pub(crate) mod handshake;
pub(crate) mod initiator;
pub(crate) mod responder;
pub use responder::MaybeVerifiableRelayResponderChannel;
use digest::Digest;
use futures::{AsyncRead, AsyncWrite};
use rand::Rng;
use safelog::Sensitive;
use std::net::IpAddr;
use std::sync::Arc;
use std::time::UNIX_EPOCH;
use tor_cell::chancell::msg;
use tor_cert::EncodedEd25519Cert;
use tor_cert::rsa::EncodedRsaCrosscert;
use tor_cert::x509::TlsKeyAndCert;
use tor_error::internal;
use tor_linkspec::{HasRelayIds, OwnedChanTarget, RelayIdRef, RelayIdType};
use tor_llcrypto as ll;
use tor_llcrypto::pk::{
ed25519::{Ed25519Identity, Ed25519SigningKey},
rsa,
rsa::RsaIdentity,
};
use tor_relay_crypto::pk::RelayLinkSigningKeypair;
use tor_rtcompat::{CertifiedConn, CoarseTimeProvider, SleepProvider, StreamOps};
use crate::channel::handshake::VerifiedChannel;
use crate::peer::PeerAddr;
use crate::relay::channel::handshake::{AUTHTYPE_ED25519_SHA256_RFC5705, RelayResponderHandshake};
use crate::{Error, Result, channel::RelayInitiatorHandshake, memquota::ChannelAccount};
pub(crate) static LINK_AUTH: &[u16] = &[AUTHTYPE_ED25519_SHA256_RFC5705];
pub struct RelayIdentities {
pub(crate) rsa_id_der_digest: [u8; 32],
pub(crate) rsa_id: RsaIdentity,
pub(crate) ed_id: Ed25519Identity,
pub(crate) link_sign_kp: RelayLinkSigningKeypair,
pub(crate) cert_id_sign_ed: EncodedEd25519Cert,
pub(crate) cert_sign_tls_ed: EncodedEd25519Cert,
pub(crate) cert_sign_link_auth_ed: EncodedEd25519Cert,
pub(crate) cert_id_x509_rsa: Vec<u8>,
pub(crate) cert_id_rsa: EncodedRsaCrosscert,
pub(crate) tls_key_and_cert: TlsKeyAndCert,
}
impl RelayIdentities {
#[allow(clippy::too_many_arguments)] pub fn new(
rsa_id_pk: &rsa::PublicKey,
ed_id: Ed25519Identity,
link_sign_kp: RelayLinkSigningKeypair,
cert_id_sign_ed: EncodedEd25519Cert,
cert_sign_tls_ed: EncodedEd25519Cert,
cert_sign_link_auth_ed: EncodedEd25519Cert,
cert_id_x509_rsa: Vec<u8>,
cert_id_rsa: EncodedRsaCrosscert,
tls_key_and_cert: TlsKeyAndCert,
) -> Self {
Self {
rsa_id_der_digest: ll::d::Sha256::digest(rsa_id_pk.to_der()).into(),
rsa_id: rsa_id_pk.to_rsa_identity(),
ed_id,
link_sign_kp,
cert_id_sign_ed,
cert_sign_tls_ed,
cert_sign_link_auth_ed,
cert_id_x509_rsa,
cert_id_rsa,
tls_key_and_cert,
}
}
pub fn tls_key_and_cert(&self) -> &TlsKeyAndCert {
&self.tls_key_and_cert
}
pub(crate) fn ed_id_bytes(&self) -> [u8; 32] {
self.ed_id.into()
}
}
impl HasRelayIds for RelayIdentities {
fn identity(&self, key_type: RelayIdType) -> Option<RelayIdRef<'_>> {
match key_type {
RelayIdType::Ed25519 => Some(RelayIdRef::from(&self.ed_id)),
RelayIdType::Rsa => Some(RelayIdRef::from(&self.rsa_id)),
_ => None, }
}
}
#[derive(Default)]
#[non_exhaustive]
pub struct RelayChannelBuilder;
impl RelayChannelBuilder {
pub fn new() -> Self {
Self::default()
}
#[allow(clippy::too_many_arguments)] pub fn launch<T, S>(
self,
tls: T,
sleep_prov: S,
identities: Arc<RelayIdentities>,
my_addrs: Vec<IpAddr>,
peer: &OwnedChanTarget,
memquota: ChannelAccount,
) -> RelayInitiatorHandshake<T, S>
where
T: AsyncRead + AsyncWrite + CertifiedConn + StreamOps + Send + Unpin + 'static,
S: CoarseTimeProvider + SleepProvider,
{
RelayInitiatorHandshake::new(tls, sleep_prov, identities, my_addrs, peer, memquota)
}
pub fn accept<T, S>(
self,
peer_addr: Sensitive<PeerAddr>,
my_addrs: Vec<IpAddr>,
tls: T,
sleep_prov: S,
identities: Arc<RelayIdentities>,
memquota: ChannelAccount,
) -> RelayResponderHandshake<T, S>
where
T: AsyncRead + AsyncWrite + CertifiedConn + StreamOps + Send + Unpin + 'static,
S: CoarseTimeProvider + SleepProvider,
{
RelayResponderHandshake::new(peer_addr, my_addrs, tls, sleep_prov, identities, memquota)
}
}
#[derive(Debug)]
pub(crate) struct ChannelAuthenticationData {
pub(crate) link_auth: u16,
pub(crate) cid: [u8; 32],
pub(crate) sid: [u8; 32],
pub(crate) cid_ed: [u8; 32],
pub(crate) sid_ed: [u8; 32],
pub(crate) clog: [u8; 32],
pub(crate) slog: [u8; 32],
pub(crate) scert: [u8; 32],
}
impl ChannelAuthenticationData {
