1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308
|
Mailbox Server Protocol
=======================
Overview
--------
A method for two computers on the Internet to communicate securely.
Two peer computers use the Mailbox Server (e.g. the one running at ``relay.magic-wormhole.io``) to negotiate a shared secret and a shared Mailbox.
This Mailbox mirrors encrypted messages between two peers, allowing these two computers to communicate.
These peer messages are encrypted with a shared secret the server doesn't know.
This document describes the concrete protocol spoken between a peer and the Mailbox Server.
Concepts and Analogy
--------------------
Naming of this server centers around the concept of a North American post-office, which typically consisted of rows and rows of identical locked doors, behind which letters for a particular recipient would be placed.
.. image:: _static/hilbert-post-office.jpeg
:width: 1211
:height: 184
:alt: rows of identical locked boxes with different numbers on them
Our Mailboxes are identified by a large random string; we have an effectively infinite number of them.
("`Hilbert's <https://en.wikipedia.org/wiki/Hilbert's_paradox_of_the_Grand_Hotel>`_ post office"?)
Similar to the numbers on a physical post office's mailbox doors, “Nameplates” have short numeric identities.
These short numbers map to a particular, random Mailbox.
For example, in a wormhole code like “4-purple-sausages”, the “4” is the nameplate.
The Mailbox Server provides, via each Mailbox, queued delivery of binary messages from one client to a second, and vice versa.
Each message contains a “phase” (a string) and a body (bytestring).
These messages are queued in a “Mailbox” until the other side connects and retrieves them, but are
delivered immediately if both sides are connected to the server at the
same time.
Except for "pake" setup, all of these messages are encrypted so the server cannot read the contents.
Each client has a randomly-generated “side”, a short hex string, used to
differentiate between echoes of a client’s own message, and real
messages from the other client.
Application IDs
---------------
The server isolates each application from any others. Each client
provides an “App Id” when it first connects (via the “BIND” message),
and all subsequent commands are scoped to this application. This means
that nameplates (described below) and mailboxes can be reused between
different apps. The AppID is a unicode string. Both sides of the
wormhole must use the same AppID, of course, or they’ll never see each
other. The server keeps track of which applications are in use for
maintenance purposes.
Each application should use a unique AppID. Developers are encouraged to
use “DNSNAME/APPNAME” to obtain a unique one: e.g. the ``bin/wormhole``
file-transfer tool uses ``lothar.com/wormhole/text-or-file-xfer``.
Each "App Id" could be on an entirely different server and everything will work the same as if two separate "App Ids" are hosted on the same server.
WebSocket Transport & Message Encoding
--------------------------------------
At the lowest level, each client establishes (and maintains) a WebSocket
connection to the Mailbox Server. If the connection is lost (which could
happen because the server was rebooted for maintenance, or because the
client’s network connection migrated from one network to another, or
because the resident network gremlins decided to mess with you today),
clients should reconnect after waiting a random (and
exponentially-growing) delay. The Python implementation waits about 1
second after the first connection loss, growing by 50% each time, capped
at 1 minute.
Messages are encoded as a dictionary.
All encodings must include a ``"type"`` key which says what kind of message this is; all other keys depend on the message type.
All messages are serialized as JSON and encoded to UTF-8; these resulting bytes are sent as a single “binary-mode” WebSocket payload.
.. hint::
Debugging is aided by the addition of information to most messages.
``misc/dump-timing.py`` is a debug tool which renders timing data
gathered from the server and both clients, to identify protocol
slowdowns and guide optimization efforts. To support this, the
client/server messages include additional keys. Client->Server messages
include a random ``id`` key, which is copied into the ``ack`` that is
immediately sent back to the client for all commands (logged for the
timing tool but otherwise ignored). Some client->server messages
(``list``, ``allocate``, ``claim``, ``release``, ``close``, ``ping``)
provoke a direct response by the server: for these, ``id`` is copied
into the response. This helps the tool correlate the command and
response. All server->client messages have a ``server_tx`` timestamp
(seconds since epoch, as a float), which records when the message left
the server. Direct responses include a ``server_rx`` timestamp, to
record when the client’s command was received. The tool combines these
with local timestamps (recorded by the client and not shared with the
server) to build a full picture of network delays and round-trip times.
