core-lightning/hsmd/hsmd_wire.csv
Rusty Russell 5becfa6ee1 onion_message: don't use general secret, use per-message secret.
We had a scheme where lightningd itself would put a per-node secret in
the blinded path, then we'd tell the caller when it was used.  Then it
simply checks the alias to determine if the correct path was used.

But this doesn't work when we start to offer multiple blinded paths.
So go for a far simpler scheme, where the secret is generated (and
stored) by the caller, and hand it back to them.

We keep the split "with secret" or "without secret" API, since I'm
sure callers who don't care about the secret won't check that it
doesn't exist!  And without that, someone can use a blinded path for a
different message and get a response which may reveal the node.

Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2022-11-09 15:08:03 +01:00

12 KiB

1# Clients should not give a bad request but not the HSM's decision to crash.
2msgtype,hsmstatus_client_bad_request,1000
3msgdata,hsmstatus_client_bad_request,id,node_id,
4msgdata,hsmstatus_client_bad_request,description,wirestring,
5msgdata,hsmstatus_client_bad_request,len,u16,
6msgdata,hsmstatus_client_bad_request,msg,u8,len
7#include <bitcoin/chainparams.h>
8# Start the HSM.
9msgtype,hsmd_init,11
10msgdata,hsmd_init,bip32_key_version,bip32_key_version,
11msgdata,hsmd_init,chainparams,chainparams,
12msgdata,hsmd_init,hsm_encryption_key,?secret,
13msgdata,hsmd_init,dev_force_privkey,?privkey,
14msgdata,hsmd_init,dev_force_bip32_seed,?secret,
15msgdata,hsmd_init,dev_force_channel_secrets,?secrets,
16msgdata,hsmd_init,dev_force_channel_secrets_shaseed,?sha256,
17msgdata,hsmd_init,hsm_wire_min_version,u32,
18msgdata,hsmd_init,hsm_wire_max_version,u32,
19#include <common/bip32.h>
20# DEPRECATED after v0.12, remove in two versions!
21msgtype,hsmd_init_reply_v1,111
22msgdata,hsmd_init_reply_v1,node_id,node_id,
23msgdata,hsmd_init_reply_v1,bip32,ext_key,
24msgdata,hsmd_init_reply_v1,bolt12,u8,32
25msgdata,hsmd_init_reply_v1,onion_reply_secret,secret,
26msgtype,hsmd_init_reply_v2,113
27msgdata,hsmd_init_reply_v2,node_id,node_id,
28msgdata,hsmd_init_reply_v2,bip32,ext_key,
29msgdata,hsmd_init_reply_v2,bolt12,pubkey,
30# Declare a new channel.
31msgtype,hsmd_new_channel,30
32msgdata,hsmd_new_channel,id,node_id,
33msgdata,hsmd_new_channel,dbid,u64,
34# No value returned.
35msgtype,hsmd_new_channel_reply,130
36# Get a new HSM FD, with the specified capabilities
37msgtype,hsmd_client_hsmfd,9
38# Which identity to use for requests
39msgdata,hsmd_client_hsmfd,id,node_id,
40# Database id for this client, if any.
41msgdata,hsmd_client_hsmfd,dbid,u64,
42msgdata,hsmd_client_hsmfd,capabilities,u64,
43# No content, just an fd.
44msgtype,hsmd_client_hsmfd_reply,109
45#include <common/derive_basepoints.h>
46# Get the basepoints and funding key for this specific channel.
47msgtype,hsmd_get_channel_basepoints,10
48msgdata,hsmd_get_channel_basepoints,peerid,node_id,
49msgdata,hsmd_get_channel_basepoints,dbid,u64,
50msgtype,hsmd_get_channel_basepoints_reply,110
51msgdata,hsmd_get_channel_basepoints_reply,basepoints,basepoints,
52msgdata,hsmd_get_channel_basepoints_reply,funding_pubkey,pubkey,
53#include <common/channel_type.h>
54# Provide channel parameters.
