#include #include #include #include #include "link/encoder.hpp" #include #include #include #include #include #include #include #include #include #include #include "buffer.hpp" #include "crypto.hpp" #include "fs.hpp" #include "logger.hpp" #include "mem.hpp" #include "net.hpp" #include "router.hpp" #include "str.hpp" namespace iwp { // session activity timeout is 10s constexpr llarp_time_t SESSION_TIMEOUT = 10000; constexpr size_t MAX_PAD = 256; enum msgtype { eALIV = 0x00, eXMIT = 0x01, eACKS = 0x02, eFRAG = 0x03 }; typedef std::vector< byte_t > sendbuf_t; enum header_flag { eSessionInvalidated = (1 << 0), eHighPacketDrop = (1 << 1), eHighMTUDetected = (1 << 2), eProtoUpgrade = (1 << 3) }; /** plaintext frame header */ struct frame_header { byte_t *ptr; frame_header(byte_t *buf) : ptr(buf) { } byte_t * data() { return ptr + 6; } uint8_t & version() { return ptr[0]; } uint8_t & msgtype() { return ptr[1]; } uint16_t size() const { uint16_t sz; memcpy(&sz, ptr + 2, 2); return sz; } void setsize(uint16_t sz) { memcpy(ptr + 2, &sz, 2); } uint8_t flags() const { return ptr[5]; } void setflag(header_flag f) { ptr[5] |= f; } }; byte_t * init_sendbuf(sendbuf_t &buf, msgtype t, uint16_t sz, uint8_t flags) { buf.resize(6 + sz); frame_header hdr(buf.data()); hdr.version() = 0; hdr.msgtype() = t; hdr.setsize(sz); buf[4] = 0; buf[5] = flags; return hdr.data(); } /** xmit header */ struct xmit { byte_t buffer[48]; xmit() { } xmit(byte_t *ptr) { memcpy(buffer, ptr, sizeof(buffer)); } xmit(const xmit &other) { memcpy(buffer, other.buffer, sizeof(buffer)); } void set_info(const byte_t *hash, uint64_t id, uint16_t fragsz, uint16_t lastsz, uint8_t numfrags, uint8_t flags = 0x01) { // big endian assumed // TODO: implement little endian memcpy(buffer, hash, 32); memcpy(buffer + 32, &id, 8); memcpy(buffer + 40, &fragsz, 2); memcpy(buffer + 42, &lastsz, 2); buffer[44] = 0; buffer[45] = 0; buffer[46] = numfrags; buffer[47] = flags; } uint64_t msgid() const { // big endian assumed // TODO: implement little endian const byte_t *start = buffer + 32; const uint64_t *msgid = (const uint64_t *)start; return *msgid; } // size of each full fragment uint16_t fragsize() const { // big endian assumed // TODO: implement little endian const byte_t *start = buffer + 40; const uint16_t *fragsz = (uint16_t *)start; return *fragsz; } // number of full fragments uint8_t numfrags() const { return buffer[46]; } // size of the entire message size_t totalsize() const { return (fragsize() * numfrags()) + lastfrag(); } // size of the last fragment uint16_t lastfrag() const { // big endian assumed // TODO: implement little endian const byte_t *start = buffer + 42; const uint16_t *lastsz = (uint16_t *)start; return *lastsz; } uint8_t flags() { return buffer[47]; } }; typedef std::vector< uint8_t > fragment_t; // forward declare struct session; struct transit_message { session *parent = nullptr; xmit msginfo; std::bitset< 16 > status; std::map< uint8_t, fragment_t > frags; fragment_t lastfrag; transit_message() { } ~transit_message() { frags.clear(); } // inbound transit_message(const xmit &x) : msginfo(x) { } // outbound transit_message(session *s) : parent(s) { } void ack(uint32_t bitmask) { uint8_t idx = 0; while(idx < 16) { if(bitmask & (1 << idx)) { status.set(idx); } ++idx; } } bool completed() const { for(const auto &item : frags) { if(!status.test(item.first)) return false; } return true; } template < typename T > void generate_xmit(T &queue) { queue.emplace(); auto &xmitbuf = queue.back(); auto body_ptr = init_sendbuf(xmitbuf, eXMIT, sizeof(msginfo.buffer) + lastfrag.size(), 