2024-12-14 15:17:58 +00:00
|
|
|
|
using System;
|
2024-12-27 12:47:39 +00:00
|
|
|
|
using System.Collections.Generic;
|
2025-01-02 16:49:58 +00:00
|
|
|
|
using System.Diagnostics;
|
2025-01-01 17:42:20 +00:00
|
|
|
|
using System.Globalization;
|
2024-12-27 12:47:39 +00:00
|
|
|
|
using System.IO;
|
|
|
|
|
using System.Linq;
|
2024-12-14 15:17:58 +00:00
|
|
|
|
using System.Net.Sockets;
|
2024-12-27 12:47:39 +00:00
|
|
|
|
using System.Security.Cryptography;
|
2024-12-14 15:17:58 +00:00
|
|
|
|
using System.Text;
|
2025-01-01 17:42:20 +00:00
|
|
|
|
using System.Text.Json;
|
2024-12-14 15:17:58 +00:00
|
|
|
|
using System.Threading.Tasks;
|
2025-01-01 17:42:20 +00:00
|
|
|
|
using client;
|
2024-12-17 18:41:30 +00:00
|
|
|
|
using lib;
|
2024-12-14 15:17:58 +00:00
|
|
|
|
|
|
|
|
|
namespace Client;
|
|
|
|
|
|
|
|
|
|
public class Program
|
|
|
|
|
{
|
2025-01-01 17:42:20 +00:00
|
|
|
|
static string User = "";
|
2025-01-02 16:49:58 +00:00
|
|
|
|
static readonly Random Rand = new((int)DateTime.Now.Ticks);
|
|
|
|
|
static byte counter = (byte)Rand.Next();
|
2024-12-27 12:47:39 +00:00
|
|
|
|
|
2024-12-17 18:41:30 +00:00
|
|
|
|
static async Task Main(string[] args)
|
2024-12-14 15:17:58 +00:00
|
|
|
|
{
|
2025-01-01 17:42:20 +00:00
|
|
|
|
User = args
|
2024-12-17 18:41:30 +00:00
|
|
|
|
.SkipWhile(a => !new[] { "-p", "--phone" }.Contains(a)) // search for the option
|
|
|
|
|
.Skip(1) // skip the `-u/--user` itself to get the value
|
|
|
|
|
.FirstOrDefault() ?? "0000"; // get the value or deafult if it doesnt exist
|
|
|
|
|
|
|
|
|
|
// On boot, check if a key is available
|
2024-12-20 09:23:49 +00:00
|
|
|
|
RSA? serverKey = LoadRSAFromFile("server_key.pem");
|
|
|
|
|
if (serverKey == null) { Console.WriteLine("Could not find server key, please run server before clients!"); return; }
|
2025-01-01 17:42:20 +00:00
|
|
|
|
RSA pubKey = LoadRSAFromFile($"pubkey_{User}.pem") ?? RSA.Create(2048);
|
|
|
|
|
RSA privKey = LoadRSAFromFile($"privkey_{User}.pem") ?? pubKey;
|
2024-12-17 18:41:30 +00:00
|
|
|
|
|
2025-01-01 17:42:20 +00:00
|
|
|
|
SaveRSAKeys(User, pubKey, privKey);
|
2024-12-14 15:17:58 +00:00
|
|
|
|
using TcpClient client = new("127.0.0.1", 12345);
|
|
|
|
|
|
|
|
|
|
var stream = client.GetStream();
|
|
|
|
|
|
2024-12-17 18:41:30 +00:00
|
|
|
|
// First contact init
|
|
|
|
|
bool needsRegister = pubKey == privKey || args.Any(a => new[] { "-fr", "--force-register" }.Contains(a));
|
|
|
|
|
Aes sk = Aes.Create(); // creates an AES-256 key
|
2025-01-02 16:49:58 +00:00
|
|
|
|
// establish secure connection
|
|
|
|
|
byte[] skEnc = serverKey.Encrypt([.. sk.Key, .. sk.IV], RSAEncryptionPadding.OaepSHA256);
|
|
|
|
|
await stream.WriteAsync(skEnc);
|
|
|
|
|
// wait for the server to confirm it recieved the keys
|
|
|
|
|
