1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
|
package main
import (
"flag"
"fmt"
"github.com/keybase/saltpack"
"github.com/keybase/saltpack/basic"
"github.com/tonistiigi/units"
"io"
"net"
"net/netip"
"os"
"git.samanthony.xyz/hose/handshake"
"git.samanthony.xyz/hose/hosts"
"git.samanthony.xyz/hose/key"
"git.samanthony.xyz/hose/util"
)
const (
port = 60321
network = "tcp"
usage = "Usage: hose <-handshake <rhost> | -r | -s <rhost>>"
)
var (
handshakeHost = flag.String("handshake", "", "exchange public keys with remote host")
recvFlag = flag.Bool("r", false, "receive")
sendHost = flag.String("s", "", "send to remote host")
)
func main() {
flag.Parse()
if *handshakeHost != "" {
if err := handshake.Handshake(*handshakeHost); err != nil {
util.Eprintf("%v\n", err)
}
} else if *recvFlag {
if err := recv(); err != nil {
util.Eprintf("%v\n", err)
}
} else if *sendHost != "" {
if err := send(*sendHost); err != nil {
util.Eprintf("%v\n", err)
}
} else {
util.Logf("%s", usage)
flag.Usage()
os.Exit(1)
}
}
// recv pipes data from the remote host to stdout.
func recv() error {
laddr := net.JoinHostPort("", fmt.Sprintf("%d", port))
ln, err := net.Listen(network, laddr)
if err != nil {
return err
}
defer ln.Close()
util.Logf("listening on %s", laddr)
conn, err := ln.Accept()
if err != nil {
return err
}
defer conn.Close()
util.Logf("accepted connection from %s", conn.RemoteAddr())
n, err := io.Copy(os.Stdout, conn)
util.Logf("received %.2f", units.Bytes(n)*units.B)
return err
}
// send pipes data from stdin to the remote host.
func send(rHostName string) error {
var keyCreator basic.EphemeralKeyCreator
// Load sender signing keypair.
util.Logf("loading signing key")
sigKeypair, err := key.LoadSigKeypair()
if err != nil {
return err
}
// Create symmetric session key.
sessionKey, err := key.NewReceiverSymmetricKey()
if err != nil {
return err
}
// Load receiver encryption key.
util.Logf("loading encryption key for %s", rHostName)
rAddr, err := netip.ParseAddr(rHostName)
if err != nil {
return err
}
rHost, err := hosts.Lookup(rAddr)
if err != nil {
return err
}
// Connect to remote host.
rAddrPort := netip.AddrPortFrom(rAddr, port)
util.Logf("connecting to %s", rAddrPort)
conn, err := net.Dial(network, rAddrPort.String())
if err != nil {
return err
}
defer conn.Close()
// Create signcrypted stream.
util.Logf("signcrypting stream")
rcvrBoxKeys := []saltpack.BoxPublicKey{rHost.BoxPublicKey}
rcvrSymmetricKeys := []saltpack.ReceiverSymmetricKey{sessionKey}
plaintext, err := saltpack.NewSigncryptSealStream(conn, keyCreator, sigKeypair, rcvrBoxKeys, rcvrSymmetricKeys)
if err != nil {
return err
}
defer plaintext.Close()
// Send data.
n, err := io.Copy(plaintext, os.Stdin)
util.Logf("sent %.2f", units.Bytes(n)*units.B)
return err
}
|