2020-05-22 16:18:41 +03:00
|
|
|
/*
|
2022-02-19 16:15:49 +03:00
|
|
|
* Copyright (c) 2013-2022, The PurpleI2P Project
|
2020-05-22 16:18:41 +03:00
|
|
|
*
|
|
|
|
* This file is part of Purple i2pd project and licensed under BSD3
|
|
|
|
*
|
|
|
|
* See full license text in LICENSE file at top of project tree
|
|
|
|
*/
|
|
|
|
|
2013-10-27 19:26:39 +04:00
|
|
|
#include "Log.h"
|
2015-11-03 17:15:49 +03:00
|
|
|
#include "Crypto.h"
|
2013-10-27 19:26:39 +04:00
|
|
|
#include "RouterContext.h"
|
|
|
|
#include "I2NPProtocol.h"
|
2017-04-22 03:04:16 +03:00
|
|
|
#include "NetDb.hpp"
|
2013-10-27 19:26:39 +04:00
|
|
|
#include "Transports.h"
|
2016-10-28 22:57:18 +03:00
|
|
|
#include "Config.h"
|
2017-05-29 08:28:16 +03:00
|
|
|
#include "HTTP.h"
|
2020-12-07 06:22:16 +03:00
|
|
|
#include "util.h"
|
2013-10-27 19:26:39 +04:00
|
|
|
|
|
|
|
using namespace i2p::data;
|
|
|
|
|
|
|
|
namespace i2p
|
2014-10-21 20:25:53 +04:00
|
|
|
{
|
|
|
|
namespace transport
|
2013-10-27 19:26:39 +04:00
|
|
|
{
|
2020-06-30 03:02:09 +03:00
|
|
|
template<typename Keys>
|
|
|
|
EphemeralKeysSupplier<Keys>::EphemeralKeysSupplier (int size):
|
2014-10-20 23:19:56 +04:00
|
|
|
m_QueueSize (size), m_IsRunning (false), m_Thread (nullptr)
|
|
|
|
{
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2014-10-20 23:19:56 +04:00
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
template<typename Keys>
|
2020-06-30 03:02:09 +03:00
|
|
|
EphemeralKeysSupplier<Keys>::~EphemeralKeysSupplier ()
|
2014-04-05 00:29:40 +04:00
|
|
|
{
|
|
|
|
Stop ();
|
|
|
|
}
|
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
template<typename Keys>
|
2020-06-30 03:02:09 +03:00
|
|
|
void EphemeralKeysSupplier<Keys>::Start ()
|
2014-04-05 00:29:40 +04:00
|
|
|
{
|
|
|
|
m_IsRunning = true;
|
2020-06-30 03:02:09 +03:00
|
|
|
m_Thread = new std::thread (std::bind (&EphemeralKeysSupplier<Keys>::Run, this));
|
2014-04-05 00:29:40 +04:00
|
|
|
}
|
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
template<typename Keys>
|
2020-06-30 03:02:09 +03:00
|
|
|
void EphemeralKeysSupplier<Keys>::Stop ()
|
2014-04-05 00:29:40 +04:00
|
|
|
{
|
2018-11-20 21:57:51 +03:00
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> l(m_AcquiredMutex);
|
|
|
|
m_IsRunning = false;
|
|
|
|
m_Acquired.notify_one ();
|
|
|
|
}
|
2014-04-05 00:29:40 +04:00
|
|
|
if (m_Thread)
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
|
|
|
m_Thread->join ();
|
2014-04-05 00:29:40 +04:00
|
|
|
delete m_Thread;
|
|
|
|
m_Thread = 0;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2014-04-05 00:29:40 +04:00
|
|
|
}
|
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
template<typename Keys>
|
2020-06-30 03:02:09 +03:00
|
|
|
void EphemeralKeysSupplier<Keys>::Run ()
|
2014-04-05 00:29:40 +04:00
|
|
|
{
|
2020-12-07 06:22:16 +03:00
|
|
|
i2p::util::SetThreadName("Ephemerals");
|
2020-12-04 18:36:49 +03:00
|
|
|
|
2014-04-05 00:29:40 +04:00
|
|
|
while (m_IsRunning)
|
|
|
|
{
|
2016-11-07 22:44:32 +03:00
|
|
|
int num, total = 0;
|
2018-11-20 21:57:51 +03:00
|
|
|
while ((num = m_QueueSize - (int)m_Queue.size ()) > 0 && total < 10)
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2020-06-30 03:02:09 +03:00
|
|
|
CreateEphemeralKeys (num);
|
2016-11-07 22:44:32 +03:00
|
|
|
total += num;
|
|
|
|
}
|
2018-11-20 21:57:51 +03:00
|
|
|
if (total >= 10)
|
2016-11-07 22:44:32 +03:00
|
|
|
{
|
2020-06-30 03:02:09 +03:00
|
|
|
LogPrint (eLogWarning, "Transports: ", total, " ephemeral keys generated at the time");
|
2016-11-07 22:44:32 +03:00
|
|
|
std::this_thread::sleep_for (std::chrono::seconds(1)); // take a break
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-11-20 21:57:51 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_AcquiredMutex);
|
|
|
|
if (!m_IsRunning) break;
|
2017-12-07 16:26:28 +03:00
|
|
|
m_Acquired.wait (l); // wait for element gets acquired
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2014-04-05 00:29:40 +04:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2014-04-05 00:29:40 +04:00
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
template<typename Keys>
|
2020-06-30 03:02:09 +03:00
|
|
|
void EphemeralKeysSupplier<Keys>::CreateEphemeralKeys (int num)
|
2014-04-05 00:29:40 +04:00
|
|
|
{
|
|
|
|
if (num > 0)
|
|
|
|
{
|
|
|
|
for (int i = 0; i < num; i++)
|
|
|
|
{
|
2020-06-30 03:02:09 +03:00
|
|
|
auto pair = std::make_shared<Keys> ();
|
2015-11-03 17:15:49 +03:00
|
|
|
pair->GenerateKeys ();
|
2020-06-30 03:02:09 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_AcquiredMutex);
|
2014-04-05 00:29:40 +04:00
|
|
|
m_Queue.push (pair);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
template<typename Keys>
|
2020-06-30 03:02:09 +03:00
|
|
|
std::shared_ptr<Keys> EphemeralKeysSupplier<Keys>::Acquire ()
|
2014-04-05 00:29:40 +04:00
|
|
|
{
|
|
|
|
{
|
2020-06-30 03:02:09 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_AcquiredMutex);
|
2016-01-28 06:09:35 +03:00
|
|
|
if (!m_Queue.empty ())
|
|
|
|
{
|
|
|
|
auto pair = m_Queue.front ();
|
|
|
|
m_Queue.pop ();
|
|
|
|
m_Acquired.notify_one ();
|
|
|
|
return pair;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
}
|
2016-01-28 06:09:35 +03:00
|
|
|
// queue is empty, create new
|
2020-06-30 03:02:09 +03:00
|
|
|
auto pair = std::make_shared<Keys> ();
|
2016-01-28 06:09:35 +03:00
|
|
|
pair->GenerateKeys ();
|
|
|
|
return pair;
|
2014-04-05 00:29:40 +04:00
|
|
|
}
|
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
template<typename Keys>
|
2020-06-30 03:02:09 +03:00
|
|
|
void EphemeralKeysSupplier<Keys>::Return (std::shared_ptr<Keys> pair)
