2019-01-02 00:55:51 +00:00
|
|
|
/* SPDX-License-Identifier: MIT
|
2018-05-03 13:04:00 +00:00
|
|
|
*
|
2019-01-02 00:55:51 +00:00
|
|
|
* Copyright (C) 2017-2019 WireGuard LLC. All Rights Reserved.
|
2018-05-03 13:04:00 +00:00
|
|
|
*/
|
|
|
|
|
2019-03-03 03:04:41 +00:00
|
|
|
package device
|
2017-06-23 11:41:59 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
2019-05-14 07:09:52 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2017-06-23 11:41:59 +00:00
|
|
|
"golang.org/x/crypto/blake2s"
|
|
|
|
"golang.org/x/crypto/chacha20poly1305"
|
|
|
|
"golang.org/x/crypto/poly1305"
|
2019-02-22 19:59:43 +00:00
|
|
|
"golang.zx2c4.com/wireguard/tai64n"
|
2017-06-23 11:41:59 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2017-06-26 11:14:02 +00:00
|
|
|
HandshakeZeroed = iota
|
|
|
|
HandshakeInitiationCreated
|
|
|
|
HandshakeInitiationConsumed
|
2017-06-23 11:41:59 +00:00
|
|
|
HandshakeResponseCreated
|
2017-06-24 20:03:52 +00:00
|
|
|
HandshakeResponseConsumed
|
2017-06-23 11:41:59 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
NoiseConstruction = "Noise_IKpsk2_25519_ChaChaPoly_BLAKE2s"
|
|
|
|
WGIdentifier = "WireGuard v1 zx2c4 Jason@zx2c4.com"
|
|
|
|
WGLabelMAC1 = "mac1----"
|
|
|
|
WGLabelCookie = "cookie--"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2017-06-27 15:33:06 +00:00
|
|
|
MessageInitiationType = 1
|
|
|
|
MessageResponseType = 2
|
|
|
|
MessageCookieReplyType = 3
|
|
|
|
MessageTransportType = 4
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2017-08-25 12:53:23 +00:00
|
|
|
MessageInitiationSize = 148 // size of handshake initation message
|
|
|
|
MessageResponseSize = 92 // size of response message
|
|
|
|
MessageCookieReplySize = 64 // size of cookie reply message
|
|
|
|
MessageTransportHeaderSize = 16 // size of data preceeding content in transport message
|
2017-07-02 13:28:38 +00:00
|
|
|
MessageTransportSize = MessageTransportHeaderSize + poly1305.TagSize // size of empty transport
|
2017-08-25 12:53:23 +00:00
|
|
|
MessageKeepaliveSize = MessageTransportSize // size of keepalive
|
|
|
|
MessageHandshakeSize = MessageInitiationSize // size of largest handshake releated message
|
2017-07-01 21:29:22 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
MessageTransportOffsetReceiver = 4
|
|
|
|
MessageTransportOffsetCounter = 8
|
|
|
|
MessageTransportOffsetContent = 16
|
2017-06-23 11:41:59 +00:00
|
|
|
)
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
/* Type is an 8-bit field, followed by 3 nul bytes,
|
|
|
|
* by marshalling the messages in little-endian byteorder
|
2017-06-27 15:33:06 +00:00
|
|
|
* we can treat these as a 32-bit unsigned int (for now)
|
2017-06-26 11:14:02 +00:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
type MessageInitiation struct {
|
2017-06-23 11:41:59 +00:00
|
|
|
Type uint32
|
|
|
|
Sender uint32
|
|
|
|
Ephemeral NoisePublicKey
|
|
|
|
Static [NoisePublicKeySize + poly1305.TagSize]byte
|
2018-02-12 21:29:11 +00:00
|
|
|
Timestamp [tai64n.TimestampSize + poly1305.TagSize]byte
|
2017-07-06 14:24:24 +00:00
|
|
|
MAC1 [blake2s.Size128]byte
|
|
|
|
MAC2 [blake2s.Size128]byte
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type MessageResponse struct {
