hs_descriptor.h 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. /* Copyright (c) 2016, The Tor Project, Inc. */
  2. /* See LICENSE for licensing information */
  3. /**
  4. * \file hs_descriptor.h
  5. * \brief Header file for hs_descriptor.c
  6. **/
  7. #ifndef TOR_HS_DESCRIPTOR_H
  8. #define TOR_HS_DESCRIPTOR_H
  9. #include <stdint.h>
  10. #include "or.h"
  11. #include "address.h"
  12. #include "container.h"
  13. #include "crypto.h"
  14. #include "crypto_ed25519.h"
  15. #include "torcert.h"
  16. /* The earliest descriptor format version we support. */
  17. #define HS_DESC_SUPPORTED_FORMAT_VERSION_MIN 3
  18. /* The latest descriptor format version we support. */
  19. #define HS_DESC_SUPPORTED_FORMAT_VERSION_MAX 3
  20. /* Maximum lifetime of a descriptor in seconds. The value is set at 12 hours
  21. * which is 720 minutes or 43200 seconds. */
  22. #define HS_DESC_MAX_LIFETIME (12 * 60 * 60)
  23. /* Lifetime of certificate in the descriptor. This defines the lifetime of the
  24. * descriptor signing key and the cross certification cert of that key. */
  25. #define HS_DESC_CERT_LIFETIME (24 * 60 * 60)
  26. /* Length of the salt needed for the encrypted section of a descriptor. */
  27. #define HS_DESC_ENCRYPTED_SALT_LEN 16
  28. /* Length of the secret input needed for the KDF construction which derives
  29. * the encryption key for the encrypted data section of the descriptor. This
  30. * adds up to 68 bytes being the blinded key, hashed subcredential and
  31. * revision counter. */
  32. #define HS_DESC_ENCRYPTED_SECRET_INPUT_LEN \
  33. ED25519_PUBKEY_LEN + DIGEST256_LEN + sizeof(uint64_t)
  34. /* Length of the KDF output value which is the length of the secret key,
  35. * the secret IV and MAC key length which is the length of H() output. */
  36. #define HS_DESC_ENCRYPTED_KDF_OUTPUT_LEN \
  37. CIPHER256_KEY_LEN + CIPHER_IV_LEN + DIGEST256_LEN
  38. /* We need to pad the plaintext version of the encrypted data section before
  39. * encryption and it has to be a multiple of this value. */
  40. #define HS_DESC_PLAINTEXT_PADDING_MULTIPLE 128
  41. /* XXX: Let's make sure this makes sense as an upper limit for the padded
  42. * plaintext section. Then we should enforce it as now only an assert will be
  43. * triggered if we are above it. */
  44. /* Once padded, this is the maximum length in bytes for the plaintext. */
  45. #define HS_DESC_PADDED_PLAINTEXT_MAX_LEN 8192
  46. /* Minimum length in bytes of the encrypted portion of the descriptor. */
  47. #define HS_DESC_ENCRYPTED_MIN_LEN \
  48. HS_DESC_ENCRYPTED_SALT_LEN + \
  49. HS_DESC_PLAINTEXT_PADDING_MULTIPLE + DIGEST256_LEN
  50. /* Maximum length in bytes of a full hidden service descriptor. */
  51. #define HS_DESC_MAX_LEN 50000 /* 50kb max size */
  52. /* The minimum amount of fields a descriptor should contain. The parsing of
  53. * the fields are version specific so the only required field, as a generic
  54. * view of a descriptor, is 1 that is the version field. */
  55. #define HS_DESC_PLAINTEXT_MIN_FIELDS 1
  56. /* Key length for the descriptor symmetric encryption. As specified in the
  57. * protocol, we use AES-256 for the encrypted section of the descriptor. The
  58. * following is the length in bytes and the bit size. */
  59. #define HS_DESC_ENCRYPTED_KEY_LEN CIPHER256_KEY_LEN
  60. #define HS_DESC_ENCRYPTED_BIT_SIZE (HS_DESC_ENCRYPTED_KEY_LEN * 8)
  61. /* Type of authentication in the descriptor. */
  62. typedef enum {
  63. HS_DESC_AUTH_PASSWORD = 1,
  64. HS_DESC_AUTH_ED25519 = 2,
  65. } hs_desc_auth_type_t;
  66. /* Type of encryption key in the descriptor. */
  67. typedef enum {
  68. HS_DESC_KEY_TYPE_LEGACY = 1,
  69. HS_DESC_KEY_TYPE_CURVE25519 = 2,
  70. } hs_desc_key_type_t;
  71. /* Link specifier object that contains information on how to extend to the
  72. * relay that is the address, port and handshake type. */
  73. typedef struct hs_desc_link_specifier_t {
  74. /* Indicate the type of link specifier. See trunnel ed25519_cert
  75. * specification. */
