@ -12,72 +12,45 @@ namespace i2p
@@ -12,72 +12,45 @@ namespace i2p
namespace datagram
{
DatagramDestination : : DatagramDestination ( std : : shared_ptr < i2p : : client : : ClientDestination > owner ) :
m_Owner ( owner ) , m_Receiver ( nullptr )
m_Owner ( owner . get ( ) ) ,
m_CleanupTimer ( owner - > GetService ( ) ) ,
m_Receiver ( nullptr )
{
ScheduleCleanup ( ) ;
}
DatagramDestination : : ~ DatagramDestination ( )
{
m_CleanupTimer . cancel ( ) ;
m_Sessions . clear ( ) ;
}
void DatagramDestination : : SendDatagramTo ( const uint8_t * payload , size_t len , const i2p : : data : : IdentHash & ident , uint16_t fromPort , uint16_t toPort )
{
auto owner = m_Owner ;
auto i = owner - > GetIdentity ( ) ;
uint8_t buf [ MAX_DATAGRAM_SIZE ] ;
auto identityLen = m_Owner - > GetIdentity ( ) - > ToBuffer ( buf , MAX_DATAGRAM_SIZE ) ;
auto identityLen = i - > ToBuffer ( buf , MAX_DATAGRAM_SIZE ) ;
uint8_t * signature = buf + identityLen ;
auto signatureLen = m_Owner - > GetIdent ity ( ) - > GetSignatureLen ( ) ;
auto signatureLen = i - > GetSignatureLen ( ) ;
uint8_t * buf1 = signature + signatureLen ;
size_t headerLen = identityLen + signatureLen ;
memcpy ( buf1 , payload , len ) ;
if ( m_Owner - > GetIdent ity ( ) - > GetSigningKeyType ( ) = = i2p : : data : : SIGNING_KEY_TYPE_DSA_SHA1 )
if ( i - > GetSigningKeyType ( ) = = i2p : : data : : SIGNING_KEY_TYPE_DSA_SHA1 )
{
uint8_t hash [ 32 ] ;
SHA256 ( buf1 , len , hash ) ;
m_O wner- > Sign ( hash , 32 , signature ) ;
o wner- > Sign ( hash , 32 , signature ) ;
}
else
m_O wner- > Sign ( buf1 , len , signature ) ;
o wner- > Sign ( buf1 , len , signature ) ;
auto msg = CreateDataMessage ( buf , len + headerLen , fromPort , toPort ) ;
auto remote = m_Owner - > FindLeaseSet ( ident ) ;
if ( remote )
m_Owner - > GetService ( ) . post ( std : : bind ( & DatagramDestination : : SendMsg , this , msg , remote ) ) ;
else
m_Owner - > RequestDestination ( ident , std : : bind ( & DatagramDestination : : HandleLeaseSetRequestComplete , this , std : : placeholders : : _1 , msg ) ) ;
auto msg = CreateDataMessage ( buf , len + headerLen , fromPort , toPort ) ;
auto session = ObtainSession ( ident ) ;
session - > SendMsg ( msg ) ;
}
void DatagramDestination : : HandleLeaseSetRequestComplete ( std : : shared_ptr < i2p : : data : : LeaseSet > remote , std : : shared_ptr < I2NPMessage > msg )
{
if ( remote )
SendMsg ( msg , remote ) ;
}
void DatagramDestination : : SendMsg ( std : : shared_ptr < I2NPMessage > msg , std : : shared_ptr < const i2p : : data : : LeaseSet > remote )
{
auto outboundTunnel = m_Owner - > GetTunnelPool ( ) - > GetNextOutboundTunnel ( ) ;
auto leases = remote - > GetNonExpiredLeases ( ) ;
if ( ! leases . empty ( ) & & outboundTunnel )
{
std : : vector < i2p : : tunnel : : TunnelMessageBlock > msgs ;
uint32_t i = rand ( ) % leases . size ( ) ;
