i2pd/libi2pd/NetDb.cpp

1374 lines
42 KiB
C++
Raw Normal View History

/*
* Copyright (c) 2013-2023, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
2014-12-31 17:14:53 +03:00
#include <string.h>
2013-11-20 16:46:09 +04:00
#include <fstream>
2014-01-21 04:12:59 +04:00
#include <vector>
2014-01-23 00:32:50 +04:00
#include <boost/asio.hpp>
#include <stdexcept>
2016-02-11 03:00:00 +03:00
#include "I2PEndian.h"
2015-11-03 17:15:49 +03:00
#include "Base.h"
2016-05-11 22:12:38 +03:00
#include "Crypto.h"
2013-11-13 16:59:21 +04:00
#include "Log.h"
2013-11-20 16:46:09 +04:00
#include "Timestamp.h"
2013-11-13 16:59:21 +04:00
#include "I2NPProtocol.h"
#include "Tunnel.h"
#include "Transports.h"
2018-11-21 19:23:48 +03:00
#include "NTCP2.h"
2013-11-19 05:37:38 +04:00
#include "RouterContext.h"
2014-01-03 06:22:48 +04:00
#include "Garlic.h"
#include "ECIESX25519AEADRatchetSession.h"
2016-11-14 20:05:44 +03:00
#include "Config.h"
#include "NetDb.hpp"
#include "util.h"
2013-11-13 16:59:21 +04:00
using namespace i2p::transport;
2013-11-13 16:59:21 +04:00
namespace i2p
{
namespace data
2018-01-06 06:48:51 +03:00
{
2013-11-13 16:59:21 +04:00
NetDb netdb;
NetDb::NetDb (): m_IsRunning (false), m_Thread (nullptr), m_Reseeder (nullptr), m_Storage("netDb", "r", "routerInfo-", "dat"), m_PersistProfiles (true)
2013-11-13 16:59:21 +04:00
{
}
2018-01-06 06:48:51 +03:00
2013-11-13 16:59:21 +04:00
NetDb::~NetDb ()
{
2018-01-06 06:48:51 +03:00
Stop ();
2015-01-19 21:57:37 +03:00
delete m_Reseeder;
2018-01-06 06:48:51 +03:00
}
2013-11-19 05:37:38 +04:00
void NetDb::Start ()
2016-08-29 22:34:59 +03:00
{
m_Storage.SetPlace(i2p::fs::GetDataDir());
m_Storage.Init(i2p::data::GetBase64SubstitutionTable(), 64);
InitProfilesStorage ();
2016-08-29 22:26:19 +03:00
m_Families.LoadCertificates ();
Load ();
2017-02-02 23:40:57 +03:00
uint16_t threshold; i2p::config::GetOption("reseed.threshold", threshold);
2023-02-22 23:58:20 +03:00
if (m_RouterInfos.size () < threshold || m_Floodfills.GetSize () < NETDB_MIN_FLOODFILLS) // reseed if # of router less than threshold or too few floodfiils
{
2015-01-19 21:57:37 +03:00
Reseed ();
}
else if (!GetRandomRouter (i2p::context.GetSharedRouterInfo (), false))
Reseed (); // we don't have a router we can connect to. Trying to reseed
2021-07-14 21:46:56 +03:00
auto it = m_RouterInfos.find (i2p::context.GetIdentHash ());
if (it != m_RouterInfos.end ())
{
// remove own router
2023-02-22 23:58:20 +03:00
m_Floodfills.Remove (it->second->GetIdentHash ());
m_RouterInfos.erase (it);
2021-07-14 21:46:56 +03:00
}
// insert own router
m_RouterInfos.emplace (i2p::context.GetIdentHash (), i2p::context.GetSharedRouterInfo ());
if (i2p::context.IsFloodfill ())
2023-02-22 23:58:20 +03:00
m_Floodfills.Insert (i2p::context.GetSharedRouterInfo ());
i2p::config::GetOption("persist.profiles", m_PersistProfiles);
2015-01-15 04:27:19 +03:00
m_IsRunning = true;
2013-11-19 05:37:38 +04:00
m_Thread = new std::thread (std::bind (&NetDb::Run, this));
}
2018-01-06 06:48:51 +03:00
2013-11-19 05:37:38 +04:00
void NetDb::Stop ()
{
2015-04-11 22:39:23 +03:00
if (m_IsRunning)
2018-01-06 06:48:51 +03:00
{
if (m_PersistProfiles)
2023-02-12 00:22:02 +03:00
SaveProfiles ();
2015-04-11 22:39:23 +03:00
DeleteObsoleteProfiles ();
m_RouterInfos.clear ();
2023-02-22 23:58:20 +03:00
m_Floodfills.Clear ();
2015-04-11 22:39:23 +03:00
if (m_Thread)
2018-01-06 06:48:51 +03:00
{
2015-04-11 22:39:23 +03:00
m_IsRunning = false;
m_Queue.WakeUp ();
2018-01-06 06:48:51 +03:00
m_Thread->join ();
2015-04-11 22:39:23 +03:00
delete m_Thread;
m_Thread = 0;
}
m_LeaseSets.clear();
m_Requests.Stop ();
2016-06-13 18:34:44 +03:00
}
2018-01-06 06:48:51 +03:00
}
2013-11-19 05:37:38 +04:00
void NetDb::Run ()
{
i2p::util::SetThreadName("NetDB");
uint64_t lastSave = 0, lastExploratory = 0, lastManageRequest = 0, lastDestinationCleanup = 0;
uint64_t lastProfilesCleanup = i2p::util::GetSecondsSinceEpoch ();
2022-05-07 16:56:58 +03:00
int16_t profilesCleanupVariance = 0;
2013-11-19 05:37:38 +04:00
while (m_IsRunning)
2018-01-06 06:48:51 +03:00
{
try
2018-01-06 06:48:51 +03:00
{
2015-06-16 20:32:42 +03:00
auto msg = m_Queue.GetNextWithTimeout (15000); // 15 sec
if (msg)
2018-01-06 06:48:51 +03:00
{
int numMsgs = 0;
2015-02-12 19:40:42 +03:00
while (msg)
2013-11-20 16:46:09 +04:00
{
LogPrint(eLogDebug, "NetDb: Got request with type ", (int) msg->GetTypeID ());
2018-01-06 06:48:51 +03:00
switch (msg->GetTypeID ())
{
2018-01-06 06:48:51 +03:00
case eI2NPDatabaseStore:
2015-06-16 20:32:42 +03:00
HandleDatabaseStoreMsg (msg);
break;
case eI2NPDatabaseSearchReply:
2015-06-16 20:32:42 +03:00
HandleDatabaseSearchReplyMsg (msg);
break;
case eI2NPDatabaseLookup:
2015-06-16 20:32:42 +03:00
HandleDatabaseLookupMsg (msg);
2018-01-06 06:48:51 +03:00
break;
case eI2NPDummyMsg:
2018-11-21 21:24:54 +03:00
// plain RouterInfo from NTCP2 with flags for now
2018-11-21 19:23:48 +03:00
HandleNTCP2RouterInfoMsg (msg);
break;
default: // WTF?
