2014-11-09 23:45:16 -08:00
|
|
|
package dht
|
|
|
|
|
|
|
|
import (
|
2014-12-19 12:19:56 -08:00
|
|
|
"fmt"
|
2014-11-09 23:45:16 -08:00
|
|
|
|
2015-02-23 16:51:09 +01:00
|
|
|
"github.com/jbenet/go-ipfs/Godeps/_workspace/src/golang.org/x/net/context"
|
2014-12-29 05:45:55 -08:00
|
|
|
ci "github.com/jbenet/go-ipfs/p2p/crypto"
|
2015-01-17 03:52:40 -08:00
|
|
|
peer "github.com/jbenet/go-ipfs/p2p/peer"
|
2014-11-09 23:45:16 -08:00
|
|
|
pb "github.com/jbenet/go-ipfs/routing/dht/pb"
|
2015-02-23 00:25:20 -08:00
|
|
|
record "github.com/jbenet/go-ipfs/routing/record"
|
2014-11-09 23:45:16 -08:00
|
|
|
u "github.com/jbenet/go-ipfs/util"
|
2014-12-19 12:19:56 -08:00
|
|
|
ctxutil "github.com/jbenet/go-ipfs/util/ctx"
|
2014-11-09 23:45:16 -08:00
|
|
|
)
|
|
|
|
|
2014-12-19 12:19:56 -08:00
|
|
|
// KeyForPublicKey returns the key used to retrieve public keys
|
|
|
|
// from the dht.
|
|
|
|
func KeyForPublicKey(id peer.ID) u.Key {
|
|
|
|
return u.Key("/pk/" + string(id))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (dht *IpfsDHT) getPublicKeyOnline(ctx context.Context, p peer.ID) (ci.PubKey, error) {
|
|
|
|
log.Debugf("getPublicKey for: %s", p)
|
|
|
|
|
|
|
|
// check locally.
|
|
|
|
pk := dht.peerstore.PubKey(p)
|
|
|
|
if pk != nil {
|
|
|
|
return pk, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ok, try the node itself. if they're overwhelmed or slow we can move on.
|
|
|
|
ctxT, _ := ctxutil.WithDeadlineFraction(ctx, 0.3)
|
|
|
|
if pk, err := dht.getPublicKeyFromNode(ctx, p); err == nil {
|
|
|
|
return pk, nil
|
2014-11-11 16:28:20 -08:00
|
|
|
}
|
|
|
|
|
2014-12-19 12:19:56 -08:00
|
|
|
// last ditch effort: let's try the dht.
|
|
|
|
log.Debugf("pk for %s not in peerstore, and peer failed. trying dht.", p)
|
|
|
|
pkkey := KeyForPublicKey(p)
|
|
|
|
|
|
|
|
// ok, try the node itself. if they're overwhelmed or slow we can move on.
|
|
|
|
val, err := dht.GetValue(ctxT, pkkey)
|
2014-11-11 16:28:20 -08:00
|
|
|
if err != nil {
|
|
|
|
log.Warning("Failed to find requested public key.")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-12-19 12:19:56 -08:00
|
|
|
pk, err = ci.UnmarshalPublicKey(val)
|
2014-11-11 16:28:20 -08:00
|
|
|
if err != nil {
|
2015-01-26 19:12:12 -08:00
|
|
|
log.Debugf("Failed to unmarshal public key: %s", err)
|
2014-11-11 16:28:20 -08:00
|
|
|
return nil, err
|
|
|
|
}
|
2014-12-19 12:19:56 -08:00
|
|
|
return pk, nil
|
2014-11-11 16:28:20 -08:00
|
|
|
}
|
|
|
|
|
2014-12-19 12:19:56 -08:00
|
|
|
func (dht *IpfsDHT) getPublicKeyFromNode(ctx context.Context, p peer.ID) (ci.PubKey, error) {
|
|
|
|
|
|
|
|
// check locally, just in case...
|
|
|
|
pk := dht.peerstore.PubKey(p)
|
|
|
|
if pk != nil {
|
|
|
|
return pk, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
pkkey := KeyForPublicKey(p)
|
|
|
|
pmes, err := dht.getValueSingle(ctx, p, pkkey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// node doesn't have key :(
|
|
|
|
record := pmes.GetRecord()
|
|
|
|
if record == nil {
|
|
|
|
return nil, fmt.Errorf("node not responding with its public key: %s", p)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Success! We were given the value. we don't need to check
|
|
|
|
// validity because a) we can't. b) we know the hash of the
|
|
|
|
// key we're looking for.
|
|
|
|
val := record.GetValue()
|
|
|
|
log.Debug("dht got a value from other peer.")
|
|
|
|
|
|
|
|
pk, err = ci.UnmarshalPublicKey(val)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
id, err := peer.IDFromPublicKey(pk)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if id != p {
|
|
|
|
return nil, fmt.Errorf("public key does not match id: %s", p)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ok! it's valid. we got it!
|
|
|
|
log.Debugf("dht got public key from node itself.")
|
|
|
|
return pk, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// verifyRecordLocally attempts to verify a record. if we do not have the public
|
|
|
|
// key, we fail. we do not search the dht.
|
|
|
|
func (dht *IpfsDHT) verifyRecordLocally(r *pb.Record) error {
|
|
|
|
|
2015-02-23 00:25:20 -08:00
|
|
|
if len(r.Signature) > 0 {
|
|
|
|
// First, validate the signature
|
|
|
|
p := peer.ID(r.GetAuthor())
|
|
|
|
pk := dht.peerstore.PubKey(p)
|
|
|
|
if pk == nil {
|
|
|
|
return fmt.Errorf("do not have public key for %s", p)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := record.CheckRecordSig(r, pk); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2014-12-19 12:19:56 -08:00
|
|
|
}
|
|
|
|
|
2015-02-23 00:25:20 -08:00
|
|
|
return dht.Validator.VerifyRecord(r)
|
2014-12-19 12:19:56 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
// verifyRecordOnline verifies a record, searching the DHT for the public key
|
|
|
|
// if necessary. The reason there is a distinction in the functions is that
|
|
|
|
// retrieving arbitrary public keys from the DHT as a result of passively
|
|
|
|
// receiving records (e.g. through a PUT_VALUE or ADD_PROVIDER) can cause a
|
|
|
|
// massive amplification attack on the dht. Use with care.
|
|
|
|
func (dht *IpfsDHT) verifyRecordOnline(ctx context.Context, r *pb.Record) error {
|
|
|
|
|
2015-02-23 00:25:20 -08:00
|
|
|
if len(r.Signature) > 0 {
|
|
|
|
// get the public key, search for it if necessary.
|
|
|
|
p := peer.ID(r.GetAuthor())
|
|
|
|
pk, err := dht.getPublicKeyOnline(ctx, p)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = record.CheckRecordSig(r, pk)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2014-11-09 23:45:16 -08:00
|
|
|
}
|
|
|
|
|
2015-02-23 00:25:20 -08:00
|
|
|
return dht.Validator.VerifyRecord(r)
|
2014-11-10 15:48:49 -08:00
|
|
|
}
|