i2pd/libi2pd/I2NPProtocol.cpp

946 lines
31 KiB
C++
Raw Normal View History

/*
2024-01-22 02:59:04 +03:00
* Copyright (c) 2013-2024, The PurpleI2P Project
*
* This file is part of Purple i2pd project and licensed under BSD3
*
* See full license text in LICENSE file at top of project tree
*/
2013-10-27 19:20:29 +04:00
#include <string.h>
2014-07-07 01:48:16 +04:00
#include <atomic>
2015-11-03 17:15:49 +03:00
#include "Base.h"
#include "Log.h"
#include "Crypto.h"
2014-01-20 18:36:20 +04:00
#include "I2PEndian.h"
2013-10-27 19:20:29 +04:00
#include "Timestamp.h"
#include "RouterContext.h"
#include "NetDb.hpp"
2013-10-27 19:20:29 +04:00
#include "Tunnel.h"
#include "Transports.h"
2013-12-14 05:07:35 +04:00
#include "Garlic.h"
2021-06-08 22:36:27 +03:00
#include "ECIESX25519AEADRatchetSession.h"
2013-10-27 19:20:29 +04:00
#include "I2NPProtocol.h"
#include "version.h"
2013-10-27 19:20:29 +04:00
using namespace i2p::transport;
2013-10-27 19:20:29 +04:00
namespace i2p
{
2015-11-24 21:09:12 +03:00
std::shared_ptr<I2NPMessage> NewI2NPMessage ()
2013-10-27 19:20:29 +04:00
{
2015-11-24 21:09:12 +03:00
return std::make_shared<I2NPMessageBuffer<I2NP_MAX_MESSAGE_SIZE> >();
2013-10-27 19:20:29 +04:00
}
2018-01-06 06:48:51 +03:00
2015-11-24 21:09:12 +03:00
std::shared_ptr<I2NPMessage> NewI2NPShortMessage ()
2014-07-31 00:52:35 +04:00
{
2015-11-24 21:09:12 +03:00
return std::make_shared<I2NPMessageBuffer<I2NP_MAX_SHORT_MESSAGE_SIZE> >();
2014-07-31 00:52:35 +04:00
}
2023-03-18 22:32:05 +03:00
std::shared_ptr<I2NPMessage> NewI2NPMediumMessage ()
{
return std::make_shared<I2NPMessageBuffer<I2NP_MAX_MEDIUM_MESSAGE_SIZE> >();
}
2023-05-08 17:50:27 +03:00
std::shared_ptr<I2NPMessage> NewI2NPTunnelMessage (bool endpoint)
{
return i2p::tunnel::tunnels.NewI2NPTunnelMessage (endpoint);
2018-01-06 06:48:51 +03:00
}
2015-11-24 21:09:12 +03:00
std::shared_ptr<I2NPMessage> NewI2NPMessage (size_t len)
2014-07-31 02:20:42 +04:00
{
2023-03-18 22:32:05 +03:00
len += I2NP_HEADER_SIZE + 2;
if (len <= I2NP_MAX_SHORT_MESSAGE_SIZE) return NewI2NPShortMessage ();
if (len <= I2NP_MAX_MEDIUM_MESSAGE_SIZE) return NewI2NPMediumMessage ();
2023-05-08 17:50:27 +03:00
return NewI2NPMessage ();
2018-01-06 06:48:51 +03:00
}
void I2NPMessage::FillI2NPMessageHeader (I2NPMessageType msgType, uint32_t replyMsgID, bool checksum)
2013-10-27 19:20:29 +04:00
{
SetTypeID (msgType);
2015-11-03 17:15:49 +03:00
if (!replyMsgID) RAND_bytes ((uint8_t *)&replyMsgID, 4);
2018-01-06 06:48:51 +03:00
SetMsgID (replyMsgID);
SetExpiration (i2p::util::GetMillisecondsSinceEpoch () + I2NP_MESSAGE_EXPIRATION_TIMEOUT);
UpdateSize ();
if (checksum) UpdateChks ();
2018-01-06 06:48:51 +03:00
}
void I2NPMessage::RenewI2NPMessageHeader ()
{
2015-11-03 17:15:49 +03:00
uint32_t msgID;
RAND_bytes ((uint8_t *)&msgID, 4);
SetMsgID (msgID);
2018-01-06 06:48:51 +03:00
SetExpiration (i2p::util::GetMillisecondsSinceEpoch () + I2NP_MESSAGE_EXPIRATION_TIMEOUT);
}
2024-01-22 02:59:04 +03:00
bool I2NPMessage::IsExpired (uint64_t ts) const
2016-01-19 05:13:43 +03:00
{
2018-01-06 06:48:51 +03:00
auto exp = GetExpiration ();
2016-01-19 19:16:50 +03:00
return (ts > exp + I2NP_MESSAGE_CLOCK_SKEW) || (ts < exp - 3*I2NP_MESSAGE_CLOCK_SKEW); // check if expired or too far in future
2024-01-22 02:59:04 +03:00
}
bool I2NPMessage::IsExpired () const
{
return IsExpired (i2p::util::GetMillisecondsSinceEpoch ());
2018-01-06 06:48:51 +03:00
}
2016-01-05 22:29:18 +03:00
std::shared_ptr<I2NPMessage> CreateI2NPMessage (I2NPMessageType msgType, const uint8_t * buf, size_t len, uint32_t replyMsgID)
2013-10-27 19:20:29 +04:00
{
2015-11-24 21:09:12 +03:00
auto msg = NewI2NPMessage (len);
2016-01-05 22:29:18 +03:00
if (msg->Concat (buf, len) < len)
LogPrint (eLogError, "I2NP: Message length ", len, " exceeds max length ", msg->maxLen);
msg->FillI2NPMessageHeader (msgType, replyMsgID);
2013-10-27 19:20:29 +04:00
return msg;
2018-01-06 06:48:51 +03:00
}
2013-10-27 19:20:29 +04:00
2016-01-05 22:29:18 +03:00
std::shared_ptr<I2NPMessage> CreateI2NPMessage (const uint8_t * buf, size_t len, std::shared_ptr<i2p::tunnel::InboundTunnel> from)
2013-11-11 03:23:26 +04:00
{
2015-11-24 21:09:12 +03:00
auto msg = NewI2NPMessage ();
2015-05-11 19:53:08 +03:00
if (msg->offset + len < msg->maxLen)
{
memcpy (msg->GetBuffer (), buf, len);
msg->len = msg->offset + len;
msg->from = from;
}
else
LogPrint (eLogError, "I2NP: Message length ", len, " exceeds max length");
2015-11-24 21:09:12 +03:00
return msg;
2018-01-06 06:48:51 +03:00
}
2016-02-01 02:27:47 +03:00
std::shared_ptr<I2NPMessage> CopyI2NPMessage (std::shared_ptr<I2NPMessage> msg)
{
if (!msg) return nullptr;
auto newMsg = NewI2NPMessage (msg->len);
newMsg->offset = msg->offset;
*newMsg = *msg;
return newMsg;
2018-01-06 06:48:51 +03:00