The server can signal ``error`` for any message type it does not recognize.
Clients and Servers must ignore unrecognized keys in otherwise-recognized messages.
Clients must ignore unrecognized message types from the Server.
Connection-Specific (Client-to-Server) Messages
-----------------------------------------------
.. seqdiag::
seqdiag {
peer -> server [label = "type=bind\nappid=demo\nside=b491c"];
}
The first thing each client sends to the server, immediately after the
WebSocket connection is established, is a ``bind`` message. This
specifies the AppID and side (in keys ``appid`` and ``side``,
respectively) that all subsequent messages will be scoped to.
.. note::
Technically each message could be independent (with its own ``appid`` and ``side``) but it is simpler and less confusing to force one WebSocket per logical wormhole connection.
The first thing the server sends to each client is the ``welcome`` message.
This is intended to deliver important status information to the client that might influence its operation.
The Python client currently reacts to the following keys (and ignores all others):
- ``current_cli_version``: prompts the user to upgrade if the server’s
advertised version is greater than the client’s version (as derived
from the git tag)
- ``motd``: prints this message, if present; intended to inform users
about performance problems, scheduled downtime, or to beg for
donations to keep the server running
- ``error``: causes the client to print the message and then terminate.
If a future version of the protocol requires a rate-limiting CAPTCHA
ticket or other authorization record, the server can send ``error``
(explaining the requirement) if it does not see this ticket arrive
before the ``bind``.
.. seqdiag::
seqdiag {
peer <- server [label = "type=welcome\nmotd=Hello World"];
}
A ``ping`` will provoke a ``pong``: these are used by unit tests for synchronization purposes (to detect when a batch of messages have been fully processed by the server).
NAT-binding refresh messages are handled by the WebSocket layer (by asking Autobahn to send a keepalive messages every 60 seconds), and do not use ``ping``.
If any client->server command is invalid (e.g. it lacks a necessary key,
or was sent in the wrong order), an ``error`` response will be sent,
This response will include the error string in the ``error`` key, and a
full copy of the original message dictionary in ``orig``.
Nameplates
----------
Wormhole codes look like ``4-purple-sausages``, consisting of a number followed by some random words.
This number is called a “Nameplate” (``4`` in this example).
On the Mailbox Server, the Nameplate contains a pointer to a Mailbox.
Clients can “claim” a nameplate, and then later “release” it. Each claim
is for a specific side (so one client claiming the same nameplate
multiple times only counts as one claim). Nameplates are deleted once
the last client has released it, or after some period of inactivity.
Clients can either make up nameplates themselves, or (more commonly) ask
the server to allocate one for them. Allocating a nameplate
automatically claims it (to avoid a race condition), but for simplicity,
clients send a claim for all nameplates, even ones which they’ve
allocated themselves.
Nameplates (on the server) must live until the second client has learned
about the associated mailbox, after which point they can be reused by
other clients. So if two clients connect quickly, but then maintain a
long-lived wormhole connection, they do not need to consume the limited
space of short nameplates for that whole time.
The ``allocate`` command allocates a nameplate (the server returns one
that is as short as possible), and the ``allocated`` response provides
the answer. Clients can also send a ``list`` command to get back a
``nameplates`` response with all allocated nameplates for the bound
AppID: this helps the code-input tab-completion feature know which
prefixes to offer. The ``nameplates`` response returns a list of
dictionaries, one per claimed nameplate, with at least an ``id`` key in
each one (with the nameplate string). Future versions may record
additional attributes in the nameplate records, specifically a wordlist
identifier and a code length (again to help with code-completion on the
receiver).
Mailboxes
---------
The server provides a single “Mailbox” to each pair of connecting
Wormhole clients. This holds an unordered set of messages, delivered
immediately to connected clients, and queued for delivery to clients
which connect later. Messages from both clients are merged together:
clients use the included ``side`` identifier to distinguish echoes of
their own messages from those coming from the other client.
