null;
+        try
+        {
+            // handshake as server
+            {
+                var tpRemote = new TcpPeer(connection);
+                //rx handshake1
+                IRemotePeerInfo peerPeerInfo;
+                byte[] payloadOfHandshake1;
+                {
+                    var receivedBlock = await tpRemote.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
+                    if (receivedBlock == null) return;
+
+                    var handshake1 = RsaUtility.Decrypt(_localPeer.PrivateKey, receivedBlock);
+
+                    var (nonceResult, _, payload) = _nonceManager.CheckValidAndExtractPayload(handshake1);
+                    if (nonceResult != TimestampNonceResult.OK)
+                    {
+                        if (nonceResult == TimestampNonceResult.ReplayAttackDetected)
+                            _eventBus.Publish(new TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS.SECURE_ALERT_REPLAY_ATTACK_DETECT, _localPeer.PeerId, connection.ConnectionId, null));
+
+                        if (nonceResult == TimestampNonceResult.TimestampSkew)
+                            _eventBus.Publish(new TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS.SECURE_WARN_TIMESTAMP_SKEW, _localPeer.PeerId, connection.ConnectionId, null));
+
+                        return;
+                    }
+
+                    remotePeerId = Convert.ToHexString(payload.Span);
+
+                    // Kick if non-trusted
+                    if (_trustedRemotePeers.TryGetValue(remotePeerId, out peerPeerInfo!) == false)
+                    {
+                        _eventBus.Publish(new TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS.HANDSHAKE_FAIL_NOT_TRUSTED, _localPeer.PeerId, connection.ConnectionId, remotePeerId));
+                        return;
+                    }
+
+                    // verify signature
+                    payloadOfHandshake1 = RsaUtility.DecryptAndVerifySignature(_localPeer.PrivateKey, receivedBlock, peerPeerInfo.PublicKey);
+                }
+
+                //tx handshake2
+                {
+                    epRemote = new EncryptedTcpPeer(_localPeer.PrivateKey, peerPeerInfo.PublicKey, tpRemote);
+                    var payloadOfHandshake2 = SHA256.HashData(payloadOfHandshake1);
+                    var (handshake2, _) = _nonceManager.NewNonceWithPayload(payloadOfHandshake2);
+                    await epRemote.SendBlockAsync(handshake2);
+                }
+
+                _eventBus.Publish(new TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS.HANDSHAKE_OK, _localPeer.PeerId, connection.ConnectionId, remotePeerId));
+            }
+
+            //replace exist connection
+            if (_connectedInbound.Remove(remotePeerId, out var exist)) exist.Disconnect();
+            _connectedInbound[remotePeerId] = epRemote;
+
+            // start RxCycle
+            while (true)
+            {
+                var receivedBlock = await epRemote.RxBlockAsync();
+                if (receivedBlock == null) break;
+
+                var (nonceResult, senderTimestamp, payload) = _nonceManager.CheckValidAndExtractPayload(receivedBlock);
+                if (nonceResult != TimestampNonceResult.OK)
+                {
+                    if (nonceResult == TimestampNonceResult.ReplayAttackDetected)
+                        _eventBus.Publish(new TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS.SECURE_ALERT_REPLAY_ATTACK_DETECT, _localPeer.PeerId, connection.ConnectionId, remotePeerId));
+
+                    if (nonceResult == TimestampNonceResult.TimestampSkew)
+                        _eventBus.Publish(new TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS.SECURE_WARN_TIMESTAMP_SKEW, _localPeer.PeerId, connection.ConnectionId, remotePeerId));
+
+                    break;
+                }
+
+                _eventBus.Publish(new TPM_EVT_INBOUND_RX(_localPeer.PeerId, remotePeerId, senderTimestamp, payload));
+            }
+        }
+        catch (Exception exception)
