Skip to content

Commit 7b56d51

Browse files
committed
Construct Trampoline component in create_payment_onion
Now that we can generate the inner Trampoline onions, we need to update the `create_payment_onion` utility method to consider the newly available path data and incorporate the encoded Trampoline onion in the outer hop data. This also comes with a behavioral change for blinded tails: when Trampoline are present, we assume that they precede the blinded tail, which must therefore be serialized as part of the Trampoline onion.
1 parent eba3f90 commit 7b56d51

File tree

4 files changed

+198
-16
lines changed

4 files changed

+198
-16
lines changed

lightning/src/ln/blinded_payment_tests.rs

+91-3
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
// licenses.
99

1010
use bitcoin::hashes::hex::FromHex;
11+
use bitcoin::hex::DisplayHex;
1112
use bitcoin::secp256k1::{PublicKey, Scalar, Secp256k1, SecretKey, schnorr};
1213
use bitcoin::secp256k1::ecdh::SharedSecret;
1314
use bitcoin::secp256k1::ecdsa::{RecoverableSignature, Signature};
@@ -30,12 +31,14 @@ use crate::ln::outbound_payment::{Retry, IDEMPOTENCY_TIMEOUT_TICKS};
3031
use crate::offers::invoice::UnsignedBolt12Invoice;
3132
use crate::offers::nonce::Nonce;
3233
use crate::prelude::*;
33-
use crate::routing::router::{BlindedTail, Path, Payee, PaymentParameters, RouteHop, RouteParameters};
34+
use crate::routing::router::{BlindedTail, Path, Payee, PaymentParameters, RouteHop, RouteParameters, TrampolineHop};
3435
use crate::sign::{NodeSigner, Recipient};
3536
use crate::util::config::UserConfig;
36-
use crate::util::ser::WithoutLength;
37+
use crate::util::ser::{WithoutLength, Writeable};
3738
use crate::util::test_utils;
3839
use lightning_invoice::RawBolt11Invoice;
40+
use types::features::Features;
41+
use crate::blinded_path::BlindedHop;
3942

