push.go 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332
  1. /*
  2. * Copyright (c) 2026, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. // Package push implements server entry push payloads, which support pushing
  20. // server entries to clients through external distribution channels. Push
  21. // payloads use the compact packed CBOR server entry representation.
  22. //
  23. // Each server entry has an optional prioritize dial flag which is equivalent
  24. // to dsl.VersionedServerEntryTag.PrioritizedDial.
  25. //
  26. // Payloads include an expiry date to ensure freshness and mitigate replay
  27. // attacks. The entire payload is digitally signed, and an obfuscation layer
  28. // is added on top.
  29. package push
  30. import (
  31. "bytes"
  32. "crypto/aes"
  33. "crypto/cipher"
  34. "crypto/ed25519"
  35. "crypto/rand"
  36. "crypto/sha256"
  37. "encoding/base64"
  38. "time"
  39. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
  40. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  41. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  42. "github.com/fxamacker/cbor/v2"
  43. )
  44. const (
  45. obfuscationKeySize = 32
  46. signaturePublicKeyDigestSize = 8
  47. )
  48. // Payload is a push payload, consisting of a list of server entries. To
  49. // ensure stale server entries and stale dial prioritizations are not
  50. // imported, the list has an expiry timestamp.
  51. type Payload struct {
  52. Expires time.Time `cbor:"1,keyasint,omitempty"`
  53. PrioritizedServerEntries []*PrioritizedServerEntry `cbor:"2,keyasint,omitempty"`
  54. }
  55. // SignedPayload is Payload with a digital signature.
  56. type SignedPayload struct {
  57. Signature []byte `cbor:"1,keyasint,omitempty"`
  58. Payload []byte `cbor:"2,keyasint,omitempty"`
  59. Padding []byte `cbor:"3,keyasint,omitempty"`
  60. }
  61. // PrioritizedServerEntry is a server entry paired with a server entry source
  62. // description and a dial prioritization indication. PrioritizeDial is
  63. // equivalent to DSL prioritized dials.
  64. type PrioritizedServerEntry struct {
  65. ServerEntryFields protocol.PackedServerEntryFields `cbor:"1,keyasint,omitempty"`
  66. Source string `cbor:"2,keyasint,omitempty"`
  67. PrioritizeDial bool `cbor:"3,keyasint,omitempty"`
  68. }
  69. // ServerEntryImporter is a callback that is invoked for each server entry in
  70. // an imported push payload.
  71. type ServerEntryImporter func(
  72. packedServerEntryFields protocol.PackedServerEntryFields,
  73. source string,
  74. prioritizeDial bool) error
  75. // GenerateKeys generates a new obfuscation key and signature key pair for
  76. // push payloads.
  77. func GenerateKeys() (
  78. payloadObfuscationKey string,
  79. payloadSignaturePublicKey string,
  80. payloadSignaturePrivateKey string,
  81. err error) {
  82. obfuscationKey := make([]byte, obfuscationKeySize)
  83. _, err = rand.Read(obfuscationKey)
  84. if err != nil {
  85. return "", "", "", errors.Trace(err)
  86. }
  87. publicKey, privateKey, err := ed25519.GenerateKey(rand.Reader)
  88. if err != nil {
  89. return "", "", "", errors.Trace(err)
  90. }
  91. return base64.StdEncoding.EncodeToString(obfuscationKey),
  92. base64.StdEncoding.EncodeToString(publicKey),
  93. base64.StdEncoding.EncodeToString(privateKey),
  94. nil
  95. }
  96. // ImportPushPayload imports the input push payload. The ServerEntryImporter
  97. // callback is invoked for each imported server entry and its associated
  98. // source and prioritizeDial data.
  99. func ImportPushPayload(
  100. payloadObfuscationKey string,
  101. payloadSignaturePublicKey string,
  102. obfuscatedPayload []byte,
  103. serverEntryImporter ServerEntryImporter) (int, error) {
  104. obfuscationKey, err := base64.StdEncoding.DecodeString(
  105. payloadObfuscationKey)
  106. if err == nil && len(obfuscationKey) != obfuscationKeySize {
  107. err = errors.TraceNew("unexpected obfuscation key size")
  108. }
  109. if err != nil {
  110. return 0, errors.Trace(err)
  111. }
  112. publicKey, err := base64.StdEncoding.DecodeString(
  113. payloadSignaturePublicKey)
  114. if err == nil && len(publicKey) != ed25519.PublicKeySize {
  115. err = errors.TraceNew("unexpected signature public key size")
  116. }
  117. if err != nil {
  118. return 0, errors.Trace(err)
  119. }
  120. blockCipher, err := aes.NewCipher(obfuscationKey)
  121. if err != nil {
  122. return 0, errors.Trace(err)
  123. }
  124. aead, err := cipher.NewGCM(blockCipher)
  125. if err != nil {
  126. return 0, errors.Trace(err)
  127. }
  128. if len(obfuscatedPayload) < aead.NonceSize() {
  129. return 0, errors.TraceNew("missing nonce")
  130. }
  131. cborSignedPayload, err := aead.Open(
  132. nil,
  133. obfuscatedPayload[:aead.NonceSize()],
  134. obfuscatedPayload[aead.NonceSize():],
  135. nil)
  136. if err != nil {
  137. return 0, errors.Trace(err)
  138. }
  139. var signedPayload SignedPayload
  140. err = cbor.Unmarshal(cborSignedPayload, &signedPayload)
  141. if err != nil {
  142. return 0, errors.Trace(err)
  143. }
  144. if len(signedPayload.Signature) !=
  145. signaturePublicKeyDigestSize+ed25519.SignatureSize {
  146. return 0, errors.TraceNew("invalid signature size")
  147. }
  148. publicKeyDigest := sha256.Sum256(publicKey)
  149. expectedPublicKeyID := publicKeyDigest[:signaturePublicKeyDigestSize]
  150. if !bytes.Equal(
  151. expectedPublicKeyID,
  152. signedPayload.Signature[:signaturePublicKeyDigestSize]) {
  153. return 0, errors.TraceNew("unexpected signature public key ID")
  154. }
  155. if !ed25519.Verify(
  156. publicKey,
  157. signedPayload.Payload,
  158. signedPayload.Signature[signaturePublicKeyDigestSize:]) {
  159. return 0, errors.TraceNew("invalid signature")
  160. }
  161. var payload Payload
  162. err = cbor.Unmarshal(signedPayload.Payload, &payload)
  163. if err != nil {
  164. return 0, errors.Trace(err)
  165. }
  166. if payload.Expires.Before(time.Now().UTC()) {
  167. return 0, errors.TraceNew("payload expired")
  168. }
  169. imported := 0
  170. for _, prioritizedServerEntry := range payload.PrioritizedServerEntries {
  171. err := serverEntryImporter(
  172. prioritizedServerEntry.ServerEntryFields,
  173. prioritizedServerEntry.Source,
  174. prioritizedServerEntry.PrioritizeDial)
  175. if err != nil {
  176. return imported, errors.Trace(err)
  177. }
  178. imported += 1
  179. }
  180. return imported, nil
  181. }
  182. // MakePushPayloads generates batches of push payloads.
