LCOV - code coverage report
Current view: top level - feature/hs - hs_descriptor.h (source / functions) Hit Total Coverage
Test: lcov.info Lines: 3 3 100.0 %
Date: 2021-11-24 03:28:48 Functions: 1 1 100.0 %

          Line data    Source code
       1             : /* Copyright (c) 2016-2021, The Tor Project, Inc. */
       2             : /* See LICENSE for licensing information */
       3             : 
       4             : /**
       5             :  * \file hs_descriptor.h
       6             :  * \brief Header file for hs_descriptor.c
       7             :  **/
       8             : 
       9             : #ifndef TOR_HS_DESCRIPTOR_H
      10             : #define TOR_HS_DESCRIPTOR_H
      11             : 
      12             : #include <stdint.h>
      13             : 
      14             : #include "core/or/or.h"
      15             : #include "trunnel/ed25519_cert.h" /* needed for trunnel */
      16             : #include "feature/nodelist/torcert.h"
      17             : #include "core/crypto/hs_ntor.h" /* for hs_subcredential_t */
      18             : 
      19             : /* Trunnel */
      20             : struct link_specifier_t;
      21             : 
      22             : /** The earliest descriptor format version we support. */
      23             : #define HS_DESC_SUPPORTED_FORMAT_VERSION_MIN 3
      24             : /** The latest descriptor format version we support. */
      25             : #define HS_DESC_SUPPORTED_FORMAT_VERSION_MAX 3
      26             : 
      27             : /** Default lifetime of a descriptor in seconds. The valus is set at 3 hours
      28             :  * which is 180 minutes or 10800 seconds. */
      29             : #define HS_DESC_DEFAULT_LIFETIME (3 * 60 * 60)
      30             : /** Maximum lifetime of a descriptor in seconds. The value is set at 12 hours
      31             :  * which is 720 minutes or 43200 seconds. */
      32             : #define HS_DESC_MAX_LIFETIME (12 * 60 * 60)
      33             : /** Lifetime of certificate in the descriptor. This defines the lifetime of the
      34             :  * descriptor signing key and the cross certification cert of that key. It is
      35             :  * set to 54 hours because a descriptor can be around for 48 hours and because
      36             :  * consensuses are used after the hour, add an extra 6 hours to give some time
      37             :  * for the service to stop using it. */
      38             : #define HS_DESC_CERT_LIFETIME (54 * 60 * 60)
      39             : /** Length of the salt needed for the encrypted section of a descriptor. */
      40             : #define HS_DESC_ENCRYPTED_SALT_LEN 16
      41             : /** Length of the KDF output value which is the length of the secret key,
      42             :  * the secret IV and MAC key length which is the length of H() output. */
      43             : #define HS_DESC_ENCRYPTED_KDF_OUTPUT_LEN \
      44             :   CIPHER256_KEY_LEN + CIPHER_IV_LEN + DIGEST256_LEN
      45             : /** Pad plaintext of superencrypted data section before encryption so that its
      46             :  * length is a multiple of this value. */
      47             : #define HS_DESC_SUPERENC_PLAINTEXT_PAD_MULTIPLE 10000
      48             : /** Maximum length in bytes of a full hidden service descriptor. */
      49             : #define HS_DESC_MAX_LEN 50000 /* 50kb max size */
      50             : 
      51             : /** Key length for the descriptor symmetric encryption. As specified in the
      52             :  * protocol, we use AES-256 for the encrypted section of the descriptor. The
      53             :  * following is the length in bytes and the bit size. */
      54             : #define HS_DESC_ENCRYPTED_KEY_LEN CIPHER256_KEY_LEN
      55             : #define HS_DESC_ENCRYPTED_BIT_SIZE (HS_DESC_ENCRYPTED_KEY_LEN * 8)
      56             : 
      57             : /** Length of each components in the auth client section in the descriptor. */
      58             : #define HS_DESC_CLIENT_ID_LEN 8
      59             : #define HS_DESC_DESCRIPTOR_COOKIE_LEN 16
      60             : #define HS_DESC_COOKIE_KEY_LEN 32
      61             : #define HS_DESC_COOKIE_KEY_BIT_SIZE (HS_DESC_COOKIE_KEY_LEN * 8)
      62             : #define HS_DESC_ENCRYPED_COOKIE_LEN HS_DESC_DESCRIPTOR_COOKIE_LEN
      63             : 
      64             : /** The number of auth client entries in the descriptor must be the multiple
