Trying to fix PING and session Nonce
All checks were successful
/ mirror (push) Successful in 4s

This commit is contained in:
stcb 2025-03-29 21:50:14 +02:00
parent 394143b4df
commit 3baf3f142b
3 changed files with 191 additions and 180 deletions

View File

@ -17,7 +17,7 @@ def main():
print(f"Listening on port: {protocol.local_port}") print(f"Listening on port: {protocol.local_port}")
print(f"Your identity public key (hex): {protocol.identity_pubkey.hex()}") print(f"Your identity public key (hex): {protocol.identity_pubkey.hex()}")
print("\nAvailable commands:") print("\nAvailable commands:")
print(" set_peer_identity <hex_pubkey>") print(" peer_id <hex_pubkey>")
print(" connect <port>") print(" connect <port>")
print(" generate_ephemeral_keys") print(" generate_ephemeral_keys")
print(" send_ping") print(" send_ping")
@ -26,7 +26,7 @@ def main():
print(" generate_ecdhe <index>") print(" generate_ecdhe <index>")
print(" derive_hkdf") print(" derive_hkdf")
print(" send_encrypted <plaintext>") print(" send_encrypted <plaintext>")
print(" decrypt_message <hex_message>") print(" decrypt_received <index>")
print(" auto_responder <on|off>") print(" auto_responder <on|off>")
print(" show_state") print(" show_state")
print(" exit\n") print(" exit\n")
@ -45,9 +45,9 @@ def main():
break break
elif cmd == "show_state": elif cmd == "show_state":
protocol.show_state() protocol.show_state()
elif cmd == "set_peer_identity": elif cmd == "peer_id":
if len(parts) != 2: if len(parts) != 2:
print("Usage: set_peer_identity <hex_pubkey>") print("Usage: peer_id <hex_pubkey>")
continue continue
protocol.set_peer_identity(parts[1]) protocol.set_peer_identity(parts[1])
elif cmd == "connect": elif cmd == "connect":
@ -90,14 +90,17 @@ def main():
if len(parts) < 2: if len(parts) < 2:
print("Usage: send_encrypted <plaintext>") print("Usage: send_encrypted <plaintext>")
continue continue
# Join the rest of the line as plaintext
plaintext = " ".join(parts[1:]) plaintext = " ".join(parts[1:])
protocol.send_encrypted_message(plaintext) protocol.send_encrypted_message(plaintext)
elif cmd == "decrypt_message": elif cmd == "decrypt_received":
if len(parts) != 2: if len(parts) != 2:
print("Usage: decrypt_message <hex_message>") print("Usage: decrypt_received <index>")
continue continue
protocol.decrypt_encrypted_message(parts[1]) try:
idx = int(parts[1])
protocol.decrypt_received_message(idx)
except ValueError:
print("Index must be an integer.")
elif cmd == "auto_responder": elif cmd == "auto_responder":
if len(parts) != 2: if len(parts) != 2:
print("Usage: auto_responder <on|off>") print("Usage: auto_responder <on|off>")

View File

@ -11,145 +11,126 @@ def crc32_of(data: bytes) -> int:
return zlib.crc32(data) & 0xffffffff return zlib.crc32(data) & 0xffffffff
# ============================================================================= # ---------------------------------------------------------------------------
