lightning/util/
message_signing.rs

1// This file is licensed under the Apache License, Version 2.0 <LICENSE-APACHE
2// or http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
3// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your option.
4// You may not use this file except in accordance with one or both of these
5// licenses.
6
7//! Lightning message signing and verification lives here. These tools can be used to sign messages using the node's
8//! secret so receivers are sure that they come from you. You can also use this to verify that a given message comes
9//! from a specific node.
10//! Furthermore, these tools can be used to sign / verify messages using ephemeral keys not tied to node's identities.
11//!
12//! Note this is not part of the specs, but follows lnd's signing and verifying protocol, which can is defined as follows:
13//!
14//! signature = zbase32(SigRec(sha256d(("Lightning Signed Message:" + msg)))
15//! zbase32 from <https://philzimmermann.com/docs/human-oriented-base-32-encoding.txt>
16//! SigRec has first byte 31 + recovery id, followed by 64 byte sig.
17//!
18//! This implementation is compatible with both lnd's and c-lightning's
19//!
20//! <https://lightning.readthedocs.io/lightning-signmessage.7.html>
21//! <https://api.lightning.community/#signmessage>
22
23#[allow(unused)]
24use crate::prelude::*;
25use crate::util::base32;
26use bitcoin::hashes::{sha256d, Hash};
27use bitcoin::secp256k1::ecdsa::{RecoverableSignature, RecoveryId};
28use bitcoin::secp256k1::{Error, Message, PublicKey, Secp256k1, SecretKey};
29
30static LN_MESSAGE_PREFIX: &[u8] = b"Lightning Signed Message:";
31
32fn sigrec_encode(sig_rec: RecoverableSignature) -> Vec<u8> {
33	let (rid, rsig) = sig_rec.serialize_compact();
34	let prefix = rid.to_i32() as u8 + 31;
35
36	[&[prefix], &rsig[..]].concat()
37}
38
39fn sigrec_decode(sig_rec: Vec<u8>) -> Result<RecoverableSignature, Error> {
40	// Signature must be 64 + 1 bytes long (compact signature + recovery id)
41	if sig_rec.len() != 65 {
42		return Err(Error::InvalidSignature);
43	}
44
45	let rsig = &sig_rec[1..];
46	let rid = sig_rec[0] as i32 - 31;
47
48	match RecoveryId::from_i32(rid) {
49		Ok(x) => RecoverableSignature::from_compact(rsig, x),
50		Err(e) => Err(e),
51	}
52}
53
54/// Creates a digital signature of a message given a SecretKey, like the node's secret.
55/// A receiver knowing the PublicKey (e.g. the node's id) and the message can be sure that the signature was generated by the caller.
56/// Signatures are EC recoverable, meaning that given the message and the signature the PublicKey of the signer can be extracted.
57pub fn sign(msg: &[u8], sk: &SecretKey) -> String {
58	let secp_ctx = Secp256k1::signing_only();
59	let msg_hash = sha256d::Hash::hash(&[LN_MESSAGE_PREFIX, msg].concat());
60
61	let sig = secp_ctx.sign_ecdsa_recoverable(&Message::from_digest(msg_hash.to_byte_array()), sk);
62	base32::Alphabet::ZBase32.encode(&sigrec_encode(sig))
63}
64
65/// Recovers the PublicKey of the signer of the message given the message and the signature.
66pub fn recover_pk(msg: &[u8], sig: &str) -> Result<PublicKey, Error> {
67	let secp_ctx = Secp256k1::verification_only();
68	let msg_hash = sha256d::Hash::hash(&[LN_MESSAGE_PREFIX, msg].concat());
69
70	match base32::Alphabet::ZBase32.decode(&sig) {
71		Ok(sig_rec) => match sigrec_decode(sig_rec) {
72			Ok(sig) => {
73				secp_ctx.recover_ecdsa(&Message::from_digest(msg_hash.to_byte_array()), &sig)
74			},
75			Err(e) => Err(e),
76		},
77		Err(_) => Err(Error::InvalidSignature),
78	}
79}
80
81/// Verifies a message was signed by a PrivateKey that derives to a given PublicKey, given a message, a signature,
82/// and the PublicKey.
