2022-11-15 19:11:16 -05:00
|
|
|
use std::{
|
2023-01-25 15:34:43 -05:00
|
|
|
convert::Infallible,
|
2022-11-15 19:11:16 -05:00
|
|
|
net::SocketAddr,
|
|
|
|
sync::{Arc, Mutex},
|
|
|
|
};
|
|
|
|
|
|
|
|
use hyper::{
|
2023-02-01 00:44:18 -05:00
|
|
|
body,
|
|
|
|
body::Bytes,
|
2022-11-15 22:04:04 -05:00
|
|
|
header::HeaderValue,
|
2023-01-25 15:23:28 -05:00
|
|
|
server::conn::AddrStream,
|
2023-01-25 15:34:43 -05:00
|
|
|
service::{make_service_fn, service_fn},
|
2023-01-25 15:23:28 -05:00
|
|
|
Body, Method, Request, Response, Server, StatusCode,
|
2022-11-15 19:11:16 -05:00
|
|
|
};
|
2023-01-25 15:23:28 -05:00
|
|
|
use lox::bridge_table::BridgeLine;
|
2023-01-30 18:14:22 -05:00
|
|
|
use lox::proto;
|
2023-01-25 15:23:28 -05:00
|
|
|
use lox::{BridgeAuth, BridgeDb, OPENINV_LENGTH};
|
2023-01-25 15:34:43 -05:00
|
|
|
use rand::RngCore;
|
2022-11-15 19:11:16 -05:00
|
|
|
use serde::{Deserialize, Serialize};
|
|
|
|
use serde_json;
|
2023-01-25 15:34:43 -05:00
|
|
|
use serde_with::serde_as;
|
2022-11-15 19:11:16 -05:00
|
|
|
|
|
|
|
#[serde_as]
|
|
|
|
#[derive(Serialize, Deserialize)]
|
|
|
|
pub struct Invite {
|
|
|
|
#[serde_as(as = "[_; OPENINV_LENGTH]")]
|
|
|
|
invite: [u8; OPENINV_LENGTH],
|
|
|
|
}
|
|
|
|
|
2023-01-25 15:34:43 -05:00
|
|
|
/// Create a random BridgeLine for testing ONLY. Do not use in production!
|
|
|
|
/// This was copied directly from lox/src/bridge_table.rs in order
|
2023-01-25 15:23:28 -05:00
|
|
|
/// to easily initialize a bridgedb/lox_auth with structurally
|
2023-01-25 15:34:43 -05:00
|
|
|
/// correct buckets to be used for Lox requests/verifications/responses.
|
|
|
|
/// In production, existing bridges should be translated into this format
|
|
|
|
/// in a private function and sorted into buckets (3 bridges/bucket is suggested
|
|
|
|
/// but experience may suggest something else) in some intelligent way.
|
|
|
|
|
|
|
|
pub fn random() -> BridgeLine {
|
|
|
|
let mut rng = rand::thread_rng();
|
|
|
|
let mut res: BridgeLine = BridgeLine::default();
|
|
|
|
// Pick a random 4-byte address
|
|
|
|
let mut addr: [u8; 4] = [0; 4];
|
|
|
|
rng.fill_bytes(&mut addr);
|
|
|
|
// If the leading byte is 224 or more, that's not a valid IPv4
|
|
|
|
// address. Choose an IPv6 address instead (but don't worry too
|
|
|
|
// much about it being well formed).
|
|
|
|
if addr[0] >= 224 {
|
|
|
|
rng.fill_bytes(&mut res.addr);
|
|
|
|
} else {
|
|
|
|
// Store an IPv4 address as a v4-mapped IPv6 address
|
|
|
|
res.addr[10] = 255;
|
|
|
|
res.addr[11] = 255;
|
|
|
|
res.addr[12..16].copy_from_slice(&addr);
|
|
|
|
};
|
|
|
|
let ports: [u16; 4] = [443, 4433, 8080, 43079];
|
|
|
|
let portidx = (rng.next_u32() % 4) as usize;
|
|
|
|
res.port = ports[portidx];
|
|
|
|
let mut fingerprint: [u8; 20] = [0; 20];
|
|
|
|
let mut cert: [u8; 52] = [0; 52];
|
|
|
|
rng.fill_bytes(&mut fingerprint);
|
|
|
|
rng.fill_bytes(&mut cert);
|
|
|
|
let infostr: String = format!(
|
|
|
|
"obfs4 {} cert={} iat-mode=0",
|
|
|
|
hex_fmt::HexFmt(fingerprint),
|
|
|
|
base64::encode_config(cert, base64::STANDARD_NO_PAD)
|
|
|
|
);
|
|
|
|
res.info[..infostr.len()].copy_from_slice(infostr.as_bytes());
|
|
|
|
res
|
|
|
|
}
|
|
|
|
|
2023-01-25 15:23:28 -05:00
|
|
|
#[derive(Clone)]
|
|
|
|
struct LoxServerContext {
|
|
|
|
db: Arc<Mutex<BridgeDb>>,
|
|
|
|
ba: Arc<Mutex<BridgeAuth>>,
