lokinet/llarp/exit/session.cpp

358 lines
9.6 KiB
C++
Raw Normal View History

2018-12-12 01:06:46 +00:00
#include <exit/session.hpp>
2019-01-16 00:24:16 +00:00
#include <crypto/crypto.hpp>
#include <nodedb.hpp>
2019-01-11 01:19:36 +00:00
#include <path/path.hpp>
#include <router/abstractrouter.hpp>
2019-06-02 21:19:10 +00:00
#include <util/memfn.hpp>
namespace llarp
{
namespace exit
{
BaseSession::BaseSession(
const llarp::RouterID& router,
std::function< bool(const llarp_buffer_t&) > writepkt,
AbstractRouter* r, size_t numpaths, size_t hoplen, bool bundleRC)
: llarp::path::Builder(r, r->dht(), numpaths, hoplen)
2018-11-14 19:34:17 +00:00
, m_ExitRouter(router)
, m_WritePacket(writepkt)
2018-11-29 21:19:20 +00:00
, m_Counter(0)
2018-12-13 12:27:14 +00:00
, m_LastUse(0)
, m_BundleRC(bundleRC)
2018-11-14 19:34:17 +00:00
{
CryptoManager::instance()->identity_keygen(m_ExitIdentity);
2018-11-14 19:34:17 +00:00
}
BaseSession::~BaseSession()
{
}
2019-05-06 14:54:05 +00:00
void
BaseSession::HandlePathDied(path::Path_ptr p)
2019-03-30 13:02:10 +00:00
{
2019-05-06 14:54:05 +00:00
p->Rebuild();
2019-03-30 13:02:10 +00:00
}
2019-02-11 17:14:43 +00:00
util::StatusObject
BaseSession::ExtractStatus() const
2019-02-08 19:43:25 +00:00
{
2019-02-11 17:14:43 +00:00
auto obj = path::Builder::ExtractStatus();
obj.Put("lastExitUse", m_LastUse);
2019-02-08 19:43:25 +00:00
auto pub = m_ExitIdentity.toPublic();
2019-02-11 17:14:43 +00:00
obj.Put("exitIdentity", pub.ToString());
return obj;
2019-02-08 19:43:25 +00:00
}
bool
BaseSession::LoadIdentityFromFile(const char* fname)
{
return m_ExitIdentity.LoadFromFile(fname);
}
bool
BaseSession::ShouldBuildMore(llarp_time_t now) const
{
2018-11-25 16:58:27 +00:00
const size_t expect = (1 + (m_NumPaths / 2));
2018-12-27 12:00:28 +00:00
// check 30 seconds into the future and see if we need more paths
2019-04-23 18:29:42 +00:00
const llarp_time_t future = now + (30 * 1000) + buildIntervalLimit;
return NumPathsExistingAt(future) < expect && !BuildCooldownHit(now);
}
2019-05-10 16:19:33 +00:00
void
BaseSession::BlacklistSnode(const RouterID snode)
{
m_SnodeBlacklist.insert(std::move(snode));
}
2018-11-14 19:34:17 +00:00
bool
2019-05-08 14:01:31 +00:00
BaseSession::SelectHop(llarp_nodedb* db, const std::set< RouterID >& prev,
2018-11-14 19:34:17 +00:00
RouterContact& cur, size_t hop,
llarp::path::PathRole roles)
{
2019-05-08 14:01:31 +00:00
std::set< RouterID > exclude = prev;
2019-05-10 16:19:33 +00:00
for(const auto& snode : m_SnodeBlacklist)
{
if(snode != m_ExitRouter)
exclude.insert(snode);
}
2019-05-08 14:01:31 +00:00
exclude.insert(m_ExitRouter);
2018-11-14 19:34:17 +00:00
if(hop == numHops - 1)
2018-12-10 15:44:18 +00:00
{
2019-04-30 21:36:27 +00:00
if(db->Get(m_ExitRouter, cur))
return true;
2019-05-03 13:15:03 +00:00
router->LookupRouter(m_ExitRouter, nullptr);
2019-04-30 21:36:27 +00:00
return false;
2018-12-10 15:44:18 +00:00
}
2018-11-14 19:34:17 +00:00
else
2019-05-08 14:01:31 +00:00
return path::Builder::SelectHop(db, exclude, cur, hop, roles);
