Skip to content

Commit 12a8d39

Browse files
committed
Add the core functionality required to resolve Human Readable Names
This adds a new utility struct, `OMNameResolver`, which implements the core functionality required to resolve Human Readable Names, namely generating `DNSSECQuery` onion messages, tracking the state of requests, and ultimately receiving and verifying `DNSSECProof` onion messages. It tracks pending requests with a `PaymentId`, allowing for easy integration into `ChannelManager` in a coming commit - mapping received proofs to `PaymentId`s which we can then complete by handing them `Offer`s to pay. It does not, directly, implement `DNSResolverMessageHandler`, but an implementation of `DNSResolverMessageHandler` becomes trivial with `OMNameResolver` handling the inbound messages and creating the messages to send.
1 parent eef4353 commit 12a8d39

File tree

3 files changed

+218
-0
lines changed

3 files changed

+218
-0
lines changed

ci/ci-tests.sh

+6
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,12 @@ echo -e "\n\nBuilding and testing all workspace crates..."
7575
cargo test --verbose --color always
7676
cargo check --verbose --color always
7777

78+
echo -e "\n\nBuilding and testing lightning crate with dnssec feature"
79+
pushd lightning
80+
cargo test --verbose --color always --features dnssec
81+
cargo check --verbose --color always --features dnssec
82+
popd
83+
7884
echo -e "\n\nBuilding and testing Block Sync Clients with features"
7985
pushd lightning-block-sync
8086
cargo test --verbose --color always --features rest-client

lightning/Cargo.toml

+2
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@ _test_vectors = []
3434
no-std = ["hashbrown", "possiblyrandom", "bitcoin/no-std", "core2/alloc", "libm"]
3535
std = ["bitcoin/std", "bech32/std"]
3636

37+
dnssec = ["dnssec-prover/validation"]
38+
3739
# Generates low-r bitcoin signatures, which saves 1 byte in 50% of the cases
3840
grind_signatures = []
3941

lightning/src/onion_message/dns_resolution.rs

+210
Original file line numberDiff line numberDiff line change
@@ -12,17 +12,40 @@
1212
//! It contains [`DNSResolverMessage`]s as well as a [`DNSResolverMessageHandler`] trait to handle
1313
//! such messages using an [`OnionMessenger`].
1414
//!
15+
//! With the `dnssec` feature enabled, it also contains `OMNameResolver`, which does all the work
16+
//! required to resolve BIP 353 [`HumanReadableName`]s using [bLIP 32] - sending onion messages to
17+
//! a DNS resolver, validating the proofs, and ultimately surfacing validated data back to the
18+
//! caller.
19+
//!
1520
//! [bLIP 32]: https://github.com/lightning/blips/blob/master/blip-0032.md
1621
//! [`OnionMessenger`]: super::messenger::OnionMessenger
1722
23+
#[cfg(feature = "dnssec")]
24+
use core::str::FromStr;
25+
#[cfg(feature = "dnssec")]
26+
use core::sync::atomic::{AtomicUsize, Ordering};
27+
28+
#[cfg(feature = "dnssec")]
29+
use dnssec_prover::rr::RR;
30+
#[cfg(feature = "dnssec")]
31+
use dnssec_prover::ser::parse_rr_stream;
32+
#[cfg(feature = "dnssec")]
33+
use dnssec_prover::validation::verify_rr_stream;
34+
1835
use dnssec_prover::rr::Name;
1936

2037
use crate::blinded_path::message::DNSResolverContext;
2138
use crate::io;
39+
#[cfg(feature = "dnssec")]
40+
use crate::ln::channelmanager::PaymentId;
2241
use crate::ln::msgs::DecodeError;
42+
#[cfg(feature = "dnssec")]
43+
use crate::offers::offer::Offer;
2344
use crate::onion_message::messenger::{PendingOnionMessage, Responder, ResponseInstruction};
2445
use crate::onion_message::packet::OnionMessageContents;
2546
use crate::prelude::*;
47+
#[cfg(feature = "dnssec")]
48+
use crate::sync::Mutex;
2649
use crate::util::ser::{Readable, ReadableArgs, Writeable, Writer};
2750

