insecure.go 5.45 KB
Newer Older
1 2 3 4 5 6 7
// Package insecure provides an insecure, unencrypted implementation of the the SecureConn and SecureTransport interfaces.
//
// Recommended only for testing and other non-production usage.
package insecure

import (
	"context"
8 9
	"fmt"
	"github.com/libp2p/go-libp2p-core/network"
10 11 12 13 14
	"net"

	"github.com/libp2p/go-libp2p-core/peer"
	"github.com/libp2p/go-libp2p-core/sec"

15
	ggio "github.com/gogo/protobuf/io"
16
	ci "github.com/libp2p/go-libp2p-core/crypto"
17
	pb "github.com/libp2p/go-libp2p-core/sec/insecure/pb"
18 19 20 21
)

// ID is the multistream-select protocol ID that should be used when identifying
// this security transport.
22
const ID = "/plaintext/2.0.0"
23 24

// Transport is a no-op stream security transport. It provides no
25 26 27 28
// security and simply mocks the security methods. Identity methods
// return the local peer's ID and private key, and whatever the remote
// peer presents as their ID and public key.
// No authentication of the remote identity is performed.
29
type Transport struct {
30 31
	id  peer.ID
	key ci.PrivKey
32 33 34
}

// New constructs a new insecure transport.
35
func New(id peer.ID, key ci.PrivKey) *Transport {
36
	return &Transport{
37 38
		id:  id,
		key: key,
39 40 41
	}
}

42
// LocalPeer returns the transport's local peer ID.
43 44 45 46
func (t *Transport) LocalPeer() peer.ID {
	return t.id
}

47 48
// LocalPrivateKey returns the local private key.
// This key is used only for identity generation and provides no security.
49
func (t *Transport) LocalPrivateKey() ci.PrivKey {
50
	return t.key
51 52 53
}

// SecureInbound *pretends to secure* an outbound connection to the given peer.
54 55 56 57 58 59
// It sends the local peer's ID and public key, and receives the same from the remote peer.
// No validation is performed as to the authenticity or ownership of the provided public key,
// and the key exchange provides no security.
//
// SecureInbound may fail if the remote peer sends an ID and public key that are inconsistent
// with each other, or if a network error occurs during the ID exchange.
60
func (t *Transport) SecureInbound(ctx context.Context, insecure net.Conn) (sec.SecureConn, error) {
61 62 63 64 65 66 67 68 69 70 71 72
	conn := &Conn{
		Conn:         insecure,
		local:        t.id,
		localPrivKey: t.key,
	}

	err := conn.runHandshakeSync(ctx)
	if err != nil {
		return nil, err
	}

	return conn, nil
73 74 75
}

// SecureOutbound *pretends to secure* an outbound connection to the given peer.
76 77 78 79 80 81 82
// It sends the local peer's ID and public key, and receives the same from the remote peer.
// No validation is performed as to the authenticity or ownership of the provided public key,
// and the key exchange provides no security.
//
// SecureOutbound may fail if the remote peer sends an ID and public key that are inconsistent
// with each other, or if the ID sent by the remote peer does not match the one dialed. It may
// also fail if a network error occurs during the ID exchange.
83
func (t *Transport) SecureOutbound(ctx context.Context, insecure net.Conn, p peer.ID) (sec.SecureConn, error) {
84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
	conn := &Conn{
		Conn:         insecure,
		local:        t.id,
		localPrivKey: t.key,
	}

	err := conn.runHandshakeSync(ctx)
	if err != nil {
		return nil, err
	}

	if p != conn.remote {
		return nil, fmt.Errorf("remote peer sent unexpected peer ID. expected=%s received=%s",
			p, conn.remote)
	}

	return conn, nil
101 102 103 104 105
}

// Conn is the connection type returned by the insecure transport.
type Conn struct {
	net.Conn
106

107 108
	local  peer.ID
	remote peer.ID
109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173

	localPrivKey ci.PrivKey
	remotePubKey ci.PubKey
}

func makeExchangeMessage(privkey ci.PrivKey) (*pb.Exchange, error) {
	pubkey, err := ci.PublicKeyToProto(privkey.GetPublic())
	if err != nil {
		return nil, err
	}
	id, err := peer.IDFromPrivateKey(privkey)
	if err != nil {
		return nil, err
	}

	return &pb.Exchange{
		Id:     []byte(id),
		Pubkey: pubkey,
	}, nil
}

func (ic *Conn) runHandshakeSync(ctx context.Context) error {
	reader := ggio.NewDelimitedReader(ic.Conn, network.MessageSizeMax)
	writer := ggio.NewDelimitedWriter(ic.Conn)

	// Generate an Exchange message
	msg, err := makeExchangeMessage(ic.localPrivKey)
	if err != nil {
		return err
	}

	// Send our Exchange and read theirs
	err = writer.WriteMsg(msg)
	if err != nil {
		return err
	}

	remoteMsg := new(pb.Exchange)
	err = reader.ReadMsg(remoteMsg)
	if err != nil {
		return err
	}

	// Pull remote ID and public key from message
	remotePubkey, err := ci.PublicKeyFromProto(*remoteMsg.Pubkey)
	if err != nil {
		return err
	}

	remoteID, err := peer.IDFromPublicKey(remotePubkey)
	if err != nil {
		return err
	}

	// Validate that ID matches public key
	if !remoteID.MatchesPublicKey(remotePubkey) {
		calculatedID, _ := peer.IDFromPublicKey(remotePubkey)
		return fmt.Errorf("remote peer id does not match public key. id=%s calculated_id=%s",
			remoteID, calculatedID)
	}

	// Add remote ID and key to conn state
	ic.remotePubKey = remotePubkey
	ic.remote = remoteID
	return nil
174 175 176 177 178 179 180 181 182 183 184 185 186
}

// LocalPeer returns the local peer ID.
func (ic *Conn) LocalPeer() peer.ID {
	return ic.local
}

// RemotePeer returns the remote peer ID if we initiated the dial. Otherwise, it
// returns "" (because this connection isn't actually secure).
func (ic *Conn) RemotePeer() peer.ID {
	return ic.remote
}

187 188
// RemotePublicKey returns whatever public key was given by the remote peer.
// Note that no verification of ownership is done, as this connection is not secure.
189
func (ic *Conn) RemotePublicKey() ci.PubKey {
190
	return ic.remotePubKey
191 192
}

193
// LocalPrivateKey returns the private key for the local peer.
194
func (ic *Conn) LocalPrivateKey() ci.PrivKey {
195
	return ic.localPrivKey
196 197 198 199
}

var _ sec.SecureTransport = (*Transport)(nil)
var _ sec.SecureConn = (*Conn)(nil)