|
2014-09-17 19:13:25 +04:00
|
|
|
{
|
2017-08-25 21:45:58 +03:00
|
|
|
if (pair)
|
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex>l(m_AcquiredMutex);
|
|
|
|
if ((int)m_Queue.size () < 2*m_QueueSize)
|
|
|
|
m_Queue.push (pair);
|
|
|
|
}
|
|
|
|
else
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint(eLogError, "Transports: Return null DHKeys");
|
2014-09-17 19:13:25 +04:00
|
|
|
}
|
|
|
|
|
2017-05-29 08:28:16 +03:00
|
|
|
Transports transports;
|
|
|
|
|
|
|
|
Transports::Transports ():
|
2020-10-12 18:27:25 +03:00
|
|
|
m_IsOnline (true), m_IsRunning (false), m_IsNAT (true), m_CheckReserved(true), m_Thread (nullptr),
|
2020-10-12 17:36:44 +03:00
|
|
|
m_Service (nullptr), m_Work (nullptr), m_PeerCleanupTimer (nullptr), m_PeerTestTimer (nullptr),
|
2022-03-12 00:17:44 +03:00
|
|
|
m_SSUServer (nullptr), m_SSU2Server (nullptr), m_NTCP2Server (nullptr),
|
2021-05-11 01:55:39 +03:00
|
|
|
m_X25519KeysPairSupplier (15), // 15 pre-generated keys
|
2017-05-02 21:20:00 +03:00
|
|
|
m_TotalSentBytes(0), m_TotalReceivedBytes(0), m_TotalTransitTransmittedBytes (0),
|
2018-01-06 07:01:44 +03:00
|
|
|
m_InBandwidth (0), m_OutBandwidth (0), m_TransitBandwidth(0),
|
2017-05-02 21:20:00 +03:00
|
|
|
m_LastInBandwidthUpdateBytes (0), m_LastOutBandwidthUpdateBytes (0),
|
2017-05-29 08:28:16 +03:00
|
|
|
m_LastTransitBandwidthUpdateBytes (0), m_LastBandwidthUpdateTime (0)
|
|
|
|
{
|
2013-10-27 19:26:39 +04:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
|
|
|
|
Transports::~Transports ()
|
|
|
|
{
|
2013-10-27 19:26:39 +04:00
|
|
|
Stop ();
|
2016-12-22 21:32:06 +03:00
|
|
|
if (m_Service)
|
|
|
|
{
|
|
|
|
delete m_PeerCleanupTimer; m_PeerCleanupTimer = nullptr;
|
|
|
|
delete m_PeerTestTimer; m_PeerTestTimer = nullptr;
|
|
|
|
delete m_Work; m_Work = nullptr;
|
|
|
|
delete m_Service; m_Service = nullptr;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
}
|
2013-10-27 19:26:39 +04:00
|
|
|
|
2020-10-04 04:58:20 +03:00
|
|
|
void Transports::Start (bool enableNTCP2, bool enableSSU)
|
2013-10-27 19:26:39 +04:00
|
|
|
{
|
2016-12-22 21:32:06 +03:00
|
|
|
if (!m_Service)
|
|
|
|
{
|
|
|
|
m_Service = new boost::asio::io_service ();
|
|
|
|
m_Work = new boost::asio::io_service::work (*m_Service);
|
|
|
|
m_PeerCleanupTimer = new boost::asio::deadline_timer (*m_Service);
|
2018-01-06 07:01:44 +03:00
|
|
|
m_PeerTestTimer = new boost::asio::deadline_timer (*m_Service);
|
2016-12-22 21:32:06 +03:00
|
|
|
}
|
|
|
|
|
2017-10-30 15:27:55 +03:00
|
|
|
i2p::config::GetOption("nat", m_IsNAT);
|
2020-06-30 03:02:09 +03:00
|
|
|
m_X25519KeysPairSupplier.Start ();
|
2013-12-29 19:48:57 +04:00
|
|
|
m_IsRunning = true;
|
2013-10-27 19:26:39 +04:00
|
|
|
m_Thread = new std::thread (std::bind (&Transports::Run, this));
|
2020-03-01 23:11:54 +03:00
|
|
|
std::string ntcp2proxy; i2p::config::GetOption("ntcp2.proxy", ntcp2proxy);
|
2020-10-12 17:36:44 +03:00
|
|
|
i2p::http::URL proxyurl;
|
2020-03-01 17:35:24 +03:00
|
|
|
// create NTCP2. TODO: move to acceptor
|
2021-03-10 23:36:10 +03:00
|
|
|
if (enableNTCP2 || i2p::context.SupportsMesh ())
|
2018-07-13 22:59:28 +03:00
|
|
|
{
|
2021-03-10 23:36:10 +03:00
|
|
|
if(!ntcp2proxy.empty() && enableNTCP2)
|
2020-03-01 17:35:24 +03:00
|
|
|
{
|
|
|
|
if(proxyurl.parse(ntcp2proxy))
|
|
|
|
{
|
|
|
|
if(proxyurl.schema == "socks" || proxyurl.schema == "http")
|
|
|
|
{
|
|
|
|
m_NTCP2Server = new NTCP2Server ();
|
|
|
|
NTCP2Server::ProxyType proxytype = NTCP2Server::eSocksProxy;
|
|
|
|
|
|
|
|
if (proxyurl.schema == "http")
|
|
|
|
proxytype = NTCP2Server::eHTTPProxy;
|
|
|
|
|
2021-03-11 04:00:21 +03:00
|
|
|
m_NTCP2Server->UseProxy(proxytype, proxyurl.host, proxyurl.port, proxyurl.user, proxyurl.pass);
|
2021-03-06 16:50:47 +03:00
|
|
|
i2p::context.SetStatus (eRouterStatusProxy);
|
2020-03-01 17:35:24 +03:00
|
|
|
}
|
|
|
|
else
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint(eLogError, "Transports: Unsupported NTCP2 proxy URL ", ntcp2proxy);
|
2020-03-01 17:35:24 +03:00
|
|
|
}
|
|
|
|
else
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint(eLogError, "Transports: Invalid NTCP2 proxy URL ", ntcp2proxy);
|
2020-03-01 17:35:24 +03:00
|
|
|
}
|
2020-03-01 23:11:54 +03:00
|
|
|
else
|
|
|
|
m_NTCP2Server = new NTCP2Server ();
|
2020-03-01 17:35:24 +03:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
|
2021-02-28 00:13:12 +03:00
|
|
|
// create SSU server
|
|
|
|
int ssuPort = 0;
|
|
|
|
if (enableSSU)
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-02-28 00:13:12 +03:00
|
|
|
auto& addresses = context.GetRouterInfo ().GetAddresses ();
|
|
|
|
for (const auto& address: addresses)
|
2021-02-27 18:35:50 +03:00
|
|
|
{
|
2021-02-28 00:13:12 +03:00
|
|
|
if (!address) continue;
|
|
|
|
if (address->transportStyle == RouterInfo::eTransportSSU)
|
2021-02-27 18:35:50 +03:00
|
|
|
{
|
2021-02-28 00:13:12 +03:00
|
|
|
ssuPort = address->port;
|
|
|
|
m_SSUServer = new SSUServer (address->port);
|
|
|
|
break;
|
2021-02-27 18:35:50 +03:00
|
|
|
}
|
|
|
|
}
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
|
|
|
|
2021-02-27 03:31:38 +03:00
|
|
|
// bind to interfaces
|
|
|
|
bool ipv4; i2p::config::GetOption("ipv4", ipv4);
|
|
|
|
if (ipv4)
|
|
|
|
{
|
|
|
|
std::string address; i2p::config::GetOption("address4", address);
|
|
|
|
if (!address.empty ())
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-02-27 03:31:38 +03:00
|
|
|
boost::system::error_code ec;
|
|
|
|
auto addr = boost::asio::ip::address::from_string (address, ec);
|
2021-02-28 00:13:12 +03:00
|
|
|
if (!ec)
