|
@@ -5,6 +5,7 @@ using Microsoft.AspNetCore.Connections;
|
|
|
using Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets;
|
|
|
using PCC.App.Networking;
|
|
|
using PCC.App.Security;
|
|
|
+using PCC.App.TransferModels;
|
|
|
using PCC.Common.EventBus;
|
|
|
|
|
|
namespace PCC.App;
|
|
@@ -20,31 +21,49 @@ namespace PCC.App;
|
|
|
|
|
|
public abstract class TrustedPeerManager
|
|
|
{
|
|
|
+ private const int NONCE_LENGTH_BYTES = 16;
|
|
|
+ private const int NONCE_EXPIRE_SECOND = 60;
|
|
|
+ private const int NONCE_SKEW_SECOND = 30;
|
|
|
+
|
|
|
public record TPM_EVT_CMD_INIT(byte[] MyPub, byte[] MyPri);
|
|
|
public record TPM_EVT_CMD_SHUTDOWN;
|
|
|
|
|
|
- public record TPM_EVT_PEER_CX(string PeerId);
|
|
|
public record TPM_EVT_PEER_IX(string PeerId);
|
|
|
+ public record TPM_EVT_PEER_CX(string PeerId);
|
|
|
public record TPM_EVT_PEER_DX(string PeerId);
|
|
|
- public record TPM_EVT_PEER_RX(string PeerId, byte[] block);
|
|
|
+ public record TPM_EVT_PEER_RX(string PeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);
|
|
|
+ public record TPM_EVT_PEER_TX(string PeerId, DateTimeOffset senderTimestamp, ReadOnlyMemory<byte> payload);
|
|
|
+
|
|
|
+ public record TPM_EVT_PEER_XX(XX Kind, string? PeerId);
|
|
|
+
|
|
|
+ public enum XX
|
|
|
+ {
|
|
|
+ Invalid = 0,
|
|
|
+ NonTrustPeer,
|
|
|
+ HandshakeFailServerAckNotMatch,
|
|
|
+ TimeStampSkew,
|
|
|
+ ReplayAttackDetected,
|
|
|
+ }
|
|
|
|
|
|
private readonly IEventBus _eventBus;
|
|
|
private readonly ILogger<TrustedPeerManager> _logger;
|
|
|
private readonly SocketConnectionContextFactory _connectionContextFactory;
|
|
|
|
|
|
- private RSA _myPrivateKey;
|
|
|
- private ReadOnlyMemory<byte> _myPeerId;
|
|
|
+ private RSA? _myPrivateKey;
|
|
|
+ private ReadOnlyMemory<byte>? _myPeerId;
|
|
|
|
|
|
private readonly ConcurrentDictionary<string, PeerInfo> _trustedPeers = new();
|
|
|
|
|
|
private readonly ConcurrentDictionary<string, EncryptedTcpPeer> _connectedPeers = new();
|
|
|
private readonly ConcurrentDictionary<string, EncryptedTcpPeer> _IncomePeers = new();
|
|
|
+ private readonly TimestampNonceManager _nonceManager;
|
|
|
|
|
|
protected TrustedPeerManager(IEventBus eventBus, ILogger<TrustedPeerManager> logger)
|
|
|
{
|
|
|
_eventBus = eventBus;
|
|
|
_logger = logger;
|
|
|
_connectionContextFactory = new(new(), _logger);
|
|
|
+ _nonceManager = new TimestampNonceManager(NONCE_LENGTH_BYTES - TimestampNonceManager.TimestampLength, TimeSpan.FromMicroseconds(NONCE_EXPIRE_SECOND), TimeSpan.FromSeconds(NONCE_SKEW_SECOND));
|
|
|
|
|
|
eventBus.Subscript<TPM_EVT_CMD_INIT>(Init);
|
|
|
eventBus.Subscript<TPM_EVT_CMD_SHUTDOWN>(Shutdown);
|
|
@@ -58,25 +77,30 @@ public abstract class TrustedPeerManager
|
|
|
|
|
|
private void Shutdown(TPM_EVT_CMD_SHUTDOWN _)
|
|
|
{
|
|
|
- foreach (var item in _connectedPeers.Values)
|
|
|
+ foreach (var item in _connectedPeers)
|
|
|
{
|
|
|
- item.Disconnect();
|
|
|
+ item.Value.Disconnect();
|
|
|
+ _connectedPeers.Remove(item.Key, out var _);
|
|
|
}
|
|
|
|
|
|
- foreach (var item in _IncomePeers.Values)
|
|
|
+ foreach (var item in _IncomePeers)
|
|
|
{
|
|
|
- item.Disconnect();
|
|
|
+ item.Value.Disconnect();
|
|
|
