X-Git-Url: http://www.git.stargrave.org/?a=blobdiff_plain;f=handshake.go;h=b38a7086e83227003b7c5f7b5ef0af120dc76986;hb=HEAD;hp=0afc4a861716aa50ab638ef50928afe4b536e537;hpb=b38996ae2a01564e9089e389b67cf86bf5745f98;p=btrtrc.git diff --git a/handshake.go b/handshake.go index 0afc4a86..b38a7086 100644 --- a/handshake.go +++ b/handshake.go @@ -2,136 +2,15 @@ package torrent import ( "bytes" - "encoding/hex" "fmt" "io" "net" "time" - pp "github.com/anacrolix/torrent/peer_protocol" - - "github.com/anacrolix/missinggo" - "github.com/anacrolix/torrent/metainfo" "github.com/anacrolix/torrent/mse" + pp "github.com/anacrolix/torrent/peer_protocol" ) -type ExtensionBit uint - -const ( - ExtensionBitDHT = 0 // http://www.bittorrent.org/beps/bep_0005.html - ExtensionBitExtended = 20 // http://www.bittorrent.org/beps/bep_0010.html - ExtensionBitFast = 2 // http://www.bittorrent.org/beps/bep_0006.html -) - -func handshakeWriter(w io.Writer, bb <-chan []byte, done chan<- error) { - var err error - for b := range bb { - _, err = w.Write(b) - if err != nil { - break - } - } - done <- err -} - -type ( - peerExtensionBytes [8]byte - peerID [20]byte -) - -func (pex peerExtensionBytes) SupportsExtended() bool { - return pex.GetBit(ExtensionBitExtended) -} - -func (pex peerExtensionBytes) SupportsDHT() bool { - return pex.GetBit(ExtensionBitDHT) -} - -func (pex peerExtensionBytes) SupportsFast() bool { - return pex.GetBit(ExtensionBitFast) -} - -func (pex *peerExtensionBytes) SetBit(bit ExtensionBit) { - pex[7-bit/8] |= 1 << bit % 8 -} - -func (pex peerExtensionBytes) GetBit(bit ExtensionBit) bool { - return pex[7-bit/8]&(1<<(bit%8)) != 0 -} - -type handshakeResult struct { - peerExtensionBytes - peerID - metainfo.Hash -} - -// ih is nil if we expect the peer to declare the InfoHash, such as when the -// peer initiated the connection. Returns ok if the handshake was successful, -// and err if there was an unexpected condition other than the peer simply -// abandoning the handshake. -func handshake(sock io.ReadWriter, ih *metainfo.Hash, peerID [20]byte, extensions peerExtensionBytes) (res handshakeResult, ok bool, err error) { - // Bytes to be sent to the peer. Should never block the sender. - postCh := make(chan []byte, 4) - // A single error value sent when the writer completes. - writeDone := make(chan error, 1) - // Performs writes to the socket and ensures posts don't block. - go handshakeWriter(sock, postCh, writeDone) - - defer func() { - close(postCh) // Done writing. - if !ok { - return - } - if err != nil { - panic(err) - } - // Wait until writes complete before returning from handshake. - err = <-writeDone - if err != nil { - err = fmt.Errorf("error writing: %s", err) - } - }() - - post := func(bb []byte) { - select { - case postCh <- bb: - default: - panic("mustn't block while posting") - } - } - - post([]byte(pp.Protocol)) - post(extensions[:]) - if ih != nil { // We already know what we want. - post(ih[:]) - post(peerID[:]) - } - var b [68]byte - _, err = io.ReadFull(sock, b[:68]) - if err != nil { - err = nil - return - } - if string(b[:20]) != pp.Protocol { - return - } - missinggo.CopyExact(&res.peerExtensionBytes, b[20:28]) - missinggo.CopyExact(&res.Hash, b[28:48]) - missinggo.CopyExact(&res.peerID, b[48:68]) - peerExtensions.Add(hex.EncodeToString(res.peerExtensionBytes[:]), 1) - - // TODO: Maybe we can just drop peers here if we're not interested. This - // could prevent them trying to reconnect, falsely believing there was - // just a problem. - if ih == nil { // We were waiting for the peer to tell us what they wanted. - post(res.Hash[:]) - post(peerID[:]) - } - - ok = true - return -} - // Wraps a raw connection and provides the interface we want for using the // connection in the message loop. type deadlineReader struct { @@ -148,22 +27,26 @@ func (r deadlineReader) Read(b []byte) (int, error) { return r.r.Read(b) } +// Handles stream encryption for inbound connections. func handleEncryption( rw io.ReadWriter, skeys mse.SecretKeyIter, - policy EncryptionPolicy, + policy HeaderObfuscationPolicy, + selector mse.CryptoSelector, ) ( ret io.ReadWriter, headerEncrypted bool, - cryptoMethod uint32, + cryptoMethod mse.CryptoMethod, err error, ) { - if !policy.ForceEncryption { + // Tries to start an unencrypted stream. + if !policy.RequirePreferred || !policy.Preferred { var protocol [len(pp.Protocol)]byte _, err = io.ReadFull(rw, protocol[:]) if err != nil { return } + // Put the protocol back into the stream. rw = struct { io.Reader io.Writer @@ -175,22 +58,15 @@ func handleEncryption( ret = rw return } + if policy.RequirePreferred { + // We are here because we require unencrypted connections. + err = fmt.Errorf("unexpected protocol string %q and header obfuscation disabled", protocol) + return + } } headerEncrypted = true - ret, err = mse.ReceiveHandshake(rw, skeys, func(provides uint32) uint32 { - cryptoMethod = func() uint32 { - switch { - case policy.ForceEncryption: - return mse.CryptoMethodRC4 - case policy.DisableEncryption: - return mse.CryptoMethodPlaintext - case policy.PreferNoEncryption && provides&mse.CryptoMethodPlaintext != 0: - return mse.CryptoMethodPlaintext - default: - return mse.DefaultCryptoSelector(provides) - } - }() - return cryptoMethod - }) + ret, cryptoMethod, err = mse.ReceiveHandshake(rw, skeys, selector) return } + +type PeerExtensionBits = pp.PeerExtensionBits