register: verify username and signature upon boot

This commit is contained in:
bitful-pannul 2024-03-05 19:45:16 -03:00
parent 57f7978dca
commit 01f2721e50
8 changed files with 178 additions and 42 deletions

View File

@ -31,6 +31,9 @@ alloy-rpc-types = { git = "https://github.com/alloy-rs/alloy", rev = "6f8ebb4" }
alloy-rpc-client = { git = "https://github.com/alloy-rs/alloy", rev = "6f8ebb4", features = ["ws"]}
alloy-transport-ws = { git = "https://github.com/alloy-rs/alloy", rev = "6f8ebb4" }
alloy-providers = { git = "https://github.com/alloy-rs/alloy", rev = "6f8ebb4" }
alloy-primitives = "0.6.2"
alloy-sol-macro = "0.6.2"
alloy-sol-types = "0.6.2"
alloy-signer = { git = "https://github.com/alloy-rs/alloy", rev = "6f8ebb4" }
anyhow = "1.0.71"
async-trait = "0.1.71"
@ -86,3 +89,4 @@ warp = "0.3.5"
wasmtime = "17.0.1"
wasmtime-wasi = "17.0.1"
zip = "0.6"
tiny-keccak = "1.4.2"

View File

@ -10,6 +10,7 @@ use ring::rand::SystemRandom;
use ring::signature::{self, KeyPair};
use ring::{digest as ring_digest, rand::SecureRandom};
use std::num::NonZeroU32;
use tiny_keccak::Keccak;
use lib::types::core::Keyfile;
@ -107,6 +108,24 @@ pub fn get_username_and_routers(keyfile: &[u8]) -> Result<(String, Vec<String>),
Ok((username, routers))
}
pub fn namehash(name: &str) -> Vec<u8> {
let mut node = vec![0u8; 32];
if name.is_empty() {
return node;
}
let mut labels: Vec<&str> = name.split(".").collect();
labels.reverse();
for label in labels.iter() {
let mut labelhash = [0u8; 32];
Keccak::keccak256(label.as_bytes(), &mut labelhash);
node.append(&mut labelhash.to_vec());
labelhash = [0u8; 32];
Keccak::keccak256(node.as_slice(), &mut labelhash);
node = labelhash.to_vec();
}
node
}
/// # Returns
/// a pair of (public key (encoded as a hex string), serialized key as a pkcs8 Document)
pub fn generate_networking_key() -> (String, Document) {

View File

@ -1,7 +1,7 @@
{
"files": {
"main.css": "/static/css/main.054f6f32.css",
"main.js": "/static/js/main.431aef9a.js",
"main.js": "/static/js/main.75ba0410.js",
"static/media/unknown.png": "/static/media/unknown.880d04d4611a45ab1001.png",
"static/media/background.jpg": "/static/media/background.01d2427cfc21fb685016.jpg",
"static/media/kinode.svg": "/static/media/kinode.86d0c1a6a4a3ca3be41616b5989d6925.svg",
@ -10,6 +10,6 @@
},
"entrypoints": [
"static/css/main.054f6f32.css",
"static/js/main.431aef9a.js"
"static/js/main.75ba0410.js"
]
}

View File

@ -1 +1 @@
<!doctype html><html lang="en"><head><title>Welcome - Kinode</title><meta charset="utf-8"/><meta http-equiv="pragma" content="no-cache"/><meta http-equiv="cache-control" content="no-cache"/><link rel="preconnect" href="https://fonts.googleapis.com"><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin><link href="https://fonts.googleapis.com/css2?family=Barlow+Condensed:ital,wght@0,100;0,200;0,300;0,400;0,500;0,600;0,700;0,800;0,900;1,100;1,200;1,300;1,400;1,500;1,600;1,700;1,800;1,900&display=swap" rel="stylesheet"><link rel="icon" href="data:image/svg+xml;base64,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"><meta httpequiv="X-UA-Compatible" content="IE=edge"/><meta name="viewport" content="width=device-width,initial-scale=1,minimum-scale=1,maximum-scale=1.00001,viewport-fit=cover"/><script defer="defer" src="/static/js/main.431aef9a.js"></script><link href="/static/css/main.054f6f32.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
<!doctype html><html lang="en"><head><title>Welcome - Kinode</title><meta charset="utf-8"/><meta http-equiv="pragma" content="no-cache"/><meta http-equiv="cache-control" content="no-cache"/><link rel="preconnect" href="https://fonts.googleapis.com"><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin><link href="https://fonts.googleapis.com/css2?family=Barlow+Condensed:ital,wght@0,100;0,200;0,300;0,400;0,500;0,600;0,700;0,800;0,900;1,100;1,200;1,300;1,400;1,500;1,600;1,700;1,800;1,900&display=swap" rel="stylesheet"><link rel="icon" href="data:image/svg+xml;base64,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"><meta httpequiv="X-UA-Compatible" content="IE=edge"/><meta name="viewport" content="width=device-width,initial-scale=1,minimum-scale=1,maximum-scale=1.00001,viewport-fit=cover"/><script defer="defer" src="/static/js/main.75ba0410.js"></script><link href="/static/css/main.054f6f32.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>