await stream.ReadExactlyAsync(new byte[1]);
|
|
|
|
|
|
2024-12-17 18:41:30 +00:00
|
|
|
|
if (needsRegister)
|
|
|
|
|
{
|
2024-12-20 09:23:49 +00:00
|
|
|
|
try
|
|
|
|
|
{
|
2025-01-02 16:49:58 +00:00
|
|
|
|
await RegisterClient(User, pubKey, privKey, sk, stream);
|
2024-12-20 09:23:49 +00:00
|
|
|
|
}
|
|
|
|
|
catch (Exception ex)
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine("Failed registration process");
|
|
|
|
|
Console.WriteLine("Exception: " + ex.Message);
|
|
|
|
|
Console.WriteLine("Stack: " + ex.StackTrace);
|
|
|
|
|
return;
|
2024-12-17 18:41:30 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2025-01-02 16:49:58 +00:00
|
|
|
|
// start login process
|
|
|
|
|
byte[] msg = Request.CreateRequest(RequestType.Login, ref counter, Utils.NumberToBytes(User));
|
|
|
|
|
msg = sk.EncryptCfb(msg, sk.IV, PaddingMode.PKCS7);
|
|
|
|
|
await stream.WriteAsync(msg);
|
|
|
|
|
byte[] toSign = new byte[16];
|
|
|
|
|
await stream.ReadExactlyAsync(toSign, 0, 16);
|
|
|
|
|
toSign = sk.DecryptCfb(toSign, sk.IV, PaddingMode.None);
|
|
|
|
|
byte[] signed = privKey.SignData(toSign, HashAlgorithmName.SHA256, RSASignaturePadding.Pkcs1);
|
|
|
|
|
msg = Request.CreateRequest(RequestType.ConfirmLogin, ref counter, BitConverter.GetBytes(signed.Length));
|
|
|
|
|
msg = sk.EncryptCfb(msg, sk.IV, PaddingMode.None);
|
|
|
|
|
WriteColor($"Sending sig: {Convert.ToBase64String(signed)}", ConsoleColor.Green);
|
|
|
|
|
msg = [.. msg, .. signed];
|
|
|
|
|
await stream.WriteAsync(msg);
|
|
|
|
|
byte[] buffer = new byte[512];
|
|
|
|
|
int len = await stream.ReadAsync(buffer);
|
|
|
|
|
byte[] dec = sk.DecryptCfb(buffer[..len], sk.IV, PaddingMode.PKCS7);
|
|
|
|
|
string r = Encoding.UTF8.GetString(dec);
|
|
|
|
|
if (r == "OK")
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine("Login successful");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine($"Failed login: {r}");
|
|
|
|
|
client.Dispose();
|
|
|
|
|
return;
|
|
|
|
|
}
|
2024-12-17 18:41:30 +00:00
|
|
|
|
}
|
|
|
|
|
|
2024-12-27 12:47:39 +00:00
|
|
|
|
await HandleUserInput(client, stream, sk, privKey);
|
2024-12-17 18:41:30 +00:00
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
2025-01-02 16:49:58 +00:00
|
|
|
|
async static Task RegisterClient(string user, RSA pub, RSA priv, Aes sk, NetworkStream stream)
|
2024-12-17 18:41:30 +00:00
|
|
|
|
{
|
2024-12-27 12:47:39 +00:00
|
|
|
|
Console.WriteLine("Attempting to register with public key:");
|
|
|
|
|
Console.WriteLine(pub.ExportRSAPublicKeyPem());
|
2024-12-20 09:23:49 +00:00
|
|
|
|
// Generate aes key and send it forward
|
2024-12-27 12:47:39 +00:00
|
|
|
|
Console.WriteLine($"Session key: {string.Join(' ', sk.Key)}");
|
|
|
|
|
Console.WriteLine($"Session IV: {string.Join(' ', sk.IV)}");
|
2024-12-20 09:23:49 +00:00
|
|
|
|
|
|
|
|
|
