lokinet/llarp/link/utp.cpp

1161 lines
32 KiB
C++
Raw Normal View History

2018-12-12 01:32:10 +00:00
#include <link/utp.hpp>
#include <link/server.hpp>
#include <messages/discard.hpp>
#include <messages/link_intro.hpp>
#include <router/router.hpp>
#include <util/buffer.hpp>
#include <util/endian.hpp>
2018-09-06 20:31:58 +00:00
#ifdef __linux__
#include <linux/errqueue.h>
#include <netinet/ip_icmp.h>
#endif
2018-09-25 08:31:29 +00:00
#ifdef _WIN32
#include <winsock2.h>
#include <ws2tcpip.h>
#include <wspiapi.h>
2018-09-25 08:31:29 +00:00
#endif
#ifndef IP_DONTFRAGMENT
#define IP_DONTFRAGMENT IP_DONTFRAG
2018-09-25 08:31:29 +00:00
#endif
#include <link/utp_internal.hpp>
namespace llarp
{
namespace utp
{
using namespace std::placeholders;
bool
InboundMessage::IsExpired(llarp_time_t now) const
2018-12-16 20:34:04 +00:00
{
return now > lastActive && now - lastActive >= 2000;
}
2018-12-16 20:34:04 +00:00
bool
InboundMessage::AppendData(const byte_t* ptr, uint16_t sz)
{
if(llarp_buffer_size_left(buffer) < sz)
return false;
memcpy(buffer.cur, ptr, sz);
buffer.cur += sz;
return true;
}
2018-09-04 19:15:06 +00:00
void
Session::OnLinkEstablished(LinkLayer* p)
{
parent = p;
EnterState(eLinkEstablished);
llarp::LogDebug("link established with ", remoteAddr);
}
llarp::Crypto*
Session::Crypto()
{
return parent->Crypto();
}
2018-09-06 11:46:19 +00:00
llarp::Crypto*
LinkLayer::Crypto()
{
return _crypto;
}
/// pump tx queue
void
Session::PumpWrite()
{
if(!sock)
return;
ssize_t expect = 0;
std::vector< utp_iovec > vecs;
for(const auto& vec : vecq)
{
expect += vec.iov_len;
vecs.push_back(vec);
}
if(expect)
{
ssize_t s = utp_writev(sock, vecs.data(), vecs.size());
while(s > static_cast< ssize_t >(vecq.front().iov_len))
2018-09-12 13:29:42 +00:00
{
s -= vecq.front().iov_len;
vecq.pop_front();
sendq.pop_front();
2018-09-12 13:29:42 +00:00
}
if(vecq.size())
2018-09-12 13:29:42 +00:00
{
auto& front = vecq.front();
front.iov_len -= s;
front.iov_base = ((byte_t*)front.iov_base) + s;
2018-09-12 13:29:42 +00:00
}
}
}
/// prune expired inbound messages
void
Session::PruneInboundMessages(llarp_time_t now)
{
auto itr = m_RecvMsgs.begin();
while(itr != m_RecvMsgs.end())
2018-09-06 11:46:19 +00:00
{
if(itr->second.IsExpired(now))
itr = m_RecvMsgs.erase(itr);
else
++itr;
2018-09-06 11:46:19 +00:00
}
}
2018-09-06 11:46:19 +00:00
void
Session::Connect()
{
utp_connect(sock, remoteAddr, remoteAddr.SockLen());
EnterState(eConnecting);
}
2018-09-06 11:46:19 +00:00
void
Session::OutboundLinkEstablished(LinkLayer* p)
{
OnLinkEstablished(p);
OutboundHandshake();
}
2018-09-06 11:46:19 +00:00
bool
Session::DoKeyExchange(transport_dh_func dh, SharedSecret& K,
const KeyExchangeNonce& n, const PubKey& other,
const SecretKey& secret)
{
ShortHash t_h;
static constexpr size_t TMP_SIZE = 64;
static_assert(SharedSecret::SIZE + KeyExchangeNonce::SIZE == TMP_SIZE,
"Invalid sizes");
AlignedBuffer< TMP_SIZE > tmp;
std::copy(K.begin(), K.end(), tmp.begin());
std::copy(n.begin(), n.end(), tmp.begin() + K.size());
// t_h = HS(K + L.n)
if(!Crypto()->shorthash(t_h, ConstBuffer(tmp)))
{
llarp::LogError("failed to mix key to ", remoteAddr);
return false;
}
// K = TKE(a.p, B_a.e, sk, t_h)
if(!dh(K, other, secret, t_h))
2018-12-16 20:34:04 +00:00
{
llarp::LogError("key exchange with ", other, " failed");
return false;
2018-12-16 20:34:04 +00:00
}
llarp::LogDebug("keys mixed with session to ", remoteAddr);
return true;
}
2018-12-16 20:34:04 +00:00
bool
Session::MutateKey(SharedSecret& K, const AlignedBuffer< 24 >& A)
{
AlignedBuffer< 56 > tmp;
auto buf = tmp.as_buffer();
std::copy(K.begin(), K.end(), buf.cur);
buf.cur += K.size();
std::copy(A.begin(), A.end(), buf.cur);
buf.cur = buf.base;
return Crypto()->shorthash(K, buf);