# 1) Ping Request (295 bits) # PING REQUEST (new format)
# - 256-bit nonce # Fields (in order):
# - 7-bit version # - session_nonce: 129 bits (from the top 129 bits of 17 random bytes)
# - 32-bit CRC # - version: 7 bits
# = 295 bits total # - cipher: 4 bits (0 = AES-256-GCM, 1 = ChaCha20-poly1305; for now only 0 is used)
# In practice, we store 37 bytes (296 bits); 1 bit is unused. # - CRC: 32 bits
# ============================================================================= #
# Total bits: 129 + 7 + 4 + 32 = 172 bits. We pack into 22 bytes (176 bits) with 4 spare bits.
def build_ping_request(version: int, nonce: bytes = None) -> bytes: # ---------------------------------------------------------------------------
def build_ping_request(version: int, cipher: int, nonce_full: bytes = None) -> bytes:
""" """
Build a Ping request with: Build a Ping request with:
- 256-bit nonce (32 bytes) - session_nonce: 129 bits (derived from 17 random bytes by discarding the lowest 7 bits)
- 7-bit version - version: 7 bits
- 32-bit CRC - cipher: 4 bits (0 = AES-256-GCM, 1 = ChaCha20-poly1305; we use 0 for now)
Total = 295 bits logically. - CRC: 32 bits
Since 295 bits do not fill an integer number of bytes, we pack into 37 bytes (296 bits),
with one unused bit. Total = 129 + 7 + 4 + 32 = 172 bits.
We pack into 22 bytes (176 bits) leaving 4 unused bits.
""" """
if nonce is None:
nonce = os.urandom(32) # 32 bytes = 256 bits
if len(nonce) != 32:
raise ValueError("Nonce must be exactly 32 bytes.")
if not (0 <= version < 128): if not (0 <= version < 128):
raise ValueError("Version must fit in 7 bits (0..127)") raise ValueError("Version must fit in 7 bits (0..127)")
if not (0 <= cipher < 16):
raise ValueError("Cipher must fit in 4 bits (0..15)")
# Generate 17 random bytes if none provided (17 bytes = 136 bits)
if nonce_full is None:
nonce_full = os.urandom(17)
if len(nonce_full) < 17:
raise ValueError("nonce_full must be at least 17 bytes")
# Use the top 129 bits of the 136 bits:
nonce_int_full = int.from_bytes(nonce_full, 'big') # 136 bits
nonce_129_int = nonce_int_full >> 7 # drop the lowest 7 bits => 129 bits
# Convert the derived 129-bit nonce to 17 bytes.
# Since 129 bits < 17*8=136 bits, the top 7 bits of the result will be 0.
nonce_129_bytes = nonce_129_int.to_bytes(17, 'big')
# Build the partial integer: # Pack the fields: shift the 129-bit nonce left by (7+4)=11 bits, then add version (7 bits) and cipher (4 bits).
# Shift the nonce (256 bits) left by 7 bits and then OR with the 7-bit version. partial_int = (nonce_129_int << 11) | (version << 4) | (cipher & 0x0F)
partial_int = int.from_bytes(nonce, 'big') << 7 # This partial data is 129+7+4 = 140 bits; we pack into 18 bytes (144 bits) with 4 spare bits.
partial_int |= version # version occupies the lower 7 bits partial_bytes = partial_int.to_bytes(18, 'big')
# Compute CRC over these 18 bytes.
# Convert to 33 bytes (263 bits needed)
partial_bytes = partial_int.to_bytes(33, 'big')
# Compute CRC over these 33 bytes
cval = crc32_of(partial_bytes) cval = crc32_of(partial_bytes)
# Combine the partial data with the 32-bit CRC.
# Combine partial data (263 bits) with the 32-bit CRC => 295 bits total. final_int = (int.from_bytes(partial_bytes, 'big') << 32) | cval # 140 + 32 = 172 bits
final_int = (int.from_bytes(partial_bytes, 'big') << 32) | cval final_bytes = final_int.to_bytes(22, 'big')
final_bytes = final_int.to_bytes(37, 'big') # Optionally, store or print nonce_129_bytes (the session nonce) rather than the original nonce_full.
return final_bytes return final_bytes
def parse_ping_request(data: bytes): def parse_ping_request(data: bytes):
""" """
Parse a Ping request (37 bytes = 295 bits). Parse a Ping request (22 bytes = 172 bits).
Returns (nonce, version) or None if invalid. Returns (session_nonce_bytes, version, cipher) or None if invalid.
The session_nonce_bytes will be 17 bytes, representing the 129-bit value.
