Skip to content

Commit 63608c2

Browse files
committed
Decrypt inbound Trampoline packets
1 parent 0e61db7 commit 63608c2

File tree

3 files changed

+215
-4
lines changed

3 files changed

+215
-4
lines changed

lightning/src/ln/msgs.rs

+138
Original file line numberDiff line numberDiff line change
@@ -1812,6 +1812,36 @@ mod fuzzy_internal_msgs {
18121812
}
18131813
}
18141814

1815+
#[allow(unused)]
1816+
pub enum InboundTrampolinePayload {
1817+
Forward {
1818+
/// The value, in msat, of the payment after this hop's fee is deducted.
1819+
amt_to_forward: u64,
1820+
outgoing_cltv_value: u32,
1821+
/// The node id to which the trampoline node must find a route.
1822+
outgoing_node_id: PublicKey,
1823+
},
1824+
BlindedForward {
1825+
short_channel_id: u64,
1826+
payment_relay: PaymentRelay,
1827+
payment_constraints: PaymentConstraints,
1828+
features: BlindedHopFeatures,
1829+
intro_node_blinding_point: Option<PublicKey>,
1830+
next_blinding_override: Option<PublicKey>,
1831+
},
1832+
BlindedReceive {
1833+
sender_intended_htlc_amt_msat: u64,
1834+
total_msat: u64,
1835+
cltv_expiry_height: u32,
1836+
payment_secret: PaymentSecret,
1837+
payment_constraints: PaymentConstraints,
1838+
payment_context: PaymentContext,
1839+
intro_node_blinding_point: Option<PublicKey>,
1840+
keysend_preimage: Option<PaymentPreimage>,
1841+
custom_tlvs: Vec<(u64, Vec<u8>)>,
1842+
}
1843+
}
1844+
18151845
pub(crate) enum OutboundOnionPayload<'a> {
18161846
Forward {
18171847
short_channel_id: u64,
@@ -2990,6 +3020,114 @@ impl<NS: Deref> ReadableArgs<(Option<PublicKey>, NS)> for InboundOnionPayload wh
29903020
}
29913021
}
29923022