}
void
Session::TickImpl(llarp_time_t now)
{
PruneInboundMessages(now);
}
/// low level read
bool
Session::Recv(const byte_t* buf, size_t sz)
{
// mark we are alive
Alive();
size_t s = sz;
// process leftovers
if(recvBufOffset)
{
auto left = FragmentBufferSize - recvBufOffset;
if(s >= left)
2018-09-07 17:41:49 +00:00
{
// yes it fills it
llarp::LogDebug("process leftovers, offset=", recvBufOffset,
" sz=", s, " left=", left);
std::copy(buf, buf + left, recvBuf.begin() + recvBufOffset);
s -= left;
2018-09-07 20:36:06 +00:00
recvBufOffset = 0;
buf += left;
if(!VerifyThenDecrypt(recvBuf.data()))
2018-09-07 17:41:49 +00:00
return false;
}
}
// process full fragments
while(s >= FragmentBufferSize)
{
recvBufOffset = 0;
llarp::LogDebug("process full sz=", s);
if(!VerifyThenDecrypt(buf))
return false;
buf += FragmentBufferSize;
s -= FragmentBufferSize;
}
if(s)
{
// hold onto leftovers
llarp::LogDebug("leftovers sz=", s);
std::copy(buf, buf + s, recvBuf.begin() + recvBufOffset);
recvBufOffset += s;
}
return true;
}
bool
Session::IsTimedOut(llarp_time_t now) const
{
if(state == eClose)
return true;
if(now < lastActive)
return false;
auto dlt = now - lastActive;
if(dlt >= sessionTimeout)
{
llarp::LogDebug("session timeout reached for ", remoteAddr);
return true;
}
return false;
}
const PubKey&
Session::RemotePubKey() const
{
return remoteRC.pubkey;
}
Addr
Session::RemoteEndpoint()
{
return remoteAddr;
}
uint64
LinkLayer::SendTo(utp_callback_arguments* arg)
{
LinkLayer* l =
static_cast< LinkLayer* >(utp_context_get_userdata(arg->context));
if(l == nullptr)
return 0;
llarp::LogDebug("utp_sendto ", Addr(*arg->address), " ", arg->len,
" bytes");
// For whatever reason, the UTP_UDP_DONTFRAG flag is set
// on the socket itself....which isn't correct and causes
// winsock (at minimum) to reeee
// here, we check its value, then set fragmentation the _right_
// way. Naturally, Linux has its own special procedure.
// Of course, the flag itself is cleared. -rick
#ifndef _WIN32
// No practical method of doing this on NetBSD or Darwin
// without resorting to raw sockets
2018-11-22 17:46:52 +00:00
#if !(__NetBSD__ || __OpenBSD__ || (__APPLE__ && __MACH__))
#ifndef __linux__
if(arg->flags == 2)
{
int val = 1;
setsockopt(l->m_udp.fd, IPPROTO_IP, IP_DONTFRAGMENT, &val, sizeof(val));
}
else
{
int val = 0;
setsockopt(l->m_udp.fd, IPPROTO_IP, IP_DONTFRAGMENT, &val, sizeof(val));
}
#else
if(arg->flags == 2)
{
int val = IP_PMTUDISC_DO;
setsockopt(l->m_udp.fd, IPPROTO_IP, IP_MTU_DISCOVER, &val, sizeof(val));
}
else
{
int val = IP_PMTUDISC_DONT;
setsockopt(l->m_udp.fd, IPPROTO_IP, IP_MTU_DISCOVER, &val, sizeof(val));
}
2018-11-22 17:46:52 +00:00
#endif
#endif
arg->flags = 0;
if(::sendto(l->m_udp.fd, (char*)arg->buf, arg->len, arg->flags,
arg->address, arg->address_len)
== -1
&& errno)
#else
if(arg->flags == 2)
{
char val = 1;
setsockopt(l->m_udp.fd, IPPROTO_IP, IP_DONTFRAGMENT, &val, sizeof(val));
}
else
{
char val = 0;
setsockopt(l->m_udp.fd, IPPROTO_IP, IP_DONTFRAGMENT, &val, sizeof(val));
}
arg->flags = 0;
if(::sendto(l->m_udp.fd, (char*)arg->buf, arg->len, arg->flags,
arg->address, arg->address_len)
== -1)
#endif
{
2018-11-20 15:38:46 +00:00
#ifdef _WIN32
char buf[1024];
int err = WSAGetLastError();
FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, nullptr, err, LANG_NEUTRAL,
buf, 1024, nullptr);
llarp::LogError("sendto failed: ", buf);
2018-11-20 15:38:46 +00:00
#else
llarp::LogError("sendto failed: ", strerror(errno));
2018-11-20 15:38:46 +00:00
#endif
}
return 0;
}
uint64
LinkLayer::OnError(utp_callback_arguments* arg)
{
Session* session = static_cast< Session* >(utp_get_userdata(arg->socket));
LinkLayer* link =
static_cast< LinkLayer* >(utp_context_get_userdata(arg->context));