}
2024-02-27 11:15:15 +03:00
std::shared_ptr<I2NPMessage> CreateTunnelTestMsg (uint32_t msgID)
{
auto m = NewI2NPShortMessage ();
uint8_t * buf = m->GetPayload ();
htobe32buf (buf + TUNNEL_TEST_MSGID_OFFSET, msgID);
2024-02-27 20:33:07 +03:00
htobe64buf (buf + TUNNEL_TEST_TIMESTAMP_OFFSET, i2p::util::GetMonotonicMicroseconds ());
2024-02-27 11:15:15 +03:00
m->len += TUNNEL_TEST_SIZE;
m->FillI2NPMessageHeader (eI2NPTunnelTest);
return m;
}
2015-06-24 17:45:58 +03:00
std::shared_ptr<I2NPMessage> CreateDeliveryStatusMsg (uint32_t msgID)
2013-10-27 19:20:29 +04:00
{
2015-11-24 21:09:12 +03:00
auto m = NewI2NPShortMessage ();
uint8_t * buf = m->GetPayload ();
2014-02-25 00:16:39 +04:00
if (msgID)
{
htobe32buf (buf + DELIVERY_STATUS_MSGID_OFFSET, msgID);
htobe64buf (buf + DELIVERY_STATUS_TIMESTAMP_OFFSET, i2p::util::GetMillisecondsSinceEpoch ());
2014-02-25 00:16:39 +04:00
}
else // for SSU establishment
{
2015-11-03 17:15:49 +03:00
RAND_bytes ((uint8_t *)&msgID, 4);
htobe32buf (buf + DELIVERY_STATUS_MSGID_OFFSET, msgID);
2018-01-06 06:48:51 +03:00
htobe64buf (buf + DELIVERY_STATUS_TIMESTAMP_OFFSET, i2p::context.GetNetID ());
}
m->len += DELIVERY_STATUS_SIZE;
m->FillI2NPMessageHeader (eI2NPDeliveryStatus);
2015-11-24 21:09:12 +03:00
return m;
2013-10-27 19:20:29 +04:00
}
2018-01-06 06:48:51 +03:00
std::shared_ptr<I2NPMessage> CreateRouterInfoDatabaseLookupMsg (const uint8_t * key, const uint8_t * from,
uint32_t replyTunnelID, bool exploratory, std::unordered_set<i2p::data::IdentHash> * excludedPeers)
2013-10-27 19:20:29 +04:00
{
2023-03-22 04:25:00 +03:00
int cnt = excludedPeers ? excludedPeers->size () : 0;
auto m = cnt > 7 ? NewI2NPMessage () : NewI2NPShortMessage ();
2013-11-19 05:37:38 +04:00
uint8_t * buf = m->GetPayload ();
memcpy (buf, key, 32); // key
buf += 32;
memcpy (buf, from, 32); // from
buf += 32;
2018-01-06 06:48:51 +03:00
uint8_t flag = exploratory ? DATABASE_LOOKUP_TYPE_EXPLORATORY_LOOKUP : DATABASE_LOOKUP_TYPE_ROUTERINFO_LOOKUP;
2013-11-19 05:37:38 +04:00
if (replyTunnelID)
2013-10-27 19:20:29 +04:00
{
2015-02-02 19:06:36 +03:00
*buf = flag | DATABASE_LOOKUP_DELIVERY_FLAG; // set delivery flag
htobe32buf (buf+1, replyTunnelID);
2013-11-19 05:37:38 +04:00
buf += 5;
}
else
2018-01-06 06:48:51 +03:00
{
2015-01-05 01:25:16 +03:00
*buf = flag; // flag
2013-11-19 05:37:38 +04:00
buf++;
2018-01-06 06:48:51 +03:00
}
2015-01-05 01:25:16 +03:00
if (excludedPeers)
2013-11-19 05:37:38 +04:00
{
2015-01-05 01:25:16 +03:00
htobe16buf (buf, cnt);
2013-11-19 05:37:38 +04:00
buf += 2;
2015-01-05 01:25:16 +03:00
for (auto& it: *excludedPeers)
2014-01-05 18:53:44 +04:00
{
2015-01-05 01:25:16 +03:00
memcpy (buf, it, 32);
buf += 32;
2018-01-06 06:48:51 +03:00
}
2015-01-05 01:25:16 +03:00
}
else
2018-01-06 06:48:51 +03:00
{
2015-01-05 01:25:16 +03:00
// nothing to exclude
htobuf16 (buf, 0);
buf += 2;
2018-01-06 06:48:51 +03:00
}
m->len += (buf - m->GetPayload ());
m->FillI2NPMessageHeader (eI2NPDatabaseLookup);
2018-01-06 06:48:51 +03:00
return m;
}
2013-10-27 19:20:29 +04:00
2018-01-06 06:48:51 +03:00
std::shared_ptr<I2NPMessage> CreateLeaseSetDatabaseLookupMsg (const i2p::data::IdentHash& dest,
const std::unordered_set<i2p::data::IdentHash>& excludedFloodfills,
std::shared_ptr<const i2p::tunnel::InboundTunnel> replyTunnel, const uint8_t * replyKey,
const uint8_t * replyTag, bool replyECIES)
2014-12-30 20:25:08 +03:00
{
2015-07-05 14:59:38 +03:00
int cnt = excludedFloodfills.size ();
auto m = cnt > 7 ? NewI2NPMessage () : NewI2NPShortMessage ();
2014-12-30 20:25:08 +03:00
uint8_t * buf = m->GetPayload ();
memcpy (buf, dest, 32); // key
buf += 32;
memcpy (buf, replyTunnel->GetNextIdentHash (), 32); // reply tunnel GW
buf += 32;
*buf = DATABASE_LOOKUP_DELIVERY_FLAG | DATABASE_LOOKUP_TYPE_LEASESET_LOOKUP; // flags
*buf |= (replyECIES ? DATABASE_LOOKUP_ECIES_FLAG : DATABASE_LOOKUP_ENCRYPTION_FLAG);
2016-07-15 20:54:34 +03:00
buf ++;
htobe32buf (buf, replyTunnel->GetNextTunnelID ()); // reply tunnel ID
buf += 4;
2018-01-06 06:48:51 +03:00
2014-12-30 20:25:08 +03:00
// excluded
if (cnt > 512)
{
LogPrint (eLogWarning, "I2NP: Too many peers to exclude ", cnt, " for DatabaseLookup");
cnt = 0;
}
2014-12-30 20:25:08 +03:00
htobe16buf (buf, cnt);
buf += 2;
if (cnt > 0)
{
for (auto& it: excludedFloodfills)
{
memcpy (buf, it, 32);
buf += 32;
}
2018-01-06 06:48:51 +03:00
}
2014-12-30 20:25:08 +03:00
// encryption
memcpy (buf, replyKey, 32);
buf[32] = 1; // 1 tag
if (replyECIES)
{
memcpy (buf + 33, replyTag, 8); // 8 bytes tag
buf += 41;
}
else
{
memcpy (buf + 33, replyTag, 32); // 32 bytes tag
buf += 65;
}
2014-12-30 20:25:08 +03:00
2018-01-06 06:48:51 +03:00
m->len += (buf - m->GetPayload ());
m->FillI2NPMessageHeader (eI2NPDatabaseLookup);
2018-01-06 06:48:51 +03:00