Each mailbox is “opened” by some number of clients at a time, until all
clients have closed it. Mailboxes are kept alive by either an open
client, or a Nameplate which points to the mailbox (so when a Nameplate
is deleted from inactivity, the corresponding Mailbox will be too).
The ``open`` command both marks the mailbox as being opened by the bound
side, and also adds the WebSocket as subscribed to that mailbox, so new
messages are delivered immediately to the connected client. There is no
explicit ack to the ``open`` command, but since all clients add a
message to the mailbox as soon as they connect, there will always be a
``message`` response shortly after the ``open`` goes through. The
``close`` command provokes a ``closed`` response.
The ``close`` command accepts an optional “mood” string: this allows
clients to tell the server (in general terms) about their experiences
with the wormhole interaction. The server records the mood in its
“usage” record, so the server operator can get a sense of how many
connections are succeeding and failing. The moods currently recognized
by the Mailbox Server are:
- ``happy`` (default): the PAKE key-establishment worked, and the
client saw at least one valid encrypted message from its peer
- ``lonely``: the client gave up without hearing anything from its peer
- ``scary``: the client saw an invalid encrypted message from its peer,
indicating that either the wormhole code was typed in wrong, or an
attacker tried (and failed) to guess the code
- ``errory``: the client encountered some other error: protocol problem
or internal error
The server will also record ``pruney`` if it deleted the mailbox due to
inactivity, or ``crowded`` if more than two sides tried to access the
mailbox.
When clients use the ``add`` command to add a client-to-client message,
they will put the body (a bytestring) into the command as a hex-encoded
string in the ``body`` key. They will also put the message’s “phase”, as
a string, into the ``phase`` key. See client-protocol.md for details
about how different phases are used.
When a client sends ``open``, it will get back a ``message`` response
for every message in the mailbox. It will also get a real-time
``message`` for every ``add`` performed by clients later. These
``message`` responses include “side” and “phase” from the sending
client, and “body” (as a hex string, encoding the binary message body).
The decoded “body” will either by a random-looking cryptographic value
(for the PAKE message), or a random-looking encrypted blob (for the
VERSION message, as well as all application-provided payloads). The
``message`` response will also include ``id``, copied from the ``id`` of
the ``add`` message (and used only by the timing-diagram tool).
The Mailbox Server does not de-duplicate messages, nor does it retain
ordering: clients must do both if they need to.
All Message Types
-----------------
This lists all message types, along with the type-specific keys for each
(if any), and which ones provoke direct responses:
- S->C welcome {welcome:}
- (C->S) bind {appid:, side:}
- (C->S) list {} -> nameplates
- S->C nameplates {nameplates: [{id: str},..]}
- (C->S) allocate {} -> allocated
- S->C allocated {nameplate:}
- (C->S) claim {nameplate:} -> claimed
- S->C claimed {mailbox:}
- (C->S) release {nameplate:?} -> released
- S->C released
- (C->S) open {mailbox:}
- (C->S) add {phase: str, body: hex} -> message (to all connected
clients)
- S->C message {side:, phase:, body:, id:}
- (C->S) close {mailbox:?, mood:?} -> closed
- S->C closed
- S->C ack
- (C->S) ping {ping: int} -> ping
- S->C pong {pong: int}
- S->C error {error: str, orig:}
Persistence
-----------
The server stores all messages in a database, so it should not lose any
information when it is restarted. The server will not send a direct
response until any side-effects (such as the message being added to the
mailbox) have been safely committed to the database.
The client library knows how to resume the protocol after a reconnection
event, assuming the client process itself continues to run.
Clients which terminate entirely between messages (e.g. a secure chat
application, which requires multiple wormhole messages to exchange
address-book entries, and which must function even if the two apps are
never both running at the same time) can use “Journal Mode” to ensure
forward progress is made: see “journal.md” for details.
Diagram of Normal Interaction
-----------------------------
Two normal clients connect and successfully establish Mailbox-based communications.
.. seqdiag:: server.seqdiag
:alt: a sequence-style diagram showing Alice and Bob succsesfully using the Mailbox
:scale: 120%
|