1
1
Fork 0
mirror of https://github.com/oxen-io/lokinet synced 2023-12-14 06:53:00 +01:00
lokinet/llarp/path/pathbuilder.cpp

466 lines
12 KiB
C++
Raw Normal View History

2019-01-11 02:19:36 +01:00
#include <path/pathbuilder.hpp>
#include <messages/relay_commit.hpp>
#include <nodedb.hpp>
2019-01-11 02:19:36 +01:00
#include <path/path.hpp>
#include <profiling.hpp>
#include <router/abstractrouter.hpp>
#include <util/buffer.hpp>
#include <util/logic.hpp>
2018-06-19 00:03:50 +02:00
2018-10-09 14:06:30 +02:00
#include <functional>
2018-06-19 00:03:50 +02:00
namespace llarp
{
2018-06-21 14:55:02 +02:00
template < typename User >
struct AsyncPathKeyExchangeContext
{
typedef path::Path_ptr Path_t;
2019-04-23 18:13:22 +02:00
typedef path::PathSet_ptr PathSet_t;
PathSet_t pathset = nullptr;
Path_t path = nullptr;
2018-10-09 14:06:30 +02:00
typedef std::function< void(AsyncPathKeyExchangeContext< User >*) > Handler;
User* user = nullptr;
Handler result;
2018-06-21 14:55:02 +02:00
size_t idx = 0;
AbstractRouter* router = nullptr;
2018-06-21 14:55:02 +02:00
llarp_threadpool* worker = nullptr;
Logic* logic = nullptr;
Crypto* crypto = nullptr;
LR_CommitMessage LRCM;
2018-06-21 14:55:02 +02:00
2019-02-05 15:50:33 +01:00
~AsyncPathKeyExchangeContext()
{
}
2018-06-21 14:55:02 +02:00
static void
HandleDone(void* u)
{
AsyncPathKeyExchangeContext< User >* ctx =
static_cast< AsyncPathKeyExchangeContext< User >* >(u);
ctx->result(ctx);
2018-10-09 14:06:30 +02:00
delete ctx;
2018-06-21 14:55:02 +02:00
}
static void
GenerateNextKey(void* u)
{
AsyncPathKeyExchangeContext< User >* ctx =
static_cast< AsyncPathKeyExchangeContext< User >* >(u);
2018-06-21 16:20:14 +02:00
// current hop
2018-06-21 14:55:02 +02:00
auto& hop = ctx->path->hops[ctx->idx];
auto& frame = ctx->LRCM.frames[ctx->idx];
2018-06-21 14:55:02 +02:00
// generate key
ctx->crypto->encryption_keygen(hop.commkey);
hop.nonce.Randomize();
// do key exchange
2018-08-30 20:48:43 +02:00
if(!ctx->crypto->dh_client(hop.shared, hop.rc.enckey, hop.commkey,
hop.nonce))
2018-06-21 14:55:02 +02:00
{
2019-03-22 15:10:30 +01:00
LogError(ctx->pathset->Name(),
" Failed to generate shared key for path build");
delete ctx;
2018-06-21 14:55:02 +02:00
return;
}
// generate nonceXOR valueself->hop->pathKey
2019-02-03 01:31:10 +01:00
ctx->crypto->shorthash(hop.nonceXOR, llarp_buffer_t(hop.shared));
2018-06-21 14:55:02 +02:00
++ctx->idx;
2018-06-21 16:20:14 +02:00
bool isFarthestHop = ctx->idx == ctx->path->hops.size();
2018-06-21 16:20:14 +02:00
LR_CommitRecord record;
2018-06-21 16:20:14 +02:00
if(isFarthestHop)
2018-06-21 14:55:02 +02:00
{
hop.upstream = hop.rc.pubkey;
2018-06-21 14:55:02 +02:00
}
else
{
hop.upstream = ctx->path->hops[ctx->idx].rc.pubkey;
2019-04-23 18:13:22 +02:00
record.nextRC =
std::make_unique< RouterContact >(ctx->path->hops[ctx->idx].rc);
2018-06-21 14:55:02 +02:00
}
2018-06-21 17:46:35 +02:00
// build record
2018-06-21 17:46:35 +02:00
record.version = LLARP_PROTO_VERSION;
record.txid = hop.txID;
record.rxid = hop.rxID;
2018-06-21 17:46:35 +02:00
record.tunnelNonce = hop.nonce;
record.nextHop = hop.upstream;
record.commkey = seckey_topublic(hop.commkey);
2018-06-21 17:46:35 +02:00
2019-02-19 16:06:39 +01:00
llarp_buffer_t buf(frame.data(), frame.size());
buf.cur = buf.base + EncryptedFrameOverheadSize;
2018-06-21 17:46:35 +02:00
// encode record
2019-02-19 16:06:39 +01:00
if(!record.BEncode(&buf))
2018-06-21 14:55:02 +02:00
{
// failed to encode?
