2019-08-17 01:38:50 +08:00
|
|
|
from libp2p.crypto.keys import PublicKey
|
2019-08-08 14:24:54 +08:00
|
|
|
from libp2p.network.connection.raw_connection_interface import IRawConnection
|
|
|
|
from libp2p.peer.id import ID
|
2019-08-03 07:50:44 +08:00
|
|
|
from libp2p.security.base_session import BaseSession
|
|
|
|
from libp2p.security.base_transport import BaseSecureTransport
|
2019-08-03 13:36:19 +08:00
|
|
|
from libp2p.security.secure_conn_interface import ISecureConn
|
2019-08-20 16:42:34 +08:00
|
|
|
from libp2p.transport.exceptions import SecurityUpgradeFailure
|
2019-08-20 11:02:21 +08:00
|
|
|
from libp2p.typing import TProtocol
|
2019-08-17 21:41:17 +08:00
|
|
|
from libp2p.utils import encode_fixedint_prefixed, read_fixedint_prefixed
|
2019-08-20 11:02:21 +08:00
|
|
|
|
2019-08-17 01:38:50 +08:00
|
|
|
from .pb import plaintext_pb2
|
|
|
|
|
|
|
|
# Reference: https://github.com/libp2p/go-libp2p-core/blob/master/sec/insecure/insecure.go
|
|
|
|
|
|
|
|
|
|
|
|
PLAINTEXT_PROTOCOL_ID = TProtocol("/plaintext/2.0.0")
|
2019-08-01 19:12:11 +08:00
|
|
|
|
2019-04-30 15:09:05 +08:00
|
|
|
|
2019-08-03 07:50:44 +08:00
|
|
|
class InsecureSession(BaseSession):
|
2019-08-17 01:38:50 +08:00
|
|
|
async def run_handshake(self):
|
|
|
|
msg = make_exchange_message(self.local_private_key.get_public_key())
|
2019-08-17 21:41:17 +08:00
|
|
|
msg_bytes = msg.SerializeToString()
|
|
|
|
encoded_msg_bytes = encode_fixedint_prefixed(msg_bytes)
|
2019-08-20 17:09:38 +08:00
|
|
|
await self.write(encoded_msg_bytes)
|
2019-08-17 01:38:50 +08:00
|
|
|
|
2019-08-20 18:09:36 +08:00
|
|
|
msg_bytes_other_side = await read_fixedint_prefixed(self.conn)
|
2019-08-17 01:38:50 +08:00
|
|
|
msg_other_side = plaintext_pb2.Exchange()
|
|
|
|
msg_other_side.ParseFromString(msg_bytes_other_side)
|
2019-08-17 21:41:17 +08:00
|
|
|
|
2019-08-17 01:38:50 +08:00
|
|
|
# TODO: Verify public key with peer id
|
|
|
|
# TODO: Store public key
|
|
|
|
self.remote_peer_id = ID(msg_other_side.id)
|
2019-08-03 07:50:44 +08:00
|
|
|
|
|
|
|
|
|
|
|
class InsecureTransport(BaseSecureTransport):
|
2019-08-03 03:07:35 +08:00
|
|
|
"""
|
|
|
|
``InsecureTransport`` provides the "identity" upgrader for a ``IRawConnection``,
|
|
|
|
i.e. the upgraded transport does not add any additional security.
|
|
|
|
"""
|
|
|
|
|
2019-08-08 14:22:06 +08:00
|
|
|
async def secure_inbound(self, conn: IRawConnection) -> ISecureConn:
|
2019-04-30 15:09:05 +08:00
|
|
|
"""
|
|
|
|
Secure the connection, either locally or by communicating with opposing node via conn,
|
|
|
|
for an inbound connection (i.e. we are not the initiator)
|
|
|
|
:return: secure connection object (that implements secure_conn_interface)
|
|
|
|
"""
|
2019-08-17 01:38:50 +08:00
|
|
|
session = InsecureSession(self, conn, ID(b""))
|
|
|
|
await session.run_handshake()
|
|
|
|
return session
|
2019-04-30 15:09:05 +08:00
|
|
|
|
2019-08-08 14:22:06 +08:00
|
|
|
async def secure_outbound(self, conn: IRawConnection, peer_id: ID) -> ISecureConn:
|
2019-04-30 15:09:05 +08:00
|
|
|
"""
|
|
|
|
Secure the connection, either locally or by communicating with opposing node via conn,
|
|
|
|
for an inbound connection (i.e. we are the initiator)
|
|
|
|
:return: secure connection object (that implements secure_conn_interface)
|
|
|
|
"""
|
2019-08-17 01:38:50 +08:00
|
|
|
session = InsecureSession(self, conn, peer_id)
|
|
|
|
await session.run_handshake()
|
|
|
|
# TODO: Check if `remote_public_key is not None`. If so, check if `session.remote_peer`
|
|
|
|
received_peer_id = session.get_remote_peer()
|
2019-08-20 16:00:27 +08:00
|
|
|
if received_peer_id != peer_id:
|
2019-08-20 16:42:34 +08:00
|
|
|
raise SecurityUpgradeFailure(
|
2019-08-17 01:38:50 +08:00
|
|
|
"remote peer sent unexpected peer ID. "
|
|
|
|
f"expected={peer_id} received={received_peer_id}"
|
|
|
|
)
|
|
|
|
return session
|
|
|
|
|
|
|
|
|
|
|
|
def make_exchange_message(pubkey: PublicKey) -> plaintext_pb2.Exchange:
|
|
|
|
pubkey_pb = pubkey.serialize_to_protobuf()
|
|
|
|
id_bytes = ID.from_pubkey(pubkey).to_bytes()
|
|
|
|
return plaintext_pb2.Exchange(id=id_bytes, pubkey=pubkey_pb)
|