""" """
if len(data) != 37: if len(data) != 22:
return None return None
final_int = int.from_bytes(data, 'big') # 176 bits integer; lower 32 bits = CRC, higher 140 bits = partial
# Convert to int crc_in = final_int & 0xffffffff
val_295 = int.from_bytes(data, 'big') # 295 bits in a 37-byte integer partial_int = final_int >> 32 # 140 bits
# Extract CRC (lowest 32 bits) partial_bytes = partial_int.to_bytes(18, 'big')
crc_in = val_295 & 0xffffffff
# Then shift right 32 bits to get partial_data
partial_val = val_295 >> 32 # 263 bits
# Convert partial_val back to bytes
partial_bytes = partial_val.to_bytes(33, 'big')
# Recompute CRC
crc_calc = crc32_of(partial_bytes) crc_calc = crc32_of(partial_bytes)
if crc_calc != crc_in: if crc_calc != crc_in:
return None return None
# Extract fields: lowest 4 bits: cipher; next 7 bits: version; remaining 129 bits: session_nonce.
# Now parse out nonce (256 bits) and version (7 bits) cipher = partial_int & 0x0F
# partial_val is 263 bits version = (partial_int >> 4) & 0x7F
version = partial_val & 0x7f # low 7 bits nonce_129_int = partial_int >> 11 # 140 - 11 = 129 bits
nonce_val = partial_val >> 7 # high 256 bits # Convert to 17 bytes. Since the number is < 2^129, the top 7 bits will be zero.
nonce_bytes = nonce_val.to_bytes(32, 'big') session_nonce_bytes = nonce_129_int.to_bytes(17, 'big')
return (session_nonce_bytes, version, cipher)
return (nonce_bytes, version)
# =============================================================================
# 2) Ping Response (72 bits)
# - 32-bit timestamp
# - 7-bit version + 1-bit answer => 8 bits
# - 32-bit CRC
# = 72 bits total => 9 bytes
# =============================================================================
def build_ping_response(version: int, answer: int) -> bytes: # ---------------------------------------------------------------------------
""" # PING RESPONSE (new format)
Build a Ping response: # Fields:
- 32-bit timestamp (lowest 32 bits of current time in ms) # - timestamp: 32 bits (we take the lower 32 bits of the time in ms)
- 7-bit version + 1-bit answer # - version: 7 bits
- 32-bit CRC # - cipher: 4 bits
=> 72 bits = 9 bytes # - answer: 1 bit
""" # - CRC: 32 bits
#
# Total bits: 32 + 7 + 4 + 1 + 32 = 76 bits; pack into 10 bytes (80 bits) with 4 spare bits.
# ---------------------------------------------------------------------------
def build_ping_response(version: int, cipher: int, answer: int) -> bytes:
if not (0 <= version < 128): if not (0 <= version < 128):
raise ValueError("Version must fit in 7 bits.") raise ValueError("Version must fit in 7 bits")
if not (0 <= cipher < 16):
raise ValueError("Cipher must fit in 4 bits")
if answer not in (0, 1): if answer not in (0, 1):
raise ValueError("Answer must be 0 or 1.") raise ValueError("Answer must be 0 or 1")
t_ms = int(time.time() * 1000) & 0xffffffff # 32 bits
# 32-bit timestamp = current time in ms, truncated to 32 bits # Pack timestamp (32 bits), then version (7 bits), cipher (4 bits), answer (1 bit): total 32+7+4+1 = 44 bits.
t_ms = int(time.time() * 1000) & 0xffffffff partial_val = (t_ms << (7+4+1)) | (version << (4+1)) | (cipher << 1) | answer
partial_bytes = partial_val.to_bytes(6, 'big') # 6 bytes = 48 bits, 4 spare bits.
# partial = [timestamp (32 bits), version (7 bits), answer (1 bit)] => 40 bits
partial_val = (t_ms << 8) | ((version << 1) & 0xfe) | (answer & 0x01)
# partial_val is 40 bits => 5 bytes
partial_bytes = partial_val.to_bytes(5, 'big')
# CRC over these 5 bytes
cval = crc32_of(partial_bytes) cval = crc32_of(partial_bytes)
final_val = (int.from_bytes(partial_bytes, 'big') << 32) | cval # 44+32 = 76 bits.