auto garlic = m_Owner - > WrapMessage ( remote , msg , true ) ;
msgs . push_back ( i2p : : tunnel : : TunnelMessageBlock
{
i2p : : tunnel : : eDeliveryTypeTunnel ,
leases [ i ] - > tunnelGateway , leases [ i ] - > tunnelID ,
garlic
} ) ;
outboundTunnel - > SendTunnelDataMsg ( msgs ) ;
}
else
{
if ( outboundTunnel )
LogPrint ( eLogWarning , " Failed to send datagram. All leases expired " ) ;
else
LogPrint ( eLogWarning , " Failed to send datagram. No outbound tunnels " ) ;
}
}
void DatagramDestination : : HandleDatagram ( uint16_t fromPort , uint16_t toPort , const uint8_t * buf , size_t len )
{
@ -98,18 +71,26 @@ namespace datagram
@@ -98,18 +71,26 @@ namespace datagram
if ( verified )
{
auto it = m_ReceiversByPorts . find ( toPort ) ;
if ( it ! = m_ReceiversByPorts . end ( ) )
it - > second ( identity , fromPort , toPort , buf + headerLen , len - headerLen ) ;
else if ( m_Receiver ! = nullptr )
m_Receiver ( identity , fromPort , toPort , buf + headerLen , len - headerLen ) ;
auto r = FindReceiver ( toPort ) ;
if ( r )
r ( identity , fromPort , toPort , buf + headerLen , len - headerLen ) ;
else
LogPrint ( eLogWarning , " Receiver for datagram is not set " ) ;
LogPrint ( eLogWarning , " DatagramDestination: no receiver for port " , toPort ) ;
}
else
LogPrint ( eLogWarning , " Datagram signature verification failed " ) ;
}
DatagramDestination : : Receiver DatagramDestination : : FindReceiver ( uint16_t port )
{
std : : lock_guard < std : : mutex > lock ( m_ReceiversMutex ) ;
Receiver r = m_Receiver ;
auto itr = m_ReceiversByPorts . find ( port ) ;
if ( itr ! = m_ReceiversByPorts . end ( ) )
r = itr - > second ;
return r ;
}
void DatagramDestination : : HandleDataMessagePayload ( uint16_t fromPort , uint16_t toPort , const uint8_t * buf , size_t len )
{
// unzip it
@ -137,7 +118,338 @@ namespace datagram
@@ -137,7 +118,338 @@ namespace datagram
else
msg = nullptr ;
return msg ;
}
}
void DatagramDestination : : ScheduleCleanup ( )
{
m_CleanupTimer . expires_from_now ( boost : : posix_time : : seconds ( DATAGRAM_SESSION_CLEANUP_INTERVAL ) ) ;
m_CleanupTimer . async_wait ( std : : bind ( & DatagramDestination : : HandleCleanUp , this , std : : placeholders : : _1 ) ) ;
}
void DatagramDestination : : HandleCleanUp ( const boost : : system : : error_code & ecode )
{
if ( ecode )
return ;
std : : lock_guard < std : : mutex > lock ( m_SessionsMutex ) ;
auto now = i2p : : util : : GetMillisecondsSinceEpoch ( ) ;
LogPrint ( eLogDebug , " DatagramDestination: clean up sessions " ) ;
std : : vector < i2p : : data : : IdentHash > expiredSessions ;
// for each session ...
for ( auto & e : m_Sessions ) {
// check if expired
if ( now - e . second - > LastActivity ( ) > = DATAGRAM_SESSION_MAX_IDLE )
expiredSessions . push_back ( e . first ) ; // we are expired
}
// for each expired session ...