if(session && link)
2018-09-06 20:31:58 +00:00
{
link->HandleTimeout(session);
llarp::LogError(utp_error_code_names[arg->error_code], " via ",
session->remoteAddr);
2019-01-07 16:35:25 +00:00
if(arg->error_code != UTP_ETIMEDOUT)
session->Close();
link->RemovePending(session);
2018-09-06 20:31:58 +00:00
}
return 0;
}
2018-09-06 20:31:58 +00:00
uint64
LinkLayer::OnLog(utp_callback_arguments* arg)
{
llarp::LogDebug(arg->buf);
return 0;
}
LinkLayer::LinkLayer(llarp::Crypto* crypto,
const SecretKey& routerEncSecret,
llarp::GetRCFunc getrc, llarp::LinkMessageHandler h,
llarp::SignBufferFunc sign,
llarp::SessionEstablishedHandler established,
llarp::SessionRenegotiateHandler reneg,
llarp::TimeoutHandler timeout,
llarp::SessionClosedHandler closed)
: ILinkLayer(routerEncSecret, getrc, h, sign, established, reneg,
timeout, closed)
{
_crypto = crypto;
_utp_ctx = utp_init(2);
utp_context_set_userdata(_utp_ctx, this);
utp_set_callback(_utp_ctx, UTP_SENDTO, &LinkLayer::SendTo);
utp_set_callback(_utp_ctx, UTP_ON_ACCEPT, &LinkLayer::OnAccept);
utp_set_callback(_utp_ctx, UTP_ON_STATE_CHANGE,
&LinkLayer::OnStateChange);
utp_set_callback(_utp_ctx, UTP_ON_READ, &LinkLayer::OnRead);
utp_set_callback(_utp_ctx, UTP_ON_ERROR, &LinkLayer::OnError);
utp_set_callback(_utp_ctx, UTP_LOG, &LinkLayer::OnLog);
utp_context_set_option(_utp_ctx, UTP_LOG_NORMAL, 1);
utp_context_set_option(_utp_ctx, UTP_LOG_MTU, 1);
utp_context_set_option(_utp_ctx, UTP_LOG_DEBUG, 1);
utp_context_set_option(_utp_ctx, UTP_SNDBUF, MAX_LINK_MSG_SIZE * 16);
utp_context_set_option(_utp_ctx, UTP_RCVBUF, MAX_LINK_MSG_SIZE * 64);
}
LinkLayer::~LinkLayer()
{
utp_destroy(_utp_ctx);
}
uint16_t
LinkLayer::Rank() const
{
return 1;
}
void
LinkLayer::RecvFrom(const Addr& from, const void* buf, size_t sz)
{
utp_process_udp(_utp_ctx, (const byte_t*)buf, sz, from, from.SockLen());
}
2018-09-06 20:31:58 +00:00
#ifdef __linux__
void
LinkLayer::ProcessICMP()
{
do
2018-09-06 20:31:58 +00:00
{
byte_t vec_buf[4096], ancillary_buf[4096];
struct iovec iov = {vec_buf, sizeof(vec_buf)};
struct sockaddr_in remote;
struct msghdr msg;
ssize_t len;
struct cmsghdr* cmsg;
struct sock_extended_err* e;
struct sockaddr* icmp_addr;
struct sockaddr_in* icmp_sin;
memset(&msg, 0, sizeof(msg));
msg.msg_name = &remote;
msg.msg_namelen = sizeof(remote);
msg.msg_iov = &iov;
msg.msg_iovlen = 1;
msg.msg_flags = 0;
msg.msg_control = ancillary_buf;
msg.msg_controllen = sizeof(ancillary_buf);
len = recvmsg(m_udp.fd, &msg, MSG_ERRQUEUE | MSG_DONTWAIT);
if(len < 0)
{
if(errno == EAGAIN || errno == EWOULDBLOCK)
errno = 0;
else
llarp::LogError("failed to read icmp for utp ", strerror(errno));
return;
}
for(cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg))
2018-09-06 20:31:58 +00:00
{
if(cmsg->cmsg_type != IP_RECVERR)
2018-09-06 20:31:58 +00:00
{
continue;
2018-09-06 20:31:58 +00:00
}
if(cmsg->cmsg_level != SOL_IP)
2018-09-06 20:31:58 +00:00
{
continue;
2018-09-06 20:31:58 +00:00
}
e = (struct sock_extended_err*)CMSG_DATA(cmsg);
if(!e)
continue;
if(e->ee_origin != SO_EE_ORIGIN_ICMP)
{
continue;
}
icmp_addr = (struct sockaddr*)SO_EE_OFFENDER(e);
icmp_sin = (struct sockaddr_in*)icmp_addr;
if(icmp_sin->sin_port != 0)
{
continue;
}
if(e->ee_type == 3 && e->ee_code == 4)
{
utp_process_icmp_fragmentation(_utp_ctx, vec_buf, len,
(struct sockaddr*)&remote,
sizeof(remote), e->ee_info);
}
else
{
utp_process_icmp_error(_utp_ctx, vec_buf, len,
(struct sockaddr*)&remote, sizeof(remote));
}
}
} while(true);
}
2018-09-06 20:31:58 +00:00
#endif
void
LinkLayer::Pump()
{
utp_issue_deferred_acks(_utp_ctx);
2018-09-06 20:31:58 +00:00
#ifdef __linux__
ProcessICMP();
2018-09-06 20:31:58 +00:00
#endif
std::set< RouterID > sessions;
{
Lock l(m_AuthedLinksMutex);