83pub fn verify(msg: &[u8], sig: &str, pk: &PublicKey) -> bool {
84	match recover_pk(msg, sig) {
85		Ok(x) => x == *pk,
86		Err(_) => false,
87	}
88}
89
90#[cfg(test)]
91mod test {
92	use crate::util::message_signing::{recover_pk, sign, verify};
93	use bitcoin::secp256k1::constants::ONE;
94	use bitcoin::secp256k1::{PublicKey, Secp256k1, SecretKey};
95	use core::str::FromStr;
96
97	#[test]
98	fn test_sign() {
99		let message = "test message";
100		let one_key = SecretKey::from_slice(&ONE).unwrap();
101		let zbase32_sig = sign(message.as_bytes(), &one_key);
102
103		assert_eq!(zbase32_sig, "d9tibmnic9t5y41hg7hkakdcra94akas9ku3rmmj4ag9mritc8ok4p5qzefs78c9pqfhpuftqqzhydbdwfg7u6w6wdxcqpqn4sj4e73e")
104	}
105
106	#[test]
107	fn test_recover_pk() {
108		let message = "test message";
109		let one_key = SecretKey::from_slice(&ONE).unwrap();
110		let sig = "d9tibmnic9t5y41hg7hkakdcra94akas9ku3rmmj4ag9mritc8ok4p5qzefs78c9pqfhpuftqqzhydbdwfg7u6w6wdxcqpqn4sj4e73e";
111		let pk = recover_pk(message.as_bytes(), sig);
112
113		assert_eq!(pk.unwrap(), PublicKey::from_secret_key(&Secp256k1::signing_only(), &one_key))
114	}
115
116	#[test]
117	fn test_verify() {
118		let message = "another message";
119		let one_key = SecretKey::from_slice(&ONE).unwrap();
120		let sig = sign(message.as_bytes(), &one_key);
121		let pk = PublicKey::from_secret_key(&Secp256k1::signing_only(), &one_key);
122
123		assert!(verify(message.as_bytes(), &sig, &pk))
124	}
125
126	#[test]
127	fn test_verify_ground_truth_ish() {
128		// There are no standard tests vectors for Sign/Verify, using the same tests vectors as c-lightning to see if they are compatible.
129		// Taken from https://github.com/ElementsProject/lightning/blob/1275af6fbb02460c8eb2f00990bb0ef9179ce8f3/tests/test_misc.py#L1925-L1938
130
131		let corpus = [
132			["@bitconner",
133			"is this compatible?",
134			"rbgfioj114mh48d8egqx8o9qxqw4fmhe8jbeeabdioxnjk8z3t1ma1hu1fiswpakgucwwzwo6ofycffbsqusqdimugbh41n1g698hr9t",
135			"02b80cabdf82638aac86948e4c06e82064f547768dcef977677b9ea931ea75bab5"],
136			["@duck1123",
137			"hi",
138			"rnrphcjswusbacjnmmmrynh9pqip7sy5cx695h6mfu64iac6qmcmsd8xnsyczwmpqp9shqkth3h4jmkgyqu5z47jfn1q7gpxtaqpx4xg",
139			"02de60d194e1ca5947b59fe8e2efd6aadeabfb67f2e89e13ae1a799c1e08e4a43b"],
140			["@jochemin",
141			"hi",
142			"ry8bbsopmduhxy3dr5d9ekfeabdpimfx95kagdem7914wtca79jwamtbw4rxh69hg7n6x9ty8cqk33knbxaqftgxsfsaeprxkn1k48p3",
143			"022b8ece90ee891cbcdac0c1cc6af46b73c47212d8defbce80265ac81a6b794931"],
144		];
145
146		for c in &corpus {
147			assert!(verify(c[1].as_bytes(), c[2], &PublicKey::from_str(c[3]).unwrap()))
148		}
149	}
150}