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-02-28 00:13:12 +03:00
|
|
|
if (m_NTCP2Server) m_NTCP2Server->SetLocalAddress (addr);
|
|
|
|
if (m_SSUServer) m_SSUServer->SetLocalAddress (addr);
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-02-27 03:31:38 +03:00
|
|
|
|
|
|
|
bool ipv6; i2p::config::GetOption("ipv6", ipv6);
|
|
|
|
if (ipv6)
|
|
|
|
{
|
|
|
|
std::string address; i2p::config::GetOption("address6", address);
|
|
|
|
if (!address.empty ())
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-02-27 03:31:38 +03:00
|
|
|
boost::system::error_code ec;
|
|
|
|
auto addr = boost::asio::ip::address::from_string (address, ec);
|
2021-11-27 23:30:35 +03:00
|
|
|
if (!ec)
|
|
|
|
{
|
2021-02-28 00:13:12 +03:00
|
|
|
if (m_NTCP2Server) m_NTCP2Server->SetLocalAddress (addr);
|
|
|
|
if (m_SSUServer) m_SSUServer->SetLocalAddress (addr);
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
|
|
|
}
|
2021-02-27 03:31:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
bool ygg; i2p::config::GetOption("meshnets.yggdrasil", ygg);
|
|
|
|
if (ygg)
|
|
|
|
{
|
2021-02-27 04:38:16 +03:00
|
|
|
std::string address; i2p::config::GetOption("meshnets.yggaddress", address);
|
2021-02-27 03:31:38 +03:00
|
|
|
if (!address.empty ())
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-02-27 03:31:38 +03:00
|
|
|
boost::system::error_code ec;
|
|
|
|
auto addr = boost::asio::ip::address::from_string (address, ec);
|
|
|
|
if (!ec && m_NTCP2Server && i2p::util::net::IsYggdrasilAddress (addr))
|
|
|
|
m_NTCP2Server->SetLocalAddress (addr);
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2021-02-27 03:31:38 +03:00
|
|
|
}
|
2021-02-27 18:35:50 +03:00
|
|
|
|
|
|
|
// start servers
|
|
|
|
if (m_NTCP2Server) m_NTCP2Server->Start ();
|
2021-02-28 00:13:12 +03:00
|
|
|
if (m_SSUServer)
|
|
|
|
{
|
|
|
|
LogPrint (eLogInfo, "Transports: Start listening UDP port ", ssuPort);
|
2021-11-27 23:30:35 +03:00
|
|
|
try
|
2021-02-28 00:13:12 +03:00
|
|
|
{
|
|
|
|
m_SSUServer->Start ();
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
|
|
|
catch (std::exception& ex )
|
2021-02-28 00:13:12 +03:00
|
|
|
{
|
|
|
|
LogPrint(eLogError, "Transports: Failed to bind to UDP port", ssuPort);
|
|
|
|
m_SSUServer->Stop ();
|
|
|
|
delete m_SSUServer;
|
|
|
|
m_SSUServer = nullptr;
|
|
|
|
}
|
|
|
|
if (m_SSUServer) DetectExternalIP ();
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
|
|
|
|
2016-12-22 21:32:06 +03:00
|
|
|
m_PeerCleanupTimer->expires_from_now (boost::posix_time::seconds(5*SESSION_CREATION_TIMEOUT));
|
|
|
|
m_PeerCleanupTimer->async_wait (std::bind (&Transports::HandlePeerCleanupTimer, this, std::placeholders::_1));
|
2017-08-09 17:52:52 +03:00
|
|
|
|
2020-03-20 17:44:53 +03:00
|
|
|
if (m_IsNAT)
|
|
|
|
{
|
|
|
|
m_PeerTestTimer->expires_from_now (boost::posix_time::minutes(PEER_TEST_INTERVAL));
|
|
|
|
m_PeerTestTimer->async_wait (std::bind (&Transports::HandlePeerTestTimer, this, std::placeholders::_1));
|
|
|
|
}
|
2013-10-27 19:26:39 +04:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
|
2013-10-27 19:26:39 +04:00
|
|
|
void Transports::Stop ()
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
|
|
|
if (m_PeerCleanupTimer) m_PeerCleanupTimer->cancel ();
|
2016-12-22 21:32:06 +03:00
|
|
|
if (m_PeerTestTimer) m_PeerTestTimer->cancel ();
|
2015-01-13 06:53:35 +03:00
|
|
|
m_Peers.clear ();
|
2014-01-24 01:10:33 +04:00
|
|
|
if (m_SSUServer)
|
|
|
|
{
|
|
|
|
m_SSUServer->Stop ();
|
|
|
|
delete m_SSUServer;
|
2014-09-22 21:28:46 +04:00
|
|
|
m_SSUServer = nullptr;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2022-03-12 00:17:44 +03:00
|
|
|
|
|
|
|
if (m_SSU2Server)
|
|
|
|
{
|
|
|
|
m_SSU2Server->Stop ();
|
|
|
|
delete m_SSU2Server;
|
|
|
|
m_SSU2Server = nullptr;
|
|
|
|
}
|
|
|
|
|
2018-07-13 22:59:28 +03:00
|
|
|
if (m_NTCP2Server)
|
|
|
|
{
|
|
|
|
m_NTCP2Server->Stop ();
|
|
|
|
delete m_NTCP2Server;
|
|
|
|
m_NTCP2Server = nullptr;
|
|
|
|
}
|
|
|
|
|
2020-06-30 03:02:09 +03:00
|
|
|
m_X25519KeysPairSupplier.Stop ();
|
2013-12-29 19:48:57 +04:00
|
|
|
m_IsRunning = false;
|
2016-12-22 21:32:06 +03:00
|
|
|
if (m_Service) m_Service->stop ();
|
2013-10-27 19:26:39 +04:00
|
|
|
if (m_Thread)
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
|
|
|
m_Thread->join ();
|
2013-10-27 19:26:39 +04:00
|
|
|
delete m_Thread;
|
2014-09-22 21:28:46 +04:00
|
|
|
m_Thread = nullptr;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
}
|
2013-10-27 19:26:39 +04:00
|
|
|
|
2017-05-29 08:28:16 +03:00
|
|
|
void Transports::Run ()
|
|
|
|
{
|
2020-12-07 06:22:16 +03:00
|
|
|
i2p::util::SetThreadName("Transports");
|
2020-12-04 18:36:49 +03:00
|
|
|
|
2016-12-22 21:32:06 +03:00
|
|
|
while (m_IsRunning && m_Service)
|
2013-11-29 16:52:09 +04:00
|
|
|
{
|
2013-12-29 19:48:57 +04:00
|
|
|
try
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2016-12-22 21:32:06 +03:00
|
|
|
m_Service->run ();
|
2013-12-29 19:48:57 +04:00
|
|
|
}
|
|
|
|
catch (std::exception& ex)
|
|
|
|
{
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogError, "Transports: Runtime exception: ", ex.what ());
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
}
|
2013-11-29 16:52:09 +04:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
|
2015-03-17 22:19:38 +03:00
|
|
|
void Transports::UpdateBandwidth ()
|
|
|
|
{
|
|
|
|
uint64_t ts = i2p::util::GetMillisecondsSinceEpoch ();
|
|
|
|
if (m_LastBandwidthUpdateTime > 0)
|
|
|
|
{
|
|
|
|
auto delta = ts - m_LastBandwidthUpdateTime;
|
|
|
|
if (delta > 0)
|
|
|
|
{
|
2017-05-29 08:28:16 +03:00
|
|
|