auto itr = m_AuthedLinks.begin();
while(itr != m_AuthedLinks.end())
2018-09-10 13:43:36 +00:00
{
sessions.insert(itr->first);
++itr;
2018-09-10 13:43:36 +00:00
}
}
ILinkLayer::Pump();
{
Lock l(m_AuthedLinksMutex);
for(const auto& pk : sessions)
2018-09-10 13:43:36 +00:00
{
if(m_AuthedLinks.count(pk) == 0)
2018-09-10 13:43:36 +00:00
{
// all sessions were removed
SessionClosed(pk);
2018-09-10 13:43:36 +00:00
}
}
2018-09-06 20:31:58 +00:00
}
}
void
LinkLayer::Stop()
{
ForEachSession([](ILinkSession* s) { s->SendClose(); });
}
2018-09-06 11:46:19 +00:00
bool
LinkLayer::KeyGen(SecretKey& k)
{
Crypto()->encryption_keygen(k);
return true;
}
2018-09-06 20:31:58 +00:00
void
LinkLayer::Tick(llarp_time_t now)
{
utp_check_timeouts(_utp_ctx);
ILinkLayer::Tick(now);
}
2018-09-06 20:31:58 +00:00
utp_socket*
LinkLayer::NewSocket()
{
return utp_create_socket(_utp_ctx);
}
const char*
LinkLayer::Name() const
{
return "utp";
}
std::unique_ptr< ILinkLayer >
NewServer(llarp::Crypto* crypto, const SecretKey& routerEncSecret,
llarp::GetRCFunc getrc, llarp::LinkMessageHandler h,
llarp::SessionEstablishedHandler est,
llarp::SessionRenegotiateHandler reneg,
llarp::SignBufferFunc sign, llarp::TimeoutHandler timeout,
llarp::SessionClosedHandler closed)
{
return std::unique_ptr< ILinkLayer >(
new LinkLayer(crypto, routerEncSecret, getrc, h, sign, est, reneg,
timeout, closed));
}
std::unique_ptr< ILinkLayer >
NewServerFromRouter(llarp::Router* r)
{
return NewServer(
r->crypto.get(), r->encryption, std::bind(&llarp::Router::rc, r),
std::bind(&llarp::Router::HandleRecvLinkMessageBuffer, r,
std::placeholders::_1, std::placeholders::_2),
std::bind(&llarp::Router::OnSessionEstablished, r,
std::placeholders::_1),
std::bind(&llarp::Router::CheckRenegotiateValid, r,
std::placeholders::_1, std::placeholders::_2),
std::bind(&llarp::Router::Sign, r, std::placeholders::_1,
std::placeholders::_2),
std::bind(&llarp::Router::OnConnectTimeout, r, std::placeholders::_1),
std::bind(&llarp::Router::SessionClosed, r, std::placeholders::_1));
}
2018-12-16 20:34:04 +00:00
/// base constructor
Session::Session(LinkLayer* p)
{
m_NextTXMsgID = 0;
m_NextRXMsgID = 0;
parent = p;
2018-09-07 17:41:49 +00:00
remoteTransportPubKey.Zero();
SendQueueBacklog = [&]() -> size_t { return sendq.size(); };
2018-09-06 20:31:58 +00:00
SendKeepAlive = [&]() -> bool {
auto now = parent->Now();
if(sendq.size() == 0 && state == eSessionReady && now > lastActive
2018-11-19 22:04:23 +00:00
&& now - lastActive > 5000)
2018-09-06 20:31:58 +00:00
{
DiscardMessage msg;
byte_t tmp[128] = {0};
2018-12-03 18:28:16 +00:00
auto buf = llarp::StackBuffer< decltype(tmp) >(tmp);
2018-09-06 20:31:58 +00:00
if(!msg.BEncode(&buf))
return false;
2018-12-03 18:28:16 +00:00
buf.sz = buf.cur - buf.base;
2018-09-06 20:31:58 +00:00
buf.cur = buf.base;
if(!this->QueueWriteBuffers(buf))
return false;
}
return true;
};
2018-12-03 18:28:16 +00:00
gotLIM = false;
2018-09-06 11:46:19 +00:00
recvBufOffset = 0;
2018-12-27 18:42:23 +00:00
TimedOut = std::bind(&Session::IsTimedOut, this, std::placeholders::_1);
GetPubKey = std::bind(&Session::RemotePubKey, this);
2018-12-17 22:43:16 +00:00
GetRemoteRC = [&]() -> llarp::RouterContact { return this->remoteRC; };
GetLinkLayer = std::bind(&Session::GetParent, this);
lastActive = parent->Now();
2018-12-16 20:34:04 +00:00
2019-01-04 12:43:41 +00:00
Pump = std::bind(&Session::DoPump, this);
Tick = std::bind(&Session::TickImpl, this, std::placeholders::_1);
SendMessageBuffer =
std::bind(&Session::QueueWriteBuffers, this, std::placeholders::_1);
2018-09-07 17:41:49 +00:00
IsEstablished = [=]() {
return this->state == eSessionReady || this->state == eLinkEstablished;
2018-09-06 11:46:19 +00:00
};
2018-09-07 17:41:49 +00:00
