Commit Graph

8178 Commits

Author SHA1 Message Date
Jason Rhinelander
e43833ad32 Update logging in daemon.cpp
Some of these were wrong (trying to use formats that didn't work); this
updates them all to new-style logging.
2024-01-31 07:54:12 -08:00
dr7ana
03976d8731 Squashed misc testnet fixes 2024-01-31 07:54:12 -08:00
Jason Rhinelander
686c7e0207 testnet: don't give oxend and error when testing is disabled 2024-01-31 07:54:12 -08:00
dr7ana
aeb0798a6f TELL ME WHEN IT WORKS 2024-01-31 07:54:12 -08:00
dr7ana
6a32148402 address parsing
- straightened out setting of public addr and public port in config vs listen ("bind") addr
- fixed small bug in router contact writing and saving
2024-01-31 07:54:12 -08:00
dr7ana
267a698da1 libquic vbump
- now pointing to jason/void-listen
2024-01-31 07:54:12 -08:00
dr7ana
66ad28a2f1 Local router mode
- Up and running locally, no connections yet
- Next: flip testnet and do the gosh dang thing
2024-01-31 07:54:12 -08:00
dr7ana
32e55b0f17 testnet prep
- redoing link_manager functions again to implement previously ignored review comments on several PRs
- conceptually merging "whitelist_routers" and new "known_{rids,rcs}", s.t. we can completely eliminate white/red/gray/green/etc lists in favor of something that isn't dumb
2024-01-31 07:54:12 -08:00
dr7ana
44696b1ba3 trust model edge case handling
- Once we have our set of returned rc's and accepted rid's (ones that were found locally), the remainder are placed in an "unconfirmed" state
- Once there, they have five subsequent successful fetches to be found in request response, at which point their verification counter is incremented and their attempt counter is reset
- If they appear three times, they are "promoted" and moved to our "known_{rid,rc}" list
2024-01-31 07:54:12 -08:00
dr7ana
ec887062e9 testnet prep
- disable reachability testing with config option; required to be done on testnet
- reachability testing pipeline through link_manager executes pings similar to storage server. connection established hook reports successful reachability, while connection closed callback (with non-default error code) reports unsuccessful testing
2024-01-31 07:54:12 -08:00
dr7ana
63a57d5ae4 trust model fetch fails
- bootstrap cooldown implemented with 1min timer in case all bootstraps fail
- set comparison implemented in non-initial and non-bootstrap rc fetching; set comparison in rid fetching is done every fetch
- nodedb get_random functions refactored into conditional/non-conditional methods. Conditional search implements reservoir sampling for one-pass accumulation of n random rcs
2024-01-31 07:54:12 -08:00
dr7ana
e02ddd61d0 trust model
- greedy evaluation of returned rid's, simplifying post-processing logic to simple frequency comparison per rid against a constant threshold
- tidied up link_manager request/response handling
- TODO:
  - review and decide thresholds
  - evaluate necessity and potential implementation of rc comparison
2024-01-31 07:54:12 -08:00
dr7ana
483b79aca7 pull yourself up by your bootstraps sonny
- initial/subsequent fetching combined for RouterContacts and RouterIDs
- bootstraps fallback implemented and looped into fetch logic
2024-01-31 07:54:12 -08:00
dr7ana
e1a5d935a6 move from vectors to unordered_sets
- When receiving a request to fetch RouterID's, the remote endpoint fulfilling the request stores them in an unordered set. When the request caller receives that payload, it is loaded into a vector in the same order. However, we should just load it directly into an unordered set to enforce both the order and that none appear twice
- The trust model will have to operate on multiple large lists of RouterID's and RC's efficiently, and maintaining a sort order ensures the values are workable immediately after deserialization
2024-01-31 07:54:12 -08:00
dr7ana
9bb85582a4 housekeeping pre-trust model 2024-01-31 07:54:12 -08:00
dr7ana
baabfabedc fetch RID result handler logic 2024-01-31 07:54:12 -08:00
dr7ana
d6b8b55727 less synchronous for the subsequent fetches 2024-01-31 07:54:12 -08:00
dr7ana
ab24f4bc1a RC/RID fetching logic implemented 2024-01-31 07:54:12 -08:00
dr7ana
07fc0246ed housekeeping and groundwork, initial commit 2024-01-31 07:54:12 -08:00
Thomas Winget
5ac4a9a61b rework rotate_rc_source function, just for 'normal operation' now 2024-01-31 07:54:12 -08:00
Thomas Winget
040fc86703 minor fixups 2024-01-31 07:54:12 -08:00
Thomas Winget
9329ad0bd9 FindRouterMessage is gone, also clang-format 2024-01-31 07:54:12 -08:00
Thomas Winget
af424cda9c (client) periodically fetch RouterIDs from peers 2024-01-31 07:54:12 -08:00
Thomas Winget
52cd9e1794 Minor RC load/store/prune fixups 2024-01-31 07:54:12 -08:00
Thomas Winget
a42d1c1d9f Implement fetch RouterIDs method and usage
Periodically clients will fetch the set of RouterIDs for all relays on
the network.  It will request this list from a number (12, currently) of
relays, but as we are likely to be requesting from more relays than we
want to have edge connections, this request will itself be relayed to
the target source via one of our edges.  As we can't trust our edge to
do this honestly, the responses are signed by the source relay.