2018-11-14 19:34:17 +00:00
}
2019-04-16 19:39:58 +00:00
bool
BaseSession::CheckPathDead(path::Path_ptr, llarp_time_t dlt)
2019-04-16 19:39:58 +00:00
{
return dlt >= 10000;
}
2018-11-14 19:34:17 +00:00
void
BaseSession::HandlePathBuilt(llarp::path::Path_ptr p)
2018-11-14 19:34:17 +00:00
{
2018-12-10 15:31:58 +00:00
path::Builder::HandlePathBuilt(p);
2019-06-02 21:19:10 +00:00
p->SetDropHandler(util::memFn(&BaseSession::HandleTrafficDrop, this));
p->SetDeadChecker(util::memFn(&BaseSession::CheckPathDead, this));
p->SetExitTrafficHandler(util::memFn(&BaseSession::HandleTraffic, this));
p->AddObtainExitHandler(util::memFn(&BaseSession::HandleGotExit, this));
2018-12-20 12:41:17 +00:00
routing::ObtainExitMessage obtain;
2018-11-14 19:34:17 +00:00
obtain.S = p->NextSeqNo();
obtain.T = llarp::randint();
2018-11-29 13:12:35 +00:00
PopulateRequest(obtain);
if(!obtain.Sign(m_ExitIdentity))
2018-11-14 19:34:17 +00:00
{
llarp::LogError("Failed to sign exit request");
return;
}
if(p->SendExitRequest(obtain, router))
2018-11-14 19:34:17 +00:00
llarp::LogInfo("asking ", m_ExitRouter, " for exit");
else
2019-01-16 00:24:16 +00:00
llarp::LogError("failed to send exit request");
2018-11-14 19:34:17 +00:00
}
void
BaseSession::AddReadyHook(SessionReadyFunc func)
{
m_PendingCallbacks.emplace_back(func);
}
2018-11-14 19:34:17 +00:00
bool
BaseSession::HandleGotExit(llarp::path::Path_ptr p, llarp_time_t b)
2018-11-14 19:34:17 +00:00
{
2019-03-07 15:17:29 +00:00
m_LastUse = router->Now();
2018-11-14 19:34:17 +00:00
if(b == 0)
2019-04-30 21:36:27 +00:00
{
2018-11-14 19:34:17 +00:00
llarp::LogInfo("obtained an exit via ", p->Endpoint());
2019-03-07 15:17:29 +00:00
CallPendingCallbacks(true);
2019-04-30 21:36:27 +00:00
}
2019-03-07 15:17:29 +00:00
return true;
}
2018-12-13 12:27:14 +00:00
2019-03-07 15:17:29 +00:00
void
BaseSession::CallPendingCallbacks(bool success)
{
if(success)
{
2019-04-23 16:13:22 +00:00
auto self = shared_from_this();
2019-03-07 15:17:29 +00:00
for(auto& f : m_PendingCallbacks)
2019-04-23 16:13:22 +00:00
f(self);
2019-03-07 15:17:29 +00:00
}
else
{
for(auto& f : m_PendingCallbacks)
f(nullptr);
}
m_PendingCallbacks.clear();
2018-11-14 19:34:17 +00:00
}
2019-05-07 18:15:22 +00:00
void
BaseSession::ResetInternalState()
{
auto sendExitClose = [&](const llarp::path::Path_ptr p) {
const static auto roles =
llarp::path::ePathRoleExit | llarp::path::ePathRoleSVC;
if(p->SupportsAnyRoles(roles))
2019-05-07 18:15:22 +00:00
{
llarp::LogInfo(p->Name(), " closing exit path");
routing::CloseExitMessage msg;
if(msg.Sign(m_ExitIdentity) && p->SendExitClose(msg, router))
{
p->ClearRoles(roles);
}
else
2019-05-07 18:15:22 +00:00
llarp::LogWarn(p->Name(), " failed to send exit close message");
}
};
ForEachPath(sendExitClose);
path::Builder::ResetInternalState();
}
bool
BaseSession::Stop()
{
2019-03-07 15:17:29 +00:00
CallPendingCallbacks(false);
auto sendExitClose = [&](const path::Path_ptr p) {
if(p->SupportsAnyRoles(path::ePathRoleExit))
{
LogInfo(p->Name(), " closing exit path");