+        {
+            _eventBus.Publish(new TPM_EVT_INBOUND_CON_ERROR(_localPeer.PeerId, connection.ConnectionId, remotePeerId, exception));
+        }
+        finally
+        {
+            _eventBus.Publish(new TPM_EVT_INBOUND_CON_STATUS_CHANGED(TPM_EVT_INBOUND_CON_STATUS.DISCONNECTED, _localPeer.PeerId, connection.ConnectionId, remotePeerId));
+            epRemote?.Disconnect();
+
+            if (remotePeerId != null) _connectedInbound.Remove(remotePeerId, out _);
+        }
+    }
+
+    public bool ConnectToRemotePeer(string remotePeerId)
+    {
+        if (_trustedRemotePeers.TryGetValue(remotePeerId, out var peerInfo) == false) return false;
+
+        _ = Task.Run(async () =>
+        {
+            EncryptedTcpPeer? epOutbound = null;
+            try
+            {
+                //Create Peer client and connect to server
+                {
+                    var sckOutbound = new Socket(AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp);
+
+                    _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.CONNECTION_ATTEMPT, _localPeer.PeerId, remotePeerId));
+                    await sckOutbound.ConnectAsync(peerInfo.Host, peerInfo.Port);
+
+                    var connOutbound = _sckConnectionContextFactory.Create(sckOutbound);
+                    var tcpPeerOutbound = new TcpPeer(connOutbound);
+                    epOutbound = new EncryptedTcpPeer(_localPeer.PrivateKey, peerInfo.PublicKey, tcpPeerOutbound);
+
+                    // handshake as client
+                    _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.HANDSHAKE_ATTEMPT, _localPeer.PeerId, remotePeerId));
+
+                    // ☞ tx handshake 1
+                    var (handshake1, _) = _nonceManager.NewNonceWithPayload(Convert.FromHexString(_localPeer.PeerId));
+                    await epOutbound.SendBlockAsync(handshake1);
+
+                    // ☞ rx handshake 2
+                    var handshake2 = await epOutbound.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
+                    if (handshake2 == null)
+                    {
+                        return;
+                    } // timeout or disconnect
+
+                    var (nonceResult, _, pl) = _nonceManager.CheckValidAndExtractPayload(handshake2);
+                    if (nonceResult != TimestampNonceResult.OK)
+                    {
+                        if (nonceResult == TimestampNonceResult.ReplayAttackDetected)
+                            _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.SECURE_ALERT_REPLAY_ATTACK_DETECT, _localPeer.PeerId, remotePeerId));
+
+                        if (nonceResult == TimestampNonceResult.TimestampSkew)
+                            _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.SECURE_WARN_TIMESTAMP_SKEW, _localPeer.PeerId, remotePeerId));
+
+                        epOutbound.Disconnect();
+                        return;
+                    }
+
+                    // handshake not match, disconnect
+                    if (pl.Span.SequenceEqual(SHA256.HashData(handshake1.Span)) != true)
+                    {
+                        _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.HANDSHAKE_FAIL_ACK_NOT_MATCHED, _localPeer.PeerId, remotePeerId));
+
+                        return;
+                    }
+
+                    _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.HANDSHAKE_OK, _localPeer.PeerId, remotePeerId));
+                }
+
+                //replace exist connection
+                if (_connectedOutbound.Remove(remotePeerId, out var exist)) exist.Disconnect();
+
+                _connectedOutbound[remotePeerId] = epOutbound;
+
+                while (true) // start RxCycle
+                {
+                    var rxb = await epOutbound.RxBlockAsync();
+                    if (rxb == null) break;
+
+                    var (nonceResult, senderTimestamp, payload) = _nonceManager.CheckValidAndExtractPayload(rxb);
+                    if (nonceResult != TimestampNonceResult.OK)