SendClose = std::bind(&Session::Close, this);
GetRemoteEndpoint = std::bind(&Session::RemoteEndpoint, this);
RenegotiateSession = std::bind(&Session::Rehandshake, this);
2018-09-06 11:46:19 +00:00
}
2018-12-16 20:34:04 +00:00
/// outbound session
Session::Session(LinkLayer* p, utp_socket* s, const RouterContact& rc,
const AddressInfo& addr)
: Session(p)
{
2018-09-06 11:46:19 +00:00
remoteTransportPubKey = addr.pubkey;
2018-12-03 18:28:16 +00:00
remoteRC = rc;
RouterID rid = remoteRC.pubkey;
Crypto()->shorthash(txKey, rid.as_buffer());
rid = p->GetOurRC().pubkey;
Crypto()->shorthash(rxKey, rid.as_buffer());
sock = s;
2018-09-06 11:46:19 +00:00
assert(utp_set_userdata(sock, this) == this);
2018-09-06 13:16:24 +00:00
assert(s == sock);
2018-09-06 11:46:19 +00:00
remoteAddr = addr;
Start = std::bind(&Session::Connect, this);
GotLIM = std::bind(&Session::OutboundLIM, this, std::placeholders::_1);
2018-09-06 11:46:19 +00:00
}
2018-12-16 20:34:04 +00:00
/// inbound session
Session::Session(LinkLayer* p, utp_socket* s, const Addr& addr) : Session(p)
2018-09-06 11:46:19 +00:00
{
RouterID rid = p->GetOurRC().pubkey;
Crypto()->shorthash(rxKey, rid.as_buffer());
2018-09-06 11:46:19 +00:00
remoteRC.Clear();
sock = s;
2018-09-06 13:16:24 +00:00
assert(s == sock);
2018-09-06 11:46:19 +00:00
assert(utp_set_userdata(sock, this) == this);
remoteAddr = addr;
2018-12-03 18:28:16 +00:00
Start = []() {};
GotLIM = std::bind(&Session::InboundLIM, this, std::placeholders::_1);
}
ILinkLayer*
Session::GetParent()
{
return parent;
}
bool
Session::InboundLIM(const LinkIntroMessage* msg)
{
if(gotLIM && remoteRC.pubkey != msg->rc.pubkey)
{
Close();
return false;
}
2018-12-16 20:34:04 +00:00
if(!gotLIM)
{
remoteRC = msg->rc;
Crypto()->shorthash(txKey, remoteRC.pubkey.as_buffer());
if(!DoKeyExchange(std::bind(&Crypto::transport_dh_server, Crypto(), _1,
_2, _3, _4),
rxKey, msg->N, remoteRC.enckey,
parent->TransportSecretKey()))
2018-12-16 20:34:04 +00:00
return false;
byte_t tmp[LinkIntroMessage::MaxSize];
auto buf = StackBuffer< decltype(tmp) >(tmp);
LinkIntroMessage replymsg;
replymsg.rc = parent->GetOurRC();
if(!replymsg.rc.Verify(Crypto(), parent->Now()))
{
llarp::LogError("our RC is invalid? closing session to", remoteAddr);
Close();
return false;
}
replymsg.N.Randomize();
replymsg.P = DefaultLinkSessionLifetime;
if(!replymsg.Sign(parent->Sign))
{
llarp::LogError("failed to sign LIM for inbound handshake from ",
remoteAddr);
Close();
return false;
}
// encode
if(!replymsg.BEncode(&buf))
{
llarp::LogError("failed to encode LIM for handshake from ",
remoteAddr);
Close();
return false;
}
// rewind
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
// send
if(!SendMessageBuffer(buf))
{
llarp::LogError("failed to repl to handshake from ", remoteAddr);
Close();
return false;
}
if(!DoKeyExchange(std::bind(&Crypto::transport_dh_client, Crypto(), _1,
_2, _3, _4),
txKey, replymsg.N, remoteRC.enckey,
parent->RouterEncryptionSecret()))
2018-12-17 22:43:16 +00:00
return false;
2018-12-17 22:43:16 +00:00
llarp::LogDebug("Sent reply LIM");
gotLIM = true;
EnterState(eSessionReady);
2018-12-27 19:10:38 +00:00
/// future LIM are used for session renegotiation
GotLIM = std::bind(&Session::GotSessionRenegotiate, this,
std::placeholders::_1);
2018-12-16 20:34:04 +00:00
}
return true;
}
2019-01-04 12:43:41 +00:00
void
Session::DoPump()
{
// pump write queue
PumpWrite();
// prune inbound messages
PruneInboundMessages(parent->Now());
}
2018-10-29 16:48:36 +00:00
bool
Session::QueueWriteBuffers(llarp_buffer_t buf)
2018-10-29 16:48:36 +00:00
{
if(sendq.size() >= MaxSendQueueSize)
return false;
size_t sz = buf.sz;
byte_t* ptr = buf.base;
uint32_t msgid = m_NextTXMsgID++;
2018-10-29 16:48:36 +00:00
while(sz)
{
