sockscape/protocol.md

493 lines
14 KiB
Markdown
Raw Normal View History

2017-05-15 21:15:28 +00:00
# PROTOCOL DEFINITION
Messages communicated between the client and server follow the same format, but have different meanings depending on which end is the recipient. A message's intent is determined by its packet ID, a unique identifier that tells the client or server how it should react to the received message. A message id that incites bidirectional communication between the client and server should typically be associated with the same message id on the client as on the server, so as to avoid confusion.
A packet of communication between the client and server is considered to be a seamlessly connected regions of bytes, the boundaries of which are defined in the header of the packet.
All references to the 'byte' in this document refers to individual 8-bit octets, as is the de facto standard in modern computing. All binary-encoded multi-byte quantities sent in a packet are to be sent in network byte order (big endian).
## Header
Because the body of the packet is a sequence of many different regions of byte data that is not delimited, it is necessary for the header of the packet to determine boundaries for the regions of data.
2018-03-09 04:16:44 +00:00
* The first two bytes will always be 0xB0 and 0x0B. If this is not set properly, the endpoint must close the connection.
* The next four bytes are the total length of the entire packet, including the whole header.
* The seventh byte is the packet id, the meanings of which are defined in the [_Packet IDs_](#packet-ids) section.
* The eighth byte is the number of byte regions in the packet.
* The bytes following the eighth byte are a list of binary length segments, each of which correspond to the number of bytes in its respective region. They each follow this format:
2017-05-15 21:15:28 +00:00
* If length is less than 254, the length of the region is stored in a single byte.
* If length is greater than or equal to 254 but less than 65,536, the first byte of the length segment will be 254 and the following two bytes is the length of the region.
* If length is greater than or equal to 65,536, the first byte of the length segment will be 255 and the following four bytes is the length of the region.
2017-05-15 21:15:28 +00:00
The number of length segments must equal the number of byte regions as defined in the second byte. The combined length of the regions must not exceed 2^32-n where n is the length of the header.
2017-05-15 21:15:28 +00:00
## Body
The message body immediately follows the header with no separator, and consists of a sequence of byte regions as defined in the header that are joined together without any separator. The position of a byte region in the body should correspond to the offset of the length segment in the header.
### Numeric Packing
All numbers, unless otherwise specified, are the string representation of a base 10 number. Common exceptions are listed below:
2017-05-15 21:15:28 +00:00
* User IDs: Hex string, 8 bytes unsigned
2017-05-15 21:15:28 +00:00
* Co-ordinates: 8 bytes, double-precision float
2017-05-19 21:02:39 +00:00
* Big Int: Hex string, variable size
2017-05-15 21:15:28 +00:00
2017-05-16 13:28:43 +00:00
### Packet IDs
2017-05-19 21:02:39 +00:00
A packet ID may have a specific "direction" of communication, in that an endpoint may either act as a _requester_ or a _responder_. A _requester_ is an endpoint that drives all of the communication on that specific packet ID, while the _responder_ is responsible for providing a timely response to the requests it receives. A _responder_ for a specific packet ID should never send that packet ID unsolicited; either the packet will be ignored or the other endpoint will close the connection. Any packet ID marked as bidirectional may be initiated by either endpoint at any time.
2017-05-18 21:03:35 +00:00
A _blind requester_ is an endpoint that sends out a packet of a certain ID and either does not expect a response or expects a response on a different packet ID.
2017-05-16 13:28:43 +00:00
#### Server to Client
2017-08-16 21:01:08 +00:00
TODO: populate
2017-05-16 13:28:43 +00:00
#### Client to Server
2017-08-16 21:01:08 +00:00
TODO: populate
## Master/Slave Servers
To keep track of the status of multiple servers from a centralized point that the client may query, each server must be able to communicate with a "master" server that will record and dispense information regarding all servers to clients. All servers that report to the master server will hereby be refered to as "slave" servers.
Communication between master and slave servers will be done over a UDP connection on a port that is defined by the master server's configuration. The protocol used for this communication is identical to the protocol defined for standard client/server communication; however, the [_Packet IDs_](#TODO) are defined differently.
Communication between the master server and clients will be done over a WebSocket connection on a port that is defined by the master server's configuration. The protocol used for this communication is identical to the protocol defined for standard client/server communication; however, the [_Packet IDs_](#TODO) are defined differently.