TODO: the responses from all (12) relays are collected, then processed
together.  The reconciliation of their responses is not yet implemented.

TODO: the source selection for this method obviously requires sources to
begin with, but this is the method by which we learn of
those...bootstrapping is still a bit in-progress, and will need to be
finished for this.

TODO: make Router call this periodically, as with RC fetching.
2024-01-31 07:54:12 -08:00
Thomas Winget
e37ef7808d Add command to fetch RCs from remote node
This command will be called periodically by clients to maintain a list
of RCs of active relay nodes.  It will require another command (future
commit) to fetch the RouterIDs from many nodes and reconcile those so we
have some notion of good-ness of the RCs we're getting; if we get what
seems to be a bad set of RCs (this concept not yet implemented), we will
choose a different relay to fetch RCs from.  These are left as TODOs for
now.
2024-01-31 07:54:12 -08:00
Thomas Winget
74e7f14db9 minor style/naming changes 2024-01-31 07:54:12 -08:00
Thomas Winget
fb7c90dfdf remove explicit arg that mirrors default 2024-01-31 07:54:12 -08:00
Thomas Winget
6b728a0512 implement new rc gossip logic
Relays will now re-sign and gossip their RCs every 6 hours (minus a
couple random minutes) using the new gossip_rc message.

Removes the old RCGossiper concept
2024-01-31 07:54:12 -08:00
Thomas Winget
10984b2fa5 NodeDB RCs don't need insertion time
We will want some notion of "when did we receive it" for RCs (or
RouterIDs, details tbd), but that will be per-source as a means to form
some metric of consensus/trust on which relays are *actually* on the
network.  Clients don't have a blockchain daemon to pull this from, so
they have to ask many relays for the full list of relays and form a
trust model on that (bootstrapping problem notwithstanding).
2024-01-31 07:54:12 -08:00
Thomas Winget
e29e23bf81 implement and use "gossip_rc" command
TODO: refactor or remove RCGossiper and revisit RC regen and
when-to-gossip logic.
2024-01-31 07:54:12 -08:00
Thomas Winget
f6594a33bc Remove find/lookup router
We're removing the notion of find/lookup a singular RC, so this gets rid
of all functions which did that and replaces their usages with something
sensible.
2024-01-31 07:54:12 -08:00
Thomas Winget
611d277d28 remove rc_lookup_handler, relocating useful parts
RC "lookup" is being replaced with "gimme all recently updated RCs".  As
such, doing a lookup on a specific RC is going away, as is network
exploration, so a lot of what RCLookupHandler was doing will no longer
be relevant.  Functionality from it which was kept has moved to NodeDB,
as it makes sense for that functionality to live where the RCs live.
2024-01-31 07:54:12 -08:00
Thomas Winget
cd27121890 fix some copy/paste derping
also deserialize to unsigned string where possible/useful so to not have
unnecessary reinterpret_casts all over the place.
2024-01-31 07:54:12 -08:00
Thomas Winget
00f30f2c24 onion encrypt path build frames
path build frames should be onioned at each hop to avoid a bad actor
controlling two nodes in a path being able to know (with certainty,
temporal correlation is hard to avoid) that they're hops on the same
path.  This is desirable as in the worst case someone could be your edge
hop and terminal hop on a path, and now the terminal hop knows your IP
