1
1
Fork 0
mirror of https://github.com/oxen-io/lokinet synced 2023-12-14 06:53:00 +01:00
Commit graph

8186 commits

Author SHA1 Message Date
dr7ana 9084d39e5a Squashed misc testnet fixes 2023-12-11 03:13:16 -08:00
Jason Rhinelander bc2cb46d9c
testnet: don't give oxend and error when testing is disabled 2023-12-07 20:53:09 -04:00
dr7ana 8af38d3d44 TELL ME WHEN IT WORKS 2023-12-07 16:48:40 -08:00
dr7ana d00257b9f0 address parsing
- straightened out setting of public addr and public port in config vs listen ("bind") addr
- fixed small bug in router contact writing and saving
2023-12-07 16:15:20 -08:00
dr7ana aaf284b39f libquic vbump
- now pointing to jason/void-listen
2023-12-07 16:15:17 -08:00
dr7ana cef2ff7782 Local router mode
- Up and running locally, no connections yet
- Next: flip testnet and do the gosh dang thing
2023-12-07 09:27:58 -08:00
dr7ana ed6bd28a35 testnet prep
- redoing link_manager functions again to implement previously ignored review comments on several PRs
- conceptually merging "whitelist_routers" and new "known_{rids,rcs}", s.t. we can completely eliminate white/red/gray/green/etc lists in favor of something that isn't dumb
2023-12-06 12:02:31 -08:00
dr7ana c9268dceba trust model edge case handling
- Once we have our set of returned rc's and accepted rid's (ones that were found locally), the remainder are placed in an "unconfirmed" state
- Once there, they have five subsequent successful fetches to be found in request response, at which point their verification counter is incremented and their attempt counter is reset
- If they appear three times, they are "promoted" and moved to our "known_{rid,rc}" list
2023-12-06 07:28:21 -08:00
dr7ana 62c37825b0 testnet prep
- disable reachability testing with config option; required to be done on testnet
- reachability testing pipeline through link_manager executes pings similar to storage server. connection established hook reports successful reachability, while connection closed callback (with non-default error code) reports unsuccessful testing
2023-12-04 11:18:18 -08:00
dr7ana 70e9c1ae25 trust model fetch fails
- bootstrap cooldown implemented with 1min timer in case all bootstraps fail
- set comparison implemented in non-initial and non-bootstrap rc fetching; set comparison in rid fetching is done every fetch
- nodedb get_random functions refactored into conditional/non-conditional methods. Conditional search implements reservoir sampling for one-pass accumulation of n random rcs
2023-12-04 07:59:13 -08:00
dr7ana 3508dee8d8 trust model
- greedy evaluation of returned rid's, simplifying post-processing logic to simple frequency comparison per rid against a constant threshold
- tidied up link_manager request/response handling
- TODO:
  - review and decide thresholds
  - evaluate necessity and potential implementation of rc comparison
2023-12-01 12:54:52 -08:00
dr7ana 91121ea22b pull yourself up by your bootstraps sonny
- initial/subsequent fetching combined for RouterContacts and RouterIDs
- bootstraps fallback implemented and looped into fetch logic
2023-11-30 15:16:33 -08:00
dr7ana f6e651caea move from vectors to unordered_sets
- When receiving a request to fetch RouterID's, the remote endpoint fulfilling the request stores them in an unordered set. When the request caller receives that payload, it is loaded into a vector in the same order. However, we should just load it directly into an unordered set to enforce both the order and that none appear twice
- The trust model will have to operate on multiple large lists of RouterID's and RC's efficiently, and maintaining a sort order ensures the values are workable immediately after deserialization
2023-11-29 06:11:46 -08:00
dr7ana ba3fffb765 housekeeping pre-trust model 2023-11-29 06:03:54 -08:00
dr7ana b6cc86e25b fetch RID result handler logic 2023-11-28 12:51:30 -08:00
dr7ana 3fc7980691 less synchronous for the subsequent fetches 2023-11-28 12:51:30 -08:00
dr7ana 6559617816 RC/RID fetching logic implemented 2023-11-28 12:51:30 -08:00
dr7ana 5fa3c2be87 housekeeping and groundwork, initial commit 2023-11-28 12:51:30 -08:00
Thomas Winget c693569c00
Merge pull request #2225 from tewinget/rc-fetch
RC and RouterID fetching
2023-11-28 14:06:34 -05:00
Thomas Winget 2b2d8c51a1 rework rotate_rc_source function, just for 'normal operation' now 2023-11-27 21:49:28 -05:00
Thomas Winget 70d2052cd4 minor fixups 2023-11-27 21:49:02 -05:00
Thomas Winget dab1e06892 FindRouterMessage is gone, also clang-format 2023-11-27 14:40:18 -05:00
Thomas Winget 14b9aa20ee (client) periodically fetch RouterIDs from peers 2023-11-27 14:40:18 -05:00
Thomas Winget b353fd4095 Minor RC load/store/prune fixups 2023-11-27 14:40:18 -05:00
Thomas Winget c30a4dd44a Implement fetch RouterIDs method and usage
Periodically clients will fetch the set of RouterIDs for all relays on
the network.  It will request this list from a number (12, currently) of
relays, but as we are likely to be requesting from more relays than we
want to have edge connections, this request will itself be relayed to
the target source via one of our edges.  As we can't trust our edge to
do this honestly, the responses are signed by the source relay.