LogPrint (eLogError, "NetDb: Unexpected message type ", (int) msg->GetTypeID ());
2015-06-16 20:32:42 +03:00
//i2p::HandleI2NPMessage (msg);
2018-01-06 06:48:51 +03:00
}
2015-02-12 19:40:42 +03:00
if (numMsgs > 100) break;
msg = m_Queue.Get ();
numMsgs++;
2018-01-06 06:48:51 +03:00
}
}
if (!m_IsRunning) break;
2020-10-12 00:51:40 +03:00
if (!i2p::transport::transports.IsOnline ()) continue; // don't manage netdb when offline
uint64_t ts = i2p::util::GetSecondsSinceEpoch ();
2023-02-10 02:32:18 +03:00
if (ts - lastManageRequest >= 15 || ts + 15 < lastManageRequest) // manage requests every 15 seconds
{
2015-04-09 19:45:00 +03:00
m_Requests.ManageRequests ();
lastManageRequest = ts;
2018-01-06 06:48:51 +03:00
}
2023-02-10 02:32:18 +03:00
if (ts - lastSave >= 60 || ts + 60 < lastSave) // save routers, manage leasesets and validate subscriptions every minute
{
2014-02-13 07:02:39 +04:00
if (lastSave)
2014-02-15 01:10:25 +04:00
{
SaveUpdated ();
2014-07-31 20:59:43 +04:00
ManageLeaseSets ();
2018-01-06 06:48:51 +03:00
}
2014-02-13 07:02:39 +04:00
lastSave = ts;
}
2023-02-10 02:32:18 +03:00
if (ts - lastDestinationCleanup >= i2p::garlic::INCOMING_TAGS_EXPIRATION_TIMEOUT ||
ts + i2p::garlic::INCOMING_TAGS_EXPIRATION_TIMEOUT < lastDestinationCleanup)
2016-07-28 20:24:25 +03:00
{
i2p::context.CleanupDestination ();
lastDestinationCleanup = ts;
}
2018-01-06 06:48:51 +03:00
2023-02-10 02:32:18 +03:00
if (ts - lastProfilesCleanup >= (uint64_t)(i2p::data::PEER_PROFILE_AUTOCLEAN_TIMEOUT + profilesCleanupVariance) ||
ts + i2p::data::PEER_PROFILE_AUTOCLEAN_TIMEOUT < lastProfilesCleanup)
{
2023-02-12 00:22:02 +03:00
if (m_PersistProfiles) PersistProfiles ();
DeleteObsoleteProfiles ();
lastProfilesCleanup = ts;
2022-05-07 16:56:58 +03:00
profilesCleanupVariance = (rand () % (2 * i2p::data::PEER_PROFILE_AUTOCLEAN_VARIANCE) - i2p::data::PEER_PROFILE_AUTOCLEAN_VARIANCE);
}
2023-02-10 02:32:18 +03:00
if (ts - lastExploratory >= 30 || ts + 30 < lastExploratory) // exploratory every 30 seconds
2018-01-06 06:48:51 +03:00
{
2015-01-11 00:08:13 +03:00
auto numRouters = m_RouterInfos.size ();
2018-09-21 17:13:18 +03:00
if (!numRouters)
throw std::runtime_error("No known routers, reseed seems to be totally failed");
2016-11-14 20:05:44 +03:00
else // we have peers now
m_FloodfillBootstrap = nullptr;
2015-01-11 00:08:13 +03:00
if (numRouters < 2500 || ts - lastExploratory >= 90)
2018-01-06 06:48:51 +03:00
{
2015-01-11 00:08:13 +03:00
numRouters = 800/numRouters;
if (numRouters < 1) numRouters = 1;
2018-01-06 06:48:51 +03:00
if (numRouters > 9) numRouters = 9;
m_Requests.ManageRequests ();
if(!i2p::context.IsHidden ())
Explore (numRouters);
2015-01-11 00:08:13 +03:00
lastExploratory = ts;
2018-01-06 06:48:51 +03:00
}
}
2013-11-20 16:46:09 +04:00
}
catch (std::exception& ex)
2013-11-20 16:46:09 +04:00
{
LogPrint (eLogError, "NetDb: Runtime exception: ", ex.what ());
2018-01-06 06:48:51 +03:00
}
}
}
std::shared_ptr<const RouterInfo> NetDb::AddRouterInfo (const uint8_t * buf, int len)
2018-11-21 21:24:54 +03:00
{
bool updated;
return AddRouterInfo (buf, len, updated);
2018-11-21 21:24:54 +03:00
}
std::shared_ptr<const RouterInfo> NetDb::AddRouterInfo (const uint8_t * buf, int len, bool& updated)
2014-12-11 23:41:04 +03:00
{
IdentityEx identity;
2014-12-12 06:31:39 +03:00
if (identity.FromBuffer (buf, len))
2018-11-21 21:24:54 +03:00
return AddRouterInfo (identity.GetIdentHash (), buf, len, updated);
updated = false;
return nullptr;
2014-12-11 23:41:04 +03:00
}
2016-02-17 23:36:55 +03:00
bool NetDb::AddRouterInfo (const IdentHash& ident, const uint8_t * buf, int len)
2018-01-06 06:48:51 +03:00
{
2018-11-21 21:24:54 +03:00
bool updated;
AddRouterInfo (ident, buf, len, updated);
return updated;
2018-11-21 21:24:54 +03:00
}
std::shared_ptr<const RouterInfo> NetDb::AddRouterInfo (const IdentHash& ident, const uint8_t * buf, int len, bool& updated)
{
updated = true;
2014-11-21 21:29:19 +03:00
auto r = FindRouter (ident);
if (r)
{
2016-02-17 23:36:55 +03:00
if (r->IsNewer (buf, len))
{
bool wasFloodfill = r->IsFloodfill ();
2022-07-22 22:16:42 +03:00
{
std::unique_lock<std::mutex> l(m_RouterInfosMutex);
2023-02-13 02:02:16 +03:00
if (!r->Update (buf, len))
{
updated = false;
m_Requests.RequestComplete (ident, r);
2023-02-13 02:02:16 +03:00
return r;
}
if (r->IsUnreachable ())
{
// delete router as invalid after update
m_RouterInfos.erase (ident);
if (wasFloodfill)
{
std::unique_lock<std::mutex> l(m_FloodfillsMutex);
2023-02-22 23:58:20 +03:00
m_Floodfills.Remove (r->GetIdentHash ());
2023-02-13 02:02:16 +03:00
}
m_Requests.RequestComplete (ident, nullptr);
2023-02-13 02:02:16 +03:00
return nullptr;
}
}
2016-01-18 03:00:00 +03:00
LogPrint (eLogInfo, "NetDb: RouterInfo updated: ", ident.ToBase64());
if (wasFloodfill != r->IsFloodfill ()) // if floodfill status updated
{
LogPrint (eLogDebug, "NetDb: RouterInfo floodfill status updated: ", ident.ToBase64());
std::unique_lock<std::mutex> l(m_FloodfillsMutex);
if (wasFloodfill)
2023-02-22 23:58:20 +03:00
m_Floodfills.Remove (r->GetIdentHash ());
2020-11-21 22:27:08 +03:00
else if (r->IsEligibleFloodfill ())
2023-02-22 23:58:20 +03:00
m_Floodfills.Insert (r);
}
2016-02-17 23:36:55 +03:00
}
else
2016-11-15 20:17:21 +03:00
{
2016-02-17 23:36:55 +03:00
LogPrint (eLogDebug, "NetDb: RouterInfo is older: ", ident.ToBase64());
2016-11-15 20:17:21 +03:00
updated = false;
}
2018-01-06 06:48:51 +03:00
}
else
{
2015-01-15 04:27:19 +03:00
r = std::make_shared<RouterInfo> (buf, len);
if (!r->IsUnreachable () && r->HasValidAddresses () && (!r->IsFloodfill () || !r->GetProfile ()->IsUnreachable ()) &&
i2p::util::GetMillisecondsSinceEpoch () + NETDB_EXPIRATION_TIMEOUT_THRESHOLD*1000LL > r->GetTimestamp ())
2014-11-21 21:29:19 +03:00
{
2016-11-15 20:17:21 +03:00
bool inserted = false;
2016-01-16 23:36:30 +03:00
{
std::unique_lock<std::mutex> l(m_RouterInfosMutex);
2016-11-15 20:17:21 +03:00
inserted = m_RouterInfos.insert ({r->GetIdentHash (), r}).second;
}
if (inserted)
{
LogPrint (eLogInfo, "NetDb: RouterInfo added: ", ident.ToBase64());
if (r->IsFloodfill () && r->IsEligibleFloodfill ())
2016-11-15 20:17:21 +03:00
{
std::unique_lock<std::mutex> l(m_FloodfillsMutex);
2023-02-22 23:58:20 +03:00
m_Floodfills.Insert (r);
2016-11-15 20:17:21 +03:00
}
2016-01-16 23:36:30 +03:00
}
2016-11-15 20:17:21 +03:00
else
2016-01-16 23:36:30 +03:00
{
2016-11-15 20:17:21 +03:00
LogPrint (eLogWarning, "NetDb: Duplicated RouterInfo ", ident.ToBase64());
updated = false;
2016-01-16 23:36:30 +03:00
}
2018-01-06 06:48:51 +03:00
}
2016-02-17 23:36:55 +03:00
else
updated = false;
2018-01-06 06:48:51 +03:00
}
2015-01-15 00:11:09 +03:00
// take care about requested destination
2015-04-09 19:45:00 +03:00
m_Requests.RequestComplete (ident, r);
2018-11-21 21:24:54 +03:00
return r;
2018-01-06 06:48:51 +03:00
}
2013-11-13 16:59:21 +04:00
bool NetDb::AddLeaseSet (const IdentHash& ident, const uint8_t * buf, int len)
2013-11-13 16:59:21 +04:00
{
2016-07-15 20:52:55 +03:00
std::unique_lock<std::mutex> lock(m_LeaseSetsMutex);
2016-02-17 23:36:55 +03:00
bool updated = false;
auto it = m_LeaseSets.find(ident);
if (it != m_LeaseSets.end () && it->second->GetStoreType () == i2p::data::NETDB_STORE_TYPE_LEASESET)
2018-01-06 06:48:51 +03:00
{
// we update only is existing LeaseSet is not LeaseSet2
uint64_t expires;
if(LeaseSetBufferValidate(buf, len, expires))
{
if(it->second->GetExpirationTime() < expires)
2015-04-08 17:34:16 +03:00
{
it->second->Update (buf, len, false); // signature is verified already
