client.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607
  1. package main
  2. /*
  3. #cgo CFLAGS: -O2
  4. #cgo LDFLAGS: -lcrypto -lm
  5. #include "../c/dpf.h"
  6. #include "../c/okvClient.h"
  7. #include "../c/dpf.c"
  8. #include "../c/okvClient.c"
  9. */
  10. import "C"
  11. //sssssssssss
  12. import (
  13. lib "2PPS/lib"
  14. "bytes"
  15. "crypto/rand"
  16. "crypto/sha256"
  17. "crypto/tls"
  18. "encoding/json"
  19. "fmt"
  20. "math/big"
  21. mr "math/rand"
  22. "net"
  23. "sort"
  24. "strings"
  25. "sync"
  26. "time"
  27. "unsafe"
  28. "golang.org/x/crypto/nacl/box"
  29. )
  30. type tweet struct {
  31. Topics []string
  32. Text string
  33. }
  34. const leader string = "127.0.0.1:4441"
  35. //needs to be changed at leader/follower/client at the same time
  36. const neededSubscriptions = 1
  37. const numClients = 1
  38. var topicList []string
  39. var archiveTopicList []string
  40. //todo! expand this for multiple clients
  41. var archiveInterests = make([]int, 1)
  42. var sharedSecret [numClients][2][32]byte = createSharedSecret()
  43. var wantsArchive = make([]byte, 1)
  44. var dataLen int = 64
  45. var numThreads int = 12
  46. var dbWriteSize int = 4
  47. var leaderPublicKey *[32]byte
  48. var followerPublicKey *[32]byte
  49. var clientPrivateKey *[32]byte
  50. var clientPublicKey *[32]byte
  51. func main() {
  52. //creates test tweets
  53. tweets := make([][]byte, numClients)
  54. for i := range tweets {
  55. tweets[i] = make([]byte, dataLen)
  56. }
  57. for i := 0; i < numClients; i++ {
  58. var tweet []byte
  59. if i == 0 {
  60. topics := []byte("house, mouse;")
  61. text := []byte("I am a house in a mouse;")
  62. tweet = append(tweet, topics...)
  63. tweet = append(tweet, text...)
  64. }
  65. tweet = append(tweet, []byte(";")[0])
  66. //adds padding
  67. length := dataLen - len(tweet)
  68. padding := make([]byte, length)
  69. rand.Read(padding)
  70. tweet = append(tweet, padding...)
  71. tweets[i] = tweet
  72. }
  73. wg := &sync.WaitGroup{}
  74. for i := 0; i < numClients; i++ {
  75. wg.Add(1)
  76. go client(tweets[i], i)
  77. }
  78. wg.Wait()
  79. }
  80. func client(tweet []byte, clientNumber int) {
  81. /*
  82. if len(os.Args) != 4 {
  83. fmt.Println("try again with: numThreads, dataLength, numRows")
  84. return
  85. }
  86. //input when executing is follower amount
  87. serverAmount, _ = strconv.Atoi(os.Args[1])
  88. serverAmount++
  89. dataLen, _ = strconv.Atoi(os.Args[2])
  90. numThreads, _ = strconv.Atoi(os.Args[3])
  91. dbSize, _ = strconv.Atoi(os.Args[4])
  92. */
  93. generatedPublicKey, generatedPrivateKey, err := box.GenerateKey(rand.Reader)
  94. if err != nil {
  95. panic(err)
  96. }
  97. clientPrivateKey = generatedPrivateKey
  98. clientPublicKey = generatedPublicKey
  99. C.initializeCipher()
  100. //initializes the connection to the leader
  101. conf := &tls.Config{
  102. InsecureSkipVerify: true,
  103. }
  104. leaderConn, err := tls.Dial("tcp", leader, conf)
  105. if err != nil {
  106. panic(err)
  107. }
  108. leaderConn.SetDeadline(time.Time{})
  109. //receives topics first so client can participate asap
  110. receiveTopicLists(leaderConn)
  111. //gets the public keys of both servers
  112. var tmpLeaderPubKey [32]byte
  113. _, err = leaderConn.Read(tmpLeaderPubKey[:])
  114. if err != nil {
  115. panic(err)
  116. }
  117. leaderPublicKey = &tmpLeaderPubKey
  118. var tmpFollowerPubKey [32]byte
  119. _, err = leaderConn.Read(tmpFollowerPubKey[:])
  120. if err != nil {
  121. panic(err)
  122. }
  123. followerPublicKey = &tmpFollowerPubKey
  124. //sends own public key
  125. writeToConn(leaderConn, clientPublicKey[:])