0); memcpy(body_ptr, msginfo.buffer, sizeof(msginfo.buffer)); body_ptr += sizeof(msginfo.buffer); memcpy(body_ptr, lastfrag.data(), lastfrag.size()); } template < typename T > void retransmit_frags(T &queue) { auto msgid = msginfo.msgid(); auto fragsize = msginfo.fragsize(); for(auto &frag : frags) { if(status.test(frag.first)) continue; queue.emplace(); auto &fragbuf = queue.back(); auto body_ptr = init_sendbuf(fragbuf, eFRAG, 9 + fragsize, 0); memcpy(body_ptr, &msgid, 8); body_ptr[8] = frag.first; memcpy(body_ptr + 9, frag.second.data(), fragsize); } } bool reassemble(std::vector< byte_t > &buffer) { auto total = msginfo.totalsize(); buffer.resize(total); auto fragsz = msginfo.fragsize(); auto ptr = buffer.data(); for(const auto &frag : frags) { memcpy(ptr, frag.second.data(), fragsz); ptr += fragsz; } memcpy(ptr, lastfrag.data(), lastfrag.size()); return true; } void put_message(llarp_buffer_t &buf, const byte_t *hash, uint64_t id, uint16_t mtu = 1024) { status.reset(); uint8_t fragid = 0; uint16_t fragsize = mtu; while((buf.cur - buf.base) > fragsize) { fragment_t frag(fragsize); memcpy(frag.data(), buf.cur, fragsize); buf.cur += fragsize; frags[fragid++] = frag; } uint16_t lastfrag = buf.sz - (buf.cur - buf.base); // set info for xmit msginfo.set_info(hash, id, fragsize, lastfrag, frags.size()); // copy message hash memcpy(msginfo.buffer, hash, 32); put_lastfrag(buf.cur, lastfrag); } void put_lastfrag(uint8_t *buf, size_t sz) { lastfrag.resize(sz); memcpy(lastfrag.data(), buf, sz); } }; struct frame_state { uint64_t rxids = 0; uint64_t txids = 0; llarp_time_t lastEvent = 0; std::map< uint64_t, transit_message > rx; std::map< uint64_t, transit_message * > tx; typedef std::queue< sendbuf_t > sendqueue_t; llarp_router *router = nullptr; llarp_link_session *parent = nullptr; sendqueue_t sendqueue; void clear() { rx.clear(); for(auto &item : tx) delete item.second; tx.clear(); } bool inbound_frame_complete(uint64_t id); void push_ackfor(uint64_t id, uint32_t bitmask) { sendqueue.emplace(); auto &buf = sendqueue.back(); // TODO: set flags to nonzero as needed init_sendbuf(buf, eACKS, 12, 0); // TODO: this assumes big endian memcpy(buf.data() + 6, &id, 8); memcpy(buf.data() + 14, &bitmask, 4); } bool got_xmit(frame_header &hdr, size_t sz) { if(hdr.size() > sz) { // overflow llarp::Warn(__FILE__, "invalid XMIT frame size ", hdr.size(), " > ", sz); return false; } sz = hdr.size(); // extract xmit data xmit x(hdr.data()); const auto bufsz = sizeof(x.buffer); if(sz - bufsz < x.lastfrag()) { // bad size of last fragment llarp::Warn(__FILE__, "XMIT frag size missmatch ", sz - bufsz, " < ", x.lastfrag()); return false; } // check LSB set on flags if(x.flags() & 0x01) { auto id = x.msgid(); auto itr = rx.try_emplace(id, x); if(itr.second) { // inserted, put last fragment itr.first->second.put_lastfrag(hdr.data() + sizeof(x.buffer), x.lastfrag()); if(x.numfrags() == 0) { push_ackfor(id, 0); return inbound_frame_complete(id); } return true; } else llarp::Warn(__FILE__, "duplicate XMIT msgid=", x.msgid()); } else llarp::Warn(__FILE__, "LSB not set on flags"); return false; } void alive() { lastEvent = llarp_time_now_ms(); } bool got_frag(frame_header &hdr, size_t sz) { return false; } bool got_acks(frame_header &hdr, size_t sz); // queue new outbound message void queue_tx(uint64_t id, transit_message *msg) { auto itr = tx.try_emplace(id, msg); if(itr.second) { msg->generate_xmit(sendqueue); msg->retransmit_frags(sendqueue); } else // duplicate delete msg; } // get next frame to encrypt and transmit bool next_frame(llarp_buffer_t &buf) { if(sendqueue.size()) { auto &send = sendqueue.front(); buf.base = send.data(); buf.cur = send.data(); buf.sz = send.size(); return true; } return false; } void pop_next_frame() { sendqueue.pop(); } bool process(uint8_t *buf, size_t sz) { frame_header hdr(buf); switch(hdr.msgtype()) { case eALIV: alive(); return true; case eXMIT: return got_xmit(hdr, sz - 6); case eACKS: return got_acks(hdr, sz - 6); case eFRAG: return got_frag(hdr, sz - 6); default: return false; } } }; struct session { llarp_udp_io *udp; llarp_crypto *crypto; llarp_async_iwp *iwp; llarp_logic *logic; llarp_link_session *parent = nullptr; llarp_link *link = nullptr; llarp_rc *our_router = nullptr; llarp_rc remote_router; llarp_seckey_t eph_seckey; llarp_pubkey_t remote; llarp_sharedkey_t sessionkey; llarp_link_establish_job *establish_job = nullptr; uint32_t establish_job_id = 0; uint32_t keepalive_timer_id = 0; llarp::Addr addr; iwp_async_intro intro; iwp_async_introack introack; iwp_async_session_start start; frame_state frame; byte_t token[32]; byte_t workbuf[MAX_PAD + 128]; enum State { eInitial, eIntroRecv, eIntroSent, eIntroAckSent, eIntroAckRecv, eSessionStartSent, eLIMSent, eEstablished, eTimeout }; State state; session(llarp_udp_io *u, llarp_async_iwp *i, llarp_crypto *c, llarp_logic *l, const byte_t *seckey, const llarp::Addr &a) : udp(u), crypto(c), iwp(i), logic(l), addr(a), state(eInitial) { if(seckey) memcpy(eph_seckey, seckey, sizeof(llarp_seckey_t)); else { c->encryption_keygen(eph_seckey); } llarp::Zero(&remote_router, sizeof(llarp_rc)); } ~session() { llarp_rc_free(&remote_router); frame.clear(); } static llarp_rc * get_remote_router(llarp_link_session *s) { session *self = static_cast< session * >(s->impl); return &self->remote_router; } static bool sendto(llarp_link_session *s, llarp_buffer_t msg) { session *self = static_cast< session * >(s->impl); transit_message *m = new transit_message(self); auto id = self->frame.txids++; llarp_hash_t digest; self->crypto->hash(digest, msg); m->put_message(msg, digest, id); self->add_outbound_message(id, m); return true; } void add_outbound_message(uint64_t id, transit_message *msg) { frame.queue_tx(id, msg); pump(); } void pump() { llarp_buffer_t buf; while(frame.next_frame(buf)) { encrypt_frame_async_send(buf.base, buf.sz); frame.pop_next_frame(); } } // this is called from net thread void recv(const void *buf, size_t sz) { switch(state) { case eInitial: // got intro on_intro(buf, sz); return; case eIntroSent: // got intro ack on_intro_ack(buf, sz); return; case eIntroAckSent: // probably a session start on_session_start(buf, sz); return; case eSessionStartSent: case eLIMSent: case eEstablished: // session is started decrypt_frame(buf, sz); default: // invalid state? return; } } static void handle_verify_session_start(iwp_async_session_start *s) { session *self = static_cast< session * >(s->user); if(!s->buf) { // verify fail // TODO: remove session? llarp::Warn(__FILE__, "session start verify failed"); return; } self->send_LIM(); } void send_LIM() { llarp::Debug(__FILE__, "send LIM"); llarp_shorthash_t digest; // 64 bytes overhead for link message byte_t tmp[MAX_RC_SIZE + 64]; auto buf = llarp::StackBuffer< decltype(tmp) >(tmp); // return a llarp_buffer_t of encoded link message if(llarp::EncodeLIM(&buf, our_router)) { // rewind message buffer buf.sz = buf.cur - buf.base; buf.cur = buf.base; auto msg = new transit_message; // hash message buffer crypto->shorthash(digest, buf); // put message buffer auto id = frame.txids++; msg->put_message(buf, digest, id); // put into outbound send queue add_outbound_message(id, msg); EnterState(eLIMSent); } else