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn handle(
|
|
|
|
context: LoxServerContext,
|
|
|
|
// addr: SocketAddr,
|
|
|
|
req: Request<Body>,
|
|
|
|
) -> Result<Response<Body>, Infallible> {
|
2023-02-06 13:57:23 -05:00
|
|
|
println!("Request: {:?}", req);
|
2023-01-30 18:14:22 -05:00
|
|
|
match req.method() {
|
|
|
|
&Method::OPTIONS => Ok(Response::builder()
|
|
|
|
.header("Access-Control-Allow-Origin", HeaderValue::from_static("*"))
|
|
|
|
.header("Access-Control-Allow-Headers", "accept, content-type")
|
|
|
|
.header("Access-Control-Allow-Methods", "POST")
|
|
|
|
.status(200)
|
|
|
|
.body(Body::from("Allow POST"))
|
|
|
|
.unwrap()),
|
|
|
|
_ => match (req.method(), req.uri().path()) {
|
|
|
|
(&Method::GET, "/invite") => Ok::<_, Infallible>(generate_invite(context.db)),
|
2023-02-06 17:41:26 -05:00
|
|
|
(&Method::GET, "/reachability") => Ok::<_, Infallible>(send_reachability_cred(context.ba)),
|
2023-02-06 13:57:23 -05:00
|
|
|
(&Method::GET, "/pubkeys") => Ok::<_, Infallible>(send_keys(context.ba)),
|
2023-01-30 18:14:22 -05:00
|
|
|
(&Method::POST, "/openreq") => Ok::<_, Infallible>({
|
|
|
|
let bytes = body::to_bytes(req.into_body()).await.unwrap();
|
|
|
|
verify_and_send_open_cred(bytes, context.ba)
|
|
|
|
}),
|
2023-02-06 17:41:26 -05:00
|
|
|
(&Method::POST, "/trustpromo") => Ok::<_, Infallible>({
|
|
|
|
let bytes = body::to_bytes(req.into_body()).await.unwrap();
|
|
|
|
verify_and_send_trust_promo(bytes, context.ba)
|
|
|
|
}),
|
2023-01-30 18:14:22 -05:00
|
|
|
_ => {
|
|
|
|
// Return 404 not found response.
|
|
|
|
Ok(Response::builder()
|
|
|
|
.status(StatusCode::NOT_FOUND)
|
|
|
|
.body(Body::from("Not found"))
|
|
|
|
.unwrap())
|
|
|
|
}
|
|
|
|
},
|
2023-01-25 15:23:28 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-30 18:14:22 -05:00
|
|
|
fn generate_invite(db: Arc<Mutex<lox::BridgeDb>>) -> Response<Body> {
|
|
|
|
let obj = db.lock().unwrap();
|
|
|
|
let invite = Invite {
|
|
|
|
invite: obj.invite(),
|
|
|
|
};
|
2023-02-13 16:28:24 -05:00
|
|
|
|
2023-01-30 18:14:22 -05:00
|
|
|
let token = serde_json::to_string(&invite).unwrap();
|
|
|
|
let mut resp = Response::new(Body::from(token));
|
|
|
|
resp.headers_mut()
|
|
|
|
.insert("Access-Control-Allow-Origin", HeaderValue::from_static("*"));
|
|
|
|
resp
|
|
|
|
}
|
|
|
|
|
2023-02-06 17:41:26 -05:00
|
|
|
fn send_reachability_cred(ba: Arc<Mutex<BridgeAuth>>) -> Response<Body> {
|
|
|
|
let ba_obj = ba.lock().unwrap();
|
|
|
|
let mut resp = Response::new(Body::from(serde_json::to_string(&ba_obj.reachability_pub).unwrap()));
|
|
|
|
resp.headers_mut().insert("Access-Control-Allow-Origin", HeaderValue::from_static("*"));
|
|
|
|
resp
|
|
|
|
}
|
|
|
|
|
2023-02-06 13:57:23 -05:00
|
|
|
fn send_keys(ba: Arc<Mutex<BridgeAuth>>) -> Response<Body> {
|
|
|
|
let ba_obj = ba.lock().unwrap();
|
|
|
|
// vector of public keys (to serialize)
|
|
|
|
let ba_obj_pubkeys = vec![
|
|
|
|
&ba_obj.lox_pub,
|
|
|
|
&ba_obj.migration_pub,
|
|
|
|
&ba_obj.migrationkey_pub,
|
|
|
|
&ba_obj.reachability_pub,
|
|
|
|
&ba_obj.invitation_pub,
|
|
|
|
];
|
2023-02-13 16:28:24 -05:00
|
|
|
println!("Today's date according to server: {}", ba_obj.today());
|
2023-02-06 13:57:23 -05:00
|
|
|
|
|
|
|
let mut resp = Response::new(Body::from(serde_json::to_string(&ba_obj_pubkeys).unwrap()));
|
2023-01-30 18:14:22 -05:00
|
|
|
resp.headers_mut()
|
|
|
|
