|
|
|
@ -1,5 +1,5 @@
|
|
|
|
|
/* global log, libloki, textsecure, getStoragePubKey, lokiSnodeAPI, StringView,
|
|
|
|
|
libsignal, window, TextDecoder, TextEncoder, dcodeIO, process */
|
|
|
|
|
libsignal, window, TextDecoder, TextEncoder, dcodeIO, process, crypto */
|
|
|
|
|
|
|
|
|
|
const nodeFetch = require('node-fetch');
|
|
|
|
|
const https = require('https');
|
|
|
|
@ -12,6 +12,9 @@ const snodeHttpsAgent = new https.Agent({
|
|
|
|
|
const LOKI_EPHEMKEY_HEADER = 'X-Loki-EphemKey';
|
|
|
|
|
const endpointBase = '/storage_rpc/v1';
|
|
|
|
|
|
|
|
|
|
// Request index for debugging
|
|
|
|
|
let onionReqIdx = 0;
|
|
|
|
|
|
|
|
|
|
const decryptResponse = async (response, address) => {
|
|
|
|
|
let plaintext = false;
|
|
|
|
|
try {
|
|
|
|
@ -31,8 +34,210 @@ const decryptResponse = async (response, address) => {
|
|
|
|
|
|
|
|
|
|
const timeoutDelay = ms => new Promise(resolve => setTimeout(resolve, ms));
|
|
|
|
|
|
|
|
|
|
const encryptForNode = async (node, payload) => {
|
|
|
|
|
const textEncoder = new TextEncoder();
|
|
|
|
|
const plaintext = textEncoder.encode(payload);
|
|
|
|
|
|
|
|
|
|
const ephemeral = libloki.crypto.generateEphemeralKeyPair();
|
|
|
|
|
|
|
|
|
|
const snPubkey = StringView.hexToArrayBuffer(node.pubkey_x25519);
|
|
|
|
|
|
|
|
|
|
const ephemeralSecret = libsignal.Curve.calculateAgreement(
|
|
|
|
|
snPubkey,
|
|
|
|
|
ephemeral.privKey
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
const salt = window.Signal.Crypto.bytesFromString('LOKI');
|
|
|
|
|
|
|
|
|
|
const key = await crypto.subtle.importKey(
|
|
|
|
|
'raw',
|
|
|
|
|
salt,
|
|
|
|
|
{ name: 'HMAC', hash: { name: 'SHA-256' } },
|
|
|
|
|
false,
|
|
|
|
|
['sign']
|
|
|
|
|
);
|
|
|
|
|
const symmetricKey = await crypto.subtle.sign(
|
|
|
|
|
{ name: 'HMAC', hash: 'SHA-256' },
|
|
|
|
|
key,
|
|
|
|
|
ephemeralSecret
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
const ciphertext = await window.libloki.crypto.EncryptGCM(
|
|
|
|
|
symmetricKey,
|
|
|
|
|
plaintext
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
return { ciphertext, symmetricKey, ephemeral_key: ephemeral.pubKey };
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// Returns the actual ciphertext, symmetric key that will be used
|
|
|
|
|
// for decryption, and an ephemeral_key to send to the next hop
|
|
|
|
|
const encryptForDestination = async (node, payload) => {
|
|
|
|
|
// Do we still need "headers"?