  126. //setup ends above
  127. //while client is active he is always connected and has to participate
  128. for {
  129. //gets current phase
  130. phase := readFromConn(leaderConn, 1)
  131. fmt.Println("Phase: ", phase[0])
  132. if phase[0] == 1 {
  133. //gets current dbWriteSize from leader
  134. dbWriteSizeBytes := readFromConn(leaderConn, 4)
  135. dbWriteSize = byteToInt(dbWriteSizeBytes)
  136. //todo! put into tweet creation
  137. //roundAsBytes := readFromConn(leaderConn, 4)
  138. roundAsBytes := make([]byte, 4)
  139. _, err = leaderConn.Read(roundAsBytes)
  140. if err != nil {
  141. panic(err)
  142. }
  143. //request virtualAddress from leader via pirQuery
  144. encryptedQueryLeader, encryptedQueryFollower := createAuditPIRQuery(clientNumber)
  145. sendQuerys(encryptedQueryLeader, encryptedQueryFollower, leaderConn, false)
  146. pos := receiveVirtualAddress(sharedSecret[clientNumber], leaderConn)
  147. //prep the query
  148. dataSize := len(tweet)
  149. querySize := make([]byte, 4)
  150. cQuerySize := C.int(byteToInt(querySize))
  151. var dpfQueryA *C.uchar
  152. var dpfQueryB *C.uchar
  153. C.prepQuery(C.int(pos), C.int(dbWriteSize), (*C.uchar)(&tweet[0]), C.int(dataSize), &cQuerySize, &dpfQueryA, &dpfQueryB)
  154. intQuerySize := int(cQuerySize) //byteToInt(querySize)
  155. //write the query
  156. queryAPlaintext := C.GoBytes(unsafe.Pointer(dpfQueryA), C.int(intQuerySize))
  157. //encrypts queryA and appends it to message
  158. var nonce [24]byte
  159. //fill nonce with randomness
  160. _, err = rand.Read(nonce[:])
  161. if err != nil {
  162. panic("couldn't get randomness for nonce!")
  163. }
  164. dpfQueryAEncrypted := box.Seal(nonce[:], queryAPlaintext, &nonce, leaderPublicKey, clientPrivateKey)
  165. //encrypts queryB and appends it to message
  166. queryBPlaintext := C.GoBytes(unsafe.Pointer(dpfQueryB), C.int(intQuerySize))
  167. //fill nonce with randomness
  168. _, err = rand.Read(nonce[:])
  169. if err != nil {
  170. panic("couldn't get randomness for nonce!")
  171. }
  172. dpfQueryBEncrypted := box.Seal(nonce[:], queryBPlaintext, &nonce, followerPublicKey, clientPrivateKey)
  173. //writes the dpfQuery to the leader
  174. dpfLengthBytes := intToByte(len(dpfQueryAEncrypted))
  175. writeToConn(leaderConn, dpfLengthBytes)
  176. writeToConn(leaderConn, dpfQueryAEncrypted)
  177. writeToConn(leaderConn, dpfQueryBEncrypted)
  178. C.free(unsafe.Pointer(dpfQueryA))
  179. C.free(unsafe.Pointer(dpfQueryB))
  180. } else if phase[0] == 3 {
  181. /*
  182. possible Values
  183. 0 : new client
  184. leader expects sharedSecrets, expects pirQuery
  185. 1 : update needed
  186. leader sends topicList, performs local update of sharedSecret, expects pirQuery
  187. 2 : no update needed
  188. nothing
  189. */
  190. subPhase := readFromConn(leaderConn, 1)
  191. var encryptedQueryLeader, encryptedQueryFollower []byte
  192. //first time participating
  193. if subPhase[0] == 0 {
  194. receiveTopicLists(leaderConn)
  195. encryptedQueryLeader, encryptedQueryFollower = createPIRQuery(int(subPhase[0]), clientNumber)
  196. sendQuerys(encryptedQueryLeader, encryptedQueryFollower, leaderConn, false)
  197. }
  198. //updates the topic list and what client is interested in
  199. if subPhase[0] == 1 {
  200. receiveTopicLists(leaderConn)
  201. //updates local secret
  202. for index := 0; index < 2; index++ {
  203. sharedSecret[clientNumber][index] = sha256.Sum256(sharedSecret[clientNumber][index][:])
  204. }
  205. encryptedQueryLeader, encryptedQueryFollower = createPIRQuery(int(subPhase[0]), clientNumber)
  206. sendQuerys(encryptedQueryLeader, encryptedQueryFollower, leaderConn, false)