return m;
}
2014-12-30 20:25:08 +03:00
2018-01-06 06:48:51 +03:00
std::shared_ptr<I2NPMessage> CreateDatabaseSearchReply (const i2p::data::IdentHash& ident,
std::vector<i2p::data::IdentHash> routers)
2014-01-06 07:21:59 +04:00
{
2015-11-24 21:09:12 +03:00
auto m = NewI2NPShortMessage ();
2014-01-06 07:21:59 +04:00
uint8_t * buf = m->GetPayload ();
2014-07-25 06:01:07 +04:00
size_t len = 0;
2014-01-06 07:21:59 +04:00
memcpy (buf, ident, 32);
2014-07-25 06:01:07 +04:00
len += 32;
2018-01-06 06:48:51 +03:00
buf[len] = routers.size ();
2014-07-25 06:01:07 +04:00
len++;
2016-08-05 21:23:54 +03:00
for (const auto& it: routers)
2014-07-25 06:01:07 +04:00
{
2015-02-02 03:58:26 +03:00
memcpy (buf + len, it, 32);
2014-07-25 06:01:07 +04:00
len += 32;
2018-01-06 06:48:51 +03:00
}
2014-07-25 06:01:07 +04:00
memcpy (buf + len, i2p::context.GetRouterInfo ().GetIdentHash (), 32);
2018-01-06 06:48:51 +03:00
len += 32;
2014-07-25 06:01:07 +04:00
m->len += len;
m->FillI2NPMessageHeader (eI2NPDatabaseSearchReply);
2018-01-06 06:48:51 +03:00
return m;
}
std::shared_ptr<I2NPMessage> CreateDatabaseStoreMsg (std::shared_ptr<const i2p::data::RouterInfo> router,
uint32_t replyToken, std::shared_ptr<const i2p::tunnel::InboundTunnel> replyTunnel)
2013-10-27 19:20:29 +04:00
{
if (!router) // we send own RouterInfo
2015-04-07 22:15:27 +03:00
router = context.GetSharedRouterInfo ();
2021-07-14 21:46:56 +03:00
if (!router->GetBuffer ())
{
LogPrint (eLogError, "I2NP: Invalid RouterInfo buffer for DatabaseStore");
return nullptr;
}
2015-11-24 21:09:12 +03:00
auto m = NewI2NPShortMessage ();
2018-01-06 06:48:51 +03:00
uint8_t * payload = m->GetPayload ();
2013-10-27 19:20:29 +04:00
2015-01-03 05:11:40 +03:00
memcpy (payload + DATABASE_STORE_KEY_OFFSET, router->GetIdentHash (), 32);
payload[DATABASE_STORE_TYPE_OFFSET] = 0; // RouterInfo
htobe32buf (payload + DATABASE_STORE_REPLY_TOKEN_OFFSET, replyToken);
uint8_t * buf = payload + DATABASE_STORE_HEADER_SIZE;
if (replyToken)
{
if (replyTunnel)
{
htobe32buf (buf, replyTunnel->GetNextTunnelID ());
buf += 4; // reply tunnelID
memcpy (buf, replyTunnel->GetNextIdentHash (), 32);
buf += 32; // reply tunnel gateway
}
else
{
memset (buf, 0, 4); // zero tunnelID means direct reply
buf += 4;
memcpy (buf, context.GetIdentHash (), 32);
buf += 32;
}
2018-01-06 06:48:51 +03:00
}
2015-11-03 17:15:49 +03:00
uint8_t * sizePtr = buf;
2013-11-20 16:46:09 +04:00
buf += 2;
m->len += (buf - payload); // payload size
2020-05-23 01:32:44 +03:00
size_t size = 0;
if (router->GetBufferLen () + (buf - payload) <= 940) // fits one tunnel message
size = i2p::data::GzipNoCompression (router->GetBuffer (), router->GetBufferLen (), buf, m->maxLen -m->len);
else
{
i2p::data::GzipDeflator deflator;
size = deflator.Deflate (router->GetBuffer (), router->GetBufferLen (), buf, m->maxLen -m->len);
}
2015-11-03 17:15:49 +03:00
if (size)
2018-01-06 06:48:51 +03:00
{
2015-11-03 17:15:49 +03:00
htobe16buf (sizePtr, size); // size
m->len += size;
2018-01-06 06:48:51 +03:00
}
2015-11-03 17:15:49 +03:00
else
m = nullptr;
if (m)
m->FillI2NPMessageHeader (eI2NPDatabaseStore);
2013-10-27 19:20:29 +04:00
return m;
2018-01-06 06:48:51 +03:00
}
2013-10-27 19:20:29 +04:00
std::shared_ptr<I2NPMessage> CreateDatabaseStoreMsg (const i2p::data::IdentHash& storeHash, std::shared_ptr<const i2p::data::LeaseSet> leaseSet)
2016-05-25 22:10:28 +03:00
{
if (!leaseSet) return nullptr;
auto m = NewI2NPShortMessage ();
2018-01-06 06:48:51 +03:00
uint8_t * payload = m->GetPayload ();
memcpy (payload + DATABASE_STORE_KEY_OFFSET, storeHash, 32);
payload[DATABASE_STORE_TYPE_OFFSET] = leaseSet->GetStoreType (); // 1 for LeaseSet
2016-05-25 22:10:28 +03:00
htobe32buf (payload + DATABASE_STORE_REPLY_TOKEN_OFFSET, 0);
size_t size = DATABASE_STORE_HEADER_SIZE;
memcpy (payload + size, leaseSet->GetBuffer (), leaseSet->GetBufferLen ());
size += leaseSet->GetBufferLen ();
m->len += size;
m->FillI2NPMessageHeader (eI2NPDatabaseStore);
return m;
}
std::shared_ptr<I2NPMessage> CreateDatabaseStoreMsg (std::shared_ptr<const i2p::data::LocalLeaseSet> leaseSet, uint32_t replyToken, std::shared_ptr<const i2p::tunnel::InboundTunnel> replyTunnel)
2014-07-29 22:31:55 +04:00
{
if (!leaseSet) return nullptr;
2015-11-24 21:09:12 +03:00
auto m = NewI2NPShortMessage ();
2018-01-06 06:48:51 +03:00
uint8_t * payload = m->GetPayload ();
2019-04-09 22:36:10 +03:00
memcpy (payload + DATABASE_STORE_KEY_OFFSET, leaseSet->GetStoreHash (), 32);
2019-01-09 22:51:47 +03:00
payload[DATABASE_STORE_TYPE_OFFSET] = leaseSet->GetStoreType (); // LeaseSet or LeaseSet2
2015-01-03 05:11:40 +03:00
htobe32buf (payload + DATABASE_STORE_REPLY_TOKEN_OFFSET, replyToken);
size_t size = DATABASE_STORE_HEADER_SIZE;
if (replyToken && replyTunnel)