LogPrint (eLogInfo, "NetDb: LeaseSet updated: ", ident.ToBase32());
updated = true;
2016-02-17 23:36:55 +03:00
}
else
LogPrint(eLogDebug, "NetDb: LeaseSet is older: ", ident.ToBase32());
}
else
LogPrint(eLogError, "NetDb: LeaseSet is invalid: ", ident.ToBase32());
}
else
{
auto leaseSet = std::make_shared<LeaseSet> (buf, len, false); // we don't need leases in netdb
if (leaseSet->IsValid ())
2018-01-06 06:48:51 +03:00
{
LogPrint (eLogInfo, "NetDb: LeaseSet added: ", ident.ToBase32());
m_LeaseSets[ident] = leaseSet;
updated = true;
2018-01-06 06:48:51 +03:00
}
else
LogPrint (eLogError, "NetDb: New LeaseSet validation failed: ", ident.ToBase32());
2018-01-06 06:48:51 +03:00
}
2016-02-17 23:36:55 +03:00
return updated;
2018-01-06 06:48:51 +03:00
}
2013-11-13 16:59:21 +04:00
2018-12-21 23:00:03 +03:00
bool NetDb::AddLeaseSet2 (const IdentHash& ident, const uint8_t * buf, int len, uint8_t storeType)
{
auto leaseSet = std::make_shared<LeaseSet2> (storeType, buf, len, false); // we don't need leases in netdb
if (leaseSet->IsValid ())
{
std::unique_lock<std::mutex> lock(m_LeaseSetsMutex);
auto it = m_LeaseSets.find(ident);
2019-03-07 22:51:05 +03:00
if (it == m_LeaseSets.end () || it->second->GetStoreType () != storeType ||
leaseSet->GetPublishedTimestamp () > it->second->GetPublishedTimestamp ())
{
if (leaseSet->IsPublic () && !leaseSet->IsExpired () &&
i2p::util::GetSecondsSinceEpoch () + NETDB_EXPIRATION_TIMEOUT_THRESHOLD > leaseSet->GetPublishedTimestamp ())
{
// TODO: implement actual update
LogPrint (eLogInfo, "NetDb: LeaseSet2 updated: ", ident.ToBase32());
m_LeaseSets[ident] = leaseSet;
return true;
}
else
{
LogPrint (eLogWarning, "NetDb: Unpublished or expired or future LeaseSet2 received: ", ident.ToBase32());
m_LeaseSets.erase (ident);
}
}
}
else
LogPrint (eLogError, "NetDb: New LeaseSet2 validation failed: ", ident.ToBase32());
return false;
2018-12-21 23:00:03 +03:00
}
std::shared_ptr<RouterInfo> NetDb::FindRouter (const IdentHash& ident) const
2013-11-13 16:59:21 +04:00
{
2014-11-21 21:29:19 +03:00
std::unique_lock<std::mutex> l(m_RouterInfosMutex);
2013-11-29 16:52:09 +04:00
auto it = m_RouterInfos.find (ident);
2013-11-13 16:59:21 +04:00
if (it != m_RouterInfos.end ())
return it->second;
2013-11-13 16:59:21 +04:00
else
return nullptr;
}
2013-12-22 20:29:57 +04:00
2015-01-27 19:27:58 +03:00
std::shared_ptr<LeaseSet> NetDb::FindLeaseSet (const IdentHash& destination) const
2013-12-22 20:29:57 +04:00
{
2016-07-15 20:52:55 +03:00
std::unique_lock<std::mutex> lock(m_LeaseSetsMutex);
2013-12-22 20:29:57 +04:00
auto it = m_LeaseSets.find (destination);
if (it != m_LeaseSets.end ())
return it->second;
else
return nullptr;
2014-01-29 22:36:20 +04:00
}
2015-11-03 17:15:49 +03:00
std::shared_ptr<RouterProfile> NetDb::FindRouterProfile (const IdentHash& ident) const
{
if (!m_PersistProfiles)
return nullptr;
2015-11-03 17:15:49 +03:00
auto router = FindRouter (ident);
return router ? router->GetProfile () : nullptr;
2018-01-06 06:48:51 +03:00
}
2014-10-24 23:39:53 +04:00
void NetDb::SetUnreachable (const IdentHash& ident, bool unreachable)
{
auto it = m_RouterInfos.find (ident);
if (it != m_RouterInfos.end ())
{
2023-02-06 21:19:41 +03:00
it->second->SetUnreachable (unreachable);
if (unreachable)
{
2023-02-06 21:19:41 +03:00
auto profile = it->second->GetProfile ();
if (profile)
profile->Unreachable ();
}
}
2014-10-24 23:39:53 +04:00
}
2015-01-19 21:57:37 +03:00
void NetDb::Reseed ()
{
if (!m_Reseeder)
2018-01-06 06:48:51 +03:00
{
2015-01-19 21:57:37 +03:00
m_Reseeder = new Reseeder ();
m_Reseeder->LoadCertificates (); // we need certificates for SU3 verification
}
2016-11-14 20:05:44 +03:00
// try reseeding from floodfill first if specified
std::string riPath; i2p::config::GetOption("reseed.floodfill", riPath);
if (!riPath.empty())
{
2016-11-14 20:05:44 +03:00
auto ri = std::make_shared<RouterInfo>(riPath);
if (ri->IsFloodfill())
{
2016-11-14 20:05:44 +03:00
const uint8_t * riData = ri->GetBuffer();
int riLen = ri->GetBufferLen();
if (!i2p::data::netdb.AddRouterInfo(riData, riLen))
{
2016-11-14 20:05:44 +03:00
// bad router info
LogPrint(eLogError, "NetDb: Bad router info");
2016-11-14 20:05:44 +03:00
return;
}
m_FloodfillBootstrap = ri;
ReseedFromFloodfill(*ri);
2019-04-08 22:22:42 +03:00
// don't try reseed servers if trying to bootstrap from floodfill
2016-11-14 20:05:44 +03:00
return;
}
}
2017-02-02 01:17:25 +03:00
m_Reseeder->Bootstrap ();
2015-01-19 21:57:37 +03:00
}
2016-11-14 20:05:44 +03:00
void NetDb::ReseedFromFloodfill(const RouterInfo & ri, int numRouters, int numFloodfills)
{
LogPrint(eLogInfo, "NetDB: Reseeding from floodfill ", ri.GetIdentHashBase64());
2016-11-14 20:05:44 +03:00
std::vector<std::shared_ptr<i2p::I2NPMessage> > requests;
i2p::data::IdentHash ourIdent = i2p::context.GetIdentHash();
i2p::data::IdentHash ih = ri.GetIdentHash();
i2p::data::IdentHash randomIdent;
2018-01-06 06:48:51 +03:00
2016-11-14 20:05:44 +03:00
// make floodfill lookups
while(numFloodfills > 0) {
randomIdent.Randomize();
auto msg = i2p::CreateRouterInfoDatabaseLookupMsg(randomIdent, ourIdent, 0, false);
requests.push_back(msg);
numFloodfills --;
}
2018-01-06 06:48:51 +03:00
2016-11-14 20:05:44 +03:00
// make regular router lookups
while(numRouters > 0) {
randomIdent.Randomize();
auto msg = i2p::CreateRouterInfoDatabaseLookupMsg(randomIdent, ourIdent, 0, true);
requests.push_back(msg);
numRouters --;
}
2018-01-06 06:48:51 +03:00
2016-11-14 20:05:44 +03:00
// send them off
i2p::transport::transports.SendMessages(ih, requests);
}
bool NetDb::LoadRouterInfo (const std::string& path, uint64_t ts)
{
2016-02-11 03:00:00 +03:00
auto r = std::make_shared<RouterInfo>(path);
if (r->GetRouterIdentity () && !r->IsUnreachable () && r->HasValidAddresses () &&
ts < r->GetTimestamp () + 24*60*60*NETDB_MAX_OFFLINE_EXPIRATION_TIMEOUT*1000LL) // too old
{
2016-02-11 03:00:00 +03:00
r->DeleteBuffer ();
if (m_RouterInfos.emplace (r->GetIdentHash (), r).second)
{
if (r->IsFloodfill () && r->IsEligibleFloodfill ())
2023-02-22 23:58:20 +03:00
m_Floodfills.Insert (r);
}
2018-01-06 06:48:51 +03:00
}
else
2016-02-22 18:27:43 +03:00
{
LogPrint(eLogWarning, "NetDb: RI from ", path, " is invalid or too old. Delete");
2016-02-11 03:00:00 +03:00
i2p::fs::Remove(path);
2014-01-29 22:36:20 +04:00
}
2016-02-11 03:00:00 +03:00
return true;
}
2016-07-15 20:52:55 +03:00
void NetDb::VisitLeaseSets(LeaseSetVisitor v)
{
std::unique_lock<std::mutex> lock(m_LeaseSetsMutex);
for ( auto & entry : m_LeaseSets)
v(entry.first, entry.second);
}
2016-08-29 21:16:29 +03:00
void NetDb::VisitStoredRouterInfos(RouterInfoVisitor v)
{
m_Storage.Iterate([v] (const std::string & filename)
{
auto ri = std::make_shared<i2p::data::RouterInfo>(filename);
2016-08-29 21:16:29 +03:00
v(ri);
});
}
void NetDb::VisitRouterInfos(RouterInfoVisitor v)
{
std::unique_lock<std::mutex> lock(m_RouterInfosMutex);
for ( const auto & item : m_RouterInfos )
2016-08-31 02:59:24 +03:00
v(item.second);
2016-08-29 21:16:29 +03:00
}
2016-08-30 22:54:53 +03:00
size_t NetDb::VisitRandomRouterInfos(RouterInfoFilter filter, RouterInfoVisitor v, size_t n)
{
std::vector<std::shared_ptr<const RouterInfo> > found;
const size_t max_iters_per_cyle = 3;
size_t iters = max_iters_per_cyle;
2016-09-01 22:54:48 +03:00
while(n > 0)
2016-08-30 22:54:53 +03:00
{
std::unique_lock<std::mutex> lock(m_RouterInfosMutex);
uint32_t idx = rand () % m_RouterInfos.size ();
uint32_t i = 0;
for (const auto & it : m_RouterInfos) {
if(i >= idx) // are we at the random start point?
