i2pd/libi2pd/RouterContext.h

272 lines
10 KiB
C
Raw Permalink Normal View History

/*
* Copyright (c) 2013-2024, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
2013-10-23 06:45:40 +04:00
#ifndef ROUTER_CONTEXT_H__
#define ROUTER_CONTEXT_H__
#include <inttypes.h>
2014-10-27 22:08:50 +03:00
#include <string>
2014-11-20 23:48:28 +03:00
#include <memory>
#include <unordered_set>
2014-10-29 20:49:21 +03:00
#include <boost/asio.hpp>
2014-04-01 21:42:04 +04:00
#include "Identity.h"
2013-10-23 06:45:40 +04:00
#include "RouterInfo.h"
2014-10-07 04:18:18 +04:00
#include "Garlic.h"
#include "util.h"
2013-10-23 06:45:40 +04:00
namespace i2p
{
namespace garlic
{
class RouterIncomingRatchetSession;
}
2013-10-23 06:45:40 +04:00
const char ROUTER_INFO[] = "router.info";
2018-01-06 06:48:51 +03:00
const char ROUTER_KEYS[] = "router.keys";
const char NTCP2_KEYS[] = "ntcp2.keys";
2022-03-02 05:23:08 +03:00
const char SSU2_KEYS[] = "ssu2.keys";
const int ROUTER_INFO_UPDATE_INTERVAL = 30*60; // 30 minutes
const int ROUTER_INFO_PUBLISH_INTERVAL = 39*60; // in seconds
const int ROUTER_INFO_INITIAL_PUBLISH_INTERVAL = 10; // in seconds
const int ROUTER_INFO_PUBLISH_INTERVAL_VARIANCE = 105;// in seconds
const int ROUTER_INFO_CONFIRMATION_TIMEOUT = 5; // in seconds
const int ROUTER_INFO_MAX_PUBLISH_EXCLUDED_FLOODFILLS = 15;
2023-03-07 03:48:04 +03:00
const int ROUTER_INFO_CONGESTION_UPDATE_INTERVAL = 12*60; // in seconds
const int ROUTER_INFO_CLEANUP_INTERVAL = 5; // in minutes
2015-02-26 21:44:18 +03:00
enum RouterStatus
{
eRouterStatusOK = 0,
eRouterStatusFirewalled = 1,
eRouterStatusUnknown = 2,
eRouterStatusProxy = 3,
eRouterStatusMesh = 4
2018-01-06 06:48:51 +03:00
};
2015-02-26 21:44:18 +03:00
2024-01-28 16:37:14 +03:00
const char* const ROUTER_STATUS_NAMES[] =
{
"OK", // 0
"Firewalled", // 1
"Unknown", // 2
"Proxy", // 3
"Mesh" // 4
};
2016-09-20 04:37:04 +03:00
enum RouterError
{
eRouterErrorNone = 0,
2020-10-12 00:51:40 +03:00
eRouterErrorClockSkew = 1,
2021-03-01 20:20:53 +03:00
eRouterErrorOffline = 2,
2022-12-10 21:22:37 +03:00
eRouterErrorSymmetricNAT = 3,
eRouterErrorFullConeNAT = 4,
eRouterErrorNoDescriptors = 5
2018-01-06 06:48:51 +03:00
};
2023-02-26 16:46:01 +03:00
class RouterContext: public i2p::garlic::GarlicDestination
2013-10-23 06:45:40 +04:00
{
2018-06-11 22:33:48 +03:00
private:
struct NTCP2PrivateKeys
2018-06-11 22:33:48 +03:00
{
2018-06-15 19:52:43 +03:00
uint8_t staticPublicKey[32];
uint8_t staticPrivateKey[32];
2018-06-11 22:33:48 +03:00
uint8_t iv[16];
};
2018-06-11 22:33:48 +03:00
2022-03-02 05:23:08 +03:00
struct SSU2PrivateKeys
{
uint8_t staticPublicKey[32];
uint8_t staticPrivateKey[32];
uint8_t intro[32];
};
2023-02-26 16:46:01 +03:00
class RouterService: public i2p::util::RunnableServiceWithWork
{
public:
RouterService (): RunnableServiceWithWork ("Router") {};
boost::asio::io_service& GetService () { return GetIOService (); };
void Start () { StartIOService (); };
void Stop () { StopIOService (); };
};
2013-10-23 06:45:40 +04:00
public:
RouterContext ();
2014-09-04 17:31:42 +04:00
void Init ();
void Start ();
void Stop ();
const i2p::data::PrivateKeys& GetPrivateKeys () const { return m_Keys; };
2022-01-16 02:54:02 +03:00