llarp::Error(__FILE__, "LIM Encode failed"); } static void send_keepalive(void *user) { session *self = static_cast< session * >(user); // all zeros means keepalive byte_t tmp[MAX_PAD + 8] = {0}; // 8 bytes iwp header overhead int padsz = rand() % (sizeof(tmp) - 8); auto buf = llarp::StackBuffer< decltype(tmp) >(tmp); if(padsz) self->crypto->randbytes(buf.base + 8, padsz); buf.sz -= padsz; // send frame after encrypting self->encrypt_frame_async_send(buf.base, buf.sz); // send another keepalive self->schedule_keepalive(); } static void handle_keepalive_timer(void *user, uint64_t orig, uint64_t left) { session *self = static_cast< session * >(user); self->keepalive_timer_id = 0; // timeout cancelled if(left) { return; } auto now = llarp_time_now_ms(); if(self->timedout(now, SESSION_TIMEOUT - 1000)) { // about to time out so don't reschedle timer return; } llarp_logic_queue_job(self->logic, {self, &send_keepalive}); } void schedule_keepalive() { keepalive_timer_id = llarp_logic_call_later( logic, {1000UL, this, &handle_keepalive_timer}); } void session_established() { EnterState(eEstablished); llarp_logic_cancel_call(logic, establish_job_id); schedule_keepalive(); } void on_session_start(const void *buf, size_t sz) { // own the buffer memcpy(workbuf, buf, sz); // verify session start start.buf = workbuf; start.sz = sz; start.nonce = workbuf + 32; start.token = token; start.remote_pubkey = remote; start.secretkey = eph_seckey; start.sessionkey = sessionkey; start.user = this; start.hook = &handle_verify_session_start; iwp_call_async_verify_session_start(iwp, &start); } bool timedout(llarp_time_t now, llarp_time_t timeout = SESSION_TIMEOUT) { auto diff = now - frame.lastEvent; return diff >= timeout; } static bool is_timedout(llarp_link_session *s) { auto now = llarp_time_now_ms(); return static_cast< session * >(s->impl)->timedout(now); } static void handle_session_established(void *user) { session *impl = static_cast< session * >(user); impl->session_established(); } static void set_established(llarp_link_session *s) { session *impl = static_cast< session * >(s->impl); llarp_logic_queue_job(impl->logic, {impl, &handle_session_established}); } static void close(llarp_link_session *s) { // TODO: implement } static void handle_verify_introack(iwp_async_introack *introack) { session *link = static_cast< session * >(introack->user); if(introack->buf == nullptr) { // invalid signature llarp::Error(__FILE__, "introack verify failed"); return; } link->EnterState(eIntroAckRecv); // copy decrypted token memcpy(link->token, introack->token, 32); link->session_start(); } static void handle_generated_session_start(iwp_async_session_start *start) { session *link = static_cast< session * >(start->user); llarp_ev_udp_sendto(link->udp, link->addr, start->buf, start->sz); link->EnterState(eSessionStartSent); } void session_start() { size_t w2sz = rand() % MAX_PAD; start.buf = workbuf; start.sz = w2sz + (32 * 3); start.nonce = workbuf + 32; crypto->randbytes(start.nonce, 32); start.token = token; memcpy(start.buf + 64, token, 32); if(w2sz) crypto->randbytes(start.buf + (32 * 3), w2sz); start.remote_pubkey = remote; start.secretkey = eph_seckey; start.sessionkey = sessionkey; start.user = this; start.hook = &handle_generated_session_start; iwp_call_async_gen_session_start(iwp, &start); } static void handle_frame_decrypt(iwp_async_frame *frame) { session *self = static_cast< session * >(frame->user); if(frame->success) { if(self->frame.process(frame->buf + 64, frame->sz - 64)) { self->frame.alive(); self->pump(); } else llarp::Error(__FILE__, "invalid