|
|
|
|
Type uint32
|
|
|
|
Sender uint32
|
2017-07-01 21:29:22 +00:00
|
|
|
Receiver uint32
|
2017-06-23 11:41:59 +00:00
|
|
|
Ephemeral NoisePublicKey
|
|
|
|
Empty [poly1305.TagSize]byte
|
2017-07-06 14:24:24 +00:00
|
|
|
MAC1 [blake2s.Size128]byte
|
|
|
|
MAC2 [blake2s.Size128]byte
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type MessageTransport struct {
|
|
|
|
Type uint32
|
2017-07-01 21:29:22 +00:00
|
|
|
Receiver uint32
|
2017-06-23 11:41:59 +00:00
|
|
|
Counter uint64
|
|
|
|
Content []byte
|
|
|
|
}
|
|
|
|
|
2017-06-27 15:33:06 +00:00
|
|
|
type MessageCookieReply struct {
|
|
|
|
Type uint32
|
|
|
|
Receiver uint32
|
2018-12-10 03:23:17 +00:00
|
|
|
Nonce [chacha20poly1305.NonceSizeX]byte
|
2017-06-27 15:33:06 +00:00
|
|
|
Cookie [blake2s.Size128 + poly1305.TagSize]byte
|
|
|
|
}
|
|
|
|
|
2017-06-23 11:41:59 +00:00
|
|
|
type Handshake struct {
|
2017-08-14 15:09:25 +00:00
|
|
|
state int
|
|
|
|
mutex sync.RWMutex
|
|
|
|
hash [blake2s.Size]byte // hash value
|
|
|
|
chainKey [blake2s.Size]byte // chain key
|
|
|
|
presharedKey NoiseSymmetricKey // psk
|
|
|
|
localEphemeral NoisePrivateKey // ephemeral secret key
|
|
|
|
localIndex uint32 // used to clear hash-table
|
|
|
|
remoteIndex uint32 // index for sending
|
|
|
|
remoteStatic NoisePublicKey // long term key
|
|
|
|
remoteEphemeral NoisePublicKey // ephemeral public key
|
|
|
|
precomputedStaticStatic [NoisePublicKeySize]byte // precomputed shared secret
|
2018-02-12 21:29:11 +00:00
|
|
|
lastTimestamp tai64n.Timestamp
|
2017-08-14 15:09:25 +00:00
|
|
|
lastInitiationConsumption time.Time
|
2018-05-13 21:14:43 +00:00
|
|
|
lastSentHandshake time.Time
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
2017-06-30 12:41:08 +00:00
|
|
|
InitialChainKey [blake2s.Size]byte
|
|
|
|
InitialHash [blake2s.Size]byte
|
|
|
|
ZeroNonce [chacha20poly1305.NonceSize]byte
|
2017-06-23 11:41:59 +00:00
|
|
|
)
|
|
|
|
|
2017-09-01 12:21:53 +00:00
|
|
|
func mixKey(dst *[blake2s.Size]byte, c *[blake2s.Size]byte, data []byte) {
|
|
|
|
KDF1(dst, c[:], data)
|
2017-06-24 20:03:52 +00:00
|
|
|
}
|
|
|
|
|
2017-09-01 12:21:53 +00:00
|
|
|
func mixHash(dst *[blake2s.Size]byte, h *[blake2s.Size]byte, data []byte) {
|
2018-05-14 10:27:29 +00:00
|
|
|
hash, _ := blake2s.New256(nil)
|
|
|
|
hash.Write(h[:])
|
|
|
|
hash.Write(data)
|
|
|
|
hash.Sum(dst[:0])
|
|
|
|
hash.Reset()
|
2017-06-24 20:03:52 +00:00
|
|
|
}
|
|
|
|
|
2018-02-02 16:24:29 +00:00
|
|
|
func (h *Handshake) Clear() {
|
|
|
|
setZero(h.localEphemeral[:])
|
|
|
|
setZero(h.remoteEphemeral[:])
|
|
|
|
setZero(h.chainKey[:])
|
|
|
|
setZero(h.hash[:])
|
|
|
|
h.localIndex = 0
|
|
|
|
h.state = HandshakeZeroed
|
|
|
|
}
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
func (h *Handshake) mixHash(data []byte) {
|
2017-09-01 12:21:53 +00:00
|
|
|
mixHash(&h.hash, &h.hash, data)
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
func (h *Handshake) mixKey(data []byte) {
|
2017-09-01 12:21:53 +00:00
|
|
|
mixKey(&h.chainKey, &h.chainKey, data)
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
/* Do basic precomputations
|
|
|
|
*/
|
|
|
|
func init() {
|
|
|
|