TODO: the responses from all (12) relays are collected, then processed
together.  The reconciliation of their responses is not yet implemented.

TODO: the source selection for this method obviously requires sources to
begin with, but this is the method by which we learn of
those...bootstrapping is still a bit in-progress, and will need to be
finished for this.

TODO: make Router call this periodically, as with RC fetching.
2023-11-27 14:40:18 -05:00
Thomas Winget 6952e8f705 Add command to fetch RCs from remote node
This command will be called periodically by clients to maintain a list
of RCs of active relay nodes.  It will require another command (future
commit) to fetch the RouterIDs from many nodes and reconcile those so we
have some notion of good-ness of the RCs we're getting; if we get what
seems to be a bad set of RCs (this concept not yet implemented), we will
choose a different relay to fetch RCs from.  These are left as TODOs for
now.
2023-11-27 14:40:09 -05:00
dr7ana d520e1d2c4
Merge pull request #2224 from tewinget/rc-gossip
RC gossip
2023-11-27 10:54:52 -08:00
Thomas Winget 5bf520d0f1 minor style/naming changes 2023-11-27 13:28:45 -05:00
Thomas Winget 76d45ec802 remove explicit arg that mirrors default 2023-11-27 13:08:04 -05:00
Thomas Winget b044622a21 implement new rc gossip logic
Relays will now re-sign and gossip their RCs every 6 hours (minus a
couple random minutes) using the new gossip_rc message.