// Generate the Register msg
|
2024-12-27 12:47:39 +00:00
|
|
|
|
Console.WriteLine("Sending rsa public key thing");
|
2024-12-17 18:41:30 +00:00
|
|
|
|
byte[] pubBytes = pub.ExportRSAPublicKey();
|
2024-12-20 09:23:49 +00:00
|
|
|
|
byte[] data = new byte[12];
|
2024-12-17 18:41:30 +00:00
|
|
|
|
Array.Copy(Utils.NumberToBytes(user), data, 8);
|
|
|
|
|
Array.Copy(BitConverter.GetBytes(pubBytes.Length), 0, data, 8, 4);
|
|
|
|
|
byte[] msg = Request.CreateRequest(RequestType.Register, ref counter, data);
|
2024-12-20 09:23:49 +00:00
|
|
|
|
// Encrypt msg and send it
|
2024-12-27 12:47:39 +00:00
|
|
|
|
byte[] payload = [.. msg, .. pubBytes];
|
|
|
|
|
byte[] enc = sk.EncryptCfb(payload, sk.IV, PaddingMode.PKCS7);
|
|
|
|
|
Console.WriteLine($"payload length: {enc.Length}");
|
|
|
|
|
await stream.WriteAsync(enc);
|
2024-12-20 09:23:49 +00:00
|
|
|
|
|
|
|
|
|
// get the 6 digit code (from "secure channel", actually an OK message is expected here but the 6 digit code kinda replaces it)
|
2024-12-17 18:41:30 +00:00
|
|
|
|
byte[] digits = new byte[6];
|
2024-12-20 09:23:49 +00:00
|
|
|
|
int len = 0;
|
|
|
|
|
while (len != 6)
|
|
|
|
|
{
|
|
|
|
|
len = await stream.ReadAsync(digits);
|
|
|
|
|
}
|
2024-12-17 18:41:30 +00:00
|
|
|
|
// print the 6 digit code
|
2024-12-20 09:23:49 +00:00
|
|
|
|
Console.WriteLine($"[{DateTime.Now}] 6 digit code: {string.Join(' ', digits.Select(d => d.ToString()))}");
|
2024-12-17 18:41:30 +00:00
|
|
|
|
// get the 6 digit code from the user
|
2024-12-20 09:23:49 +00:00
|
|
|
|
while (true)
|
|
|
|
|
{
|
2024-12-27 12:47:39 +00:00
|
|
|
|
Console.Write("> ");
|
2024-12-17 18:41:30 +00:00
|
|
|
|
string? code = Console.ReadLine()?.Trim();
|
2024-12-20 09:23:49 +00:00
|
|
|
|
if (code == null || code.Take(6).Any(c => !char.IsDigit(c)))
|
|
|
|
|
{
|
2024-12-17 18:41:30 +00:00
|
|
|
|
Console.WriteLine("Invalid code!");
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
byte[] codeBytes = code
|
|
|
|
|
.Take(6) // take the first 6 characters
|
|
|
|
|
.Select(d => byte.Parse(d.ToString())) // parse into bytes
|
|
|
|
|
.ToArray();
|
2024-12-20 09:23:49 +00:00
|
|
|
|
// Debug print the inserted value to see it works :)
|
|
|
|
|
Console.WriteLine(string.Join(' ', codeBytes.Select(b => b.ToString())));
|
|
|
|
|
|
|
|
|
|
// Sign the 6 digit code & Generate ConfirmRegister message
|
|
|
|
|
byte[] signed = priv.SignData(codeBytes, HashAlgorithmName.SHA256, RSASignaturePadding.Pkcs1);
|
|
|
|
|
msg = Request.CreateRequest(RequestType.ConfirmRegister, ref counter, [.. codeBytes, .. BitConverter.GetBytes(signed.Length)]);
|
2024-12-27 12:47:39 +00:00
|
|
|
|
enc = sk.EncryptCfb(msg, sk.IV, PaddingMode.None); // no reason to encrpy the signature
|
2024-12-20 09:23:49 +00:00
|
|
|
|
payload = [.. enc, .. signed]; // should be 128 (enc) + 256 (signed)