InitialChainKey = blake2s.Sum256([]byte(NoiseConstruction))
|
2017-09-01 12:21:53 +00:00
|
|
|
mixHash(&InitialHash, &InitialChainKey, []byte(WGIdentifier))
|
2017-06-30 12:41:08 +00:00
|
|
|
}
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
func (device *Device) CreateMessageInitiation(peer *Peer) (*MessageInitiation, error) {
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2019-01-03 18:04:00 +00:00
|
|
|
device.staticIdentity.RLock()
|
|
|
|
defer device.staticIdentity.RUnlock()
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
|
|
|
defer handshake.mutex.Unlock()
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2017-08-04 14:15:53 +00:00
|
|
|
if isZero(handshake.precomputedStaticStatic[:]) {
|
2018-05-13 16:23:40 +00:00
|
|
|
return nil, errors.New("static shared secret is zero")
|
2017-08-04 14:15:53 +00:00
|
|
|
}
|
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
// create ephemeral key
|
2017-06-23 11:41:59 +00:00
|
|
|
|
|
|
|
var err error
|
2017-06-30 12:41:08 +00:00
|
|
|
handshake.hash = InitialHash
|
|
|
|
handshake.chainKey = InitialChainKey
|
2017-06-24 13:34:17 +00:00
|
|
|
handshake.localEphemeral, err = newPrivateKey()
|
2017-06-23 11:41:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
// assign index
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2018-05-13 16:23:40 +00:00
|
|
|
device.indexTable.Delete(handshake.localIndex)
|
|
|
|
handshake.localIndex, err = device.indexTable.NewIndexForHandshake(peer, handshake)
|
2017-06-24 13:34:17 +00:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
handshake.mixHash(handshake.remoteStatic[:])
|
|
|
|
|
|
|
|
msg := MessageInitiation{
|
|
|
|
Type: MessageInitiationType,
|
|
|
|
Ephemeral: handshake.localEphemeral.publicKey(),
|
|
|
|
Sender: handshake.localIndex,
|
|
|
|
}
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixKey(msg.Ephemeral[:])
|
|
|
|
handshake.mixHash(msg.Ephemeral[:])
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
// encrypt static key
|
2017-06-23 11:41:59 +00:00
|
|
|
|
|
|
|
func() {
|
|
|
|
var key [chacha20poly1305.KeySize]byte
|
2017-06-24 13:34:17 +00:00
|
|
|
ss := handshake.localEphemeral.sharedSecret(handshake.remoteStatic)
|
2017-09-01 12:21:53 +00:00
|
|
|
KDF2(
|
|
|
|
&handshake.chainKey,
|
|
|
|
&key,
|
|
|
|
handshake.chainKey[:],
|
|
|
|
ss[:],
|
|
|
|
)
|
2017-06-23 11:41:59 +00:00
|
|
|
aead, _ := chacha20poly1305.New(key[:])
|
2018-05-13 21:14:43 +00:00
|
|
|
aead.Seal(msg.Static[:0], ZeroNonce[:], device.staticIdentity.publicKey[:], handshake.hash[:])
|
2017-06-23 11:41:59 +00:00
|
|
|
}()
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixHash(msg.Static[:])
|
2017-06-23 11:41:59 +00:00
|
|
|
|
|
|
|
// encrypt timestamp
|
|
|
|
|
2018-02-12 21:29:11 +00:00
|
|
|
timestamp := tai64n.Now()
|
2017-06-23 11:41:59 +00:00
|
|
|
func() {
|
|
|
|
var key [chacha20poly1305.KeySize]byte
|
2017-09-01 12:21:53 +00:00
|
|
|
KDF2(
|
|
|
|
&handshake.chainKey,
|
|
|
|
&key,
|
2017-06-24 13:34:17 +00:00
|
|
|
handshake.chainKey[:],
|
|
|
|
handshake.precomputedStaticStatic[:],
|
|
|
|
)
|
2017-06-23 11:41:59 +00:00
|
|
|
aead, _ := chacha20poly1305.New(key[:])
|
2017-06-24 13:34:17 +00:00
|
|
|
