#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include namespace llarp { void RCLookupHandler::AddValidRouter(const RouterID& router) { util::Lock l(_mutex); whitelistRouters.insert(router); } void RCLookupHandler::RemoveValidRouter(const RouterID& router) { util::Lock l(_mutex); whitelistRouters.erase(router); } void RCLookupHandler::SetRouterWhitelist(const std::vector& routers) { if (routers.empty()) return; util::Lock l(_mutex); whitelistRouters.clear(); for (auto& router : routers) { whitelistRouters.emplace(router); } LogInfo("lokinet service node list now has ", whitelistRouters.size(), " routers"); } bool RCLookupHandler::HaveReceivedWhitelist() { util::Lock l(_mutex); return not whitelistRouters.empty(); } void RCLookupHandler::GetRC(const RouterID& router, RCRequestCallback callback, bool forceLookup) { RouterContact remoteRC; if (not forceLookup) { if (_nodedb->Get(router, remoteRC)) { if (callback) { callback(router, &remoteRC, RCRequestResult::Success); } FinalizeRequest(router, &remoteRC, RCRequestResult::Success); return; } } bool shouldDoLookup = false; { util::Lock l(_mutex); auto itr_pair = pendingCallbacks.emplace(router, CallbacksQueue{}); if (callback) { itr_pair.first->second.push_back(callback); } shouldDoLookup = itr_pair.second; } if (shouldDoLookup) { auto fn = std::bind(&RCLookupHandler::HandleDHTLookupResult, this, router, std::placeholders::_1); // if we are a client try using the hidden service endpoints if (!isServiceNode) { bool sent = false; LogInfo("Lookup ", router, " anonymously"); _hiddenServiceContext->ForEachService( [&](const std::string&, const std::shared_ptr& ep) -> bool { const bool success = ep->LookupRouterAnon(router, fn); sent = sent || success; return !success; }); if (sent) return; LogWarn("cannot lookup ", router, " anonymously"); } if (!_dht->impl->LookupRouter(router, fn)) { FinalizeRequest(router, nullptr, RCRequestResult::RouterNotFound); } else { _routerLookupTimes[router] = std::chrono::steady_clock::now(); } } } bool RCLookupHandler::RemoteIsAllowed(const RouterID& remote) const { if (_strictConnectPubkeys.size() && _strictConnectPubkeys.count(remote) == 0 && !RemoteInBootstrap(remote)) { return false; } util::Lock l(_mutex); if (useWhitelist && whitelistRouters.find(remote) == whitelistRouters.end()) { return false; } return true; } bool RCLookupHandler::CheckRC(const RouterContact& rc) const { if (not RemoteIsAllowed(rc.pubkey)) { _dht->impl->DelRCNodeAsync(dht::Key_t{rc.pubkey}); return false; } if (not rc.Verify(_dht->impl->Now())) { LogWarn("RC for ", RouterID(rc.pubkey), " is invalid"); return false; } // update nodedb if required if (rc.IsPublicRouter()) { LogDebug("Adding or updating RC for ", RouterID(rc.pubkey), " to nodedb and dht."); _nodedb->UpdateAsyncIfNewer(rc); _dht->impl->PutRCNodeAsync(rc); } return true; } size_t RCLookupHandler::NumberOfStrictConnectRouters() const { return _strictConnectPubkeys.size(); } bool RCLookupHandler::GetRandomWhitelistRouter(RouterID& router) const { util::Lock l(_mutex); const auto sz = whitelistRouters.size(); auto itr = whitelistRouters.begin(); if (sz == 0) return false; if (sz > 1) std::advance(itr, randint() % sz); router = *itr; return true; } bool RCLookupHandler::CheckRenegotiateValid(RouterContact newrc, RouterContact oldrc) { // mismatch of identity ? if (newrc.pubkey != oldrc.pubkey) return false; if (!RemoteIsAllowed(newrc.pubkey)) return false; auto func = std::bind(&RCLookupHandler::CheckRC, this, newrc); _work(func); // update dht if required if (_dht->impl->Nodes()->HasNode(dht::Key_t{newrc.pubkey})) { _dht->impl->Nodes()->PutNode(newrc); } // TODO: check for other places that need updating the RC return true; } void RCLookupHandler::PeriodicUpdate(llarp_time_t now) { // try looking up stale routers std::set