Blinding:

- Fix bugs with lookup password
- Log tweaks
This commit is contained in:
zzz
2019-05-29 19:08:33 +00:00
parent 098bde2a32
commit 040e092153
10 changed files with 64 additions and 27 deletions

View File

@ -130,13 +130,7 @@ class RequestLeaseSetMessageHandler extends HandlerImpl {
if (_ls2Type == DatabaseEntry.KEY_TYPE_LS2) {
leaseSet = new LeaseSet2();
} else if (_ls2Type == DatabaseEntry.KEY_TYPE_ENCRYPTED_LS2) {
EncryptedLeaseSet encls2 = new EncryptedLeaseSet();
String secret = session.getOptions().getProperty(PROP_SECRET);
if (secret != null) {
secret = DataHelper.getUTF8(Base64.decode(secret));
encls2.setSecret(secret);
}
leaseSet = encls2;
leaseSet = new EncryptedLeaseSet();
} else if (_ls2Type == DatabaseEntry.KEY_TYPE_META_LS2) {
leaseSet = new MetaLeaseSet();
} else {
@ -174,6 +168,15 @@ class RequestLeaseSetMessageHandler extends HandlerImpl {
* @since 0.9.7
*/
protected synchronized void signLeaseSet(LeaseSet leaseSet, boolean isLS2, I2PSessionImpl session) {
// must be before setDestination()
if (isLS2 && _ls2Type == DatabaseEntry.KEY_TYPE_ENCRYPTED_LS2) {
String secret = session.getOptions().getProperty(PROP_SECRET);
if (secret != null) {
EncryptedLeaseSet encls2 = (EncryptedLeaseSet) leaseSet;
secret = DataHelper.getUTF8(Base64.decode(secret));
encls2.setSecret(secret);
}
}
Destination dest = session.getMyDestination();
// also, if this session is connected to multiple routers, include other leases here
leaseSet.setDestination(dest);

View File

@ -58,7 +58,7 @@ class RequestVariableLeaseSetMessageHandler extends RequestLeaseSetMessageHandle
} else {
leaseSet = new LeaseSet();
}
// Full Meta and Encrypted support TODO
// Full Meta support TODO
for (int i = 0; i < msg.getEndpoints(); i++) {
Lease lease;
if (isLS2) {

View File

@ -327,7 +327,7 @@ public final class Blinding {
SigningPrivateKey priv = (SigningPrivateKey) keys[1];
I2PAppContext ctx = I2PAppContext.getGlobalContext();
//String b32 = encode(pub, null);
String b32 = encode(pub, "foobarbaz");
String b32 = encode(pub, true, false);
System.out.println("pub b32 is " + b32);
BlindData bd = decode(ctx, b32);
if (bd.getBlindedPubKey().equals(pub))

View File

@ -42,6 +42,8 @@ public class EncryptedLeaseSet extends LeaseSet2 {
private String _secret;
private PrivateKey _clientPrivateKey;
private final Log _log;
// debug
private int _authType, _numKeys;
private static final int MIN_ENCRYPTED_SIZE = 8 + 16;
private static final int MAX_ENCRYPTED_SIZE = 4096;
@ -74,11 +76,17 @@ public class EncryptedLeaseSet extends LeaseSet2 {
/**
* Must be set before sign or verify.
* Must be called before setDestination() or setSigningKey(), or alpha will be wrong.
*
* @param secret null or "" for none (default)
* @since 0.9.39
*/
public void setSecret(String secret) {
if (_signingKey != null && !DataHelper.eq(secret, _secret)) {
if (_log.shouldWarn())
_log.warn("setSecret() after setSigningKey()" +
" was: " + _secret + " now: " + secret);
}
_secret = secret;
}
@ -128,7 +136,8 @@ public class EncryptedLeaseSet extends LeaseSet2 {
}
/**
* Overridden to set the blinded key
* Overridden to set the blinded key.
* setSecret() MUST be called before this for non-null secret, or alpha will be wrong.
*
* @param dest non-null, must be EdDSA_SHA512_Ed25519 or RedDSA_SHA512_Ed25519
* @throws IllegalStateException if already signed
@ -147,7 +156,8 @@ public class EncryptedLeaseSet extends LeaseSet2 {
}
/**
* Overridden to set the blinded key
* Overridden to set the blinded key.
* setSecret() MUST be called before this for non-null secret, or alpha will be wrong.
*
* @param spk unblinded key non-null, must be EdDSA_SHA512_Ed25519 or RedDSA_SHA512_Ed25519
* @throws IllegalStateException if already signed
@ -156,7 +166,6 @@ public class EncryptedLeaseSet extends LeaseSet2 {
*/
@Override
public void setSigningKey(SigningPublicKey spk) {
// TODO already-set checks
SigType type = spk.getType();
if (type != SigType.EdDSA_SHA512_Ed25519 &&
type != SigType.RedDSA_SHA512_Ed25519)
@ -192,6 +201,7 @@ public class EncryptedLeaseSet extends LeaseSet2 {
if (_log.shouldDebug())
_log.debug("Blind:" +
"\norig: " + spk +
"\nsecret: " + _secret +
"\nalpha: " + _alpha +
"\nblinded: " + rv);
return rv;
@ -415,12 +425,14 @@ public class EncryptedLeaseSet extends LeaseSet2 {
// use first 12 bytes only
byte[] iv = new byte[32];
int authLen;
_authType = authType; // debug
if (authType == BlindData.AUTH_NONE) {
authLen = 1;
} else if (authType == BlindData.AUTH_DH ||
authType == BlindData.AUTH_PSK) {
if (clientKeys == null || clientKeys.isEmpty())
throw new IllegalArgumentException("No client keys provided");
_numKeys = clientKeys.size(); // debug
authLen = 1 + SALT_LEN + 2 + (clientKeys.size() * CLIENT_LEN);
} else {
throw new IllegalArgumentException("Bad auth type " + authType);
@ -609,6 +621,7 @@ public class EncryptedLeaseSet extends LeaseSet2 {
}
int authType = plaintext[0] & 0x0f;
_authType = authType; // debug
int authLen;
if (authType == BlindData.AUTH_NONE) {
authLen = 1;
@ -622,6 +635,7 @@ public class EncryptedLeaseSet extends LeaseSet2 {
byte[] seed = new byte[32];
System.arraycopy(plaintext, 1, seed, 0, 32);
int count = (int) DataHelper.fromLong(plaintext, 33, 2);
_numKeys = count; // debug
if (count == 0)
throw new DataFormatException("No client entries");
authLen = 1 + SALT_LEN + 2 + (count * CLIENT_LEN);
@ -948,7 +962,13 @@ public class EncryptedLeaseSet extends LeaseSet2 {
buf.append("\n\tSignature: ").append(_signature);
buf.append("\n\tPublished: ").append(new java.util.Date(_published));
buf.append("\n\tExpires: ").append(new java.util.Date(_expires));
buf.append("\n\tAuth Type: ").append(_authType);
buf.append("\n\tClient Keys: ").append(_numKeys);
if (_decryptedLS2 != null) {
if (_secret != null)
buf.append("\n\tSecret: ").append(_secret);
if (_clientPrivateKey != null)
buf.append("\n\tClient Private Key: ").append(_clientPrivateKey.toBase64());
buf.append("\n\tDecrypted LS:\n").append(_decryptedLS2);
} else if (_destination != null) {
buf.append("\n\tDestination: ").append(_destination);