3023+
impl<NS: Deref> ReadableArgs<(Option<PublicKey>, NS)> for InboundTrampolinePayload where NS::Target: NodeSigner {
3024+
fn read<R: Read>(r: &mut R, args: (Option<PublicKey>, NS)) -> Result<Self, DecodeError> {
3025+
let (update_add_blinding_point, node_signer) = args;
3026+
3027+
let mut amt = None;
3028+
let mut cltv_value = None;
3029+
let mut payment_data: Option<FinalOnionHopData> = None;
3030+
let mut encrypted_tlvs_opt: Option<WithoutLength<Vec<u8>>> = None;
3031+
let mut intro_node_blinding_point = None;
3032+
let mut outgoing_node_id: Option<PublicKey> = None;
3033+
let mut total_msat = None;
3034+
let mut keysend_preimage: Option<PaymentPreimage> = None;
3035+
let mut custom_tlvs = Vec::new();
3036+
3037+
let tlv_len = <BigSize as Readable>::read(r)?;
3038+
let mut rd = FixedLengthReader::new(r, tlv_len.0);
3039+
decode_tlv_stream_with_custom_tlv_decode!(&mut rd, {
3040+
(2, amt, (option, encoding: (u64, HighZeroBytesDroppedBigSize))),
3041+
(4, cltv_value, (option, encoding: (u32, HighZeroBytesDroppedBigSize))),
3042+
(8, payment_data, option),
3043+
(10, encrypted_tlvs_opt, option),
3044+
(12, intro_node_blinding_point, option),
3045+
(14, outgoing_node_id, option),
3046+
(18, total_msat, (option, encoding: (u64, HighZeroBytesDroppedBigSize))),
3047+
// See https://github.com/lightning/blips/blob/master/blip-0003.md
3048+
(5482373484, keysend_preimage, option)
3049+
}, |msg_type: u64, msg_reader: &mut FixedLengthReader<_>| -> Result<bool, DecodeError> {
3050+
if msg_type < 1 << 16 { return Ok(false) }
3051+
let mut value = Vec::new();
3052+
msg_reader.read_to_limit(&mut value, u64::MAX)?;
3053+
custom_tlvs.push((msg_type, value));
3054+
Ok(true)
3055+
});
3056+
3057+
if amt.unwrap_or(0) > MAX_VALUE_MSAT { return Err(DecodeError::InvalidValue) }
3058+
if intro_node_blinding_point.is_some() && update_add_blinding_point.is_some() {
3059+
return Err(DecodeError::InvalidValue)
3060+
}
3061+
3062+
if let Some(blinding_point) = intro_node_blinding_point.or(update_add_blinding_point) {
3063+
if payment_data.is_some() {
3064+
return Err(DecodeError::InvalidValue)
3065+
}
3066+
let enc_tlvs = encrypted_tlvs_opt.ok_or(DecodeError::InvalidValue)?.0;
3067+
let enc_tlvs_ss = node_signer.ecdh(Recipient::Node, &blinding_point, None)
3068+
.map_err(|_| DecodeError::InvalidValue)?;
3069+
let rho = onion_utils::gen_rho_from_shared_secret(&enc_tlvs_ss.secret_bytes());
3070+
let mut s = Cursor::new(&enc_tlvs);
3071+
let mut reader = FixedLengthReader::new(&mut s, enc_tlvs.len() as u64);
3072+
match ChaChaPolyReadAdapter::read(&mut reader, rho)? {
3073+
ChaChaPolyReadAdapter { readable: BlindedPaymentTlvs::Forward(ForwardTlvs {
3074+
short_channel_id, payment_relay, payment_constraints, features, next_blinding_override
3075+
})} => {
3076+
if amt.is_some() || cltv_value.is_some() || total_msat.is_some() ||
3077+
keysend_preimage.is_some()
3078+
{
3079+
return Err(DecodeError::InvalidValue)
3080+
}
3081+
Ok(Self::BlindedForward {
3082+
short_channel_id,
3083+
payment_relay,
3084+
payment_constraints,
3085+
features,
3086+
intro_node_blinding_point,
3087+
next_blinding_override,
3088+
})
3089+
},
3090+
ChaChaPolyReadAdapter { readable: BlindedPaymentTlvs::Receive(receive_tlvs) } => {
3091+
let ReceiveTlvs { tlvs, authentication: (hmac, nonce) } = receive_tlvs;
3092+
let expanded_key = node_signer.get_inbound_payment_key();
3093+
if tlvs.verify_for_offer_payment(hmac, nonce, &expanded_key).is_err() {
3094+
return Err(DecodeError::InvalidValue);
3095+
}
3096+
3097+
let UnauthenticatedReceiveTlvs {
3098+
payment_secret, payment_constraints, payment_context,
3099+
} = tlvs;
3100+
if total_msat.unwrap_or(0) > MAX_VALUE_MSAT { return Err(DecodeError::InvalidValue) }
3101+
Ok(Self::BlindedReceive {
3102+
sender_intended_htlc_amt_msat: amt.ok_or(DecodeError::InvalidValue)?,
3103+
total_msat: total_msat.ok_or(DecodeError::InvalidValue)?,
3104+
cltv_expiry_height: cltv_value.ok_or(DecodeError::InvalidValue)?,
3105+
payment_secret,
3106+
payment_constraints,
3107+
payment_context,
3108+
intro_node_blinding_point,
3109+
keysend_preimage,
3110+
custom_tlvs,
3111+
})
3112+
},
3113+
}
3114+
} else if let Some(outgoing_node_id) = outgoing_node_id {
3115+
if payment_data.is_some() || encrypted_tlvs_opt.is_some() ||
3116+
total_msat.is_some()
3117+
{ return Err(DecodeError::InvalidValue) }
3118+
Ok(Self::Forward {
3119+
outgoing_node_id,
3120+
amt_to_forward: amt.ok_or(DecodeError::InvalidValue)?,
3121+
outgoing_cltv_value: cltv_value.ok_or(DecodeError::InvalidValue)?,
3122+
})
3123+
} else {
3124+
// unblinded Trampoline receives are not supported
3125+
return Err(DecodeError::InvalidValue);
3126+
}
3127+
}
3128+
}
3129+
3130+
29933131
impl Writeable for Ping {
29943132
fn write<W: Writer>(&self, w: &mut W) -> Result<(), io::Error> {
29953133
self.ponglen.write(w)?;

lightning/src/ln/onion_payment.rs

+38-4
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ use crate::ln::channelmanager::{BlindedFailure, BlindedForward, CLTV_FAR_FAR_AWA
1616
use crate::types::features::BlindedHopFeatures;
1717
use crate::ln::msgs;
1818
use crate::ln::onion_utils;
19-
use crate::ln::onion_utils::{HTLCFailReason, INVALID_ONION_BLINDING};
19+
use crate::ln::onion_utils::{HTLCFailReason, InboundTrampolineHop, INVALID_ONION_BLINDING};
2020
use crate::routing::gossip::NodeId;
2121
use crate::sign::{NodeSigner, Recipient};
2222
use crate::util::logger::Logger;
@@ -432,7 +432,7 @@ where
432432