View File

@ -1,12 +1,22 @@
use aes_gcm::aead::KeyInit;
use alloy_primitives::{Address, Bytes, FixedBytes, U256};
use alloy_providers::provider::{Provider, TempProvider};
use alloy_pubsub::PubSubFrontend;
use alloy_rpc_client::ClientBuilder;
use alloy_rpc_types::request::{TransactionInput, TransactionRequest};
use alloy_signer::Signature;
use alloy_sol_macro::sol;
use alloy_sol_types::{SolCall, SolValue};
use alloy_transport_ws::WsConnect;
use hmac::Hmac;
use jwt::{FromBase64, SignWithKey};
use jwt::SignWithKey;
use ring::rand::SystemRandom;
use ring::signature;
use ring::signature::KeyPair;
use sha2::Sha256;
use static_dir::static_dir;
use std::str::FromStr;
use std::sync::Arc;
use std::time::{SystemTime, UNIX_EPOCH};
use tokio::sync::{mpsc, oneshot};
@ -23,8 +33,24 @@ use lib::types::core::*;
type RegistrationSender = mpsc::Sender<(Identity, Keyfile, Vec<u8>)>;
pub const KNS_SEPOLIA_ADDRESS: &str = "0x3807fBD692Aa5c96F1D8D7c59a1346a885F40B1C";
pub const KNS_OPTIMISM_ADDRESS: &str = "0xca5b5811c0C40aAB3295f932b1B5112Eb7bb4bD6";
pub const KNS_SEPOLIA_ADDRESS: Address = Address::new([
0x38, 0x07, 0xFB, 0xD6, 0x92, 0xAa, 0x5c, 0x96, 0xF1, 0xD8, 0xD7, 0xc5, 0x9a, 0x13, 0x46, 0xa8,
0x85, 0xF4, 0x0B, 0x1C,
]);
pub const KNS_OPTIMISM_ADDRESS: Address = Address::new([
0xca, 0x5b, 0x58, 0x11, 0xc0, 0xC4, 0x0a, 0xAB, 0x32, 0x95, 0xf9, 0x32, 0xb1, 0xB5, 0x11, 0x2E,
0xb7, 0xbb, 0x4b, 0xD6,
]);
sol! {
function auth(
bytes32 _node,
address _sender
) public view virtual returns (bool authed);
function nodes(bytes32) external view returns (address, uint96);
}
pub fn _ip_to_number(ip: &str) -> Result<u32, &'static str> {
let octets: Vec<&str> = ip.split('.').collect();
@ -120,6 +146,24 @@ pub async fn register(
],
});
// KnsRegistrar contract address
let kns_address = if testnet {
KNS_SEPOLIA_ADDRESS
} else {
KNS_OPTIMISM_ADDRESS
};
// This ETH provider uses public rpc endpoints to verify registration signatures.
let url = if testnet {
"wss://ethereum-sepolia-rpc.publicnode.com".to_string()
} else {
"wss://optimism-rpc.publicnode.com".to_string()
};
let connector = WsConnect { url, auth: None };
let client = ClientBuilder::default().ws(connector).await.unwrap();
let provider = Arc::new(Provider::new_with_client(client));
let keyfile = warp::any().map(move || keyfile.clone());
let our_temp_id = warp::any().map(move || our_temp_id.clone());
let net_keypair = warp::any().map(move || net_keypair.clone());
@ -182,7 +226,18 @@ pub async fn register(
.and(tx.clone())
.and(our_temp_id.clone())
.and(net_keypair.clone())
.and_then(handle_boot),
.and_then(move |boot_info, tx, our_temp_id, net_keypair| {
let provider = provider.clone();
handle_boot(
boot_info,
tx,
our_temp_id,
net_keypair,
testnet,
kns_address,
provider,
)
}),
))
.or(warp::path("import-keyfile").and(
warp::post()
@ -254,14 +309,6 @@ async fn get_unencrypted_info(keyfile: Option<Vec<u8>>) -> Result<impl Reply, Re
}
}
};
// do we need password salt here for the FE to hash the login password?
println!(
"unencrypted info return: {:?}",
UnencryptedIdentity {
name: name.clone(),
allowed_routers: allowed_routers.clone(),
}
);
return Ok(warp::reply::with_status(
warp::reply::json(&UnencryptedIdentity {
name,
@ -273,7 +320,6 @@ async fn get_unencrypted_info(keyfile: Option<Vec<u8>>) -> Result<impl Reply, Re
}
async fn generate_networking_info(our_temp_id: Arc<Identity>) -> Result<impl Reply, Rejection> {
println!("temp ID {:?}", our_temp_id.as_ref());
Ok(warp::reply::json(our_temp_id.as_ref()))
}
@ -306,10 +352,11 @@ async fn handle_boot(
sender: Arc<RegistrationSender>,
our: Arc<Identity>,
networking_keypair: Arc<Vec<u8>>,
testnet: bool,
kns_address: Address,
provider: Arc<Provider<PubSubFrontend>>,
) -> Result<impl Reply, Rejection> {