  207. }
  208. receiveTweets(sharedSecret[clientNumber], leaderConn, false)
  209. if len(archiveTopicList) > 0 {
  210. wantsArchive[0] = 0 //archive test
  211. } else {
  212. wantsArchive[0] = 0
  213. }
  214. writeToConn(leaderConn, wantsArchive)
  215. if wantsArchive[0] == 1 && len(archiveTopicList) > 0 {
  216. encryptedQueryLeader, encryptedQueryFollower = createPIRQuery(-1, clientNumber)
  217. sendQuerys(encryptedQueryLeader, encryptedQueryFollower, leaderConn, true)
  218. receiveTweets(sharedSecret[clientNumber], leaderConn, true)
  219. }
  220. } else {
  221. panic("somethin went wrong")
  222. }
  223. }
  224. }
  225. //creates and sends the pirQuerys for each server
  226. func createPIRQuery(subPhase int, clientNumber int) ([]byte, []byte) {
  227. //later this will be taken from gui, this is only for testing
  228. topicsOfInterest := make([]int, 1)
  229. topicsOfInterest[0] = 1
  230. archiveInterests[0] = 1
  231. tmptopicsOfInterest := make([]int, len(topicsOfInterest))
  232. copy(tmptopicsOfInterest, topicsOfInterest)
  233. tmpNeededSubscriptions := neededSubscriptions
  234. tmpTopicList := make([]string, len(topicList))
  235. copy(tmpTopicList, topicList)
  236. if wantsArchive[0] == 1 && subPhase == -1 {
  237. tmpNeededSubscriptions = len(archiveInterests)
  238. copy(tmptopicsOfInterest, archiveInterests) //archiveInterests from gui
  239. copy(tmpTopicList, archiveTopicList)
  240. }
  241. topicsOfInterestAsBytes := make([][]byte, tmpNeededSubscriptions)
  242. for i := range topicsOfInterestAsBytes {
  243. topicsOfInterestAsBytes[i] = make([]byte, len(tmpTopicList))
  244. }
  245. //creates fake topicsOfInterest if client is boooring
  246. if len(tmptopicsOfInterest) < tmpNeededSubscriptions && subPhase != -1 {
  247. tmptopicsOfInterest = addFakeInterests(neededSubscriptions, len(tmpTopicList), tmptopicsOfInterest, false)
  248. }
  249. for topic, position := range tmptopicsOfInterest {
  250. //change used to be positon-1
  251. topicsOfInterestAsBytes[topic][position-1] = 1
  252. }
  253. //pirQuery [serverAmount][topicsofinterest][topicAmount]byte
  254. pirQuerys := make([][][]byte, 2)
  255. for i := range pirQuerys {
  256. pirQuerys[i] = make([][]byte, len(tmptopicsOfInterest))
  257. for j := range pirQuerys[i] {
  258. pirQuerys[i][j] = make([]byte, len(tmpTopicList))
  259. }
  260. }
  261. //for leader
  262. //pirQuery will be filled with random bits
  263. for topic := range tmptopicsOfInterest {
  264. for index := range tmpTopicList {
  265. bit, err := rand.Int(rand.Reader, big.NewInt(2))
  266. if err != nil {
  267. panic(err)
  268. }
  269. pirQuerys[0][topic][index] = byte(bit.Int64())
  270. }
  271. }
  272. //creating last manually with result and wanted
  273. //if position random result correct -> 0, not correct -> 1
  274. for topic := range tmptopicsOfInterest {
  275. for index := range tmpTopicList {
  276. if pirQuerys[0][topic][index] == topicsOfInterestAsBytes[topic][index] {
  277. pirQuerys[1][topic][index] = 0
  278. } else {
  279. pirQuerys[1][topic][index] = 1
  280. }
  281. }
  282. }
  283. //flattens the querys to be able to send them more efficently
  284. messagesFlattened := make([][]byte, 2)
  285. //adds the sharedSecret to the first pirQuery when first time participating
  286. if subPhase == 0 {
  287. for server := 0; server < 2; server++ {
  288. messagesFlattened[server] = append(messagesFlattened[server], sharedSecret[clientNumber][server][:]...)
  289. }
  290. }
  291. for server := 0; server < 2; server++ {
  292. for topic := range pirQuerys[server] {
  293. messagesFlattened[server] = append(messagesFlattened[server], pirQuerys[server][topic][:]...)