2019-03-22 15:10:30 +01:00
LogError(ctx->pathset->Name(), " Failed to generate Commit Record");
2019-02-19 16:06:39 +01:00
DumpBuffer(buf);
delete ctx;
2018-06-21 14:55:02 +02:00
return;
}
2019-02-19 16:06:39 +01:00
frame.Resize(buf.cur - buf.base);
// use ephemeral keypair for frame
2018-06-21 14:55:02 +02:00
SecretKey framekey;
ctx->crypto->encryption_keygen(framekey);
2018-08-30 20:48:43 +02:00
if(!frame.EncryptInPlace(framekey, hop.rc.enckey, ctx->crypto))
2018-06-21 14:55:02 +02:00
{
2019-03-22 15:10:30 +01:00
LogError(ctx->pathset->Name(), " Failed to encrypt LRCR");
delete ctx;
2018-06-21 14:55:02 +02:00
return;
}
2018-06-21 16:20:14 +02:00
if(isFarthestHop)
2018-06-21 14:55:02 +02:00
{
2018-06-21 16:20:14 +02:00
// farthest hop
2018-12-10 15:14:55 +01:00
ctx->logic->queue_job({ctx, &HandleDone});
2018-06-21 14:55:02 +02:00
}
else
{
2018-06-21 16:20:14 +02:00
// next hop
llarp_threadpool_queue_job(ctx->worker, {ctx, &GenerateNextKey});
2018-06-21 14:55:02 +02:00
}
}
AsyncPathKeyExchangeContext(Crypto* c) : crypto(c)
2018-06-21 14:55:02 +02:00
{
}
/// Generate all keys asynchronously and call handler when done
2018-06-21 14:55:02 +02:00
void
AsyncGenerateKeys(Path_t p, Logic* l, llarp_threadpool* pool, User* u,
Handler func)
2018-06-21 14:55:02 +02:00
{
path = p;
logic = l;
user = u;
result = func;
worker = pool;
2019-04-26 01:21:19 +02:00
for(size_t i = 0; i < path::max_len; ++i)
2018-06-21 14:55:02 +02:00
{
2019-04-26 01:21:19 +02:00
LRCM.frames[i].Randomize();
2018-06-21 14:55:02 +02:00
}
llarp_threadpool_queue_job(pool, {this, &GenerateNextKey});
}
};
static void
PathBuilderKeysGenerated(AsyncPathKeyExchangeContext< path::Builder >* ctx)
2018-06-19 00:03:50 +02:00
{
2019-02-05 15:50:33 +01:00
if(!ctx->pathset->IsStopped())
2018-06-20 14:34:48 +02:00
{
2018-12-24 17:21:15 +01:00
RouterID remote = ctx->path->Upstream();
const ILinkMessage* msg = &ctx->LRCM;
if(ctx->router->SendToOrQueue(remote, msg))
{
// persist session with router until this path is done
ctx->router->PersistSessionUntil(remote, ctx->path->ExpireTime());
// add own path
ctx->router->pathContext().AddOwnPath(ctx->pathset, ctx->path);
2018-12-24 17:21:15 +01:00
}
else
2019-03-22 15:10:30 +01:00
LogError(ctx->pathset->Name(), " failed to send LRCM to ", remote);
2018-06-20 14:34:48 +02:00
}
2018-06-19 00:03:50 +02:00
}
2018-08-30 20:48:43 +02:00
namespace path
2018-06-19 00:03:50 +02:00
{
Builder::Builder(AbstractRouter* p_router, struct llarp_dht_context* p_dht,
2018-08-30 20:48:43 +02:00
size_t pathNum, size_t hops)
: path::PathSet(pathNum), router(p_router), dht(p_dht), numHops(hops)
2018-06-19 00:03:50 +02:00
{
p_router->crypto()->encryption_keygen(enckey);
_run.store(true);