2014-08-20 19:12:53 +04:00
{
if (replyTunnel)
2014-08-20 19:12:53 +04:00
{
htobe32buf (payload + size, replyTunnel->GetNextTunnelID ());
2014-08-20 19:12:53 +04:00
size += 4; // reply tunnelID
memcpy (payload + size, replyTunnel->GetNextIdentHash (), 32);
2014-08-20 19:12:53 +04:00
size += 32; // reply tunnel gateway
}
else
2015-01-03 05:11:40 +03:00
htobe32buf (payload + DATABASE_STORE_REPLY_TOKEN_OFFSET, 0);
2014-08-20 19:12:53 +04:00
}
memcpy (payload + size, leaseSet->GetBuffer (), leaseSet->GetBufferLen ());
size += leaseSet->GetBufferLen ();
m->len += size;
m->FillI2NPMessageHeader (eI2NPDatabaseStore);
2014-07-29 22:31:55 +04:00
return m;
}
bool IsRouterInfoMsg (std::shared_ptr<I2NPMessage> msg)
{
if (!msg || msg->GetTypeID () != eI2NPDatabaseStore) return false;
return !msg->GetPayload ()[DATABASE_STORE_TYPE_OFFSET]; // 0- RouterInfo
2018-01-06 06:48:51 +03:00
}
2021-07-21 02:38:36 +03:00
static bool HandleBuildRequestRecords (int num, uint8_t * records, uint8_t * clearText)
2014-04-30 22:08:57 +04:00
{
for (int i = 0; i < num; i++)
2018-01-06 06:48:51 +03:00
{
uint8_t * record = records + i*TUNNEL_BUILD_RECORD_SIZE;
if (!memcmp (record + BUILD_REQUEST_RECORD_TO_PEER_OFFSET, (const uint8_t *)i2p::context.GetRouterInfo ().GetIdentHash (), 16))
2018-01-06 06:48:51 +03:00
{
2015-12-17 10:11:36 +03:00
LogPrint (eLogDebug, "I2NP: Build request record ", i, " is ours");
if (!i2p::context.DecryptTunnelBuildRecord (record + BUILD_REQUEST_RECORD_ENCRYPTED_OFFSET, clearText))
{
LogPrint (eLogWarning, "I2NP: Failed to decrypt tunnel build record");
return false;
}
if (!memcmp ((const uint8_t *)i2p::context.GetIdentHash (), clearText + ECIES_BUILD_REQUEST_RECORD_NEXT_IDENT_OFFSET, 32) && // if next ident is now ours
!(clearText[ECIES_BUILD_REQUEST_RECORD_FLAG_OFFSET] & TUNNEL_BUILD_RECORD_ENDPOINT_FLAG)) // and not endpoint
{
LogPrint (eLogWarning, "I2NP: Next ident is ours in tunnel build record");
return false;
}
uint8_t retCode = 0;
2018-01-06 06:48:51 +03:00
// replace record to reply
2024-02-20 11:30:05 +03:00
if (i2p::context.AcceptsTunnels () && i2p::context.GetCongestionLevel (false) < CONGESTION_LEVEL_FULL)
2018-01-06 06:48:51 +03:00
{
2021-09-05 16:10:13 +03:00
auto transitTunnel = i2p::tunnel::CreateTransitTunnel (
bufbe32toh (clearText + ECIES_BUILD_REQUEST_RECORD_RECEIVE_TUNNEL_OFFSET),
clearText + ECIES_BUILD_REQUEST_RECORD_NEXT_IDENT_OFFSET,
bufbe32toh (clearText + ECIES_BUILD_REQUEST_RECORD_NEXT_TUNNEL_OFFSET),
clearText + ECIES_BUILD_REQUEST_RECORD_LAYER_KEY_OFFSET,
clearText + ECIES_BUILD_REQUEST_RECORD_IV_KEY_OFFSET,
2021-06-08 22:36:27 +03:00
clearText[ECIES_BUILD_REQUEST_RECORD_FLAG_OFFSET] & TUNNEL_BUILD_RECORD_GATEWAY_FLAG,
2021-09-05 16:10:13 +03:00
clearText[ECIES_BUILD_REQUEST_RECORD_FLAG_OFFSET] & TUNNEL_BUILD_RECORD_ENDPOINT_FLAG);
2023-01-05 19:59:47 +03:00
if (!i2p::tunnel::tunnels.AddTransitTunnel (transitTunnel))
retCode = 30;
}
else
retCode = 30; // always reject with bandwidth reason (30)
2018-01-06 06:48:51 +03:00
2021-09-05 16:10:13 +03:00
memset (record + ECIES_BUILD_RESPONSE_RECORD_OPTIONS_OFFSET, 0, 2); // no options
record[ECIES_BUILD_RESPONSE_RECORD_RET_OFFSET] = retCode;
2014-04-30 22:08:57 +04:00
// encrypt reply
2014-05-16 02:58:26 +04:00
i2p::crypto::CBCEncryption encryption;
2014-04-30 22:08:57 +04:00
for (int j = 0; j < num; j++)
{
uint8_t * reply = records + j*TUNNEL_BUILD_RECORD_SIZE;
2021-09-05 16:10:13 +03:00
if (j == i)
{
uint8_t nonce[12];
memset (nonce, 0, 12);
auto& noiseState = i2p::context.GetCurrentNoiseState ();
if (!i2p::crypto::AEADChaCha20Poly1305 (reply, TUNNEL_BUILD_RECORD_SIZE - 16,
2021-09-05 16:10:13 +03:00
noiseState.m_H, 32, noiseState.m_CK, nonce, reply, TUNNEL_BUILD_RECORD_SIZE, true)) // encrypt
{
2021-09-05 16:10:13 +03:00
LogPrint (eLogWarning, "I2NP: Reply AEAD encryption failed");
return false;
}
}
else
{
2021-09-05 16:10:13 +03:00
encryption.SetKey (clearText + ECIES_BUILD_REQUEST_RECORD_REPLY_KEY_OFFSET);
encryption.SetIV (clearText + ECIES_BUILD_REQUEST_RECORD_REPLY_IV_OFFSET);
encryption.Encrypt(reply, TUNNEL_BUILD_RECORD_SIZE, reply);
}
2014-04-30 22:08:57 +04:00
}
return true;
2018-01-06 06:48:51 +03:00
}
}
2014-04-30 22:08:57 +04:00
return false;
}
2021-07-21 02:38:36 +03:00
static void HandleVariableTunnelBuildMsg (uint32_t replyMsgID, uint8_t * buf, size_t len)
2018-01-06 06:48:51 +03:00
{
2013-10-27 19:20:29 +04:00
int num = buf[0];
2015-12-17 10:11:36 +03:00
LogPrint (eLogDebug, "I2NP: VariableTunnelBuild ", num, " records");
if (num > i2p::tunnel::MAX_NUM_RECORDS)
{
LogPrint (eLogError, "I2NP: Too many records in VaribleTunnelBuild message ", num);
return;
2023-05-08 18:33:40 +03:00
}
if (len < num*TUNNEL_BUILD_RECORD_SIZE + 1)
2016-01-30 18:35:32 +03:00
{