i2p::data::LocalRouterInfo& GetRouterInfo () { return m_RouterInfo; };
2021-07-14 21:46:56 +03:00
std::shared_ptr<i2p::data::RouterInfo> GetSharedRouterInfo ()
2018-01-06 06:48:51 +03:00
{
2021-07-14 21:46:56 +03:00
return std::shared_ptr<i2p::data::RouterInfo> (&m_RouterInfo,
[](i2p::data::RouterInfo *) {});
2014-11-20 23:48:28 +03:00
}
2018-01-06 06:48:51 +03:00
std::shared_ptr<i2p::garlic::GarlicDestination> GetSharedDestination ()
{
2018-01-06 06:48:51 +03:00
return std::shared_ptr<i2p::garlic::GarlicDestination> (this,
[](i2p::garlic::GarlicDestination *) {});
2018-01-06 06:48:51 +03:00
}
std::shared_ptr<i2p::data::RouterInfo::Buffer> CopyRouterInfoBuffer () const;
2018-06-15 19:52:43 +03:00
const uint8_t * GetNTCP2StaticPublicKey () const { return m_NTCP2Keys ? m_NTCP2Keys->staticPublicKey : nullptr; };
const uint8_t * GetNTCP2StaticPrivateKey () const { return m_NTCP2Keys ? m_NTCP2Keys->staticPrivateKey : nullptr; };
const uint8_t * GetNTCP2IV () const { return m_NTCP2Keys ? m_NTCP2Keys->iv : nullptr; };
2022-03-02 05:23:08 +03:00
i2p::crypto::X25519Keys& GetNTCP2StaticKeys ();
2018-01-06 06:48:51 +03:00
2022-03-02 05:23:08 +03:00
const uint8_t * GetSSU2StaticPublicKey () const { return m_SSU2Keys ? m_SSU2Keys->staticPublicKey : nullptr; };
const uint8_t * GetSSU2StaticPrivateKey () const { return m_SSU2Keys ? m_SSU2Keys->staticPrivateKey : nullptr; };
const uint8_t * GetSSU2IntroKey () const { return m_SSU2Keys ? m_SSU2Keys->intro : nullptr; };
i2p::crypto::X25519Keys& GetSSU2StaticKeys ();
2019-06-19 18:43:04 +03:00
uint32_t GetUptime () const; // in seconds
uint64_t GetLastUpdateTime () const { return m_LastUpdateTime; };
uint64_t GetBandwidthLimit () const { return m_BandwidthLimit; };
uint64_t GetTransitBandwidthLimit () const { return (m_BandwidthLimit*m_ShareRatio)/100LL; };
bool GetTesting () const { return m_Testing; };
void SetTesting (bool testing);
2015-02-26 21:44:18 +03:00
RouterStatus GetStatus () const { return m_Status; };
2015-11-03 17:15:49 +03:00
void SetStatus (RouterStatus status);
2016-09-20 04:37:04 +03:00
RouterError GetError () const { return m_Error; };
2022-08-30 04:11:17 +03:00
void SetError (RouterError error) { m_Error = error; };
bool GetTestingV6 () const { return m_TestingV6; };
void SetTestingV6 (bool testing);
2021-03-23 22:36:57 +03:00
RouterStatus GetStatusV6 () const { return m_StatusV6; };
void SetStatusV6 (RouterStatus status);
2022-08-03 03:02:55 +03:00
RouterError GetErrorV6 () const { return m_ErrorV6; };
2022-08-30 04:11:17 +03:00
void SetErrorV6 (RouterError error) { m_ErrorV6 = error; };
2016-10-12 18:26:48 +03:00
int GetNetID () const { return m_NetID; };
2018-01-06 06:48:51 +03:00
void SetNetID (int netID) { m_NetID = netID; };
bool DecryptTunnelBuildRecord (const uint8_t * encrypted, uint8_t * data);
2021-06-03 02:50:29 +03:00
bool DecryptTunnelShortRequestRecord (const uint8_t * encrypted, uint8_t * data);
void UpdatePort (int port); // called from Daemon
void UpdateAddress (const boost::asio::ip::address& host); // called from SSU2 or Daemon
void PublishNTCP2Address (int port, bool publish, bool v4, bool v6, bool ygg);
2022-03-29 20:56:56 +03:00
void PublishSSU2Address (int port, bool publish, bool v4, bool v6);
