|
12 | 12 | //! It contains [`DNSResolverMessage`]s as well as a [`DNSResolverMessageHandler`] trait to handle
|
13 | 13 | //! such messages using an [`OnionMessenger`].
|
14 | 14 | //!
|
| 15 | +//! With the `dnssec` feature enabled, it also contains `OMNameResolver`, which does all the work |
| 16 | +//! required to resolve BIP 353 [`HumanReadableName`]s using [bLIP 32] - sending onion messages to |
| 17 | +//! a DNS resolver, validating the proofs, and ultimately surfacing validated data back to the |
| 18 | +//! caller. |
| 19 | +//! |
15 | 20 | //! [bLIP 32]: https://github.com/lightning/blips/blob/master/blip-0032.md
|
16 | 21 | //! [`OnionMessenger`]: super::messenger::OnionMessenger
|
17 | 22 |
|
| 23 | +#[cfg(feature = "dnssec")] |
| 24 | +use core::str::FromStr; |
| 25 | +#[cfg(feature = "dnssec")] |
| 26 | +use core::sync::atomic::{AtomicUsize, Ordering}; |
| 27 | + |
| 28 | +#[cfg(feature = "dnssec")] |
| 29 | +use dnssec_prover::rr::RR; |
| 30 | +#[cfg(feature = "dnssec")] |
| 31 | +use dnssec_prover::ser::parse_rr_stream; |
| 32 | +#[cfg(feature = "dnssec")] |
| 33 | +use dnssec_prover::validation::verify_rr_stream; |
| 34 | + |
18 | 35 | use dnssec_prover::rr::Name;
|
19 | 36 |
|
20 | 37 | use crate::blinded_path::message::DNSResolverContext;
|
21 | 38 | use crate::io;
|
| 39 | +#[cfg(feature = "dnssec")] |
| 40 | +use crate::ln::channelmanager::PaymentId; |
22 | 41 | use crate::ln::msgs::DecodeError;
|
| 42 | +#[cfg(feature = "dnssec")] |
| 43 | +use crate::offers::offer::Offer; |
23 | 44 | use crate::onion_message::messenger::{PendingOnionMessage, Responder, ResponseInstruction};
|
24 | 45 | use crate::onion_message::packet::OnionMessageContents;
|
25 | 46 | use crate::prelude::*;
|
| 47 | +#[cfg(feature = "dnssec")] |
| 48 | +use crate::sync::Mutex; |
26 | 49 | use crate::util::ser::{Readable, ReadableArgs, Writeable, Writer};
|
27 | 50 |
|
28 | 51 | /// A handler for an [`OnionMessage`] containing a DNS(SEC) query or a DNSSEC proof
|
@@ -250,3 +273,190 @@ impl Readable for HumanReadableName {
|
250 | 273 | HumanReadableName::new(user, domain).map_err(|()| DecodeError::InvalidValue)
|
251 | 274 | }
|
252 | 275 | }
|
| 276 | + |
| 277 | +/// A stateful resolver which maps BIP 353 Human Readable Names to URIs and BOLT12 [`Offer`]s. |
| 278 | +/// |
| 279 | +/// It does not directly implement [`DNSResolverMessageHandler`] but implements all the core logic |
| 280 | +/// which is required in a client which intends to. |
| 281 | +/// |
| 282 | +/// It relies on being made aware of the passage of time with regular calls to |
| 283 | +/// [`Self::new_best_block`] in order to time out existing queries. Queries time out after two |
| 284 | +/// blocks. |
| 285 | +#[cfg(feature = "dnssec")] |
| 286 | +pub struct OMNameResolver { |
| 287 | + pending_resolves: |
| 288 | + Mutex<HashMap<Name, Vec<(u32, DNSResolverContext, HumanReadableName, PaymentId)>>>, |
| 289 | + latest_block_time: AtomicUsize, |
| 290 | + latest_block_height: AtomicUsize, |
| 291 | +} |
| 292 | + |
| 293 | +#[cfg(feature = "dnssec")] |
| 294 | +impl OMNameResolver { |
| 295 | + /// Builds a new [`OMNameResolver`]. |
| 296 | + pub fn new(latest_block_time: u32, latest_block_height: u32) -> Self { |
| 297 | + Self { |
| 298 | + pending_resolves: Mutex::new(new_hash_map()), |
| 299 | + latest_block_time: AtomicUsize::new(latest_block_time as usize), |
| 300 | + latest_block_height: AtomicUsize::new(latest_block_height as usize), |
| 301 | + } |
| 302 | + } |
| 303 | + |
| 304 | + /// Informs the [`OMNameResolver`] of the passage of time in the form of a new best Bitcoin |
| 305 | + /// block. |
| 306 | + /// |
| 307 | + /// This will call back to resolve some pending queries which have timed out. |