2018-06-19 00:03:50 +02:00
}
2018-08-30 20:48:43 +02:00
Builder::~Builder()
{
}
2019-05-07 19:46:38 +02:00
void
Builder::ResetInternalState()
{
buildIntervalLimit = MIN_PATH_BUILD_INTERVAL;
2019-05-08 14:17:48 +02:00
lastBuild = 0;
2019-05-07 19:46:38 +02:00
}
2019-04-23 18:13:22 +02:00
void
Builder::Tick(llarp_time_t now)
{
ExpirePaths(now);
if(ShouldBuildMore(now))
BuildOne();
TickPaths(now, router);
}
2019-02-11 18:14:43 +01:00
util::StatusObject
Builder::ExtractStatus() const
2019-02-08 20:43:25 +01:00
{
2019-04-23 18:13:22 +02:00
util::StatusObject obj{{"numHops", uint64_t(numHops)},
2019-02-11 18:14:43 +01:00
{"numPaths", uint64_t(m_NumPaths)}};
std::vector< util::StatusObject > pathObjs;
std::transform(m_Paths.begin(), m_Paths.end(),
std::back_inserter(pathObjs),
[](const auto& item) -> util::StatusObject {
return item.second->ExtractStatus();
});
obj.Put("paths", pathObjs);
return obj;
2019-02-08 20:43:25 +01:00
}
2018-08-30 20:48:43 +02:00
bool
2019-05-08 16:01:31 +02:00
Builder::SelectHop(llarp_nodedb* db, const std::set< RouterID >& exclude,
2018-11-14 19:02:27 +01:00
RouterContact& cur, size_t hop, PathRole roles)
2018-08-30 20:48:43 +02:00
{
2018-11-15 14:47:46 +01:00
(void)roles;
2019-04-05 16:58:22 +02:00
size_t tries = 10;
if(hop == 0)
{
if(router->NumberOfConnectedRouters() == 0)
{
// persist connection
router->ConnectToRandomRouters(1);
return false;
}
bool got = false;
2019-04-05 16:58:22 +02:00
router->ForEachPeer(
2019-05-07 15:04:43 +02:00
[&](const ILinkSession* s, bool isOutbound) {
if(s && s->IsEstablished() && isOutbound && !got)
{
const RouterContact rc = s->GetRemoteRC();
2019-05-08 16:01:31 +02:00
if(got || router->IsBootstrapNode(rc.pubkey)
|| exclude.count(rc.pubkey))
2019-05-07 15:04:43 +02:00
return;
cur = rc;
got = true;
}
2019-04-05 16:58:22 +02:00
},
true);
return got;
}
2018-10-04 19:51:45 +02:00
do
{
cur.Clear();
2018-10-04 19:51:45 +02:00
--tries;
2019-05-08 16:01:31 +02:00
std::set< RouterID > excluding = exclude;
if(db->select_random_hop_excluding(cur, excluding))
{
2019-05-08 16:18:04 +02:00
excluding.insert(cur.pubkey);
2019-04-16 13:44:55 +02:00
if(!router->routerProfiling().IsBadForPath(cur.pubkey))
return true;
}
} while(tries > 0);
return tries > 0;
2018-08-30 20:48:43 +02:00
}
bool
Builder::Stop()
{
_run.store(false);
return true;
}
2019-02-05 15:50:33 +01:00
bool
Builder::IsStopped() const
{
return !_run.load();
}
bool
Builder::ShouldRemove() const
{
2019-04-23 18:13:22 +02:00
return IsStopped();
}
const SecretKey&
2018-08-30 20:48:43 +02:00
Builder::GetTunnelEncryptionSecretKey() const
{
return enckey;
}
2018-06-19 00:03:50 +02:00
2018-12-27 13:00:28 +01:00
bool
Builder::BuildCooldownHit(llarp_time_t now) const