### Master/Slave Packet IDs
#### Master to Slave
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 1: Key Exchange<br />
2018-04-23 20:42:04 +00:00
Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td>1</td>
<td>Generator</td>
<td>Big Int</td>
</tr>
<tr>
<td>2</td>
<td>Modulus</td>
<td>Big Int</td>
</tr>
<tr>
<td>3</td>
<td>Server Key</td>
<td>Big Int</td>
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
2018-04-23 20:42:04 +00:00
ID 2: Encryption Error<br />
Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td>1</td>
2018-05-11 21:05:21 +00:00
<td>Error Code</td>
<td>Packed Unsigned Short</td>
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
2018-04-23 20:42:04 +00:00
ID 3: Positive ACK<br />
[Encrypted] Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td>1</td>
<td>Request Packet ID</td>
<td>Byte</td>
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
2018-04-23 20:42:04 +00:00
ID 4: Negative ACK<br />
[Encrypted] Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td>1</td>
2018-04-23 20:42:04 +00:00
<td>Request Packet ID</td>
<td>Byte</td>
</tr>
<tr>
<td>2</td>
2018-05-11 21:05:21 +00:00
<td>Error Code</td>
<td>Packed Unsigned Short</td>
</tr>
</table>
#### Slave to Master
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
2018-04-23 20:42:04 +00:00
ID 1: Initiation Attempt<br />
Requester
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
<td>Secret</td>
<td>String</td>
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
2018-04-23 20:42:04 +00:00
ID 2: Authentication<br />
[Encrypted] Requester
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
2018-05-14 22:45:56 +00:00
<td>Server Name</td>
<td>Text</td>
</tr>
<tr>
<td class="center">2</td>
<td>License</td>
<td>Text</td>
</tr>
<tr>
<td class="center">3</td>
<td>Secret</td>
<td>Blob (512b)</td>
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
2018-04-23 20:42:04 +00:00
ID 3: Status Update<br />
[Encrypted] Blind Requester
</th>
</thead>
<thead>
2018-04-23 20:42:04 +00:00
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
<td>User Count</td>
<td>Packed Unsigned Short</td>
</tr>
<tr>
2018-04-23 20:42:04 +00:00
<td class="center">2</td>
<td>Port</td>
<td>Packed Unsigned Short</td>
</tr>
</table>
### Master/Client Packet IDs
#### Master to Client
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 1: Key Exchange<br />
2017-08-16 21:01:08 +00:00
Requester
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td>1</td>
<td>Generator</td>
<td>Big Int</td>
</tr>
<tr>
<td>2</td>
<td>Modulus</td>
<td>Big Int</td>
</tr>
<tr>
<td>3</td>
<td>Server Key</td>
<td>Big Int</td>
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 2: Login Attempt<br />
2017-08-16 21:01:08 +00:00
[Encrypted] Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
2017-09-08 21:06:55 +00:00
<th>if</th>
2017-08-16 21:01:08 +00:00
</thead>
<tr>
<td class="center">1</td>
<td>Succeeded</td>
<td>Boolean</td>
2017-09-08 21:06:55 +00:00
<td></td>
2017-08-16 21:01:08 +00:00
</tr>
2017-09-08 21:06:55 +00:00
<tr style="border-bottom: 2px solid;">
2017-08-16 21:01:08 +00:00
<td class="center">2</td>
<td>Message</td>
<td>String</td>
<td>&not;R<sub>1</sub></td>
2017-09-08 21:06:55 +00:00
</tr>
<tr>
<td class="center">2</td>
<td>Secret</td>
<td>Bytes (16)</td>
<td>R<sub>1</sub></td>
</tr>
<tr>
<td class="center">3</td>
<td>Server Address</td>
<td>IPv4 String</td>
<td>R<sub>1</sub></td>
</tr>
<tr>
<td class="center">4</td>
<td>Server Port</td>
<td>Packed Unsigned Short</td>
<td>R<sub>1</sub></td>
2017-08-16 21:01:08 +00:00
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 3: Registration Attempt<br />
2017-08-16 21:01:08 +00:00
[Encrypted] Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
<td>Succeeded</td>
<td>Boolean</td>
</tr>
<tr>
<td class="center">2</td>
<td>Message</td>
<td>String</td>
</tr>
</table>
2017-09-06 20:59:38 +00:00
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 4: Server List Request<br />
[Encrypted] Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
<td>Server Count (<i>n</i>)</td>
<td>Packed Unsigned Short</td>
2017-09-06 20:59:38 +00:00
</tr>
<tr>
<td><i>r</i> > 1</td>
<td colspan="2">Iterated over <i>n</i> (0 &leq; <i>i</i> &leq; <i>n - 1</i>)</td>
</tr>
<tr>
<td class="center">2 + 2<i>i</i></td>
<td>Server Id</td>
<td>Packed Unsigned Short</td>