bool AddSSU2Introducer (const i2p::data::RouterInfo::Introducer& introducer, bool v4);
void RemoveSSU2Introducer (const i2p::data::IdentHash& h, bool v4);
void UpdateSSU2Introducer (const i2p::data::IdentHash& h, bool v4, uint32_t iTag, uint32_t iExp);
void ClearSSU2Introducers (bool v4);
bool IsUnreachable () const;
void SetUnreachable (bool v4, bool v6);
void SetReachable (bool v4, bool v6);
2018-01-06 06:48:51 +03:00
bool IsFloodfill () const { return m_IsFloodfill; };
void SetFloodfill (bool floodfill);
2016-02-21 04:20:19 +03:00
void SetFamily (const std::string& family);
std::string GetFamily () const;
void SetBandwidth (int limit); /* in kilobytes */
void SetBandwidth (char L); /* by letter */
void SetShareRatio (int percents); // 0 - 100
2014-09-30 21:34:29 +04:00
bool AcceptsTunnels () const { return m_AcceptsTunnels; };
void SetAcceptsTunnels (bool acceptsTunnels) { m_AcceptsTunnels = acceptsTunnels; };
2024-02-18 23:54:43 +03:00
int GetCongestionLevel (bool longTerm) const;
bool SupportsV6 () const { return m_RouterInfo.IsV6 (); };
2016-03-25 01:44:41 +03:00
bool SupportsV4 () const { return m_RouterInfo.IsV4 (); };
2021-02-01 01:25:07 +03:00
bool SupportsMesh () const { return m_RouterInfo.IsMesh (); };
void SetSupportsV6 (bool supportsV6);
2016-03-25 01:44:41 +03:00
void SetSupportsV4 (bool supportsV4);
2021-02-01 02:30:53 +03:00
void SetSupportsMesh (bool supportsmesh, const boost::asio::ip::address_v6& host);
void SetMTU (int mtu, bool v4);
void SetHidden(bool hide) { m_IsHiddenMode = hide; };
bool IsHidden() const { return m_IsHiddenMode; };
2024-09-07 23:25:26 +03:00
bool IsLimitedConnectivity () const { return m_Status == eRouterStatusProxy; }; // TODO: implement other cases
i2p::crypto::NoiseSymmetricState& GetCurrentNoiseState () { return m_CurrentNoiseState; };
void UpdateNTCP2V6Address (const boost::asio::ip::address& host); // called from Daemon. TODO: remove
2018-01-06 06:48:51 +03:00
void UpdateStats ();
2018-09-21 17:13:18 +03:00
void UpdateTimestamp (uint64_t ts); // in seconds, called from NetDb before publishing
2014-10-27 22:08:50 +03:00
2014-04-01 21:42:04 +04:00
// implements LocalDestination
2024-10-19 02:57:35 +03:00
std::shared_ptr<const i2p::data::IdentityEx> GetIdentity () const override{ return m_Keys.GetPublic (); };
bool Decrypt (const uint8_t * encrypted, uint8_t * data, i2p::data::CryptoKeyType preferredCrypto) const override;
void SetLeaseSetUpdated (bool post) override {};
2014-10-08 05:08:00 +04:00
// implements GarlicDestination
2024-10-19 02:57:35 +03:00
std::shared_ptr<const i2p::data::LocalLeaseSet> GetLeaseSet () override { return nullptr; };
std::shared_ptr<i2p::tunnel::TunnelPool> GetTunnelPool () const override;
2015-06-10 05:14:31 +03:00
// override GarlicDestination
2024-10-19 02:57:35 +03:00
void ProcessGarlicMessage (std::shared_ptr<I2NPMessage> msg) override;
void ProcessDeliveryStatusMessage (std::shared_ptr<I2NPMessage> msg) override;
2024-10-19 03:02:41 +03:00
void SubmitECIESx25519Key (const uint8_t * key, uint64_t tag) override;
2018-01-06 06:48:51 +03:00
2020-01-07 00:14:41 +03:00
protected:
// implements GarlicDestination
2024-10-19 02:57:35 +03:00
void HandleI2NPMessage (const uint8_t * buf, size_t len) override;