|
|
|
|
|
await stream.WriteAsync(payload);
|
|
|
|
|
// wait for OK/NACK response (anything other than OK is a NACK)
|
2024-12-17 18:41:30 +00:00
|
|
|
|
int incoming = await stream.ReadAsync(enc);
|
2024-12-20 09:23:49 +00:00
|
|
|
|
msg = sk.DecryptCfb(enc[..incoming], sk.IV, PaddingMode.PKCS7);
|
2024-12-17 18:41:30 +00:00
|
|
|
|
string r = Encoding.UTF8.GetString(msg);
|
2024-12-20 09:23:49 +00:00
|
|
|
|
if (r == "OK")
|
|
|
|
|
{
|
2024-12-17 18:41:30 +00:00
|
|
|
|
Console.WriteLine("Registration process complete");
|
|
|
|
|
break;
|
|
|
|
|
}
|
2025-01-02 16:49:58 +00:00
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine("Failed reigstreation: " + r);
|
|
|
|
|
}
|
2024-12-17 18:41:30 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static RSA? LoadRSAFromFile(string file)
|
|
|
|
|
{
|
|
|
|
|
if (File.Exists(file))
|
|
|
|
|
{
|
|
|
|
|
string content = File.ReadAllText(file);
|
|
|
|
|
RSA k = RSA.Create();
|
|
|
|
|
k.ImportFromPem(content);
|
|
|
|
|
return k;
|
|
|
|
|
}
|
|
|
|
|
return null;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void SaveRSAKeys(string user, RSA pub, RSA priv)
|
|
|
|
|
{
|
|
|
|
|
File.WriteAllText($"pubkey_{user}.pem", pub.ExportRSAPublicKeyPem());
|
|
|
|
|
File.WriteAllText($"privkey_{user}.pem", priv.ExportRSAPrivateKeyPem());
|
2024-12-14 15:17:58 +00:00
|
|
|
|
}
|
2024-12-17 18:41:30 +00:00
|
|
|
|
|
2024-12-27 12:47:39 +00:00
|
|
|
|
static async Task HandleUserInput(TcpClient client, NetworkStream stream, Aes sk, RSA privKey)
|
2024-12-17 18:41:30 +00:00
|
|
|
|
{
|
2024-12-27 12:47:39 +00:00
|
|
|
|
string? currentChat = null;
|
|
|
|
|
Dictionary<string, RSA> publicKeys = [];
|
2024-12-17 18:41:30 +00:00
|
|
|
|
while (client.Connected)
|
|
|
|
|
{
|
2024-12-27 12:47:39 +00:00
|
|
|
|
Console.Write("> ");
|
2024-12-14 15:17:58 +00:00
|
|
|
|
string? input = Console.ReadLine();
|
2024-12-17 18:41:30 +00:00
|
|
|
|
if (input == null)
|
|
|
|
|
{
|
2024-12-14 15:17:58 +00:00
|
|
|
|
await Task.Delay(100);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2024-12-17 18:41:30 +00:00
|
|
|
|
else if (input.StartsWith('/'))
|
|
|
|
|
{
|
2024-12-27 12:47:39 +00:00
|
|
|
|
string[] words = input.Split(' ');
|
2024-12-14 17:10:09 +00:00
|
|
|
|
// Commands :D, i like commands
|
2024-12-27 12:47:39 +00:00
|
|
|
|
switch (words[0].ToLower())
|
2024-12-17 18:41:30 +00:00
|
|
|
|
{
|
2024-12-14 17:10:09 +00:00
|
|
|
|
case "/quit":
|
|
|
|
|
case "/exit":
|
|
|
|
|
case "/q!":
|
|
|
|
|
return;
|
2024-12-27 12:47:39 +00:00
|
|
|
|
case "/chat":
|
|
|
|
|
case "/msg":
|
|
|
|
|
string? old = currentChat;
|
|
|
|
|
currentChat = words.Length > 1 ? words[1] : null;
|
|
|
|
|
if (currentChat != null && currentChat.Length > 16)
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine("Invalid number: too long");