4043
pub fn blinded_payment_path(
4144
payment_secret: PaymentSecret, intro_node_min_htlc: u64, intro_node_max_htlc: u64,
@@ -362,15 +365,17 @@ fn do_forward_checks_failure(check: ForwardCheckFail, intro_fails: bool) {
362365
ForwardCheckFail::ForwardPayloadEncodedAsReceive => {
363366
let recipient_onion_fields = RecipientOnionFields::spontaneous_empty();
364367
let session_priv = SecretKey::from_slice(&[3; 32]).unwrap();
365-
let onion_keys = onion_utils::construct_onion_keys(&Secp256k1::new(), &route.paths[0], &session_priv).unwrap();
368+
let mut onion_keys = onion_utils::construct_onion_keys(&Secp256k1::new(), &route.paths[0], &session_priv).unwrap();
366369
let cur_height = nodes[0].best_block_info().1;
367370
let (mut onion_payloads, ..) = onion_utils::build_onion_payloads(
368371
&route.paths[0], amt_msat, &recipient_onion_fields, cur_height, &None, None, None).unwrap();
369372
// Remove the receive payload so the blinded forward payload is encoded as a final payload
370373
// (i.e. next_hop_hmac == [0; 32])
371374
onion_payloads.pop();
375+
onion_keys.pop();
372376
if $target_node_idx + 1 < nodes.len() {
373377
onion_payloads.pop();
378+
onion_keys.pop();
374379
}
375380
$update_add.onion_routing_packet = onion_utils::construct_onion_packet(onion_payloads, onion_keys, [0; 32], &payment_hash).unwrap();
376381
},
@@ -1655,3 +1660,86 @@ fn route_blinding_spec_test_vector() {
16551660
_ => panic!("Unexpected error")
16561661
}
16571662
}
1663+
1664+
#[test]
1665+
fn test_combined_trampoline_onion_creation_vectors() {
1666+
// As per https://github.com/lightning/bolts/blob/fa0594ac2af3531d734f1d707a146d6e13679451/bolt04/trampoline-to-blinded-path-payment-onion-test.json#L251
1667+
1668+
let mut secp_ctx = Secp256k1::new();
1669+
let session_priv = secret_from_hex("a64feb81abd58e473df290e9e1c07dc3e56114495cadf33191f44ba5448ebe99");
1670+
1671+
let path = Path {
1672+
hops: vec![
1673+
// Bob
1674+
RouteHop {
1675+
pubkey: pubkey_from_hex("0324653eac434488002cc06bbfb7f10fe18991e35f9fe4302dbea6d2353dc0ab1c"),
1676+
node_features: NodeFeatures::empty(),
1677+
short_channel_id: 0,
1678+
channel_features: ChannelFeatures::empty(),
1679+
fee_msat: 3_000,
1680+
cltv_expiry_delta: 0,
1681+
maybe_announced_channel: false,
1682+
},
1683+
1684+
// Carol
1685+
RouteHop {
1686+
pubkey: pubkey_from_hex("027f31ebc5462c1fdce1b737ecff52d37d75dea43ce11c74d25aa297165faa2007"),
1687+
node_features: NodeFeatures::empty(),
1688+
short_channel_id: (572330 << 40) + (42 << 16) + 2821,
1689+
channel_features: ChannelFeatures::empty(),
1690+
fee_msat: 153_000,
1691+
cltv_expiry_delta: 0,
1692+
maybe_announced_channel: false,
1693+
},
1694+
],
1695+
blinded_tail: Some(BlindedTail {
1696+
trampoline_hops: vec![
1697+
// Carol's pubkey
1698+
TrampolineHop {
1699+
pubkey: pubkey_from_hex("027f31ebc5462c1fdce1b737ecff52d37d75dea43ce11c74d25aa297165faa2007"),
1700+
node_features: Features::empty(),
1701+
fee_msat: 2_500,
1702+
cltv_expiry_delta: 24,
1703+
},
1704+
// Dave's pubkey (the intro node needs to be duplicated)
1705+
TrampolineHop {
1706+
pubkey: pubkey_from_hex("032c0b7cf95324a07d05398b240174dc0c2be444d96b159aa6c7f7b1e668680991"),
1707+
node_features: Features::empty(),
1708+
fee_msat: 150_500, // incorporate both base and proportional fee
1709+
cltv_expiry_delta: 36,
1710+
}
1711+
],
1712+
hops: vec![
1713+
// Dave's blinded node id
1714+
BlindedHop {
1715+
blinded_node_id: pubkey_from_hex("0295d40514096a8be54859e7dfe947b376eaafea8afe5cb4eb2c13ff857ed0b4be"),
1716+
encrypted_payload: bytes_from_hex("0ccf3c8a58deaa603f657ee2a5ed9d604eb5c8ca1e5f801989afa8f3ea6d789bbdde2c7e7a1ef9ca8c38d2c54760febad8446d3f273ddb537569ef56613846ccd3aba78a"),
1717+
},
1718+
// Eve's blinded node id
1719+
BlindedHop {
1720+
blinded_node_id: pubkey_from_hex("020e2dbadcc2005e859819ddebbe88a834ae8a6d2b049233c07335f15cd1dc5f22"),
1721+
encrypted_payload: bytes_from_hex("bcd747394fbd4d99588da075a623316e15a576df5bc785cccc7cd6ec7b398acce6faf520175f9ec920f2ef261cdb83dc28cc3a0eeb970107b3306489bf771ef5b1213bca811d345285405861d08a655b6c237fa247a8b4491beee20c878a60e9816492026d8feb9dafa84585b253978db6a0aa2945df5ef445c61e801fb82f43d5f00716baf9fc9b3de50bc22950a36bda8fc27bfb1242e5860c7e687438d4133e058770361a19b6c271a2a07788d34dccc27e39b9829b061a4d960eac4a2c2b0f4de506c24f9af3868c0aff6dda27281c"),
1722+
}
1723+
],
1724+
blinding_point: pubkey_from_hex("02988face71e92c345a068f740191fd8e53be14f0bb957ef730d3c5f76087b960e"),
1725+
excess_final_cltv_expiry_delta: 0,
1726+
final_value_msat: 150_000_000
1727+
}),
1728+
};
1729+
1730+
let associated_data_slice = secret_from_hex("e89bc505e84aaca09613833fc58c9069078fb43bfbea0488f34eec9db99b5f82");
1731+
let associated_data = PaymentHash(associated_data_slice.secret_bytes());
1732+
let payment_secret = PaymentSecret(secret_from_hex("7494b65bc092b48a75465e43e29be807eb2cc535ce8aaba31012b8ff1ceac5da").secret_bytes());
1733+
let outer_session_key = secret_from_hex("4f777e8dac16e6dfe333066d9efb014f7a51d11762ff76eca4d3a95ada99ba3e");
1734+
let outer_onion_prng_seed = onion_utils::gen_pad_from_shared_secret(&outer_session_key.secret_bytes());
1735+
1736+
let amt_msat = 150_000_000;
1737+
let cur_height = 800_000;
1738+
let recipient_onion_fields = RecipientOnionFields::secret_only(payment_secret);
1739+
let (bob_onion, htlc_msat, htlc_cltv) = onion_utils::create_payment_onion_internal(&secp_ctx, &path, &session_priv, amt_msat, &recipient_onion_fields, cur_height, &associated_data, &None, None, [0; 32], Some(outer_session_key), Some(outer_onion_prng_seed)).unwrap();
1740+
1741+
let outer_onion_packet_hex = bob_onion.encode().to_lower_hex_string();
1742+
assert_eq!(outer_onion_packet_hex, "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");
1743+
assert_eq!(htlc_msat, 150_156_000);
1744+
assert_eq!(htlc_cltv, 800_060);
1745+
}