# Combine partial (40 bits) with 32 bits of CRC => 72 bits total final_bytes = final_val.to_bytes(10, 'big') # 10 bytes = 80 bits.
final_val = (int.from_bytes(partial_bytes, 'big') << 32) | cval
final_bytes = final_val.to_bytes(9, 'big')
return final_bytes return final_bytes
def parse_ping_response(data: bytes): def parse_ping_response(data: bytes):
""" if len(data) != 10:
Parse a Ping response (72 bits = 9 bytes).
Return (timestamp_ms, version, answer) or None if invalid.
"""
if len(data) != 9:
return None return None
final_int = int.from_bytes(data, 'big') # 80 bits
val_72 = int.from_bytes(data, 'big') # 72 bits crc_in = final_int & 0xffffffff
crc_in = val_72 & 0xffffffff partial_int = final_int >> 32 # 48 bits
partial_val = val_72 >> 32 # 40 bits partial_bytes = partial_int.to_bytes(6, 'big')
partial_bytes = partial_val.to_bytes(5, 'big')
crc_calc = crc32_of(partial_bytes) crc_calc = crc32_of(partial_bytes)
if crc_calc != crc_in: if crc_calc != crc_in:
return None return None
# Extract fields: partial_int has 48 bits. We only used 44 bits for the fields.
# Now parse partial_val # Discard the lower 4 spare bits.
# partial_val = [timestamp(32 bits), version(7 bits), answer(1 bit)] partial_int >>= 4 # now 44 bits.
t_ms = (partial_val >> 8) & 0xffffffff # Now fields: timestamp: 32 bits, version: 7 bits, cipher: 4 bits, answer: 1 bit.
va = partial_val & 0xff # 8 bits = [7 bits version, 1 bit answer] answer = partial_int & 0x01
version = (va >> 1) & 0x7f cipher = (partial_int >> 1) & 0x0F
answer = va & 0x01 version = (partial_int >> (1+4)) & 0x7F
timestamp = partial_int >> (1+4+7)
return (t_ms, version, answer) return (timestamp, version, cipher, answer)
# ============================================================================= # =============================================================================

View File

@ -20,7 +20,7 @@ from messages import (
) )
import transmission import transmission
from encryption import encrypt_message, decrypt_message from encryption import encrypt_message, decrypt_message, MessageHeader, generate_iv
# ANSI colors # ANSI colors
RED = "\033[91m" RED = "\033[91m"
@ -91,77 +91,97 @@ class IcingProtocol:
def on_data_received(self, conn: transmission.PeerConnection, data: bytes): def on_data_received(self, conn: transmission.PeerConnection, data: bytes):
bits_count = len(data) * 8 bits_count = len(data) * 8
print(f"{GREEN}[RECV]{RESET} {bits_count} bits from peer: {data.hex()[:60]}{'...' if len(data.hex())>60 else ''}") print(
# For a PING_REQUEST, parse and store the session nonce if not already set. f"{GREEN}[RECV]{RESET} {bits_count} bits from peer: {data.hex()[:60]}{'...' if len(data.hex()) > 60 else ''}")
if len(data) == 37:
# New-format PING REQUEST (22 bytes)
if len(data) == 22:
parsed = parse_ping_request(data) parsed = parse_ping_request(data)
if parsed: if parsed:
nonce, version = parsed nonce_full, version, cipher = parsed
self.state["ping_received"] = True self.state["ping_received"] = True
# Store session nonce if not already set # If the received cipher field is not 0, we force it to 0 in our response.
if cipher != 0:
print(
f"{YELLOW}[NOTICE]{RESET} Received PING with unsupported cipher ({cipher}); forcing cipher to 0 in response.")
cipher = 0
# Store session nonce if not already set:
if self.session_nonce is None: if self.session_nonce is None:
self.session_nonce = nonce # Here, we already generated 17 bytes (136 bits) and only the top 129 bits are valid.
