lokinet/llarp/messages/relay_commit.cpp

470 lines
15 KiB
C++
Raw Normal View History

2018-12-15 16:21:52 +00:00
#include <messages/relay_commit.hpp>
#include <messages/relay_status.hpp>
#include <crypto/crypto.hpp>
2019-06-19 20:40:40 +00:00
#include <nodedb.hpp>
2019-06-17 23:19:39 +00:00
#include <path/path_context.hpp>
#include <path/transit_hop.hpp>
#include <router/abstractrouter.hpp>
#include <router/i_outbound_message_handler.hpp>
2019-06-19 22:30:07 +00:00
#include <routing/path_confirm_message.hpp>
#include <util/bencode.hpp>
#include <util/buffer.hpp>
2019-09-01 12:10:49 +00:00
#include <util/logging/logger.hpp>
2019-09-01 12:38:03 +00:00
#include <util/meta/memfn.hpp>
2019-09-01 13:26:16 +00:00
#include <util/thread/logic.hpp>
#include <functional>
#include <nonstd/optional.hpp>
namespace llarp
{
bool
2019-02-02 23:12:42 +00:00
LR_CommitMessage::DecodeKey(const llarp_buffer_t& key, llarp_buffer_t* buf)
{
if(key == "c")
{
2020-01-21 17:31:48 +00:00
/// so we dont put it into the shitty queue
pathid.Fill('c');
return BEncodeReadArray(frames, buf);
}
bool read = false;
2019-11-22 21:14:37 +00:00
if(!BEncodeMaybeVerifyVersion("v", version, LLARP_PROTO_VERSION, read, key,
2019-12-06 17:13:09 +00:00
buf))
return false;
return read;
}
void
LR_CommitMessage::Clear()
{
2019-06-15 14:55:13 +00:00
std::for_each(frames.begin(), frames.end(), [](auto& f) { f.Clear(); });
version = 0;
}
bool
LR_CommitMessage::BEncode(llarp_buffer_t* buf) const
{
if(!bencode_start_dict(buf))
return false;
// msg type
if(!BEncodeWriteDictMsgType(buf, "a", "c"))
return false;
// frames
if(!BEncodeWriteDictArray("c", frames, buf))
return false;
// version
if(!bencode_write_uint64_entry(buf, "v", 1, LLARP_PROTO_VERSION))
return false;
return bencode_end(buf);
}
bool
LR_CommitMessage::HandleMessage(AbstractRouter* router) const
{
2019-04-05 14:58:22 +00:00
if(frames.size() != path::max_len)
{
llarp::LogError("LRCM invalid number of records, ", frames.size(),
2019-04-05 14:58:22 +00:00
"!=", path::max_len);
return false;
}
if(!router->pathContext().AllowingTransit())
{
llarp::LogError("got LRCM when not permitting transit");
return false;
}
return AsyncDecrypt(&router->pathContext());
}
bool
LR_CommitRecord::BEncode(llarp_buffer_t* buf) const
{
if(!bencode_start_dict(buf))
return false;
if(!BEncodeWriteDictEntry("c", commkey, buf))
return false;
if(!BEncodeWriteDictEntry("i", nextHop, buf))
return false;
if(lifetime > 10 && lifetime < 600)
{
if(!BEncodeWriteDictInt("i", lifetime, buf))
return false;
}
if(!BEncodeWriteDictEntry("n", tunnelNonce, buf))
return false;
if(!BEncodeWriteDictEntry("r", rxid, buf))
return false;
if(!BEncodeWriteDictEntry("t", txid, buf))
return false;
if(nextRC)
{
if(!BEncodeWriteDictEntry("u", *nextRC, buf))
return false;
}
if(!bencode_write_uint64_entry(buf, "v", 1, LLARP_PROTO_VERSION))
return false;
if(work && !BEncodeWriteDictEntry("w", *work, buf))
return false;
return bencode_end(buf);
}
bool
LR_CommitRecord::OnKey(llarp_buffer_t* buffer, llarp_buffer_t* key)
{
if(!key)
return true;
bool read = false;
if(!BEncodeMaybeReadDictEntry("c", commkey, read, *key, buffer))
return false;
if(!BEncodeMaybeReadDictEntry("i", nextHop, read, *key, buffer))
return false;
if(!BEncodeMaybeReadDictInt("l", lifetime, read, *key, buffer))
return false;
if(!BEncodeMaybeReadDictEntry("n", tunnelNonce, read, *key, buffer))