{
// yes, check if we want this one
2016-08-31 02:59:24 +03:00
if(filter(it.second))
2016-08-30 22:54:53 +03:00
{
// we have a match
--n;
found.push_back(it.second);
// reset max iterations per cycle
iters = max_iters_per_cyle;
break;
}
}
else // not there yet
++i;
}
2016-09-01 22:54:48 +03:00
// we have enough
if(n == 0) break;
2016-08-30 22:54:53 +03:00
--iters;
// have we tried enough this cycle ?
if(!iters) {
// yes let's try the next cycle
--n;
iters = max_iters_per_cyle;
}
}
// visit the ones we found
size_t visited = 0;
for(const auto & ri : found ) {
2016-08-31 02:59:24 +03:00
v(ri);
2016-08-30 22:54:53 +03:00
++visited;
}
return visited;
}
2018-01-06 06:48:51 +03:00
2016-02-11 03:00:00 +03:00
void NetDb::Load ()
{
2014-01-31 22:08:33 +04:00
// make sure we cleanup netDb from previous attempts
2018-01-06 06:48:51 +03:00
m_RouterInfos.clear ();
2023-02-22 23:58:20 +03:00
m_Floodfills.Clear ();
2014-01-31 22:08:33 +04:00
uint64_t ts = i2p::util::GetMillisecondsSinceEpoch();
2016-02-11 03:00:00 +03:00
std::vector<std::string> files;
m_Storage.Traverse(files);
2016-08-05 21:23:54 +03:00
for (const auto& path : files)
LoadRouterInfo (path, ts);
2016-02-11 03:00:00 +03:00
2023-02-22 23:58:20 +03:00
LogPrint (eLogInfo, "NetDb: ", m_RouterInfos.size(), " routers loaded (", m_Floodfills.GetSize (), " floodfils)");
2018-01-06 06:48:51 +03:00
}
2013-11-13 16:59:21 +04:00
void NetDb::SaveUpdated ()
2018-01-06 06:48:51 +03:00
{
int updatedCount = 0, deletedCount = 0, deletedFloodfillsCount = 0;
2014-01-23 05:19:39 +04:00
auto total = m_RouterInfos.size ();
2023-02-22 23:58:20 +03:00
auto totalFloodfills = m_Floodfills.GetSize ();
2018-01-06 06:48:51 +03:00
uint64_t expirationTimeout = NETDB_MAX_EXPIRATION_TIMEOUT*1000LL;
2016-02-11 03:00:00 +03:00
uint64_t ts = i2p::util::GetMillisecondsSinceEpoch();
auto uptime = i2p::context.GetUptime ();
bool isLowRate = i2p::tunnel::tunnels.GetTunnelCreationSuccessRate () < NETDB_MIN_TUNNEL_CREATION_SUCCESS_RATE;
2018-01-06 06:48:51 +03:00
// routers don't expire if less than 90 or uptime is less than 1 hour
2019-06-19 18:43:04 +03:00
bool checkForExpiration = total > NETDB_MIN_ROUTERS && uptime > 600; // 10 minutes
if (checkForExpiration && uptime > 3600) // 1 hour
2016-02-24 19:31:14 +03:00
expirationTimeout = i2p::context.IsFloodfill () ? NETDB_FLOODFILL_EXPIRATION_TIMEOUT*1000LL :
NETDB_MIN_EXPIRATION_TIMEOUT*1000LL + (NETDB_MAX_EXPIRATION_TIMEOUT - NETDB_MIN_EXPIRATION_TIMEOUT)*1000LL*NETDB_MIN_ROUTERS/total;
2016-02-11 03:00:00 +03:00
auto own = i2p::context.GetSharedRouterInfo ();
2016-08-05 21:23:54 +03:00
for (auto& it: m_RouterInfos)
2018-01-06 06:48:51 +03:00
{
2021-07-14 21:46:56 +03:00
if (it.second == own) continue; // skip own
2016-02-11 03:00:00 +03:00
std::string ident = it.second->GetIdentHashBase64();
2018-01-06 06:48:51 +03:00
if (it.second->IsUpdated ())
{
if (it.second->GetBuffer ())
{
// we have something to save
it.second->SaveToFile (m_Storage.Path(ident));
it.second->SetUnreachable (false);
it.second->DeleteBuffer ();
}
2013-11-20 16:46:09 +04:00
it.second->SetUpdated (false);
2016-02-11 03:00:00 +03:00
updatedCount++;
continue;
2013-11-20 16:46:09 +04:00
}
2023-02-06 21:19:41 +03:00
if (it.second->GetProfile ()->IsUnreachable ())
it.second->SetUnreachable (true);
// make router reachable back if too few routers or floodfills
if (it.second->IsUnreachable () && (total - deletedCount < NETDB_MIN_ROUTERS || isLowRate ||
(it.second->IsFloodfill () && totalFloodfills - deletedFloodfillsCount < NETDB_MIN_FLOODFILLS)))
it.second->SetUnreachable (false);
2023-02-22 05:33:30 +03:00
if (!it.second->IsUnreachable ())
{
// find & mark expired routers
if (!it.second->IsReachable () && (it.second->GetCompatibleTransports (true) & RouterInfo::eSSU2V4))
// non-reachable router, but reachable by ipv4 SSU2 means introducers
{
if (ts > it.second->GetTimestamp () + NETDB_INTRODUCEE_EXPIRATION_TIMEOUT*1000LL)
// RouterInfo expires after 1 hour if uses introducer
it.second->SetUnreachable (true);
}
else if (checkForExpiration && ts > it.second->GetTimestamp () + expirationTimeout)
2016-02-24 19:31:14 +03:00
it.second->SetUnreachable (true);
2023-02-22 05:33:30 +03:00
else if (ts + NETDB_EXPIRATION_TIMEOUT_THRESHOLD*1000LL < it.second->GetTimestamp ())
{
LogPrint (eLogWarning, "NetDb: RouterInfo is from future for ", (it.second->GetTimestamp () - ts)/1000LL, " seconds");
it.second->SetUnreachable (true);
}
if (it.second->IsUnreachable () && i2p::transport::transports.IsConnected (it.second->GetIdentHash ()))
it.second->SetUnreachable (false); // don't expire connected router
}
2016-02-11 03:00:00 +03:00
2018-01-06 06:48:51 +03:00
if (it.second->IsUnreachable ())
{
if (it.second->IsFloodfill ()) deletedFloodfillsCount++;
2016-02-11 03:00:00 +03:00
// delete RI file
m_Storage.Remove(ident);
2016-02-11 03:00:00 +03:00
deletedCount++;
if (total - deletedCount < NETDB_MIN_ROUTERS) checkForExpiration = false;
2016-02-11 03:00:00 +03:00
}
} // m_RouterInfos iteration
2018-01-06 06:48:51 +03:00
2022-01-01 23:12:59 +03:00
m_RouterInfoBuffersPool.CleanUpMt ();
2022-12-07 22:08:27 +03:00
m_RouterInfoAddressesPool.CleanUpMt ();
m_RouterInfoAddressVectorsPool.CleanUpMt ();
2016-02-11 03:00:00 +03:00
if (updatedCount > 0)
LogPrint (eLogInfo, "NetDb: Saved ", updatedCount, " new/updated routers");
2013-12-22 20:29:57 +04:00
if (deletedCount > 0)
2014-11-21 21:29:19 +03:00
{
LogPrint (eLogInfo, "NetDb: Deleting ", deletedCount, " unreachable routers");
2014-11-21 21:29:19 +03:00
// clean up RouterInfos table
{
std::unique_lock<std::mutex> l(m_RouterInfosMutex);
for (auto it = m_RouterInfos.begin (); it != m_RouterInfos.end ();)
{
2018-01-06 06:48:51 +03:00
if (it->second->IsUnreachable ())
it = m_RouterInfos.erase (it);
2023-02-12 00:22:02 +03:00
else
{
it->second->DropProfile ();
it++;
}
}
2018-01-06 06:48:51 +03:00
}
// clean up expired floodfills or not floodfills anymore
{
std::unique_lock<std::mutex> l(m_FloodfillsMutex);
2023-02-22 23:58:20 +03:00
m_Floodfills.Cleanup ([](const std::shared_ptr<RouterInfo>& r)->bool
{
return r && r->IsFloodfill () && !r->IsUnreachable ();
});
2018-01-06 06:48:51 +03:00
}
}
2013-11-20 16:46:09 +04:00
}
void NetDb::RequestDestination (const IdentHash& destination, RequestedDestination::RequestComplete requestComplete, bool direct)
2014-01-03 06:22:48 +04:00
{
2015-04-09 19:45:00 +03:00
auto dest = m_Requests.CreateRequest (destination, false, requestComplete); // non-exploratory
if (!dest)
2015-02-04 00:14:33 +03:00
{
LogPrint (eLogWarning, "NetDb: Destination ", destination.ToBase64(), " is requested already");
2018-01-06 06:48:51 +03:00
return;
2015-02-10 06:19:29 +03:00
}
2015-04-09 19:45:00 +03:00
2015-04-11 02:49:58 +03:00
auto floodfill = GetClosestFloodfill (destination, dest->GetExcludedPeers ());
if (floodfill)
{
if (direct && !floodfill->IsReachableFrom (i2p::context.GetRouterInfo ()) &&
