Commit Graph

386 Commits

Author SHA1 Message Date
dr7ana
7544436f6a who cares 2023-12-11 13:48:11 -08:00
Jason Rhinelander
cece742cf3
Bump libquic for message move/copy fixes 2023-12-11 17:20:49 -04:00
dr7ana
daa3a6fd94 shoot 2023-12-11 11:29:33 -08:00
Jason Rhinelander
4c1f6112a7
REVERT ME: debug incoming dict data 2023-12-11 14:46:29 -04:00
dr7ana
f725c07f2d dont bomb with bootstrap reqs 2023-12-11 10:36:46 -08:00
dr7ana
e0c1069790 kiiiiiick 2023-12-11 10:10:04 -08:00
dr7ana
efe5fd3b5b try queueing 2023-12-11 09:17:29 -08:00
dr7ana
0bf3a3323a kick 2023-12-11 09:04:53 -08:00
dr7ana
238cc3d0da kick 2023-12-11 08:16:13 -08:00
dr7ana
5f430a392b kick 2023-12-11 07:46:11 -08:00
dr7ana
63644d3d84 Bootstrap seed
- nodes now send their RC to the bootstrap seed on making a request
- allows the bootstrap seed to distribute RCs
2023-12-11 07:32:52 -08:00
dr7ana
f2feea74ee Crit logging
- TODO: discuss authentication for nodes connecting to bootstrap seed
- crit log num connected/RC's, conn open/closed, etc
2023-12-11 03:45:23 -08:00
Jason Rhinelander
412ce44139 Update libquic 2023-12-11 03:13:39 -08:00
Jason Rhinelander
daeff3ee7e Remove duplicate connection closing method
`deregister_peer` does the exact same thing as `close_connection` so
just remove it.

Also removes an unnecessary loop dispatch call (because we *have* to be
in the logic thread already to be able to touch the variables we are
touching before the dispatch).
2023-12-11 03:13:39 -08:00
dr7ana
9084d39e5a Squashed misc testnet fixes 2023-12-11 03:13:16 -08:00
dr7ana
8af38d3d44 TELL ME WHEN IT WORKS 2023-12-07 16:48:40 -08:00
dr7ana
d00257b9f0 address parsing
- straightened out setting of public addr and public port in config vs listen ("bind") addr
- fixed small bug in router contact writing and saving
2023-12-07 16:15:20 -08:00
dr7ana
cef2ff7782 Local router mode
- Up and running locally, no connections yet
- Next: flip testnet and do the gosh dang thing
2023-12-07 09:27:58 -08:00
dr7ana
ed6bd28a35 testnet prep
- redoing link_manager functions again to implement previously ignored review comments on several PRs
- conceptually merging "whitelist_routers" and new "known_{rids,rcs}", s.t. we can completely eliminate white/red/gray/green/etc lists in favor of something that isn't dumb
2023-12-06 12:02:31 -08:00
dr7ana
62c37825b0 testnet prep
- disable reachability testing with config option; required to be done on testnet
- reachability testing pipeline through link_manager executes pings similar to storage server. connection established hook reports successful reachability, while connection closed callback (with non-default error code) reports unsuccessful testing
2023-12-04 11:18:18 -08:00
dr7ana
70e9c1ae25 trust model fetch fails
- bootstrap cooldown implemented with 1min timer in case all bootstraps fail
- set comparison implemented in non-initial and non-bootstrap rc fetching; set comparison in rid fetching is done every fetch
- nodedb get_random functions refactored into conditional/non-conditional methods. Conditional search implements reservoir sampling for one-pass accumulation of n random rcs
2023-12-04 07:59:13 -08:00
dr7ana
3508dee8d8 trust model
- greedy evaluation of returned rid's, simplifying post-processing logic to simple frequency comparison per rid against a constant threshold
- tidied up link_manager request/response handling
- TODO:
  - review and decide thresholds
  - evaluate necessity and potential implementation of rc comparison
2023-12-01 12:54:52 -08:00
dr7ana
91121ea22b pull yourself up by your bootstraps sonny
- initial/subsequent fetching combined for RouterContacts and RouterIDs
- bootstraps fallback implemented and looped into fetch logic
2023-11-30 15:16:33 -08:00
dr7ana
ba3fffb765 housekeeping pre-trust model 2023-11-29 06:03:54 -08:00
dr7ana
b6cc86e25b fetch RID result handler logic 2023-11-28 12:51:30 -08:00
dr7ana
3fc7980691 less synchronous for the subsequent fetches 2023-11-28 12:51:30 -08:00
dr7ana
6559617816 RC/RID fetching logic implemented 2023-11-28 12:51:30 -08:00
dr7ana
5fa3c2be87 housekeeping and groundwork, initial commit 2023-11-28 12:51:30 -08:00
Thomas Winget
70d2052cd4 minor fixups 2023-11-27 21:49:02 -05:00
Thomas Winget
dab1e06892 FindRouterMessage is gone, also clang-format 2023-11-27 14:40:18 -05:00
Thomas Winget
c30a4dd44a Implement fetch RouterIDs method and usage
Periodically clients will fetch the set of RouterIDs for all relays on
the network.  It will request this list from a number (12, currently) of
relays, but as we are likely to be requesting from more relays than we
want to have edge connections, this request will itself be relayed to
the target source via one of our edges.  As we can't trust our edge to
do this honestly, the responses are signed by the source relay.

TODO: the responses from all (12) relays are collected, then processed
together.  The reconciliation of their responses is not yet implemented.