aead.Seal(msg.Timestamp[:0], ZeroNonce[:], timestamp[:], handshake.hash[:])
|
2017-06-23 11:41:59 +00:00
|
|
|
}()
|
2017-06-24 13:34:17 +00:00
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixHash(msg.Timestamp[:])
|
|
|
|
handshake.state = HandshakeInitiationCreated
|
2017-06-23 11:41:59 +00:00
|
|
|
return &msg, nil
|
|
|
|
}
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
func (device *Device) ConsumeMessageInitiation(msg *MessageInitiation) *Peer {
|
2017-09-01 12:21:53 +00:00
|
|
|
var (
|
|
|
|
hash [blake2s.Size]byte
|
|
|
|
chainKey [blake2s.Size]byte
|
|
|
|
)
|
|
|
|
|
2018-02-02 15:40:14 +00:00
|
|
|
if msg.Type != MessageInitiationType {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-01-03 18:04:00 +00:00
|
|
|
device.staticIdentity.RLock()
|
|
|
|
defer device.staticIdentity.RUnlock()
|
2018-02-02 15:40:14 +00:00
|
|
|
|
2018-05-13 21:14:43 +00:00
|
|
|
mixHash(&hash, &InitialHash, device.staticIdentity.publicKey[:])
|
2017-09-01 12:21:53 +00:00
|
|
|
mixHash(&hash, &hash, msg.Ephemeral[:])
|
|
|
|
mixKey(&chainKey, &InitialChainKey, msg.Ephemeral[:])
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
// decrypt static key
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
var err error
|
|
|
|
var peerPK NoisePublicKey
|
|
|
|
func() {
|
|
|
|
var key [chacha20poly1305.KeySize]byte
|
2018-05-13 21:14:43 +00:00
|
|
|
ss := device.staticIdentity.privateKey.sharedSecret(msg.Ephemeral)
|
2017-09-01 12:21:53 +00:00
|
|
|
KDF2(&chainKey, &key, chainKey[:], ss[:])
|
2017-06-24 13:34:17 +00:00
|
|
|
aead, _ := chacha20poly1305.New(key[:])
|
|
|
|
_, err = aead.Open(peerPK[:0], ZeroNonce[:], msg.Static[:], hash[:])
|
|
|
|
}()
|
2017-06-23 11:41:59 +00:00
|
|
|
if err != nil {
|
2017-06-24 13:34:17 +00:00
|
|
|
return nil
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
2017-09-01 12:21:53 +00:00
|
|
|
mixHash(&hash, &hash, msg.Static[:])
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
// lookup peer
|
2017-06-24 13:34:17 +00:00
|
|
|
|
|
|
|
peer := device.LookupPeer(peerPK)
|
|
|
|
if peer == nil {
|
|
|
|
return nil
|
|
|
|
}
|
2017-08-04 14:15:53 +00:00
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
handshake := &peer.handshake
|
2017-08-04 14:15:53 +00:00
|
|
|
if isZero(handshake.precomputedStaticStatic[:]) {
|
|
|
|
return nil
|
|
|
|
}
|
2017-06-24 13:34:17 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
// verify identity
|
2017-06-24 13:34:17 +00:00
|
|
|
|
2018-02-12 21:29:11 +00:00
|
|
|
var timestamp tai64n.Timestamp
|
2017-08-14 15:09:25 +00:00
|
|
|
var key [chacha20poly1305.KeySize]byte
|
2017-06-28 21:45:45 +00:00
|
|
|
|
2017-08-14 15:09:25 +00:00
|
|
|
handshake.mutex.RLock()
|
2017-09-01 12:21:53 +00:00
|
|
|
KDF2(
|
|
|
|
&chainKey,
|
|
|
|
&key,
|
2017-08-14 15:09:25 +00:00
|
|
|
chainKey[:],
|
|
|
|
handshake.precomputedStaticStatic[:],
|
|
|
|
)
|
|
|
|
aead, _ := chacha20poly1305.New(key[:])
|
|
|
|
_, err = aead.Open(timestamp[:0], ZeroNonce[:], msg.Timestamp[:], hash[:])
|
|
|
|
if err != nil {
|
|
|
|
handshake.mutex.RUnlock()
|
|
|
|
return nil
|
|
|
|
}
|
2017-09-01 12:21:53 +00:00
|
|
|
mixHash(&hash, &hash, msg.Timestamp[:])
|
2017-06-28 21:45:45 +00:00