!i2p::transport::transports.IsConnected (floodfill->GetIdentHash ()))
direct = false; // floodfill can't be reached directly
if (direct)
transports.SendMessage (floodfill->GetIdentHash (), dest->CreateRequestMessage (floodfill->GetIdentHash ()));
else
{
auto pool = i2p::tunnel::tunnels.GetExploratoryPool ();
2021-11-06 22:44:56 +03:00
auto outbound = pool ? pool->GetNextOutboundTunnel (nullptr, floodfill->GetCompatibleTransports (false)) : nullptr;
auto inbound = pool ? pool->GetNextInboundTunnel (nullptr, floodfill->GetCompatibleTransports (true)) : nullptr;
if (outbound && inbound)
outbound->SendTunnelDataMsg (floodfill->GetIdentHash (), 0, dest->CreateRequestMessage (floodfill, inbound));
else
{
LogPrint (eLogError, "NetDb: ", destination.ToBase64(), " destination requested, but no tunnels found");
m_Requests.RequestComplete (destination, nullptr);
}
}
}
else
{
2016-01-18 03:00:00 +03:00
LogPrint (eLogError, "NetDb: ", destination.ToBase64(), " destination requested, but no floodfills found");
2015-04-09 19:45:00 +03:00
m_Requests.RequestComplete (destination, nullptr);
2018-01-06 06:48:51 +03:00
}
}
2016-11-14 20:05:44 +03:00
void NetDb::RequestDestinationFrom (const IdentHash& destination, const IdentHash & from, bool exploritory, RequestedDestination::RequestComplete requestComplete)
{
2018-01-06 06:48:51 +03:00
2016-11-14 20:05:44 +03:00
auto dest = m_Requests.CreateRequest (destination, exploritory, requestComplete); // non-exploratory
if (!dest)
{
LogPrint (eLogWarning, "NetDb: Destination ", destination.ToBase64(), " is requested already");
2018-01-06 06:48:51 +03:00
return;
2016-11-14 20:05:44 +03:00
}
LogPrint(eLogInfo, "NetDb: Destination ", destination.ToBase64(), " being requested directly from ", from.ToBase64());
2016-11-14 20:05:44 +03:00
// direct
2018-01-06 06:48:51 +03:00
transports.SendMessage (from, dest->CreateRequestMessage (nullptr, nullptr));
}
2018-11-21 19:23:48 +03:00
void NetDb::HandleNTCP2RouterInfoMsg (std::shared_ptr<const I2NPMessage> m)
{
uint8_t flood = m->GetPayload ()[0] & NTCP2_ROUTER_INFO_FLAG_REQUEST_FLOOD;
2018-11-21 21:24:54 +03:00
bool updated;
auto ri = AddRouterInfo (m->GetPayload () + 1, m->GetPayloadLength () - 1, updated); // without flags
if (flood && updated && context.IsFloodfill () && ri)
2018-11-21 19:23:48 +03:00
{
2018-11-21 21:24:54 +03:00
auto floodMsg = CreateDatabaseStoreMsg (ri, 0); // replyToken = 0
Flood (ri->GetIdentHash (), floodMsg);
2018-11-21 19:23:48 +03:00
}
}
2018-01-06 06:48:51 +03:00
2015-07-04 04:27:40 +03:00
void NetDb::HandleDatabaseStoreMsg (std::shared_ptr<const I2NPMessage> m)
2018-01-06 06:48:51 +03:00
{
const uint8_t * buf = m->GetPayload ();
2018-01-06 06:48:51 +03:00
size_t len = m->GetSize ();
2022-11-22 23:40:48 +03:00
if (len < DATABASE_STORE_HEADER_SIZE)
{
LogPrint (eLogError, "NetDb: Database store msg is too short ", len, ". Dropped");
return;
}
2015-04-12 23:59:59 +03:00
IdentHash ident (buf + DATABASE_STORE_KEY_OFFSET);
if (ident.IsZero ())
{
LogPrint (eLogDebug, "NetDb: Database store with zero ident, dropped");
2015-04-12 23:59:59 +03:00
return;
2018-01-06 06:48:51 +03:00
}
2015-01-03 05:11:40 +03:00
uint32_t replyToken = bufbe32toh (buf + DATABASE_STORE_REPLY_TOKEN_OFFSET);
size_t offset = DATABASE_STORE_HEADER_SIZE;
if (replyToken)
2015-01-30 23:13:09 +03:00
{
2022-11-22 23:40:48 +03:00
if (len < offset + 36) // 32 + 4
{
LogPrint (eLogError, "NetDb: Database store msg with reply token is too short ", len, ". Dropped");
return;
}
2018-01-06 06:48:51 +03:00
auto deliveryStatus = CreateDeliveryStatusMsg (replyToken);
2015-01-30 23:13:09 +03:00
uint32_t tunnelID = bufbe32toh (buf + offset);
offset += 4;
2015-01-30 23:13:09 +03:00
if (!tunnelID) // send response directly
2015-06-24 17:45:58 +03:00
transports.SendMessage (buf + offset, deliveryStatus);
2015-01-30 23:13:09 +03:00
else
{
auto pool = i2p::tunnel::tunnels.GetExploratoryPool ();
auto outbound = pool ? pool->GetNextOutboundTunnel () : nullptr;
if (outbound)
2015-06-24 17:45:58 +03:00
outbound->SendTunnelDataMsg (buf + offset, tunnelID, deliveryStatus);
2015-01-30 23:13:09 +03:00
else
LogPrint (eLogWarning, "NetDb: No outbound tunnels for DatabaseStore reply found");
2018-01-06 06:48:51 +03:00
}
offset += 32;
2015-01-30 23:13:09 +03:00
}
2018-01-06 06:48:51 +03:00
// we must send reply back before this check
2016-06-30 20:15:36 +03:00
if (ident == i2p::context.GetIdentHash ())
{
LogPrint (eLogDebug, "NetDb: Database store with own RouterInfo received, dropped");
2016-06-30 20:15:36 +03:00
return;
}
2018-01-06 06:48:51 +03:00
size_t payloadOffset = offset;
2016-02-17 23:36:55 +03:00
bool updated = false;
uint8_t storeType = buf[DATABASE_STORE_TYPE_OFFSET];
2018-12-21 23:00:03 +03:00
if (storeType) // LeaseSet or LeaseSet2
2013-11-19 05:37:38 +04:00
{
if (len > MAX_LS_BUFFER_SIZE + offset)
{
LogPrint (eLogError, "NetDb: Database store message is too long ", len);
return;
}
if (!m->from) // unsolicited LS must be received directly
{
if (storeType == NETDB_STORE_TYPE_LEASESET) // 1
{
LogPrint (eLogDebug, "NetDb: Store request: LeaseSet for ", ident.ToBase32());
updated = AddLeaseSet (ident, buf + offset, len - offset);
}
else // all others are considered as LeaseSet2
{
2023-02-10 02:57:43 +03:00
LogPrint (eLogDebug, "NetDb: Store request: LeaseSet2 of type ", int(storeType), " for ", ident.ToBase32());
updated = AddLeaseSet2 (ident, buf + offset, len - offset, storeType);
}
}
2018-01-06 06:48:51 +03:00
}
2018-12-21 23:00:03 +03:00
else // RouterInfo
{
LogPrint (eLogDebug, "NetDb: Store request: RouterInfo");
size_t size = bufbe16toh (buf + offset);
2015-02-03 04:15:49 +03:00
offset += 2;
if (size > MAX_RI_BUFFER_SIZE || size > len - offset)
{
LogPrint (eLogError, "NetDb: Invalid RouterInfo length ", (int)size);
return;
2018-01-06 06:48:51 +03:00
}
uint8_t uncompressed[MAX_RI_BUFFER_SIZE];
size_t uncompressedSize = m_Inflator.Inflate (buf + offset, size, uncompressed, MAX_RI_BUFFER_SIZE);
if (uncompressedSize && uncompressedSize < MAX_RI_BUFFER_SIZE)
2016-02-17 23:36:55 +03:00
updated = AddRouterInfo (ident, uncompressed, uncompressedSize);
else
2018-01-06 06:48:51 +03:00
{
LogPrint (eLogInfo, "NetDb: Decompression failed ", uncompressedSize);
return;
2018-01-06 06:48:51 +03:00
}
}
2016-02-17 23:36:55 +03:00
if (replyToken && context.IsFloodfill () && updated)
{
// flood updated
auto floodMsg = NewI2NPShortMessage ();
2018-01-06 06:48:51 +03:00
uint8_t * payload = floodMsg->GetPayload ();
2016-02-17 23:36:55 +03:00
memcpy (payload, buf, 33); // key + type
htobe32buf (payload + DATABASE_STORE_REPLY_TOKEN_OFFSET, 0); // zero reply token
2016-06-30 16:45:06 +03:00
size_t msgLen = len - payloadOffset;
2016-02-17 23:36:55 +03:00
floodMsg->len += DATABASE_STORE_HEADER_SIZE + msgLen;
if (floodMsg->len < floodMsg->maxLen)
2018-01-06 06:48:51 +03:00
{
2016-02-17 23:36:55 +03:00
memcpy (payload + DATABASE_STORE_HEADER_SIZE, buf + payloadOffset, msgLen);
