lokinet/llarp/path/transit_hop.cpp

319 lines
8.9 KiB
C++
Raw Normal View History

2019-01-11 01:19:36 +00:00
#include <path/path.hpp>
#include <dht/context.hpp>
#include <exit/context.hpp>
#include <messages/discard.hpp>
#include <messages/exit.hpp>
#include <messages/path_latency.hpp>
#include <messages/path_transfer.hpp>
#include <messages/relay_commit.hpp>
#include <router/abstractrouter.hpp>
2018-12-12 02:04:32 +00:00
#include <routing/handler.hpp>
#include <util/buffer.hpp>
#include <util/endian.hpp>
2018-06-22 00:25:30 +00:00
namespace llarp
{
namespace path
2018-06-22 00:25:30 +00:00
{
2018-06-26 16:23:43 +00:00
TransitHop::TransitHop()
{
}
bool
TransitHop::Expired(llarp_time_t now) const
{
2018-11-14 18:02:27 +00:00
return now >= ExpireTime();
}
2018-06-22 00:25:30 +00:00
2018-08-22 16:19:51 +00:00
llarp_time_t
TransitHop::ExpireTime() const
{
return started + lifetime;
}
TransitHopInfo::TransitHopInfo(const TransitHopInfo& other)
: txID(other.txID)
, rxID(other.rxID)
, upstream(other.upstream)
, downstream(other.downstream)
{
}
2018-06-22 00:25:30 +00:00
TransitHopInfo::TransitHopInfo(const RouterID& down,
const LR_CommitRecord& record)
: txID(record.txid)
, rxID(record.rxid)
, upstream(record.nextHop)
, downstream(down)
{
}
2018-06-22 00:25:30 +00:00
TransitHop::TransitHop(const TransitHop& other)
: info(other.info)
, pathKey(other.pathKey)
, started(other.started)
, lifetime(other.lifetime)
, version(other.version)
2018-06-22 00:25:30 +00:00
{
}
bool
TransitHop::SendRoutingMessage(const llarp::routing::IMessage* msg,
AbstractRouter* r)
{
if(!IsEndpoint(r->pubkey()))
return false;
2019-02-02 23:12:42 +00:00
std::array< byte_t, MAX_LINK_MSG_SIZE - 128 > tmp;
llarp_buffer_t buf(tmp);
if(!msg->BEncode(&buf))
{
llarp::LogError("failed to encode routing message");
return false;
}
TunnelNonce N;
N.Randomize();
buf.sz = buf.cur - buf.base;
// pad to nearest MESSAGE_PAD_SIZE bytes
auto dlt = buf.sz % MESSAGE_PAD_SIZE;
if(dlt)
{
dlt = MESSAGE_PAD_SIZE - dlt;
// randomize padding
r->crypto()->randbytes(buf.cur, dlt);
buf.sz += dlt;
}
buf.cur = buf.base;
return HandleDownstream(buf, N, r);
}
2018-06-22 00:25:30 +00:00
bool
2019-02-02 23:12:42 +00:00
TransitHop::HandleDownstream(const llarp_buffer_t& buf,
const TunnelNonce& Y, AbstractRouter* r)
{
RelayDownstreamMessage msg;
msg.pathid = info.rxID;
msg.Y = Y ^ nonceXOR;
r->crypto()->xchacha20(buf, pathKey, Y);
msg.X = buf;
llarp::LogDebug("relay ", msg.X.size(), " bytes downstream from ",
info.upstream, " to ", info.downstream);
return r->SendToOrQueue(info.downstream, &msg);
}
2018-06-22 00:25:30 +00:00
bool
TransitHop::HandleUpstream(const llarp_buffer_t& buf, const TunnelNonce& Y,
AbstractRouter* r)
{
r->crypto()->xchacha20(buf, pathKey, Y);
if(IsEndpoint(r->pubkey()))
2018-06-26 16:23:43 +00:00
{
2018-12-27 15:31:24 +00:00
m_LastActivity = r->Now();
return r->ParseRoutingMessageBuffer(buf, this, info.rxID);
2018-06-26 16:23:43 +00:00
}
else
{
RelayUpstreamMessage msg;
msg.pathid = info.txID;
msg.Y = Y ^ nonceXOR;
2018-06-26 16:23:43 +00:00
msg.X = buf;
llarp::LogDebug("relay ", msg.X.size(), " bytes upstream from ",
