2013-08-17 08:02:53 +08:00
Encryption library used: http://nacl.cr.yp.to/
When running the program for the first time the crypto_box_keypair() function is used to
generate the users public-private key pair. (32 bytes each)
The generated public key is set as the client_id of the peer.
Adding a friend
---------------
2015-09-02 06:03:51 +08:00
Alice adds Bob to her friend list by adding his 32 byte public key (client_id) to her friend list.
2013-08-17 08:02:53 +08:00
2 cases:
2015-09-02 03:46:08 +08:00
case 1: Alice adds the public key of Bob, then Bob waits for Alice to attempt to connect to him.
2015-09-02 06:03:51 +08:00
case 2: Bob and Alice add their respective public keys to their friend lists at the same time.
2013-08-17 08:02:53 +08:00
case 1:
2015-09-02 03:42:20 +08:00
Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so:
2013-08-17 08:02:53 +08:00
```
[char with a value of 32][nospam number (4 bytes)][Message]
```
2015-09-02 03:42:20 +08:00
Ex message: hello Bob it's me Alice -_- add me pl0x.
2013-08-17 08:02:53 +08:00
2014-06-07 11:05:35 +08:00
For more info on the nospam see: Spam_Prevention.txt
2013-08-17 08:02:53 +08:00
Bob receives the request and decrypts the message using the function crypto_box_open()
If the message decrypts successfully:
2015-09-02 06:03:51 +08:00
If Alice is already in Bob's friend list: case 2
If Alice is not in Bob's friend list and the nospam is good: Bob is prompt to add Alice and is shown the message from her.
If Bob accepts Alice friend request he adds her public key to his friend list.
2013-08-17 08:02:53 +08:00
case 2:
2015-09-02 06:03:51 +08:00
Bob and Alice both have the others public key in their friend list, they are ready for the next step: Connecting to an already added friend
2013-08-17 08:02:53 +08:00
In the next step only crypto_box() is used for encryption and only crypto_box_open() for decryption (just like in the last step.)
Connecting to an already added friend
-------------------------------------
2014-06-07 11:05:35 +08:00
see: Tox_middle_level_network_protocol.txt
2013-08-17 08:02:53 +08:00
Crypto request packets
--------------------------------------
```
2015-09-02 03:42:20 +08:00
[char with a value of 32][Bob (The reciever's) Public key (client_id) (32 bytes))][Alice's (The sender's) Public key (client_id) (32 bytes)][Random nonce (24 bytes)][Encrypted message]
2013-08-17 08:02:53 +08:00
```
2015-09-02 03:42:20 +08:00
The encrypted message is encrypted with crypto_box() (using Bob's public key, Alice's private key and the nonce (randomly generated 24 bytes)) and is a message from Alice in which she tells Bob who she is.
2013-08-17 08:02:53 +08:00
2014-04-17 00:08:44 +08:00
Each node can route the request to the receiver if they are connected to him. This is to bypass bad NATs.