LogPrint (eLogError, "I2NP: VaribleTunnelBuild message of ", num, " records is too short ", len);
2016-01-30 18:35:32 +03:00
return;
2018-01-06 06:48:51 +03:00
}
2013-10-27 19:20:29 +04:00
auto tunnel = i2p::tunnel::tunnels.GetPendingInboundTunnel (replyMsgID);
2013-10-27 19:20:29 +04:00
if (tunnel)
{
2013-11-19 05:37:38 +04:00
// endpoint of inbound tunnel
2015-12-17 10:11:36 +03:00
LogPrint (eLogDebug, "I2NP: VariableTunnelBuild reply for tunnel ", tunnel->GetTunnelID ());
2013-11-19 05:37:38 +04:00
if (tunnel->HandleTunnelBuildResponse (buf, len))
{
2015-12-17 10:11:36 +03:00
LogPrint (eLogInfo, "I2NP: Inbound tunnel ", tunnel->GetTunnelID (), " has been created");
2018-01-06 06:48:51 +03:00
tunnel->SetState (i2p::tunnel::eTunnelStateEstablished);
i2p::tunnel::tunnels.AddInboundTunnel (tunnel);
2013-11-19 05:37:38 +04:00
}
else
2014-09-26 18:15:34 +04:00
{
2015-12-17 10:11:36 +03:00
LogPrint (eLogInfo, "I2NP: Inbound tunnel ", tunnel->GetTunnelID (), " has been declined");
2018-01-06 06:48:51 +03:00
tunnel->SetState (i2p::tunnel::eTunnelStateBuildFailed);
2014-09-26 18:15:34 +04:00
}
2013-10-27 19:20:29 +04:00
}
else
{
2021-09-05 16:10:13 +03:00
uint8_t clearText[ECIES_BUILD_REQUEST_RECORD_CLEAR_TEXT_SIZE];
if (HandleBuildRequestRecords (num, buf + 1, clearText))
2014-04-30 22:08:57 +04:00
{
2021-09-05 16:10:13 +03:00
if (clearText[ECIES_BUILD_REQUEST_RECORD_FLAG_OFFSET] & TUNNEL_BUILD_RECORD_ENDPOINT_FLAG) // we are endpoint of outboud tunnel
2014-04-30 22:08:57 +04:00
{
2021-09-05 16:10:13 +03:00
// so we send it to reply tunnel
transports.SendMessage (clearText + ECIES_BUILD_REQUEST_RECORD_NEXT_IDENT_OFFSET,
CreateTunnelGatewayMsg (bufbe32toh (clearText + ECIES_BUILD_REQUEST_RECORD_NEXT_TUNNEL_OFFSET),
eI2NPVariableTunnelBuildReply, buf, len,
bufbe32toh (clearText + ECIES_BUILD_REQUEST_RECORD_SEND_MSG_ID_OFFSET)));
2018-01-06 06:48:51 +03:00
}
2021-09-05 16:10:13 +03:00
else
transports.SendMessage (clearText + ECIES_BUILD_REQUEST_RECORD_NEXT_IDENT_OFFSET,
CreateI2NPMessage (eI2NPVariableTunnelBuild, buf, len,
bufbe32toh (clearText + ECIES_BUILD_REQUEST_RECORD_SEND_MSG_ID_OFFSET)));
2018-01-06 06:48:51 +03:00
}
}
2013-10-27 19:20:29 +04:00
}
2021-07-21 02:38:36 +03:00
static void HandleTunnelBuildMsg (uint8_t * buf, size_t len)
2014-04-30 22:08:57 +04:00
{
2021-09-05 16:10:13 +03:00
LogPrint (eLogWarning, "I2NP: TunnelBuild is too old for ECIES router");
2014-04-30 22:08:57 +04:00
}
2021-07-21 02:38:36 +03:00
static void HandleTunnelBuildReplyMsg (uint32_t replyMsgID, uint8_t * buf, size_t len, bool isShort)
2018-01-06 06:48:51 +03:00
{
2016-01-30 18:35:32 +03:00
int num = buf[0];
2021-07-21 02:38:36 +03:00
LogPrint (eLogDebug, "I2NP: TunnelBuildReplyMsg of ", num, " records replyMsgID=", replyMsgID);
if (num > i2p::tunnel::MAX_NUM_RECORDS)
{
LogPrint (eLogError, "I2NP: Too many records in TunnelBuildReply message ", num);
return;
2023-05-08 18:33:40 +03:00
}
2021-07-21 02:38:36 +03:00
size_t recordSize = isShort ? SHORT_TUNNEL_BUILD_RECORD_SIZE : TUNNEL_BUILD_RECORD_SIZE;
if (len < num*recordSize + 1)
2016-01-30 18:35:32 +03:00
{
2021-07-21 02:38:36 +03:00
LogPrint (eLogError, "I2NP: TunnelBuildReply message of ", num, " records is too short ", len);
2016-01-30 18:35:32 +03:00
return;
2018-01-06 06:48:51 +03:00
}
auto tunnel = i2p::tunnel::tunnels.GetPendingOutboundTunnel (replyMsgID);
2013-10-27 19:20:29 +04:00
if (tunnel)
2018-01-06 06:48:51 +03:00
{
2013-11-19 05:37:38 +04:00
// reply for outbound tunnel
if (tunnel->HandleTunnelBuildResponse (buf, len))
2018-01-06 06:48:51 +03:00
{
2015-12-17 10:11:36 +03:00
LogPrint (eLogInfo, "I2NP: Outbound tunnel ", tunnel->GetTunnelID (), " has been created");
2018-01-06 06:48:51 +03:00
tunnel->SetState (i2p::tunnel::eTunnelStateEstablished);
i2p::tunnel::tunnels.AddOutboundTunnel (tunnel);
2018-01-06 06:48:51 +03:00
}
2013-11-19 05:37:38 +04:00
else
2014-09-26 18:15:34 +04:00
{
2015-12-17 10:11:36 +03:00
LogPrint (eLogInfo, "I2NP: Outbound tunnel ", tunnel->GetTunnelID (), " has been declined");
2018-01-06 06:48:51 +03:00
tunnel->SetState (i2p::tunnel::eTunnelStateBuildFailed);
2014-09-26 18:15:34 +04:00
}
2018-01-06 06:48:51 +03:00
}
2013-10-27 19:20:29 +04:00
else
2015-12-17 10:11:36 +03:00
LogPrint (eLogWarning, "I2NP: Pending tunnel for message ", replyMsgID, " not found");
2013-10-27 19:20:29 +04:00
}
2021-07-21 02:38:36 +03:00
static void HandleShortTunnelBuildMsg (uint32_t replyMsgID, uint8_t * buf, size_t len)
{
int num = buf[0];
LogPrint (eLogDebug, "I2NP: ShortTunnelBuild ", num, " records");
if (num > i2p::tunnel::MAX_NUM_RECORDS)
{
LogPrint (eLogError, "I2NP: Too many records in ShortTunnelBuild message ", num);
return;
2023-05-08 18:33:40 +03:00
}
if (len < num*SHORT_TUNNEL_BUILD_RECORD_SIZE + 1)
{