return false;
if(!BEncodeMaybeReadDictEntry("r", rxid, read, *key, buffer))
return false;
if(!BEncodeMaybeReadDictEntry("t", txid, read, *key, buffer))
return false;
if(*key == "u")
{
nextRC = std::make_unique< RouterContact >();
return nextRC->BDecode(buffer);
}
2019-11-22 21:14:37 +00:00
if(!BEncodeMaybeVerifyVersion("v", version, LLARP_PROTO_VERSION, read, *key,
2019-12-06 17:13:09 +00:00
buffer))
return false;
if(*key == "w")
{
// check for duplicate
if(work)
{
llarp::LogWarn("duplicate POW in LRCR");
return false;
}
work = std::make_unique< PoW >();
2019-05-24 02:01:36 +00:00
return bencode_decode_dict(*work, buffer);
}
return read;
}
bool
LR_CommitRecord::BDecode(llarp_buffer_t* buf)
{
2019-06-02 21:19:10 +00:00
return bencode_read_dict(util::memFn(&LR_CommitRecord::OnKey, this), buf);
}
bool
LR_CommitRecord::operator==(const LR_CommitRecord& other) const
{
if(work && other.work)
{
if(*work != *other.work)
return false;
}
return nextHop == other.nextHop && commkey == other.commkey
&& txid == other.txid && rxid == other.rxid;
}
struct LRCMFrameDecrypt
{
2019-07-30 23:42:13 +00:00
using Context = llarp::path::PathContext;
using Hop = llarp::path::TransitHop;
using Decrypter = AsyncFrameDecrypter< LRCMFrameDecrypt >;
2019-04-30 12:22:15 +00:00
using Decrypter_ptr = std::unique_ptr< Decrypter >;
Decrypter_ptr decrypter;
std::array< EncryptedFrame, 8 > frames;
Context* context;
// decrypted record
LR_CommitRecord record;
// the actual hop
std::shared_ptr< Hop > hop;
const nonstd::optional< llarp::Addr > fromAddr;
2019-12-30 20:15:19 +00:00
2019-04-30 12:22:15 +00:00
LRCMFrameDecrypt(Context* ctx, Decrypter_ptr dec,
const LR_CommitMessage* commit)
2019-04-30 12:22:15 +00:00
: decrypter(std::move(dec))
, frames(commit->frames)
, context(ctx)
, hop(std::make_shared< Hop >())
2019-12-30 21:06:57 +00:00
, fromAddr(commit->session->GetRemoteRC().IsPublicRouter()
? nonstd::optional< llarp::Addr >{}
2019-12-30 21:06:57 +00:00
: commit->session->GetRemoteEndpoint())
{
hop->info.downstream = commit->session->GetPubKey();
}
2019-07-30 23:42:13 +00:00
~LRCMFrameDecrypt() = default;
static void
OnForwardLRCMResult(AbstractRouter* router, const PathID_t pathid,
const RouterID nextHop, const SharedSecret pathKey,
SendStatus sendStatus)
{
uint64_t status = LR_StatusRecord::FAIL_DEST_INVALID;
switch(sendStatus)
{
case SendStatus::Success:
// do nothing, will forward success message later
return;
case SendStatus::Timeout:
status = LR_StatusRecord::FAIL_TIMEOUT;
break;
case SendStatus::NoLink:
status = LR_StatusRecord::FAIL_CANNOT_CONNECT;
break;
case SendStatus::InvalidRouter:
status = LR_StatusRecord::FAIL_DEST_INVALID;
break;
case SendStatus::RouterNotFound:
status = LR_StatusRecord::FAIL_DEST_UNKNOWN;
break;
case SendStatus::Congestion:
status = LR_StatusRecord::FAIL_CONGESTION;
break;
default:
LogError("llarp::SendStatus value not in enum class");
std::abort();
break;
}
auto func = std::bind(&LR_StatusMessage::CreateAndSend, router, pathid,
nextHop, pathKey, status);
router->threadpool()->addJob(func);
}
/// this is done from logic thread
static void
2019-04-30 12:22:15 +00:00
SendLRCM(std::shared_ptr< LRCMFrameDecrypt > self)
{
2019-09-04 12:24:17 +00:00
if(self->context->HasTransitHop(self->hop->info))
{
2019-12-30 21:06:57 +00:00
llarp::LogError("duplicate transit hop ", self->hop->info);
2020-01-21 17:31:48 +00:00