|
|
|
|
2017-08-14 15:09:25 +00:00
|
|
|
// protect against replay & flood
|
2017-06-28 21:45:45 +00:00
|
|
|
|
2017-08-14 15:09:25 +00:00
|
|
|
var ok bool
|
|
|
|
ok = timestamp.After(handshake.lastTimestamp)
|
2019-06-03 19:46:46 +00:00
|
|
|
ok = ok && time.Since(handshake.lastInitiationConsumption) > HandshakeInitationRate
|
2017-08-14 15:09:25 +00:00
|
|
|
handshake.mutex.RUnlock()
|
2017-06-28 21:45:45 +00:00
|
|
|
if !ok {
|
2017-06-24 13:34:17 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// update handshake state
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
handshake.mutex.Lock()
|
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
handshake.hash = hash
|
|
|
|
handshake.chainKey = chainKey
|
|
|
|
handshake.remoteIndex = msg.Sender
|
|
|
|
handshake.remoteEphemeral = msg.Ephemeral
|
2019-10-17 13:43:06 +00:00
|
|
|
if timestamp.After(handshake.lastTimestamp) {
|
|
|
|
handshake.lastTimestamp = timestamp
|
|
|
|
}
|
|
|
|
now := time.Now()
|
|
|
|
if now.After(handshake.lastInitiationConsumption) {
|
|
|
|
handshake.lastInitiationConsumption = now
|
|
|
|
}
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.state = HandshakeInitiationConsumed
|
2017-06-28 21:45:45 +00:00
|
|
|
|
|
|
|
handshake.mutex.Unlock()
|
|
|
|
|
2018-05-13 17:50:58 +00:00
|
|
|
setZero(hash[:])
|
|
|
|
setZero(chainKey[:])
|
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
return peer
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
func (device *Device) CreateMessageResponse(peer *Peer) (*MessageResponse, error) {
|
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
|
|
|
defer handshake.mutex.Unlock()
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
if handshake.state != HandshakeInitiationConsumed {
|
2018-05-13 16:23:40 +00:00
|
|
|
return nil, errors.New("handshake initiation must be consumed first")
|
2017-06-24 13:34:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// assign index
|
|
|
|
|
|
|
|
var err error
|
2018-05-13 16:23:40 +00:00
|
|
|
device.indexTable.Delete(handshake.localIndex)
|
|
|
|
handshake.localIndex, err = device.indexTable.NewIndexForHandshake(peer, handshake)
|
2017-06-24 13:34:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-06-23 11:41:59 +00:00
|
|
|
|
2017-06-24 20:03:52 +00:00
|
|
|
var msg MessageResponse
|
|
|
|
msg.Type = MessageResponseType
|
|
|
|
msg.Sender = handshake.localIndex
|
2017-07-01 21:29:22 +00:00
|
|
|
msg.Receiver = handshake.remoteIndex
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
// create ephemeral key
|
|
|
|
|
|
|
|
handshake.localEphemeral, err = newPrivateKey()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
msg.Ephemeral = handshake.localEphemeral.publicKey()
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixHash(msg.Ephemeral[:])
|
2017-07-01 21:29:22 +00:00
|
|
|
handshake.mixKey(msg.Ephemeral[:])
|
2017-06-24 13:34:17 +00:00
|
|
|
|
|
|
|
func() {
|
|
|
|
ss := handshake.localEphemeral.sharedSecret(handshake.remoteEphemeral)
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixKey(ss[:])
|
2017-06-24 13:34:17 +00:00
|
|
|
ss = handshake.localEphemeral.sharedSecret(handshake.remoteStatic)
