$Id: tunnel-alt.html,v 1.9 2005/07/27 14:04:07 jrandom Exp $
1) Tunnel creation 1.1) Tunnel creation request record 1.2) Hop processing 1.3) Tunnel creation reply record 1.4) Request preparation 1.5) Request delivery 1.6) Endpoint handling 1.7) Reply processing 2) Notes
The tunnel creation is accomplished by a single message passed along the path of peers in the tunnel, rewritten in place, and transmitted back to the tunnel creator. This single tunnel message is made up of a fixed number of records (8) - one for each potential peer in the tunnel. Individual records are asymmetrically encrypted to be read only by a specific peer along the path, while an additional symmetric layer of encryption is added at each hop so as to expose the asymmetrically encrypted record only at the appropriate time.
Cleartext of the record, visible only to the hop being asked:
bytes 0-3: tunnel ID to receive messages as bytes 4-35: local router identity hash bytes 36-39: next tunnel ID bytes 40-71: next router identity hash bytes 72-103: AES-256 tunnel layer key bytes 104-135: AES-256 tunnel IV key bytes 136-167: AES-256 reply key bytes 168-183: reply IV byte 184: flags bytes 185-188: request time (in hours since the epoch) bytes 189-222: uninterpreted / random padding
The next tunnel ID and next router identity hash fields are used to specify the next hop in the tunnel, though for an outbound tunnel endpoint, they specify where the rewritten tunnel creation reply message should be sent.
The flags field currently has two bits defined:
bit 0: if set, allow messages from anyone bit 1: if set, allow messages to anyone, and send the reply to the specified next hop in a tunnel message
That cleartext record is ElGamal 2048 encrypted with the hop's public encryption key and formatted into a 528 byte record:
bytes 0-15: SHA-256-128 of the current hop's router identity bytes 16-527: ElGamal-2048 encrypted request record
Since the cleartext uses the full field, there is no need for
additional padding beyond SHA256(cleartext) + cleartext
.
When a hop receives a TunnelBuildMessage, it looks through the 8 records contained within it for one starting with their own identity hash (trimmed to 8 bytes). It then decryptes the ElGamal block from that record and retrieves the protected cleartext. At that point, they make sure the tunnel request is not a duplicate by feeding the AES-256 reply key into a bloom filter and making sure the request time is within an hour of current. Duplicates or invalid requests are dropped.
After deciding whether they will agree to participate in the tunnel or not, they replace the record that had contained the request with an encrypted reply block. All other records are AES-256/CBC encrypted with the included reply key and IV (though each is encrypted separately, rather than chained across records).
After the current hop reads their record, they replace it with a reply record stating whether or not they agree to participate in the tunnel, and if they do not, they classify their reason for rejection. This is simply a 1 byte value, with 0x0 meaning they agree to participate in the tunnel, and higher values meaning higher levels of rejection. The reply is encrypted with the AES session key delivered to it in the encrypted block, padded with random data until it reaches the full record size:
AES-256-CBC(SHA-256(padding+status) + padding + status, key, IV)
When building a new request, all of the records must first be built and asymmetrically encrypted. Each record should then be decrypted with the reply keys and IVs of the hops earlier in the path. That decryption should be run in reverse order so that the asymmetrically encrypted data will show up in the clear at the right hop after their predecessor encrypts it.
The excess records not needed for individual requests are simply filled with random data by the creator.
For outbound tunnels, the delivery is done directly from the tunnel creator to the first hop, packaging up the TunnelBuildMessage as if the creator was just another hop in the tunnel. For inbound tunnels, the delivery is done through an existing outbound tunnel (and during startup, when no outbound tunnel exists yet, a fake 0 hop outbound tunnel is used).
When the request reaches an outbound endpoint (as determined by the 'allow messages to anyone' flag), the hop is processed as usual, encrypting a reply in place of the record and encrypting all of the other records, but since there is no 'next hop' to forward the TunnelBuildMessage on to, it instead places the encrypted reply records into a TunnelBuildReplyMessage and delivers it to the reply tunnel specified within the request record. That reply tunnel forwards the reply records down to the tunnel creator for processing, as below.
When the request reaches the inbound endpoint (also known as the tunnel creator), the router processes each of the replies, as below.
To process the reply records, the creator simply has to AES decrypt each record individually, using the reply key and IV of each hop in the tunnel after the peer (in reverse order). This then exposes the reply specifying whether they agree to participate in the tunnel or why they refuse. If they all agree, the tunnel is considered created and may be used immediately, but if anyone refuses, the tunnel is discarded.