  76. uint8_t type;
  77. /* It's either an address/port or a legacy identity fingerprint. */
  78. union {
  79. /* IP address and port of the relay use to extend. */
  80. tor_addr_port_t ap;
  81. /* Legacy identity. A 20-byte SHA1 identity fingerprint. */
  82. uint8_t legacy_id[DIGEST_LEN];
  83. } u;
  84. } hs_desc_link_specifier_t;
  85. /* Introduction point information located in a descriptor. */
  86. typedef struct hs_desc_intro_point_t {
  87. /* Link specifier(s) which details how to extend to the relay. This list
  88. * contains hs_desc_link_specifier_t object. It MUST have at least one. */
  89. smartlist_t *link_specifiers;
  90. /* Authentication key used to establish the introduction point circuit and
  91. * cross-certifies the blinded public key for the replica thus signed by
  92. * the blinded key and in turn signs it. */
  93. tor_cert_t *auth_key_cert;
  94. /* Encryption key type so we know which one to use in the union below. */
  95. hs_desc_key_type_t enc_key_type;
  96. /* Keys are mutually exclusive thus the union. */
  97. union {
  98. /* Encryption key used to encrypt request to hidden service. */
  99. curve25519_keypair_t curve25519;
  100. /* Backward compat: RSA 1024 encryption key for legacy purposes.
  101. * Mutually exclusive with enc_key. */
  102. crypto_pk_t *legacy;
  103. } enc_key;
  104. /* True iff the introduction point has passed the cross certification. Upon
  105. * decoding an intro point, this must be true. */
  106. unsigned int cross_certified : 1;
  107. } hs_desc_intro_point_t;
  108. /* The encrypted data section of a descriptor. Obviously the data in this is
  109. * in plaintext but encrypted once encoded. */
  110. typedef struct hs_desc_encrypted_data_t {
  111. /* Bitfield of CREATE2 cell supported formats. The only currently supported
  112. * format is ntor. */
  113. unsigned int create2_ntor : 1;
  114. /* A list of authentication types that a client must at least support one
  115. * in order to contact the service. Contains NULL terminated strings. */
  116. smartlist_t *auth_types;
  117. /* Is this descriptor a single onion service? */
  118. unsigned int single_onion_service : 1;
  119. /* A list of intro points. Contains hs_desc_intro_point_t objects. */
  120. smartlist_t *intro_points;
  121. } hs_desc_encrypted_data_t;
  122. /* Plaintext data that is unencrypted information of the descriptor. */
  123. typedef struct hs_desc_plaintext_data_t {
  124. /* Version of the descriptor format. Spec specifies this field as a
  125. * positive integer. */
  126. uint32_t version;
  127. /* The lifetime of the descriptor in seconds. */
  128. uint32_t lifetime_sec;
  129. /* Certificate with the short-term ed22519 descriptor signing key for the
  130. * replica which is signed by the blinded public key for that replica. */
  131. tor_cert_t *signing_key_cert;
  132. /* Signing public key which is used to sign the descriptor. Same public key
  133. * as in the signing key certificate. */
  134. ed25519_public_key_t signing_pubkey;
  135. /* Blinded public key used for this descriptor derived from the master
  136. * identity key and generated for a specific replica number. */
  137. ed25519_public_key_t blinded_pubkey;
  138. /* Revision counter is incremented at each upload, regardless of whether
  139. * the descriptor has changed. This avoids leaking whether the descriptor
  140. * has changed. Spec specifies this as a 8 bytes positive integer. */
  141. uint64_t revision_counter;
  142. /* Decoding only: The base64-decoded encrypted blob from the descriptor */
  143. uint8_t *encrypted_blob;
  144. /* Decoding only: Size of the encrypted_blob */
  145. size_t encrypted_blob_size;
  146. } hs_desc_plaintext_data_t;
  147. /* Service descriptor in its decoded form. */
  148. typedef struct hs_descriptor_t {
  149. /* Contains the plaintext part of the descriptor. */
  150. hs_desc_plaintext_data_t plaintext_data;
  151. /* The following contains what's in the encrypted part of the descriptor.