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixKey(ss[:])
|
2017-06-24 13:34:17 +00:00
|
|
|
}()
|
|
|
|
|
2018-05-13 17:50:58 +00:00
|
|
|
// add preshared key
|
2017-06-24 13:34:17 +00:00
|
|
|
|
|
|
|
var tau [blake2s.Size]byte
|
|
|
|
var key [chacha20poly1305.KeySize]byte
|
2017-09-01 12:21:53 +00:00
|
|
|
|
|
|
|
KDF3(
|
|
|
|
&handshake.chainKey,
|
|
|
|
&tau,
|
|
|
|
&key,
|
|
|
|
handshake.chainKey[:],
|
|
|
|
handshake.presharedKey[:],
|
|
|
|
)
|
|
|
|
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixHash(tau[:])
|
2017-06-24 13:34:17 +00:00
|
|
|
|
|
|
|
func() {
|
|
|
|
aead, _ := chacha20poly1305.New(key[:])
|
2017-06-24 20:03:52 +00:00
|
|
|
aead.Seal(msg.Empty[:0], ZeroNonce[:], nil, handshake.hash[:])
|
2017-06-26 11:14:02 +00:00
|
|
|
handshake.mixHash(msg.Empty[:])
|
2017-06-24 13:34:17 +00:00
|
|
|
}()
|
|
|
|
|
2017-06-24 20:03:52 +00:00
|
|
|
handshake.state = HandshakeResponseCreated
|
2017-09-01 12:21:53 +00:00
|
|
|
|
2017-06-24 13:34:17 +00:00
|
|
|
return &msg, nil
|
2017-06-23 11:41:59 +00:00
|
|
|
}
|
2017-06-24 20:03:52 +00:00
|
|
|
|
|
|
|
func (device *Device) ConsumeMessageResponse(msg *MessageResponse) *Peer {
|
|
|
|
if msg.Type != MessageResponseType {
|
2017-06-26 11:14:02 +00:00
|
|
|
return nil
|
2017-06-24 20:03:52 +00:00
|
|
|
}
|
|
|
|
|
2018-05-13 16:23:40 +00:00
|
|
|
// lookup handshake by receiver
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2018-05-13 16:23:40 +00:00
|
|
|
lookup := device.indexTable.Lookup(msg.Receiver)
|
2017-06-26 20:07:29 +00:00
|
|
|
handshake := lookup.handshake
|
|
|
|
if handshake == nil {
|
2017-06-24 20:03:52 +00:00
|
|
|
return nil
|
|
|
|
}
|
2017-06-26 20:07:29 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
var (
|
|
|
|
hash [blake2s.Size]byte
|
|
|
|
chainKey [blake2s.Size]byte
|
|
|
|
)
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
ok := func() bool {
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2018-02-02 16:24:29 +00:00
|
|
|
// lock handshake state
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
handshake.mutex.RLock()
|
|
|
|
defer handshake.mutex.RUnlock()
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
if handshake.state != HandshakeInitiationCreated {
|
|
|
|
return false
|
|
|
|
}
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2018-02-02 16:24:29 +00:00
|
|
|
// lock private key for reading
|
|
|
|
|
2019-01-03 18:04:00 +00:00
|
|
|
device.staticIdentity.RLock()
|
|
|
|
defer device.staticIdentity.RUnlock()
|
2018-02-02 16:24:29 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
// finish 3-way DH
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-09-01 12:21:53 +00:00
|
|
|
mixHash(&hash, &handshake.hash, msg.Ephemeral[:])
|
|
|
|
mixKey(&chainKey, &handshake.chainKey, msg.Ephemeral[:])
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
func() {
|
|
|
|
ss := handshake.localEphemeral.sharedSecret(msg.Ephemeral)
|
2017-09-01 12:21:53 +00:00
|
|
|
mixKey(&chainKey, &chainKey, ss[:])
|
|
|
|
setZero(ss[:])
|
|
|
|
}()
|
|
|
|
|
|
|
|
func() {
|
2018-05-13 21:14:43 +00:00
|
|
|
ss := device.staticIdentity.privateKey.sharedSecret(msg.Ephemeral)
|
2017-09-01 12:21:53 +00:00
|
|
|