m_InBandwidth = (m_TotalReceivedBytes - m_LastInBandwidthUpdateBytes)*1000/delta; // per second
|
|
|
|
m_OutBandwidth = (m_TotalSentBytes - m_LastOutBandwidthUpdateBytes)*1000/delta; // per second
|
2017-05-02 21:20:00 +03:00
|
|
|
m_TransitBandwidth = (m_TotalTransitTransmittedBytes - m_LastTransitBandwidthUpdateBytes)*1000/delta;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-03-17 22:19:38 +03:00
|
|
|
}
|
|
|
|
m_LastBandwidthUpdateTime = ts;
|
2017-05-29 08:28:16 +03:00
|
|
|
m_LastInBandwidthUpdateBytes = m_TotalReceivedBytes;
|
|
|
|
m_LastOutBandwidthUpdateBytes = m_TotalSentBytes;
|
|
|
|
m_LastTransitBandwidthUpdateBytes = m_TotalTransitTransmittedBytes;
|
2015-03-17 22:19:38 +03:00
|
|
|
}
|
|
|
|
|
2015-03-18 20:07:11 +03:00
|
|
|
bool Transports::IsBandwidthExceeded () const
|
|
|
|
{
|
2016-03-31 03:00:00 +03:00
|
|
|
auto limit = i2p::context.GetBandwidthLimit() * 1024; // convert to bytes
|
2016-01-03 06:17:04 +03:00
|
|
|
auto bw = std::max (m_InBandwidth, m_OutBandwidth);
|
2016-03-31 03:00:00 +03:00
|
|
|
return bw > limit;
|
2015-03-18 20:07:11 +03:00
|
|
|
}
|
2013-10-27 19:26:39 +04:00
|
|
|
|
2017-05-04 21:58:12 +03:00
|
|
|
bool Transports::IsTransitBandwidthExceeded () const
|
|
|
|
{
|
|
|
|
auto limit = i2p::context.GetTransitBandwidthLimit() * 1024; // convert to bytes
|
|
|
|
return m_TransitBandwidth > limit;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2017-05-04 21:58:12 +03:00
|
|
|
|
2015-06-17 18:41:07 +03:00
|
|
|
void Transports::SendMessage (const i2p::data::IdentHash& ident, std::shared_ptr<i2p::I2NPMessage> msg)
|
|
|
|
{
|
2020-10-12 00:51:40 +03:00
|
|
|
if (m_IsOnline)
|
|
|
|
SendMessages (ident, std::vector<std::shared_ptr<i2p::I2NPMessage> > {msg });
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-06-17 18:41:07 +03:00
|
|
|
|
|
|
|
void Transports::SendMessages (const i2p::data::IdentHash& ident, const std::vector<std::shared_ptr<i2p::I2NPMessage> >& msgs)
|
2015-01-21 05:05:57 +03:00
|
|
|
{
|
2016-12-22 21:32:06 +03:00
|
|
|
m_Service->post (std::bind (&Transports::PostMessages, this, ident, msgs));
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-01-14 05:31:39 +03:00
|
|
|
|
2015-06-17 18:41:07 +03:00
|
|
|
void Transports::PostMessages (i2p::data::IdentHash ident, std::vector<std::shared_ptr<i2p::I2NPMessage> > msgs)
|
2015-01-21 05:05:57 +03:00
|
|
|
{
|
|
|
|
if (ident == i2p::context.GetRouterInfo ().GetIdentHash ())
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2015-01-21 05:05:57 +03:00
|
|
|
// we send it to ourself
|
2016-08-09 01:53:37 +03:00
|
|
|
for (auto& it: msgs)
|
2021-10-17 18:31:37 +03:00
|
|
|
m_LoopbackHandler.PutNextMessage (std::move (it));
|
2016-11-15 22:11:55 +03:00
|
|
|
m_LoopbackHandler.Flush ();
|
2015-01-21 05:05:57 +03:00
|
|
|
return;
|
2016-10-28 19:50:26 +03:00
|
|
|
}
|
2020-05-24 21:14:16 +03:00
|
|
|
if(RoutesRestricted() && !IsRestrictedPeer(ident)) return;
|
2015-01-21 05:05:57 +03:00
|
|
|
auto it = m_Peers.find (ident);
|
|
|
|
if (it == m_Peers.end ())
|
|
|
|
{
|
2017-05-29 08:28:16 +03:00
|
|
|
bool connected = false;
|
2015-04-14 17:40:46 +03:00
|
|
|
try
|
|
|
|
{
|
|
|
|
auto r = netdb.FindRouter (ident);
|
2021-06-19 21:44:33 +03:00
|
|
|
if (r && (r->IsUnreachable () || !r->IsReachableFrom (i2p::context.GetRouterInfo ()))) return; // router found but non-reachable
|
2016-01-16 00:23:03 +03:00
|
|
|
{
|
2020-03-01 13:25:50 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2016-01-16 00:23:03 +03:00
|
|
|
it = m_Peers.insert (std::pair<i2p::data::IdentHash, Peer>(ident, { 0, r, {},
|
|
|
|
i2p::util::GetSecondsSinceEpoch (), {} })).first;
|
|
|
|
}
|
2015-04-14 17:40:46 +03:00
|
|
|
connected = ConnectToPeer (ident, it->second);
|
|
|
|
}
|
|
|
|
catch (std::exception& ex)
|
|
|
|
{
|
2015-12-18 15:57:22 +03:00
|
|
|
LogPrint (eLogError, "Transports: PostMessages exception:", ex.what ());
|
2015-04-14 17:40:46 +03:00
|
|
|
}
|
2015-06-17 18:41:07 +03:00
|
|
|
if (!connected) return;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-06-09 18:00:37 +03:00
|
|
|
if (!it->second.sessions.empty ())
|
2015-06-17 18:41:07 +03:00
|
|
|
it->second.sessions.front ()->SendI2NPMessages (msgs);
|
2015-01-21 05:05:57 +03:00
|
|
|
else
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2016-07-12 19:37:39 +03:00
|
|
|
if (it->second.delayedMessages.size () < MAX_NUM_DELAYED_MESSAGES)
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2016-08-09 01:53:37 +03:00
|
|
|
for (auto& it1: msgs)
|
2016-07-12 19:37:39 +03:00
|
|
|
it->second.delayedMessages.push_back (it1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogWarning, "Transports: Delayed messages queue size to ",
|
2020-05-24 21:14:16 +03:00
|
|
|
ident.ToBase64 (), " exceeds ", MAX_NUM_DELAYED_MESSAGES);
|
2017-05-29 08:28:16 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2016-07-12 19:37:39 +03:00
|
|
|
m_Peers.erase (it);
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-14 05:31:39 +03:00
|
|
|
bool Transports::ConnectToPeer (const i2p::data::IdentHash& ident, Peer& peer)
|
|
|
|
{
|
2020-06-24 18:29:54 +03:00
|
|
|
if (!peer.router) // reconnect
|
|
|
|
peer.router = netdb.FindRouter (ident); // try to get new one from netdb
|
2015-01-14 05:31:39 +03:00
|
|
|
if (peer.router) // we have RI already
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2021-01-19 02:58:16 +03:00
|
|
|
if (peer.numAttempts < 2) // NTCP2, 0 - ipv6, 1- ipv4
|
2020-04-30 04:44:13 +03:00
|
|
|
{
|
|
|
|
if (m_NTCP2Server) // we support NTCP2
|
|
|
|
{
|
2021-01-19 02:58:16 +03:00
|
|
|
std::shared_ptr<const RouterInfo::Address> address;