2018-01-06 06:48:51 +03:00
floodMsg->FillI2NPMessageHeader (eI2NPDatabaseStore);
2018-11-21 21:24:54 +03:00
Flood (ident, floodMsg);
2018-01-06 06:48:51 +03:00
}
2016-02-17 23:36:55 +03:00
else
2016-06-30 16:45:06 +03:00
LogPrint (eLogError, "NetDb: Database store message is too long ", floodMsg->len);
2018-01-06 06:48:51 +03:00
}
}
2013-11-19 05:37:38 +04:00
2015-07-04 04:27:40 +03:00
void NetDb::HandleDatabaseSearchReplyMsg (std::shared_ptr<const I2NPMessage> msg)
{
2015-07-04 04:27:40 +03:00
const uint8_t * buf = msg->GetPayload ();
char key[48];
int l = i2p::data::ByteStreamToBase64 (buf, 32, key, 48);
key[l] = 0;
int num = buf[32]; // num
2015-12-18 07:03:07 +03:00
LogPrint (eLogDebug, "NetDb: DatabaseSearchReply for ", key, " num=", num);
2015-04-09 19:45:00 +03:00
IdentHash ident (buf);
2018-01-06 06:48:51 +03:00
auto dest = m_Requests.FindRequest (ident);
2015-04-09 19:45:00 +03:00
if (dest)
2018-01-06 06:48:51 +03:00
{
bool deleteDest = true;
2014-01-05 18:53:44 +04:00
if (num > 0)
2018-01-06 06:48:51 +03:00
{
auto pool = i2p::tunnel::tunnels.GetExploratoryPool ();
2015-01-12 01:40:11 +03:00
auto outbound = pool ? pool->GetNextOutboundTunnel () : nullptr;
auto inbound = pool ? pool->GetNextInboundTunnel () : nullptr;
2014-10-15 04:52:40 +04:00
if (!dest->IsExploratory ())
{
// reply to our destination. Try other floodfills
2016-11-14 20:05:44 +03:00
if (outbound && inbound)
2014-10-15 04:52:40 +04:00
{
auto count = dest->GetExcludedPeers ().size ();
if (count < 7)
2018-01-06 06:48:51 +03:00
{
2014-10-15 04:52:40 +04:00
auto nextFloodfill = GetClosestFloodfill (dest->GetDestination (), dest->GetExcludedPeers ());
if (nextFloodfill)
2018-01-06 06:48:51 +03:00
{
2014-10-15 04:52:40 +04:00
// request destination
2015-12-18 07:03:07 +03:00
LogPrint (eLogDebug, "NetDb: Try ", key, " at ", count, " floodfill ", nextFloodfill->GetIdentHash ().ToBase64 ());
outbound->SendTunnelDataMsg (nextFloodfill->GetIdentHash (), 0,
dest->CreateRequestMessage (nextFloodfill, inbound));
2014-10-15 04:52:40 +04:00
deleteDest = false;
2018-01-06 06:48:51 +03:00
}
2014-10-15 04:52:40 +04:00
}
else
2015-12-18 07:03:07 +03:00
LogPrint (eLogWarning, "NetDb: ", key, " was not found on ", count, " floodfills");
2018-01-06 06:48:51 +03:00
}
}
if (deleteDest)
2014-10-15 04:52:40 +04:00
// no more requests for the destinationation. delete it
2015-04-09 19:45:00 +03:00
m_Requests.RequestComplete (ident, nullptr);
2014-01-05 18:53:44 +04:00
}
else
2018-07-10 12:39:21 +03:00
// no more requests for destination possible. delete it
2015-04-09 19:45:00 +03:00
m_Requests.RequestComplete (ident, nullptr);
2014-01-05 18:53:44 +04:00
}
2016-11-14 20:05:44 +03:00
else if(!m_FloodfillBootstrap)
LogPrint (eLogWarning, "NetDb: Requested destination for ", key, " not found");
2015-01-10 17:07:07 +03:00
// try responses
for (int i = 0; i < num; i++)
{
2015-07-04 04:27:40 +03:00
const uint8_t * router = buf + 33 + i*32;
2015-01-10 17:07:07 +03:00
char peerHash[48];
int l1 = i2p::data::ByteStreamToBase64 (router, 32, peerHash, 48);
peerHash[l1] = 0;
2015-12-18 07:03:07 +03:00
LogPrint (eLogDebug, "NetDb: ", i, ": ", peerHash);
2015-01-10 17:07:07 +03:00
2018-01-06 06:48:51 +03:00
auto r = FindRouter (router);
if (!r || i2p::util::GetMillisecondsSinceEpoch () > r->GetTimestamp () + 3600*1000LL)
{
2015-01-10 17:07:07 +03:00
// router with ident not found or too old (1 hour)
LogPrint (eLogDebug, "NetDb: Found new/outdated router. Requesting RouterInfo...");
2016-11-14 20:05:44 +03:00
if(m_FloodfillBootstrap)
RequestDestinationFrom(router, m_FloodfillBootstrap->GetIdentHash(), true);
else
RequestDestination (router);
2015-01-10 17:07:07 +03:00
}
else
2015-12-18 07:03:07 +03:00
LogPrint (eLogDebug, "NetDb: [:|||:]");
2018-01-06 06:48:51 +03:00
}
}
2015-07-04 04:27:40 +03:00
void NetDb::HandleDatabaseLookupMsg (std::shared_ptr<const I2NPMessage> msg)
{
2015-07-04 04:27:40 +03:00
const uint8_t * buf = msg->GetPayload ();
2015-04-12 23:59:59 +03:00
IdentHash ident (buf);
if (ident.IsZero ())
{
2015-12-18 07:03:07 +03:00
LogPrint (eLogError, "NetDb: DatabaseLookup for zero ident. Ignored");
2015-04-12 23:59:59 +03:00
return;
2018-01-06 06:48:51 +03:00
}
char key[48];
int l = i2p::data::ByteStreamToBase64 (buf, 32, key, 48);
key[l] = 0;
IdentHash replyIdent(buf + 32);
2016-07-15 19:49:45 +03:00
uint8_t flag = buf[64];
2018-01-06 06:48:51 +03:00
2017-12-07 16:26:28 +03:00
LogPrint (eLogDebug, "NetDb: DatabaseLookup for ", key, " received flags=", (int)flag);
2015-02-03 06:34:55 +03:00
uint8_t lookupType = flag & DATABASE_LOOKUP_TYPE_FLAGS_MASK;
2018-01-06 06:48:51 +03:00
const uint8_t * excluded = buf + 65;
uint32_t replyTunnelID = 0;
2015-02-03 04:15:49 +03:00
if (flag & DATABASE_LOOKUP_DELIVERY_FLAG) //reply to tunnel
{
2016-07-15 19:49:45 +03:00
replyTunnelID = bufbe32toh (excluded);
excluded += 4;
}
2018-01-06 06:48:51 +03:00
uint16_t numExcluded = bufbe16toh (excluded);
excluded += 2;
if (numExcluded > 512 || (excluded - buf) + numExcluded*32 > (int)msg->GetPayloadLength ())
{
LogPrint (eLogWarning, "NetDb: Number of excluded peers", numExcluded, " is too much");
2016-07-15 19:49:45 +03:00
return;
2018-01-06 06:48:51 +03:00
}
2015-06-22 05:29:50 +03:00
std::shared_ptr<I2NPMessage> replyMsg;
2015-02-03 06:34:55 +03:00
if (lookupType == DATABASE_LOOKUP_TYPE_EXPLORATORY_LOOKUP)
2014-07-25 06:01:07 +04:00
{
LogPrint (eLogInfo, "NetDb: Exploratory close to ", key, " ", numExcluded, " excluded");
std::set<IdentHash> excludedRouters;
const uint8_t * excluded_ident = excluded;
for (int i = 0; i < numExcluded; i++)
{
excludedRouters.insert (excluded_ident);
excluded_ident += 32;
2018-01-06 06:48:51 +03:00
}
2015-02-02 03:58:26 +03:00
std::vector<IdentHash> routers;
for (int i = 0; i < 3; i++)
{
2015-04-12 23:59:59 +03:00
auto r = GetClosestNonFloodfill (ident, excludedRouters);
2015-02-03 06:34:55 +03:00
if (r)
2018-01-06 06:48:51 +03:00
{
2015-02-03 06:34:55 +03:00
routers.push_back (r->GetIdentHash ());
excludedRouters.insert (r->GetIdentHash ());
2018-01-06 06:48:51 +03:00
}
}
2015-11-03 17:15:49 +03:00
replyMsg = CreateDatabaseSearchReply (ident, routers);
2018-01-06 06:48:51 +03:00
}
2014-07-31 20:59:43 +04:00
else
2018-01-06 06:48:51 +03:00
{
if (lookupType == DATABASE_LOOKUP_TYPE_ROUTERINFO_LOOKUP ||
lookupType == DATABASE_LOOKUP_TYPE_NORMAL_LOOKUP)
2018-01-06 06:48:51 +03:00
{
2015-04-12 23:59:59 +03:00
auto router = FindRouter (ident);
2023-02-14 03:18:02 +03:00
if (router && !router->IsUnreachable ())
2015-04-12 22:54:28 +03:00
{
LogPrint (eLogDebug, "NetDb: Requested RouterInfo ", key, " found");
if (PopulateRouterInfoBuffer (router))
2015-11-03 17:15:49 +03:00
replyMsg = CreateDatabaseStoreMsg (router);
2015-04-12 22:54:28 +03:00
}
2015-02-03 06:34:55 +03:00
}
2018-01-06 06:48:51 +03:00
if (!replyMsg && (lookupType == DATABASE_LOOKUP_TYPE_LEASESET_LOOKUP ||