      65             :  * of this constant. */
      66             : #define HS_DESC_AUTH_CLIENT_MULTIPLE 16
      67             : 
      68             : /** Type of authentication in the descriptor. */
      69             : typedef enum {
      70             :   HS_DESC_AUTH_ED25519 = 1
      71             : } hs_desc_auth_type_t;
      72             : 
      73             : /** Error code when decoding a descriptor. */
      74             : typedef enum {
      75             :   /* The configured client authorization for the requested .onion address
      76             :    * failed to decode the descriptor. */
      77             :   HS_DESC_DECODE_BAD_CLIENT_AUTH  = -6,
      78             : 
      79             :   /* The requested .onion address requires a client authorization. */
      80             :   HS_DESC_DECODE_NEED_CLIENT_AUTH = -5,
      81             : 
      82             :   /* Error during decryption of the encrypted layer. */
      83             :   HS_DESC_DECODE_ENCRYPTED_ERROR  = -4,
      84             : 
      85             :   /* Error during decryption of the super encrypted layer. */
      86             :   HS_DESC_DECODE_SUPERENC_ERROR   = -3,
      87             : 
      88             :   /* Error while decoding the plaintext section. */
      89             :   HS_DESC_DECODE_PLAINTEXT_ERROR  = -2,
      90             : 
      91             :   /* Generic error. */
      92             :   HS_DESC_DECODE_GENERIC_ERROR    = -1,
      93             : 
      94             :   /* Decoding a descriptor was successful. */
      95             :   HS_DESC_DECODE_OK               =  0,
      96             : } hs_desc_decode_status_t;
      97             : 
      98             : /** Introduction point information located in a descriptor. */
      99             : typedef struct hs_desc_intro_point_t {
     100             :   /** Link specifier(s) which details how to extend to the relay. This list
     101             :    * contains link_specifier_t objects. It MUST have at least one. */
     102             :   smartlist_t *link_specifiers;
     103             : 
     104             :   /** Onion key of the introduction point used to extend to it for the ntor
     105             :    * handshake. */
     106             :   curve25519_public_key_t onion_key;
     107             : 
     108             :   /** Authentication key used to establish the introduction point circuit and
     109             :    * cross-certifies the blinded public key for the replica thus signed by
     110             :    * the blinded key and in turn signs it. */
     111             :   tor_cert_t *auth_key_cert;
     112             : 
     113             :   /** Encryption key for the "ntor" type. */
     114             :   curve25519_public_key_t enc_key;
     115             : 
     116             :   /** Certificate cross certifying the descriptor signing key by the encryption
     117             :    * curve25519 key. This certificate contains the signing key and is of type
     118             :    * CERT_TYPE_CROSS_HS_IP_KEYS [0B]. */
     119             :   tor_cert_t *enc_key_cert;
     120             : 
     121             :   /** (Optional): If this introduction point is a legacy one that is version <=
     122             :    * 0.2.9.x (HSIntro=3), we use this extra key for the intro point to be able
     123             :    * to relay the cells to the service correctly. */
     124             :   struct {
     125             :     /** RSA public key. */
     126             :     crypto_pk_t *key;
     127             : 
     128             :     /** Cross certified cert with the descriptor signing key (RSA->Ed). Because
     129             :      * of the cross certification API, we need to keep the certificate binary
     130             :      * blob and its length in order to properly encode it after. */
     131             :     struct {
     132             :       uint8_t *encoded;
     133             :       size_t len;
     134             :     } cert;
     135             :   } legacy;
     136             : 
     137             :   /** True iff the introduction point has passed the cross certification. Upon
     138             :    * decoding an intro point, this must be true. */
     139             :   unsigned int cross_certified : 1;
     140             : } hs_desc_intro_point_t;
     141             : 
     142             : /** Authorized client information located in a descriptor. */