mixKey(&chainKey, &chainKey, ss[:])
|
|
|
|
setZero(ss[:])
|
2017-06-28 21:45:45 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
// add preshared key (psk)
|
|
|
|
|
|
|
|
var tau [blake2s.Size]byte
|
|
|
|
var key [chacha20poly1305.KeySize]byte
|
2017-09-01 12:21:53 +00:00
|
|
|
KDF3(
|
|
|
|
&chainKey,
|
|
|
|
&tau,
|
|
|
|
&key,
|
|
|
|
chainKey[:],
|
|
|
|
handshake.presharedKey[:],
|
|
|
|
)
|
|
|
|
mixHash(&hash, &hash, tau[:])
|
2017-06-28 21:45:45 +00:00
|
|
|
|
2018-02-02 16:24:29 +00:00
|
|
|
// authenticate transcript
|
2017-06-28 21:45:45 +00:00
|
|
|
|
|
|
|
aead, _ := chacha20poly1305.New(key[:])
|
|
|
|
_, err := aead.Open(nil, ZeroNonce[:], msg.Empty[:], hash[:])
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
2017-09-01 12:21:53 +00:00
|
|
|
mixHash(&hash, &hash, msg.Empty[:])
|
2017-06-28 21:45:45 +00:00
|
|
|
return true
|
|
|
|
}()
|
|
|
|
|
|
|
|
if !ok {
|
2017-06-24 20:03:52 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// update handshake state
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
handshake.mutex.Lock()
|
|
|
|
|
2017-06-24 20:03:52 +00:00
|
|
|
handshake.hash = hash
|
|
|
|
handshake.chainKey = chainKey
|
|
|
|
handshake.remoteIndex = msg.Sender
|
|
|
|
handshake.state = HandshakeResponseConsumed
|
|
|
|
|
2017-06-28 21:45:45 +00:00
|
|
|
handshake.mutex.Unlock()
|
|
|
|
|
2017-09-01 12:21:53 +00:00
|
|
|
setZero(hash[:])
|
|
|
|
setZero(chainKey[:])
|
|
|
|
|
2017-06-26 20:07:29 +00:00
|
|
|
return lookup.peer
|
2017-06-24 20:03:52 +00:00
|
|
|
}
|
|
|
|
|
2018-05-13 17:50:58 +00:00
|
|
|
/* Derives a new keypair from the current handshake state
|
2017-07-10 10:09:19 +00:00
|
|
|
*
|
|
|
|
*/
|
2018-05-13 21:14:43 +00:00
|
|
|
func (peer *Peer) BeginSymmetricSession() error {
|
2017-09-01 12:21:53 +00:00
|
|
|
device := peer.device
|
2017-06-24 20:03:52 +00:00
|
|
|
handshake := &peer.handshake
|
|
|
|
handshake.mutex.Lock()
|
|
|
|
defer handshake.mutex.Unlock()
|
|
|
|
|
|
|
|
// derive keys
|
|
|
|
|
2017-06-26 20:07:29 +00:00
|
|
|
var isInitiator bool
|
2017-06-24 20:03:52 +00:00
|
|
|
var sendKey [chacha20poly1305.KeySize]byte
|
|
|
|
var recvKey [chacha20poly1305.KeySize]byte
|
|
|
|
|
|
|
|
if handshake.state == HandshakeResponseConsumed {
|
2017-09-01 12:21:53 +00:00
|
|
|
KDF2(
|
|
|
|
&sendKey,
|
|
|
|
&recvKey,
|
|
|
|
handshake.chainKey[:],
|
|
|
|
nil,
|
|
|
|
)
|
2017-06-26 20:07:29 +00:00
|
|
|
isInitiator = true
|
2017-06-24 20:03:52 +00:00
|
|
|
} else if handshake.state == HandshakeResponseCreated {
|
2017-09-01 12:21:53 +00:00
|
|
|
KDF2(
|
|
|
|
&recvKey,
|
|
|
|
&sendKey,
|
|
|
|
handshake.chainKey[:],
|
|
|
|
nil,
|
|
|
|
)
|
2017-06-26 20:07:29 +00:00
|
|
|
isInitiator = false
|
2017-06-24 20:03:52 +00:00
|
|
|
} else {
|
2018-05-13 17:50:58 +00:00
|
|
|
return errors.New("invalid state for keypair derivation")
|
2017-06-24 20:03:52 +00:00
|
|
|
}
|
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
// zero handshake
|
|
|
|
|
2017-09-01 12:21:53 +00:00
|
|
|
setZero(handshake.chainKey[:])
|
2018-05-13 17:50:58 +00:00
|
|
|
setZero(handshake.hash[:]) // Doesn't necessarily need to be zeroed. Could be used for something interesting down the line.