making the path basically pointless.
2024-01-31 07:54:12 -08:00
Thomas Winget
7fdecef9b3 messages::status -> messages 2024-01-31 07:54:12 -08:00
Thomas Winget
0000c6b392 remove some unused "path build"-related functions 2024-01-31 07:54:12 -08:00
Thomas Winget
f995b30348 preconstructed dicts for error/timeout/ok
also move messages' statuses into their own namespace
2024-01-31 07:54:12 -08:00
Jason Rhinelander
957280e628 Delete llarp::util::memFn
It's unnecessary abstraction that barely simplifies anything, and is now
only used in one single place anyway, which is easily replaced with a
(unabstracted) lambda.
2024-01-31 07:54:12 -08:00
Thomas Winget
04e9fd559c build fixes, clang-format, minor touch-ups 2024-01-31 07:54:12 -08:00
Thomas Winget
657214992b chahca nonce size is 24 bytes
Lots of code was using 32-byte nonces for xchacha20 symmetric
encryption, but this just means 8 extra bytes per packet wasted as
chacha is only using the first 24 bytes of that nonce anyway.

Changing this resulted in a lot of dead/dying code breaking, so this
commit also removes a lot of that (and comments a couple places with
TODO instead)

Also nounce -> nonce where it came up.
2024-01-31 07:54:12 -08:00
Thomas Winget
2bea5e7823 path control message response status changes
change path control message inner message response to take just a
string, which will be a bt-encoded response with an early key for
status.  If there is a timeout we pass a bt dict that only has that as
the status, else the response we de-onioned should have either an OK
status or some other error.

change messages to use new status key

correctly call Path::EnterState on path build response
2024-01-31 07:54:12 -08:00
Thomas Winget
62a88b3cea omit breaking RC stuff pending refactor
It seems RC refactor will obviate the need for a "get individual RC"
method, so this comments out some usage of that to sidestep build
errors, rather than correcting them in a way that will just be wasted.
2024-01-31 07:54:12 -08:00
Thomas Winget
bf2665bbe7 path control messages and onioning fleshed out
- control messages can be sent along a path
- the path owner onion-encrypts the "inner" message for each hop in the
  path
- relays on the path will onion the payload in both directions, such
  that the terminal relay will get the plaintext "inner" message and the
  client will get the plaintext "response" to that.
- control messages have (mostly, see below) been changed to be invokable
  either over a path or directly to a relay, as appropriate.

TODO:
  - exit messages need looked at, so they have not yet been changed for
    this
  - path transfer messages (traffic from client to client over 2 paths
    with a shared "pivot") are not yet implemented
2024-01-31 07:54:12 -08:00
Thomas Winget
3bc8c30b22 path build message handling mostly finished
there are a few TODOs which merit further discussion
2024-01-31 07:54:12 -08:00
dr7ana
d35073cc58 libquic bump 2024-01-31 07:54:12 -08:00
dr7ana
472fcc7d1a review fixes 2024-01-31 07:54:12 -08:00
dr7ana
5c6c6bcfee config addr change
- the one addr to rule them all, and its name was oxen::quic::Address
- no more vectors of inbound/outbound junk
2024-01-31 07:54:12 -08:00
dr7ana
c149651d64 A soothing re-nomenclatura 2024-01-31 07:54:12 -08:00
dr7ana
47bedfd8da Review fixes + misc fixes 2024-01-31 07:54:12 -08:00