     143             : typedef struct hs_desc_authorized_client_t {
     144             :   /** An identifier that the client will use to identify which auth client
     145             :    * entry it needs to use. */
     146             :   uint8_t client_id[HS_DESC_CLIENT_ID_LEN];
     147             : 
     148             :   /** An IV that is used to decrypt the encrypted descriptor cookie. */
     149             :   uint8_t iv[CIPHER_IV_LEN];
     150             : 
     151             :   /** An encrypted descriptor cookie that the client needs to decrypt to use
     152             :    * it to decrypt the descriptor. */
     153             :   uint8_t encrypted_cookie[HS_DESC_ENCRYPED_COOKIE_LEN];
     154             : } hs_desc_authorized_client_t;
     155             : 
     156             : /** The encrypted data section of a descriptor. Obviously the data in this is
     157             :  * in plaintext but encrypted once encoded. */
     158             : typedef struct hs_desc_encrypted_data_t {
     159             :   /** Bitfield of CREATE2 cell supported formats. The only currently supported
     160             :    * format is ntor. */
     161             :   unsigned int create2_ntor : 1;
     162             : 
     163             :   /** A list of authentication types that a client must at least support one
     164             :    * in order to contact the service. Contains NULL terminated strings. */
     165             :   smartlist_t *intro_auth_types;
     166             : 
     167             :   /** Is this descriptor a single onion service? */
     168             :   unsigned int single_onion_service : 1;
     169             : 
     170             :   /** A list of intro points. Contains hs_desc_intro_point_t objects. */
     171             :   smartlist_t *intro_points;
     172             : } hs_desc_encrypted_data_t;
     173             : 
     174             : /** The superencrypted data section of a descriptor. Obviously the data in
     175             :  * this is in plaintext but encrypted once encoded. */
     176             : typedef struct hs_desc_superencrypted_data_t {
     177             :   /** This field contains ephemeral x25519 public key which is used by
     178             :    * the encryption scheme in the client authorization. */
     179             :   curve25519_public_key_t auth_ephemeral_pubkey;
     180             : 
     181             :   /** A list of authorized clients. Contains hs_desc_authorized_client_t
     182             :    * objects. */
     183             :   smartlist_t *clients;
     184             : 
     185             :   /** Decoding only: The b64-decoded encrypted blob from the descriptor */
     186             :   uint8_t *encrypted_blob;
     187             : 
     188             :   /** Decoding only: Size of the encrypted_blob */
     189             :   size_t encrypted_blob_size;
     190             : } hs_desc_superencrypted_data_t;
     191             : 
     192             : /** Plaintext data that is unencrypted information of the descriptor. */
     193             : typedef struct hs_desc_plaintext_data_t {
     194             :   /** Version of the descriptor format. Spec specifies this field as a
     195             :    * positive integer. */
     196             :   uint32_t version;
     197             : 
     198             :   /** The lifetime of the descriptor in seconds. */
     199             :   uint32_t lifetime_sec;
     200             : 
     201             :   /** Certificate with the short-term ed22519 descriptor signing key for the
     202             :    * replica which is signed by the blinded public key for that replica. */
     203             :   tor_cert_t *signing_key_cert;
     204             : 
     205             :   /** Signing public key which is used to sign the descriptor. Same public key
     206             :    * as in the signing key certificate. */
     207             :   ed25519_public_key_t signing_pubkey;
     208             : 
     209             :   /** Blinded public key used for this descriptor derived from the master
     210             :    * identity key and generated for a specific replica number. */
     211             :   ed25519_public_key_t blinded_pubkey;
     212             : 
     213             :   /** Revision counter is incremented at each upload, regardless of whether
     214             :    * the descriptor has changed. This avoids leaking whether the descriptor