+                    {
+                        if (nonceResult == TimestampNonceResult.ReplayAttackDetected)
+                            _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.SECURE_ALERT_REPLAY_ATTACK_DETECT, _localPeer.PeerId, remotePeerId));
+
+                        if (nonceResult == TimestampNonceResult.TimestampSkew)
+                            _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.SECURE_WARN_TIMESTAMP_SKEW, _localPeer.PeerId, remotePeerId));
+
+                        break;
+                    }
+
+                    _eventBus.Publish(new TPM_EVT_OUTBOUND_RX(_localPeer.PeerId, remotePeerId, senderTimestamp, payload));
+                }
+            }
+            catch (Exception ex)
+            {
+                _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_ERROR(_localPeer.PeerId, remotePeerId, ex));
+            }
+            finally
+            {
+                _eventBus.Publish(new TPM_EVT_OUTBOUND_CON_STATUS_CHANGED(TPM_EVT_OUTBOUND_CON_STATUS.DISCONNECTED, _localPeer.PeerId, remotePeerId));
+
+                _connectedOutbound.Remove(remotePeerId, out _);
+
+                epOutbound?.Disconnect();
+            }
+        });
+
+        return true;
+    }
+
+    public bool DisconnectRemotePeer(string remotePeerId)
+    {
+        var flag = false;
+
+        if (_connectedInbound.Remove(remotePeerId, out var inbound))
+        {
+            flag = true;
+            inbound.Disconnect();
+        }
+
+        if (_connectedOutbound.Remove(remotePeerId, out var outbound))
+        {
+            flag = true;
+            outbound.Disconnect();
+        }
+
+        return flag;
+    }
+
+    public void AddOrReplaceRemotePeer(IRemotePeerInfo peerInfo)
+    {
+        _trustedRemotePeers[peerInfo.PeerId] = peerInfo;
+    }
+
+    public bool RemoveRemotePeer(string remotePeerId)
+    {
+        DisconnectRemotePeer(remotePeerId);
+        return _trustedRemotePeers.Remove(remotePeerId, out _);
+    }
+
+    public void Start()
+    {
+        Task.Run(async () =>
+        {
+            try
+            {
+                _eventBus.Publish(new TPM_EVT_LISTENER_STATUS_CHANGED(_localPeer.PeerId, TPM_EVT_INBOUND_LISTEN_STATUS.STARTING));
+                await _listener.StartAsync();
+                _eventBus.Publish(new TPM_EVT_LISTENER_STATUS_CHANGED(_localPeer.PeerId, TPM_EVT_INBOUND_LISTEN_STATUS.STARTED));
+            }
+            catch (Exception ex)
+            {
+                _eventBus.Publish(new TPM_EVT_LISTENER_STATUS_CHANGED(_localPeer.PeerId, TPM_EVT_INBOUND_LISTEN_STATUS.START_FAIL, ex));
+            }
+        });
+    }
+
+    public void Stop()
+    {
+        Task.Run(async () =>
+        {
+            try
+            {
+                _eventBus.Publish(new TPM_EVT_LISTENER_STATUS_CHANGED(_localPeer.PeerId, TPM_EVT_INBOUND_LISTEN_STATUS.STOPPING));
+                await _listener.StopAsync();
+                _eventBus.Publish(new TPM_EVT_LISTENER_STATUS_CHANGED(_localPeer.PeerId, TPM_EVT_INBOUND_LISTEN_STATUS.STOPPED));
+            }
+            catch (Exception ex)
+            {
+                _eventBus.Publish(new TPM_EVT_LISTENER_STATUS_CHANGED(_localPeer.PeerId, TPM_EVT_INBOUND_LISTEN_STATUS.STOP_FAIL, ex));
+            }
+        });
+
+        foreach (var item in _connectedInbound) item.Value.Disconnect();
+        _connectedInbound.Clear();
+
+        foreach (var item in _connectedOutbound) item.Value.Disconnect();
+        _connectedOutbound.Clear();
+    }
+
+    public bool SendToRemotePeer(string remotePeerId, byte[] payload)
+    {
+        bool isOutbound;
+        if (_connectedOutbound.TryGetValue(remotePeerId, out var remote) == false)
+        {
+            if (_connectedInbound.TryGetValue(remotePeerId, out remote))
+                isOutbound = false;
+            else
+                return false;
+        }
+        else
+        {
+            isOutbound = true;
+        }
+
+        Task.Run(async () =>
+        {