info.downstream, " to ", info.upstream);
return r->SendToOrQueue(info.upstream, &msg);
2018-06-26 16:23:43 +00:00
}
}
bool
TransitHop::HandleDHTMessage(const llarp::dht::IMessage* msg,
AbstractRouter* r)
2018-06-26 16:23:43 +00:00
{
return r->dht()->impl.RelayRequestForPath(info.rxID, msg);
2018-06-26 16:23:43 +00:00
}
bool
TransitHop::HandlePathLatencyMessage(
const llarp::routing::PathLatencyMessage* msg, AbstractRouter* r)
2018-06-26 16:23:43 +00:00
{
llarp::routing::PathLatencyMessage reply;
reply.L = msg->T;
return SendRoutingMessage(&reply, r);
}
2018-06-26 16:23:43 +00:00
bool
TransitHop::HandlePathConfirmMessage(
__attribute__((unused)) const llarp::routing::PathConfirmMessage* msg,
__attribute__((unused)) AbstractRouter* r)
2018-06-26 16:23:43 +00:00
{
llarp::LogWarn("unwarranted path confirm message on ", info);
2018-06-26 16:23:43 +00:00
return false;
}
bool
TransitHop::HandleDataDiscardMessage(
__attribute__((unused)) const llarp::routing::DataDiscardMessage* msg,
__attribute__((unused)) AbstractRouter* r)
{
llarp::LogWarn("unwarranted path data discard message on ", info);
return false;
}
bool
TransitHop::HandleObtainExitMessage(
const llarp::routing::ObtainExitMessage* msg, AbstractRouter* r)
{
if(msg->Verify(r->crypto())
&& r->exitContext().ObtainNewExit(msg->I, info.rxID, msg->E != 0))
2018-11-14 12:23:08 +00:00
{
llarp::routing::GrantExitMessage grant;
grant.S = NextSeqNo();
grant.T = msg->T;
if(!grant.Sign(r->crypto(), r->identity()))
2018-11-14 21:16:11 +00:00
{
llarp::LogError("Failed to sign grant exit message");
2018-11-14 18:02:27 +00:00
return false;
2018-11-14 21:16:11 +00:00
}
2018-11-14 12:23:08 +00:00
return SendRoutingMessage(&grant, r);
}
// TODO: exponential backoff
// TODO: rejected policies
llarp::routing::RejectExitMessage reject;
reject.S = NextSeqNo();
reject.T = msg->T;
if(!reject.Sign(r->crypto(), r->identity()))
2018-11-14 21:16:11 +00:00
{
llarp::LogError("Failed to sign reject exit message");
2018-11-14 18:02:27 +00:00
return false;
2018-11-14 21:16:11 +00:00
}
2018-11-14 12:23:08 +00:00
return SendRoutingMessage(&reject, r);
}
bool
TransitHop::HandleCloseExitMessage(
const llarp::routing::CloseExitMessage* msg, AbstractRouter* r)
{
2018-11-14 21:02:36 +00:00
llarp::routing::DataDiscardMessage discard(info.rxID, msg->S);
auto ep = r->exitContext().FindEndpointForPath(info.rxID);
if(ep && msg->Verify(r->crypto(), ep->PubKey()))
2018-11-14 18:02:27 +00:00
{
ep->Close();
// ep is now gone af
llarp::routing::CloseExitMessage reply;
reply.S = NextSeqNo();
if(reply.Sign(r->crypto(), r->identity()))
2018-11-14 18:02:27 +00:00
return SendRoutingMessage(&reply, r);
}
return SendRoutingMessage(&discard, r);
}
bool
2018-11-14 12:23:08 +00:00
TransitHop::HandleUpdateExitVerifyMessage(
const llarp::routing::UpdateExitVerifyMessage* msg, AbstractRouter* r)
{
(void)msg;
(void)r;
2018-11-14 12:23:08 +00:00
llarp::LogError("unwarranted exit verify on ", info);
return false;
}
2018-11-14 12:23:08 +00:00
bool
TransitHop::HandleUpdateExitMessage(
const llarp::routing::UpdateExitMessage* msg, AbstractRouter* r)
2018-11-14 12:23:08 +00:00
{