|
|
|
|
|
currentChat = old;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if (currentChat != null && !publicKeys.ContainsKey(currentChat))
|
|
|
|
|
{
|
|
|
|
|
// attempt to get the currnet chat's key, this is also possible to do just before sending a message
|
|
|
|
|
// but i decided to do it here since if better fits the current structure
|
|
|
|
|
RSA? key = await GetPublicKey(stream, sk, currentChat);
|
|
|
|
|
if (key != null)
|
|
|
|
|
{
|
|
|
|
|
publicKeys[currentChat] = key;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
currentChat = old;
|
|
|
|
|
Console.WriteLine($"Reverting to previous chat: {currentChat ?? "none"}");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case "/read":
|
|
|
|
|
case "/get":
|
|
|
|
|
case "/fetch":
|
|
|
|
|
case "/pull":
|
|
|
|
|
await GetMessages(stream, sk, privKey, publicKeys);
|
|
|
|
|
break;
|
2024-12-14 17:10:09 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
2024-12-17 18:41:30 +00:00
|
|
|
|
else
|
|
|
|
|
{
|
2024-12-27 12:47:39 +00:00
|
|
|
|
if (currentChat == null)
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine("No chat is active, please select chat using '/msg [number]' or '/chat [number]'");
|
|
|
|
|
}
|
|
|
|
|
else if (publicKeys.TryGetValue(currentChat!, out RSA? key))
|
|
|
|
|
{
|
2025-01-01 17:42:20 +00:00
|
|
|
|
// Pick the id as a random uint, good enough for the sake of testing
|
|
|
|
|
Message m = new((uint)Rand.Next(), User, false, input);
|
|
|
|
|
m.CalculateSignature(privKey);
|
|
|
|
|
byte[] userMsg = [.. key.Encrypt(m.Bytes(), RSAEncryptionPadding.OaepSHA256), .. m.Signature];
|
2024-12-27 12:47:39 +00:00
|
|
|
|
byte[] req = Request.CreateRequest(
|
|
|
|
|
RequestType.SendMessage,
|
|
|
|
|
ref counter,
|
|
|
|
|
[.. Utils.NumberToBytes(currentChat!), .. BitConverter.GetBytes(userMsg.Length)]);
|
|
|
|
|
req = sk.EncryptCfb(req, sk.IV);
|
|
|
|
|
stream.Write([.. req, .. userMsg]);
|
|
|
|
|
Console.WriteLine($"[{DateTime.Now}] Sent to server: {input}");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine($"active chat exists, but no key was found...");
|
|
|
|
|
}
|
2024-12-14 15:17:58 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2024-12-27 12:47:39 +00:00
|
|
|
|
static async Task<RSA?> GetPublicKey(NetworkStream stream, Aes sk, string chat)
|
|
|
|
|
{
|
|
|
|
|
byte[] req = Request.CreateRequest(RequestType.GetUserKey, ref counter, Utils.NumberToBytes(chat));
|
|
|
|
|
req = sk.EncryptCfb(req, sk.IV, PaddingMode.None); // no need for padding this is exactly 128 bytes
|
|
|
|
|
await stream.WriteAsync(req);
|
|
|
|
|
byte[] response = new byte[1024];
|
|
|
|
|
int len = await stream.ReadAsync(response);
|
|
|
|
|
byte[] key = sk.DecryptCfb(response[..len], sk.IV, PaddingMode.PKCS7);
|
|
|
|
|
if (key[0] == 1)