|
2017-09-01 12:21:53 +00:00
|
|
|
setZero(handshake.localEphemeral[:])
|
2017-06-30 12:41:08 +00:00
|
|
|
peer.handshake.state = HandshakeZeroed
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-06-30 12:41:08 +00:00
|
|
|
// create AEAD instances
|
2017-06-26 20:07:29 +00:00
|
|
|
|
2018-05-13 16:23:40 +00:00
|
|
|
keypair := new(Keypair)
|
|
|
|
keypair.send, _ = chacha20poly1305.New(sendKey[:])
|
|
|
|
keypair.receive, _ = chacha20poly1305.New(recvKey[:])
|
2017-09-01 12:21:53 +00:00
|
|
|
|
|
|
|
setZero(sendKey[:])
|
|
|
|
setZero(recvKey[:])
|
|
|
|
|
2018-05-13 16:23:40 +00:00
|
|
|
keypair.created = time.Now()
|
|
|
|
keypair.sendNonce = 0
|
|
|
|
keypair.replayFilter.Init()
|
|
|
|
keypair.isInitiator = isInitiator
|
|
|
|
keypair.localIndex = peer.handshake.localIndex
|
|
|
|
keypair.remoteIndex = peer.handshake.remoteIndex
|
2017-06-24 20:03:52 +00:00
|
|
|
|
2017-06-26 20:07:29 +00:00
|
|
|
// remap index
|
|
|
|
|
2018-05-13 16:23:40 +00:00
|
|
|
device.indexTable.SwapIndexForKeypair(handshake.localIndex, keypair)
|
2017-06-26 20:07:29 +00:00
|
|
|
handshake.localIndex = 0
|
|
|
|
|
|
|
|
// rotate key pairs
|
|
|
|
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs := &peer.keypairs
|
2019-01-03 18:04:00 +00:00
|
|
|
keypairs.Lock()
|
|
|
|
defer keypairs.Unlock()
|
2017-08-14 15:09:25 +00:00
|
|
|
|
2018-05-13 21:14:43 +00:00
|
|
|
previous := keypairs.previous
|
|
|
|
next := keypairs.next
|
|
|
|
current := keypairs.current
|
2017-09-20 07:26:08 +00:00
|
|
|
|
2018-05-07 20:27:03 +00:00
|
|
|
if isInitiator {
|
|
|
|
if next != nil {
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs.next = nil
|
|
|
|
keypairs.previous = next
|
2018-05-07 20:27:03 +00:00
|
|
|
device.DeleteKeypair(current)
|
2017-09-20 07:26:08 +00:00
|
|
|
} else {
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs.previous = current
|
2017-06-26 20:07:29 +00:00
|
|
|
}
|
2018-05-07 20:27:03 +00:00
|
|
|
device.DeleteKeypair(previous)
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs.current = keypair
|
2017-09-20 07:26:08 +00:00
|
|
|
} else {
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs.next = keypair
|
2018-05-07 20:27:03 +00:00
|
|
|
device.DeleteKeypair(next)
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs.previous = nil
|
2018-05-07 20:27:03 +00:00
|
|
|
device.DeleteKeypair(previous)
|
2017-09-20 07:26:08 +00:00
|
|
|
}
|
2017-06-26 20:07:29 +00:00
|
|
|
|
2018-05-13 17:50:58 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (peer *Peer) ReceivedWithKeypair(receivedKeypair *Keypair) bool {
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs := &peer.keypairs
|
|
|
|
if keypairs.next != receivedKeypair {
|
2018-05-13 17:50:58 +00:00
|
|
|
return false
|
|
|
|
}
|
2019-01-03 18:04:00 +00:00
|
|
|
keypairs.Lock()
|
|
|
|
defer keypairs.Unlock()
|
2018-05-13 21:14:43 +00:00
|
|
|
if keypairs.next != receivedKeypair {
|
2018-05-13 17:50:58 +00:00
|
|
|
return false
|
|
|
|
}
|
2018-05-13 21:14:43 +00:00
|
|
|
old := keypairs.previous
|
|
|
|
keypairs.previous = keypairs.current
|
2018-05-13 17:50:58 +00:00
|
|
|
peer.device.DeleteKeypair(old)
|
2018-05-13 21:14:43 +00:00
|
|
|
keypairs.current = keypairs.next
|
|
|
|
keypairs.next = nil
|
2018-05-13 17:50:58 +00:00
|
|
|
return true
|
2017-06-24 20:03:52 +00:00
|
|
|
}
|