  294. }
  295. }
  296. var nonce [24]byte
  297. _, err := rand.Read(nonce[:])
  298. if err != nil {
  299. panic("couldn't get randomness for nonce!")
  300. }
  301. encryptedQueryLeader := box.Seal(nonce[:], messagesFlattened[0], &nonce, leaderPublicKey, clientPrivateKey)
  302. _, err = rand.Read(nonce[:])
  303. if err != nil {
  304. panic("couldn't get randomness for nonce!")
  305. }
  306. encryptedQueryFollower := box.Seal(nonce[:], messagesFlattened[1], &nonce, followerPublicKey, clientPrivateKey)
  307. return encryptedQueryLeader, encryptedQueryFollower
  308. }
  309. func sendQuerys(encryptedQueryLeader, encryptedQueryFollower []byte, leaderConn net.Conn, getArchive bool) {
  310. encryptedLength := len(encryptedQueryLeader)
  311. //sends the pirQuerysLength to the leader
  312. writeToConn(leaderConn, intToByte(encryptedLength))
  313. //sends the pirQuerys to the leader
  314. writeToConn(leaderConn, encryptedQueryLeader)
  315. writeToConn(leaderConn, encryptedQueryFollower)
  316. if getArchive {
  317. writeToConn(leaderConn, intToByte(len(archiveInterests)))
  318. }
  319. }
  320. func receiveVirtualAddress(sharedSecret [2][32]byte, leaderConn net.Conn) int {
  321. virtualAddressByte := readFromConn(leaderConn, 4)
  322. //xores the sharedSecret
  323. for h := 0; h < 2; h++ {
  324. for i := 0; i < 4; i++ {
  325. virtualAddressByte[i] = virtualAddressByte[i] ^ sharedSecret[h][i]
  326. }
  327. }
  328. return byteToInt(virtualAddressByte)
  329. }
  330. func receiveTweets(sharedSecret [2][32]byte, leaderConn net.Conn, getArchive bool) int {
  331. tmpNeededSubscriptions := neededSubscriptions
  332. if getArchive {
  333. tmpNeededSubscriptions = len(archiveInterests)
  334. }
  335. for i := 0; i < tmpNeededSubscriptions; i++ {
  336. //client receives tweets
  337. tweetsLengthBytes := readFromConn(leaderConn, 4)
  338. tweetsLength := byteToInt(tweetsLengthBytes)
  339. tweets := readFromConn(leaderConn, tweetsLength)
  340. //expand sharedSecret so it is of right length
  341. expandBy := len(tweets) / 32
  342. expandedSharedSecrets := make([][]byte, 2)
  343. for i := 0; i < 2; i++ {
  344. for j := 0; j < expandBy; j++ {
  345. expandedSharedSecrets[i] = append(expandedSharedSecrets[i], sharedSecret[i][:]...)
  346. }
  347. }
  348. //xors the received messge into the message to display
  349. for i := 0; i < 2; i++ {
  350. lib.Xor(expandedSharedSecrets[i][:], tweets)
  351. }
  352. //tweets can be displayed
  353. split := strings.Split(string(tweets), ";")
  354. topic := split[0]
  355. text := split[1]
  356. fmt.Println("Topics: ", topic)
  357. fmt.Println("Text: ", text)
  358. }
  359. return 0
  360. }
  361. //creates a shared secret for each server
  362. func createSharedSecret() [numClients][2][32]byte {
  363. var tmpSharedSecret [numClients][2][32]byte
  364. for i := 0; i < numClients; i++ {
  365. for j := 0; j < 2; j++ {
  366. _, err := rand.Read(tmpSharedSecret[i][j][:])
  367. if err != nil {
  368. panic("couldn't get randomness for sharedSecret!")
  369. }
  370. }
  371. }
  372. return tmpSharedSecret
  373. }
  374. func createAuditPIRQuery(clientNumber int) ([]byte, []byte) {
  375. //pirQuery [serverAmount][dbWriteSize]byte
  376. pirQuerys := make([][]byte, 2)
  377. for i := range pirQuerys {
  378. pirQuerys[i] = make([]byte, dbWriteSize)
  379. }
  380. //for leader
  381. //pirQuery will be filled with random bits
  382. for index := range pirQuerys[0] {
  383. bit := mr.Intn(2)
  384. pirQuerys[0][index] = byte(bit)
  385. }
  386. copy(pirQuerys[1], pirQuerys[0])
  387. //the positon the virtual address will be taken from
  388. pos := mr.Intn(dbWriteSize)
  389. pirQuerys[0][pos] = 1
  390. pirQuerys[1][pos] = 0
  391. //flattens the querys to be able to send them more efficently
  392. messagesFlattened := make([][]byte, 2)
  393. //adds the sharedSecret to the pirQuery
  394. for server := 0; server < 2; server++ {
  395. messagesFlattened[server] = append(messagesFlattened[server], sharedSecret[clientNumber][server][:]...)
