i2p.cpp
1 // Copyright (c) 2020-present The Bitcoin Core developers 2 // Distributed under the MIT software license, see the accompanying 3 // file COPYING or http://www.opensource.org/licenses/mit-license.php. 4 5 #include <chainparams.h> 6 #include <common/args.h> 7 #include <compat/compat.h> 8 #include <compat/endian.h> 9 #include <crypto/sha256.h> 10 #include <i2p.h> 11 #include <logging.h> 12 #include <netaddress.h> 13 #include <netbase.h> 14 #include <random.h> 15 #include <script/parsing.h> 16 #include <sync.h> 17 #include <tinyformat.h> 18 #include <util/fs.h> 19 #include <util/readwritefile.h> 20 #include <util/sock.h> 21 #include <util/strencodings.h> 22 #include <util/threadinterrupt.h> 23 24 #include <chrono> 25 #include <memory> 26 #include <ranges> 27 #include <stdexcept> 28 #include <string> 29 30 using util::Split; 31 32 namespace i2p { 33 34 /** 35 * Swap Standard Base64 <-> I2P Base64. 36 * Standard Base64 uses `+` and `/` as last two characters of its alphabet. 37 * I2P Base64 uses `-` and `~` respectively. 38 * So it is easy to detect in which one is the input and convert to the other. 39 * @param[in] from Input to convert. 40 * @return converted `from` 41 */ 42 static std::string SwapBase64(const std::string& from) 43 { 44 std::string to; 45 to.resize(from.size()); 46 for (size_t i = 0; i < from.size(); ++i) { 47 switch (from[i]) { 48 case '-': 49 to[i] = '+'; 50 break; 51 case '~': 52 to[i] = '/'; 53 break; 54 case '+': 55 to[i] = '-'; 56 break; 57 case '/': 58 to[i] = '~'; 59 break; 60 default: 61 to[i] = from[i]; 62 break; 63 } 64 } 65 return to; 66 } 67 68 /** 69 * Decode an I2P-style Base64 string. 70 * @param[in] i2p_b64 I2P-style Base64 string. 71 * @return decoded `i2p_b64` 72 * @throw std::runtime_error if decoding fails 73 */ 74 static Binary DecodeI2PBase64(const std::string& i2p_b64) 75 { 76 const std::string& std_b64 = SwapBase64(i2p_b64); 77 auto decoded = DecodeBase64(std_b64); 78 if (!decoded) { 79 throw std::runtime_error(strprintf("Cannot decode Base64: \"%s\"", i2p_b64)); 80 } 81 return std::move(*decoded); 82 } 83 84 /** 85 * Derive the .b32.i2p address of an I2P destination (binary). 86 * @param[in] dest I2P destination. 87 * @return the address that corresponds to `dest` 88 * @throw std::runtime_error if conversion fails 89 */ 90 static CNetAddr DestBinToAddr(const Binary& dest) 91 { 92 CSHA256 hasher; 93 hasher.Write(dest.data(), dest.size()); 94 unsigned char hash[CSHA256::OUTPUT_SIZE]; 95 hasher.Finalize(hash); 96 97 CNetAddr addr; 98 const std::string addr_str = EncodeBase32(hash, false) + ".b32.i2p"; 99 if (!addr.SetSpecial(addr_str)) { 100 throw std::runtime_error(strprintf("Cannot parse I2P address: \"%s\"", addr_str)); 101 } 102 103 return addr; 104 } 105 106 /** 107 * Derive the .b32.i2p address of an I2P destination (I2P-style Base64). 108 * @param[in] dest I2P destination. 109 * @return the address that corresponds to `dest` 110 * @throw std::runtime_error if conversion fails 111 */ 112 static CNetAddr DestB64ToAddr(const std::string& dest) 113 { 114 const Binary& decoded = DecodeI2PBase64(dest); 115 return DestBinToAddr(decoded); 116 } 117 118 namespace sam { 119 120 Session::Session(const fs::path& private_key_file, 121 const Proxy& control_host, 122 CThreadInterrupt* interrupt) 123 : m_private_key_file{private_key_file}, 124 m_control_host{control_host}, 125 m_interrupt{interrupt}, 126 m_transient{false} 127 { 128 } 129 130 Session::Session(const Proxy& control_host, CThreadInterrupt* interrupt) 131 : m_control_host{control_host}, 132 m_interrupt{interrupt}, 133 m_transient{true} 134 { 135 } 136 137 Session::~Session() 138 { 139 LOCK(m_mutex); 140 Disconnect(); 141 } 142 143 bool Session::Listen(Connection& conn) 144 { 145 try { 146 LOCK(m_mutex); 147 CreateIfNotCreatedAlready(); 148 conn.me = m_my_addr; 149 conn.sock = StreamAccept(); 150 return true; 151 } catch (const std::runtime_error& e) { 152 LogPrintLevel(BCLog::I2P, BCLog::Level::Error, "Couldn't listen: %s\n", e.what()); 153 CheckControlSock(); 154 } 155 return false; 156 } 157 158 bool Session::Accept(Connection& conn) 159 { 160 AssertLockNotHeld(m_mutex); 161 162 std::string errmsg; 163 bool disconnect{false}; 164 165 while (!