55msgtype,hsmd_ready_channel,31
56msgdata,hsmd_ready_channel,is_outbound,bool,
57msgdata,hsmd_ready_channel,channel_value,amount_sat,
58msgdata,hsmd_ready_channel,push_value,amount_msat,
59msgdata,hsmd_ready_channel,funding_txid,bitcoin_txid,
60msgdata,hsmd_ready_channel,funding_txout,u16,
61msgdata,hsmd_ready_channel,local_to_self_delay,u16,
62msgdata,hsmd_ready_channel,local_shutdown_script_len,u16,
63msgdata,hsmd_ready_channel,local_shutdown_script,u8,local_shutdown_script_len
64msgdata,hsmd_ready_channel,local_shutdown_wallet_index,?u32,
65msgdata,hsmd_ready_channel,remote_basepoints,basepoints,
66msgdata,hsmd_ready_channel,remote_funding_pubkey,pubkey,
67msgdata,hsmd_ready_channel,remote_to_self_delay,u16,
68msgdata,hsmd_ready_channel,remote_shutdown_script_len,u16,
69msgdata,hsmd_ready_channel,remote_shutdown_script,u8,remote_shutdown_script_len
70msgdata,hsmd_ready_channel,channel_type,channel_type,
71# No value returned.
72msgtype,hsmd_ready_channel_reply,131
73# Return signature for a funding tx.
74#include <common/utxo.h>
75# Master asks the HSM to sign a node_announcement
76msgtype,hsmd_node_announcement_sig_req,6
77msgdata,hsmd_node_announcement_sig_req,annlen,u16,
78msgdata,hsmd_node_announcement_sig_req,announcement,u8,annlen
79msgtype,hsmd_node_announcement_sig_reply,106
80msgdata,hsmd_node_announcement_sig_reply,signature,secp256k1_ecdsa_signature,
81# Sign a withdrawal request
82#include <bitcoin/psbt.h>
83msgtype,hsmd_sign_withdrawal,7
84msgdata,hsmd_sign_withdrawal,num_inputs,u16,
85msgdata,hsmd_sign_withdrawal,inputs,utxo,num_inputs
86msgdata,hsmd_sign_withdrawal,psbt,wally_psbt,
87msgtype,hsmd_sign_withdrawal_reply,107
88msgdata,hsmd_sign_withdrawal_reply,psbt,wally_psbt,
89# Sign an invoice
90msgtype,hsmd_sign_invoice,8
91msgdata,hsmd_sign_invoice,len,u16,
92msgdata,hsmd_sign_invoice,u5bytes,u8,len
93msgdata,hsmd_sign_invoice,hrplen,u16,
94msgdata,hsmd_sign_invoice,hrp,u8,hrplen
95msgtype,hsmd_sign_invoice_reply,108
96msgdata,hsmd_sign_invoice_reply,sig,secp256k1_ecdsa_recoverable_signature,
97# Give me ECDH(node-id-secret,point)
98msgtype,hsmd_ecdh_req,1
99msgdata,hsmd_ecdh_req,point,pubkey,
100msgtype,hsmd_ecdh_resp,100
101msgdata,hsmd_ecdh_resp,ss,secret,
102msgtype,hsmd_cannouncement_sig_req,2
103msgdata,hsmd_cannouncement_sig_req,calen,u16,
104msgdata,hsmd_cannouncement_sig_req,ca,u8,calen
105msgtype,hsmd_cannouncement_sig_reply,102
106msgdata,hsmd_cannouncement_sig_reply,node_signature,secp256k1_ecdsa_signature,
107msgdata,hsmd_cannouncement_sig_reply,bitcoin_signature,secp256k1_ecdsa_signature,
108msgtype,hsmd_cupdate_sig_req,3
109msgdata,hsmd_cupdate_sig_req,culen,u16,
110msgdata,hsmd_cupdate_sig_req,cu,u8,culen
111msgtype,hsmd_cupdate_sig_reply,103
112msgdata,hsmd_cupdate_sig_reply,culen,u16,
113msgdata,hsmd_cupdate_sig_reply,cu,u8,culen
114# Master asks HSM to sign a commitment transaction.
115msgtype,hsmd_sign_commitment_tx,5
116msgdata,hsmd_sign_commitment_tx,peer_id,node_id,
117msgdata,hsmd_sign_commitment_tx,channel_dbid,u64,
118msgdata,hsmd_sign_commitment_tx,tx,bitcoin_tx,
119msgdata,hsmd_sign_commitment_tx,remote_funding_key,pubkey,
120msgdata,hsmd_sign_commitment_tx,commit_num,u64,
121msgtype,hsmd_sign_commitment_tx_reply,105
122msgdata,hsmd_sign_commitment_tx_reply,sig,bitcoin_signature,
123# Validate the counterparty's commitment signatures.