+ _connectedPeers.Remove(item.Key, out var _);
|
|
|
}
|
|
|
+
|
|
|
+ _nonceManager.Dispose();
|
|
|
}
|
|
|
|
|
|
- public string AddTrustPeer(byte[] tpk, string host, int port)
|
|
|
+ public string AddPeer(byte[] publicKey, string host, int port)
|
|
|
{
|
|
|
- var peerId = Convert.ToHexString(SHA256.HashData(tpk));
|
|
|
- var rsa = RsaUtility.FromPKCS1PublicKey(tpk);
|
|
|
- _trustedPeers[peerId] = new PeerInfo(rsa, host, port);
|
|
|
+ var peerId = Convert.ToHexString(SHA256.HashData(publicKey));
|
|
|
+ _trustedPeers[peerId] = new PeerInfo(RsaUtility.FromPKCS1PublicKey(publicKey), host, port);
|
|
|
return peerId;
|
|
|
}
|
|
|
|
|
|
+ public bool RemovePeer(string peerId) => _trustedPeers.Remove(peerId, out _);
|
|
|
+
|
|
|
public bool ConnectToPeerAsync(string peerId)
|
|
|
{
|
|
|
if (_trustedPeers.TryGetValue(peerId, out var peerInfo) == false)
|
|
@@ -84,49 +108,87 @@ public abstract class TrustedPeerManager
|
|
|
return false;
|
|
|
}
|
|
|
|
|
|
+ if (_myPrivateKey == null || _myPeerId == null) throw new InvalidOperationException("Not init");
|
|
|
+
|
|
|
_ = Task.Run(async () =>
|
|
|
{
|
|
|
+ EncryptedTcpPeer? epLocal = null;
|
|
|
try
|
|
|
{
|
|
|
- //Start Peer client
|
|
|
- // connect to server
|
|
|
- using var sck = new Socket(AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp);
|
|
|
- await sck.ConnectAsync(peerInfo.host, peerInfo.port);
|
|
|
-
|
|
|
- var conn = _connectionContextFactory.Create(sck);
|
|
|
- var peer = new TcpPeer(conn, sck);
|
|
|
-
|
|
|
- // handshake as client
|
|
|
-
|
|
|
- var ep = new EncryptedTcpPeer(_myPrivateKey, peerInfo.PublicKey, peer);
|
|
|
- await ep.SendBlock(_myPeerId); //send handshake 1
|
|
|
-
|
|
|
- var blockAck = await ep.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
|
|
|
- if (blockAck?.SequenceEqual(SHA256.HashData(_myPeerId.Span)) != true)
|
|
|
+ //Create Peer client and connect to server
|
|
|
{
|
|
|
- peer.Disconnect();
|
|
|
- return;
|
|
|
+ var sckLocal = new Socket(AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp);
|
|
|
+ await sckLocal.ConnectAsync(peerInfo.Host, peerInfo.Port);
|
|
|
+
|
|
|
+ var conn = _connectionContextFactory.Create(sckLocal);
|
|
|
+ var tcpPeerLocal = new TcpPeer(conn);
|
|
|
+ epLocal = new EncryptedTcpPeer(_myPrivateKey, peerInfo.PublicKey, tcpPeerLocal);
|
|
|
+
|
|
|
+ // handshake as client
|
|
|
+
|
|
|
+ // ☞ tx handshake 1
|
|
|
+ var (handshake1, _) = _nonceManager.NewNonceWithPayload(_myPeerId.Value);
|
|
|
+ await epLocal.SendBlockAsync(handshake1);
|
|
|
+
|
|
|
+ // ☞ rx handshake 2
|
|
|
+ var handshake2 = await epLocal.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
|
|
|
+ if (handshake2 == null) { epLocal.Disconnect(); return; } // timeout? disconnect
|
|
|
+
|
|
|
+ var (ok, _, pl) = _nonceManager.CheckValidAndExtractPayload(handshake2);
|
|
|
+ if (ok != true)
|
|
|
+ {
|
|
|
+ PublishXX(peerId, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
|
|
|
+ epLocal.Disconnect();
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ // handshake not match, disconnect
|
|
|
+ if (pl.Span.SequenceEqual(SHA256.HashData(handshake1.Span)) != true)
|
|
|
+ {
|
|
|
+ PublishXX(peerId, XX.HandshakeFailServerAckNotMatch);