|
|
|
|
|
const reqStr = JSON.stringify({ body: payload, headers: '' });
|
|
|
|
|
|
|
|
|
|
return encryptForNode(node, reqStr);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// `ctx` holds info used by `node` to relay further
|
|
|
|
|
const encryptForRelay = async (node, nextNode, ctx) => {
|
|
|
|
|
const payload = ctx.ciphertext;
|
|
|
|
|
|
|
|
|
|
const reqJson = {
|
|
|
|
|
ciphertext: dcodeIO.ByteBuffer.wrap(payload).toString('base64'),
|
|
|
|
|
ephemeral_key: StringView.arrayBufferToHex(ctx.ephemeral_key),
|
|
|
|
|
destination: nextNode.pubkey_ed25519,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const reqStr = JSON.stringify(reqJson);
|
|
|
|
|
|
|
|
|
|
return encryptForNode(node, reqStr);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const BAD_PATH = 'bad_path';
|
|
|
|
|
|
|
|
|
|
// May return false BAD_PATH, indicating that we should try a new
|
|
|
|
|
const sendOnionRequest = async (reqIdx, nodePath, targetNode, plaintext) => {
|
|
|
|
|
log.info('Sending an onion request');
|
|
|
|
|
|
|
|
|
|
const ctx1 = await encryptForDestination(targetNode, plaintext);
|
|
|
|
|
const ctx2 = await encryptForRelay(nodePath[2], targetNode, ctx1);
|
|
|
|
|
const ctx3 = await encryptForRelay(nodePath[1], nodePath[2], ctx2);
|
|
|
|
|
const ctx4 = await encryptForRelay(nodePath[0], nodePath[1], ctx3);
|
|
|
|
|
|
|
|
|
|
const ciphertextBase64 = dcodeIO.ByteBuffer.wrap(ctx4.ciphertext).toString(
|
|
|
|
|
'base64'
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
const payload = {
|
|
|
|
|
ciphertext: ciphertextBase64,
|
|
|
|
|
ephemeral_key: StringView.arrayBufferToHex(ctx4.ephemeral_key),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const fetchOptions = {
|
|
|
|
|
method: 'POST',
|
|
|
|
|
body: JSON.stringify(payload),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const url = `https://${nodePath[0].ip}:${nodePath[0].port}/onion_req`;
|
|
|
|
|
|
|
|
|
|
// we only proxy to snodes...
|
|
|
|
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
|
|
|
|
|
const response = await nodeFetch(url, fetchOptions);
|
|
|
|
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1';
|
|
|
|
|
|
|
|
|
|
return processOnionResponse(reqIdx, response, ctx1.symmetricKey, true);
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// Process a response as it arrives from `nodeFetch`, handling
|
|
|
|
|
// http errors and attempting to decrypt the body with `sharedKey`
|
|
|
|
|
const processOnionResponse = async (reqIdx, response, sharedKey, useAesGcm) => {
|
|
|
|
|
log.info(`(${reqIdx}) [path] processing onion response`);
|
|
|
|
|
|
|
|
|
|
// detect SNode is not ready (not in swarm; not done syncing)
|
|
|
|
|
if (response.status === 503) {
|
|
|
|
|
log.warn('Got 503: snode not ready');
|
|
|
|
|
|
|
|
|
|
return BAD_PATH;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (response.status === 504) {
|
|
|
|
|
log.warn('Got 504: Gateway timeout');
|
|
|
|
|
return BAD_PATH;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (response.status === 404) {
|
|
|
|
|
// Why would we get this error on testnet?
|
|
|
|
|
log.warn('Got 404: Gateway timeout');
|
|
|
|
|
return BAD_PATH;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (response.status !== 200) {
|
|
|
|
|
log.warn(
|
|
|
|
|
'lokiRpc sendToProxy fetch unhandled error code:',
|
|
|
|
|
response.status
|
|
|
|
|
);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const ciphertext = await response.text();
|
|
|
|
|
if (!ciphertext) {
|
|
|
|
|
log.warn('[path]: Target node return empty ciphertext');
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let plaintext;
|
|
|
|
|
let ciphertextBuffer;
|
|
|
|
|
try {
|
|
|
|
|
ciphertextBuffer = dcodeIO.ByteBuffer.wrap(
|
|
|
|
|
ciphertext,
|
|
|
|
|
'base64'
|
|
|
|
|
).toArrayBuffer();
|
|
|
|
|
|
|
|
|
|
const decryptFn = useAesGcm
|
|
|
|
|
? window.libloki.crypto.DecryptGCM
|
|
|
|
|
: window.libloki.crypto.DHDecrypt;
|
|
|
|
|
|
|
|
|
|
const plaintextBuffer = await decryptFn(sharedKey, ciphertextBuffer);
|
|
|
|
|
|
|
|
|
|
const textDecoder = new TextDecoder();
|
|
|
|
|
plaintext = textDecoder.decode(plaintextBuffer);
|
|
|
|
|
} catch (e) {
|
|
|
|
|
log.error(`(${reqIdx}) lokiRpc sendToProxy decode error`);
|
|
|
|
|
if (ciphertextBuffer) {
|
|
|
|
|
log.error('ciphertextBuffer', ciphertextBuffer);
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
const jsonRes = JSON.parse(plaintext);
|
|
|
|
|
// emulate nodeFetch response...
