tlightning network base - electrum - Electrum Bitcoin wallet HTML git clone https://git.parazyd.org/electrum DIR Log DIR Files DIR Refs DIR Submodules --- DIR commit cbf8d4c78141df88e08e088646d949112248838c DIR parent 094b939a24a0bc0de0c66a023249e9618764a9ab HTML Author: ThomasV <thomasv@electrum.org> Date: Tue, 10 Apr 2018 15:53:58 +0200 lightning network base Diffstat: A lib/lnbase.py | 240 +++++++++++++++++++++++++++++++ 1 file changed, 240 insertions(+), 0 deletions(-) --- DIR diff --git a/lib/lnbase.py b/lib/lnbase.py t@@ -0,0 +1,240 @@ +#!/usr/bin/env python3 +""" + Lightning network interface for Electrum + Derived from https://gist.github.com/AdamISZ/046d05c156aaeb56cc897f85eecb3eb8 +""" + +import asyncio +import sys +import binascii +import hashlib +import hmac +import cryptography.hazmat.primitives.ciphers.aead as AEAD + +from electrum.bitcoin import public_key_from_private_key, ser_to_point, point_to_ser, string_to_number +from electrum.bitcoin import int_to_hex, bfh, rev_hex + +tcp_socket_timeout = 10 +server_response_timeout = 60 + +def decode(string): + """Return the integer value of the + bytestring b + """ + if isinstance(string, str): + string = bytes(bytearray.fromhex(string)) + result = 0 + while len(string) > 0: + result *= 256 + result += string[0] + string = string[1:] + return result + + +def encode(n, s): + """Return a bytestring version of the integer + value n, with a string length of s + """ + return bfh(rev_hex(int_to_hex(n, s))) + + +def H256(data): + return hashlib.sha256(data).digest() + +class HandshakeState(object): + prologue = b"lightning" + protocol_name = b"Noise_XK_secp256k1_ChaChaPoly_SHA256" + handshake_version = b"\x00" + def __init__(self, responder_pub): + self.responder_pub = responder_pub + self.h = H256(self.protocol_name) + self.ck = self.h + self.update(self.prologue) + self.update(self.responder_pub) + + def update(self, data): + self.h = H256(self.h + data) + return self.h + +def get_nonce_bytes(n): + """BOLT 8 requires the nonce to be 12 bytes, 4 bytes leading + zeroes and 8 bytes little endian encoded 64 bit integer. + """ + nb = b"\x00"*4 + #Encode the integer as an 8 byte byte-string + nb2 = encode(n, 8) + nb2 = bytearray(nb2) + #Little-endian is required here + nb2.reverse() + return nb + nb2 + +def aead_encrypt(k, nonce, associated_data, data): + nonce_bytes = get_nonce_bytes(nonce) + a = AEAD.ChaCha20Poly1305(k) + return a.encrypt(nonce_bytes, data, associated_data) + +def aead_decrypt(k, nonce, associated_data, data): + nonce_bytes = get_nonce_bytes(nonce) + a = AEAD.ChaCha20Poly1305(k) + #raises InvalidTag exception if it's not valid + return a.decrypt(nonce_bytes, data, associated_data) + +def get_bolt8_hkdf(salt, ikm): + """RFC5869 HKDF instantiated in the specific form + used in Lightning BOLT 8: + Extract and expand to 64 bytes using HMAC-SHA256, + with info field set to a zero length string as per BOLT8 + Return as two 32 byte fields. + """ + #Extract + prk = hmac.new(salt, msg=ikm, digestmod=hashlib.sha256).digest() + assert len(prk) == 32 + #Expand + info = b"" + T0 = b"" + T1 = hmac.new(prk, T0 + info + b"\x01", digestmod=hashlib.sha256).digest() + T2 = hmac.new(prk, T1 + info + b"\x02", digestmod=hashlib.sha256).digest() + assert len(T1 + T2) == 64 + return T1, T2 + +def get_ecdh(priv, pub): + s = string_to_number(priv) + pk = ser_to_point(pub) + pt = point_to_ser(pk * s) + return H256(pt) + +def act1_initiator_message(hs, my_privkey): + #Get a new ephemeral key + epriv, epub = create_ephemeral_key(my_privkey) + hs.update(epub) + ss = get_ecdh(epriv, hs.responder_pub) + ck2, temp_k1 = get_bolt8_hkdf(hs.ck, ss) + hs.ck = ck2 + c = aead_encrypt(temp_k1, 0, hs.h, b"") + #for next step if we do it + hs.update(c) + msg = hs.handshake_version + epub + c + assert len(msg) == 50 + return msg + +def privkey_to_pubkey(priv): + pub = public_key_from_private_key(priv[:32], True) + return bytes.fromhex(pub) + +def create_ephemeral_key(privkey): + pub = privkey_to_pubkey(privkey) + return (privkey[:32], pub) + +def process_message(message): + print("Received %d bytes: "%len(message), binascii.hexlify(message)) + +def send_message(writer, msg, sk, sn): + print("Sending %d bytes: "%len(msg), binascii.hexlify(msg)) + l = encode(len(msg), 2) + lc = aead_encrypt(sk, sn, b'', l) + c = aead_encrypt(sk, sn+1, b'', msg) + assert len(lc) == 18 + assert len(c) == len(msg) + 16 + writer.write(lc+c) + + +async def read_message(reader, rk, rn): + rspns = b'' + while True: + rspns += await reader.read(2**10) + print("buffer %d bytes:"%len(rspns), binascii.hexlify(rspns)) + lc = rspns[:18] + l = aead_decrypt(rk, rn, b'', lc) + length = decode(l) + if len(rspns) < 18 + length + 16: + continue + c = rspns[18:18 + length + 16] + msg = aead_decrypt(rk, rn+1, b'', c) + return msg + + + +async def main_loop(my_privkey, host, port, pubkey, loop): + reader, writer = await asyncio.open_connection(host, port, loop=loop) + + hs = HandshakeState(pubkey) + msg = act1_initiator_message(hs, my_privkey) + + # handshake act 1 + writer.write(msg) + rspns = await reader.read(2**10) + assert len(rspns) == 50 + hver, alice_epub, tag = rspns[0], rspns[1:34], rspns[34:] + assert bytes([hver]) == hs.handshake_version + + # handshake act 2 + hs.update(alice_epub) + myepriv, myepub = create_ephemeral_key(my_privkey) + ss = get_ecdh(myepriv, alice_epub) + ck, temp_k2 = get_bolt8_hkdf(hs.ck, ss) + hs.ck = ck + p = aead_decrypt(temp_k2, 0, hs.h, tag) + hs.update(tag) + + # handshake act 3 + my_pubkey = privkey_to_pubkey(my_privkey) + c = aead_encrypt(temp_k2, 1, hs.h, my_pubkey) + hs.update(c) + ss = get_ecdh(my_privkey[:32], alice_epub) + ck, temp_k3 = get_bolt8_hkdf(hs.ck, ss) + hs.ck = ck + t = aead_encrypt(temp_k3, 0, hs.h, b'') + sk, rk = get_bolt8_hkdf(hs.ck, b'') + msg = hs.handshake_version + c + t + writer.write(msg) + + # init counters + sn = 0 + rn = 0 + + # read init + msg = await read_message(reader, rk, rn) + process_message(msg) + rn += 2 + + # send init + init_msg = encode(16, 2) + encode(0, 2) +encode(0,2) + send_message(writer, init_msg, sk, sn) + sn += 2 + + # send ping + msg_type = 18 + num_pong_bytes = 4 + byteslen = 4 + ping_msg = encode(msg_type, 2) + encode(num_pong_bytes, 2) + encode(byteslen, 2) + b'\x00'*byteslen + send_message(writer, ping_msg, sk, sn) + sn += 2 + + # read pong + msg = await read_message(reader, rk, rn) + process_message(msg) + rn += 2 + + # close socket + writer.close() + + + + +node_list = [ + ('ecdsa.net', '9735', '038370f0e7a03eded3e1d41dc081084a87f0afa1c5b22090b4f3abb391eb15d8ff'), + ('77.58.162.148', '9735', '022bb78ab9df617aeaaf37f6644609abb7295fad0c20327bccd41f8d69173ccb49') + ] + + +if __name__ == "__main__": + if len(sys.argv) > 1: + host, port, pubkey = sys.argv[1:4] + else: + host, port, pubkey = node_list[0] + pubkey = binascii.unhexlify(pubkey) + port = int(port) + privkey = b"\x21"*32 + b"\x01" + loop = asyncio.get_event_loop() + loop.run_until_complete(main_loop(privkey, host, port, pubkey, loop)) + loop.close()