uint32_t s = std::min(FragmentBodyPayloadSize, sz);
if(!EncryptThenHash(ptr, msgid, s, sz - s))
{
llarp::LogError("EncryptThenHash failed?!");
return false;
}
llarp::LogDebug("encrypted ", s, " bytes");
2018-10-29 16:48:36 +00:00
ptr += s;
sz -= s;
}
return true;
}
bool
Session::OutboundLIM(const LinkIntroMessage* msg)
{
if(gotLIM && remoteRC.pubkey != msg->rc.pubkey)
{
return false;
}
remoteRC = msg->rc;
2018-12-03 18:28:16 +00:00
gotLIM = true;
if(!DoKeyExchange(
std::bind(&Crypto::transport_dh_server, Crypto(), _1, _2, _3, _4),
rxKey, msg->N, remoteRC.enckey, parent->RouterEncryptionSecret()))
{
Close();
return false;
}
EnterState(eSessionReady);
2018-12-27 19:10:38 +00:00
/// future LIM are used for session renegotiation
GotLIM = std::bind(&Session::GotSessionRenegotiate, this,
std::placeholders::_1);
return true;
}
void
Session::OutboundHandshake()
{
byte_t tmp[LinkIntroMessage::MaxSize];
auto buf = StackBuffer< decltype(tmp) >(tmp);
// build our RC
LinkIntroMessage msg;
msg.rc = parent->GetOurRC();
if(!msg.rc.Verify(Crypto(), parent->Now()))
{
llarp::LogError("our RC is invalid? closing session to", remoteAddr);
Close();
return;
}
msg.N.Randomize();
msg.P = DefaultLinkSessionLifetime;
if(!msg.Sign(parent->Sign))
{
llarp::LogError("failed to sign LIM for outbound handshake to ",
remoteAddr);
Close();
return;
}
// encode
if(!msg.BEncode(&buf))
{
llarp::LogError("failed to encode LIM for handshake to ", remoteAddr);
Close();
return;
}
// rewind
2018-12-03 18:28:16 +00:00
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
// send
if(!SendMessageBuffer(buf))
{
llarp::LogError("failed to send handshake to ", remoteAddr);
Close();
return;
}
if(!DoKeyExchange(
std::bind(&Crypto::transport_dh_client, Crypto(), _1, _2, _3, _4),
txKey, msg.N, remoteTransportPubKey,
parent->RouterEncryptionSecret()))
{
llarp::LogError("failed to mix keys for outbound session to ",
remoteAddr);
Close();
return;
}
}
Session::~Session()
{
2018-09-06 13:16:24 +00:00
if(sock)
{
utp_set_userdata(sock, nullptr);
}
}
2018-09-06 13:16:24 +00:00
ILinkSession*
LinkLayer::NewOutboundSession(const RouterContact& rc,
const AddressInfo& addr)
{
return new Session(this, utp_create_socket(_utp_ctx), rc, addr);
2018-09-06 11:46:19 +00:00
}
uint64
LinkLayer::OnRead(utp_callback_arguments* arg)
{
Session* self = static_cast< Session* >(utp_get_userdata(arg->socket));
2018-09-07 17:41:49 +00:00
2018-09-06 11:46:19 +00:00
if(self)
{
if(self->state == Session::eClose)
2018-09-06 13:16:24 +00:00
{
return 0;
}
if(!self->Recv(arg->buf, arg->len))
2018-09-06 20:31:58 +00:00
{
llarp::LogDebug("recv fail for ", self->remoteAddr);
self->Close();
return 0;
2018-09-06 11:46:19 +00:00
}
utp_read_drained(arg->socket);
2018-09-06 11:46:19 +00:00
}
else
{
llarp::LogWarn("utp_socket got data with no underlying session");
2018-09-18 12:29:27 +00:00
utp_close(arg->socket);
2018-09-06 11:46:19 +00:00
}
return 0;
}
2018-09-06 11:46:19 +00:00
uint64
LinkLayer::OnStateChange(utp_callback_arguments* arg)
{
2018-09-06 11:46:19 +00:00
LinkLayer* l =
static_cast< LinkLayer* >(utp_context_get_userdata(arg->context));
Session* session = static_cast< Session* >(utp_get_userdata(arg->socket));
2018-09-06 13:16:24 +00:00
if(session)
2018-09-06 11:46:19 +00:00
{
2018-09-06 13:16:24 +00:00
if(arg->state == UTP_STATE_CONNECT)
{
if(session->state == Session::eClose)
2018-09-06 13:16:24 +00:00
{
return 0;
}
session->OutboundLinkEstablished(l);
}
2018-09-06 20:31:58 +00:00
else if(arg->state == UTP_STATE_WRITABLE)
{
2018-09-12 13:29:42 +00:00
session->PumpWrite();
2018-09-06 20:31:58 +00:00
}
2018-09-06 13:16:24 +00:00
else if(arg->state == UTP_STATE_EOF)
{
2018-09-07 17:41:49 +00:00
llarp::LogDebug("got eof from ", session->remoteAddr);