| 308 | + pub fn new_best_block(&self, height: u32, time: u32) { |
| 309 | + self.latest_block_time.store(time as usize, Ordering::Release); |
| 310 | + self.latest_block_height.store(height as usize, Ordering::Release); |
| 311 | + let mut resolves = self.pending_resolves.lock().unwrap(); |
| 312 | + resolves.retain(|_, queries| { |
| 313 | + queries.retain_mut( |
| 314 | + |(res_height, _, _, _)| { |
| 315 | + if *res_height < height - 1 { |
| 316 | + false |
| 317 | + } else { |
| 318 | + true |
| 319 | + } |
| 320 | + }, |
| 321 | + ); |
| 322 | + !queries.is_empty() |
| 323 | + }); |
| 324 | + } |
| 325 | + |
| 326 | + /// Begins the process of resolving a BIP 353 Human Readable Name. |
| 327 | + /// |
| 328 | + /// The given `random_context` must be a [`DNSResolverContext`] with a fresh, unused random |
| 329 | + /// nonce which is included in the blinded path which will be set as the reply path when |
| 330 | + /// sending the returned [`DNSSECQuery`]. |
| 331 | + /// |
| 332 | + /// Returns a [`DNSSECQuery`] onion message which should be sent to a resolver on success. |
| 333 | + pub fn resolve_name( |
| 334 | + &self, payment_id: PaymentId, name: HumanReadableName, random_context: DNSResolverContext, |
| 335 | + ) -> Result<DNSSECQuery, ()> { |
| 336 | + let dns_name = |
| 337 | + Name::try_from(format!("{}.user._bitcoin-payment.{}.", name.user, name.domain)); |
| 338 | + debug_assert!( |
| 339 | + dns_name.is_ok(), |
| 340 | + "The HumanReadableName constructor shouldn't allow names which are too long" |
| 341 | + ); |
| 342 | + let name_query = dns_name.clone().map(|q| DNSSECQuery(q)); |
| 343 | + if let Ok(dns_name) = dns_name { |
| 344 | + let height = self.latest_block_height.load(Ordering::Acquire); |
| 345 | + let mut pending_resolves = self.pending_resolves.lock().unwrap(); |
| 346 | + let resolution = (height as u32, random_context, name, payment_id); |
| 347 | + pending_resolves.entry(dns_name).or_insert_with(Vec::new).push(resolution); |
| 348 | + } |
| 349 | + name_query |
| 350 | + } |
| 351 | + |
| 352 | + /// Handles a [`DNSSECProof`] message, attempting to verify it and match it against a pending |
| 353 | + /// query. |
| 354 | + /// |
| 355 | + /// If verification succeeds, the resulting bitcoin: URI is parsed to find a contained |
| 356 | + /// [`Offer`]. |
| 357 | + /// |
| 358 | + /// Note that a single proof for a wildcard DNS entry may complete several requests for |
| 359 | + /// different [`HumanReadableName`]s. |
| 360 | + /// |
| 361 | + /// If an [`Offer`] is found, it, as well as the [`PaymentId`] and original `name` passed to |
| 362 | + /// [`Self::resolve_name`] are returned. |
| 363 | + pub fn handle_dnssec_proof_for_offer( |
| 364 | + &self, msg: DNSSECProof, context: DNSResolverContext, |
| 365 | + ) -> Option<(Vec<(HumanReadableName, PaymentId)>, Offer)> { |
| 366 | + let (completed_requests, uri) = self.handle_dnssec_proof_for_uri(msg, context)?; |
| 367 | + if let Some((_onchain, params)) = uri.split_once("?") { |
| 368 | + for param in params.split("&") { |
| 369 | + let (k, v) = if let Some(split) = param.split_once("=") { |
| 370 | + split |
| 371 | + } else { |
| 372 | + continue; |
| 373 | + }; |
| 374 | + if k.eq_ignore_ascii_case("lno") { |
| 375 | + if let Ok(offer) = Offer::from_str(v) { |
| 376 | + return Some((completed_requests, offer)); |
| 377 | + } |
| 378 | + return None; |
| 379 | + } |
| 380 | + } |
| 381 | + } |
| 382 | + None |
| 383 | + } |
| 384 | + |
| 385 | + /// Handles a [`DNSSECProof`] message, attempting to verify it and match it against any pending |
| 386 | + /// queries. |
| 387 | + /// |
| 388 | + /// If verification succeeds, all matching [`PaymentId`] and [`HumanReadableName`]s passed to |