bool HandleCloveI2NPMessage (I2NPMessageType typeID, const uint8_t * payload, size_t len, uint32_t msgID) override;
2020-01-07 00:14:41 +03:00
2013-10-23 06:45:40 +04:00
private:
void CreateNewRouter ();
void NewRouterInfo ();
2014-02-23 20:48:09 +04:00
void UpdateRouterInfo ();
2018-06-11 22:33:48 +03:00
void NewNTCP2Keys ();
2022-03-02 05:23:08 +03:00
void NewSSU2Keys ();
void UpdateNTCP2Keys ();
void UpdateSSU2Keys ();
2013-10-23 06:45:40 +04:00
bool Load ();
void SaveKeys ();
2024-10-19 02:57:35 +03:00
void Sign (const uint8_t * buf, int len, uint8_t * signature) const { m_Keys.Sign (buf, len, signature); };
uint16_t SelectRandomPort () const;
2023-01-24 22:07:22 +03:00
void PublishNTCP2Address (std::shared_ptr<i2p::data::RouterInfo::Address> address, int port, bool publish) const;
2021-06-03 02:50:29 +03:00
bool DecryptECIESTunnelBuildRecord (const uint8_t * encrypted, uint8_t * data, size_t clearTextSize);
void PostGarlicMessage (std::shared_ptr<I2NPMessage> msg);
void PostDeliveryStatusMessage (std::shared_ptr<I2NPMessage> msg);
void ScheduleInitialPublish ();
2023-02-26 01:19:14 +03:00
void HandleInitialPublishTimer (const boost::system::error_code& ecode);
void SchedulePublish ();
void HandlePublishTimer (const boost::system::error_code& ecode);
void Publish ();
void SchedulePublishResend ();
void HandlePublishResendTimer (const boost::system::error_code& ecode);
2023-03-07 03:48:04 +03:00
void ScheduleCongestionUpdate ();
void HandleCongestionUpdateTimer (const boost::system::error_code& ecode);
void UpdateCongestion ();
void ScheduleCleanupTimer ();
void HandleCleanupTimer (const boost::system::error_code& ecode);
2013-10-23 06:45:40 +04:00
private:
2022-01-15 20:48:49 +03:00
i2p::data::LocalRouterInfo m_RouterInfo;
2018-01-06 06:48:51 +03:00
i2p::data::PrivateKeys m_Keys;
std::shared_ptr<i2p::crypto::CryptoKeyDecryptor> m_Decryptor, m_TunnelDecryptor;
std::shared_ptr<i2p::garlic::RouterIncomingRatchetSession> m_ECIESSession;
2018-09-21 17:13:18 +03:00
uint64_t m_LastUpdateTime; // in seconds
bool m_AcceptsTunnels, m_IsFloodfill;
2024-02-27 20:33:07 +03:00
uint64_t m_StartupTime; // monotonic seconds
uint64_t m_BandwidthLimit; // allowed bandwidth
int m_ShareRatio;
2021-03-23 22:36:57 +03:00
RouterStatus m_Status, m_StatusV6;
2022-08-03 03:02:55 +03:00
RouterError m_Error, m_ErrorV6;
bool m_Testing, m_TestingV6;
2016-10-12 18:26:48 +03:00
int m_NetID;
2018-06-11 22:33:48 +03:00
std::unique_ptr<NTCP2PrivateKeys> m_NTCP2Keys;
2022-03-02 05:23:08 +03:00
std::unique_ptr<SSU2PrivateKeys> m_SSU2Keys;
std::unique_ptr<i2p::crypto::X25519Keys> m_NTCP2StaticKeys, m_SSU2StaticKeys;
// for ECIESx25519
i2p::crypto::NoiseSymmetricState m_InitialNoiseState, m_CurrentNoiseState;
// publish
2023-02-26 16:46:01 +03:00
std::unique_ptr<RouterService> m_Service;
std::unique_ptr<boost::asio::deadline_timer> m_PublishTimer, m_CongestionUpdateTimer, m_CleanupTimer;
std::unordered_set<i2p::data::IdentHash> m_PublishExcluded;
uint32_t m_PublishReplyToken;
bool m_IsHiddenMode; // not publish
mutable std::mutex m_RouterInfoMutex;
2013-10-23 06:45:40 +04:00
};
extern RouterContext context;
2018-01-06 06:48:51 +03:00
}
2013-10-23 06:45:40 +04:00
#endif