.insert("Access-Control-Allow-Origin", HeaderValue::from_static("*"));
|
|
|
|
resp
|
|
|
|
}
|
2023-02-01 00:44:18 -05:00
|
|
|
|
2023-01-30 18:14:22 -05:00
|
|
|
fn verify_and_send_open_cred(request: Bytes, ba: Arc<Mutex<BridgeAuth>>) -> Response<Body> {
|
|
|
|
let req: proto::open_invite::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let mut ba_obj = ba.lock().unwrap();
|
|
|
|
let response = ba_obj.handle_open_invite(req).unwrap();
|
|
|
|
let open_invite_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
let mut resp = Response::new(Body::from(open_invite_resp_str));
|
|
|
|
resp.headers_mut()
|
|
|
|
.insert("Access-Control-Allow-Origin", HeaderValue::from_static("*"));
|
|
|
|
resp
|
|
|
|
}
|
|
|
|
|
2023-02-06 17:41:26 -05:00
|
|
|
fn verify_and_send_trust_promo(request: Bytes, ba: Arc<Mutex<BridgeAuth>>) -> Response<Body> {
|
|
|
|
let req: proto::trust_promotion::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let mut ba_obj = ba.lock().unwrap();
|
2023-02-13 16:28:24 -05:00
|
|
|
ba_obj.advance_days(31);
|
|
|
|
println!("Today's date according to server: {}", ba_obj.today());
|
2023-02-06 17:41:26 -05:00
|
|
|
let response = ba_obj.handle_trust_promotion(req).unwrap();
|
|
|
|
let trust_promo_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
let mut resp = Response::new(Body::from(trust_promo_resp_str));
|
|
|
|
resp.headers_mut()
|
|
|
|
.insert("Access-Control-Allow-Origin", HeaderValue::from_static("*"));
|
|
|
|
resp
|
|
|
|
}
|
2023-01-30 18:14:22 -05:00
|
|
|
async fn shutdown_signal() {
|
|
|
|
tokio::signal::ctrl_c()
|
|
|
|
.await
|
|
|
|
.expect("failed to listen for ctrl+c signal");
|
|
|
|
}
|
|
|
|
|
2022-11-15 19:11:16 -05:00
|
|
|
#[tokio::main]
|
|
|
|
async fn main() {
|
2023-01-25 15:34:43 -05:00
|
|
|
let num_buckets = 5;
|
2023-01-25 15:23:28 -05:00
|
|
|
// Create and initialize a new db and lox_auth
|
2022-11-15 19:11:16 -05:00
|
|
|
let mut bridgedb = BridgeDb::new();
|
2023-01-25 15:23:28 -05:00
|
|
|
let mut lox_auth = BridgeAuth::new(bridgedb.pubkey);
|
2023-01-25 15:34:43 -05:00
|
|
|
// Make 3 x num_buckets open invitation bridges, in sets of 3
|
|
|
|
for _ in 0..num_buckets {
|
2023-01-25 15:23:28 -05:00
|
|
|
let bucket = [random(), random(), random()];
|
|
|
|
lox_auth.add_openinv_bridges(bucket, &mut bridgedb);
|
2022-11-15 19:11:16 -05:00
|
|
|
}
|
|
|
|
|
2023-01-25 15:34:43 -05:00
|
|
|
// Create the encrypted bridge table
|
2023-01-25 15:23:28 -05:00
|
|
|
lox_auth.enc_bridge_table();
|
2023-01-25 15:34:43 -05:00
|
|
|
|
2023-01-25 15:23:28 -05:00
|
|
|
let context = LoxServerContext {
|
|
|
|
db: Arc::new(Mutex::new(bridgedb)),
|
|
|
|
ba: Arc::new(Mutex::new(lox_auth)),
|
|
|
|
};
|
|
|
|
|
|
|
|
let new_service = make_service_fn(move |_conn: &AddrStream| {
|
|
|
|
let context = context.clone();
|
|
|
|
let service = service_fn(move |req| {
|
|
|
|
// let addr = conn.remote_addr();
|
|
|
|
handle(context.clone(), req)
|
|
|
|
});
|
|
|
|
async move { Ok::<_, Infallible>(service) }
|
2022-11-15 19:11:16 -05:00
|
|
|
});
|
|
|
|
|
|
|
|
let addr = SocketAddr::from(([127, 0, 0, 1], 8001));
|
|
|
|
let server = Server::bind(&addr).serve(new_service);
|
|
|
|
let graceful = server.with_graceful_shutdown(shutdown_signal());
|
|
|
|
println!("Listening on {}", addr);
|
|
|
|
|
|
|
|
if let Err(e) = graceful.await {
|
|
|
|
eprintln!("server error: {}", e);
|
|
|
|
}
|
|
|
|
}
|