*m_interrupt) { 166 Sock::Event occurred; 167 if (!conn.sock->Wait(MAX_WAIT_FOR_IO, Sock::RECV, &occurred)) { 168 errmsg = "wait on socket failed"; 169 break; 170 } 171 172 if (occurred == 0) { 173 // Timeout, no incoming connections or errors within MAX_WAIT_FOR_IO. 174 continue; 175 } 176 177 std::string peer_dest; 178 try { 179 peer_dest = conn.sock->RecvUntilTerminator('\n', MAX_WAIT_FOR_IO, *m_interrupt, MAX_MSG_SIZE); 180 } catch (const std::runtime_error& e) { 181 errmsg = e.what(); 182 break; 183 } 184 185 CNetAddr peer_addr; 186 try { 187 peer_addr = DestB64ToAddr(peer_dest); 188 } catch (const std::runtime_error& e) { 189 // The I2P router is expected to send the Base64 of the connecting peer, 190 // but it may happen that something like this is sent instead: 191 // STREAM STATUS RESULT=I2P_ERROR MESSAGE="Session was closed" 192 // In that case consider the session damaged and close it right away, 193 // even if the control socket is alive. 194 if (peer_dest.find("RESULT=I2P_ERROR") != std::string::npos) { 195 errmsg = strprintf("unexpected reply that hints the session is unusable: %s", peer_dest); 196 disconnect = true; 197 } else { 198 errmsg = e.what(); 199 } 200 break; 201 } 202 203 conn.peer = CService(peer_addr, I2P_SAM31_PORT); 204 205 return true; 206 } 207 208 if (*m_interrupt) { 209 LogPrintLevel(BCLog::I2P, BCLog::Level::Debug, "Accept was interrupted\n"); 210 } else { 211 LogPrintLevel(BCLog::I2P, BCLog::Level::Debug, "Error accepting%s: %s\n", disconnect ? " (will close the session)" : "", errmsg); 212 } 213 if (disconnect) { 214 LOCK(m_mutex); 215 Disconnect(); 216 } else { 217 CheckControlSock(); 218 } 219 return false; 220 } 221 222 bool Session::Connect(const CService& to, Connection& conn, bool& proxy_error) 223 { 224 // Refuse connecting to arbitrary ports. We don't specify any destination port to the SAM proxy 225 // when connecting (SAM 3.1 does not use ports) and it forces/defaults it to I2P_SAM31_PORT. 226 if (to.GetPort() != I2P_SAM31_PORT) { 227 LogPrintLevel(BCLog::I2P, BCLog::Level::Debug, "Error connecting to %s, connection refused due to arbitrary port %s\n", to.ToStringAddrPort(), to.GetPort()); 228 proxy_error = false; 229 return false; 230 } 231 232 proxy_error = true; 233 234 std::string session_id; 235 std::unique_ptr<Sock> sock; 236 conn.peer = to; 237 238 try { 239 { 240 LOCK(m_mutex); 241 CreateIfNotCreatedAlready(); 242 session_id = m_session_id; 243 conn.me = m_my_addr; 244 sock = Hello(); 245 } 246 247 const Reply& lookup_reply = 248 SendRequestAndGetReply(*sock, strprintf("NAMING LOOKUP NAME=%s", to.ToStringAddr())); 249 250 const std::string& dest = lookup_reply.Get("VALUE"); 251 252 const Reply& connect_reply = SendRequestAndGetReply( 253 *sock, strprintf("STREAM CONNECT ID=%s DESTINATION=%s SILENT=false", session_id, dest), 254 false); 255 256 const std::string& result = connect_reply.Get("RESULT"); 257 258 if (result == "OK") { 259 conn.sock = std::move(sock); 260 return true; 261 } 262 263 if (result == "INVALID_ID") { 264 LOCK(m_mutex); 265 Disconnect(); 266 throw std::runtime_error("Invalid session id"); 267 } 268 269 if (result == "CANT_REACH_PEER" || result == "TIMEOUT") { 270 proxy_error = false; 271 } 272 273 throw std::runtime_error(strprintf("\"%s\"", connect_reply.full)); 