const fn auth_type_bytes(link_auth: u16) -> Result<&'static [u8]> {
match link_auth {
3 => Ok(b"AUTH0003"),
_ => Err(Error::BadCellAuth),
}
}
const fn keying_material_label_bytes(link_auth: u16) -> Result<&'static [u8]> {
match link_auth {
3 => Ok(b"EXPORTER FOR TOR TLS CLIENT BINDING AUTH0003"),
_ => Err(Error::BadCellAuth),
}
}
pub(crate) fn as_body_no_rand<C: CertifiedConn>(&self, tls: &C) -> Result<Vec<u8>> {
let mut body = Vec::with_capacity(352);
body.extend_from_slice(Self::auth_type_bytes(self.link_auth)?);
body.extend_from_slice(&self.cid);
body.extend_from_slice(&self.sid);
body.extend_from_slice(&self.cid_ed);
body.extend_from_slice(&self.sid_ed);
body.extend_from_slice(&self.slog);
body.extend_from_slice(&self.clog);
body.extend_from_slice(&self.scert);
let tls_secrets = tls.export_keying_material(
32,
Self::keying_material_label_bytes(self.link_auth)?,
Some(&self.cid[..]),
)?;
body.extend_from_slice(tls_secrets.as_slice());
Ok(body)
}
pub(crate) fn into_authenticate<C: CertifiedConn>(
self,
tls: &C,
link_ed: &RelayLinkSigningKeypair,
) -> Result<msg::Authenticate> {
let mut body = self.as_body_no_rand(tls)?;
let random: [u8; 24] = rand::rng().random();
body.extend_from_slice(&random);
let sig = link_ed.sign(&body);
body.extend_from_slice(&sig.to_bytes());
Ok(msg::Authenticate::new(self.link_auth, body))
}
pub(crate) fn build_initiator<T, S>(
auth_challenge_cell: &msg::AuthChallenge,
identities: &Arc<RelayIdentities>,
clog: [u8; 32],
slog: [u8; 32],
verified: &mut VerifiedChannel<T, S>,
peer_cert_digest: [u8; 32],
) -> Result<ChannelAuthenticationData>
where
T: AsyncRead + AsyncWrite + CertifiedConn + StreamOps + Send + Unpin + 'static,
S: CoarseTimeProvider + SleepProvider,
{
let link_auth = *LINK_AUTH
.iter()
.filter(|m| auth_challenge_cell.methods().contains(m))
.max()
.ok_or(Error::BadCellAuth)?;
let cid = identities.rsa_id_der_digest;
let sid = verified.rsa_id_digest;
let cid_ed = identities.ed_id_bytes();
let sid_ed = (*verified
.relay_ids()
.ed_identity()
.expect("Verified channel without Ed25519 identity"))
.into();
Ok(Self {
link_auth,
cid,
sid,
cid_ed,
sid_ed,
clog,
slog,
scert: peer_cert_digest,
})
}
pub(crate) fn build_responder<T, S>(
initiator_auth_type: u16,
identities: &Arc<RelayIdentities>,
clog: [u8; 32],
slog: [u8; 32],
verified: &mut VerifiedChannel<T, S>,
our_cert_digest: [u8; 32],
) -> Result<ChannelAuthenticationData>
where
T: AsyncRead + AsyncWrite + CertifiedConn + StreamOps + Send + Unpin + 'static,
S: CoarseTimeProvider + SleepProvider,
{
let link_auth = if LINK_AUTH.contains(&initiator_auth_type) {
initiator_auth_type
} else {
return Err(Error::UnsupportedAuth(initiator_auth_type));
};
let cid = identities.rsa_id_der_digest;
let sid = verified.rsa_id_digest;
let cid_ed = identities.ed_id_bytes();
let sid_ed = (*verified
.relay_ids()
.ed_identity()
.expect("Verified channel without Ed25519 identity"))
.into();
Ok(Self {
link_auth,
cid: sid,
sid: cid,
cid_ed: sid_ed,
sid_ed: cid_ed,
clog,
slog,
scert: our_cert_digest,
})
}
}
pub(crate) fn build_certs_cell(
identities: &Arc<RelayIdentities>,
is_responder: bool,
) -> msg::Certs {
let mut certs = msg::Certs::new_empty();
certs.push_cert_body(
tor_cert::CertType::RSA_ID_X509,
identities.cert_id_x509_rsa.clone(),
);
certs.push_cert(&identities.cert_id_rsa);
certs.push_cert(&identities.cert_id_sign_ed);
if is_responder {
certs.push_cert(&identities.cert_sign_tls_ed);
} else {
certs.push_cert(&identities.cert_sign_link_auth_ed);
}
certs
}
pub(crate) fn build_netinfo_cell<S>(
peer_ip: Option<IpAddr>,
my_addrs: Vec<IpAddr>,
sleep_prov: &S,
) -> Result<msg::Netinfo>
where
S: CoarseTimeProvider + SleepProvider,
{
let timestamp = sleep_prov
.wallclock()
.duration_since(UNIX_EPOCH)
.map_err(|e| internal!("Wallclock may have gone backwards: {e}"))?
.as_secs()
.try_into()
.map_err(|e| internal!("Wallclock secs fail to convert to 32bit: {e}"))?;
Ok(msg::Netinfo::from_relay(timestamp, peer_ip, my_addrs))
}