nonce_int = int.from_bytes(nonce_full, 'big') >> 7
self.session_nonce = nonce_int.to_bytes(17, 'big')
print(f"{YELLOW}[NOTICE]{RESET} Stored session nonce from received PING.") print(f"{YELLOW}[NOTICE]{RESET} Stored session nonce from received PING.")
index = len(self.inbound_messages) index = len(self.inbound_messages)
msg = { msg = {
"type": "PING_REQUEST", "type": "PING_REQUEST",
"raw": data, "raw": data,
"parsed": {"nonce": nonce, "version": version}, "parsed": {"nonce_full": nonce_full, "version": version, "cipher": cipher},
"connection": conn "connection": conn
} }
self.inbound_messages.append(msg) self.inbound_messages.append(msg)
print(f"{YELLOW}[NOTICE]{RESET} Stored inbound PING request (nonce={nonce.hex()}) at index={index}.") # (Optional auto-responder code could go here)
if self.auto_responder:
# Schedule an automatic response after 2 seconds
threading.Timer(2.0, self._auto_respond_ping, args=(index,)).start()
return return
# Attempt to parse Ping response # New-format PING RESPONSE (10 bytes)
if len(data) == 9: elif len(data) == 10:
parsed = parse_ping_response(data) parsed = parse_ping_response(data)
if parsed: if parsed:
ts, version, answer_code = parsed timestamp, version, cipher, answer = parsed
# If cipher is not 0 (AES-256-GCM), override it.
if cipher != 0:
print(
f"{YELLOW}[NOTICE]{RESET} Received PING RESPONSE with unsupported cipher; treating as AES (cipher=0).")
cipher = 0
index = len(self.inbound_messages) index = len(self.inbound_messages)
msg = { msg = {
"type": "PING_RESPONSE", "type": "PING_RESPONSE",
"raw": data, "raw": data,
"parsed": {"timestamp": ts, "version": version, "answer_code": answer_code}, "parsed": {"timestamp": timestamp, "version": version, "cipher": cipher, "answer": answer},
"connection": conn "connection": conn
} }
self.inbound_messages.append(msg) self.inbound_messages.append(msg)
print(f"{YELLOW}[NOTICE]{RESET} Stored inbound PING response (answer_code={answer_code}) at index={index}.")
return return
# Attempt to parse handshake # HANDSHAKE message (168 bytes)
if len(data) == 168: elif len(data) == 168:
parsed = parse_handshake_message(data) parsed = parse_handshake_message(data)
if parsed: if parsed:
ts, ephemeral_pub, ephemeral_sig, pfs_hash = parsed timestamp, ephemeral_pub, ephemeral_sig, pfs_hash = parsed
self.state["handshake_received"] = True self.state["handshake_received"] = True
index = len(self.inbound_messages) index = len(self.inbound_messages)
msg = { msg = {
"type": "HANDSHAKE", "type": "HANDSHAKE",
"raw": data, "raw": data,
"parsed": { "parsed": (timestamp, ephemeral_pub, ephemeral_sig, pfs_hash),
"ephemeral_pub": ephemeral_pub,
"ephemeral_sig": ephemeral_sig,
"timestamp": ts,
"pfs hash": pfs_hash
},
"connection": conn "connection": conn
} }
self.inbound_messages.append(msg) self.inbound_messages.append(msg)
print(f"{YELLOW}[NOTICE]{RESET} Stored inbound HANDSHAKE at index={index}. ephemeral_pub={ephemeral_pub.hex()[:20]}...") # (Optional auto-responder for handshake could go here)
if self.auto_responder:
# Schedule an automatic handshake "response" after 2 seconds
threading.Timer(2.0, self._auto_respond_handshake, args=(index,)).start()
return return
# Otherwise, unrecognized # Check if the message might be an encrypted message (e.g. header of 18 bytes at start)
elif len(data) > 18:
# Try to parse header from encryption module
try:
from encryption import MessageHeader
header = MessageHeader.unpack(data[:18])
# If header unpacking is successful and data length fits header.data_len + header size + tag size:
expected_len = 18 + header.data_len + 16 # tag is 16 bytes
if len(data) == expected_len:
index = len(self.inbound_messages)
msg = {
"type": "ENCRYPTED_MESSAGE",
"raw": data,
"parsed": header, # we can store header for further processing
"connection": conn
}
self.inbound_messages.append(msg)
print(f"{YELLOW}[NOTICE]{RESET} Stored inbound ENCRYPTED_MESSAGE at index={index}.")