LR_StatusMessage::CreateAndSend(
self->context->Router(), self->hop->info.rxID,
self->hop->info.downstream, self->hop->pathKey,
LR_StatusRecord::FAIL_DUPLICATE_HOP);
2019-09-04 12:24:17 +00:00
self->hop = nullptr;
return;
}
2019-12-30 20:15:19 +00:00
2019-12-30 21:06:57 +00:00
if(self->fromAddr.has_value())
2019-12-30 20:15:19 +00:00
{
2019-12-30 20:57:09 +00:00
// only do ip limiting from non service nodes
2019-12-30 21:06:57 +00:00
if(self->context->CheckPathLimitHitByIP(self->fromAddr.value()))
2019-12-30 20:15:19 +00:00
{
2019-12-30 20:57:09 +00:00
// we hit a limit so tell it to slow tf down
2019-12-30 21:06:57 +00:00
llarp::LogError("client path build hit limit ", self->hop->info);
2019-12-30 20:55:56 +00:00
OnForwardLRCMResult(self->context->Router(), self->hop->info.rxID,
self->hop->info.downstream, self->hop->pathKey,
SendStatus::Congestion);
2019-12-30 20:15:19 +00:00
self->hop = nullptr;
return;
}
}
if(!self->context->Router()->ConnectionToRouterAllowed(
self->hop->info.upstream))
{
// we are not allowed to forward it ... now what?
llarp::LogError("path to ", self->hop->info.upstream,
"not allowed, dropping build request on the floor");
OnForwardLRCMResult(self->context->Router(), self->hop->info.rxID,
self->hop->info.downstream, self->hop->pathKey,
SendStatus::InvalidRouter);
self->hop = nullptr;
return;
}
// persist sessions to upstream and downstream routers until the commit
// ends
self->context->Router()->PersistSessionUntil(
self->hop->info.downstream, self->hop->ExpireTime() + 10000);
self->context->Router()->PersistSessionUntil(
self->hop->info.upstream, self->hop->ExpireTime() + 10000);
// put hop
self->context->PutTransitHop(self->hop);
// if we have an rc for this hop...
if(self->record.nextRC)
{
// ... and it matches the next hop ...
if(self->record.nextHop == self->record.nextRC->pubkey)
{
// ... and it's valid
const auto now = self->context->Router()->Now();
if(self->record.nextRC->IsPublicRouter()
&& self->record.nextRC->Verify(now))
{
self->context->Router()->nodedb()->UpdateAsyncIfNewer(
*self->record.nextRC.get());
}
}
}
// forward to next hop
using std::placeholders::_1;
auto func = std::bind(&OnForwardLRCMResult, self->context->Router(),
self->hop->info.rxID, self->hop->info.downstream,
self->hop->pathKey, _1);
self->context->ForwardLRCM(self->hop->info.upstream, self->frames, func);
self->hop = nullptr;
}
// this is called from the logic thread
static void
2019-04-30 12:22:15 +00:00
SendPathConfirm(std::shared_ptr< LRCMFrameDecrypt > self)
{
// send path confirmation
// TODO: other status flags?
uint64_t status = LR_StatusRecord::SUCCESS;
2019-09-04 12:24:17 +00:00
if(self->context->HasTransitHop(self->hop->info))
{
status = LR_StatusRecord::FAIL_DUPLICATE_HOP;
}
else
{
// persist session to downstream until path expiration
self->context->Router()->PersistSessionUntil(
self->hop->info.downstream, self->hop->ExpireTime() + 10000);
// put hop
self->context->PutTransitHop(self->hop);
}
if(!LR_StatusMessage::CreateAndSend(
self->context->Router(), self->hop->info.rxID,
self->hop->info.downstream, self->hop->pathKey, status))
{
llarp::LogError("failed to send path confirmation for ",
self->hop->info);
}
self->hop = nullptr;
}
// TODO: If decryption has succeeded here but we otherwise don't
// want to or can't accept the path build request, send
// a status message saying as much.