+            var (payloadAndNonce, timestamp) = _nonceManager.NewNonceWithPayload(payload);
+
+            await remote.SendBlockAsync(payloadAndNonce);
+
+            if (isOutbound)
+            {
+                _eventBus.Publish(new TPM_EVT_OUTBOUND_TX(_localPeer.PeerId, remotePeerId, timestamp, payload));
+            }
+            else
+            {
+                _eventBus.Publish(new TPM_EVT_INBOUND_TX(_localPeer.PeerId, remotePeerId, timestamp, payload));
+            }
+        });
+
+        return true;
+    }
+}

+ 88 - 0
PCC.Shared/App/Tpm/TrustedPeerManager.cs

@@ -0,0 +1,88 @@
+using System.Collections.Concurrent;
+using Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets;
+using PCC.App.Security;
+using PCC.Common.AssemblyInject.Interfaces;
+using PCC.Common.EventBus;
+
+namespace PCC.App.Tpm;
+
+// Handshake 1 → Public Key SHA256
+// Handshake 2 ← ACK for Yes or No(close connection)
+// *Complete Handshake
+
+// SendText 1 → Payload
+// SendText 2 ← ACK
+
+// ACK: SHA256(incoming payload)
+
+public abstract class TrustedPeerManager(IPeerInfoProvider peerInfoProvider, IEventBus eventBus, ILogger<TrustedPeerManager> logger) : IAssemblyInjectSyncInitStarStop
+{
+    private const int NONCE_LENGTH_BYTES = 16;
+    private const int NONCE_EXPIRE_SECOND = 60;
+    private const int NONCE_SKEW_SECOND = 30;
+
+    private readonly SocketConnectionContextFactory _connectionContextFactory = new(new(), logger);
+
+    private readonly ConcurrentDictionary<string, LocalPeerManager> _localPeers = new();
+
+    private TimestampNonceManager? _nonceManager;
+
+    public void Init()
+    { }
+
+    public void Start()
+    {
+        _nonceManager = new(NONCE_LENGTH_BYTES - TimestampNonceManager.TimestampLength, TimeSpan.FromMicroseconds(NONCE_EXPIRE_SECOND), TimeSpan.FromSeconds(NONCE_SKEW_SECOND));
+
+        foreach (var item in peerInfoProvider.PeerInfo)
+        {
+            _localPeers[item.PeerId] = new LocalPeerManager(_connectionContextFactory, _nonceManager, item, eventBus, logger);
+        }
+
+        foreach (var item in _localPeers.Values) item.Start();
+    }
+
+    public void Stop()
+    {
+        foreach (var item in _localPeers.Values) item.Stop();
+
+        _localPeers.Clear();
+
+        _nonceManager?.Dispose();
+    }
+
+    public void AddOrReplaceLocalPeer(ILocalPeerInfo localPeerInfo)
+    {
+        RemoveLocalPeer(localPeerInfo.PeerId);
+        _localPeers[localPeerInfo.PeerId] = new LocalPeerManager(_connectionContextFactory, _nonceManager, localPeerInfo, eventBus, logger);
+    }
+
+    public bool AddOrReplaceRemotePeer(string localPeerId, IRemotePeerInfo remotePeerInfo)
+    {
+        if (!_localPeers.TryGetValue(localPeerId, out var localPeerManager)) return false;
+        localPeerManager.AddOrReplaceRemotePeer(remotePeerInfo);
+        return true;
+    }
+
+    public bool RemoveLocalPeer(string localPeerId)
+    {
+        if (_localPeers.Remove(localPeerId, out var localPeerManager) == false) return false;
+        localPeerManager.Stop();
+        return true;
+    }
+
+    public bool RemoveRemotePeer(string localPeerId, string remotePeerId)
+    {
+        return _localPeers.TryGetValue(localPeerId, out var localPeerManager) && localPeerManager.RemoveRemotePeer(remotePeerId);
+    }
+
+    public bool ConnectToPeerAsync(string localPeerId, string remotePeerId)
+    {
+        return _localPeers.TryGetValue(localPeerId, out var localPeerManager) && localPeerManager.ConnectToRemotePeer(remotePeerId);
+    }
+
+    public bool SendToPeer(string localPeerId, string remotePeerId, byte[] payload)
+    {
+        return _localPeers.TryGetValue(localPeerId, out var localPeerManager) && localPeerManager.SendToRemotePeer(remotePeerId, payload);
+    }
+}

+ 0 - 32
PCC.Shared/App/TransferModels/BlockWithNonce.cs

@@ -1,32 +0,0 @@
-using System.Text;
-using PCC.App.BinaryFormatter;
-
-namespace PCC.App.TransferModels;
-
-public static class BlockWithNonce1
-{
-    public static ReadOnlyMemory<byte> Mux(ReadOnlyMemory<byte> payload, ReadOnlyMemory<byte> nonce)