routersToLookUp; _nodedb->VisitInsertedBefore( [&](const RouterContact& rc) { if (HavePendingLookup(rc.pubkey)) return; routersToLookUp.insert(rc.pubkey); }, now - RouterContact::UpdateInterval); for (const auto& router : routersToLookUp) { GetRC(router, nullptr, true); } _nodedb->RemoveStaleRCs(_bootstrapRouterIDList, now - RouterContact::StaleInsertionAge); } void RCLookupHandler::ExploreNetwork() { const size_t known = _nodedb->num_loaded(); if (_bootstrapRCList.empty() && known == 0) { LogError("we have no bootstrap nodes specified"); } else if (known <= _bootstrapRCList.size()) { for (const auto& rc : _bootstrapRCList) { LogInfo("Doing explore via bootstrap node: ", RouterID(rc.pubkey)); _dht->impl->ExploreNetworkVia(dht::Key_t{rc.pubkey}); } } if (useWhitelist) { static constexpr auto RerequestInterval = 10min; static constexpr size_t LookupPerTick = 5; std::vector lookupRouters; lookupRouters.reserve(LookupPerTick); const auto now = std::chrono::steady_clock::now(); { // if we are using a whitelist look up a few routers we don't have util::Lock l(_mutex); for (const auto& r : whitelistRouters) { if (now > _routerLookupTimes[r] + RerequestInterval and not _nodedb->Has(r)) { lookupRouters.emplace_back(r); } } } if (lookupRouters.size() > LookupPerTick) { static std::mt19937_64 rng{llarp::randint()}; std::shuffle(lookupRouters.begin(), lookupRouters.end(), rng); lookupRouters.resize(LookupPerTick); } for (const auto& r : lookupRouters) GetRC(r, nullptr, true); return; } // service nodes gossip, not explore if (_dht->impl->GetRouter()->IsServiceNode()) return; // explore via every connected peer _linkManager->ForEachPeer([&](ILinkSession* s) { if (!s->IsEstablished()) return; const RouterContact rc = s->GetRemoteRC(); if (rc.IsPublicRouter() && (_bootstrapRCList.find(rc) == _bootstrapRCList.end())) { LogDebug("Doing explore via public node: ", RouterID(rc.pubkey)); _dht->impl->ExploreNetworkVia(dht::Key_t{rc.pubkey}); } }); } void RCLookupHandler::Init( llarp_dht_context* dht, llarp_nodedb* nodedb, WorkerFunc_t dowork, ILinkManager* linkManager, service::Context* hiddenServiceContext, const std::set& strictConnectPubkeys, const std::set& bootstrapRCList, bool useWhitelist_arg, bool isServiceNode_arg) { _dht = dht; _nodedb = nodedb; _work = dowork; _hiddenServiceContext = hiddenServiceContext; _strictConnectPubkeys = strictConnectPubkeys; _bootstrapRCList = bootstrapRCList; _linkManager = linkManager; useWhitelist = useWhitelist_arg; isServiceNode = isServiceNode_arg; for (const auto& rc : _bootstrapRCList) { _bootstrapRouterIDList.insert(rc.pubkey); } } void RCLookupHandler::HandleDHTLookupResult(RouterID remote, const std::vector& results) { if (not results.size()) { FinalizeRequest(remote, nullptr, RCRequestResult::RouterNotFound); return; } if (not RemoteIsAllowed(remote)) { FinalizeRequest(remote, &results[0], RCRequestResult::InvalidRouter); return; } if (not CheckRC(results[0])) { FinalizeRequest(remote, &results[0], RCRequestResult::BadRC); return; } FinalizeRequest(remote, &results[0], RCRequestResult::Success); } bool RCLookupHandler::HavePendingLookup(RouterID remote) const { util::Lock l(_mutex); return pendingCallbacks.find(remote) != pendingCallbacks.end(); } bool RCLookupHandler::RemoteInBootstrap(const RouterID& remote) const { for (const auto& rc : _bootstrapRCList) { if (rc.pubkey == remote) { return true; } } return false; } void RCLookupHandler::FinalizeRequest( const RouterID& router, const RouterContact* const rc, RCRequestResult result) { CallbacksQueue movedCallbacks; { util::Lock l(_mutex); auto itr = pendingCallbacks.find(router); if (itr != pendingCallbacks.end()) { movedCallbacks.splice(movedCallbacks.begin(), itr->second); pendingCallbacks.erase(itr); } } // lock for (const auto& callback : movedCallbacks) { callback(router, rc, result); } } } // namespace llarp