static void
2019-04-30 12:22:15 +00:00
HandleDecrypted(llarp_buffer_t* buf,
std::shared_ptr< LRCMFrameDecrypt > self)
{
auto now = self->context->Router()->Now();
auto& info = self->hop->info;
if(!buf)
{
llarp::LogError("LRCM decrypt failed from ", info.downstream);
2019-04-30 12:22:15 +00:00
self->decrypter = nullptr;
return;
}
buf->cur = buf->base + EncryptedFrameOverheadSize;
llarp::LogDebug("decrypted LRCM from ", info.downstream);
// successful decrypt
if(!self->record.BDecode(buf))
{
llarp::LogError("malformed frame inside LRCM from ", info.downstream);
2019-04-30 12:22:15 +00:00
self->decrypter = nullptr;
return;
}
info.txID = self->record.txid;
info.rxID = self->record.rxid;
if(info.txID.IsZero() || info.rxID.IsZero())
{
llarp::LogError("LRCM refusing zero pathid");
self->decrypter = nullptr;
return;
}
info.upstream = self->record.nextHop;
2019-09-04 12:24:17 +00:00
// generate path key as we are in a worker thread
auto crypto = CryptoManager::instance();
if(!crypto->dh_server(self->hop->pathKey, self->record.commkey,
self->context->EncryptionSecretKey(),
self->record.tunnelNonce))
{
llarp::LogError("LRCM DH Failed ", info);
2019-04-30 12:22:15 +00:00
self->decrypter = nullptr;
return;
}
// generate hash of hop key for nonce mutation
2019-02-05 00:41:33 +00:00
crypto->shorthash(self->hop->nonceXOR,
llarp_buffer_t(self->hop->pathKey));
if(self->record.work && self->record.work->IsValid(now))
{
llarp::LogDebug("LRCM extended lifetime by ",
self->record.work->extendedLifetime, " seconds for ",
info);
self->hop->lifetime += 1000 * self->record.work->extendedLifetime;
}
else if(self->record.lifetime < 600 && self->record.lifetime > 10)
{
self->hop->lifetime = self->record.lifetime;
llarp::LogDebug("LRCM short lifespan set to ", self->hop->lifetime,
" seconds for ", info);
}
// TODO: check if we really want to accept it
self->hop->started = now;
size_t sz = self->frames[0].size();
// shift
std::array< EncryptedFrame, 8 > frames;
frames[0] = self->frames[1];
frames[1] = self->frames[2];
frames[2] = self->frames[3];
frames[3] = self->frames[4];
frames[4] = self->frames[5];
frames[5] = self->frames[6];
frames[6] = self->frames[7];
// put our response on the end
frames[7] = EncryptedFrame(sz - EncryptedFrameOverheadSize);
// random junk for now
frames[7].Randomize();
self->frames = std::move(frames);
if(self->context->HopIsUs(info.upstream))
{
// we are the farthest hop
llarp::LogDebug("We are the farthest hop for ", info);
2019-09-04 12:24:17 +00:00
// send a LRSM down the path
LogicCall(self->context->logic(), [=]() {
2019-04-30 12:22:15 +00:00
SendPathConfirm(self);
self->decrypter = nullptr;
});
}
else
{
// forward upstream
// we are still in the worker thread so post job to logic
LogicCall(self->context->logic(), [=]() {
2019-04-30 12:22:15 +00:00
SendLRCM(self);
self->decrypter = nullptr;
});
}
}
};
bool
LR_CommitMessage::AsyncDecrypt(llarp::path::PathContext* context) const
{
2019-04-30 12:22:15 +00:00
auto decrypter = std::make_unique< LRCMFrameDecrypt::Decrypter >(
context->EncryptionSecretKey(), &LRCMFrameDecrypt::HandleDecrypted);
// copy frames so we own them
2019-04-30 12:22:15 +00:00
auto frameDecrypt = std::make_shared< LRCMFrameDecrypt >(
context, std::move(decrypter), this);
// decrypt frames async
2019-04-30 12:22:15 +00:00
frameDecrypt->decrypter->AsyncDecrypt(
context->Worker(), frameDecrypt->frames[0], frameDecrypt);
return true;
}
} // namespace llarp