|
|
|
|
if (!peer.numAttempts) // NTCP2 ipv6
|
|
|
|
{
|
2021-06-18 02:46:05 +03:00
|
|
|
if (context.GetRouterInfo ().IsNTCP2V6 () && peer.router->IsReachableBy (RouterInfo::eNTCP2V6))
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-01-19 02:58:16 +03:00
|
|
|
address = peer.router->GetPublishedNTCP2V6Address ();
|
2021-01-24 23:44:54 +03:00
|
|
|
if (address && m_CheckReserved && i2p::util::net::IsInReservedRange(address->host))
|
2021-01-24 19:34:11 +03:00
|
|
|
address = nullptr;
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2021-01-19 02:58:16 +03:00
|
|
|
peer.numAttempts++;
|
|
|
|
}
|
2021-11-27 23:30:35 +03:00
|
|
|
if (!address && peer.numAttempts == 1) // NTCP2 ipv4
|
|
|
|
{
|
2021-06-18 02:46:05 +03:00
|
|
|
if (context.GetRouterInfo ().IsNTCP2 (true) && peer.router->IsReachableBy (RouterInfo::eNTCP2V4))
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-01-19 02:58:16 +03:00
|
|
|
address = peer.router->GetPublishedNTCP2V4Address ();
|
2021-01-24 23:44:54 +03:00
|
|
|
if (address && m_CheckReserved && i2p::util::net::IsInReservedRange(address->host))
|
2021-01-24 19:34:11 +03:00
|
|
|
address = nullptr;
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2021-01-19 02:58:16 +03:00
|
|
|
peer.numAttempts++;
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2021-01-24 19:34:11 +03:00
|
|
|
if (address)
|
2020-04-30 04:44:13 +03:00
|
|
|
{
|
2021-01-18 01:15:41 +03:00
|
|
|
auto s = std::make_shared<NTCP2Session> (*m_NTCP2Server, peer.router, address);
|
2021-02-17 22:26:48 +03:00
|
|
|
if( m_NTCP2Server->UsingProxy())
|
|
|
|
m_NTCP2Server->ConnectWithProxy(s);
|
2020-04-30 04:44:13 +03:00
|
|
|
else
|
2021-02-17 22:26:48 +03:00
|
|
|
m_NTCP2Server->Connect (s);
|
2020-04-30 04:44:13 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
2021-01-19 02:58:16 +03:00
|
|
|
else
|
|
|
|
peer.numAttempts = 2; // switch to SSU
|
2020-04-30 04:44:13 +03:00
|
|
|
}
|
2021-11-27 23:30:35 +03:00
|
|
|
if (peer.numAttempts == 2 || peer.numAttempts == 3) // SSU
|
2014-01-19 19:05:54 +04:00
|
|
|
{
|
2021-02-05 05:48:13 +03:00
|
|
|
if (m_SSUServer)
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-02-05 05:48:13 +03:00
|
|
|
std::shared_ptr<const RouterInfo::Address> address;
|
|
|
|
if (peer.numAttempts == 2) // SSU ipv6
|
|
|
|
{
|
2021-06-18 02:46:05 +03:00
|
|
|
if (context.GetRouterInfo ().IsSSUV6 () && peer.router->IsReachableBy (RouterInfo::eSSUV6))
|
2021-02-05 05:48:13 +03:00
|
|
|
{
|
|
|
|
address = peer.router->GetSSUV6Address ();
|
|
|
|
if (address && m_CheckReserved && i2p::util::net::IsInReservedRange(address->host))
|
|
|
|
address = nullptr;
|
|
|
|
}
|
|
|
|
peer.numAttempts++;
|
|
|
|
}
|
|
|
|
if (!address && peer.numAttempts == 3) // SSU ipv4
|
|
|
|
{
|
2021-06-18 02:46:05 +03:00
|
|
|
if (context.GetRouterInfo ().IsSSU (true) && peer.router->IsReachableBy (RouterInfo::eSSUV4))
|
2021-02-05 05:48:13 +03:00
|
|
|
{
|
|
|
|
address = peer.router->GetSSUAddress (true);
|
|
|
|
if (address && m_CheckReserved && i2p::util::net::IsInReservedRange(address->host))
|
|
|
|
address = nullptr;
|
|
|
|
}
|
|
|
|
peer.numAttempts++;
|
|
|
|
}
|
2021-03-02 03:02:27 +03:00
|
|
|
if (address && address->IsReachableSSU ())
|
2020-10-12 17:36:44 +03:00
|
|
|
{
|
2021-04-04 17:36:22 +03:00
|
|
|
if (m_SSUServer->CreateSession (peer.router, address))
|
|
|
|
return true;
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2015-01-14 05:31:39 +03:00
|
|
|
}
|
2021-02-05 05:48:13 +03:00
|
|
|
else
|
|
|
|
peer.numAttempts += 2; // switch to Mesh
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2021-02-05 05:48:13 +03:00
|
|
|
if (peer.numAttempts == 4) // Mesh
|
2021-02-01 01:25:07 +03:00
|
|
|
{
|
|
|
|
peer.numAttempts++;
|
2021-02-04 04:09:43 +03:00
|
|
|
if (m_NTCP2Server && context.GetRouterInfo ().IsMesh () && peer.router->IsMesh ())
|
2021-02-01 01:25:07 +03:00
|
|
|
{
|
|
|
|
auto address = peer.router->GetYggdrasilAddress ();
|
|
|
|
if (address)
|
|
|
|
{
|
|
|
|
auto s = std::make_shared<NTCP2Session> (*m_NTCP2Server, peer.router, address);
|
2021-02-17 22:26:48 +03:00
|
|
|
m_NTCP2Server->Connect (s);
|
2021-02-01 01:25:07 +03:00
|
|
|
return true;
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
|
|
|
}
|
2021-02-01 01:25:07 +03:00
|
|
|
}
|
2021-02-05 05:48:13 +03:00
|
|
|
LogPrint (eLogInfo, "Transports: No compatble NTCP2 or SSU addresses available");
|
2019-11-12 18:03:33 +03:00
|
|
|
i2p::data::netdb.SetUnreachable (ident, true); // we are here because all connection attempts failed
|
2015-06-09 18:00:37 +03:00
|
|
|
peer.Done ();
|
2017-05-29 08:28:16 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2015-01-14 05:31:39 +03:00
|
|
|
m_Peers.erase (ident);
|
|
|
|
return false;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-01-14 05:31:39 +03:00
|
|
|
else // otherwise request RI
|
|
|
|
{
|
2015-12-18 15:57:22 +03:00
|
|
|
LogPrint (eLogInfo, "Transports: RouterInfo for ", ident.ToBase64 (), " not found, requested");
|
2015-01-15 00:37:03 +03:00
|
|
|
i2p::data::netdb.RequestDestination (ident, std::bind (
|
|
|
|
&Transports::RequestComplete, this, std::placeholders::_1, ident));
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-01-14 05:31:39 +03:00
|
|
|
return true;
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
|
2015-01-15 00:37:03 +03:00
|
|
|
void Transports::RequestComplete (std::shared_ptr<const i2p::data::RouterInfo> r, const i2p::data::IdentHash& ident)
|
|
|
|
{
|
2016-12-22 21:32:06 +03:00
|
|
|
m_Service->post (std::bind (&Transports::HandleRequestComplete, this, r, ident));