routing::CloseExitMessage msg;
if(!(msg.Sign(m_ExitIdentity) && p->SendExitClose(msg, router)))
LogWarn(p->Name(), " failed to send exit close message");
}
};
ForEachPath(sendExitClose);
2019-04-23 16:13:22 +00:00
router->pathContext().RemovePathSet(shared_from_this());
return path::Builder::Stop();
}
2018-11-14 19:34:17 +00:00
bool
BaseSession::HandleTraffic(llarp::path::Path_ptr, const llarp_buffer_t& buf,
2018-12-20 12:41:17 +00:00
uint64_t counter)
2018-11-14 19:34:17 +00:00
{
if(m_WritePacket)
2018-12-13 12:27:14 +00:00
{
2019-06-11 16:44:05 +00:00
llarp::net::IPPacket pkt;
2018-12-20 12:41:17 +00:00
if(!pkt.Load(buf))
2018-12-13 12:27:14 +00:00
return false;
2018-12-20 12:41:17 +00:00
m_Downstream.emplace(counter, pkt);
2018-12-13 12:27:14 +00:00
m_LastUse = router->Now();
return true;
}
2018-11-14 19:34:17 +00:00
return false;
}
bool
2019-05-31 10:57:41 +00:00
BaseSession::HandleTrafficDrop(llarp::path::Path_ptr p,
const PathID_t& path, uint64_t s)
2018-11-14 19:34:17 +00:00
{
llarp::LogError("dropped traffic on exit ", m_ExitRouter, " S=", s,
" P=", path);
2019-05-31 10:59:47 +00:00
p->EnterState(path::ePathIgnore, router->Now());
2018-11-14 19:34:17 +00:00
return true;
}
bool
2019-06-11 16:44:05 +00:00
BaseSession::QueueUpstreamTraffic(llarp::net::IPPacket pkt, const size_t N)
2018-11-28 16:38:20 +00:00
{
2019-02-02 23:12:42 +00:00
const llarp_buffer_t& buf = pkt.Buffer();
auto& queue = m_Upstream[buf.sz / N];
2018-11-29 13:12:35 +00:00
// queue overflow
if(queue.size() >= MaxUpstreamQueueLength)
2018-11-29 13:12:35 +00:00
return false;
if(queue.size() == 0)
{
queue.emplace_back();
2018-11-29 21:19:20 +00:00
return queue.back().PutBuffer(buf, m_Counter++);
}
auto& back = queue.back();
2018-11-28 16:38:20 +00:00
// pack to nearest N
if(back.Size() + buf.sz > N)
{
queue.emplace_back();
return queue.back().PutBuffer(buf, m_Counter++);
2018-11-28 16:38:20 +00:00
}
else
2018-11-29 21:19:20 +00:00
return back.PutBuffer(buf, m_Counter++);
2018-11-28 16:38:20 +00:00
}
2018-11-29 13:12:35 +00:00
bool
BaseSession::IsReady() const
2018-11-29 13:12:35 +00:00
{
2019-03-07 15:17:29 +00:00
const size_t expect = (1 + (m_NumPaths / 2));
return AvailablePaths(llarp::path::ePathRoleExit) >= expect;
2018-11-29 13:12:35 +00:00
}
2018-12-13 12:27:14 +00:00
bool
BaseSession::IsExpired(llarp_time_t now) const
{
return m_LastUse && now > m_LastUse && now - m_LastUse > LifeSpan;
}
2019-05-07 15:08:57 +00:00
bool
BaseSession::UrgentBuild(llarp_time_t now) const
{
if(!IsReady())
return NumInStatus(path::ePathBuilding) < m_NumPaths;
return path::Builder::UrgentBuild(now);
}
bool
2019-04-30 13:56:39 +00:00
BaseSession::FlushUpstream()
2018-11-14 19:34:17 +00:00
{
2018-12-13 12:27:14 +00:00
auto now = router->Now();
2018-11-14 19:34:17 +00:00
auto path = PickRandomEstablishedPath(llarp::path::ePathRoleExit);
2018-12-27 12:00:28 +00:00
if(path)
2018-11-28 16:38:20 +00:00
{
for(auto& item : m_Upstream)
{
2019-01-19 01:04:47 +00:00
auto& queue = item.second; // XXX: uninitialised memory here!