  396. }
  397. for server := 0; server < 2; server++ {
  398. messagesFlattened[server] = append(messagesFlattened[server], pirQuerys[server][:]...)
  399. }
  400. var nonce [24]byte
  401. _, err := rand.Read(nonce[:])
  402. if err != nil {
  403. panic("couldn't get randomness for nonce!")
  404. }
  405. encryptedQueryLeader := box.Seal(nonce[:], messagesFlattened[0], &nonce, leaderPublicKey, clientPrivateKey)
  406. _, err = rand.Read(nonce[:])
  407. if err != nil {
  408. panic("couldn't get randomness for nonce!")
  409. }
  410. encryptedQueryFollower := box.Seal(nonce[:], messagesFlattened[1], &nonce, followerPublicKey, clientPrivateKey)
  411. return encryptedQueryLeader, encryptedQueryFollower
  412. }
  413. //generates a topicOfInterest array with random values
  414. func addFakeInterests(length, max int, topicsOfInterest []int, doAuditing bool) []int {
  415. fakeTopicsOfInterest := make([]int, length)
  416. maxInt := max
  417. //fills the array with unique random ascending values ranging from 0 to max
  418. for i := 0; i < length; i++ {
  419. fakeTopicsOfInterest[i] = mr.Intn(maxInt)
  420. for j := 0; j < i; j++ {
  421. if fakeTopicsOfInterest[i] == fakeTopicsOfInterest[j] {
  422. i--
  423. break
  424. }
  425. }
  426. }
  427. if doAuditing {
  428. sort.Ints(fakeTopicsOfInterest)
  429. return fakeTopicsOfInterest
  430. }
  431. //adds unique and new random numbers to topicOfInterests until length is satisfied
  432. for _, number := range fakeTopicsOfInterest {
  433. if !inList(number, topicsOfInterest) {
  434. topicsOfInterest = append(topicsOfInterest, number)
  435. }
  436. if len(topicsOfInterest) == neededSubscriptions {
  437. break
  438. }
  439. }
  440. sort.Ints(topicsOfInterest)
  441. return topicsOfInterest
  442. }
  443. func inList(number int, list []int) bool {
  444. for _, element := range list {
  445. if element == number {
  446. return true
  447. }
  448. }
  449. return false
  450. }
  451. func receiveTopicLists(leaderConn net.Conn) {
  452. for i := 0; i < 2; i++ {
  453. topicListLength := readFromConn(leaderConn, 4)
  454. recTopicList := readFromConn(leaderConn, byteToInt(topicListLength))
  455. var tmpTopicList []string
  456. arrayReader := bytes.NewReader(recTopicList[:])
  457. json.NewDecoder(arrayReader).Decode(&tmpTopicList)
  458. if i == 0 {
  459. topicList = tmpTopicList
  460. } else {
  461. archiveTopicList = tmpTopicList
  462. }
  463. }
  464. }
  465. //sends the array to the connection
  466. func writeToConn(connection net.Conn, array []byte) {
  467. _, err := connection.Write(array)
  468. if err != nil {
  469. panic(err)
  470. }
  471. }
  472. //reads an array which is returned and of size "size" from the connection
  473. func readFromConn(connection net.Conn, size int) []byte {
  474. array := make([]byte, size)
  475. _, err := connection.Read(array)
  476. if err != nil {
  477. panic(err)
  478. }
  479. return array
  480. }
  481. func intToByte(myInt int) (retBytes []byte) {
  482. retBytes = make([]byte, 4)
  483. retBytes[3] = byte((myInt >> 24) & 0xff)
  484. retBytes[2] = byte((myInt >> 16) & 0xff)
  485. retBytes[1] = byte((myInt >> 8) & 0xff)
  486. retBytes[0] = byte(myInt & 0xff)
  487. return
  488. }
  489. func byteToInt(myBytes []byte) (x int) {
  490. x = int(myBytes[3])<<24 + int(myBytes[2])<<16 + int(myBytes[1])<<8 + int(myBytes[0])
  491. return
  492. }