|
|
|
+ epLocal.Disconnect(); return;
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
+ //replace exist connection
|
|
|
+ if (_connectedPeers.Remove(peerId, out var exist)) exist.Disconnect();
|
|
|
+
|
|
|
// register as connected
|
|
|
- //TODO: replace exist connection
|
|
|
- _connectedPeers[peerId] = ep;
|
|
|
+ _connectedPeers[peerId] = epLocal;
|
|
|
|
|
|
_eventBus.Publish(new TPM_EVT_PEER_CX(peerId));
|
|
|
|
|
|
while (true) // start RxCycle
|
|
|
{
|
|
|
- var rxb = await ep.RxBlockAsync();
|
|
|
+ var rxb = await epLocal.RxBlockAsync();
|
|
|
if (rxb == null) break;
|
|
|
- _eventBus.Publish(new TPM_EVT_PEER_RX(peerId, rxb));
|
|
|
+
|
|
|
+ var (ok, senderTimestamp, payload) = _nonceManager.CheckValidAndExtractPayload(rxb);
|
|
|
+ if (ok != true)
|
|
|
+ {
|
|
|
+ PublishXX(peerId, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
|
|
|
+ epLocal.Disconnect();
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ _eventBus.Publish(new TPM_EVT_PEER_RX(peerId, senderTimestamp, payload));
|
|
|
}
|
|
|
}
|
|
|
+ catch (ConnectionAbortedException)
|
|
|
+ {
|
|
|
+ //ignore
|
|
|
+ }
|
|
|
catch (Exception ex)
|
|
|
{
|
|
|
_logger.LogError(ex, nameof(ConnectToPeerAsync));
|
|
|
}
|
|
|
|
|
|
_eventBus.Publish(new TPM_EVT_PEER_DX(peerId));
|
|
|
+
|
|
|
+ // unregister from connected
|
|
|
+ _connectedPeers.Remove(peerId, out _);
|
|
|
+
|
|
|
+ epLocal?.Disconnect();
|
|
|
});
|
|
|
|
|
|
return true;
|
|
@@ -134,51 +196,111 @@ public abstract class TrustedPeerManager
|
|
|
|
|
|
public async Task HandleIncomingPeerAsync(ConnectionContext connection)
|
|
|
{
|
|
|
+ if (_myPrivateKey == null) throw new InvalidOperationException("Not init");
|
|
|
+
|
|
|
string? peerId = null;
|
|
|
try
|
|
|
{
|
|
|
- var peer = new TcpPeer(connection, null);
|
|
|
-
|
|
|
// handshake as server
|
|
|
- var eb = await peer.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
|
|
|
- if (eb == null) return;
|
|
|
+ EncryptedTcpPeer epRemote;
|
|
|
+ {
|
|
|
+ var tpRemote = new TcpPeer(connection);
|
|
|
+ //rx handshake1
|
|
|
+ PeerInfo peerInfo;
|
|
|
+ byte[] payloadOfHandshake1;
|
|
|
+ {
|
|
|
+ var receivedBlock = await tpRemote.RxBlockAsync(new CancellationTokenSource(TimeSpan.FromSeconds(10)).Token);
|
|
|
+ if (receivedBlock == null) return;
|
|
|
+
|
|
|
+ var handshake1 = RsaUtility.Decrypt(_myPrivateKey, receivedBlock);
|
|
|
+
|
|
|
+ var (ok, _, payload) = _nonceManager.CheckValidAndExtractPayload(handshake1);
|
|
|
+ if (ok != true)
|
|
|
+ {
|
|
|
+ PublishXX(null, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
|
|
|
+ tpRemote.Disconnect();
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ peerId = Convert.ToHexString(payload.Span);
|
|
|
+
|
|
|
+ // Kick if non-trusted
|
|
|
+ if (_trustedPeers.TryGetValue(peerId, out peerInfo!) == false)
|
|
|
+ {
|
|
|
+ PublishXX(peerId, XX.NonTrustPeer);
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ // verify signature
|
|
|
+ payloadOfHandshake1 = RsaUtility.DecryptAndVerifySignature(_myPrivateKey, receivedBlock, peerInfo.PublicKey);
|
|
|
+ }
|
|
|
|
|
|
- // extract peerId
|
|
|
- peerId = Convert.ToHexString(RsaUtility.Decrypt(_myPrivateKey, eb));