let mut our = our.as_ref().clone();
println!("bootinfo while booting: {:?}", info.clone());
println!("our while booting: {:?}", our.clone());
our.name = info.username;
if info.direct {
@ -321,33 +368,98 @@ async fn handle_boot(
let mut jwt_secret = [0u8, 32];
ring::rand::SecureRandom::fill(&jwt_seed, &mut jwt_secret).unwrap();
// let salt = base64::decode(&info.salt).map_err(|_| warp::reject())?;
//let sig = Signature::from_base64(&info.signature).map_err(|_| warp::reject())?;
// verifying owner + signature, get registrar contract, call auth()
let now = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Time went backwards")
.as_secs();
// if info.timestamp < now + 120 {
// return Ok(warp::reply::with_status(
// warp::reply::json(&"Timestamp is outdated."),
// StatusCode::UNAUTHORIZED,
// )
// .into_response());
// }
if info.timestamp < now + 120 {
return Ok(warp::reply::with_status(
warp::reply::json(&"Timestamp is outdated."),
StatusCode::UNAUTHORIZED,
)
.into_response());
}
// verify eth signature, fetch from eth?
// let sign_data = serde_json::to_vec(&serde_json::json!({
// "password": info.password,
// "timestamp": info.timestamp,
// }))
// .unwrap();
let namehash = FixedBytes::<32>::from_slice(&keygen::namehash(&our.name));
let tld_call = nodesCall { _0: namehash }.abi_encode();
let tx_input = TransactionInput::new(Bytes::from(tld_call));
let tx = TransactionRequest {
to: Some(kns_address),
input: tx_input,
..Default::default()
};
// check chain for address match...?
// let _signer = sig
// .recover_address_from_msg(&sign_data)
// .map_err(|_| warp::reject())?;
let Ok(tld) = provider.call(tx, None).await else {
return Ok(warp::reply::with_status(
warp::reply::json(&"Failed to fetch TLD contract for username"),
StatusCode::INTERNAL_SERVER_ERROR,
)
.into_response());
};
let Ok((tld_address, _)) = <(Address, U256)>::abi_decode(&tld, false) else {
return Ok(warp::reply::with_status(
warp::reply::json(&"Failed to decode TLD contract from return bytes"),
StatusCode::INTERNAL_SERVER_ERROR,
)
.into_response());
};
let owner = Address::from_str(&info.owner).map_err(|_| warp::reject())?;
let auth_call = authCall {
_node: namehash,
_sender: owner,
}
.abi_encode();
let tx_input = TransactionInput::new(Bytes::from(auth_call));
let tx = TransactionRequest {
to: Some(tld_address),
input: tx_input,
..Default::default()
};
let Ok(authed) = provider.call(tx, None).await else {
return Ok(warp::reply::with_status(
warp::reply::json(&"Failed to fetch TLD contract for username"),
StatusCode::INTERNAL_SERVER_ERROR,
)
.into_response());
};
let is_ok = bool::abi_decode(&authed, false).map_err(|_| warp::reject())?;
if !is_ok {
return Ok(warp::reply::with_status(
warp::reply::json(&"Address is not authorized for username!"),
StatusCode::UNAUTHORIZED,
)
.into_response());
};
// manual json creation to preserve order..
let sig_data_json = format!(
r#"{{"username":"{}","password":"{}","timestamp":{}}}"#,
our.name, info.password, info.timestamp
);
let sig_data = sig_data_json.as_bytes();
let sig = Signature::from_str(&info.signature).map_err(|_| warp::reject())?;
let recovered_address = sig
.recover_address_from_msg(sig_data)
.map_err(|_| warp::reject())?;
if recovered_address != owner {
return Ok(warp::reply::with_status(
warp::reply::json(&"Recovered address does not match owner"),
StatusCode::UNAUTHORIZED,
)
.into_response());
}
println!("success baby.");
let decoded_keyfile = Keyfile {
username: our.name.clone(),

View File

@ -784,8 +784,9 @@ pub struct BootInfo {
pub username: String,
pub reset: bool,
pub direct: bool,
// pub signature: String,
// pub timestamp: u64,
pub owner: String,
pub signature: String,
pub timestamp: u64,
}
#[derive(Debug, Clone, Serialize, Deserialize)]