{
return now < lastBuild || now - lastBuild < buildIntervalLimit;
2018-12-27 13:00:28 +01:00
}
2018-08-30 20:48:43 +02:00
bool
2018-10-29 17:48:36 +01:00
Builder::ShouldBuildMore(llarp_time_t now) const
2018-08-30 20:48:43 +02:00
{
2019-04-16 13:44:55 +02:00
if(IsStopped())
return false;
2019-05-06 18:13:41 +02:00
return PathSet::ShouldBuildMore(now) && !BuildCooldownHit(now);
2018-08-30 20:48:43 +02:00
}
2018-08-12 19:22:29 +02:00
2018-08-30 20:48:43 +02:00
void
2018-11-14 19:02:27 +01:00
Builder::BuildOne(PathRole roles)
2018-08-30 20:48:43 +02:00
{
2019-05-08 16:18:04 +02:00
std::vector< RouterContact > hops(numHops);
if(SelectHops(router->nodedb(), hops, roles))
2018-11-14 19:02:27 +01:00
Build(hops, roles);
}
bool Builder::UrgentBuild(llarp_time_t) const
{
return buildIntervalLimit > MIN_PATH_BUILD_INTERVAL * 4;
}
bool
Builder::BuildOneAlignedTo(const RouterID remote)
{
std::vector< RouterContact > hops;
2019-05-08 16:01:31 +02:00
std::set< RouterID > routers = {remote};
/// if we really need this path build it "dangerously"
if(UrgentBuild(router->Now()))
{
const auto aligned =
router->pathContext().FindOwnedPathsWithEndpoint(remote);
/// pick the lowest latency path that aligns to remote
/// note: peer exuastion is made worse happen here
Path_ptr p;
llarp_time_t min = std::numeric_limits< llarp_time_t >::max();
for(const auto& path : aligned)
{
if(path->intro.latency < min && path->hops.size() == numHops)
{
p = path;
min = path->intro.latency;
}
}
if(p)
{
for(const auto& hop : p->hops)
hops.emplace_back(hop.rc);
}
}
if(hops.size() == 0)
{
2019-05-07 15:04:43 +02:00
hops.resize(numHops);
auto nodedb = router->nodedb();
2019-05-08 16:18:04 +02:00
for(size_t idx = 0; idx < hops.size(); idx++)
{
2019-05-08 16:18:04 +02:00
hops[idx].Clear();
if(idx == 0)
{
2019-05-08 16:18:04 +02:00
if(!SelectHop(nodedb, routers, hops[idx], 0, path::ePathRoleAny))
return false;
}
2019-05-08 16:18:04 +02:00
else if(idx == numHops - 1)
{
// last hop
2019-05-08 16:18:04 +02:00
if(!nodedb->Get(remote, hops[idx]))
{
router->LookupRouter(remote, nullptr);
return false;
}
}
// middle hop
else
{
size_t tries = 5;
2019-05-08 16:18:04 +02:00
do
{
2019-05-08 16:18:04 +02:00
if(!hops[idx].pubkey.IsZero())
routers.insert(hops[idx].pubkey);
--tries;
2019-05-08 16:18:04 +02:00
if(!nodedb->select_random_hop_excluding(hops[idx], routers))
{
continue;
}
} while(router->routerProfiling().IsBadForPath(hops[idx].pubkey)
&& tries > 0);
2019-05-08 16:01:31 +02:00
if(tries == 0)
return false;
}
2019-05-08 16:18:04 +02:00
routers.insert(hops[idx].pubkey);
}
}
2019-05-07 15:04:43 +02:00
LogInfo(Name(), " building path to ", remote);
Build(hops);
return true;
}
bool
Builder::SelectHops(llarp_nodedb* nodedb,
