2 NNCP -- Node to Node copy, utilities for store-and-forward data exchange
3 Copyright (C) 2016-2023 Sergey Matveev <stargrave@stargrave.org>
5 This program is free software: you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation, version 3 of the License.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program. If not, see <http://www.gnu.org/licenses/>.
18 // Parse raw NNCP packet.
30 xdr "github.com/davecgh/go-xdr/xdr2"
31 "github.com/klauspost/compress/zstd"
32 "go.cypherpunks.ru/nncp/v8"
36 fmt.Fprint(os.Stderr, "nncp-pkt -- parse raw packet\n\n")
37 fmt.Fprintf(os.Stderr, "Usage: %s [options]\nOptions:\n", os.Args[0])
39 fmt.Fprintln(os.Stderr, "Packet is read from stdin.")
42 func doPlain(ctx *nncp.Ctx, pkt nncp.Pkt, dump, decompress bool) {
44 bufW := bufio.NewWriter(os.Stdout)
46 r = bufio.NewReader(os.Stdin)
48 decompressor, err := zstd.NewReader(r)
54 if _, err := io.Copy(bufW, r); err != nil {
57 if err := bufW.Flush(); err != nil {
62 payloadType := "unknown"
64 case nncp.PktTypeFile:
66 case nncp.PktTypeFreq:
67 payloadType = "file request"
68 case nncp.PktTypeExec:
69 payloadType = "exec compressed"
70 case nncp.PktTypeTrns:
71 payloadType = "transitional"
72 case nncp.PktTypeExecFat:
73 payloadType = "exec uncompressed"
74 case nncp.PktTypeArea:
77 payloadType = "acknowledgement"
81 case nncp.PktTypeExec, nncp.PktTypeExecFat:
82 path = string(bytes.Replace(
83 pkt.Path[:pkt.PathLen], []byte{0}, []byte(" "), -1,
85 case nncp.PktTypeTrns:
86 path = nncp.Base32Codec.EncodeToString(pkt.Path[:pkt.PathLen])
87 node, err := ctx.FindNode(path)
89 path = fmt.Sprintf("%s (%s)", path, node.Name)
91 case nncp.PktTypeArea:
92 path = nncp.Base32Codec.EncodeToString(pkt.Path[:pkt.PathLen])
93 if areaId, err := nncp.AreaIdFromString(path); err == nil {
94 path = fmt.Sprintf("%s (%s)", path, ctx.AreaName(areaId))
97 path = nncp.Base32Codec.EncodeToString(pkt.Path[:pkt.PathLen])
99 path = string(pkt.Path[:pkt.PathLen])
102 "Packet type: plain\nPayload type: %s\nNiceness: %s (%d)\nPath: %s\n",
103 payloadType, nncp.NicenessFmt(pkt.Nice), pkt.Nice, path,
113 senderName := "unknown"
114 senderNode := ctx.Neigh[*pktEnc.Sender]
115 if senderNode != nil {
116 senderName = senderNode.Name
119 recipientName := "unknown"
121 recipientNode := ctx.Neigh[*pktEnc.Recipient]
122 if recipientNode == nil {
123 area = ctx.AreaId2Area[nncp.AreaId(*pktEnc.Recipient)]
125 recipientName = "area " + area.Name
128 recipientName = recipientNode.Name
132 fmt.Printf(`Packet type: encrypted
137 nncp.NicenessFmt(pktEnc.Nice), pktEnc.Nice,
138 pktEnc.Sender, senderName,
139 pktEnc.Recipient, recipientName,
144 log.Fatalln("Config lacks private keys")
146 bufW := bufio.NewWriter(os.Stdout)
149 _, _, _, err = nncp.PktEncRead(
151 io.MultiReader(bytes.NewReader(beginning), bufio.NewReader(os.Stdin)),
152 bufW, senderNode != nil, nil,
155 areaNode := nncp.NodeOur{Id: new(nncp.NodeId), ExchPrv: new([32]byte)}
156 copy(areaNode.Id[:], area.Id[:])
157 copy(areaNode.ExchPrv[:], area.Prv[:])
158 _, _, _, err = nncp.PktEncRead(
159 &areaNode, ctx.Neigh,
160 io.MultiReader(bytes.NewReader(beginning), bufio.NewReader(os.Stdin)),
161 bufW, senderNode != nil, nil,
167 if err = bufW.Flush(); err != nil {
174 overheads = flag.Bool("overheads", false, "Print packet overheads")
175 dump = flag.Bool("dump", false, "Write decrypted/parsed payload to stdout")
176 decompress = flag.Bool("decompress", false, "Try to zstd decompress dumped data")
177 cfgPath = flag.String("cfg", nncp.DefaultCfgPath, "Path to configuration file")
178 version = flag.Bool("version", false, "Print version information")
179 warranty = flag.Bool("warranty", false, "Print warranty information")
181 log.SetFlags(log.Lshortfile)
185 fmt.Println(nncp.Warranty)
189 fmt.Println(nncp.VersionGet())
193 ctx, err := nncp.CtxFromCmdline(*cfgPath, "", "", false, false, false, false)
195 log.Fatalln("Error during initialization:", err)
200 "Plain: %d\nEncrypted: %d\nSize: %d\n",
203 nncp.PktSizeOverhead,
208 beginning := make([]byte, nncp.PktOverhead)
209 if _, err := io.ReadFull(os.Stdin, beginning[:nncp.PktEncOverhead]); err != nil {
210 log.Fatalln("Not enough data to read")
212 var pktEnc nncp.PktEnc
213 if _, err := xdr.Unmarshal(bytes.NewReader(beginning), &pktEnc); err == nil {
214 switch pktEnc.Magic {
215 case nncp.MagicNNCPEv1.B:
216 log.Fatalln(nncp.MagicNNCPEv1.TooOld())
217 case nncp.MagicNNCPEv2.B:
218 log.Fatalln(nncp.MagicNNCPEv2.TooOld())
219 case nncp.MagicNNCPEv3.B:
220 log.Fatalln(nncp.MagicNNCPEv3.TooOld())
221 case nncp.MagicNNCPEv4.B:
222 log.Fatalln(nncp.MagicNNCPEv4.TooOld())
223 case nncp.MagicNNCPEv5.B:
224 log.Fatalln(nncp.MagicNNCPEv5.TooOld())
225 case nncp.MagicNNCPEv6.B:
226 doEncrypted(ctx, pktEnc, *dump, beginning[:nncp.PktEncOverhead])
231 if _, err := io.ReadFull(os.Stdin, beginning[nncp.PktEncOverhead:]); err != nil {
232 log.Fatalln("Not enough data to read")
235 if _, err := xdr.Unmarshal(bytes.NewReader(beginning), &pkt); err == nil {
237 case nncp.MagicNNCPPv1.B:
238 log.Fatalln(nncp.MagicNNCPPv1.TooOld())
239 case nncp.MagicNNCPPv2.B:
240 log.Fatalln(nncp.MagicNNCPPv2.TooOld())
241 case nncp.MagicNNCPPv3.B:
242 doPlain(ctx, pkt, *dump, *decompress)
246 log.Fatalln("Unable to determine packet type")