124msgtype,hsmd_validate_commitment_tx,35
125msgdata,hsmd_validate_commitment_tx,tx,bitcoin_tx,
126msgdata,hsmd_validate_commitment_tx,num_htlcs,u16,
127msgdata,hsmd_validate_commitment_tx,htlcs,simple_htlc,num_htlcs
128msgdata,hsmd_validate_commitment_tx,commit_num,u64,
129msgdata,hsmd_validate_commitment_tx,feerate,u32,
130msgdata,hsmd_validate_commitment_tx,sig,bitcoin_signature,
131msgdata,hsmd_validate_commitment_tx,num_htlc_sigs,u16,
132msgdata,hsmd_validate_commitment_tx,htlc_sigs,bitcoin_signature,num_htlc_sigs
133msgtype,hsmd_validate_commitment_tx_reply,135
134msgdata,hsmd_validate_commitment_tx_reply,old_commitment_secret,?secret,
135msgdata,hsmd_validate_commitment_tx_reply,next_per_commitment_point,pubkey,
136# Vaidate the counterparty's revocation secret
137msgtype,hsmd_validate_revocation,36
138msgdata,hsmd_validate_revocation,revoke_num,u64,
139msgdata,hsmd_validate_revocation,per_commitment_secret,secret,
140# No value returned.
141msgtype,hsmd_validate_revocation_reply,136
142# Onchaind asks HSM to sign a spend to-us. Four variants, since each set
143# of keys is derived differently...
144# FIXME: Have master tell hsmd the keyindex, so it can validate output!
145msgtype,hsmd_sign_delayed_payment_to_us,12
146msgdata,hsmd_sign_delayed_payment_to_us,commit_num,u64,
147msgdata,hsmd_sign_delayed_payment_to_us,tx,bitcoin_tx,
148msgdata,hsmd_sign_delayed_payment_to_us,wscript_len,u16,
149msgdata,hsmd_sign_delayed_payment_to_us,wscript,u8,wscript_len
150msgtype,hsmd_sign_remote_htlc_to_us,13
151msgdata,hsmd_sign_remote_htlc_to_us,remote_per_commitment_point,pubkey,
152msgdata,hsmd_sign_remote_htlc_to_us,tx,bitcoin_tx,
153msgdata,hsmd_sign_remote_htlc_to_us,wscript_len,u16,
154msgdata,hsmd_sign_remote_htlc_to_us,wscript,u8,wscript_len
155msgdata,hsmd_sign_remote_htlc_to_us,option_anchor_outputs,bool,
156msgtype,hsmd_sign_penalty_to_us,14
157msgdata,hsmd_sign_penalty_to_us,revocation_secret,secret,
158msgdata,hsmd_sign_penalty_to_us,tx,bitcoin_tx,
159msgdata,hsmd_sign_penalty_to_us,wscript_len,u16,
160msgdata,hsmd_sign_penalty_to_us,wscript,u8,wscript_len
161# Onchaind asks HSM to sign a local HTLC success or HTLC timeout tx.
162msgtype,hsmd_sign_local_htlc_tx,16
163msgdata,hsmd_sign_local_htlc_tx,commit_num,u64,
164msgdata,hsmd_sign_local_htlc_tx,tx,bitcoin_tx,
165msgdata,hsmd_sign_local_htlc_tx,wscript_len,u16,
166msgdata,hsmd_sign_local_htlc_tx,wscript,u8,wscript_len
167msgdata,hsmd_sign_local_htlc_tx,option_anchor_outputs,bool,
168# Openingd/channeld asks HSM to sign the other sides' commitment tx.
169#include <common/htlc_wire.h>
170msgtype,hsmd_sign_remote_commitment_tx,19
171msgdata,hsmd_sign_remote_commitment_tx,tx,bitcoin_tx,
172msgdata,hsmd_sign_remote_commitment_tx,remote_funding_key,pubkey,
173msgdata,hsmd_sign_remote_commitment_tx,remote_per_commit,pubkey,
174msgdata,hsmd_sign_remote_commitment_tx,option_static_remotekey,bool,
175msgdata,hsmd_sign_remote_commitment_tx,commit_num,u64,
176msgdata,hsmd_sign_remote_commitment_tx,num_htlcs,u16,
177msgdata,hsmd_sign_remote_commitment_tx,htlcs,simple_htlc,num_htlcs
178msgdata,hsmd_sign_remote_commitment_tx,feerate,u32,
179# channeld asks HSM to sign remote HTLC tx.