2018-11-14 19:02:27 +01:00
std::vector< RouterContact >& hops, PathRole roles)
{
2018-08-30 20:48:43 +02:00
size_t idx = 0;
2019-05-08 16:01:31 +02:00
std::set< RouterID > exclude;
2019-05-08 16:18:04 +02:00
while(idx < hops.size())
2018-08-30 20:48:43 +02:00
{
2019-05-08 16:18:04 +02:00
hops[idx].Clear();
2019-03-22 13:44:15 +01:00
size_t tries = 4;
2019-05-08 16:01:31 +02:00
while(tries > 0 && !SelectHop(nodedb, exclude, hops[idx], idx, roles))
--tries;
2019-03-22 13:44:15 +01:00
if(tries == 0)
{
2019-03-22 15:10:30 +01:00
LogWarn(Name(), " failed to select hop ", idx);
2019-03-22 13:44:15 +01:00
return false;
2018-08-30 20:48:43 +02:00
}
2019-05-08 16:01:31 +02:00
exclude.insert(hops[idx].pubkey);
2018-08-30 20:48:43 +02:00
++idx;
}
return true;
}
2018-10-29 17:48:36 +01:00
llarp_time_t
Builder::Now() const
{
return router->Now();
}
void
2018-11-14 19:02:27 +01:00
Builder::Build(const std::vector< RouterContact >& hops, PathRole roles)
{
2019-02-05 15:50:33 +01:00
if(IsStopped())
return;
2018-10-29 17:48:36 +01:00
lastBuild = Now();
2018-08-30 20:48:43 +02:00
// async generate keys
AsyncPathKeyExchangeContext< Builder >* ctx =
new AsyncPathKeyExchangeContext< Builder >(router->crypto());
2018-12-07 14:38:49 +01:00
ctx->router = router;
2019-04-23 18:13:22 +02:00
ctx->pathset = GetSelf();
auto path = std::make_shared< path::Path >(hops, this, roles);
path->SetBuildResultHook(
[this](Path_ptr p) { this->HandlePathBuilt(p); });
ctx->AsyncGenerateKeys(path, router->logic(), router->threadpool(), this,
&PathBuilderKeysGenerated);
2018-08-30 20:48:43 +02:00
}
2018-06-19 00:03:50 +02:00
void
Builder::HandlePathBuilt(Path_ptr p)
{
buildIntervalLimit = MIN_PATH_BUILD_INTERVAL;
router->routerProfiling().MarkPathSuccess(p.get());
2019-03-22 15:10:30 +01:00
LogInfo(p->Name(), " built latency=", p->intro.latency);
}
void
Builder::HandlePathBuildTimeout(Path_ptr p)
{
// linear backoff
2019-01-07 18:28:59 +01:00
static constexpr llarp_time_t MaxBuildInterval = 30 * 1000;
buildIntervalLimit = std::min(
MIN_PATH_BUILD_INTERVAL + buildIntervalLimit, MaxBuildInterval);
router->routerProfiling().MarkPathFail(p.get());
PathSet::HandlePathBuildTimeout(p);
2019-05-06 18:00:10 +02:00
LogWarn(Name(), " build interval is now ", buildIntervalLimit);
}
2018-08-30 20:48:43 +02:00
void
2018-11-14 19:02:27 +01:00
Builder::ManualRebuild(size_t num, PathRole roles)
2018-08-30 20:48:43 +02:00
{
2019-03-22 15:10:30 +01:00
LogDebug(Name(), " manual rebuild ", num);
2018-08-30 20:48:43 +02:00
while(num--)
2018-11-14 19:02:27 +01:00
BuildOne(roles);
2018-08-30 20:48:43 +02:00
}
2018-06-19 00:03:50 +02:00
2018-08-30 20:48:43 +02:00
} // namespace path
} // namespace llarp