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
|
2015-12-31 19:21:01 +03:00
|
|
|
void Transports::HandleRequestComplete (std::shared_ptr<const i2p::data::RouterInfo> r, i2p::data::IdentHash ident)
|
2014-08-29 05:34:23 +04:00
|
|
|
{
|
2015-01-14 05:31:39 +03:00
|
|
|
auto it = m_Peers.find (ident);
|
|
|
|
if (it != m_Peers.end ())
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2015-01-14 05:31:39 +03:00
|
|
|
if (r)
|
|
|
|
{
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogDebug, "Transports: RouterInfo for ", ident.ToBase64 (), " found, trying to connect");
|
2015-01-14 05:31:39 +03:00
|
|
|
it->second.router = r;
|
|
|
|
ConnectToPeer (ident, it->second);
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-01-14 05:31:39 +03:00
|
|
|
else
|
|
|
|
{
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogWarning, "Transports: RouterInfo not found, failed to send messages");
|
2017-05-29 08:28:16 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2015-01-14 05:31:39 +03:00
|
|
|
m_Peers.erase (it);
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-09 06:06:40 +04:00
|
|
|
void Transports::DetectExternalIP ()
|
|
|
|
{
|
2016-10-28 19:50:26 +03:00
|
|
|
if (RoutesRestricted())
|
2018-01-06 07:01:44 +03:00
|
|
|
{
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint(eLogInfo, "Transports: Restricted routes enabled, not detecting IP");
|
2016-10-28 20:11:50 +03:00
|
|
|
i2p::context.SetStatus (eRouterStatusOK);
|
2016-10-28 19:50:26 +03:00
|
|
|
return;
|
|
|
|
}
|
2015-02-26 22:17:16 +03:00
|
|
|
if (m_SSUServer)
|
2021-03-23 22:36:57 +03:00
|
|
|
PeerTest ();
|
2015-02-26 22:17:16 +03:00
|
|
|
else
|
2015-12-18 15:57:22 +03:00
|
|
|
LogPrint (eLogError, "Transports: Can't detect external IP. SSU is not available");
|
2014-02-09 06:06:40 +04:00
|
|
|
}
|
2015-11-03 17:15:49 +03:00
|
|
|
|
2021-05-04 21:59:25 +03:00
|
|
|
void Transports::PeerTest (bool ipv4, bool ipv6)
|
2015-11-03 17:15:49 +03:00
|
|
|
{
|
2021-03-23 22:36:57 +03:00
|
|
|
if (RoutesRestricted() || !m_SSUServer) return;
|
2021-05-04 21:59:25 +03:00
|
|
|
if (ipv4 && i2p::context.SupportsV4 ())
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogInfo, "Transports: Started peer test IPv4");
|
2021-04-17 21:33:53 +03:00
|
|
|
std::set<i2p::data::IdentHash> excluded;
|
2022-02-19 16:15:49 +03:00
|
|
|
excluded.insert (i2p::context.GetIdentHash ()); // don't pick own router
|
2015-11-03 17:15:49 +03:00
|
|
|
bool statusChanged = false;
|
|
|
|
for (int i = 0; i < 5; i++)
|
|
|
|
{
|
2021-11-27 23:30:35 +03:00
|
|
|
auto router = i2p::data::netdb.GetRandomPeerTestRouter (true, excluded); // v4
|
2016-12-02 19:17:22 +03:00
|
|
|
if (router)
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2021-03-24 17:32:15 +03:00
|
|
|
auto addr = router->GetSSUAddress (true); // ipv4
|
|
|
|
if (addr && !i2p::util::net::IsInReservedRange(addr->host))
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2021-03-24 17:32:15 +03:00
|
|
|
if (!statusChanged)
|
|
|
|
{
|
|
|
|
statusChanged = true;
|
|
|
|
i2p::context.SetStatus (eRouterStatusTesting); // first time only
|
|
|
|
}
|
2021-11-27 23:30:35 +03:00
|
|
|
m_SSUServer->CreateSession (router, addr, true); // peer test v4
|
|
|
|
}
|
2021-04-17 21:33:53 +03:00
|
|
|
excluded.insert (router->GetIdentHash ());
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2016-12-02 19:17:22 +03:00
|
|
|
}
|
|
|
|
if (!statusChanged)
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogWarning, "Transports: Can't find routers for peer test IPv4");
|
2015-11-03 17:15:49 +03:00
|
|
|
}
|
2021-05-04 21:59:25 +03:00
|
|
|
if (ipv6 && i2p::context.SupportsV6 ())
|
2021-03-23 22:36:57 +03:00
|
|
|
{
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogInfo, "Transports: Started peer test IPv6");
|
2021-04-17 21:33:53 +03:00
|
|
|
std::set<i2p::data::IdentHash> excluded;
|
2022-02-19 16:15:49 +03:00
|
|
|
excluded.insert (i2p::context.GetIdentHash ()); // don't pick own router
|
2021-03-23 22:36:57 +03:00
|
|
|
bool statusChanged = false;
|
|
|
|
for (int i = 0; i < 5; i++)
|
|
|
|
{
|
2021-04-17 21:33:53 +03:00
|
|
|
auto router = i2p::data::netdb.GetRandomPeerTestRouter (false, excluded); // v6
|
2021-03-23 22:36:57 +03:00
|
|
|
if (router)
|
|
|
|
{
|
|
|
|
auto addr = router->GetSSUV6Address ();
|
2021-03-24 17:32:15 +03:00
|
|
|
if (addr && !i2p::util::net::IsInReservedRange(addr->host))
|
2021-11-27 23:30:35 +03:00
|
|
|
{
|
2021-03-23 22:36:57 +03:00
|
|
|
if (!statusChanged)
|
|
|
|
{
|
|
|
|
statusChanged = true;
|
|
|
|
i2p::context.SetStatusV6 (eRouterStatusTesting); // first time only
|
|
|
|
}
|
|
|
|
m_SSUServer->CreateSession (router, addr, true); // peer test v6
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2021-04-17 21:33:53 +03:00
|
|
|
excluded.insert (router->GetIdentHash ());
|
2021-03-23 22:36:57 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!statusChanged)
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint (eLogWarning, "Transports: Can't find routers for peer test IPv6");
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
|
2020-06-30 03:02:09 +03:00
|
|
|
std::shared_ptr<i2p::crypto::X25519Keys> Transports::GetNextX25519KeysPair ()
|
|
|
|
{
|
|
|
|
return m_X25519KeysPairSupplier.Acquire ();
|
|
|
|
}
|
|
|
|
|
|
|
|
void Transports::ReuseX25519KeysPair (std::shared_ptr<i2p::crypto::X25519Keys> pair)
|
|
|
|
{
|
|
|
|
m_X25519KeysPairSupplier.Return (pair);
|
|
|
|
}
|
2020-10-12 17:36:44 +03:00
|
|
|
|
2015-01-13 06:53:35 +03:00
|
|
|
void Transports::PeerConnected (std::shared_ptr<TransportSession> session)