auto ep = r->exitContext().FindEndpointForPath(msg->P);
2018-11-14 12:23:08 +00:00
if(ep)
{
if(!msg->Verify(r->crypto(), ep->PubKey()))
2018-11-14 18:02:27 +00:00
return false;
2018-11-14 21:02:36 +00:00
if(ep->UpdateLocalPath(info.rxID))
2018-11-14 12:23:08 +00:00
{
2018-11-14 18:02:27 +00:00
llarp::routing::UpdateExitVerifyMessage reply;
reply.T = msg->T;
reply.S = NextSeqNo();
return SendRoutingMessage(&reply, r);
2018-11-14 12:23:08 +00:00
}
}
// on fail tell message was discarded
2018-11-14 21:02:36 +00:00
llarp::routing::DataDiscardMessage discard(info.rxID, msg->S);
2018-11-14 12:23:08 +00:00
return SendRoutingMessage(&discard, r);
}
bool
TransitHop::HandleRejectExitMessage(
const llarp::routing::RejectExitMessage* msg, AbstractRouter* r)
{
(void)msg;
(void)r;
llarp::LogError(info, " got unwarranted RXM");
return false;
}
bool
TransitHop::HandleGrantExitMessage(
const llarp::routing::GrantExitMessage* msg, AbstractRouter* r)
{
(void)msg;
(void)r;
llarp::LogError(info, " got unwarranted GXM");
return false;
}
bool
TransitHop::HandleTransferTrafficMessage(
const llarp::routing::TransferTrafficMessage* msg, AbstractRouter* r)
{
auto endpoint = r->exitContext().FindEndpointForPath(info.rxID);
2018-11-15 13:54:53 +00:00
if(endpoint)
2018-11-14 18:02:27 +00:00
{
2018-11-28 17:29:29 +00:00
bool sent = true;
for(const auto& pkt : msg->X)
2018-11-29 21:19:20 +00:00
{
// check short packet buffer
if(pkt.size() <= 8)
continue;
uint64_t counter = bufbe64toh(pkt.data());
sent &= endpoint->QueueOutboundTraffic(
2019-02-03 00:48:10 +00:00
ManagedBuffer(llarp_buffer_t(pkt.data() + 8, pkt.size() - 8)),
2019-02-02 23:12:42 +00:00
counter);
2018-11-29 21:19:20 +00:00
}
2018-11-28 17:29:29 +00:00
return sent;
2018-11-14 18:02:27 +00:00
}
2018-11-15 13:54:53 +00:00
else
llarp::LogError("No exit endpoint on ", info);
2018-11-14 18:02:27 +00:00
// discarded
2018-11-14 21:02:36 +00:00
llarp::routing::DataDiscardMessage discard(info.rxID, msg->S);
2018-11-14 18:02:27 +00:00
return SendRoutingMessage(&discard, r);
}
2018-06-26 16:23:43 +00:00
bool
TransitHop::HandlePathTransferMessage(
const llarp::routing::PathTransferMessage* msg, AbstractRouter* r)
2018-06-26 16:23:43 +00:00
{
auto path = r->pathContext().GetPathForTransfer(msg->P);
2018-11-14 18:02:27 +00:00
llarp::routing::DataDiscardMessage discarded(msg->P, msg->S);
2018-08-12 17:22:29 +00:00
if(!path)
{
2018-11-14 18:02:27 +00:00
return SendRoutingMessage(&discarded, r);
2018-08-12 17:22:29 +00:00
}
2019-02-02 23:12:42 +00:00
std::array< byte_t, service::MAX_PROTOCOL_MESSAGE_SIZE > tmp;
llarp_buffer_t buf(tmp);
2018-08-12 17:22:29 +00:00
if(!msg->T.BEncode(&buf))
{
2018-11-14 18:02:27 +00:00
llarp::LogWarn(info, " failed to transfer data message, encode failed");
return SendRoutingMessage(&discarded, r);
2018-08-12 17:22:29 +00:00
}
// rewind
2018-08-12 17:22:29 +00:00
buf.sz = buf.cur - buf.base;
buf.cur = buf.base;
// send
2018-11-14 18:02:27 +00:00
if(path->HandleDownstream(buf, msg->Y, r))
return true;
return SendRoutingMessage(&discarded, r);
2018-06-26 16:23:43 +00:00
}
} // namespace path
2018-06-22 05:44:19 +00:00
} // namespace llarp