mirror of
https://github.com/LBRYFoundation/LBRY-Vault.git
synced 2025-08-28 07:51:27 +00:00
lightning network base
This commit is contained in:
parent
094b939a24
commit
cbf8d4c781
1 changed files with 240 additions and 0 deletions
240
lib/lnbase.py
Normal file
240
lib/lnbase.py
Normal file
|
@ -0,0 +1,240 @@
|
|||
#!/usr/bin/env python3
|
||||
"""
|
||||
Lightning network interface for Electrum
|
||||
Derived from https://gist.github.com/AdamISZ/046d05c156aaeb56cc897f85eecb3eb8
|
||||
"""
|
||||
|
||||
import asyncio
|
||||
import sys
|
||||
import binascii
|
||||
import hashlib
|
||||
import hmac
|
||||
import cryptography.hazmat.primitives.ciphers.aead as AEAD
|
||||
|
||||
from electrum.bitcoin import public_key_from_private_key, ser_to_point, point_to_ser, string_to_number
|
||||
from electrum.bitcoin import int_to_hex, bfh, rev_hex
|
||||
|
||||
tcp_socket_timeout = 10
|
||||
server_response_timeout = 60
|
||||
|
||||
def decode(string):
|
||||
"""Return the integer value of the
|
||||
bytestring b
|
||||
"""
|
||||
if isinstance(string, str):
|
||||
string = bytes(bytearray.fromhex(string))
|
||||
result = 0
|
||||
while len(string) > 0:
|
||||
result *= 256
|
||||
result += string[0]
|
||||
string = string[1:]
|
||||
return result
|
||||
|
||||
|
||||
def encode(n, s):
|
||||
"""Return a bytestring version of the integer
|
||||
value n, with a string length of s
|
||||
"""
|
||||
return bfh(rev_hex(int_to_hex(n, s)))
|
||||
|
||||
|
||||
def H256(data):
|
||||
return hashlib.sha256(data).digest()
|
||||
|
||||
class HandshakeState(object):
|
||||
prologue = b"lightning"
|
||||
protocol_name = b"Noise_XK_secp256k1_ChaChaPoly_SHA256"
|
||||
handshake_version = b"\x00"
|
||||
def __init__(self, responder_pub):
|
||||
self.responder_pub = responder_pub
|
||||
self.h = H256(self.protocol_name)
|
||||
self.ck = self.h
|
||||
self.update(self.prologue)
|
||||
self.update(self.responder_pub)
|
||||
|
||||
def update(self, data):
|
||||
self.h = H256(self.h + data)
|
||||
return self.h
|
||||
|
||||
def get_nonce_bytes(n):
|
||||
"""BOLT 8 requires the nonce to be 12 bytes, 4 bytes leading
|
||||
zeroes and 8 bytes little endian encoded 64 bit integer.
|
||||
"""
|
||||
nb = b"\x00"*4
|
||||
#Encode the integer as an 8 byte byte-string
|
||||
nb2 = encode(n, 8)
|
||||
nb2 = bytearray(nb2)
|
||||
#Little-endian is required here
|
||||
nb2.reverse()
|
||||
return nb + nb2
|
||||
|
||||
def aead_encrypt(k, nonce, associated_data, data):
|
||||
nonce_bytes = get_nonce_bytes(nonce)
|
||||
a = AEAD.ChaCha20Poly1305(k)
|
||||
return a.encrypt(nonce_bytes, data, associated_data)
|
||||
|
||||
def aead_decrypt(k, nonce, associated_data, data):
|
||||
nonce_bytes = get_nonce_bytes(nonce)
|
||||
a = AEAD.ChaCha20Poly1305(k)
|
||||
#raises InvalidTag exception if it's not valid
|
||||
return a.decrypt(nonce_bytes, data, associated_data)
|
||||
|
||||
def get_bolt8_hkdf(salt, ikm):
|
||||
"""RFC5869 HKDF instantiated in the specific form
|
||||
used in Lightning BOLT 8:
|
||||
Extract and expand to 64 bytes using HMAC-SHA256,
|
||||
with info field set to a zero length string as per BOLT8
|
||||
Return as two 32 byte fields.