LogPrint (eLogError, "I2NP: ShortTunnelBuild message of ", num, " records is too short ", len);
return;
}
auto tunnel = i2p::tunnel::tunnels.GetPendingInboundTunnel (replyMsgID);
if (tunnel)
{
// endpoint of inbound tunnel
LogPrint (eLogDebug, "I2NP: ShortTunnelBuild reply for tunnel ", tunnel->GetTunnelID ());
if (tunnel->HandleTunnelBuildResponse (buf, len))
{
LogPrint (eLogInfo, "I2NP: Inbound tunnel ", tunnel->GetTunnelID (), " has been created");
tunnel->SetState (i2p::tunnel::eTunnelStateEstablished);
i2p::tunnel::tunnels.AddInboundTunnel (tunnel);
}
else
{
LogPrint (eLogInfo, "I2NP: Inbound tunnel ", tunnel->GetTunnelID (), " has been declined");
tunnel->SetState (i2p::tunnel::eTunnelStateBuildFailed);
}
return;
}
const uint8_t * record = buf + 1;
for (int i = 0; i < num; i++)
{
if (!memcmp (record, (const uint8_t *)i2p::context.GetRouterInfo ().GetIdentHash (), 16))
{
LogPrint (eLogDebug, "I2NP: Short request record ", i, " is ours");
uint8_t clearText[SHORT_REQUEST_RECORD_CLEAR_TEXT_SIZE];
if (!i2p::context.DecryptTunnelShortRequestRecord (record + SHORT_REQUEST_RECORD_ENCRYPTED_OFFSET, clearText))
{
LogPrint (eLogWarning, "I2NP: Can't decrypt short request record ", i);
return;
}
if (clearText[SHORT_REQUEST_RECORD_LAYER_ENCRYPTION_TYPE]) // not AES
{
LogPrint (eLogWarning, "I2NP: Unknown layer encryption type ", clearText[SHORT_REQUEST_RECORD_LAYER_ENCRYPTION_TYPE], " in short request record");
return;
}
auto& noiseState = i2p::context.GetCurrentNoiseState ();
uint8_t replyKey[32]; // AEAD/Chacha20/Poly1305
i2p::crypto::AESKey layerKey, ivKey; // AES
2021-07-05 21:31:07 +03:00
i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "SMTunnelReplyKey", noiseState.m_CK);
memcpy (replyKey, noiseState.m_CK + 32, 32);
i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "SMTunnelLayerKey", noiseState.m_CK);
2021-07-05 21:31:07 +03:00
memcpy (layerKey, noiseState.m_CK + 32, 32);
bool isEndpoint = clearText[SHORT_REQUEST_RECORD_FLAG_OFFSET] & TUNNEL_BUILD_RECORD_ENDPOINT_FLAG;
if (isEndpoint)
{
i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "TunnelLayerIVKey", noiseState.m_CK);
memcpy (ivKey, noiseState.m_CK + 32, 32);
}
2021-07-05 21:31:07 +03:00
else
{
if (!memcmp ((const uint8_t *)i2p::context.GetIdentHash (), clearText + SHORT_REQUEST_RECORD_NEXT_IDENT_OFFSET, 32)) // if next ident is now ours
{
LogPrint (eLogWarning, "I2NP: Next ident is ours in short request record");
return;
}
2021-07-05 21:31:07 +03:00
memcpy (ivKey, noiseState.m_CK , 32);
}
// check if we accept this tunnel
std::shared_ptr<i2p::tunnel::TransitTunnel> transitTunnel;
uint8_t retCode = 0;
2024-02-20 11:30:05 +03:00
if (!i2p::context.AcceptsTunnels () || i2p::context.GetCongestionLevel (false) >= CONGESTION_LEVEL_FULL)
2023-03-07 03:48:04 +03:00
retCode = 30;
if (!retCode)
{
// create new transit tunnel
transitTunnel = i2p::tunnel::CreateTransitTunnel (
bufbe32toh (clearText + SHORT_REQUEST_RECORD_RECEIVE_TUNNEL_OFFSET),
clearText + SHORT_REQUEST_RECORD_NEXT_IDENT_OFFSET,
bufbe32toh (clearText + SHORT_REQUEST_RECORD_NEXT_TUNNEL_OFFSET),
layerKey, ivKey,
clearText[SHORT_REQUEST_RECORD_FLAG_OFFSET] & TUNNEL_BUILD_RECORD_GATEWAY_FLAG,
clearText[SHORT_REQUEST_RECORD_FLAG_OFFSET] & TUNNEL_BUILD_RECORD_ENDPOINT_FLAG);
2023-01-05 19:59:47 +03:00
if (!i2p::tunnel::tunnels.AddTransitTunnel (transitTunnel))
retCode = 30;
}
// encrypt reply
uint8_t nonce[12];
memset (nonce, 0, 12);
uint8_t * reply = buf + 1;
for (int j = 0; j < num; j++)
{
nonce[4] = j; // nonce is record #
if (j == i)
{
memset (reply + SHORT_RESPONSE_RECORD_OPTIONS_OFFSET, 0, 2); // no options
reply[SHORT_RESPONSE_RECORD_RET_OFFSET] = retCode;
if (!i2p::crypto::AEADChaCha20Poly1305 (reply, SHORT_TUNNEL_BUILD_RECORD_SIZE - 16,
noiseState.m_H, 32, replyKey, nonce, reply, SHORT_TUNNEL_BUILD_RECORD_SIZE, true)) // encrypt
{
LogPrint (eLogWarning, "I2NP: Short reply AEAD encryption failed");
return;
}
}
else
i2p::crypto::ChaCha20 (reply, SHORT_TUNNEL_BUILD_RECORD_SIZE, replyKey, nonce, reply);
reply += SHORT_TUNNEL_BUILD_RECORD_SIZE;
}
// send reply
auto onDrop = [transitTunnel]()
{
if (transitTunnel)
{
auto t = transitTunnel->GetCreationTime ();
if (t > i2p::tunnel::TUNNEL_EXPIRATION_TIMEOUT)
// make transit tunnel expired
transitTunnel->SetCreationTime (t - i2p::tunnel::TUNNEL_EXPIRATION_TIMEOUT);
}
};
2021-07-05 21:31:07 +03:00
if (isEndpoint)
{
auto replyMsg = NewI2NPShortMessage ();
replyMsg->Concat (buf, len);
replyMsg->FillI2NPMessageHeader (eI2NPShortTunnelBuildReply, bufbe32toh (clearText + SHORT_REQUEST_RECORD_SEND_MSG_ID_OFFSET));
if (transitTunnel) replyMsg->onDrop = onDrop;
if (memcmp ((const uint8_t *)i2p::context.GetIdentHash (),
clearText + SHORT_REQUEST_RECORD_NEXT_IDENT_OFFSET, 32)) // reply IBGW is not local?