274 } catch (const std::runtime_error& e) { 275 LogPrintLevel(BCLog::I2P, BCLog::Level::Debug, "Error connecting to %s: %s\n", to.ToStringAddrPort(), e.what()); 276 CheckControlSock(); 277 return false; 278 } 279 } 280 281 // Private methods 282 283 std::string Session::Reply::Get(const std::string& key) const 284 { 285 const auto& pos = keys.find(key); 286 if (pos == keys.end() || !pos->second.has_value()) { 287 throw std::runtime_error( 288 strprintf("Missing %s= in the reply to \"%s\": \"%s\"", key, request, full)); 289 } 290 return pos->second.value(); 291 } 292 293 Session::Reply Session::SendRequestAndGetReply(const Sock& sock, 294 const std::string& request, 295 bool check_result_ok) const 296 { 297 sock.SendComplete(request + "\n", MAX_WAIT_FOR_IO, *m_interrupt); 298 299 Reply reply; 300 301 // Don't log the full "SESSION CREATE ..." because it contains our private key. 302 reply.request = request.starts_with("SESSION CREATE") ? "SESSION CREATE ..." : request; 303 304 // It could take a few minutes for the I2P router to reply as it is querying the I2P network 305 // (when doing name lookup, for example). Notice: `RecvUntilTerminator()` is checking 306 // `m_interrupt` more often, so we would not be stuck here for long if `m_interrupt` is 307 // signaled. 308 static constexpr auto recv_timeout = 3min; 309 310 reply.full = sock.RecvUntilTerminator('\n', recv_timeout, *m_interrupt, MAX_MSG_SIZE); 311 312 for (const auto& kv : Split(reply.full, ' ')) { 313 const auto pos{std::ranges::find(kv, '=')}; 314 if (pos != kv.end()) { 315 reply.keys.emplace(std::string{kv.begin(), pos}, std::string{pos + 1, kv.end()}); 316 } else { 317 reply.keys.emplace(std::string{kv.begin(), kv.end()}, std::nullopt); 318 } 319 } 320 321 if (check_result_ok && reply.Get("RESULT") != "OK") { 322 throw std::runtime_error( 323 strprintf("Unexpected reply to \"%s\": \"%s\"", request, reply.full)); 324 } 325 326 return reply; 327 } 328 329 std::unique_ptr<Sock> Session::Hello() const 330 { 331 auto sock = m_control_host.Connect(); 332 333 if (!sock) { 334 throw std::runtime_error(strprintf("Cannot connect to %s", m_control_host.ToString())); 335 } 336 337 SendRequestAndGetReply(*sock, "HELLO VERSION MIN=3.1 MAX=3.1"); 338 339 return sock; 340 } 341 342 void Session::CheckControlSock() 343 { 344 LOCK(m_mutex); 345 346 std::string errmsg; 347 if (m_control_sock && !m_control_sock->IsConnected(errmsg)) { 348 LogPrintLevel(BCLog::I2P, BCLog::Level::Debug, "Control socket error: %s\n", errmsg); 349 Disconnect(); 350 } 351 } 352 353 void Session::DestGenerate(const Sock& sock) 354 { 355 // https://geti2p.net/spec/common-structures#key-certificates 356 // "7" or "EdDSA_SHA512_Ed25519" - "Recent Router Identities and Destinations". 357 // Use "7" because i2pd <2.24.0 does not recognize the textual form. 358 // If SIGNATURE_TYPE is not specified, then the default one is DSA_SHA1. 359 const Reply& reply = SendRequestAndGetReply(sock, "DEST GENERATE SIGNATURE_TYPE=7", false); 360 361 m_private_key = DecodeI2PBase64(reply.Get("PRIV")); 362 } 363 364 void Session::GenerateAndSavePrivateKey(const Sock& sock) 365 { 366 DestGenerate(sock); 367 368 // umask is set to 0077 in common/system.cpp, which is ok. 369 if (!WriteBinaryFile(m_private_key_file, 370 std::string(m_private_key.begin(), m_private_key.end()))) { 371 throw std::runtime_error( 372 strprintf("Cannot save I2P private key to %s", fs::quoted(fs::PathToString(m_private_key_file)))); 373 } 374 } 375 376 Binary Session::MyDestination() const 377 { 378 // From https://geti2p.net/spec/common-structures#destination: 379 // "They are 387 bytes plus the certificate length specified at bytes 385-386, which may be 380 // non-zero" 381 static constexpr size_t DEST_LEN_BASE = 387; 382 