433433
let next_hop = match onion_utils::decode_next_payment_hop(
434434
shared_secret, &msg.onion_routing_packet.hop_data[..], msg.onion_routing_packet.hmac,
435-
msg.payment_hash, msg.blinding_point, node_signer
435+
msg.payment_hash, msg.blinding_point, &(*node_signer)
436436
) {
437437
Ok(res) => res,
438438
Err(onion_utils::OnionDecodeErr::Malformed { err_msg, err_code }) => {
@@ -482,8 +482,42 @@ where
482482
} => {
483483
return_err!("TrampolineEntrypoint data provided in intermediary node", 0x4000 | 22, &[0; 0]);
484484
},
485-
onion_utils::Hop::Receive(msgs::InboundOnionPayload::TrampolineEntrypoint { .. }) => {
486-
todo!()
485+
onion_utils::Hop::Receive(msgs::InboundOnionPayload::TrampolineEntrypoint { ref trampoline_packet, .. }) => {
486+
{
487+
let trampoline_shared_secret = node_signer.ecdh(
488+
Recipient::Node, &trampoline_packet.public_key, blinded_node_id_tweak.as_ref(),
489+
).unwrap().secret_bytes();
490+
let next_trampoline_hop = match onion_utils::decode_next_trampoline_hop(
491+
trampoline_shared_secret, &trampoline_packet.hop_data[..], trampoline_packet.hmac,
492+
msg.payment_hash, msg.blinding_point, node_signer,
493+
) {
494+
Ok(res) => res,
495+
Err(onion_utils::OnionDecodeErr::Malformed { err_msg, err_code }) => {
496+
return_malformed_err!(err_msg, err_code);
497+
}
498+
Err(onion_utils::OnionDecodeErr::Relay { err_msg, err_code }) => {
499+
return_err!(err_msg, err_code, &[0; 0]);
500+
}
501+
};
502+
match next_trampoline_hop {
503+
InboundTrampolineHop::Forward { next_hop_data: msgs::InboundTrampolinePayload::Forward { amt_to_forward, outgoing_cltv_value, outgoing_node_id }, .. } => {
504+
let next_packet_pubkey = onion_utils::next_hop_pubkey(&secp_ctx,
505+
msg.onion_routing_packet.public_key.unwrap(), &trampoline_shared_secret);
506+
NextPacketDetails {
507+
next_packet_pubkey,
508+
outgoing_connector: HopConnector::Trampoline{
509+
shared_secret: trampoline_shared_secret,
510+
node_id: NodeId::from_pubkey(&outgoing_node_id),
511+
},
512+
outgoing_amt_msat: amt_to_forward,
513+
outgoing_cltv_value,
514+
}
515+
}
516+
_ => {
517+
todo!();
518+
}
519+
}
520+
}
487521
}
488522
onion_utils::Hop::Receive { .. } => return Ok((next_hop, shared_secret, None)),
489523
onion_utils::Hop::Forward { next_hop_data: msgs::InboundOnionPayload::Receive { .. }, .. } |

lightning/src/ln/onion_utils.rs

+39
Original file line numberDiff line numberDiff line change
@@ -1444,6 +1444,23 @@ impl Hop {
14441444
}
14451445
}
14461446

1447+
/// Data decrypted from a payment's Trampoline onion payload.
1448+
#[allow(unused)]
1449+
pub(crate) enum InboundTrampolineHop {
1450+
/// This onion payload was for us, not for forwarding to a next-hop. Contains information for
1451+
/// verifying the incoming payment.
1452+
Receive(msgs::InboundTrampolinePayload),
1453+
/// This onion payload needs to be forwarded to a next-hop.
1454+
Forward {
1455+
/// Onion payload data used in forwarding the payment.
1456+
next_hop_data: msgs::InboundTrampolinePayload,
1457+
/// HMAC of the next hop's onion packet.
1458+
next_hop_hmac: [u8; 32],
1459+
/// Bytes of the onion packet we're forwarding.
1460+
new_packet_bytes: [u8; ONION_DATA_LEN],
1461+
},
1462+
}
1463+
14471464
/// Error returned when we fail to decode the onion packet.
14481465
#[derive(Debug)]
14491466
pub(crate) enum OnionDecodeErr {
@@ -1475,6 +1492,28 @@ where
14751492
}
14761493
}
14771494

1495+
pub(crate) fn decode_next_trampoline_hop<NS: Deref>(
1496+
shared_secret: [u8; 32], hop_data: &[u8], hmac_bytes: [u8; 32], payment_hash: PaymentHash,
1497+
blinding_point: Option<PublicKey>, node_signer: NS,
1498+
) -> Result<InboundTrampolineHop, OnionDecodeErr>
1499+
where
1500+
NS::Target: NodeSigner,
1501+
{
1502+
match decode_next_hop(
1503+
shared_secret,
1504+
hop_data,
1505+
hmac_bytes,
1506+
Some(payment_hash),
1507+
(blinding_point, node_signer),
1508+
) {
1509+
Ok((next_hop_data, None)) => Ok(InboundTrampolineHop::Receive(next_hop_data)),
1510+
Ok((next_hop_data, Some((next_hop_hmac, FixedSizeOnionPacket(new_packet_bytes))))) => {
1511+
Ok(InboundTrampolineHop::Forward { next_hop_data, next_hop_hmac, new_packet_bytes })
1512+
},
1513+
Err(e) => Err(e),
1514+
}
1515+
}
1516+
14781517
/// Build a payment onion, returning the first hop msat and cltv values as well.
14791518
/// `cur_block_height` should be set to the best known block height + 1.
14801519
pub fn create_payment_onion<T: secp256k1::Signing>(

0 commit comments

Comments
 (0)