lightning/src/ln/msgs.rs

-1
Original file line numberDiff line numberDiff line change
@@ -1802,7 +1802,6 @@ mod fuzzy_internal_msgs {
18021802
amt_to_forward: u64,
18031803
outgoing_cltv_value: u32,
18041804
},
1805-
#[allow(unused)]
18061805
TrampolineEntrypoint {
18071806
amt_to_forward: u64,
18081807
outgoing_cltv_value: u32,

lightning/src/ln/onion_route_tests.rs

+15
Original file line numberDiff line numberDiff line change
@@ -1148,6 +1148,21 @@ fn test_trampoline_onion_payload_assembly_values() {
11481148
} else {
11491149
panic!("Bob payload must be Forward");
11501150
}
1151+
1152+
let (_, total_msat_combined, total_htlc_offset_combined) = onion_utils::create_payment_onion(
1153+
&Secp256k1::new(),
1154+
&path,
1155+
&session_priv,
1156+
amt_msat,
1157+
&recipient_onion_fields,
1158+
cur_height,
1159+
&payment_hash,
1160+
&None,
1161+
None,
1162+
prng_seed,
1163+
).unwrap();
1164+
assert_eq!(total_msat_combined, total_msat);
1165+
assert_eq!(total_htlc_offset_combined, total_htlc_offset);
11511166
}
11521167

11531168
#[test]

lightning/src/ln/onion_utils.rs

+92-12
Original file line numberDiff line numberDiff line change
@@ -340,10 +340,16 @@ pub(super) fn construct_onion_keys<T: secp256k1::Signing>(
340340
) -> Result<Vec<OnionKeys>, secp256k1::Error> {
341341
let mut res = Vec::with_capacity(path.hops.len());
342342

343+
let blinded_tail = path.blinded_tail.as_ref().and_then(|t| {
344+
if !t.trampoline_hops.is_empty() {
345+
return None;
346+
}
347+
Some(t)
348+
});
343349
construct_onion_keys_generic_callback(
344350
secp_ctx,
345351
&path.hops,
346-
path.blinded_tail.as_ref(),
352+
blinded_tail,
347353
session_priv,
348354
|shared_secret, _blinding_factor, ephemeral_pubkey, _, _| {
349355
let (rho, mu) = gen_rho_mu_from_shared_secret(shared_secret.as_ref());
@@ -698,6 +704,8 @@ pub(super) fn construct_onion_packet(
698704
let mut chacha = ChaCha20::new(&prng_seed, &[0; 8]);
699705
chacha.process(&[0; ONION_DATA_LEN], &mut packet_data);
700706

707+
debug_assert_eq!(payloads.len(), onion_keys.len(), "Payloads and keys must have equal lengths");
708+
701709
let packet = FixedSizeOnionPacket(packet_data);
702710
construct_onion_packet_with_init_noise::<_, _>(
703711
payloads,
@@ -707,7 +715,6 @@ pub(super) fn construct_onion_packet(
707715
)
708716
}
709717