static constexpr size_t CERT_LEN_POS = 385; 383 384 uint16_t cert_len; 385 386 if (m_private_key.size() < CERT_LEN_POS + sizeof(cert_len)) { 387 throw std::runtime_error(strprintf("The private key is too short (%d < %d)", 388 m_private_key.size(), 389 CERT_LEN_POS + sizeof(cert_len))); 390 } 391 392 memcpy(&cert_len, &m_private_key.at(CERT_LEN_POS), sizeof(cert_len)); 393 cert_len = be16toh_internal(cert_len); 394 395 const size_t dest_len = DEST_LEN_BASE + cert_len; 396 397 if (dest_len > m_private_key.size()) { 398 throw std::runtime_error(strprintf("Certificate length (%d) designates that the private key should " 399 "be %d bytes, but it is only %d bytes", 400 cert_len, 401 dest_len, 402 m_private_key.size())); 403 } 404 405 return Binary{m_private_key.begin(), m_private_key.begin() + dest_len}; 406 } 407 408 void Session::CreateIfNotCreatedAlready() 409 { 410 std::string errmsg; 411 if (m_control_sock && m_control_sock->IsConnected(errmsg)) { 412 return; 413 } 414 415 const auto session_type = m_transient ? "transient" : "persistent"; 416 const auto session_id = GetRandHash().GetHex().substr(0, 10); // full is overkill, too verbose in the logs 417 418 LogPrintLevel(BCLog::I2P, BCLog::Level::Debug, "Creating %s SAM session %s with %s\n", session_type, session_id, m_control_host.ToString()); 419 420 auto sock = Hello(); 421 422 if (m_transient) { 423 // The destination (private key) is generated upon session creation and returned 424 // in the reply in DESTINATION=. 425 const Reply& reply = SendRequestAndGetReply( 426 *sock, 427 strprintf("SESSION CREATE STYLE=STREAM ID=%s DESTINATION=TRANSIENT SIGNATURE_TYPE=7 " 428 "i2cp.leaseSetEncType=4,0 inbound.quantity=1 outbound.quantity=1", 429 session_id)); 430 431 m_private_key = DecodeI2PBase64(reply.Get("DESTINATION")); 432 } else { 433 // Read our persistent destination (private key) from disk or generate 434 // one and save it to disk. Then use it when creating the session. 435 const auto& [read_ok, data] = ReadBinaryFile(m_private_key_file); 436 if (read_ok) { 437 m_private_key.assign(data.begin(), data.end()); 438 } else { 439 GenerateAndSavePrivateKey(*sock); 440 } 441 442 const std::string& private_key_b64 = SwapBase64(EncodeBase64(m_private_key)); 443 444 SendRequestAndGetReply(*sock, 445 strprintf("SESSION CREATE STYLE=STREAM ID=%s DESTINATION=%s " 446 "i2cp.leaseSetEncType=4,0 inbound.quantity=3 outbound.quantity=3", 447 session_id, 448 private_key_b64)); 449 } 450 451 m_my_addr = CService(DestBinToAddr(MyDestination()), I2P_SAM31_PORT); 452 m_session_id = session_id; 453 m_control_sock = std::move(sock); 454 455 LogPrintLevel(BCLog::I2P, BCLog::Level::Info, "%s SAM session %s created, my address=%s\n", 456 Capitalize(session_type), 457 m_session_id, 458 m_my_addr.ToStringAddrPort()); 459 } 460 461 std::unique_ptr<Sock> Session::StreamAccept() 462 { 463 auto sock = Hello(); 464 465 const Reply& reply = SendRequestAndGetReply( 466 *sock, strprintf("STREAM ACCEPT ID=%s SILENT=false", m_session_id), false); 467 468 const std::string& result = reply.Get("RESULT"); 469 470 if (result == "OK") { 471 return sock; 472 } 473 474 if (result == "INVALID_ID") { 475 // If our session id is invalid, then force session re-creation on next usage. 476 Disconnect(); 477 } 478 479 throw std::runtime_error(strprintf("\"%s\"", reply.full)); 480 } 481 482 void Session::Disconnect() 483 { 484 if (m_control_sock) { 485 if (m_session_id.empty()) { 486 LogPrintLevel(BCLog::I2P, BCLog::Level::Info, "Destroying incomplete SAM session\n"); 487 } else { 488 LogPrintLevel(BCLog::I2P, BCLog::Level::Info, "Destroying SAM session %s\n", m_session_id); 489 } 490 m_control_sock.reset(); 491 } 492 m_session_id.clear(); 493 } 494 } // namespace sam 495 } // namespace i2p