2851
/// A handler for an [`OnionMessage`] containing a DNS(SEC) query or a DNSSEC proof
@@ -250,3 +273,190 @@ impl Readable for HumanReadableName {
250273
HumanReadableName::new(user, domain).map_err(|()| DecodeError::InvalidValue)
251274
}
252275
}
276+
277+
/// A stateful resolver which maps BIP 353 Human Readable Names to URIs and BOLT12 [`Offer`]s.
278+
///
279+
/// It does not directly implement [`DNSResolverMessageHandler`] but implements all the core logic
280+
/// which is required in a client which intends to.
281+
///
282+
/// It relies on being made aware of the passage of time with regular calls to
283+
/// [`Self::new_best_block`] in order to time out existing queries. Queries time out after two
284+
/// blocks.
285+
#[cfg(feature = "dnssec")]
286+
pub struct OMNameResolver {
287+
pending_resolves:
288+
Mutex<HashMap<Name, Vec<(u32, DNSResolverContext, HumanReadableName, PaymentId)>>>,
289+
latest_block_time: AtomicUsize,
290+
latest_block_height: AtomicUsize,
291+
}
292+
293+
#[cfg(feature = "dnssec")]
294+
impl OMNameResolver {
295+
/// Builds a new [`OMNameResolver`].
296+
pub fn new(latest_block_time: u32, latest_block_height: u32) -> Self {
297+
Self {
298+
pending_resolves: Mutex::new(new_hash_map()),
299+
latest_block_time: AtomicUsize::new(latest_block_time as usize),
300+
latest_block_height: AtomicUsize::new(latest_block_height as usize),
301+
}
302+
}
303+
304+
/// Informs the [`OMNameResolver`] of the passage of time in the form of a new best Bitcoin
305+
/// block.
306+
///
307+
/// This will call back to resolve some pending queries which have timed out.
308+
pub fn new_best_block(&self, height: u32, time: u32) {
309+
self.latest_block_time.store(time as usize, Ordering::Release);
310+
self.latest_block_height.store(height as usize, Ordering::Release);
311+
let mut resolves = self.pending_resolves.lock().unwrap();
312+
resolves.retain(|_, queries| {
313+
queries.retain_mut(
314+
|(res_height, _, _, _)| {
315+
if *res_height < height - 1 {
316+
false
317+
} else {
318+
true
319+
}
320+
},
321+
);
322+
!queries.is_empty()
323+
});
324+
}
325+
326+
/// Begins the process of resolving a BIP 353 Human Readable Name.
327+
///
328+
/// The given `random_context` must be a [`DNSResolverContext`] with a fresh, unused random
329+
/// nonce which is included in the blinded path which will be set as the reply path when
330+
/// sending the returned [`DNSSECQuery`].
331+
///
332+
/// Returns a [`DNSSECQuery`] onion message which should be sent to a resolver on success.
333+
pub fn resolve_name(
334+
&self, payment_id: PaymentId, name: HumanReadableName, random_context: DNSResolverContext,
335+
) -> Result<DNSSECQuery, ()> {
336+
let dns_name =
337+
Name::try_from(format!("{}.user._bitcoin-payment.{}.", name.user, name.domain));
338+
debug_assert!(
339+
dns_name.is_ok(),
340+
"The HumanReadableName constructor shouldn't allow names which are too long"
341+
);
342+
let name_query = dns_name.clone().map(|q| DNSSECQuery(q));
343+
if let Ok(dns_name) = dns_name {
344+
let height = self.latest_block_height.load(Ordering::Acquire);
345+
let mut pending_resolves = self.pending_resolves.lock().unwrap();
346+
let resolution = (height as u32, random_context, name, payment_id);
347+
pending_resolves.entry(dns_name).or_insert_with(Vec::new).push(resolution);
348+
}
349+
name_query
350+
}
351+
352+
/// Handles a [`DNSSECProof`] message, attempting to verify it and match it against a pending
353+
/// query.
354+
///
355+
/// If verification succeeds, the resulting bitcoin: URI is parsed to find a contained
356+
/// [`Offer`].
357+
///
358+
/// Note that a single proof for a wildcard DNS entry may complete several requests for
359+
/// different [`HumanReadableName`]s.
360+
///
361+
/// If an [`Offer`] is found, it, as well as the [`PaymentId`] and original `name` passed to
362+
/// [`Self::resolve_name`] are returned.
363+
pub fn handle_dnssec_proof_for_offer(
364+
&self, msg: DNSSECProof, context: DNSResolverContext,