session->Close();
2018-09-06 13:16:24 +00:00
}
2018-09-06 11:46:19 +00:00
}
return 0;
}
uint64
LinkLayer::OnAccept(utp_callback_arguments* arg)
{
LinkLayer* self =
static_cast< LinkLayer* >(utp_context_get_userdata(arg->context));
Addr remote(*arg->address);
llarp::LogDebug("utp accepted from ", remote);
Session* session = new Session(self, arg->socket, remote);
2019-01-04 12:43:41 +00:00
if(!self->PutSession(session))
{
session->Close();
delete session;
}
else
session->OnLinkEstablished(self);
return 0;
}
bool
Session::EncryptThenHash(const byte_t* ptr, uint32_t msgid, uint16_t length,
uint16_t remaining)
2018-09-06 11:46:19 +00:00
{
sendq.emplace_back();
auto& buf = sendq.back();
2018-09-12 13:29:42 +00:00
vecq.emplace_back();
2018-12-03 18:28:16 +00:00
auto& vec = vecq.back();
vec.iov_base = buf.data();
2018-12-03 18:28:16 +00:00
vec.iov_len = FragmentBufferSize;
2018-09-06 11:46:19 +00:00
buf.Randomize();
byte_t* noncePtr = buf.data() + FragmentHashSize;
byte_t* body = noncePtr + FragmentNonceSize;
byte_t* base = body;
AlignedBuffer< 24 > A(base);
// skip inner nonce
body += A.size();
// put msgid
htobe32buf(body, msgid);
2018-09-06 11:46:19 +00:00
body += sizeof(uint32_t);
// put length
htobe16buf(body, length);
body += sizeof(uint16_t);
// put remaining
htobe16buf(body, remaining);
body += sizeof(uint16_t);
// put body
memcpy(body, ptr, length);
2018-09-07 20:36:06 +00:00
auto payload =
InitBuffer(base, FragmentBufferSize - FragmentOverheadSize);
TunnelNonce nonce(noncePtr);
2018-09-07 20:36:06 +00:00
// encrypt
if(!Crypto()->xchacha20(payload, txKey, nonce))
return false;
2018-09-07 20:36:06 +00:00
payload.base = noncePtr;
2018-12-03 18:28:16 +00:00
payload.cur = payload.base;
payload.sz = FragmentBufferSize - FragmentHashSize;
2018-09-07 20:36:06 +00:00
// key'd hash
if(!Crypto()->hmac(buf.data(), payload, txKey))
return false;
return MutateKey(txKey, A);
2018-09-06 11:46:19 +00:00
}
void
Session::EnterState(State st)
2018-09-06 11:46:19 +00:00
{
2018-09-06 13:16:24 +00:00
state = st;
2018-11-21 17:46:33 +00:00
Alive();
2018-09-06 11:46:19 +00:00
if(st == eSessionReady)
{
parent->MapAddr(remoteRC.pubkey.as_array(), this);
2018-12-17 22:43:16 +00:00
parent->SessionEstablished(remoteRC);
2018-09-06 11:46:19 +00:00
}
}
bool
Session::GotSessionRenegotiate(const LinkIntroMessage* msg)
{
// check with parent and possibly process and store new rc
if(!parent->SessionRenegotiate(msg->rc, remoteRC))
{
// failed to renegotiate
Close();
return false;
}
// set remote rc
remoteRC = msg->rc;
// recalcuate rx key
return DoKeyExchange(
std::bind(&Crypto::transport_dh_server, Crypto(), _1, _2, _3, _4),
rxKey, msg->N, remoteRC.enckey, parent->RouterEncryptionSecret());
}
bool
Session::Rehandshake()
{
byte_t tmp[LinkIntroMessage::MaxSize];
LinkIntroMessage lim;
lim.rc = parent->GetOurRC();
lim.N.Randomize();
lim.P = 60 * 1000 * 10;
if(!lim.Sign(parent->Sign))
return false;
auto buf = llarp::StackBuffer< decltype(tmp) >(tmp);
if(!lim.BEncode(&buf))
return false;
// rewind and resize buffer
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
// send message
if(!SendMessageBuffer(buf))
return false;
// regen our tx Key
return DoKeyExchange(
std::bind(&Crypto::transport_dh_client, Crypto(), _1, _2, _3, _4),
txKey, lim.N, remoteRC.enckey, parent->RouterEncryptionSecret());
}
2018-09-06 11:46:19 +00:00
bool
2018-12-17 22:43:16 +00:00
Session::VerifyThenDecrypt(const byte_t* ptr)
2018-09-06 11:46:19 +00:00
{
2018-09-06 20:31:58 +00:00
llarp::LogDebug("verify then decrypt ", remoteAddr);
2018-09-06 11:46:19 +00:00
ShortHash digest;
2018-09-06 20:31:58 +00:00
2018-12-17 22:43:16 +00:00
auto hbuf = InitBuffer(ptr + FragmentHashSize,
2018-09-07 17:41:49 +00:00