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine($"failed getting key for {chat}: {Encoding.UTF8.GetString(key[1..])}");
|
|
|
|
|
return null;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
RSA bobsKey = RSA.Create();
|
|
|
|
|
bobsKey.ImportRSAPublicKey(key.AsSpan()[1..], out int _);
|
|
|
|
|
Console.WriteLine($"Got key:\n {bobsKey.ExportRSAPublicKeyPem()}\n");
|
|
|
|
|
return bobsKey;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static async Task GetMessages(NetworkStream stream, Aes sk, RSA privKey, Dictionary<string, RSA> publicKeys)
|
2024-12-17 18:41:30 +00:00
|
|
|
|
{
|
2024-12-27 12:47:39 +00:00
|
|
|
|
byte[] req = Request.CreateRequest(RequestType.GetMessages, ref counter, []);
|
|
|
|
|
req = sk.EncryptCfb(req, sk.IV, PaddingMode.None); // no need for padding this is exactly 128 bytes
|
|
|
|
|
await stream.WriteAsync(req);
|
2025-01-01 17:42:20 +00:00
|
|
|
|
byte[] buffer = new byte[4096];
|
2024-12-27 12:47:39 +00:00
|
|
|
|
int len = await stream.ReadAsync(buffer);
|
|
|
|
|
byte[] lengths = buffer[..16];
|
|
|
|
|
lengths = sk.DecryptCfb(lengths, sk.IV, PaddingMode.None);
|
2025-01-01 17:42:20 +00:00
|
|
|
|
Console.ForegroundColor = ConsoleColor.Cyan;
|
|
|
|
|
Console.WriteLine($"Got messages: {string.Join(", ", lengths)}");
|
|
|
|
|
Console.ResetColor();
|
2024-12-27 12:47:39 +00:00
|
|
|
|
byte[] msg = new byte[1024]; // msg buffer
|
|
|
|
|
|
|
|
|
|
int start = 16; // skip the first 16 bytes since its the lengths message
|
2025-01-01 17:42:20 +00:00
|
|
|
|
for (int i = 0; i < lengths.Length - 1; i += 2)
|
2024-12-17 18:41:30 +00:00
|
|
|
|
{
|
2025-01-01 17:42:20 +00:00
|
|
|
|
int l = (lengths[i] << 8) | (lengths[i + 1]);
|
|
|
|
|
Console.WriteLine($"got message of length: {l}");
|
2024-12-27 12:47:39 +00:00
|
|
|
|
if (l == 0) { break; } // a 0 means we are done actually, as empty messages shouldn't be allowed
|
|
|
|
|
// get the msg
|
|
|
|
|
int end = start + l;
|
|
|
|
|
if (end > len)
|
2024-12-17 18:41:30 +00:00
|
|
|
|
{
|
2025-01-01 17:42:20 +00:00
|
|
|
|
// TODO: properly handle it as a buffered stream and properly buffer it
|
2024-12-27 12:47:39 +00:00
|
|
|
|
}
|
2025-01-01 17:42:20 +00:00
|
|
|
|
|
|
|
|
|
WriteColor($"got ecnryped message: {Convert.ToBase64String(buffer[start..end])}", ConsoleColor.Green);
|
2024-12-27 12:47:39 +00:00
|
|
|
|
// decrypt the message
|
2025-01-01 17:42:20 +00:00
|
|
|
|
int msgLen = privKey.KeySize / 8;
|
|
|
|
|
if (privKey.TryDecrypt(buffer.AsSpan()[start..(msgLen + start)], msg, RSAEncryptionPadding.OaepSHA256, out int written))
|
2024-12-27 12:47:39 +00:00
|
|
|
|
{
|
|
|
|
|
byte[] dec = msg[..written];
|
2025-01-01 17:42:20 +00:00
|
|
|
|
Message m = new(dec)
|
|
|
|
|
{
|
|
|
|
|
Signature = buffer[(start + msgLen)..end]
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