lookupType == DATABASE_LOOKUP_TYPE_NORMAL_LOOKUP))
2015-02-03 06:34:55 +03:00
{
2015-04-12 23:59:59 +03:00
auto leaseSet = FindLeaseSet (ident);
2016-06-29 21:56:00 +03:00
if (!leaseSet)
{
// no lease set found
LogPrint(eLogDebug, "NetDb: Requested LeaseSet not found for ", ident.ToBase32());
2016-06-29 21:56:00 +03:00
}
2016-06-30 00:42:26 +03:00
else if (!leaseSet->IsExpired ()) // we don't send back our LeaseSets
2015-02-03 06:34:55 +03:00
{
LogPrint (eLogDebug, "NetDb: Requested LeaseSet ", key, " found");
replyMsg = CreateDatabaseStoreMsg (ident, leaseSet);
2015-02-03 06:34:55 +03:00
}
}
2018-01-06 06:48:51 +03:00
2015-02-03 06:34:55 +03:00
if (!replyMsg)
2018-01-06 06:48:51 +03:00
{
2016-12-06 02:39:01 +03:00
std::set<IdentHash> excludedRouters;
const uint8_t * exclude_ident = excluded;
for (int i = 0; i < numExcluded; i++)
{
excludedRouters.insert (exclude_ident);
exclude_ident += 32;
2015-06-11 18:43:35 +03:00
}
2016-12-06 02:39:01 +03:00
auto closestFloodfills = GetClosestFloodfills (ident, 3, excludedRouters, true);
if (closestFloodfills.empty ())
LogPrint (eLogWarning, "NetDb: Requested ", key, " not found, ", numExcluded, " peers excluded");
2016-03-22 20:10:02 +03:00
replyMsg = CreateDatabaseSearchReply (ident, closestFloodfills);
}
2015-02-03 06:34:55 +03:00
}
2018-01-06 06:48:51 +03:00
excluded += numExcluded * 32;
if (replyMsg)
2018-01-06 06:48:51 +03:00
{
if (replyTunnelID)
{
// encryption might be used though tunnel only
if (flag & (DATABASE_LOOKUP_ENCRYPTION_FLAG | DATABASE_LOOKUP_ECIES_FLAG)) // encrypted reply requested
{
2015-07-04 04:27:40 +03:00
const uint8_t * sessionKey = excluded;
2016-07-15 19:49:45 +03:00
const uint8_t numTags = excluded[32];
if (numTags)
{
if (flag & DATABASE_LOOKUP_ECIES_FLAG)
{
uint64_t tag;
memcpy (&tag, excluded + 33, 8);
replyMsg = i2p::garlic::WrapECIESX25519Message (replyMsg, sessionKey, tag);
}
else
{
const i2p::garlic::SessionTag sessionTag(excluded + 33); // take first tag
i2p::garlic::ElGamalAESSession garlic (sessionKey, sessionTag);
replyMsg = garlic.WrapSingleMessage (replyMsg);
}
if (!replyMsg)
LogPrint (eLogError, "NetDb: Failed to wrap message");
}
2016-07-15 19:49:45 +03:00
else
LogPrint(eLogWarning, "NetDb: Encrypted reply requested but no tags provided");
2018-01-06 06:48:51 +03:00
}
auto exploratoryPool = i2p::tunnel::tunnels.GetExploratoryPool ();
auto outbound = exploratoryPool ? exploratoryPool->GetNextOutboundTunnel () : nullptr;
if (outbound)
outbound->SendTunnelDataMsg (replyIdent, replyTunnelID, replyMsg);
else
transports.SendMessage (replyIdent, i2p::CreateTunnelGatewayMsg (replyTunnelID, replyMsg));
}
else
transports.SendMessage (replyIdent, replyMsg);
}
2018-01-06 06:48:51 +03:00
}
2014-06-17 06:30:34 +04:00
void NetDb::Explore (int numDestinations)
2018-01-06 06:48:51 +03:00
{
2014-07-03 21:41:36 +04:00
// new requests
2014-06-17 06:30:34 +04:00
auto exploratoryPool = i2p::tunnel::tunnels.GetExploratoryPool ();
2015-01-11 00:08:13 +03:00
auto outbound = exploratoryPool ? exploratoryPool->GetNextOutboundTunnel () : nullptr;
auto inbound = exploratoryPool ? exploratoryPool->GetNextInboundTunnel () : nullptr;
2014-06-17 06:30:34 +04:00
bool throughTunnels = outbound && inbound;
2018-01-06 06:48:51 +03:00
uint8_t randomHash[32];
2014-06-17 06:30:34 +04:00
std::vector<i2p::tunnel::TunnelMessageBlock> msgs;
LogPrint (eLogInfo, "NetDb: Exploring new ", numDestinations, " routers ...");
2014-06-17 06:30:34 +04:00
for (int i = 0; i < numDestinations; i++)
2018-01-06 06:48:51 +03:00
{
2015-11-03 17:15:49 +03:00
RAND_bytes (randomHash, 32);
2015-04-09 19:45:00 +03:00
auto dest = m_Requests.CreateRequest (randomHash, true); // exploratory
if (!dest)
2018-01-06 06:48:51 +03:00
{
LogPrint (eLogWarning, "NetDb: Exploratory destination is requested already");
2018-01-06 06:48:51 +03:00
return;
}
2014-06-17 06:30:34 +04:00
auto floodfill = GetClosestFloodfill (randomHash, dest->GetExcludedPeers ());
2018-01-06 06:48:51 +03:00
if (floodfill)
{
if (i2p::transport::transports.IsConnected (floodfill->GetIdentHash ()))
throughTunnels = false;
2014-06-17 06:30:34 +04:00
if (throughTunnels)
2018-01-06 06:48:51 +03:00
{
msgs.push_back (i2p::tunnel::TunnelMessageBlock
{
2014-06-17 06:30:34 +04:00
i2p::tunnel::eDeliveryTypeRouter,
floodfill->GetIdentHash (), 0,
2018-01-06 06:48:51 +03:00
CreateDatabaseStoreMsg () // tell floodfill about us
});
msgs.push_back (i2p::tunnel::TunnelMessageBlock
{
2014-06-17 06:30:34 +04:00
i2p::tunnel::eDeliveryTypeRouter,
2018-01-06 06:48:51 +03:00
floodfill->GetIdentHash (), 0,
2015-06-22 22:47:45 +03:00
dest->CreateRequestMessage (floodfill, inbound) // explore
2018-01-06 06:48:51 +03:00
});
}
2014-06-17 06:30:34 +04:00
else
i2p::transport::transports.SendMessage (floodfill->GetIdentHash (), dest->CreateRequestMessage (floodfill->GetIdentHash ()));
2018-01-06 06:48:51 +03:00
}
2014-02-12 07:19:51 +04:00
else
2015-04-09 19:45:00 +03:00
m_Requests.RequestComplete (randomHash, nullptr);
2018-01-06 06:48:51 +03:00
}
2014-06-17 06:30:34 +04:00
if (throughTunnels && msgs.size () > 0)
2018-01-06 06:48:51 +03:00
outbound->SendTunnelDataMsg (msgs);
}
2013-11-19 05:37:38 +04:00
2018-11-21 21:24:54 +03:00
void NetDb::Flood (const IdentHash& ident, std::shared_ptr<I2NPMessage> floodMsg)
{
std::set<IdentHash> excluded;
excluded.insert (i2p::context.GetIdentHash ()); // don't flood to itself
excluded.insert (ident); // don't flood back
for (int i = 0; i < 3; i++)
{
auto floodfill = GetClosestFloodfill (ident, excluded);
if (floodfill)
{
auto h = floodfill->GetIdentHash();
LogPrint(eLogDebug, "NetDb: Flood lease set for ", ident.ToBase32(), " to ", h.ToBase64());
transports.SendMessage (h, CopyI2NPMessage(floodMsg));
excluded.insert (h);
}
else
break;
}
}
2014-11-21 00:20:02 +03:00
std::shared_ptr<const RouterInfo> NetDb::GetRandomRouter () const
{
return GetRandomRouter (
2018-01-06 06:48:51 +03:00
[](std::shared_ptr<const RouterInfo> router)->bool
{
return !router->IsHidden ();
});
2018-01-06 06:48:51 +03:00
}
std::shared_ptr<const RouterInfo> NetDb::GetRandomRouter (std::shared_ptr<const RouterInfo> compatibleWith, bool reverse) const
2014-09-25 05:45:19 +04:00
{
return GetRandomRouter (
[compatibleWith, reverse](std::shared_ptr<const RouterInfo> router)->bool
2018-01-06 06:48:51 +03:00
{
return !router->IsHidden () && router != compatibleWith &&
(reverse ? compatibleWith->IsReachableFrom (*router) :
router->IsReachableFrom (*compatibleWith)) &&
router->IsECIES ();
});
2018-01-06 06:48:51 +03:00
}
2014-09-25 05:45:19 +04:00
2022-06-02 04:51:02 +03:00
std::shared_ptr<const RouterInfo> NetDb::GetRandomSSU2PeerTestRouter (bool v4, const std::set<IdentHash>& excluded) const
{
return GetRandomRouter (
[v4, &excluded](std::shared_ptr<const RouterInfo> router)->bool
{
return !router->IsHidden () && router->IsECIES () &&
router->IsSSU2PeerTesting (v4) && !excluded.count (router->GetIdentHash ());
});
}
2022-07-20 01:38:58 +03:00