{
i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "RGarlicKeyAndTag", noiseState.m_CK);
uint64_t tag;
memcpy (&tag, noiseState.m_CK, 8);
// we send it to reply tunnel
transports.SendMessage (clearText + SHORT_REQUEST_RECORD_NEXT_IDENT_OFFSET,
CreateTunnelGatewayMsg (bufbe32toh (clearText + SHORT_REQUEST_RECORD_NEXT_TUNNEL_OFFSET),
i2p::garlic::WrapECIESX25519Message (replyMsg, noiseState.m_CK + 32, tag)));
}
else
{
// IBGW is local
uint32_t tunnelID = bufbe32toh (clearText + SHORT_REQUEST_RECORD_NEXT_TUNNEL_OFFSET);
auto tunnel = i2p::tunnel::tunnels.GetTunnel (tunnelID);
if (tunnel)
{
tunnel->SendTunnelDataMsg (replyMsg);
tunnel->FlushTunnelDataMsgs ();
}
else
LogPrint (eLogWarning, "I2NP: Tunnel ", tunnelID, " not found for short tunnel build reply");
}
}
else
{
auto msg = CreateI2NPMessage (eI2NPShortTunnelBuild, buf, len,
bufbe32toh (clearText + SHORT_REQUEST_RECORD_SEND_MSG_ID_OFFSET));
if (transitTunnel) msg->onDrop = onDrop;
transports.SendMessage (clearText + SHORT_REQUEST_RECORD_NEXT_IDENT_OFFSET, msg);
}
return;
}
record += SHORT_TUNNEL_BUILD_RECORD_SIZE;
}
}
2015-11-24 21:09:12 +03:00
std::shared_ptr<I2NPMessage> CreateTunnelDataMsg (const uint8_t * buf)
2013-10-27 19:20:29 +04:00
{
auto msg = NewI2NPTunnelMessage (false);
2018-01-06 06:48:51 +03:00
msg->Concat (buf, i2p::tunnel::TUNNEL_DATA_MSG_SIZE);
msg->FillI2NPMessageHeader (eI2NPTunnelData);
2013-10-27 19:20:29 +04:00
return msg;
2018-01-06 06:48:51 +03:00
}
2013-10-27 19:20:29 +04:00
2018-01-06 06:48:51 +03:00
std::shared_ptr<I2NPMessage> CreateTunnelDataMsg (uint32_t tunnelID, const uint8_t * payload)
2013-10-27 19:20:29 +04:00
{
auto msg = NewI2NPTunnelMessage (false);
htobe32buf (msg->GetPayload (), tunnelID);
2016-01-05 22:29:18 +03:00
msg->len += 4; // tunnelID
msg->Concat (payload, i2p::tunnel::TUNNEL_DATA_MSG_SIZE - 4);
msg->FillI2NPMessageHeader (eI2NPTunnelData);
2013-10-27 19:20:29 +04:00
return msg;
2018-01-06 06:48:51 +03:00
}
std::shared_ptr<I2NPMessage> CreateEmptyTunnelDataMsg (bool endpoint)
{
auto msg = NewI2NPTunnelMessage (endpoint);
2018-01-06 06:48:51 +03:00
msg->len += i2p::tunnel::TUNNEL_DATA_MSG_SIZE;
2015-11-24 21:09:12 +03:00
return msg;
2018-01-06 06:48:51 +03:00
}
2015-11-24 21:09:12 +03:00
std::shared_ptr<I2NPMessage> CreateTunnelGatewayMsg (uint32_t tunnelID, const uint8_t * buf, size_t len)
2013-11-11 03:23:26 +04:00
{
2015-11-24 21:09:12 +03:00
auto msg = NewI2NPMessage (len);
2015-01-02 02:53:44 +03:00
uint8_t * payload = msg->GetPayload ();
htobe32buf (payload + TUNNEL_GATEWAY_HEADER_TUNNELID_OFFSET, tunnelID);
htobe16buf (payload + TUNNEL_GATEWAY_HEADER_LENGTH_OFFSET, len);
2016-01-05 22:29:18 +03:00
msg->len += TUNNEL_GATEWAY_HEADER_SIZE;
if (msg->Concat (buf, len) < len)
LogPrint (eLogError, "I2NP: Tunnel gateway buffer overflow ", msg->maxLen);
msg->FillI2NPMessageHeader (eI2NPTunnelGateway);
2013-11-11 03:23:26 +04:00
return msg;
2018-01-06 06:48:51 +03:00
}
2013-11-11 03:23:26 +04:00
std::shared_ptr<I2NPMessage> CreateTunnelGatewayMsg (uint32_t tunnelID, std::shared_ptr<I2NPMessage> msg)
2013-11-11 03:23:26 +04:00
{
2015-01-02 02:53:44 +03:00
if (msg->offset >= I2NP_HEADER_SIZE + TUNNEL_GATEWAY_HEADER_SIZE)
2013-11-11 03:23:26 +04:00
{
// message is capable to be used without copying
2015-01-02 02:53:44 +03:00
uint8_t * payload = msg->GetBuffer () - TUNNEL_GATEWAY_HEADER_SIZE;
htobe32buf (payload + TUNNEL_GATEWAY_HEADER_TUNNELID_OFFSET, tunnelID);
2013-11-11 03:23:26 +04:00
int len = msg->GetLength ();
2015-01-02 02:53:44 +03:00
htobe16buf (payload + TUNNEL_GATEWAY_HEADER_LENGTH_OFFSET, len);
msg->offset -= (I2NP_HEADER_SIZE + TUNNEL_GATEWAY_HEADER_SIZE);
msg->len = msg->offset + I2NP_HEADER_SIZE + TUNNEL_GATEWAY_HEADER_SIZE +len;
2018-01-06 06:48:51 +03:00
msg->FillI2NPMessageHeader (eI2NPTunnelGateway);
2013-11-11 03:23:26 +04:00
return msg;
}
else
{
auto newMsg = CreateTunnelGatewayMsg (tunnelID, msg->GetBuffer (), msg->GetLength ());
if (msg->onDrop) newMsg->onDrop = msg->onDrop;
return newMsg;
}
2013-11-11 03:23:26 +04:00
}
2018-01-06 06:48:51 +03:00
std::shared_ptr<I2NPMessage> CreateTunnelGatewayMsg (uint32_t tunnelID, I2NPMessageType msgType,
2013-11-11 03:23:26 +04:00
const uint8_t * buf, size_t len, uint32_t replyMsgID)
{
2015-11-24 21:09:12 +03:00
auto msg = NewI2NPMessage (len);
2015-01-02 02:53:44 +03:00
size_t gatewayMsgOffset = I2NP_HEADER_SIZE + TUNNEL_GATEWAY_HEADER_SIZE;
2013-11-11 03:23:26 +04:00
msg->offset += gatewayMsgOffset;
msg->len += gatewayMsgOffset;
2016-01-05 22:29:18 +03:00
if (msg->Concat (buf, len) < len)
LogPrint (eLogError, "I2NP: Tunnel gateway buffer overflow ", msg->maxLen);
msg->FillI2NPMessageHeader (msgType, replyMsgID); // create content message
2013-11-11 03:23:26 +04:00
len = msg->GetLength ();
msg->offset -= gatewayMsgOffset;
2015-01-02 02:53:44 +03:00
uint8_t * payload = msg->GetPayload ();
htobe32buf (payload + TUNNEL_GATEWAY_HEADER_TUNNELID_OFFSET, tunnelID);
htobe16buf (payload + TUNNEL_GATEWAY_HEADER_LENGTH_OFFSET, len);
msg->FillI2NPMessageHeader (eI2NPTunnelGateway); // gateway message
2013-11-11 03:23:26 +04:00
return msg;
2018-01-06 06:48:51 +03:00
}
2013-12-14 05:07:35 +04:00
2017-12-01 20:57:05 +03:00
size_t GetI2NPMessageLength (const uint8_t * msg, size_t len)
2013-12-14 05:07:35 +04:00
{
2017-12-01 20:57:05 +03:00
if (len < I2NP_HEADER_SIZE_OFFSET + 2)
{
LogPrint (eLogError, "I2NP: Message length ", len, " is smaller than header");
2017-12-01 20:57:05 +03:00
return len;
2018-01-06 06:48:51 +03:00
}
2017-12-01 20:57:05 +03:00
auto l = bufbe16toh (msg + I2NP_HEADER_SIZE_OFFSET) + I2NP_HEADER_SIZE;