     215             :    * has changed. Spec specifies this as a 8 bytes positive integer. */
     216             :   uint64_t revision_counter;
     217             : 
     218             :   /** Decoding only: The b64-decoded superencrypted blob from the descriptor */
     219             :   uint8_t *superencrypted_blob;
     220             : 
     221             :   /** Decoding only: Size of the superencrypted_blob */
     222             :   size_t superencrypted_blob_size;
     223             : } hs_desc_plaintext_data_t;
     224             : 
     225             : /** Service descriptor in its decoded form. */
     226             : typedef struct hs_descriptor_t {
     227             :   /** Contains the plaintext part of the descriptor. */
     228             :   hs_desc_plaintext_data_t plaintext_data;
     229             : 
     230             :   /** The following contains what's in the superencrypted part of the
     231             :    * descriptor. It's only encrypted in the encoded version of the descriptor
     232             :    * thus the data contained in that object is in plaintext. */
     233             :   hs_desc_superencrypted_data_t superencrypted_data;
     234             : 
     235             :   /** The following contains what's in the encrypted part of the descriptor.
     236             :    * It's only encrypted in the encoded version of the descriptor thus the
     237             :    * data contained in that object is in plaintext. */
     238             :   hs_desc_encrypted_data_t encrypted_data;
     239             : 
     240             :   /** Subcredentials of a service, used by the client and service to decrypt
     241             :    * the encrypted data. */
     242             :   hs_subcredential_t subcredential;
     243             : } hs_descriptor_t;
     244             : 
     245             : /** Return true iff the given descriptor format version is supported. */
     246             : static inline int
     247         321 : hs_desc_is_supported_version(uint32_t version)
     248             : {
     249         321 :   if (version < HS_DESC_SUPPORTED_FORMAT_VERSION_MIN ||
     250             :       version > HS_DESC_SUPPORTED_FORMAT_VERSION_MAX) {
     251           3 :     return 0;
     252             :   }
     253             :   return 1;
     254             : }
     255             : 
     256             : /* Public API. */
     257             : 
     258             : void hs_descriptor_free_(hs_descriptor_t *desc);
     259             : #define hs_descriptor_free(desc) \
     260             :   FREE_AND_NULL(hs_descriptor_t, hs_descriptor_free_, (desc))
     261             : void hs_desc_plaintext_data_free_(hs_desc_plaintext_data_t *desc);
     262             : #define hs_desc_plaintext_data_free(desc) \
     263             :   FREE_AND_NULL(hs_desc_plaintext_data_t, hs_desc_plaintext_data_free_, (desc))
     264             : void hs_desc_superencrypted_data_free_(hs_desc_superencrypted_data_t *desc);
     265             : #define hs_desc_superencrypted_data_free(desc) \
     266             :   FREE_AND_NULL(hs_desc_superencrypted_data_t, \
     267             :                 hs_desc_superencrypted_data_free_, (desc))
     268             : void hs_desc_encrypted_data_free_(hs_desc_encrypted_data_t *desc);
     269             : #define hs_desc_encrypted_data_free(desc) \
     270             :   FREE_AND_NULL(hs_desc_encrypted_data_t, hs_desc_encrypted_data_free_, (desc))
     271             : 
     272             : void hs_descriptor_clear_intro_points(hs_descriptor_t *desc);
     273             : 
     274             : MOCK_DECL(int,
     275             :           hs_desc_encode_descriptor,(const hs_descriptor_t *desc,
     276             :                                      const ed25519_keypair_t *signing_kp,
     277             :                                      const uint8_t *descriptor_cookie,
     278             :                                      char **encoded_out));
     279             : 
     280             : int hs_desc_decode_descriptor(const char *encoded,
     281             :                               const hs_subcredential_t *subcredential,
     282             :                               const curve25519_secret_key_t *client_auth_sk,
     283             :                               hs_descriptor_t **desc_out);
     284             : int hs_desc_decode_plaintext(const char *encoded,