std::shared_ptr<const RouterInfo> NetDb::GetRandomSSU2Introducer (bool v4, const std::set<IdentHash>& excluded) const
{
return GetRandomRouter (
[v4, &excluded](std::shared_ptr<const RouterInfo> router)->bool
{
return !router->IsHidden () && router->IsSSU2Introducer (v4) &&
2022-07-20 01:38:58 +03:00
!excluded.count (router->GetIdentHash ());
});
}
std::shared_ptr<const RouterInfo> NetDb::GetHighBandwidthRandomRouter (std::shared_ptr<const RouterInfo> compatibleWith, bool reverse) const
{
return GetRandomRouter (
[compatibleWith, reverse](std::shared_ptr<const RouterInfo> router)->bool
2018-01-06 06:48:51 +03:00
{
return !router->IsHidden () && router != compatibleWith &&
(reverse ? compatibleWith->IsReachableFrom (*router) :
router->IsReachableFrom (*compatibleWith)) &&
(router->GetCaps () & RouterInfo::eHighBandwidth) &&
router->GetVersion () >= NETDB_MIN_HIGHBANDWIDTH_VERSION &&
2023-03-04 04:21:56 +03:00
router->IsECIES () && !router->IsHighCongestion ();
});
2018-01-06 06:48:51 +03:00
}
2014-09-25 05:45:19 +04:00
template<typename Filter>
2014-11-21 00:20:02 +03:00
std::shared_ptr<const RouterInfo> NetDb::GetRandomRouter (Filter filter) const
2013-11-13 16:59:21 +04:00
{
2016-06-01 03:00:00 +03:00
if (m_RouterInfos.empty())
return 0;
uint16_t inds[3];
RAND_bytes ((uint8_t *)inds, sizeof (inds));
2021-07-27 00:51:32 +03:00
std::unique_lock<std::mutex> l(m_RouterInfosMutex);
inds[0] %= m_RouterInfos.size ();
2021-07-27 00:51:32 +03:00
auto it = m_RouterInfos.begin ();
std::advance (it, inds[0]);
2021-07-27 00:51:32 +03:00
// try random router
if (it != m_RouterInfos.end () && !it->second->IsUnreachable () && filter (it->second))
return it->second;
// try some routers around
auto it1 = m_RouterInfos.begin ();
if (inds[0])
2018-01-06 06:48:51 +03:00
{
// before
inds[1] %= inds[0];
2021-08-04 02:26:09 +03:00
std::advance (it1, (inds[1] + inds[0])/2);
}
2021-08-04 02:26:09 +03:00
else
it1 = it;
auto it2 = it;
if (inds[0] < m_RouterInfos.size () - 1)
{
// after
2021-08-04 02:26:09 +03:00
inds[2] %= (m_RouterInfos.size () - 1 - inds[0]); inds[2] /= 2;
std::advance (it2, inds[2]);
}
// it1 - from, it2 - to
it = it1;
while (it != it2 && it != m_RouterInfos.end ())
{
if (!it->second->IsUnreachable () && filter (it->second))
return it->second;
it++;
}
2021-11-12 19:33:51 +03:00
// still not found, try from the beginning
it = m_RouterInfos.begin ();
while (it != it1 && it != m_RouterInfos.end ())
{
if (!it->second->IsUnreachable () && filter (it->second))
return it->second;
it++;
}
2021-11-12 19:33:51 +03:00
// still not found, try to the beginning
it = it2;
while (it != m_RouterInfos.end ())
{
if (!it->second->IsUnreachable () && filter (it->second))
return it->second;
it++;
}
2014-03-19 22:08:09 +04:00
return nullptr; // seems we have too few routers
2018-01-06 06:48:51 +03:00
}
2015-07-04 04:27:40 +03:00
void NetDb::PostI2NPMsg (std::shared_ptr<const I2NPMessage> msg)
2013-11-20 16:46:09 +04:00
{
2018-01-06 06:48:51 +03:00
if (msg) m_Queue.Put (msg);
}
2014-01-04 06:24:20 +04:00
2018-01-06 06:48:51 +03:00
std::shared_ptr<const RouterInfo> NetDb::GetClosestFloodfill (const IdentHash& destination,
2023-02-22 03:08:12 +03:00
const std::set<IdentHash>& excluded) const
2014-01-04 06:24:20 +04:00
{
IdentHash destKey = CreateRoutingKey (destination);
2014-10-06 05:59:05 +04:00
std::unique_lock<std::mutex> l(m_FloodfillsMutex);
2023-02-22 23:58:20 +03:00
return m_Floodfills.FindClosest (destKey, [&excluded](const std::shared_ptr<RouterInfo>& r)->bool
2018-01-06 06:48:51 +03:00
{
2023-02-22 23:58:20 +03:00
return r && !r->IsUnreachable () && !r->GetProfile ()->IsUnreachable () &&
!excluded.count (r->GetIdentHash ());
});
2018-01-06 06:48:51 +03:00
}
2014-01-23 00:32:50 +04:00
2015-06-11 18:43:35 +03:00
std::vector<IdentHash> NetDb::GetClosestFloodfills (const IdentHash& destination, size_t num,
std::set<IdentHash>& excluded, bool closeThanUsOnly) const
2015-04-10 23:15:13 +03:00
{
2023-02-22 23:58:20 +03:00
std::vector<IdentHash> res;
2015-04-10 23:15:13 +03:00
IdentHash destKey = CreateRoutingKey (destination);
2023-02-22 23:58:20 +03:00
std::vector<std::shared_ptr<RouterInfo> > v;
2015-04-10 23:15:13 +03:00
{
std::unique_lock<std::mutex> l(m_FloodfillsMutex);
2023-02-22 23:58:20 +03:00
v = m_Floodfills.FindClosest (destKey, num, [&excluded](const std::shared_ptr<RouterInfo>& r)->bool
2018-01-06 06:48:51 +03:00
{
2023-02-22 23:58:20 +03:00
return r && !r->IsUnreachable () && !r->GetProfile ()->IsUnreachable () &&
!excluded.count (r->GetIdentHash ());
});
}
if (v.empty ()) return res;
XORMetric ourMetric;
if (closeThanUsOnly) ourMetric = destKey ^ i2p::context.GetIdentHash ();
for (auto& it: v)
2015-04-10 23:15:13 +03:00
{
2023-02-22 23:58:20 +03:00
if (closeThanUsOnly && ourMetric < (destKey ^ it->GetIdentHash ())) break;
res.push_back (it->GetIdentHash ());
}
2015-04-10 23:15:13 +03:00
return res;
}
std::shared_ptr<const RouterInfo> NetDb::GetRandomRouterInFamily (FamilyID fam) const
2022-03-24 22:50:20 +03:00
{
return GetRandomRouter(
[fam](std::shared_ptr<const RouterInfo> router)->bool
{
return router->IsFamily(fam);
});
}
2018-01-06 06:48:51 +03:00
std::shared_ptr<const RouterInfo> NetDb::GetClosestNonFloodfill (const IdentHash& destination,
2015-02-03 06:34:55 +03:00
const std::set<IdentHash>& excluded) const
{
std::shared_ptr<const RouterInfo> r;
XORMetric minMetric;
IdentHash destKey = CreateRoutingKey (destination);
minMetric.SetMax ();
// must be called from NetDb thread only
2016-08-05 21:23:54 +03:00
for (const auto& it: m_RouterInfos)
2018-01-06 06:48:51 +03:00
{
2015-04-11 02:49:58 +03:00
if (!it.second->IsFloodfill ())
2018-01-06 06:48:51 +03:00
{
2015-02-03 06:34:55 +03:00
XORMetric m = destKey ^ it.first;
2015-04-11 02:49:58 +03:00
if (m < minMetric && !excluded.count (it.first))
2015-02-03 06:34:55 +03:00
{
minMetric = m;
r = it.second;
}
2018-01-06 06:48:51 +03:00
}
}
2015-02-03 06:34:55 +03:00
return r;
2018-01-06 06:48:51 +03:00
}
2014-07-31 20:59:43 +04:00
void NetDb::ManageLeaseSets ()
{
2016-02-08 03:45:06 +03:00
auto ts = i2p::util::GetMillisecondsSinceEpoch ();
2014-07-31 20:59:43 +04:00
for (auto it = m_LeaseSets.begin (); it != m_LeaseSets.end ();)
{
2019-01-15 02:37:17 +03:00
if (!it->second->IsValid () || ts > it->second->GetExpirationTime () - LEASE_ENDDATE_THRESHOLD)
2014-07-31 20:59:43 +04:00
{
LogPrint (eLogInfo, "NetDb: LeaseSet ", it->first.ToBase64 (), " expired or invalid");
2014-07-31 20:59:43 +04:00
it = m_LeaseSets.erase (it);
2018-01-06 06:48:51 +03:00
}
else
2016-08-05 21:23:54 +03:00
++it;
2014-07-31 20:59:43 +04:00
}
2022-08-10 02:40:07 +03:00
m_LeasesPool.CleanUpMt ();
2014-07-31 20:59:43 +04:00
}
bool NetDb::PopulateRouterInfoBuffer (std::shared_ptr<RouterInfo> r)
{
if (!r) return false;
if (r->GetBuffer ()) return true;
return r->LoadBuffer (m_Storage.Path (r->GetIdentHashBase64 ()));
}
2013-11-13 16:59:21 +04:00
}
}