| 389 | + /// [`Self::resolve_name`], as well as the resolved bitcoin: URI are returned. |
| 390 | + /// |
| 391 | + /// Note that a single proof for a wildcard DNS entry may complete several requests for |
| 392 | + /// different [`HumanReadableName`]s. |
| 393 | + /// |
| 394 | + /// This method is useful for those who handle bitcoin: URIs already, handling more than just |
| 395 | + /// BOLT12 [`Offer`]s. |
| 396 | + pub fn handle_dnssec_proof_for_uri( |
| 397 | + &self, msg: DNSSECProof, context: DNSResolverContext, |
| 398 | + ) -> Option<(Vec<(HumanReadableName, PaymentId)>, String)> { |
| 399 | + let DNSSECProof { name: answer_name, proof } = msg; |
| 400 | + let mut pending_resolves = self.pending_resolves.lock().unwrap(); |
| 401 | + if let hash_map::Entry::Occupied(entry) = pending_resolves.entry(answer_name) { |
| 402 | + if !entry.get().iter().any(|query| query.1 == context) { |
| 403 | + // If we don't have any pending queries with the context included in the blinded |
| 404 | + // path (implying someone sent us this response not using the blinded path we gave |
| 405 | + // when making the query), return immediately to avoid the extra time for the proof |
| 406 | + // validation giving away that we were the node that made the query. |
| 407 | + // |
| 408 | + // If there was at least one query with the same context, we go ahead and complete |
| 409 | + // all queries for the same name, as there's no point in waiting for another proof |
| 410 | + // for the same name. |
| 411 | + return None; |
| 412 | + } |
| 413 | + let parsed_rrs = parse_rr_stream(&proof); |
| 414 | + let validated_rrs = |
| 415 | + parsed_rrs.as_ref().and_then(|rrs| verify_rr_stream(rrs).map_err(|_| &())); |
| 416 | + if let Ok(validated_rrs) = validated_rrs { |
| 417 | + let block_time = self.latest_block_time.load(Ordering::Acquire) as u64; |
| 418 | + // Block times may be up to two hours in the future and some time into the past |
| 419 | + // (we assume no more than two hours, though the actual limits are rather |
| 420 | + // complicated). |
| 421 | + // Thus, we have to let the proof times be rather fuzzy. |
| 422 | + if validated_rrs.valid_from > block_time + 60 * 2 { |
| 423 | + return None; |
| 424 | + } |
| 425 | + if validated_rrs.expires < block_time - 60 * 2 { |
| 426 | + return None; |
| 427 | + } |
| 428 | + let resolved_rrs = validated_rrs.resolve_name(&entry.key()); |
| 429 | + if resolved_rrs.is_empty() { |
| 430 | + return None; |
| 431 | + } |
| 432 | + |
| 433 | + let (_, requests) = entry.remove_entry(); |
| 434 | + |
| 435 | + const URI_PREFIX: &str = "bitcoin:"; |
| 436 | + let mut candidate_records = resolved_rrs |
| 437 | + .iter() |
| 438 | + .filter_map( |
| 439 | + |rr| if let RR::Txt(txt) = rr { Some(txt.data.as_vec()) } else { None }, |
| 440 | + ) |
| 441 | + .filter_map( |
| 442 | + |data| if let Ok(s) = String::from_utf8(data) { Some(s) } else { None }, |
| 443 | + ) |
| 444 | + .filter(|data_string| data_string.len() > URI_PREFIX.len()) |
| 445 | + .filter(|data_string| { |
| 446 | + data_string[..URI_PREFIX.len()].eq_ignore_ascii_case(URI_PREFIX) |
| 447 | + }); |
| 448 | + // Check that there is exactly one TXT record that begins with |
| 449 | + // bitcoin: as required by BIP 353 (and is valid UTF-8). |
| 450 | + match (candidate_records.next(), candidate_records.next()) { |
| 451 | + (Some(txt), None) => { |
| 452 | + let completed_requests = |
| 453 | + requests.into_iter().map(|(_, _, id, name)| (id, name)).collect(); |
| 454 | + return Some((completed_requests, txt)); |
| 455 | + }, |
| 456 | + _ => {}, |
| 457 | + } |
| 458 | + } |
| 459 | + } |
| 460 | + None |
| 461 | + } |
| 462 | +} |
0 commit comments