2018-12-27 12:00:28 +00:00
while(queue.size())
{
auto& msg = queue.front();
if(path)
{
2019-05-22 16:20:50 +00:00
msg.S = path->NextSeqNo();
if(path->SendRoutingMessage(msg, router))
m_LastUse = now;
}
2018-12-27 12:00:28 +00:00
queue.pop_front();
2019-05-06 17:32:53 +00:00
// spread across all paths
path = PickRandomEstablishedPath(llarp::path::ePathRoleExit);
2018-12-27 12:00:28 +00:00
}
}
2018-11-28 16:38:20 +00:00
}
2018-12-27 12:00:28 +00:00
else
{
if(m_Upstream.size())
llarp::LogWarn("no path for exit session");
// discard upstream
for(auto& item : m_Upstream)
item.second.clear();
m_Upstream.clear();
2019-05-03 13:15:03 +00:00
if(numHops == 1)
{
auto r = router;
2019-05-03 17:42:48 +00:00
RouterContact rc;
if(r->nodedb()->Get(m_ExitRouter, rc))
r->TryConnectAsync(rc, 5);
else
r->LookupRouter(m_ExitRouter,
[r](const std::vector< RouterContact >& results) {
if(results.size())
r->TryConnectAsync(results[0], 5);
});
2019-05-03 13:15:03 +00:00
}
2019-05-07 17:27:32 +00:00
else if(UrgentBuild(now))
BuildOneAlignedTo(m_ExitRouter);
2018-12-27 12:00:28 +00:00
}
2019-04-30 13:56:39 +00:00
return true;
}
void
BaseSession::FlushDownstream()
{
2018-12-20 12:41:17 +00:00
while(m_Downstream.size())
{
if(m_WritePacket)
m_WritePacket(m_Downstream.top().second.ConstBuffer());
m_Downstream.pop();
}
2018-11-14 19:34:17 +00:00
}
SNodeSession::SNodeSession(
const llarp::RouterID& snodeRouter,
std::function< bool(const llarp_buffer_t&) > writepkt,
AbstractRouter* r, size_t numpaths, size_t hoplen,
bool useRouterSNodeKey, bool bundleRC)
: BaseSession(snodeRouter, writepkt, r, numpaths, hoplen, bundleRC)
{
if(useRouterSNodeKey)
{
m_ExitIdentity = r->identity();
}
}
2019-03-22 14:10:30 +00:00
std::string
SNodeSession::Name() const
{
return "SNode::" + m_ExitRouter.ToString();
}
std::string
ExitSession::Name() const
{
return "Exit::" + m_ExitRouter.ToString();
}
2018-11-14 19:34:17 +00:00
} // namespace exit
2018-12-10 15:31:58 +00:00
} // namespace llarp