for ( auto & ident : expiredSessions ) {
// remove the expired session
LogPrint ( eLogInfo , " DatagramDestination: expiring idle session with " , ident . ToBase32 ( ) ) ;
m_Sessions . erase ( ident ) ;
}
m_Owner - > CleanupExpiredTags ( ) ;
ScheduleCleanup ( ) ;
}
std : : shared_ptr < DatagramSession > DatagramDestination : : ObtainSession ( const i2p : : data : : IdentHash & ident )
{
std : : shared_ptr < DatagramSession > session = nullptr ;
std : : lock_guard < std : : mutex > lock ( m_SessionsMutex ) ;
auto itr = m_Sessions . find ( ident ) ;
if ( itr = = m_Sessions . end ( ) ) {
// not found, create new session
session = std : : make_shared < DatagramSession > ( m_Owner , ident ) ;
m_Sessions [ ident ] = session ;
} else {
session = itr - > second ;
}
return session ;
}
std : : shared_ptr < DatagramSession : : Info > DatagramDestination : : GetInfoForRemote ( const i2p : : data : : IdentHash & remote )
{
std : : lock_guard < std : : mutex > lock ( m_SessionsMutex ) ;
for ( auto & item : m_Sessions )
{
if ( item . first = = remote ) return std : : make_shared < DatagramSession : : Info > ( item . second - > GetSessionInfo ( ) ) ;
}
return nullptr ;
}
DatagramSession : : DatagramSession ( i2p : : client : : ClientDestination * localDestination ,
const i2p : : data : : IdentHash & remoteIdent ) :
m_LocalDestination ( localDestination ) ,
m_RemoteIdentity ( remoteIdent ) ,
m_LastUse ( i2p : : util : : GetMillisecondsSinceEpoch ( ) ) ,
m_LastPathChange ( 0 ) ,
m_LastSuccess ( 0 )
{
}
void DatagramSession : : SendMsg ( std : : shared_ptr < I2NPMessage > msg )
{
// we used this session
m_LastUse = i2p : : util : : GetMillisecondsSinceEpoch ( ) ;
// schedule send
m_LocalDestination - > GetService ( ) . post ( std : : bind ( & DatagramSession : : HandleSend , this , msg ) ) ;
}
DatagramSession : : Info DatagramSession : : GetSessionInfo ( ) const
{
if ( ! m_RoutingSession )
return DatagramSession : : Info ( nullptr , nullptr , m_LastUse , m_LastSuccess ) ;
auto routingPath = m_RoutingSession - > GetSharedRoutingPath ( ) ;
if ( ! routingPath )
return DatagramSession : : Info ( nullptr , nullptr , m_LastUse , m_LastSuccess ) ;
auto lease = routingPath - > remoteLease ;
auto tunnel = routingPath - > outboundTunnel ;
if ( lease )
{
if ( tunnel )
return DatagramSession : : Info ( lease - > tunnelGateway , tunnel - > GetEndpointIdentHash ( ) , m_LastUse , m_LastSuccess ) ;
else
return DatagramSession : : Info ( lease - > tunnelGateway , nullptr , m_LastUse , m_LastSuccess ) ;
}
else if ( tunnel )
return DatagramSession : : Info ( nullptr , tunnel - > GetEndpointIdentHash ( ) , m_LastUse , m_LastSuccess ) ;
else
return DatagramSession : : Info ( nullptr , nullptr , m_LastUse , m_LastSuccess ) ;
}
void DatagramSession : : HandleSend ( std : : shared_ptr < I2NPMessage > msg )
{
if ( ! m_RoutingSession )
{
// try to get one
if ( m_RemoteLeaseSet ) m_RoutingSession = m_LocalDestination - > GetRoutingSession ( m_RemoteLeaseSet , true ) ;
else
{
UpdateLeaseSet ( msg ) ;
return ;
}
}
// do we have a routing session?
if ( m_RoutingSession )
{
// should we switch paths?