Removes the old RCGossiper concept
2023-11-27 12:59:35 -05:00
Thomas Winget 2425652696 NodeDB RCs don't need insertion time
We will want some notion of "when did we receive it" for RCs (or
RouterIDs, details tbd), but that will be per-source as a means to form
some metric of consensus/trust on which relays are *actually* on the
network.  Clients don't have a blockchain daemon to pull this from, so
they have to ask many relays for the full list of relays and form a
trust model on that (bootstrapping problem notwithstanding).
2023-11-27 12:59:35 -05:00
Thomas Winget 29ec72f0da implement and use "gossip_rc" command
TODO: refactor or remove RCGossiper and revisit RC regen and
when-to-gossip logic.
2023-11-27 12:59:35 -05:00
Thomas Winget 27aea62994 Remove find/lookup router
We're removing the notion of find/lookup a singular RC, so this gets rid
of all functions which did that and replaces their usages with something
sensible.
2023-11-27 12:59:33 -05:00
Thomas Winget ad9d0b19c1 remove rc_lookup_handler, relocating useful parts
RC "lookup" is being replaced with "gimme all recently updated RCs".  As
such, doing a lookup on a specific RC is going away, as is network
exploration, so a lot of what RCLookupHandler was doing will no longer
be relevant.  Functionality from it which was kept has moved to NodeDB,
as it makes sense for that functionality to live where the RCs live.
2023-11-27 12:54:43 -05:00
dr7ana 28047ae72f
Merge pull request #2223 from tewinget/path-build-correctly
onion encrypt path build frames
2023-11-27 09:26:46 -08:00
dr7ana e58e8473f8
Merge pull request #2216 from tewinget/path-messages
Path build and onioned messages
2023-11-27 09:23:16 -08:00
Thomas Winget feaf0b9193 fix some copy/paste derping
also deserialize to unsigned string where possible/useful so to not have
unnecessary reinterpret_casts all over the place.
2023-11-27 12:20:03 -05:00
Thomas Winget 2e5c856cf3 onion encrypt path build frames
path build frames should be onioned at each hop to avoid a bad actor
controlling two nodes in a path being able to know (with certainty,
temporal correlation is hard to avoid) that they're hops on the same
path.  This is desirable as in the worst case someone could be your edge
hop and terminal hop on a path, and now the terminal hop knows your IP
making the path basically pointless.
2023-11-27 12:19:59 -05:00
Thomas Winget d7e2e52ee4 messages::status -> messages 2023-11-27 12:15:36 -05:00
Jason Rhinelander 1ef77cccbd
Merge pull request #2221 from dr7ana/config-refactor-11-23
Config Refactor
2023-11-17 14:34:57 -04:00
dr7ana 826ef2bbe6 libquic bump 2023-11-17 09:03:43 -08:00
Thomas Winget e6eeda0f15 remove some unused "path build"-related functions 2023-11-16 15:42:02 -05:00
Thomas Winget bd4f239aa3 preconstructed dicts for error/timeout/ok
also move messages' statuses into their own namespace
2023-11-16 15:35:58 -05:00
dr7ana 2ee70921bc review fixes 2023-11-16 10:30:25 -08:00
Jason Rhinelander 1ca852d2f5 Delete llarp::util::memFn
It's unnecessary abstraction that barely simplifies anything, and is now
only used in one single place anyway, which is easily replaced with a
(unabstracted) lambda.
2023-11-08 15:14:14 -05:00
Thomas Winget 32395caec1 build fixes, clang-format, minor touch-ups 2023-11-08 15:13:44 -05:00
Thomas Winget 9e9c1ea732 chahca nonce size is 24 bytes
Lots of code was using 32-byte nonces for xchacha20 symmetric
encryption, but this just means 8 extra bytes per packet wasted as
chacha is only using the first 24 bytes of that nonce anyway.

Changing this resulted in a lot of dead/dying code breaking, so this
commit also removes a lot of that (and comments a couple places with
TODO instead)

Also nounce -> nonce where it came up.
2023-11-08 15:13:44 -05:00
Thomas Winget abb2f63ec6 path control message response status changes
change path control message inner message response to take just a
string, which will be a bt-encoded response with an early key for
status.  If there is a timeout we pass a bt dict that only has that as
the status, else the response we de-onioned should have either an OK
status or some other error.

change messages to use new status key

correctly call Path::EnterState on path build response
2023-11-08 15:12:38 -05:00
Thomas Winget e7632d0a30 omit breaking RC stuff pending refactor
It seems RC refactor will obviate the need for a "get individual RC"
method, so this comments out some usage of that to sidestep build
errors, rather than correcting them in a way that will just be wasted.
2023-11-06 12:31:26 -05:00
Thomas Winget b0fb194e2c path control messages and onioning fleshed out
- control messages can be sent along a path
- the path owner onion-encrypts the "inner" message for each hop in the
  path
- relays on the path will onion the payload in both directions, such
  that the terminal relay will get the plaintext "inner" message and the
  client will get the plaintext "response" to that.
- control messages have (mostly, see below) been changed to be invokable
  either over a path or directly to a relay, as appropriate.

TODO:
  - exit messages need looked at, so they have not yet been changed for
    this
  - path transfer messages (traffic from client to client over 2 paths
    with a shared "pivot") are not yet implemented
2023-11-06 12:31:24 -05:00