|
|
|
- // Kick if non trusted
|
|
|
- if (_trustedPeers.TryGetValue(peerId, out var peerInfo) == false) return;
|
|
|
- // verify signature
|
|
|
- var data = RsaUtility.DecryptAndVerifySignature(_myPrivateKey, eb, peerInfo.PublicKey);
|
|
|
+ //tx handshake2
|
|
|
+ {
|
|
|
+ epRemote = new EncryptedTcpPeer(_myPrivateKey, peerInfo.PublicKey, tpRemote);
|
|
|
+ var payloadOfHandshake2 = SHA256.HashData(payloadOfHandshake1);
|
|
|
+ var (handshake2, _) = _nonceManager.NewNonceWithPayload(payloadOfHandshake2);
|
|
|
+ await epRemote.SendBlockAsync(handshake2);
|
|
|
+ }
|
|
|
+ }
|
|
|
|
|
|
- var ep = new EncryptedTcpPeer(_myPrivateKey, peerInfo.PublicKey, peer);
|
|
|
- await ep.SendBlock(SHA256.HashData(data)); //ACK
|
|
|
+ //replace exist connection
|
|
|
+ if (_IncomePeers.Remove(peerId, out var exist)) exist.Disconnect();
|
|
|
|
|
|
// register as income
|
|
|
- //TODO: replace exist connection
|
|
|
- _IncomePeers[peerId] = ep;
|
|
|
+ _IncomePeers[peerId] = epRemote;
|
|
|
|
|
|
// start RxCycle
|
|
|
- while (true) // start RxCycle
|
|
|
+ while (true)
|
|
|
{
|
|
|
- var rxb = await ep.RxBlockAsync();
|
|
|
- if (rxb == null) break;
|
|
|
- _eventBus.Publish(new TPM_EVT_PEER_RX(peerId, rxb));
|
|
|
+ var receivedBlock = await epRemote.RxBlockAsync();
|
|
|
+ if (receivedBlock == null) break;
|
|
|
+
|
|
|
+ var (ok, senderTimestamp, payload) = _nonceManager.CheckValidAndExtractPayload(receivedBlock);
|
|
|
+ if (ok != true)
|
|
|
+ {
|
|
|
+ PublishXX(peerId, ok switch { null => XX.TimeStampSkew, false => XX.ReplayAttackDetected, _ => XX.Invalid });
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ _eventBus.Publish(new TPM_EVT_PEER_RX(peerId, senderTimestamp, payload));
|
|
|
}
|
|
|
}
|
|
|
+ catch (ConnectionAbortedException)
|
|
|
+ {
|
|
|
+ //ignore
|
|
|
+ }
|
|
|
catch (Exception e)
|
|
|
{
|
|
|
_logger.LogError(e, nameof(HandleIncomingPeerAsync));
|
|
|
}
|
|
|
|
|
|
- if (peerId != null) _eventBus.Publish(new TPM_EVT_PEER_DX(peerId));
|
|
|
+ if (peerId != null)
|
|
|
+ {
|
|
|
+ _eventBus.Publish(new TPM_EVT_PEER_DX(peerId));
|
|
|
+ // unregister from income
|
|
|
+ if (_IncomePeers.Remove(peerId, out var peer))
|
|
|
+ {
|
|
|
+ peer.Disconnect();
|
|
|
+ }
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
- public bool SendToPeer(string peerId, byte[] block)
|
|
|
+ private void PublishXX(string? peerId, XX kind) => _eventBus.Publish(new TPM_EVT_PEER_XX(kind, peerId));
|
|
|
+
|
|
|
+ public bool SendToPeer(string peerId, byte[] payload)
|
|
|
{
|
|
|
if (_connectedPeers.TryGetValue(peerId, out var peerCon) == false && _IncomePeers.TryGetValue(peerId, out peerCon) == false) return false;
|
|
|
- _ = peerCon.SendBlock(block);
|
|
|
+ Task.Run(async () =>
|
|
|
+ {
|
|
|
+ var (payloadAndNonce, timestamp) = _nonceManager.NewNonceWithPayload(payload);
|
|
|
+
|
|
|
+ await peerCon.SendBlockAsync(payloadAndNonce);
|
|
|
+
|
|
|
+ _eventBus.Publish(new TPM_EVT_PEER_TX(peerId, timestamp, payload));
|
|
|
+ });
|
|
|
return true;
|
|
|
}
|
|
|
|
|
|
- private record PeerInfo(RSA PublicKey, string host, int port);
|
|
|
+ private record PeerInfo(RSA PublicKey, string Host, int Port);
|
|
|
}
|