frame"); } else llarp::Error(__FILE__, "decrypt frame fail"); delete frame; } void decrypt_frame(const void *buf, size_t sz) { if(sz > 64) { auto frame = alloc_frame(buf, sz); frame->hook = &handle_frame_decrypt; iwp_call_async_frame_decrypt(iwp, frame); } else llarp::Warn(__FILE__, "short packet of ", sz, " bytes"); } static void handle_frame_encrypt(iwp_async_frame *frame) { session *self = static_cast< session * >(frame->user); llarp_ev_udp_sendto(self->udp, self->addr, frame->buf, frame->sz); delete frame; } iwp_async_frame * alloc_frame(const void *buf, size_t sz) { // TODO don't hard code 1500 if(sz > 1500) return nullptr; iwp_async_frame *frame = new iwp_async_frame; if(buf) memcpy(frame->buf, buf, sz); frame->sz = sz; frame->user = this; frame->sessionkey = sessionkey; return frame; } void encrypt_frame_async_send(const void *buf, size_t sz) { // 64 bytes frame overhead for nonce and hmac auto frame = alloc_frame(nullptr, sz + 64); memcpy(frame->buf + 64, buf, sz); frame->hook = &handle_frame_encrypt; iwp_call_async_frame_encrypt(iwp, frame); } static void handle_verify_intro(iwp_async_intro *intro) { session *self = static_cast< session * >(intro->user); if(!intro->buf) { llarp::Error(__FILE__, "intro verify failed"); // TODO: delete session from parent here return; } self->intro_ack(); } static void handle_introack_generated(iwp_async_introack *i) { session *link = static_cast< session * >(i->user); if(i->buf) { llarp::Debug(__FILE__, "send introack"); if(llarp_ev_udp_sendto(link->udp, link->addr, i->buf, i->sz) == -1) { llarp::Warn(__FILE__, "sendto failed"); return; } llarp::Debug(__FILE__, "sent"); link->EnterState(eIntroAckSent); } else { // failed to generate? llarp::Warn(__FILE__, "failed to generate introack"); } } void intro_ack() { uint16_t w1sz = rand() % MAX_PAD; introack.buf = workbuf; introack.sz = (32 * 3) + w1sz; // randomize padding if(w1sz) crypto->randbytes(introack.buf + (32 * 3), w1sz); // randomize nonce introack.nonce = introack.buf + 32; crypto->randbytes(introack.nonce, 32); // randomize token introack.token = token; crypto->randbytes(introack.token, 32); // keys introack.remote_pubkey = remote; introack.secretkey = eph_seckey; // call introack.user = this; introack.hook = &handle_introack_generated; iwp_call_async_gen_introack(iwp, &introack); } void on_intro(const void *buf, size_t sz) { if(sz >= sizeof(workbuf)) { // too big? llarp::Error(__FILE__, "intro too big"); // TOOD: session destroy ? return; } // copy so we own it memcpy(workbuf, buf, sz); intro.buf = workbuf; intro.sz = sz; // give secret key intro.secretkey = eph_seckey; // and nonce intro.nonce = intro.buf + 32; intro.user = this; // set call back hook intro.hook = &handle_verify_intro; // put remote pubkey into this buffer intro.remote_pubkey = remote; // call EnterState(eIntroRecv); iwp_call_async_verify_intro(iwp, &intro); } void on_intro_ack(const void *buf, size_t sz) { if(sz >= sizeof(workbuf)) { // too big? llarp::Error(__FILE__, "introack too big"); // TOOD: session destroy ? return; } // copy buffer so we own it memcpy(workbuf, buf, sz); // set intro ack parameters introack.buf = workbuf; introack.sz = sz; introack.nonce = workbuf + 32; introack.remote_pubkey = remote; introack.token = token; introack.secretkey = eph_seckey; introack.user = this; introack.hook = &handle_verify_introack; // async verify iwp_call_async_verify_introack(iwp, &introack); } static void handle_generated_intro(iwp_async_intro *i) { session *link = static_cast< session * >(i->user); if(i->buf) { llarp::Debug(__FILE__, "send