if (l > len)
{
LogPrint (eLogError, "I2NP: Message length ", l, " exceeds buffer length ", len);
2017-12-01 20:57:05 +03:00
l = len;
2018-01-06 06:48:51 +03:00
}
2017-12-01 20:57:05 +03:00
return l;
2018-01-06 06:48:51 +03:00
}
2023-05-08 18:33:40 +03:00
void HandleTunnelBuildI2NPMessage (std::shared_ptr<I2NPMessage> msg)
2013-10-27 19:20:29 +04:00
{
2023-05-08 17:50:27 +03:00
if (msg)
2017-12-01 20:57:05 +03:00
{
2023-05-08 17:50:27 +03:00
uint8_t typeID = msg->GetTypeID();
uint32_t msgID = msg->GetMsgID();
LogPrint (eLogDebug, "I2NP: Handling tunnel build message with len=", msg->GetLength(),", type=", (int)typeID, ", msgID=", (unsigned int)msgID);
uint8_t * payload = msg->GetPayload();
auto size = msg->GetPayloadLength();
switch (typeID)
{
case eI2NPVariableTunnelBuild:
HandleVariableTunnelBuildMsg (msgID, payload, size);
break;
case eI2NPShortTunnelBuild:
HandleShortTunnelBuildMsg (msgID, payload, size);
break;
case eI2NPVariableTunnelBuildReply:
HandleTunnelBuildReplyMsg (msgID, payload, size, false);
break;
case eI2NPShortTunnelBuildReply:
HandleTunnelBuildReplyMsg (msgID, payload, size, true);
break;
case eI2NPTunnelBuild:
HandleTunnelBuildMsg (payload, size);
break;
case eI2NPTunnelBuildReply:
// TODO:
break;
default:
LogPrint (eLogError, "I2NP: Unexpected message with type", (int)typeID, " during handling TBM; skipping");
}
2018-01-06 06:48:51 +03:00
}
2013-10-27 19:20:29 +04:00
}
void HandleI2NPMessage (std::shared_ptr<I2NPMessage> msg)
2013-10-27 19:20:29 +04:00
{
if (msg)
2018-01-06 06:48:51 +03:00
{
2015-12-17 10:11:36 +03:00
uint8_t typeID = msg->GetTypeID ();
2015-12-28 03:00:00 +03:00
LogPrint (eLogDebug, "I2NP: Handling message with type ", (int)typeID);
2015-12-17 10:11:36 +03:00
switch (typeID)
2018-01-06 06:48:51 +03:00
{
2013-11-20 16:46:09 +04:00
case eI2NPTunnelData:
2023-04-20 21:23:41 +03:00
if (!msg->from)
i2p::tunnel::tunnels.PostTunnelData (msg);
2018-01-06 06:48:51 +03:00
break;
2013-11-20 16:46:09 +04:00
case eI2NPTunnelGateway:
2023-04-20 21:23:41 +03:00
if (!msg->from)
i2p::tunnel::tunnels.PostTunnelData (msg);
2013-11-20 16:46:09 +04:00
break;
2014-03-18 00:50:03 +04:00
case eI2NPGarlic:
2015-06-16 17:14:14 +03:00
{
if (msg->from && msg->from->GetTunnelPool ())
msg->from->GetTunnelPool ()->ProcessGarlicMessage (msg);
2014-10-08 15:55:46 +04:00
else
2018-01-06 06:48:51 +03:00
i2p::context.ProcessGarlicMessage (msg);
2015-06-16 17:14:14 +03:00
break;
}
2013-11-20 16:46:09 +04:00
case eI2NPDatabaseStore:
2023-04-20 21:23:41 +03:00
// forward to netDb if came directly or through exploratory tunnel as response to our request
if (!msg->from || !msg->from->GetTunnelPool () || msg->from->GetTunnelPool ()->IsExploratory ())
i2p::data::netdb.PostI2NPMsg (msg);
break;
case eI2NPDatabaseSearchReply:
if (!msg->from || !msg->from->GetTunnelPool () || msg->from->GetTunnelPool ()->IsExploratory ())
i2p::data::netdb.PostDatabaseSearchReplyMsg (msg);
break;
2023-04-20 21:23:41 +03:00
case eI2NPDatabaseLookup:
// forward to netDb if floodfill and came directly
if (!msg->from && i2p::context.IsFloodfill ())
i2p::data::netdb.PostI2NPMsg (msg);
break;
2014-03-18 00:50:03 +04:00
case eI2NPDeliveryStatus:
2015-06-16 17:14:14 +03:00
{
2014-03-18 00:50:03 +04:00
if (msg->from && msg->from->GetTunnelPool ())
msg->from->GetTunnelPool ()->ProcessDeliveryStatus (msg);
2014-03-18 00:50:03 +04:00
else
i2p::context.ProcessDeliveryStatusMessage (msg);
2018-01-06 06:48:51 +03:00
break;
2015-06-16 17:14:14 +03:00
}
2024-02-27 11:15:15 +03:00
case eI2NPTunnelTest:
if (msg->from && msg->from->GetTunnelPool ())
msg->from->GetTunnelPool ()->ProcessTunnelTest (msg);
break;
2018-01-06 06:48:51 +03:00
case eI2NPVariableTunnelBuild:
case eI2NPTunnelBuild:
case eI2NPShortTunnelBuild:
2023-04-20 21:23:41 +03:00
// forward to tunnel thread
if (!msg->from)
i2p::tunnel::tunnels.PostTunnelData (msg);
break;
case eI2NPVariableTunnelBuildReply:
case eI2NPTunnelBuildReply:
case eI2NPShortTunnelBuildReply:
// forward to tunnel thread
i2p::tunnel::tunnels.PostTunnelData (msg);
2018-01-06 06:48:51 +03:00
break;
2013-11-20 16:46:09 +04:00
default:
2023-05-08 17:50:27 +03:00
LogPrint(eLogError, "I2NP: Unexpected I2NP message with type ", int(typeID), " during handling; skipping");
2018-01-06 06:48:51 +03:00
}
}
}
2015-01-23 06:00:41 +03:00
I2NPMessagesHandler::~I2NPMessagesHandler ()
{
Flush ();
}
2018-01-06 06:48:51 +03:00
2021-10-17 18:31:37 +03:00
void I2NPMessagesHandler::PutNextMessage (std::shared_ptr<I2NPMessage>&& msg)
2015-01-23 06:00:41 +03:00
{
if (msg)
{
2015-01-24 06:05:33 +03:00
switch (msg->GetTypeID ())
2018-01-06 06:48:51 +03:00
{
2015-01-24 06:05:33 +03:00
case eI2NPTunnelData:
m_TunnelMsgs.push_back (msg);
2015-01-24 06:05:33 +03:00
break;
2018-01-06 06:48:51 +03:00
case eI2NPTunnelGateway:
m_TunnelGatewayMsgs.push_back (msg);
2018-01-06 06:48:51 +03:00
break;
2015-01-24 06:05:33 +03:00
default:
HandleI2NPMessage (msg);
2018-01-06 06:48:51 +03:00
}
}
2015-01-23 06:00:41 +03:00
}
2018-01-06 06:48:51 +03:00
2015-01-23 06:00:41 +03:00
void I2NPMessagesHandler::Flush ()
{
if (!m_TunnelMsgs.empty ())
2018-01-06 06:48:51 +03:00
{
2015-01-23 06:00:41 +03:00
i2p::tunnel::tunnels.PostTunnelData (m_TunnelMsgs);
m_TunnelMsgs.clear ();
2018-01-06 06:48:51 +03:00
}
2015-01-24 06:05:33 +03:00
if (!m_TunnelGatewayMsgs.empty ())
2018-01-06 06:48:51 +03:00
{
2015-01-25 19:43:27 +03:00
i2p::tunnel::tunnels.PostTunnelData (m_TunnelGatewayMsgs);
2015-01-24 06:05:33 +03:00
m_TunnelGatewayMsgs.clear ();
2018-01-06 06:48:51 +03:00
}
}
2013-10-27 19:20:29 +04:00
}