|
|
|
|
{
|
2016-12-22 21:32:06 +03:00
|
|
|
m_Service->post([session, this]()
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
|
|
|
auto remoteIdentity = session->GetRemoteIdentity ();
|
2016-02-01 22:19:54 +03:00
|
|
|
if (!remoteIdentity) return;
|
|
|
|
auto ident = remoteIdentity->GetIdentHash ();
|
2016-11-01 17:26:40 +03:00
|
|
|
auto it = m_Peers.find (ident);
|
2015-01-13 06:53:35 +03:00
|
|
|
if (it != m_Peers.end ())
|
|
|
|
{
|
2020-06-24 18:29:54 +03:00
|
|
|
it->second.router = nullptr; // we don't need RouterInfo after successive connect
|
2016-03-19 05:53:03 +03:00
|
|
|
bool sendDatabaseStore = true;
|
|
|
|
if (it->second.delayedMessages.size () > 0)
|
|
|
|
{
|
|
|
|
// check if first message is our DatabaseStore (publishing)
|
|
|
|
auto firstMsg = it->second.delayedMessages[0];
|
|
|
|
if (firstMsg && firstMsg->GetTypeID () == eI2NPDatabaseStore &&
|
2016-06-13 18:34:44 +03:00
|
|
|
i2p::data::IdentHash(firstMsg->GetPayload () + DATABASE_STORE_KEY_OFFSET) == i2p::context.GetIdentHash ())
|
2016-03-19 05:53:03 +03:00
|
|
|
sendDatabaseStore = false; // we have it in the list already
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2016-03-19 05:53:03 +03:00
|
|
|
if (sendDatabaseStore)
|
2018-08-14 18:27:27 +03:00
|
|
|
session->SendLocalRouterInfo ();
|
2016-08-04 17:26:50 +03:00
|
|
|
else
|
|
|
|
session->SetTerminationTimeout (10); // most likely it's publishing, no follow-up messages expected, set timeout to 10 seconds
|
2015-06-09 18:00:37 +03:00
|
|
|
it->second.sessions.push_back (session);
|
|
|
|
session->SendI2NPMessages (it->second.delayedMessages);
|
|
|
|
it->second.delayedMessages.clear ();
|
2015-01-13 06:53:35 +03:00
|
|
|
}
|
2015-01-14 05:31:39 +03:00
|
|
|
else // incoming connection
|
2016-01-16 00:23:03 +03:00
|
|
|
{
|
2016-10-28 19:50:26 +03:00
|
|
|
if(RoutesRestricted() && ! IsRestrictedPeer(ident)) {
|
|
|
|
// not trusted
|
2021-11-27 22:53:53 +03:00
|
|
|
LogPrint(eLogWarning, "Transports: Closing untrusted inbound connection from ", ident.ToBase64());
|
2016-10-28 19:50:26 +03:00
|
|
|
session->Done();
|
|
|
|
return;
|
|
|
|
}
|
2016-03-19 05:53:03 +03:00
|
|
|
session->SendI2NPMessages ({ CreateDatabaseStoreMsg () }); // send DatabaseStore
|
2017-05-29 08:28:16 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2015-12-24 03:55:53 +03:00
|
|
|
m_Peers.insert (std::make_pair (ident, Peer{ 0, nullptr, { session }, i2p::util::GetSecondsSinceEpoch (), {} }));
|
2016-01-16 00:23:03 +03:00
|
|
|
}
|
2016-11-01 17:26:40 +03:00
|
|
|
});
|
2015-01-13 06:53:35 +03:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
|
2015-01-13 06:53:35 +03:00
|
|
|
void Transports::PeerDisconnected (std::shared_ptr<TransportSession> session)
|
|
|
|
{
|
2016-12-22 21:32:06 +03:00
|
|
|
m_Service->post([session, this]()
|
2016-11-01 17:26:40 +03:00
|
|
|
{
|
2017-05-29 08:28:16 +03:00
|
|
|
auto remoteIdentity = session->GetRemoteIdentity ();
|
2016-02-01 22:19:54 +03:00
|
|
|
if (!remoteIdentity) return;
|
|
|
|
auto ident = remoteIdentity->GetIdentHash ();
|
2015-01-13 06:53:35 +03:00
|
|
|
auto it = m_Peers.find (ident);
|
2015-06-09 18:00:37 +03:00
|
|
|
if (it != m_Peers.end ())
|
2015-01-14 05:31:39 +03:00
|
|
|
{
|
2019-11-12 17:38:22 +03:00
|
|
|
auto before = it->second.sessions.size ();
|
2015-06-09 18:00:37 +03:00
|
|
|
it->second.sessions.remove (session);
|
2020-03-01 17:35:24 +03:00
|
|
|
if (it->second.sessions.empty ())
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
2015-06-09 18:00:37 +03:00
|
|
|
if (it->second.delayedMessages.size () > 0)
|
2019-11-12 14:46:08 +03:00
|
|
|
{
|
2019-11-12 17:38:22 +03:00
|
|
|
if (before > 0) // we had an active session before
|
|
|
|
it->second.numAttempts = 0; // start over
|
2015-06-09 18:00:37 +03:00
|
|
|
ConnectToPeer (ident, it->second);
|
2020-03-01 17:35:24 +03:00
|
|
|
}
|
2015-06-09 18:00:37 +03:00
|
|
|
else
|
2016-01-16 00:23:03 +03:00
|
|
|
{
|
2017-05-29 08:28:16 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2015-06-09 18:00:37 +03:00
|
|
|
m_Peers.erase (it);
|
2016-01-16 00:23:03 +03:00
|
|
|
}
|
2015-06-09 18:00:37 +03:00
|
|
|
}
|
2015-01-14 05:31:39 +03:00
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
});
|
|
|
|
}
|
2015-02-11 22:45:25 +03:00
|
|
|
|
2015-03-18 03:56:51 +03:00
|
|
|
bool Transports::IsConnected (const i2p::data::IdentHash& ident) const
|
2017-05-29 08:28:16 +03:00
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2015-03-18 03:56:51 +03:00
|
|
|
auto it = m_Peers.find (ident);
|
|
|
|
return it != m_Peers.end ();
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
|
2015-02-11 22:45:25 +03:00
|
|
|
void Transports::HandlePeerCleanupTimer (const boost::system::error_code& ecode)
|
|
|
|
{
|
2015-02-12 06:48:26 +03:00
|
|
|
if (ecode != boost::asio::error::operation_aborted)
|
2015-02-11 22:45:25 +03:00
|
|
|
{
|
2015-02-12 06:48:26 +03:00
|
|
|
auto ts = i2p::util::GetSecondsSinceEpoch ();
|
|
|
|
for (auto it = m_Peers.begin (); it != m_Peers.end (); )
|
2015-02-11 22:45:25 +03:00
|
|
|
{
|
2015-06-09 18:00:37 +03:00
|
|
|
if (it->second.sessions.empty () && ts > it->second.creationTime + SESSION_CREATION_TIMEOUT)
|
2015-02-12 06:48:26 +03:00
|
|
|
{
|
2015-12-18 15:57:22 +03:00
|
|
|
LogPrint (eLogWarning, "Transports: Session to peer ", it->first.ToBase64 (), " has not been created in ", SESSION_CREATION_TIMEOUT, " seconds");
|
2016-06-28 21:43:55 +03:00
|
|
|
auto profile = i2p::data::GetRouterProfile(it->first);
|
|
|
|
if (profile)
|
|
|
|
{
|
|
|
|
profile->TunnelNonReplied();
|
|
|
|