-    {
-        // 计算总长度
-        var totalLength = payload.Length + nonce.Length;
-        var buffer = new byte[totalLength];
-
-        // 将 payload 和 nonce 拷贝到 buffer 中
-        payload.Span.CopyTo(buffer);
-        nonce.Span.CopyTo(buffer.AsSpan(payload.Length));
-
-        return buffer;
-    }
-
-    public static (ReadOnlyMemory<byte> payload, ReadOnlyMemory<byte> nonce) Demux(ReadOnlyMemory<byte> transferBlock, int nonceBytes)
-    {
-        // 计算 payload 的长度
-        var payloadLength = transferBlock.Length - nonceBytes;
-
-        // 获取 payload 和 nonce
-        var payload = transferBlock.Slice(0, payloadLength);
-        var nonce = transferBlock.Slice(payloadLength, nonceBytes);
-
-        return (payload, nonce);
-    }
-}

+ 0 - 306
PCC.Shared/App/TrustedPeerManager.cs

@@ -1,306 +0,0 @@
-using System.Collections.Concurrent;
-using System.Net.Sockets;
-using System.Security.Cryptography;
-using Microsoft.AspNetCore.Connections;
-using Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets;
-using PCC.App.Networking;
-using PCC.App.Security;
-using PCC.App.TransferModels;
-using PCC.Common.EventBus;
-
-namespace PCC.App;
-
-// Handshake 1 → Public Key SHA256
-// Handshake 2 ← ACK for Yes or No(close connection)
-// *Complete Handshake
-
-// SendText 1 → Payload
-// SendText 2 ← ACK
-
-// ACK: SHA256(incoming payload)
-
-public abstract class TrustedPeerManager
-{
-    private const int NONCE_LENGTH_BYTES = 16;
-    private const int NONCE_EXPIRE_SECOND = 60;
-    private const int NONCE_SKEW_SECOND = 30;
-
-    public record TPM_EVT_CMD_INIT(byte[] MyPub, byte[] MyPri);
-    public record TPM_EVT_CMD_SHUTDOWN;
-
-    public record TPM_EVT_PEER_IX(string PeerId);
-    public record TPM_EVT_PEER_CX(string PeerId);
-    public record TPM_EVT_PEER_DX(string PeerId);
-    public record TPM_EVT_PEER_RX(string PeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);
-    public record TPM_EVT_PEER_TX(string PeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);
-
-    public record TPM_EVT_PEER_XX(XX Kind, string? PeerId);
-
-    public enum XX
-    {
-        Invalid = 0,
-        NonTrustPeer,
-        HandshakeFailServerAckNotMatch,
-        TimeStampSkew,
-        ReplayAttackDetected,
-    }
-
-    private readonly IEventBus _eventBus;
-    private readonly ILogger<TrustedPeerManager> _logger;
-    private readonly SocketConnectionContextFactory _connectionContextFactory;
-
-    private RSA? _myPrivateKey;
-    private ReadOnlyMemory<byte>? _myPeerId;
-
-    private readonly ConcurrentDictionary<string, PeerInfo> _trustedPeers = new();
-
-    private readonly ConcurrentDictionary<string, EncryptedTcpPeer> _connectedPeers = new();
-    private readonly ConcurrentDictionary<string, EncryptedTcpPeer> _IncomePeers = new();
-    private readonly TimestampNonceManager _nonceManager;
-
-    protected TrustedPeerManager(IEventBus eventBus, ILogger<TrustedPeerManager> logger)
-    {
-        _eventBus = eventBus;
-        _logger = logger;
-        _connectionContextFactory = new(new(), _logger);
-        _nonceManager = new TimestampNonceManager(NONCE_LENGTH_BYTES - TimestampNonceManager.TimestampLength, TimeSpan.FromMicroseconds(NONCE_EXPIRE_SECOND), TimeSpan.FromSeconds(NONCE_SKEW_SECOND));
-
-        eventBus.Subscript<TPM_EVT_CMD_INIT>(Init);
-        eventBus.Subscript<TPM_EVT_CMD_SHUTDOWN>(Shutdown);
-    }
-
-    private void Init(TPM_EVT_CMD_INIT obj)
-    {
-        _myPrivateKey = RsaUtility.FromPKCS1PrivateKey(obj.MyPri);
-        _myPeerId = SHA256.HashData(obj.MyPub);
-    }
-
-    private void Shutdown(TPM_EVT_CMD_SHUTDOWN _)
-    {
-        foreach (var item in _connectedPeers)
-        {
-            item.Value.Disconnect();
-            _connectedPeers.Remove(item.Key, out var _);
-        }
-
-        foreach (var item in _IncomePeers)
-        {
-            item.Value.Disconnect();
-            _connectedPeers.Remove(item.Key, out var _);
-        }
-
-        _nonceManager.Dispose();