710-
#[allow(unused)]
711718
pub(super) fn construct_trampoline_onion_packet(
712719
payloads: Vec<msgs::OutboundTrampolinePayload>, onion_keys: Vec<OnionKeys>,
713720
prng_seed: [u8; 32], associated_data: &PaymentHash, length: Option<u16>,
@@ -1476,22 +1483,95 @@ pub fn create_payment_onion<T: secp256k1::Signing>(
14761483
keysend_preimage: &Option<PaymentPreimage>, invoice_request: Option<&InvoiceRequest>,
14771484
prng_seed: [u8; 32],
14781485
) -> Result<(msgs::OnionPacket, u64, u32), APIError> {
1479-
let onion_keys = construct_onion_keys(&secp_ctx, &path, &session_priv).map_err(|_| {
1480-
APIError::InvalidRoute { err: "Pubkey along hop was maliciously selected".to_owned() }
1481-
})?;
1482-
let (onion_payloads, htlc_msat, htlc_cltv) = build_onion_payloads(
1483-
&path,
1486+
create_payment_onion_internal(
1487+
secp_ctx,
1488+
path,
1489+
session_priv,
14841490
total_msat,
14851491
recipient_onion,
14861492
cur_block_height,
1493+
payment_hash,
14871494
keysend_preimage,
14881495
invoice_request,
1489-
None
1496+
prng_seed,
1497+
None,
1498+
None,
1499+
)
1500+
}
1501+
1502+
/// Build a payment onion, returning the first hop msat and cltv values as well.
1503+
/// `cur_block_height` should be set to the best known block height + 1.
1504+
pub(crate) fn create_payment_onion_internal<T: secp256k1::Signing>(
1505+
secp_ctx: &Secp256k1<T>, path: &Path, session_priv: &SecretKey, total_msat: u64,
1506+
recipient_onion: &RecipientOnionFields, cur_block_height: u32, payment_hash: &PaymentHash,
1507+
keysend_preimage: &Option<PaymentPreimage>, invoice_request: Option<&InvoiceRequest>,
1508+
prng_seed: [u8; 32], secondary_session_priv: Option<SecretKey>,
1509+
secondary_prng_seed: Option<[u8; 32]>,
1510+
) -> Result<(msgs::OnionPacket, u64, u32), APIError> {
1511+
let mut outer_total_msat = total_msat;
1512+
let mut outer_starting_htlc_offset = cur_block_height;
1513+
let mut outer_session_priv_override = None;
1514+
let mut trampoline_packet_option = None;
1515+
1516+
if let Some(blinded_tail) = &path.blinded_tail {
1517+
if !blinded_tail.trampoline_hops.is_empty() {
1518+
let trampoline_payloads;
1519+
(trampoline_payloads, outer_total_msat, outer_starting_htlc_offset) =
1520+
build_trampoline_onion_payloads(
1521+
&blinded_tail,
1522+
total_msat,
1523+
recipient_onion,
1524+
cur_block_height,
1525+
keysend_preimage,
1526+
)?;
1527+
1528+
let onion_keys =
1529+
construct_trampoline_onion_keys(&secp_ctx, &blinded_tail, &session_priv).map_err(
1530+
|_| APIError::InvalidRoute {
1531+
err: "Pubkey along hop was maliciously selected".to_owned(),
1532+
},
1533+
)?;
1534+
let trampoline_packet = construct_trampoline_onion_packet(
1535+
trampoline_payloads,
1536+
onion_keys,
1537+
prng_seed,
1538+
payment_hash,
1539+
// TODO: specify a fixed size for privacy in future spec upgrade
1540+
None,
1541+
)
1542+
.map_err(|_| APIError::InvalidRoute {
1543+
err: "Route size too large considering onion data".to_owned(),
1544+
})?;
1545+
1546+
trampoline_packet_option = Some(trampoline_packet);
1547+
1548+
outer_session_priv_override = Some(secondary_session_priv.unwrap_or_else(|| {
1549+
let session_priv_hash = Sha256::hash(&session_priv.secret_bytes()).to_byte_array();
1550+
SecretKey::from_slice(&session_priv_hash[..]).expect("You broke SHA-256!")
1551+
}));
1552+
}
1553+
}
1554+
1555+
let (onion_payloads, htlc_msat, htlc_cltv) = build_onion_payloads(
1556+
&path,
1557+
outer_total_msat,
1558+
recipient_onion,
1559+
outer_starting_htlc_offset,
1560+
keysend_preimage,
1561+
invoice_request,
1562+
trampoline_packet_option,
14901563
)?;
1491-
let onion_packet = construct_onion_packet(onion_payloads, onion_keys, prng_seed, payment_hash)
1492-
.map_err(|_| APIError::InvalidRoute {
1493-
err: "Route size too large considering onion data".to_owned(),
1494-
})?;
1564+
1565+
let outer_session_priv = outer_session_priv_override.as_ref().unwrap_or(session_priv);
1566+
let onion_keys = construct_onion_keys(&secp_ctx, &path, outer_session_priv).map_err(|_| {
1567+
APIError::InvalidRoute { err: "Pubkey along hop was maliciously selected".to_owned() }
1568+
})?;
1569+
let outer_onion_prng_seed = secondary_prng_seed.unwrap_or(prng_seed);
1570+
let onion_packet =
1571+
construct_onion_packet(onion_payloads, onion_keys, outer_onion_prng_seed, payment_hash)
1572+
.map_err(|_| APIError::InvalidRoute {
1573+
err: "Route size too large considering onion data".to_owned(),
1574+
})?;
14951575
Ok((onion_packet, htlc_msat, htlc_cltv))
14961576
}
14971577

0 commit comments

Comments
 (0)