#ifndef LLARP_ROUTER_HPP #define LLARP_ROUTER_HPP #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include namespace llarp { struct Config; struct Crypto; } // namespace llarp bool llarp_findOrCreateEncryption(llarp::Crypto *crypto, const fs::path &fpath, llarp::SecretKey &encryption); bool llarp_findOrCreateIdentity(llarp::Crypto *crypto, const fs::path &path, llarp::SecretKey &secretkey); bool llarp_loadServiceNodeIdentityKey(llarp::Crypto *crypto, const fs::path &fpath, llarp::SecretKey &secretkey); struct TryConnectJob; namespace llarp { template < typename T > struct CompareLinks { bool operator()(const std::unique_ptr< T > &left, const std::unique_ptr< T > &right) const { const std::string leftName = left->Name(); const std::string rightName = right->Name(); return left->Rank() < right->Rank() || leftName < rightName; } }; struct Router final : public AbstractRouter { bool ready; // transient iwp encryption key fs::path transport_keyfile = "transport.key"; // nodes to connect to on startup // DEPRECATED // std::map< std::string, fs::path > connect; // long term identity key fs::path ident_keyfile = "identity.key"; fs::path encryption_keyfile = "encryption.key"; // path to write our self signed rc to fs::path our_rc_file = "rc.signed"; // use file based logging? bool m_UseFileLogging = false; // our router contact RouterContact _rc; /// are we using the lokid service node seed ? bool usingSNSeed = false; /// should we obey the service node whitelist? bool whitelistRouters = false; Logic * logic() const override { return _logic; } llarp_dht_context * dht() const override { return _dht; } util::StatusObject ExtractStatus() const override; Crypto * crypto() const override { return _crypto.get(); } llarp_nodedb * nodedb() const override { return _nodedb; } const path::PathContext & pathContext() const override { return paths; } path::PathContext & pathContext() override { return paths; } const RouterContact & rc() const override { return _rc; } void SetRouterWhitelist(const std::vector< RouterID > &routers) override; exit::Context & exitContext() override { return _exitContext; } const SecretKey & identity() const override { return _identity; } const SecretKey & encryption() const override { return _encryption; } Profiling & routerProfiling() override { return _routerProfiling; } llarp_ev_loop_ptr netloop() const override { return _netloop; } llarp_threadpool * threadpool() override { return tp; } llarp_threadpool * diskworker() override { return disk; } // our ipv4 public setting bool publicOverride = false; struct sockaddr_in ip4addr; AddressInfo addrInfo; llarp_ev_loop_ptr _netloop; llarp_threadpool *tp; Logic *_logic; std::unique_ptr< Crypto > _crypto; path::PathContext paths; exit::Context _exitContext; SecretKey _identity; SecretKey _encryption; llarp_threadpool *disk; llarp_dht_context *_dht = nullptr; llarp_nodedb *_nodedb; bool Sign(Signature &sig, const llarp_buffer_t &buf) const override; // buffer for serializing link messages std::array< byte_t, MAX_LINK_MSG_SIZE > linkmsg_buffer; uint16_t m_OutboundPort = 0; /// always maintain this many connections to other routers size_t minConnectedRouters = 2; /// hard upperbound limit on the number of router to router connections size_t maxConnectedRouters = 2000; size_t minRequiredRouters = 4; /// how often do we resign our RC? milliseconds. // TODO: make configurable llarp_time_t rcRegenInterval = 60 * 60 * 1000; // should we be sending padded messages every interval? bool sendPadding = false; uint32_t ticker_job_id = 0; InboundMessageParser inbound_link_msg_parser; routing::InboundMessageParser inbound_routing_msg_parser; service::Context _hiddenServiceContext; service::Context & hiddenServiceContext() override { return _hiddenServiceContext; } const service::Context & hiddenServiceContext() const override { return _hiddenServiceContext; } using NetConfig_t = std::unordered_multimap< std::string, std::string >; /// default network config for default network interface NetConfig_t netConfig; /// identity keys whitelist of routers we will connect to directly (not for /// service nodes) std::set< RouterID > strictConnectPubkeys; /// bootstrap RCs std::list< RouterContact > bootstrapRCList; bool ExitEnabled() const { // TODO: use equal_range ? auto itr = netConfig.find("exit"); if(itr == netConfig.end()) return false; return IsTrueValue(itr->second.c_str()); } bool CreateDefaultHiddenService(); bool ShouldCreateDefaultHiddenService(); const std::string DefaultRPCBindAddr = "127.0.0.1:1190"; bool enableRPCServer = true; std::unique_ptr< rpc::Server > rpcServer; std::string rpcBindAddr = DefaultRPCBindAddr; /// lokid caller const std::string DefaultLokidRPCAddr = "127.0.0.1:22023"; std::unique_ptr< rpc::Caller > rpcCaller; std::string lokidRPCAddr = DefaultLokidRPCAddr; std::string lokidRPCUser = ""; std::string lokidRPCPassword = ""; std::set< std::unique_ptr< ILinkLayer >, CompareLinks< ILinkLayer > > outboundLinks; std::set< std::unique_ptr< ILinkLayer >, CompareLinks< ILinkLayer > > inboundLinks; Profiling _routerProfiling; std::string routerProfilesFile = "profiles.dat"; using MessageQueue = std::queue< std::vector< byte_t > >; /// outbound message queue std::unordered_map< RouterID, MessageQueue, RouterID::Hash > outboundMessageQueue; /// loki verified routers std::unordered_map< RouterID, RouterContact, RouterID::Hash > validRouters; // pending establishing session with routers std::unordered_map< RouterID, std::unique_ptr< TryConnectJob >, RouterID::Hash > pendingEstablishJobs; // pending RCs to be verified by pubkey std::unordered_map< RouterID, llarp_async_verify_rc, RouterID::Hash > pendingVerifyRC; // sessions to persist -> timestamp to end persist at std::unordered_map< RouterID, llarp_time_t, RouterID::Hash > m_PersistingSessions; // RCs of connected clients std::set< RouterID > m_Clients; // lokinet routers from lokid, maps pubkey to when we think it will expire, // set to max value right now std::unordered_map< RouterID, llarp_time_t, PubKey::Hash > lokinetRouters; Router(struct llarp_threadpool *tp, llarp_ev_loop_ptr __netloop, Logic *logic); ~Router(); bool OnSessionEstablished(ILinkSession *) override; bool HandleRecvLinkMessageBuffer(ILinkSession *from, const llarp_buffer_t &msg) override; void AddInboundLink(std::unique_ptr< ILinkLayer > &link); bool InitOutboundLinks(); bool GetRandomGoodRouter(RouterID &r) override; /// initialize us as a service node /// return true on success bool InitServiceNode(); /// return true if we are running in service node mode bool IsServiceNode() const; void Close(); bool LoadHiddenServiceConfig(const char *fname); bool AddHiddenService(const service::Config::section_t &config); bool Configure(Config *conf) override; bool Ready(); bool Run(struct llarp_nodedb *nodedb) override; /// stop running the router logic gracefully void Stop() override; /// close all sessions and shutdown all links void StopLinks(); void PersistSessionUntil(const RouterID &remote, llarp_time_t until) override; bool EnsureIdentity(); bool EnsureEncryptionKey(); bool ConnectionToRouterAllowed(const RouterID &router) const override; bool SaveRC(); const byte_t * pubkey() const override { return seckey_topublic(_identity); } void OnConnectTimeout(ILinkSession *session) override; bool HasPendingConnectJob(const RouterID &remote); void try_connect(fs::path rcfile); /// inject configuration and reconfigure router bool Reconfigure(Config *conf) override; /// validate new configuration against old one /// return true on 100% valid /// return false if not 100% valid bool ValidateConfig(Config *conf) const override; /// send to remote router or queue for sending /// returns false on overflow /// returns true on successful queue /// NOT threadsafe /// MUST be called in the logic thread bool SendToOrQueue(const RouterID &remote, const ILinkMessage *msg) override; /// sendto or drop void SendTo(RouterID remote, const ILinkMessage *msg, ILinkLayer *chosen); /// manually flush outbound message queue for just 1 router void FlushOutboundFor(RouterID remote, ILinkLayer *chosen = nullptr); void LookupRouter(RouterID remote) override; /// manually discard all pending messages to remote router void DiscardOutboundFor(const RouterID &remote); /// try establishing a session to a remote router void TryEstablishTo(const RouterID &remote); /// lookup a router by pubkey when it expires when we are a service node void ServiceNodeLookupRouterWhenExpired(RouterID remote); void HandleDHTLookupForExplore( RouterID remote, const std::vector< RouterContact > &results) override; void ForEachPeer(std::function< void(const ILinkSession *, bool) > visit, bool randomize = false) const override; void ForEachPeer(std::function< void(ILinkSession *) > visit); bool IsBootstrapNode(RouterID) const override; /// check if newRc matches oldRC and update local rc for this remote contact /// if valid /// returns true on valid and updated /// returns false otherwise bool CheckRenegotiateValid(RouterContact newRc, RouterContact oldRC) override; /// flush outbound message queue void FlushOutbound(); /// called by link when a remote session has no more sessions open void SessionClosed(RouterID remote) override; /// call internal router ticker void Tick(); /// get time from event loop llarp_time_t Now() const override { return llarp_ev_loop_time_now_ms(_netloop); } /// schedule ticker to call i ms from now void ScheduleTicker(uint64_t i = 1000); ILinkLayer * GetLinkWithSessionByPubkey(const RouterID &remote); /// parse a routing message in a buffer and handle it with a handler if /// successful parsing return true on parse and handle success otherwise /// return false bool ParseRoutingMessageBuffer(const llarp_buffer_t &buf, routing::IMessageHandler *h, const PathID_t &rxid) override; void ConnectToRandomRouters(int N) override; size_t NumberOfConnectedRouters() const override; bool TryConnectAsync(RouterContact rc, uint16_t tries); bool GetRandomConnectedRouter(RouterContact &result) const override; bool async_verify_RC(const RouterContact &rc); void HandleDHTLookupForSendTo(RouterID remote, const std::vector< RouterContact > &results); bool HasSessionTo(const RouterID &remote) const; void HandleDHTLookupForTryEstablishTo( RouterID remote, const std::vector< RouterContact > &results); static void on_verify_client_rc(llarp_async_verify_rc *context); static void on_verify_server_rc(llarp_async_verify_rc *context); static void handle_router_ticker(void *user, uint64_t orig, uint64_t left); static void HandleAsyncLoadRCForSendTo(llarp_async_load_rc *async); private: std::atomic< bool > _stopping; std::atomic< bool > _running; bool UpdateOurRC(bool rotateKeys = false); template < typename Config > void mergeHiddenServiceConfig(const Config &in, Config &out) { for(const auto &item : netConfig) out.push_back({item.first, item.second}); for(const auto &item : in) out.push_back({item.first, item.second}); } void router_iter_config(const char *section, const char *key, const char *val); }; } // namespace llarp #endif