  183. func MakePushPayloads(
  184. payloadObfuscationKey string,
  185. minPadding int,
  186. maxPadding int,
  187. payloadSignaturePublicKey string,
  188. payloadSignaturePrivateKey string,
  189. TTL time.Duration,
  190. prioritizedServerEntries [][]*PrioritizedServerEntry) ([][]byte, error) {
  191. obfuscationKey, err := base64.StdEncoding.DecodeString(
  192. payloadObfuscationKey)
  193. if err == nil && len(obfuscationKey) != obfuscationKeySize {
  194. err = errors.TraceNew("unexpected obfuscation key size")
  195. }
  196. if err != nil {
  197. return nil, errors.Trace(err)
  198. }
  199. publicKey, err := base64.StdEncoding.DecodeString(
  200. payloadSignaturePublicKey)
  201. if err == nil && len(publicKey) != ed25519.PublicKeySize {
  202. err = errors.TraceNew("unexpected signature public key size")
  203. }
  204. if err != nil {
  205. return nil, errors.Trace(err)
  206. }
  207. privateKey, err := base64.StdEncoding.DecodeString(
  208. payloadSignaturePrivateKey)
  209. if err == nil && len(privateKey) != ed25519.PrivateKeySize {
  210. err = errors.TraceNew("unexpected signature private key size")
  211. }
  212. if err != nil {
  213. return nil, errors.Trace(err)
  214. }
  215. expires := time.Now().Add(TTL).UTC()
  216. maxPaddingLimit := 65535
  217. if minPadding > maxPadding || maxPadding > 65535 {
  218. return nil, errors.TraceNew("invalid min/max padding")
  219. }
  220. blockCipher, err := aes.NewCipher(obfuscationKey)
  221. if err != nil {
  222. return nil, errors.Trace(err)
  223. }
  224. aead, err := cipher.NewGCM(blockCipher)
  225. if err != nil {
  226. return nil, errors.Trace(err)
  227. }
  228. publicKeyDigest := sha256.Sum256(publicKey)
  229. publicKeyID := publicKeyDigest[:signaturePublicKeyDigestSize]
  230. // Reuse buffers to reduce some allocations.
  231. var signatureBuffer []byte
  232. var obfuscationBuffer []byte
  233. nonceBuffer := make([]byte, aead.NonceSize())
  234. var paddingBuffer []byte
  235. obfuscatedPayloads := [][]byte{}
  236. for _, p := range prioritizedServerEntries {
  237. payload := Payload{
  238. Expires: expires,
  239. PrioritizedServerEntries: p,
  240. }
  241. cborPayload, err := protocol.CBOREncoding.Marshal(&payload)
  242. if err != nil {
  243. return nil, errors.Trace(err)
  244. }
  245. signature := ed25519.Sign(privateKey, cborPayload)
  246. signatureBuffer = signatureBuffer[:0]
  247. signatureBuffer = append(signatureBuffer, publicKeyID...)
  248. signatureBuffer = append(signatureBuffer, signature...)
  249. signedPayload := SignedPayload{
  250. Signature: signatureBuffer,
  251. Payload: cborPayload,
  252. }
  253. // Padding is an optional part of the obfuscation layer.
  254. if maxPadding > 0 {
  255. paddingSize := prng.Range(minPadding, maxPadding)
  256. if paddingBuffer == nil {
  257. paddingBuffer = make([]byte, maxPaddingLimit)
  258. }
  259. if paddingSize > 0 {
  260. signedPayload.Padding = paddingBuffer[0:paddingSize]
  261. }
  262. }
  263. cborSignedPayload, err := protocol.CBOREncoding.
  264. Marshal(&signedPayload)
  265. if err != nil {
  266. return nil, errors.Trace(err)
  267. }
  268. // The faster common/prng is appropriate for obfuscation.
  269. prng.Read(nonceBuffer[:])
  270. obfuscationBuffer = obfuscationBuffer[:0]
  271. obfuscationBuffer = append(obfuscationBuffer, nonceBuffer...)
  272. obfuscationBuffer = aead.Seal(
  273. obfuscationBuffer, nonceBuffer[:], cborSignedPayload, nil)
  274. obfuscatedPayloads = append(
  275. obfuscatedPayloads, append([]byte(nil), obfuscationBuffer...))
  276. }
  277. return obfuscatedPayloads, nil
  278. }