bool sigValid = false;
|
|
|
|
|
if (publicKeys.TryGetValue(m.Sender, out RSA? pk) || (pk = await GetPublicKey(stream, sk, m.Sender)) != null)
|
|
|
|
|
{
|
|
|
|
|
publicKeys[m.Sender] = pk; // update the key value stored in case it was requested for in GetPublicKey
|
|
|
|
|
sigValid = m.IsSignatureValid(pk);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
Console.WriteLine("Failed getting sender's public key");
|
|
|
|
|
}
|
|
|
|
|
WriteColor($"decrypted message: {Convert.ToBase64String(dec)}", ConsoleColor.Green);
|
|
|
|
|
Console.WriteLine($"Got message from {m.Sender} (id: {m.Id}) (valid: {sigValid}): " + (m.IsAck ? "ACK" : m.Content));
|
|
|
|
|
// if the signature is valid we also want to send back a message ack for the same id :)
|
|
|
|
|
if (sigValid)
|
|
|
|
|
{
|
|
|
|
|
Message mAck = new(m.Id, User, true, "");
|
|
|
|
|
mAck.CalculateSignature(privKey);
|
|
|
|
|
byte[] userMsg = [.. publicKeys[m.Sender].Encrypt(mAck.Bytes(), RSAEncryptionPadding.OaepSHA256), .. mAck.Signature];
|
|
|
|
|
byte[] reqAck = Request.CreateRequest(
|
|
|
|
|
RequestType.SendMessage,
|
|
|
|
|
ref counter,
|
|
|
|
|
[.. Utils.NumberToBytes(m.Sender), .. BitConverter.GetBytes(userMsg.Length)]);
|
|
|
|
|
reqAck = sk.EncryptCfb(reqAck, sk.IV);
|
|
|
|
|
stream.Write([.. reqAck, .. userMsg]);
|
|
|
|
|
}
|
2024-12-27 12:47:39 +00:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
// what if we cant decrypt the message? well, i doubt there is anything we can do about it
|
|
|
|
|
// even if we know who sent the message we dont know which message it is unless the server also knows
|
|
|
|
|
// and i dont want the server to be aware of that, i think it makes more sense for the server to act as a relay
|
|
|
|
|
// and a buffer than an actual participant, so if the message is failing to decrypt that will go unnoticed.
|
2024-12-28 09:13:51 +00:00
|
|
|
|
// supposedly the sender will notice the lack of response and send it again
|
2024-12-27 12:47:39 +00:00
|
|
|
|
Console.WriteLine("Incoming message failed to decrypt, unknown sender");
|
2024-12-14 15:17:58 +00:00
|
|
|
|
}
|
2025-01-01 17:42:20 +00:00
|
|
|
|
start = end;
|
2024-12-14 15:17:58 +00:00
|
|
|
|
}
|
2024-12-27 12:47:39 +00:00
|
|
|
|
|
|
|
|
|
bool hasMoreMessages = lengths[15] != 0;
|
2025-01-01 17:42:20 +00:00
|
|
|
|
Console.WriteLine($"hasMoreMessages: {hasMoreMessages}");
|
2024-12-14 15:17:58 +00:00
|
|
|
|
}
|
2025-01-01 17:42:20 +00:00
|
|
|
|
|
|
|
|
|
static void WriteColor(string Line, ConsoleColor Color, ConsoleColor Background = ConsoleColor.Black)
|
|
|
|
|
{
|
|
|
|
|
Console.ForegroundColor = Color;
|
|
|
|
|
Console.BackgroundColor = Background;
|
|
|
|
|
Console.WriteLine(Line);
|
|
|
|
|
Console.ResetColor();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|