}
|
2020-03-01 13:25:50 +03:00
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
2015-02-12 06:48:26 +03:00
|
|
|
it = m_Peers.erase (it);
|
|
|
|
}
|
|
|
|
else
|
2016-08-09 01:53:37 +03:00
|
|
|
++it;
|
2015-02-11 22:45:25 +03:00
|
|
|
}
|
2015-03-17 22:19:38 +03:00
|
|
|
UpdateBandwidth (); // TODO: use separate timer(s) for it
|
2021-05-04 21:59:25 +03:00
|
|
|
bool ipv4Testing = i2p::context.GetStatus () == eRouterStatusTesting;
|
|
|
|
bool ipv6Testing = i2p::context.GetStatusV6 () == eRouterStatusTesting;
|
|
|
|
// if still testing, repeat peer test
|
|
|
|
if (ipv4Testing || ipv6Testing)
|
|
|
|
PeerTest (ipv4Testing, ipv6Testing);
|
|
|
|
m_PeerCleanupTimer->expires_from_now (boost::posix_time::seconds(3*SESSION_CREATION_TIMEOUT));
|
2016-12-22 21:32:06 +03:00
|
|
|
m_PeerCleanupTimer->async_wait (std::bind (&Transports::HandlePeerCleanupTimer, this, std::placeholders::_1));
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
2015-02-11 22:45:25 +03:00
|
|
|
}
|
2015-05-05 17:33:19 +03:00
|
|
|
|
2016-11-13 17:14:05 +03:00
|
|
|
void Transports::HandlePeerTestTimer (const boost::system::error_code& ecode)
|
|
|
|
{
|
|
|
|
if (ecode != boost::asio::error::operation_aborted)
|
|
|
|
{
|
|
|
|
PeerTest ();
|
2016-12-22 21:32:06 +03:00
|
|
|
m_PeerTestTimer->expires_from_now (boost::posix_time::minutes(PEER_TEST_INTERVAL));
|
|
|
|
m_PeerTestTimer->async_wait (std::bind (&Transports::HandlePeerTestTimer, this, std::placeholders::_1));
|
2017-05-29 08:28:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-05 17:33:19 +03:00
|
|
|
std::shared_ptr<const i2p::data::RouterInfo> Transports::GetRandomPeer () const
|
|
|
|
{
|
2016-06-01 03:00:00 +03:00
|
|
|
if (m_Peers.empty ()) return nullptr;
|
2021-03-16 22:23:00 +03:00
|
|
|
i2p::data::IdentHash ident;
|
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> l(m_PeersMutex);
|
|
|
|
auto it = m_Peers.begin ();
|
|
|
|
std::advance (it, rand () % m_Peers.size ());
|
|
|
|
if (it == m_Peers.end () || it->second.router) return nullptr; // not connected
|
|
|
|
ident = it->first;
|
2021-11-27 23:30:35 +03:00
|
|
|
}
|
2021-03-16 22:23:00 +03:00
|
|
|
return i2p::data::netdb.FindRouter (ident);
|
2015-05-05 17:33:19 +03:00
|
|
|
}
|
2016-11-01 17:26:40 +03:00
|
|
|
void Transports::RestrictRoutesToFamilies(std::set<std::string> families)
|
|
|
|
{
|
|
|
|
std::lock_guard<std::mutex> lock(m_FamilyMutex);
|
|
|
|
m_TrustedFamilies.clear();
|
|
|
|
for ( const auto& fam : families )
|
|
|
|
m_TrustedFamilies.push_back(fam);
|
|
|
|
}
|
2016-06-17 18:03:33 +03:00
|
|
|
|
2016-10-28 19:50:26 +03:00
|
|
|
void Transports::RestrictRoutesToRouters(std::set<i2p::data::IdentHash> routers)
|
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> lock(m_TrustedRoutersMutex);
|
|
|
|
m_TrustedRouters.clear();
|
|
|
|
for (const auto & ri : routers )
|
|
|
|
m_TrustedRouters.push_back(ri);
|
|
|
|
}
|
2017-05-29 08:28:16 +03:00
|
|
|
|
2016-11-01 17:26:40 +03:00
|
|
|
bool Transports::RoutesRestricted() const {
|
|
|
|
std::unique_lock<std::mutex> famlock(m_FamilyMutex);
|
2016-10-28 19:50:26 +03:00
|
|
|
std::unique_lock<std::mutex> routerslock(m_TrustedRoutersMutex);
|
2016-11-01 17:26:40 +03:00
|
|
|
return m_TrustedFamilies.size() > 0 || m_TrustedRouters.size() > 0;
|
|
|
|
}
|
2016-06-17 18:03:33 +03:00
|
|
|
|
2016-11-01 17:26:40 +03:00
|
|
|
/** XXX: if routes are not restricted this dies */
|
|
|
|
std::shared_ptr<const i2p::data::RouterInfo> Transports::GetRestrictedPeer() const
|
2016-10-28 19:50:26 +03:00
|
|
|
{
|
|
|
|
{
|
|
|
|
std::lock_guard<std::mutex> l(m_FamilyMutex);
|
|
|
|
std::string fam;
|
|
|
|
auto sz = m_TrustedFamilies.size();
|
|
|
|
if(sz > 1)
|
|
|
|
{
|
|
|
|
auto it = m_TrustedFamilies.begin ();
|
|
|
|
std::advance(it, rand() % sz);
|
|
|
|
fam = *it;
|
|
|
|
boost::to_lower(fam);
|
|
|
|
}
|
|
|
|
else if (sz == 1)
|
|
|
|
{
|
|
|
|
fam = m_TrustedFamilies[0];
|
|
|
|
}
|
|
|
|
if (fam.size())
|
|
|
|
return i2p::data::netdb.GetRandomRouterInFamily(fam);
|
|
|
|
}
|
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> l(m_TrustedRoutersMutex);
|
|
|
|
auto sz = m_TrustedRouters.size();
|
|
|
|
if (sz)
|
|
|
|
{
|
|
|
|
if(sz == 1)
|
|
|
|
return i2p::data::netdb.FindRouter(m_TrustedRouters[0]);
|
|
|
|
auto it = m_TrustedRouters.begin();
|
|
|
|
std::advance(it, rand() % sz);
|
|
|
|
return i2p::data::netdb.FindRouter(*it);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nullptr;
|
2016-11-01 17:26:40 +03:00
|
|
|
}
|
2016-10-28 19:50:26 +03:00
|
|
|
|
|
|
|
bool Transports::IsRestrictedPeer(const i2p::data::IdentHash & ih) const
|
|
|
|
{
|
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> l(m_TrustedRoutersMutex);
|
|
|
|
for (const auto & r : m_TrustedRouters )
|
|
|
|
if ( r == ih ) return true;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
std::unique_lock<std::mutex> l(m_FamilyMutex);
|
|
|
|
auto ri = i2p::data::netdb.FindRouter(ih);
|
|
|
|
for (const auto & fam : m_TrustedFamilies)
|
|
|
|
if(ri->IsFamily(fam)) return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
2020-10-12 00:51:40 +03:00
|
|
|
|
2020-10-12 17:36:44 +03:00
|
|
|
void Transports::SetOnline (bool online)
|
|
|
|
{
|
2020-10-12 00:51:40 +03:00
|
|
|
if (m_IsOnline != online)
|
2020-10-12 17:36:44 +03:00
|
|
|
{
|
|
|
|
m_IsOnline = online;
|
2020-10-12 00:51:40 +03:00
|
|
|
if (online)
|
|
|
|
PeerTest ();
|
|
|
|
else
|
|
|
|
i2p::context.SetError (eRouterErrorOffline);
|
2020-10-12 17:36:44 +03:00
|
|
|
}
|
|
|
|
}
|
2013-10-27 19:26:39 +04:00
|
|
|
}
|
2014-10-21 20:25:53 +04:00
|
|
|
}
|