if ( ShouldUpdateRoutingPath ( ) )
{
LogPrint ( eLogDebug , " DatagramSession: try getting new routing path " ) ;
// try switching paths
auto path = GetNextRoutingPath ( ) ;
if ( path )
UpdateRoutingPath ( path ) ;
else
ResetRoutingPath ( ) ;
}
auto routingPath = m_RoutingSession - > GetSharedRoutingPath ( ) ;
// make sure we have a routing path
if ( routingPath )
{
auto outboundTunnel = routingPath - > outboundTunnel ;
if ( outboundTunnel )
{
if ( outboundTunnel - > IsEstablished ( ) )
{
m_LastSuccess = i2p : : util : : GetMillisecondsSinceEpoch ( ) ;
// we have a routing path and routing session and the outbound tunnel we are using is good
// wrap message with routing session and send down routing path's outbound tunnel wrapped for the IBGW
auto m = m_RoutingSession - > WrapSingleMessage ( msg ) ;
routingPath - > outboundTunnel - > SendTunnelDataMsg ( { i2p : : tunnel : : TunnelMessageBlock {
i2p : : tunnel : : eDeliveryTypeTunnel ,
routingPath - > remoteLease - > tunnelGateway , routingPath - > remoteLease - > tunnelID ,
m
} } ) ;
return ;
}
}
}
}
auto now = i2p : : util : : GetMillisecondsSinceEpoch ( ) ;
// if this path looks dead reset the routing path since we didn't seem to be able to get a path in time
if ( m_LastPathChange & & now - m_LastPathChange > = DATAGRAM_SESSION_PATH_TIMEOUT ) ResetRoutingPath ( ) ;
UpdateLeaseSet ( msg ) ;
}
void DatagramSession : : UpdateRoutingPath ( const std : : shared_ptr < i2p : : garlic : : GarlicRoutingPath > & path )
{
if ( m_RoutingSession = = nullptr & & m_RemoteLeaseSet )
m_RoutingSession = m_LocalDestination - > GetRoutingSession ( m_RemoteLeaseSet , true ) ;
if ( ! m_RoutingSession ) return ;
// set routing path and update time we last updated the routing path
m_RoutingSession - > SetSharedRoutingPath ( path ) ;
m_LastPathChange = i2p : : util : : GetMillisecondsSinceEpoch ( ) ;
}
bool DatagramSession : : ShouldUpdateRoutingPath ( ) const
{
auto now = i2p : : util : : GetMillisecondsSinceEpoch ( ) ;
// we need to rotate paths becuase the routing path is too old
if ( now - m_LastPathChange > = DATAGRAM_SESSION_PATH_SWITCH_INTERVAL ) return true ;
// our path looks dead so we need to rotate paths
if ( now - m_LastSuccess > = DATAGRAM_SESSION_PATH_TIMEOUT ) return true ;
// if we have a routing session and routing path we don't need to switch paths
return m_RoutingSession ! = nullptr & & m_RoutingSession - > GetSharedRoutingPath ( ) ! = nullptr ;
}
bool DatagramSession : : ShouldSwitchLease ( ) const
{
std : : shared_ptr < i2p : : garlic : : GarlicRoutingPath > routingPath = nullptr ;
std : : shared_ptr < const i2p : : data : : Lease > currentLease = nullptr ;
if ( m_RoutingSession )
routingPath = m_RoutingSession - > GetSharedRoutingPath ( ) ;
if ( routingPath )
currentLease = routingPath - > remoteLease ;
if ( currentLease ) // if we have a lease return true if it's about to expire otherwise return false
return currentLease - > ExpiresWithin ( DATAGRAM_SESSION_LEASE_HANDOVER_WINDOW , DATAGRAM_SESSION_LEASE_HANDOVER_FUDGE ) ;
// we have no current lease, we should switch
return true ;
}
std : : shared_ptr < i2p : : garlic : : GarlicRoutingPath > DatagramSession : : GetNextRoutingPath ( )
{
std : : shared_ptr < i2p : : tunnel : : OutboundTunnel > outboundTunnel = nullptr ;
std : : shared_ptr < i2p : : garlic : : GarlicRoutingPath > routingPath = nullptr ;
// get existing routing path if we have one
if ( m_RoutingSession )
routingPath = m_RoutingSession - > GetSharedRoutingPath ( ) ;
// do we have an existing outbound tunnel and routing path?
if ( routingPath & & routingPath - > outboundTunnel )
{
// is the outbound tunnel we are using good?
if ( routingPath - > outboundTunnel - > IsEstablished ( ) )
{
// ya so let's stick with it
outboundTunnel = routingPath - > outboundTunnel ;
}
else
outboundTunnel = m_LocalDestination - > GetTunnelPool ( ) - > GetNextOutboundTunnel ( routingPath - > outboundTunnel ) ; // no so we'll switch outbound tunnels
}
// do we have an outbound tunnel that works already ?
if ( ! outboundTunnel )
outboundTunnel = m_LocalDestination - > GetTunnelPool ( ) - > GetNextOutboundTunnel ( ) ; // no, let's get a new outbound tunnel as we probably just started
if ( outboundTunnel )
{
std : : shared_ptr < const i2p : : data : : Lease > lease = nullptr ;
// should we switch leases ?