TODO: the source selection for this method obviously requires sources to
begin with, but this is the method by which we learn of
those...bootstrapping is still a bit in-progress, and will need to be
finished for this.

TODO: make Router call this periodically, as with RC fetching.
2023-11-27 14:40:18 -05:00
Thomas Winget
6952e8f705 Add command to fetch RCs from remote node
This command will be called periodically by clients to maintain a list
of RCs of active relay nodes.  It will require another command (future
commit) to fetch the RouterIDs from many nodes and reconcile those so we
have some notion of good-ness of the RCs we're getting; if we get what
seems to be a bad set of RCs (this concept not yet implemented), we will
choose a different relay to fetch RCs from.  These are left as TODOs for
now.
2023-11-27 14:40:09 -05:00
Thomas Winget
76d45ec802 remove explicit arg that mirrors default 2023-11-27 13:08:04 -05:00
Thomas Winget
2425652696 NodeDB RCs don't need insertion time
We will want some notion of "when did we receive it" for RCs (or
RouterIDs, details tbd), but that will be per-source as a means to form
some metric of consensus/trust on which relays are *actually* on the
network.  Clients don't have a blockchain daemon to pull this from, so
they have to ask many relays for the full list of relays and form a
trust model on that (bootstrapping problem notwithstanding).
2023-11-27 12:59:35 -05:00
Thomas Winget
29ec72f0da implement and use "gossip_rc" command
TODO: refactor or remove RCGossiper and revisit RC regen and
when-to-gossip logic.
2023-11-27 12:59:35 -05:00
Thomas Winget
27aea62994 Remove find/lookup router
We're removing the notion of find/lookup a singular RC, so this gets rid
of all functions which did that and replaces their usages with something
sensible.
2023-11-27 12:59:33 -05:00
Thomas Winget
ad9d0b19c1 remove rc_lookup_handler, relocating useful parts
RC "lookup" is being replaced with "gimme all recently updated RCs".  As
such, doing a lookup on a specific RC is going away, as is network
exploration, so a lot of what RCLookupHandler was doing will no longer
be relevant.  Functionality from it which was kept has moved to NodeDB,
as it makes sense for that functionality to live where the RCs live.
2023-11-27 12:54:43 -05:00
dr7ana
28047ae72f
Merge pull request #2223 from tewinget/path-build-correctly
onion encrypt path build frames
2023-11-27 09:26:46 -08:00
dr7ana
e58e8473f8
Merge pull request #2216 from tewinget/path-messages
Path build and onioned messages
2023-11-27 09:23:16 -08:00
Thomas Winget
feaf0b9193 fix some copy/paste derping
also deserialize to unsigned string where possible/useful so to not have
unnecessary reinterpret_casts all over the place.
2023-11-27 12:20:03 -05:00
Thomas Winget
2e5c856cf3 onion encrypt path build frames
path build frames should be onioned at each hop to avoid a bad actor
controlling two nodes in a path being able to know (with certainty,
temporal correlation is hard to avoid) that they're hops on the same
path.  This is desirable as in the worst case someone could be your edge
hop and terminal hop on a path, and now the terminal hop knows your IP
making the path basically pointless.
2023-11-27 12:19:59 -05:00
Thomas Winget
d7e2e52ee4 messages::status -> messages 2023-11-27 12:15:36 -05:00
dr7ana
826ef2bbe6 libquic bump 2023-11-17 09:03:43 -08:00
Thomas Winget
e6eeda0f15 remove some unused "path build"-related functions 2023-11-16 15:42:02 -05:00
Thomas Winget
bd4f239aa3 preconstructed dicts for error/timeout/ok
also move messages' statuses into their own namespace
2023-11-16 15:35:58 -05:00
Thomas Winget
32395caec1 build fixes, clang-format, minor touch-ups 2023-11-08 15:13:44 -05:00
Thomas Winget
9e9c1ea732 chahca nonce size is 24 bytes
Lots of code was using 32-byte nonces for xchacha20 symmetric
encryption, but this just means 8 extra bytes per packet wasted as
chacha is only using the first 24 bytes of that nonce anyway.

Changing this resulted in a lot of dead/dying code breaking, so this
commit also removes a lot of that (and comments a couple places with
TODO instead)

Also nounce -> nonce where it came up.
2023-11-08 15:13:44 -05:00
Thomas Winget
abb2f63ec6 path control message response status changes
change path control message inner message response to take just a
string, which will be a bt-encoded response with an early key for
status.  If there is a timeout we pass a bt dict that only has that as
the status, else the response we de-onioned should have either an OK
status or some other error.

change messages to use new status key

correctly call Path::EnterState on path build response
2023-11-08 15:12:38 -05:00
Thomas Winget
b0fb194e2c path control messages and onioning fleshed out
- control messages can be sent along a path
- the path owner onion-encrypts the "inner" message for each hop in the
  path
- relays on the path will onion the payload in both directions, such
  that the terminal relay will get the plaintext "inner" message and the
  client will get the plaintext "response" to that.
- control messages have (mostly, see below) been changed to be invokable
  either over a path or directly to a relay, as appropriate.

TODO:
  - exit messages need looked at, so they have not yet been changed for
    this
  - path transfer messages (traffic from client to client over 2 paths
    with a shared "pivot") are not yet implemented
2023-11-06 12:31:24 -05:00
Thomas Winget
c25ced50a3 path build message handling mostly finished
there are a few TODOs which merit further discussion
2023-11-06 12:24:03 -05:00