|
||||
"""
|
||||
#Extract
|
||||
prk = hmac.new(salt, msg=ikm, digestmod=hashlib.sha256).digest()
|
||||
assert len(prk) == 32
|
||||
#Expand
|
||||
info = b""
|
||||
T0 = b""
|
||||
T1 = hmac.new(prk, T0 + info + b"\x01", digestmod=hashlib.sha256).digest()
|
||||
T2 = hmac.new(prk, T1 + info + b"\x02", digestmod=hashlib.sha256).digest()
|
||||
assert len(T1 + T2) == 64
|
||||
return T1, T2
|
||||
|
||||
def get_ecdh(priv, pub):
|
||||
s = string_to_number(priv)
|
||||
pk = ser_to_point(pub)
|
||||
pt = point_to_ser(pk * s)
|
||||
return H256(pt)
|
||||
|
||||
def act1_initiator_message(hs, my_privkey):
|
||||
#Get a new ephemeral key
|
||||
epriv, epub = create_ephemeral_key(my_privkey)
|
||||
hs.update(epub)
|
||||
ss = get_ecdh(epriv, hs.responder_pub)
|
||||
ck2, temp_k1 = get_bolt8_hkdf(hs.ck, ss)
|
||||
hs.ck = ck2
|
||||
c = aead_encrypt(temp_k1, 0, hs.h, b"")
|
||||
#for next step if we do it
|
||||
hs.update(c)
|
||||
msg = hs.handshake_version + epub + c
|
||||
assert len(msg) == 50
|
||||
return msg
|
||||
|
||||
def privkey_to_pubkey(priv):
|
||||
pub = public_key_from_private_key(priv[:32], True)
|
||||
return bytes.fromhex(pub)
|
||||
|
||||
def create_ephemeral_key(privkey):
|
||||
pub = privkey_to_pubkey(privkey)
|
||||
return (privkey[:32], pub)
|
||||
|
||||
def process_message(message):
|
||||
print("Received %d bytes: "%len(message), binascii.hexlify(message))
|
||||
|
||||
def send_message(writer, msg, sk, sn):
|
||||
print("Sending %d bytes: "%len(msg), binascii.hexlify(msg))
|
||||
l = encode(len(msg), 2)
|
||||
lc = aead_encrypt(sk, sn, b'', l)
|
||||
c = aead_encrypt(sk, sn+1, b'', msg)
|
||||
assert len(lc) == 18
|
||||
assert len(c) == len(msg) + 16
|
||||
writer.write(lc+c)
|
||||
|
||||
|
||||
async def read_message(reader, rk, rn):
|
||||
rspns = b''
|
||||
while True:
|
||||
rspns += await reader.read(2**10)
|
||||
print("buffer %d bytes:"%len(rspns), binascii.hexlify(rspns))
|
||||
lc = rspns[:18]
|
||||
l = aead_decrypt(rk, rn, b'', lc)
|
||||
length = decode(l)
|
||||
if len(rspns) < 18 + length + 16:
|
||||
continue
|
||||
c = rspns[18:18 + length + 16]
|
||||
msg = aead_decrypt(rk, rn+1, b'', c)
|
||||
return msg
|
||||
|
||||
|
||||
|
||||
async def main_loop(my_privkey, host, port, pubkey, loop):
|
||||
reader, writer = await asyncio.open_connection(host, port, loop=loop)
|
||||
|
||||
hs = HandshakeState(pubkey)
|
||||
msg = act1_initiator_message(hs, my_privkey)
|
||||
|
||||
# handshake act 1
|
||||
writer.write(msg)
|
||||
rspns = await reader.read(2**10)
|
||||
assert len(rspns) == 50
|
||||
hver, alice_epub, tag = rspns[0], rspns[1:34], rspns[34:]
|
||||
assert bytes([hver]) == hs.handshake_version
|
||||
|
||||
# handshake act 2
|
||||
hs.update(alice_epub)
|
||||
myepriv, myepub = create_ephemeral_key(my_privkey)
|
||||
ss = get_ecdh(myepriv, alice_epub)
|
||||
ck, temp_k2 = get_bolt8_hkdf(hs.ck, ss)
|
||||
hs.ck = ck
|
||||
p = aead_decrypt(temp_k2, 0, hs.h, tag)
|
||||
hs.update(tag)
|
||||
|
||||
# handshake act 3
|
||||
my_pubkey = privkey_to_pubkey(my_privkey)
|
||||
c = aead_encrypt(temp_k2, 1, hs.h, my_pubkey)
|
||||
hs.update(c)
|
||||
ss = get_ecdh(my_privkey[:32], alice_epub)
|
||||
ck, temp_k3 = get_bolt8_hkdf(hs.ck, ss)
|
||||
hs.ck = ck
|
||||
t = aead_encrypt(temp_k3, 0, hs.h, b'')
|
||||
sk, rk = get_bolt8_hkdf(hs.ck, b'')
|
||||
msg = hs.handshake_version + c + t
|
||||
writer.write(msg)
|
||||
|
||||
# init counters
|
||||
sn = 0
|
||||
rn = 0
|
||||
|
||||
# read init
|
||||
msg = await read_message(reader, rk, rn)
|
||||
process_message(msg)
|
||||
rn += 2
|
||||
|
||||
# send init
|
||||
init_msg = encode(16, 2) + encode(0, 2) +encode(0,2)
|
||||
send_message(writer, init_msg, sk, sn)
|
||||
sn += 2
|
||||
|
||||
# send ping
|
||||
msg_type = 18
|
||||
num_pong_bytes = 4
|
||||
byteslen = 4
|
||||
ping_msg = encode(msg_type, 2) + encode(num_pong_bytes, 2) + encode(byteslen, 2) + b'\x00'*byteslen
|
||||
send_message(writer, ping_msg, sk, sn)
|
||||
sn += 2
|
||||
|
||||
# read pong
|
||||
msg = await read_message(reader, rk, rn)
|
||||
process_message(msg)
|
||||
rn += 2
|
||||
|
||||
# close socket
|
||||
writer.close()
|
||||
|
||||
|
||||
|
||||
|
||||
node_list = [
|
||||
('ecdsa.net', '9735', '038370f0e7a03eded3e1d41dc081084a87f0afa1c5b22090b4f3abb391eb15d8ff'),
|
||||
('77.58.162.148', '9735', '022bb78ab9df617aeaaf37f6644609abb7295fad0c20327bccd41f8d69173ccb49')
|
||||
]
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
if len(sys.argv) > 1:
|
||||
host, port, pubkey = sys.argv[1:4]
|
||||
else:
|
||||
host, port, pubkey = node_list[0]
|
||||
pubkey = binascii.unhexlify(pubkey)
|
||||
port = int(port)
|
||||
privkey = b"\x21"*32 + b"\x01"
|
||||
loop = asyncio.get_event_loop()
|
||||
loop.run_until_complete(main_loop(privkey, host, port, pubkey, loop))
|
||||
loop.close()
|
Loading…
Add table
Reference in a new issue