-    }
-
-    public string AddPeer(byte[] publicKey, string host, int port)
-    {
-        var peerId = Convert.ToHexString(SHA256.HashData(publicKey));
-        _trustedPeers[peerId] = new PeerInfo(RsaUtility.FromPKCS1PublicKey(publicKey), host, port);
-        return peerId;
-    }
-
-    public bool RemovePeer(string peerId) => _trustedPeers.Remove(peerId, out _);
-
-    public bool ConnectToPeerAsync(string peerId)
-    {
-        if (_trustedPeers.TryGetValue(peerId, out var peerInfo) == false)
-        {
-            return false;
-        }
-
-        if (_myPrivateKey == null || _myPeerId == null) throw new InvalidOperationException("Not init");
-
-        _ = Task.Run(async () =>
-        {
-            EncryptedTcpPeer? epLocal = null;
-            try
-            {
-                //Create Peer client and connect to server
-                {
-                    var sckLocal = new Socket(AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp);
-                    await sckLocal.ConnectAsync(peerInfo.Host, peerInfo.Port);
-
-                    var conn = _connectionContextFactory.Create(sckLocal);
-                    var tcpPeerLocal = new TcpPeer(conn);
-                    epLocal = new EncryptedTcpPeer(_myPrivateKey, peerInfo.PublicKey, tcpPeerLocal);
-
-                    // handshake as client
-
-                    // ☞ tx handshake 1
-                    var (handshake1, _) = _nonceManager.NewNonceWithPayload(_myPeerId.Value);
-                    await epLocal.SendBlockAsync(handshake1);
-
-                    // ☞ rx handshake 2
-                    var handshake2 = await epLocal.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
-                    if (handshake2 == null) { epLocal.Disconnect(); return; } // timeout? disconnect
-
-                    var (ok, _, pl) = _nonceManager.CheckValidAndExtractPayload(handshake2);
-                    if (ok != true)
-                    {
-                        PublishXX(peerId, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
-                        epLocal.Disconnect();
-                        return;
-                    }
-
-                    // handshake not match, disconnect
-                    if (pl.Span.SequenceEqual(SHA256.HashData(handshake1.Span)) != true)
-                    {
-                        PublishXX(peerId, XX.HandshakeFailServerAckNotMatch);
-                        epLocal.Disconnect(); return;
-                    }
-                }
-
-                //replace exist connection
-                if (_connectedPeers.Remove(peerId, out var exist)) exist.Disconnect();
-
-                // register as connected
-                _connectedPeers[peerId] = epLocal;
-
-                _eventBus.Publish(new TPM_EVT_PEER_CX(peerId));
-
-                while (true) // start RxCycle
-                {
-                    var rxb = await epLocal.RxBlockAsync();
-                    if (rxb == null) break;
-
-                    var (ok, senderTimestamp, payload) = _nonceManager.CheckValidAndExtractPayload(rxb);
-                    if (ok != true)
-                    {
-                        PublishXX(peerId, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
-                        epLocal.Disconnect();
-                        break;
-                    }
-
-                    _eventBus.Publish(new TPM_EVT_PEER_RX(peerId, senderTimestamp, payload));
-                }
-            }
-            catch (ConnectionAbortedException)
-            {
-                //ignore
-            }
-            catch (Exception ex)
-            {
-                _logger.LogError(ex, nameof(ConnectToPeerAsync));
-            }
-
-            _eventBus.Publish(new TPM_EVT_PEER_DX(peerId));
-
-            // unregister from connected
-            _connectedPeers.Remove(peerId, out _);
-
-            epLocal?.Disconnect();
-        });
-
-        return true;
-    }
-
-    public async Task HandleIncomingPeerAsync(ConnectionContext connection)
-    {