return
except Exception:
pass
# Otherwise, unrecognized/malformed message.
index = len(self.inbound_messages) index = len(self.inbound_messages)
msg = { msg = {
"type": "UNKNOWN", "type": "UNKNOWN",
@ -284,16 +304,19 @@ class IcingProtocol:
self.ephemeral_privkey, self.ephemeral_pubkey = get_ephemeral_keypair() self.ephemeral_privkey, self.ephemeral_pubkey = get_ephemeral_keypair()
print(f"{GREEN}[IcingProtocol]{RESET} Generated ephemeral key pair: pubkey={self.ephemeral_pubkey.hex()[:16]}...") print(f"{GREEN}[IcingProtocol]{RESET} Generated ephemeral key pair: pubkey={self.ephemeral_pubkey.hex()[:16]}...")
# Updated send_ping_request: generate a 17-byte nonce, extract top 129 bits, and store that (as bytes)
def send_ping_request(self): def send_ping_request(self):
if not self.connections: if not self.connections:
print(f"{RED}[ERROR]{RESET} No active connections.") print(f"{RED}[ERROR]{RESET} No active connections.")
return return
# Generate a new nonce for this ping and store it as session_nonce if not already set. nonce_full = os.urandom(17)
nonce = os.urandom(32) # Compute the 129-bit session nonce: take the top 129 bits.
nonce_int = int.from_bytes(nonce_full, 'big') >> 7 # 129 bits
session_nonce_bytes = nonce_int.to_bytes(17, 'big') # still 17 bytes but only 129 bits are meaningful
if self.session_nonce is None: if self.session_nonce is None:
self.session_nonce = nonce self.session_nonce = session_nonce_bytes
print(f"{YELLOW}[NOTICE]{RESET} Stored session nonce from sent PING.") print(f"{YELLOW}[NOTICE]{RESET} Stored session nonce from sent PING.")
pkt = build_ping_request(version=0, nonce=nonce) pkt = build_ping_request(version=0, cipher=0, nonce_full=nonce_full)
self._send_packet(self.connections[0], pkt, "PING_REQUEST") self._send_packet(self.connections[0], pkt, "PING_REQUEST")
self.state["ping_sent"] = True self.state["ping_sent"] = True
@ -352,10 +375,7 @@ class IcingProtocol:
# Manual Responses # Manual Responses
# ------------------------------------------------------------------------- # -------------------------------------------------------------------------
def respond_to_ping(self, index: int, answer_code: int): def respond_to_ping(self, index: int, answer: int):
"""
Manually respond to an inbound PING_REQUEST in inbound_messages[index].
"""
if index < 0 or index >= len(self.inbound_messages): if index < 0 or index >= len(self.inbound_messages):
print(f"{RED}[ERROR]{RESET} Invalid index {index}.") print(f"{RED}[ERROR]{RESET} Invalid index {index}.")
return return
@ -365,10 +385,17 @@ class IcingProtocol:
return return
version = msg["parsed"]["version"] version = msg["parsed"]["version"]
cipher = msg["parsed"]["cipher"]
# Force cipher to 0 if it's not 0 (only AES-256-GCM is supported)
if cipher != 0:
print(
f"{YELLOW}[NOTICE]{RESET} Received PING with unsupported cipher ({cipher}); forcing cipher to 0 in response.")
cipher = 0
conn = msg["connection"] conn = msg["connection"]
resp = build_ping_response(version, answer_code) resp = build_ping_response(version, cipher, answer)
self._send_packet(conn, resp, "PING_RESPONSE") self._send_packet(conn, resp, "PING_RESPONSE")
print(f"{BLUE}[MANUAL]{RESET} Responded to ping with answer_code={answer_code}.") print(f"{BLUE}[MANUAL]{RESET} Responded to ping with answer={answer}.")