  152. * It's only encrypted in the encoded version of the descriptor thus the
  153. * data contained in that object is in plaintext. */
  154. hs_desc_encrypted_data_t encrypted_data;
  155. /* Subcredentials of a service, used by the client and service to decrypt
  156. * the encrypted data. */
  157. uint8_t subcredential[DIGEST256_LEN];
  158. } hs_descriptor_t;
  159. /* Return true iff the given descriptor format version is supported. */
  160. static inline int
  161. hs_desc_is_supported_version(uint32_t version)
  162. {
  163. if (version < HS_DESC_SUPPORTED_FORMAT_VERSION_MIN ||
  164. version > HS_DESC_SUPPORTED_FORMAT_VERSION_MAX) {
  165. return 0;
  166. }
  167. return 1;
  168. }
  169. /* Public API. */
  170. void hs_descriptor_free(hs_descriptor_t *desc);
  171. void hs_desc_plaintext_data_free(hs_desc_plaintext_data_t *desc);
  172. void hs_desc_encrypted_data_free(hs_desc_encrypted_data_t *desc);
  173. int hs_desc_encode_descriptor(const hs_descriptor_t *desc,
  174. const ed25519_keypair_t *signing_kp,
  175. char **encoded_out);
  176. int hs_desc_decode_descriptor(const char *encoded,
  177. const uint8_t *subcredential,
  178. hs_descriptor_t **desc_out);
  179. int hs_desc_decode_plaintext(const char *encoded,
  180. hs_desc_plaintext_data_t *plaintext);
  181. int hs_desc_decode_encrypted(const hs_descriptor_t *desc,
  182. hs_desc_encrypted_data_t *desc_out);
  183. size_t hs_desc_plaintext_obj_size(const hs_desc_plaintext_data_t *data);
  184. #ifdef HS_DESCRIPTOR_PRIVATE
  185. /* Encoding. */
  186. STATIC char *encode_link_specifiers(const smartlist_t *specs);
  187. STATIC size_t build_plaintext_padding(const char *plaintext,
  188. size_t plaintext_len,
  189. uint8_t **padded_out);
  190. /* Decoding. */
  191. STATIC smartlist_t *decode_link_specifiers(const char *encoded);
  192. STATIC hs_desc_intro_point_t *decode_introduction_point(
  193. const hs_descriptor_t *desc,
  194. const char *text);
  195. STATIC int decode_intro_points(const hs_descriptor_t *desc,
  196. hs_desc_encrypted_data_t *desc_enc,
  197. const char *data);
  198. STATIC int encrypted_data_length_is_valid(size_t len);
  199. STATIC int cert_is_valid(tor_cert_t *cert, uint8_t type,
  200. const char *log_obj_type);
  201. STATIC int desc_sig_is_valid(const char *b64_sig,
  202. const ed25519_public_key_t *signing_pubkey,
  203. const char *encoded_desc, size_t encoded_len);
  204. STATIC void desc_intro_point_free(hs_desc_intro_point_t *ip);
  205. #endif /* HS_DESCRIPTOR_PRIVATE */
  206. #endif /* TOR_HS_DESCRIPTOR_H */