365+
) -> Option<(Vec<(HumanReadableName, PaymentId)>, Offer)> {
366+
let (completed_requests, uri) = self.handle_dnssec_proof_for_uri(msg, context)?;
367+
if let Some((_onchain, params)) = uri.split_once("?") {
368+
for param in params.split("&") {
369+
let (k, v) = if let Some(split) = param.split_once("=") {
370+
split
371+
} else {
372+
continue;
373+
};
374+
if k.eq_ignore_ascii_case("lno") {
375+
if let Ok(offer) = Offer::from_str(v) {
376+
return Some((completed_requests, offer));
377+
}
378+
return None;
379+
}
380+
}
381+
}
382+
None
383+
}
384+
385+
/// Handles a [`DNSSECProof`] message, attempting to verify it and match it against any pending
386+
/// queries.
387+
///
388+
/// If verification succeeds, all matching [`PaymentId`] and [`HumanReadableName`]s passed to
389+
/// [`Self::resolve_name`], as well as the resolved bitcoin: URI are returned.
390+
///
391+
/// Note that a single proof for a wildcard DNS entry may complete several requests for
392+
/// different [`HumanReadableName`]s.
393+
///
394+
/// This method is useful for those who handle bitcoin: URIs already, handling more than just
395+
/// BOLT12 [`Offer`]s.
396+
pub fn handle_dnssec_proof_for_uri(
397+
&self, msg: DNSSECProof, context: DNSResolverContext,
398+
) -> Option<(Vec<(HumanReadableName, PaymentId)>, String)> {
399+
let DNSSECProof { name: answer_name, proof } = msg;
400+
let mut pending_resolves = self.pending_resolves.lock().unwrap();
401+
if let hash_map::Entry::Occupied(entry) = pending_resolves.entry(answer_name) {
402+
if !entry.get().iter().any(|query| query.1 == context) {
403+
// If we don't have any pending queries with the context included in the blinded
404+
// path (implying someone sent us this response not using the blinded path we gave
405+
// when making the query), return immediately to avoid the extra time for the proof
406+
// validation giving away that we were the node that made the query.
407+
//
408+
// If there was at least one query with the same context, we go ahead and complete
409+
// all queries for the same name, as there's no point in waiting for another proof
410+
// for the same name.
411+
return None;
412+
}
413+
let parsed_rrs = parse_rr_stream(&proof);
414+
let validated_rrs =
415+
parsed_rrs.as_ref().and_then(|rrs| verify_rr_stream(rrs).map_err(|_| &()));
416+
if let Ok(validated_rrs) = validated_rrs {
417+
let block_time = self.latest_block_time.load(Ordering::Acquire) as u64;
418+
// Block times may be up to two hours in the future and some time into the past
419+
// (we assume no more than two hours, though the actual limits are rather
420+
// complicated).
421+
// Thus, we have to let the proof times be rather fuzzy.
422+
if validated_rrs.valid_from > block_time + 60 * 2 {
423+
return None;
424+
}
425+
if validated_rrs.expires < block_time - 60 * 2 {
426+
return None;
427+
}
428+
let resolved_rrs = validated_rrs.resolve_name(&entry.key());
429+
if resolved_rrs.is_empty() {
430+
return None;
431+
}
432+
433+
let (_, requests) = entry.remove_entry();
434+
435+
const URI_PREFIX: &str = "bitcoin:";
436+
let mut candidate_records = resolved_rrs
437+
.iter()
438+
.filter_map(
439+
|rr| if let RR::Txt(txt) = rr { Some(txt.data.as_vec()) } else { None },
440+
)
441+
.filter_map(
442+
|data| if let Ok(s) = String::from_utf8(data) { Some(s) } else { None },
443+
)
444+
.filter(|data_string| data_string.len() > URI_PREFIX.len())
445+
.filter(|data_string| {
446+
data_string[..URI_PREFIX.len()].eq_ignore_ascii_case(URI_PREFIX)
447+
});
448+
// Check that there is exactly one TXT record that begins with
449+
// bitcoin: as required by BIP 353 (and is valid UTF-8).
450+
match (candidate_records.next(), candidate_records.next()) {
451+
(Some(txt), None) => {
452+
let completed_requests =
453+
requests.into_iter().map(|(_, _, id, name)| (id, name)).collect();
454+
return Some((completed_requests, txt));
455+
},
456+
_ => {},
457+
}
458+
}
459+
}
460+
None
461+
}
462+
}

0 commit comments

Comments
 (0)