180msgtype,hsmd_sign_remote_htlc_tx,20
181msgdata,hsmd_sign_remote_htlc_tx,tx,bitcoin_tx,
182msgdata,hsmd_sign_remote_htlc_tx,len,u16,
183msgdata,hsmd_sign_remote_htlc_tx,wscript,u8,len
184msgdata,hsmd_sign_remote_htlc_tx,remote_per_commit_point,pubkey,
185msgdata,hsmd_sign_remote_htlc_tx,option_anchor_outputs,bool,
186# closingd asks HSM to sign mutual close tx.
187msgtype,hsmd_sign_mutual_close_tx,21
188msgdata,hsmd_sign_mutual_close_tx,tx,bitcoin_tx,
189msgdata,hsmd_sign_mutual_close_tx,remote_funding_key,pubkey,
190# Reply for all the above requests.
191msgtype,hsmd_sign_tx_reply,112
192msgdata,hsmd_sign_tx_reply,sig,bitcoin_signature,
193# Openingd/channeld/onchaind asks for Nth per_commitment_point, if > 2, gets N-2 secret.
194msgtype,hsmd_get_per_commitment_point,18
195msgdata,hsmd_get_per_commitment_point,n,u64,
196msgtype,hsmd_get_per_commitment_point_reply,118
197msgdata,hsmd_get_per_commitment_point_reply,per_commitment_point,pubkey,
198msgdata,hsmd_get_per_commitment_point_reply,old_commitment_secret,?secret,
199# master -> hsmd: do you have a memleak?
200msgtype,hsmd_dev_memleak,33
201msgtype,hsmd_dev_memleak_reply,133
202msgdata,hsmd_dev_memleak_reply,leak,bool,
203# channeld asks to check if claimed future commitment_secret is correct.
204msgtype,hsmd_check_future_secret,22
205msgdata,hsmd_check_future_secret,n,u64,
206msgdata,hsmd_check_future_secret,commitment_secret,secret,
207msgtype,hsmd_check_future_secret_reply,122
208msgdata,hsmd_check_future_secret_reply,correct,bool,
209# lightningd asks us to sign a string.
210msgtype,hsmd_sign_message,23
211msgdata,hsmd_sign_message,len,u16,
212msgdata,hsmd_sign_message,msg,u8,len
213msgtype,hsmd_sign_message_reply,123
214msgdata,hsmd_sign_message_reply,sig,secp256k1_ecdsa_recoverable_signature,
215# lightningd needs to get a scriptPubkey for a utxo with closeinfo
216msgtype,hsmd_get_output_scriptpubkey,24
217msgdata,hsmd_get_output_scriptpubkey,channel_id,u64,
218msgdata,hsmd_get_output_scriptpubkey,peer_id,node_id,
219msgdata,hsmd_get_output_scriptpubkey,commitment_point,?pubkey,
220msgtype,hsmd_get_output_scriptpubkey_reply,124
221msgdata,hsmd_get_output_scriptpubkey_reply,script_len,u16,
222msgdata,hsmd_get_output_scriptpubkey_reply,script,u8,script_len
223# Sign a bolt12-style merkle hash
224msgtype,hsmd_sign_bolt12,25
225msgdata,hsmd_sign_bolt12,messagename,wirestring,
226msgdata,hsmd_sign_bolt12,fieldname,wirestring,
227msgdata,hsmd_sign_bolt12,merkleroot,sha256,
228# This is for invreq payer_id (temporary keys)
229msgdata,hsmd_sign_bolt12,publictweaklen,u16,
230msgdata,hsmd_sign_bolt12,publictweak,u8,publictweaklen
231msgtype,hsmd_sign_bolt12_reply,125
232msgdata,hsmd_sign_bolt12_reply,sig,bip340sig,
233# Sign an option_will_fund offer hash
234msgtype,hsmd_sign_option_will_fund_offer,26
235msgdata,hsmd_sign_option_will_fund_offer,funding_pubkey,pubkey,
236msgdata,hsmd_sign_option_will_fund_offer,blockheight,u32,
237msgdata,hsmd_sign_option_will_fund_offer,channel_fee_base_max_msat,u32,
238msgdata,hsmd_sign_option_will_fund_offer,channel_fee_proportional_basis_max,u16,
239msgtype,hsmd_sign_option_will_fund_offer_reply,126
240msgdata,hsmd_sign_option_will_fund_offer_reply,rsig,secp256k1_ecdsa_signature,
241# Derive pseudorandom secret
242msgtype,hsmd_derive_secret,27
243msgdata,hsmd_derive_secret,len,u16,
244msgdata,hsmd_derive_secret,info,u8,len
245# Reply with the derived secret
246msgtype,hsmd_derive_secret_reply,127
247msgdata,hsmd_derive_secret_reply,secret,secret,