</tr>
<tr>
<td class="center">3 + 2<i>i</i></td>
<td>User Count</td>
<td>Packed Unsigned Short</td>
</tr>
2017-09-06 20:59:38 +00:00
</table>
#### Client to Master
2017-08-16 21:01:08 +00:00
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 1: Key Exchange<br />
2017-08-16 21:01:08 +00:00
Responder
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
<td>Secret</td>
<td>String</td>
2017-08-16 21:01:08 +00:00
</tr>
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 2: Login Attempt<br />
2017-08-16 21:01:08 +00:00
[Encrypted] Requester
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
<td>Username</td>
<td>String</td>
</tr>
<tr>
<td class="center">2</td>
<td>Password</td>
<td>String</td>
</tr>
<tr>
<td class="center">3</td>
<td>Server Id</td>
<td>Packed Unsigned Short</td>
</tr>
2017-08-16 21:01:08 +00:00
</table>
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 3: Registration Attempt<br />
2017-08-16 21:01:08 +00:00
[Encrypted] Requester
</th>
</thead>
<thead>
<th>#</th>
<th>Region</th>
<th>Type</th>
</thead>
<tr>
<td class="center">1</td>
<td>Username</td>
<td>String</td>
</tr>
<tr>
<td class="center">2</td>
<td>Password</td>
<td>String</td>
</tr>
<tr>
<td class="center">3</td>
<td>Email</td>
<td>String</td>
</tr>
</table>
2017-09-06 20:59:38 +00:00
<table style="margin-right: 8px; margin-bottom: 8px;">
<thead>
<th colspan="100" class="center">
ID 4: Server List Request<br />
[Encrypted] Requester<br />
</th>
2017-09-08 21:06:55 +00:00
<thead>
<th colspan="100" class="center">
<i>Bodyless Packet</i>
</th>
</thead>
2017-09-06 20:59:38 +00:00
</thead>
</table>
2017-05-15 21:15:28 +00:00
## Sockstamps
Because epoch time is not standardized across systems, an intermediate layer of date/time transmission must be used between the client and server so as to handle time dependent interactions. Therefore, a "sockstamp" will be used in place of the context-dependent implementations of epoch time.
A sockstamp is a sequence of six bytes that represent a fully qualified UTC date and time on the Gregorian calendar. For the best use of space without obfuscating the data too much, the year's lower four bits and the four bits signifying the month are shared in the same byte, but no other components are joined.
2017-05-15 21:15:28 +00:00
2017-05-18 21:03:35 +00:00
The 12 bits signifying the year are an unsigned quanitity, and indicate the number of years since 0 AD; any date prior to the year of Christ's birth cannot be represented in this format, but this should never be necessary. The effective range of years that can be expressed by this format is 1 AD to 4095 AD. Because the year 0 AD is not a legal year in the Gregorian calendar, this value should never be zero.
2017-05-15 21:15:28 +00:00
2017-05-18 21:03:35 +00:00
The indexed list below indicates which byte (first byte being the MSB) contains what information:
2017-05-15 21:15:28 +00:00
1. Upper 8 bits of the year quantifier.
2. Upper 4 bits are the four least significant bits of the 12-bit year quantifier. The lower 4 bits are the month quantifier, ranging from 0 to 11.
3. Day of month quanitifier. Ranges from 0 to 30.
4. Hour quantifier. Ranges from 0 to 23.
5. Minute quantifier. Ranges from 0 to 59.
2017-05-18 21:03:35 +00:00
6. Second quantifier. Ranges from 0 to 59.
2018-03-09 04:16:44 +00:00
In the event that an endpoint cannot evaluate a date required by the protocol as a result of some error, an error sockstamp will be sent in its place. An error sockstamp takes the form of zeroes in all bits. If an endpoint receives a sockstamp where the year quantifier is zero but any other quantifiers are nonzero, there is a communication error and the endpoint must close the connection.
2018-04-23 20:42:04 +00:00
## Status Code Index
2018-04-24 14:39:52 +00:00
TODO: MAKE THIS SECTION NOT LOOK LIKE SHIT
2018-04-23 20:42:04 +00:00
### Master / Slave
2018-05-11 21:05:21 +00:00
#### M -> S (ID 2)
2018-04-24 14:39:52 +00:00
0x01: KEY SIZE WAS INCORRECT
0x02: COULD NOT PARSE KEY
2018-05-11 21:05:21 +00:00
#### M -> S (ID 4)
2018-05-14 22:45:56 +00:00
0x01: MAX AUTH ATTEMPTS REACHED
0x02: LICENSE DATA INCORRECT
2018-05-11 21:05:21 +00:00
2018-05-14 22:45:56 +00:00
0x03: LICENSE LIMIT REACHED
2018-05-11 21:05:21 +00:00
2018-04-24 14:39:52 +00:00
### Master / Client
### Slave / Client