|
|
|
|
|
jsonRes.json = () => {
|
|
|
|
|
try {
|
|
|
|
|
const res = JSON.parse(jsonRes.body);
|
|
|
|
|
return res;
|
|
|
|
|
} catch (e) {
|
|
|
|
|
log.error(
|
|
|
|
|
`(${reqIdx}) lokiRpc sendToProxy parse error json: `,
|
|
|
|
|
jsonRes.body
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
};
|
|
|
|
|
return jsonRes;
|
|
|
|
|
} catch (e) {
|
|
|
|
|
log.error(
|
|
|
|
|
'lokiRpc sendToProxy parse error',
|
|
|
|
|
e.code,
|
|
|
|
|
e.message,
|
|
|
|
|
`json:`,
|
|
|
|
|
plaintext
|
|
|
|
|
);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const sendToProxy = async (options = {}, targetNode, retryNumber = 0) => {
|
|
|
|
|
const randSnode = await lokiSnodeAPI.getRandomSnodeAddress();
|
|
|
|
|
const _ = window.Lodash;
|
|
|
|
|
|
|
|
|
|
const snodePool = await lokiSnodeAPI.getRandomSnodePool();
|
|
|
|
|
|
|
|
|
|
if (snodePool.length < 2) {
|
|
|
|
|
log.error(
|
|
|
|
|
'Not enough service nodes for a proxy request, only have: ',
|
|
|
|
|
snodePool.length
|
|
|
|
|
);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Making sure the proxy node is not the same as the target node:
|
|
|
|
|
const snodePoolSafe = _.without(
|
|
|
|
|
snodePool,
|
|
|
|
|
_.find(snodePool, { pubkey_ed25519: targetNode.pubkey_ed25519 })
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
const randSnode = window.Lodash.sample(snodePoolSafe);
|
|
|
|
|
|
|
|
|
|
// Don't allow arbitrary URLs, only snodes and loki servers
|
|
|
|
|
const url = `https://${randSnode.ip}:${randSnode.port}/proxy`;
|
|
|
|
@ -262,6 +467,43 @@ const lokiFetch = async (url, options = {}, targetNode = null) => {
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
// Absence of targetNode indicates that we want a direct connection
|
|
|
|
|
// (e.g. to connect to a seed node for the first time)
|
|
|
|
|
if (window.lokiFeatureFlags.useOnionRequests && targetNode) {
|
|
|
|
|
// Loop until the result is not BAD_PATH
|
|
|
|
|
// eslint-disable-next-line no-constant-condition
|
|
|
|
|
while (true) {
|
|
|
|
|
// Get a path excluding `targetNode`:
|
|
|
|
|
// eslint-disable-next-line no-await-in-loop
|
|
|
|
|
const path = await lokiSnodeAPI.getOnionPath(targetNode);
|
|
|
|
|
const thisIdx = onionReqIdx;
|
|
|
|
|
onionReqIdx += 1;
|
|
|
|
|
|
|
|
|
|
log.info(
|
|
|
|
|
`(${thisIdx}) using path ${path[0].ip}:${path[0].port} -> ${
|
|
|
|
|
path[1].ip
|
|
|
|
|
}:${path[1].port} -> ${path[2].ip}:${path[2].port} => ${
|
|
|
|
|
targetNode.ip
|
|
|
|
|
}:${targetNode.port}`
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
// eslint-disable-next-line no-await-in-loop
|
|
|
|
|
const result = await sendOnionRequest(
|
|
|
|
|
thisIdx,
|
|
|
|
|
path,
|
|
|
|
|
targetNode,
|
|
|
|
|
fetchOptions.body
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
if (result === BAD_PATH) {
|
|
|
|
|
log.error('[path] Error on the path');
|
|
|
|
|
lokiSnodeAPI.markPathAsBad(path);
|
|
|
|
|
} else {
|
|
|
|
|
return result ? result.json() : false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (window.lokiFeatureFlags.useSnodeProxy && targetNode) {
|
|
|
|
|
const result = await sendToProxy(fetchOptions, targetNode);
|
|
|
|
|
// if not result, maybe we should throw??
|
|
|
|
@ -332,6 +574,7 @@ const lokiFetch = async (url, options = {}, targetNode = null) => {
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// Wrapper for a JSON RPC request
|
|
|
|
|
// Annoyngly, this is used for Lokid requests too
|
|
|
|
|
const lokiRpc = (
|
|
|
|
|
address,
|
|
|
|
|
port,
|
|
|
|
|