intro"); llarp_ev_udp_sendto(link->udp, link->addr, i->buf, i->sz); link->EnterState(eIntroSent); } else { llarp::Warn(__FILE__, "failed to generate intro"); } } static void handle_establish_timeout(void *user, uint64_t orig, uint64_t left) { session *self = static_cast< session * >(user); if(self->establish_job) { self->establish_job->link = self->link; if(left) { // timer cancelled self->establish_job->session = self->parent; } else { // timer timeout self->establish_job->session = nullptr; } self->establish_job->result(self->establish_job); self->establish_job = nullptr; } } void introduce(uint8_t *pub) { memcpy(remote, pub, 32); intro.buf = workbuf; size_t w0sz = (rand() % MAX_PAD); intro.sz = (32 * 3) + w0sz; // randomize w0 if(w0sz) { crypto->randbytes(intro.buf + (32 * 3), w0sz); } intro.nonce = intro.buf + 32; intro.secretkey = eph_seckey; // copy in pubkey intro.remote_pubkey = remote; // randomize nonce crypto->randbytes(intro.nonce, 32); // async generate intro packet intro.user = this; intro.hook = &handle_generated_intro; iwp_call_async_gen_intro(iwp, &intro); // start introduce timer establish_job_id = llarp_logic_call_later( logic, {5000, this, &handle_establish_timeout}); } void EnterState(State st) { frame.alive(); state = st; } }; struct server { typedef std::mutex mtx_t; typedef std::lock_guard< mtx_t > lock_t; llarp_router *router; llarp_logic *logic; llarp_crypto *crypto; llarp_ev_loop *netloop; llarp_async_iwp *iwp; llarp_link *link = nullptr; llarp_udp_io udp; llarp::Addr addr; char keyfile[255]; uint32_t timeout_job_id; typedef std::map< llarp::Addr, llarp_link_session > LinkMap_t; LinkMap_t m_sessions; mtx_t m_sessions_Mutex; llarp_seckey_t seckey; server(llarp_router *r, llarp_crypto *c, llarp_logic *l, llarp_threadpool *w) { router = r; crypto = c; logic = l; iwp = llarp_async_iwp_new(crypto, logic, w); } ~server() { llarp_async_iwp_free(iwp); } session * create_session(const llarp::Addr &src, const byte_t *seckey) { return new session(&udp, iwp, crypto, logic, seckey, src); } bool has_session_to(const llarp::Addr &dst) { lock_t lock(m_sessions_Mutex); return m_sessions.find(dst) != m_sessions.end(); } void put_session(const llarp::Addr &src, session *impl) { llarp_link_session s = {}; s.impl = impl; s.sendto = &session::sendto; s.timeout = &session::is_timedout; s.close = &session::close; s.get_remote_router = &session::get_remote_router; s.established = &session::set_established; { lock_t lock(m_sessions_Mutex); m_sessions[src] = s; impl->parent = &m_sessions[src]; } impl->link = link; impl->frame.router = router; impl->frame.parent = impl->parent; impl->our_router = &router->rc; } session * ensure_session(const llarp::Addr &src) { session *s = nullptr; bool put = false; // TODO: will this be a bottleneck since it's called in a hot path? { lock_t lock(m_sessions_Mutex); auto itr = m_sessions.find(src); if(itr == m_sessions.end()) { // new inbound session s = create_session(src, seckey); put = true; } else s = static_cast< session * >(itr->second.impl); } if(put) put_session(src, s); return s; } void clear_sessions() { lock_t lock(m_sessions_Mutex); auto itr = m_sessions.begin(); while(itr != m_sessions.end()) { session *s = static_cast< session * >(itr->second.impl); delete s; itr = m_sessions.erase(itr); } } void cleanup_dead() { auto now = llarp_time_now_ms(); std::set< llarp::Addr > remove; { lock_t lock(m_sessions_Mutex); for(auto &itr : m_sessions) { session *s = static_cast< session * >(itr.second.impl); if(s->timedout(now)) remove.insert(itr.first); } for(const auto &addr : remove) { auto itr = m_sessions.find(addr); if(itr != m_sessions.end()) { llarp::Debug(__FILE__, "session with ", addr.to_string(), " is stale, removing"); session *s = static_cast< session * >(itr->second.impl); m_sessions.erase(addr); if(s->keepalive_timer_id) { llarp_logic_remove_call(logic, s->keepalive_timer_id); } delete s; } } } } uint8_t * pubkey() { return llarp_seckey_topublic(seckey); } bool ensure_privkey() { llarp::Debug(__FILE__, "ensure transport private key at ", keyfile); std::error_code ec; if(!fs::exists(keyfile, ec)) { if(!keygen(keyfile)) return false; } std::ifstream f(keyfile); if(f.is_open()) { f.read((char *)seckey, sizeof(llarp_seckey_t)); return true; } return false; } bool keygen(const char *fname) { crypto->encryption_keygen(seckey); llarp::Info(__FILE__, "new transport key generated"); std::ofstream f(fname); if(f.is_open()) { f.write((char *)seckey, sizeof(llarp_seckey_t)); return true; } return false; } static void handle_cleanup_timer(void *l, uint64_t orig, uint64_t left) { server *link = static_cast< server * >(l); link->timeout_job_id = 0; if(!left) { link->cleanup_dead(); // TODO: exponential backoff for cleanup timer ? link->issue_cleanup_timer(orig); } } // this is called in net threadpool static void handle_recvfrom(struct llarp_udp_io *udp, const struct sockaddr *saddr, const void *buf, ssize_t sz) { server *link = static_cast< server * >(udp->user); session *s = link->ensure_session(*saddr); s->recv(buf, sz); } void cancel_timer() { if(timeout_job_id) { llarp_logic_cancel_call(logic, timeout_job_id); } timeout_job_id = 0; } void issue_cleanup_timer(uint64_t timeout) { timeout_job_id = llarp_logic_call_later( logic, {timeout, this, &server::handle_cleanup_timer}); } }; bool frame_state::inbound_frame_complete(uint64_t id) { bool success = false; std::vector< byte_t > msg; if(rx[id].reassemble(msg)) { auto buf = llarp::Buffer< decltype(msg) >(msg); success = router->HandleRecvLinkMessage(parent, buf); if(success) { alive(); session *impl = static_cast< session * >(parent->impl); if(id == 0 && impl->state == session::eSessionStartSent) { // send our LIM impl->send_LIM(); } } } else { llarp::Warn(__FILE__, "failed to reassemble message ", id); } rx.erase(id); return success; } bool frame_state::got_acks(frame_header &hdr, size_t sz) { if(hdr.size() > sz) { llarp::Error(__FILE__, "invalid ACKS frame size ", hdr.size(), " > ", sz); return false; } sz = hdr.size(); if(sz < 12) { llarp::Error(__FILE__, "invalid ACKS frame size ", sz, " < 12"); return false; } auto ptr = hdr.data(); uint64_t msgid; uint32_t bitmask; memcpy(&msgid, ptr, 8); memcpy(&bitmask, ptr + 8, 4); auto itr = tx.find(msgid); if(itr == tx.end()) { llarp::Error(__FILE__, "ACK for missing TX frame msgid=", msgid); return false; } alive(); itr->second->ack(bitmask); if(itr->second->completed()) { delete itr->second; tx.erase(itr); session *impl = static_cast< session * >(parent->impl); if(impl->state == session::eLIMSent && msgid == 0) { // first message acked we are established? impl->session_established(); } } else { llarp::Debug(__FILE__, "message ", msgid, " retransmit fragments"); itr->second->retransmit_frags(sendqueue); } return true; } server * link_alloc(struct llarp_router *router, const char *keyfile, struct llarp_crypto *crypto, struct llarp_logic *logic, struct llarp_threadpool *worker) { server *link = new server(router, crypto, logic, worker); llarp::Zero(link->keyfile, sizeof(link->keyfile)); strncpy(link->keyfile, keyfile, sizeof(link->keyfile)); return link; } const char * link_name() { return "IWP"; } void link_get_addr(struct llarp_link *l, struct llarp_ai *addr) { server *link = static_cast< server * >(l->impl); addr->rank = 1; strncpy(addr->dialect, link_name(), sizeof(addr->dialect)); memcpy(addr->enc_key, link->pubkey(), 32); memcpy(addr->ip.s6_addr, link->addr.addr6(), 16); addr->port = link->addr.port(); } bool link_configure(struct llarp_link *l, struct llarp_ev_loop *netloop, const char *ifname, int af, uint16_t port) { server *link = static_cast< server * >(l->impl); if(!link->ensure_privkey()) { llarp::Error(__FILE__, "failed to ensure private key"); return false; } llarp::Debug(__FILE__, "configure link ifname=", ifname, " af=", af, " port=", port); // bind sockaddr_in ip4addr; sockaddr_in6 ip6addr; sockaddr *addr = nullptr; switch(af) { case AF_INET: addr = (sockaddr *)&ip4addr; llarp::Zero(addr, sizeof(ip4addr)); break; case AF_INET6: addr = (sockaddr *)&ip6addr; llarp::Zero(addr, sizeof(ip6addr)); break; // TODO: AF_PACKET default: return false; } addr->sa_family = af; if(!llarp::StrEq(ifname, "*")) { if(!llarp_getifaddr(ifname, af, addr)) { llarp::Error(__FILE__, "failed to get address of network interface ", ifname); return false; } } switch(af) { case AF_INET: ip4addr.sin_port = htons(port); break; case AF_INET6: ip6addr.sin6_port = htons(port); break; // TODO: AF_PACKET default: return false; } link->addr = *addr; link->netloop = netloop; link->udp.recvfrom = &server::handle_recvfrom; link->udp.user = link; llarp::Debug(__FILE__, "bind IWP link to ", link->addr.to_string()); if(llarp_ev_add_udp(link->netloop, &link->udp, link->addr) == -1) { llarp::Error(__FILE__, "failed to bind to ", link->addr.to_string()); return false; } return true; } bool link_start(struct llarp_link *l, struct llarp_logic *logic) { server *link = static_cast< server * >(l->impl); // give link implementations link->link = l; link->timeout_job_id = 0; link->logic = logic; // start cleanup timer link->issue_cleanup_timer(1000); return true; } bool link_stop(struct llarp_link *l) { server *link = static_cast< server * >(l->impl); link->cancel_timer(); llarp_ev_close_udp(&link->udp); link->clear_sessions(); return true; } void link_iter_sessions(struct llarp_link *l, struct llarp_link_session_iter iter) { server *link = static_cast< server * >(l->impl); iter.link = l; // TODO: race condition with cleanup timer for(auto &item : link->m_sessions) if(!iter.visit(&iter, &item.second)) return; } bool link_try_establish(struct llarp_link *l, struct llarp_link_establish_job *job) { server *link = static_cast< server * >(l->impl); { llarp::Addr dst(job->ai); llarp::Debug(__FILE__, "establish session to ", dst.to_string()); if(link->has_session_to(dst)) { llarp::Warn(__FILE__, "already have session made"); return false; } session *s = link->create_session(dst, nullptr); link->put_session(dst, s); s->establish_job = job; s->introduce(job->ai.enc_key); } return true; } void link_mark_session_active(struct llarp_link *link, struct llarp_link_session *s) { static_cast< session * >(s->impl)->frame.alive(); } void link_free(struct llarp_link *l) { server *link = static_cast< server * >(l->impl); delete link; } } extern "C" { void iwp_link_init(struct llarp_link *link, struct llarp_iwp_args args) { link->impl = iwp::link_alloc(args.router, args.keyfile, args.crypto, args.logic, args.cryptoworker); link->name = iwp::link_name; link->get_our_address = iwp::link_get_addr; link->configure = iwp::link_configure; link->start_link = iwp::link_start; link->stop_link = iwp::link_stop; link->iter_sessions = iwp::link_iter_sessions; link->try_establish = iwp::link_try_establish; link->mark_session_active = iwp::link_mark_session_active; link->free_impl = iwp::link_free; } }