FragmentBufferSize - FragmentHashSize);
if(!Crypto()->hmac(digest.data(), hbuf, rxKey))
2018-09-06 11:46:19 +00:00
{
llarp::LogError("keyed hash failed");
return false;
}
2018-12-17 22:43:16 +00:00
ShortHash expected(ptr);
2018-09-07 17:41:49 +00:00
if(expected != digest)
2018-09-06 11:46:19 +00:00
{
2018-09-06 20:31:58 +00:00
llarp::LogError("Message Integrity Failed: got ", digest, " from ",
2018-09-07 17:41:49 +00:00
remoteAddr, " instead of ", expected);
2018-12-19 17:48:29 +00:00
Close();
2018-09-06 11:46:19 +00:00
return false;
}
2018-12-17 22:43:16 +00:00
auto in = InitBuffer(ptr + FragmentOverheadSize,
FragmentBufferSize - FragmentOverheadSize);
2018-12-16 20:34:04 +00:00
llarp_buffer_t out = rxFragBody.as_buffer();
2018-12-16 20:34:04 +00:00
// decrypt
2018-12-17 22:43:16 +00:00
if(!Crypto()->xchacha20_alt(out, in, rxKey, ptr + FragmentHashSize))
{
llarp::LogError("failed to decrypt message from ", remoteAddr);
return false;
}
// get inner nonce
AlignedBuffer< 24 > A(out.base);
// advance buffer
out.cur += A.size();
// read msgid
2018-12-16 20:34:04 +00:00
uint32_t msgid;
if(!llarp_buffer_read_uint32(&out, &msgid))
{
llarp::LogError("failed to read msgid");
2018-12-16 20:34:04 +00:00
return false;
}
// read length and remaining
uint16_t length, remaining;
if(!(llarp_buffer_read_uint16(&out, &length)
&& llarp_buffer_read_uint16(&out, &remaining)))
{
llarp::LogError("failed to read the rest of the header");
2018-09-06 11:46:19 +00:00
return false;
}
if(length > (out.sz - (out.cur - out.base)))
2018-09-06 11:46:19 +00:00
{
2018-12-16 20:34:04 +00:00
// too big length
llarp::LogError("fragment body too big");
2018-09-06 11:46:19 +00:00
return false;
}
2018-12-17 22:43:16 +00:00
if(msgid < m_NextRXMsgID)
return false;
m_NextRXMsgID = msgid;
2018-12-16 20:34:04 +00:00
// get message
2018-12-17 22:43:16 +00:00
if(m_RecvMsgs.find(msgid) == m_RecvMsgs.end())
{
2019-01-03 21:25:09 +00:00
m_RecvMsgs.emplace(msgid, InboundMessage{});
}
2018-12-17 22:43:16 +00:00
auto itr = m_RecvMsgs.find(msgid);
// add message activity
2018-12-17 22:43:16 +00:00
itr->second.lastActive = parent->Now();
// append data
2018-12-17 22:43:16 +00:00
if(!itr->second.AppendData(out.cur, length))
{
llarp::LogError("inbound buffer is full");
return false; // not enough room
}
// mutate key
if(!MutateKey(rxKey, A))
{
llarp::LogError("failed to mutate rx key");
return false;
}
2018-12-16 20:34:04 +00:00
if(remaining == 0)
2018-09-06 11:46:19 +00:00
{
2018-12-27 19:10:38 +00:00
// we done with this guy, prune next tick
itr->second.lastActive = 0;
llarp_buffer_t buf = itr->second.buffer;
// resize
2018-12-17 22:43:16 +00:00
buf.sz = buf.cur - buf.base;
2018-12-16 20:34:04 +00:00
// rewind
2018-12-17 22:43:16 +00:00
buf.cur = buf.base;
// process buffer
llarp::LogDebug("got message ", msgid, " from ", remoteAddr);
2018-12-27 19:10:38 +00:00
return parent->HandleMessage(this, buf);
}
2018-12-27 19:10:38 +00:00
return true;
2018-09-06 11:46:19 +00:00
}
2018-09-06 20:31:58 +00:00
void
Session::Close()
2018-09-06 20:31:58 +00:00
{
if(state != eClose)
{
2018-09-07 20:36:06 +00:00
if(sock)
{
2019-01-07 16:13:16 +00:00
if(state == eLinkEstablished || state == eSessionReady)
{
2019-01-07 16:35:25 +00:00
// only call shutdown and close when we are actually connected
2019-01-07 16:13:16 +00:00
utp_shutdown(sock, SHUT_RDWR);
2019-01-07 16:35:25 +00:00
utp_close(sock);
2019-01-07 16:13:16 +00:00
}
2018-09-07 20:36:06 +00:00
llarp::LogDebug("utp_close ", remoteAddr);
utp_set_userdata(sock, nullptr);
}
2018-09-06 20:31:58 +00:00
}
EnterState(eClose);
sock = nullptr;
}
void
Session::Alive()
2018-09-06 20:31:58 +00:00
{
lastActive = parent->Now();
2018-09-06 11:46:19 +00:00
}
} // namespace utp
} // namespace llarp