     285             :                              hs_desc_plaintext_data_t *plaintext);
     286             : int hs_desc_decode_superencrypted(const hs_descriptor_t *desc,
     287             :                                  hs_desc_superencrypted_data_t *desc_out);
     288             : int hs_desc_decode_encrypted(const hs_descriptor_t *desc,
     289             :                              const curve25519_secret_key_t *client_auth_sk,
     290             :                              hs_desc_encrypted_data_t *desc_out);
     291             : 
     292             : size_t hs_desc_obj_size(const hs_descriptor_t *data);
     293             : size_t hs_desc_plaintext_obj_size(const hs_desc_plaintext_data_t *data);
     294             : 
     295             : hs_desc_intro_point_t *hs_desc_intro_point_new(void);
     296             : void hs_desc_intro_point_free_(hs_desc_intro_point_t *ip);
     297             : #define hs_desc_intro_point_free(ip) \
     298             :   FREE_AND_NULL(hs_desc_intro_point_t, hs_desc_intro_point_free_, (ip))
     299             : void hs_desc_authorized_client_free_(hs_desc_authorized_client_t *client);
     300             : #define hs_desc_authorized_client_free(client) \
     301             :   FREE_AND_NULL(hs_desc_authorized_client_t, \
     302             :                 hs_desc_authorized_client_free_, (client))
     303             : 
     304             : hs_desc_authorized_client_t *hs_desc_build_fake_authorized_client(void);
     305             : 
     306             : void hs_desc_build_authorized_client(const hs_subcredential_t *subcredential,
     307             :                                      const curve25519_public_key_t *
     308             :                                      client_auth_pk,
     309             :                                      const curve25519_secret_key_t *
     310             :                                      auth_ephemeral_sk,
     311             :                                      const uint8_t *descriptor_cookie,
     312             :                                      hs_desc_authorized_client_t *client_out);
     313             : void hs_desc_plaintext_data_free_contents(hs_desc_plaintext_data_t *desc);
     314             : void hs_desc_superencrypted_data_free_contents(
     315             :                                         hs_desc_superencrypted_data_t *desc);
     316             : void hs_desc_encrypted_data_free_contents(hs_desc_encrypted_data_t *desc);
     317             : 
     318             : #ifdef HS_DESCRIPTOR_PRIVATE
     319             : 
     320             : /* Encoding. */
     321             : STATIC char *encode_link_specifiers(const smartlist_t *specs);
     322             : STATIC size_t build_plaintext_padding(const char *plaintext,
     323             :                                       size_t plaintext_len,
     324             :                                       uint8_t **padded_out);
     325             : /* Decoding. */
     326             : STATIC smartlist_t *decode_link_specifiers(const char *encoded);
     327             : STATIC hs_desc_intro_point_t *decode_introduction_point(
     328             :                                 const hs_descriptor_t *desc,
     329             :                                 const char *text);
     330             : STATIC int encrypted_data_length_is_valid(size_t len);
     331             : STATIC int cert_is_valid(tor_cert_t *cert, uint8_t type,
     332             :                          const char *log_obj_type);
     333             : STATIC int desc_sig_is_valid(const char *b64_sig,
     334             :                              const ed25519_public_key_t *signing_pubkey,
     335             :                              const char *encoded_desc, size_t encoded_len);
     336             : 
     337             : MOCK_DECL(STATIC size_t, decrypt_desc_layer,(const hs_descriptor_t *desc,
     338             :                                              const uint8_t *descriptor_cookie,
     339             :                                              bool is_superencrypted_layer,
     340             :                                              char **decrypted_out));
     341             : 
     342             : #endif /* defined(HS_DESCRIPTOR_PRIVATE) */
     343             : 
     344             : #endif /* !defined(TOR_HS_DESCRIPTOR_H) */

Generated by: LCOV version 1.14