def generate_ecdhe(self, index: int): def generate_ecdhe(self, index: int):
""" """
@ -383,8 +410,8 @@ class IcingProtocol:
print(f"{RED}[ERROR]{RESET} inbound_messages[{index}] is not a HANDSHAKE.") print(f"{RED}[ERROR]{RESET} inbound_messages[{index}] is not a HANDSHAKE.")
return return
ephemeral_pub = msg["parsed"]["ephemeral_pub"] # Unpack the tuple directly:
ephemeral_sig = msg["parsed"]["ephemeral_sig"] timestamp, ephemeral_pub, ephemeral_sig, pfs_hash = msg["parsed"]
# Use our raw_signature_to_der wrapper only if signature is 64 bytes. # Use our raw_signature_to_der wrapper only if signature is 64 bytes.
# Otherwise, assume the signature is already DER-encoded. # Otherwise, assume the signature is already DER-encoded.
@ -439,12 +466,14 @@ class IcingProtocol:
print(f"\nShared Secret: {self.shared_secret if self.shared_secret else '[None]'}") print(f"\nShared Secret: {self.shared_secret if self.shared_secret else '[None]'}")
if self.hkdf_key: if self.hkdf_key:
print(f"HKDF Derived Key: {self.hkdf_key.hex()} (size: {len(self.hkdf_key)*8} bits)") print(f"HKDF Derived Key: {self.hkdf_key} (size: {len(self.hkdf_key)*8} bits)")
else: else:
print("HKDF Derived Key: [None]") print("HKDF Derived Key: [None]")
if self.session_nonce:
print("\nSession Nonce: " + (self.session_nonce.hex() if self.session_nonce else "[None]")) # session_nonce now contains 17 bytes, but only the top 129 bits are used.
print(f"Session Nonce: {self.session_nonce.hex()} (129 bits)")
else:
print("Session Nonce: [None]")
print("\nProtocol Flags:") print("\nProtocol Flags:")
for k, v in self.state.items(): for k, v in self.state.items():
print(f" {k}: {v}") print(f" {k}: {v}")
@ -489,22 +518,20 @@ class IcingProtocol:
print(f"{GREEN}[SEND_ENCRYPTED]{RESET} Encrypted message sent.") print(f"{GREEN}[SEND_ENCRYPTED]{RESET} Encrypted message sent.")
# New method: Decrypt an encrypted message provided as a hex string. # New method: Decrypt an encrypted message provided as a hex string.
def decrypt_encrypted_message(self, hex_message: str): # New command: decrypt a received encrypted message from the inbound queue.
""" def decrypt_received_message(self, index: int):
Decrypts an encrypted message (given as a hex string) using the HKDF key. if index < 0 or index >= len(self.inbound_messages):
Returns the plaintext (UTF-8 string) and prints it. print(f"{RED}[ERROR]{RESET} Invalid message index.")
""" return
msg = self.inbound_messages[index]
# Expect the message to be an encrypted transmission (we assume it is in the proper format).
encrypted = msg["raw"]
if not self.hkdf_key: if not self.hkdf_key:
print(f"{RED}[ERROR]{RESET} No HKDF key derived. Cannot decrypt message.") print(f"{RED}[ERROR]{RESET} No HKDF key derived. Cannot decrypt message.")
return return
try:
message_bytes = bytes.fromhex(hex_message)
except Exception as e:
print(f"{RED}[ERROR]{RESET} Invalid hex input.")
return
key = bytes.fromhex(self.hkdf_key) key = bytes.fromhex(self.hkdf_key)
try: try:
plaintext_bytes = decrypt_message(message_bytes, key) plaintext_bytes = decrypt_message(encrypted, key)
plaintext = plaintext_bytes.decode('utf-8') plaintext = plaintext_bytes.decode('utf-8')
print(f"{GREEN}[DECRYPTED]{RESET} Decrypted message: {plaintext}") print(f"{GREEN}[DECRYPTED]{RESET} Decrypted message: {plaintext}")
return plaintext return plaintext