-        if (_myPrivateKey == null) throw new InvalidOperationException("Not init");
-
-        string? peerId = null;
-        try
-        {
-            // handshake as server
-            EncryptedTcpPeer epRemote;
-            {
-                var tpRemote = new TcpPeer(connection);
-                //rx handshake1
-                PeerInfo peerInfo;
-                byte[] payloadOfHandshake1;
-                {
-                    var receivedBlock = await tpRemote.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
-                    if (receivedBlock == null) return;
-
-                    var handshake1 = RsaUtility.Decrypt(_myPrivateKey, receivedBlock);
-
-                    var (ok, _, payload) = _nonceManager.CheckValidAndExtractPayload(handshake1);
-                    if (ok != true)
-                    {
-                        PublishXX(null, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
-                        tpRemote.Disconnect();
-                        return;
-                    }
-
-                    peerId = Convert.ToHexString(payload.Span);
-
-                    // Kick if non-trusted
-                    if (_trustedPeers.TryGetValue(peerId, out peerInfo!) == false)
-                    {
-                        PublishXX(peerId, XX.NonTrustPeer);
-                        return;
-                    }
-
-                    // verify signature
-                    payloadOfHandshake1 = RsaUtility.DecryptAndVerifySignature(_myPrivateKey, receivedBlock, peerInfo.PublicKey);
-                }
-
-                //tx handshake2
-                {
-                    epRemote = new EncryptedTcpPeer(_myPrivateKey, peerInfo.PublicKey, tpRemote);
-                    var payloadOfHandshake2 = SHA256.HashData(payloadOfHandshake1);
-                    var (handshake2, _) = _nonceManager.NewNonceWithPayload(payloadOfHandshake2);
-                    await epRemote.SendBlockAsync(handshake2);
-                }
-            }
-
-            //replace exist connection
-            if (_IncomePeers.Remove(peerId, out var exist)) exist.Disconnect();
-
-            // register as income
-            _IncomePeers[peerId] = epRemote;
-
-            // start RxCycle
-            while (true)
-            {
-                var receivedBlock = await epRemote.RxBlockAsync();
-                if (receivedBlock == null) break;
-
-                var (ok, senderTimestamp, payload) = _nonceManager.CheckValidAndExtractPayload(receivedBlock);
-                if (ok != true)
-                {
-                    PublishXX(peerId, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
-                    break;
-                }
-
-                _eventBus.Publish(new TPM_EVT_PEER_RX(peerId, senderTimestamp, payload));
-            }
-        }
-        catch (ConnectionAbortedException)
-        {
-            //ignore
-        }
-        catch (Exception e)
-        {
-            _logger.LogError(e, nameof(HandleIncomingPeerAsync));
-        }
-
-        if (peerId != null)
-        {
-            _eventBus.Publish(new TPM_EVT_PEER_DX(peerId));
-            // unregister from income
-            if (_IncomePeers.Remove(peerId, out var peer))
-            {
-                peer.Disconnect();
-            }
-        }
-    }
-
-    private void PublishXX(string? peerId, XX kind) => _eventBus.Publish(new TPM_EVT_PEER_XX(kind, peerId));
-
-    public bool SendToPeer(string peerId, byte[] payload)
-    {
-        if (_connectedPeers.TryGetValue(peerId, out var peerCon) == false && _IncomePeers.TryGetValue(peerId, out peerCon) == false) return false;
-        Task.Run(async () =>
-        {
-            var (payloadAndNonce, timestamp) = _nonceManager.NewNonceWithPayload(payload);
-
-            await peerCon.SendBlockAsync(payloadAndNonce);
-
-            _eventBus.Publish(new TPM_EVT_PEER_TX(peerId, timestamp, payload));
-        });
-        return true;
-    }
-
-    private record PeerInfo(RSA PublicKey, string Host, int Port);
-}