if ( ShouldSwitchLease ( ) )
{
// yes, get next available lease
lease = GetNextLease ( ) ;
}
else if ( routingPath )
{
if ( routingPath - > remoteLease )
{
if ( routingPath - > remoteLease - > ExpiresWithin ( DATAGRAM_SESSION_LEASE_HANDOVER_WINDOW , DATAGRAM_SESSION_LEASE_HANDOVER_FUDGE ) )
lease = GetNextLease ( ) ;
else
lease = routingPath - > remoteLease ;
}
}
else
lease = GetNextLease ( ) ;
if ( lease )
{
// we have a valid lease to use and an outbound tunnel
// create new routing path
uint32_t now = i2p : : util : : GetSecondsSinceEpoch ( ) ;
routingPath = std : : make_shared < i2p : : garlic : : GarlicRoutingPath > ( i2p : : garlic : : GarlicRoutingPath {
outboundTunnel ,
lease ,
0 ,
now ,
0
} ) ;
}
else // we don't have a new routing path to give
routingPath = nullptr ;
}
return routingPath ;
}
void DatagramSession : : ResetRoutingPath ( )
{
if ( m_RoutingSession )
{
auto routingPath = m_RoutingSession - > GetSharedRoutingPath ( ) ;
if ( routingPath & & routingPath - > remoteLease ) // we have a remote lease already specified and a routing path
{
// get outbound tunnel on this path
auto outboundTunnel = routingPath - > outboundTunnel ;
// is this outbound tunnel there and established
if ( outboundTunnel & & outboundTunnel - > IsEstablished ( ) )
m_InvalidIBGW . push_back ( routingPath - > remoteLease - > tunnelGateway ) ; // yes, let's mark remote lease as dead because the outbound tunnel seems fine
}
// reset the routing path
UpdateRoutingPath ( nullptr ) ;
}
}
std : : shared_ptr < const i2p : : data : : Lease > DatagramSession : : GetNextLease ( )
{
auto now = i2p : : util : : GetMillisecondsSinceEpoch ( ) ;
std : : shared_ptr < const i2p : : data : : Lease > next = nullptr ;
if ( m_RemoteLeaseSet )
{
std : : vector < i2p : : data : : IdentHash > exclude ;
for ( const auto & ident : m_InvalidIBGW )
exclude . push_back ( ident ) ;
// find get all leases that are not in our ban list and are not going to expire within our lease set handover window + fudge
auto leases = m_RemoteLeaseSet - > GetNonExpiredLeasesExcluding ( [ & exclude , now ] ( const i2p : : data : : Lease & l ) - > bool {
if ( exclude . size ( ) )
{
auto end = std : : end ( exclude ) ;
return std : : find_if ( exclude . begin ( ) , end , [ l , now ] ( const i2p : : data : : IdentHash & ident ) - > bool {
return ident = = l . tunnelGateway ;
} ) ! = end ;
}
else
return false ;
} ) ;
if ( leases . size ( ) )
{
// pick random valid next lease
uint32_t idx = rand ( ) % leases . size ( ) ;
next = leases [ idx ] ;
}
else
LogPrint ( eLogWarning , " DatagramDestination: no leases to use " ) ;
}
return next ;
}
void DatagramSession : : UpdateLeaseSet ( std : : shared_ptr < I2NPMessage > msg )
{
LogPrint ( eLogInfo , " DatagramSession: updating lease set " ) ;
m_LocalDestination - > RequestDestination ( m_RemoteIdentity , std : : bind ( & DatagramSession : : HandleGotLeaseSet , this , std : : placeholders : : _1 , msg ) ) ;
}
void DatagramSession : : HandleGotLeaseSet ( std : : shared_ptr < const i2p : : data : : LeaseSet > remoteIdent , std : : shared_ptr < I2NPMessage > msg )
{
if ( remoteIdent )
{
// update routing session
if ( m_RoutingSession )
m_RoutingSession = nullptr ;
m_RoutingSession = m_LocalDestination - > GetRoutingSession ( remoteIdent , true ) ;
// clear invalid IBGW as we have a new lease set
m_InvalidIBGW . clear ( ) ;
m_RemoteLeaseSet = remoteIdent ;
// update routing path
auto path = GetNextRoutingPath ( ) ;
if ( path )
UpdateRoutingPath ( path ) ;
else
ResetRoutingPath ( ) ;
// send the message that was queued if it was provided
if ( msg )
HandleSend ( msg ) ;
}
}
}
}