mirror of https://github.com/PurpleI2P/i2pd.git
I2P: End-to-End encrypted and anonymous Internet
https://i2pd.website/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
932 lines
34 KiB
932 lines
34 KiB
/* |
|
* Copyright (c) 2013-2020, The PurpleI2P Project |
|
* |
|
* This file is part of Purple i2pd project and licensed under BSD3 |
|
* |
|
* See full license text in LICENSE file at top of project tree |
|
*/ |
|
|
|
#include <fstream> |
|
#include <iostream> |
|
#include <boost/property_tree/ptree.hpp> |
|
#include <boost/property_tree/ini_parser.hpp> |
|
#include "Config.h" |
|
#include "FS.h" |
|
#include "Log.h" |
|
#include "Identity.h" |
|
#include "util.h" |
|
#include "ClientContext.h" |
|
#include "SOCKS.h" |
|
#include "MatchedDestination.h" |
|
|
|
namespace i2p |
|
{ |
|
namespace client |
|
{ |
|
ClientContext context; |
|
|
|
ClientContext::ClientContext (): m_SharedLocalDestination (nullptr), |
|
m_HttpProxy (nullptr), m_SocksProxy (nullptr), m_SamBridge (nullptr), |
|
m_BOBCommandChannel (nullptr), m_I2CPServer (nullptr) |
|
{ |
|
} |
|
|
|
ClientContext::~ClientContext () |
|
{ |
|
delete m_HttpProxy; |
|
delete m_SocksProxy; |
|
delete m_SamBridge; |
|
delete m_BOBCommandChannel; |
|
delete m_I2CPServer; |
|
} |
|
|
|
void ClientContext::Start () |
|
{ |
|
// shared local destination |
|
if (!m_SharedLocalDestination) |
|
CreateNewSharedLocalDestination (); |
|
|
|
// addressbook |
|
m_AddressBook.Start (); |
|
|
|
// HTTP proxy |
|
ReadHttpProxy (); |
|
|
|
// SOCKS proxy |
|
ReadSocksProxy (); |
|
|
|
// I2P tunnels |
|
ReadTunnels (); |
|
|
|
// SAM |
|
bool sam; i2p::config::GetOption("sam.enabled", sam); |
|
if (sam) |
|
{ |
|
std::string samAddr; i2p::config::GetOption("sam.address", samAddr); |
|
uint16_t samPort; i2p::config::GetOption("sam.port", samPort); |
|
bool singleThread; i2p::config::GetOption("sam.singlethread", singleThread); |
|
LogPrint(eLogInfo, "Clients: starting SAM bridge at ", samAddr, ":", samPort); |
|
try |
|
{ |
|
m_SamBridge = new SAMBridge (samAddr, samPort, singleThread); |
|
m_SamBridge->Start (); |
|
} |
|
catch (std::exception& e) |
|
{ |
|
LogPrint(eLogError, "Clients: Exception in SAM bridge: ", e.what()); |
|
ThrowFatal ("Unable to start SAM bridge at ", samAddr, ":", samPort, ": ", e.what ()); |
|
} |
|
} |
|
|
|
// BOB |
|
bool bob; i2p::config::GetOption("bob.enabled", bob); |
|
if (bob) { |
|
std::string bobAddr; i2p::config::GetOption("bob.address", bobAddr); |
|
uint16_t bobPort; i2p::config::GetOption("bob.port", bobPort); |
|
LogPrint(eLogInfo, "Clients: starting BOB command channel at ", bobAddr, ":", bobPort); |
|
try |
|
{ |
|
m_BOBCommandChannel = new BOBCommandChannel (bobAddr, bobPort); |
|
m_BOBCommandChannel->Start (); |
|
} |
|
catch (std::exception& e) |
|
{ |
|
LogPrint(eLogError, "Clients: Exception in BOB bridge: ", e.what()); |
|
ThrowFatal ("Unable to start BOB bridge at ", bobAddr, ":", bobPort, ": ", e.what ()); |
|
} |
|
} |
|
|
|
// I2CP |
|
bool i2cp; i2p::config::GetOption("i2cp.enabled", i2cp); |
|
if (i2cp) |
|
{ |
|
std::string i2cpAddr; i2p::config::GetOption("i2cp.address", i2cpAddr); |
|
uint16_t i2cpPort; i2p::config::GetOption("i2cp.port", i2cpPort); |
|
LogPrint(eLogInfo, "Clients: starting I2CP at ", i2cpAddr, ":", i2cpPort); |
|
try |
|
{ |
|
m_I2CPServer = new I2CPServer (i2cpAddr, i2cpPort); |
|
m_I2CPServer->Start (); |
|
} |
|
catch (std::exception& e) |
|
{ |
|
LogPrint(eLogError, "Clients: Exception in I2CP: ", e.what()); |
|
ThrowFatal ("Unable to start I2CP at ", i2cpAddr, ":", i2cpPort, ": ", e.what ()); |
|
} |
|
} |
|
|
|
m_AddressBook.StartResolvers (); |
|
|
|
// start UDP cleanup |
|
if (!m_ServerForwards.empty ()) |
|
{ |
|
m_CleanupUDPTimer.reset (new boost::asio::deadline_timer(m_SharedLocalDestination->GetService ())); |
|
ScheduleCleanupUDP(); |
|
} |
|
} |
|
|
|
void ClientContext::Stop () |
|
{ |
|
if (m_HttpProxy) |
|
{ |
|
LogPrint(eLogInfo, "Clients: stopping HTTP Proxy"); |
|
m_HttpProxy->Stop(); |
|
delete m_HttpProxy; |
|
m_HttpProxy = nullptr; |
|
} |
|
|
|
if (m_SocksProxy) |
|
{ |
|
LogPrint(eLogInfo, "Clients: stopping SOCKS Proxy"); |
|
m_SocksProxy->Stop(); |
|
delete m_SocksProxy; |
|
m_SocksProxy = nullptr; |
|
} |
|
|
|
for (auto& it: m_ClientTunnels) |
|
{ |
|
LogPrint(eLogInfo, "Clients: stopping I2P client tunnel on port ", it.first); |
|
it.second->Stop (); |
|
} |
|
m_ClientTunnels.clear (); |
|
|
|
for (auto& it: m_ServerTunnels) |
|
{ |
|
LogPrint(eLogInfo, "Clients: stopping I2P server tunnel"); |
|
it.second->Stop (); |
|
} |
|
m_ServerTunnels.clear (); |
|
|
|
if (m_SamBridge) |
|
{ |
|
LogPrint(eLogInfo, "Clients: stopping SAM bridge"); |
|
m_SamBridge->Stop (); |
|
delete m_SamBridge; |
|
m_SamBridge = nullptr; |
|
} |
|
|
|
if (m_BOBCommandChannel) |
|
{ |
|
LogPrint(eLogInfo, "Clients: stopping BOB command channel"); |
|
m_BOBCommandChannel->Stop (); |
|
delete m_BOBCommandChannel; |
|
m_BOBCommandChannel = nullptr; |
|
} |
|
|
|
if (m_I2CPServer) |
|
{ |
|
LogPrint(eLogInfo, "Clients: stopping I2CP"); |
|
m_I2CPServer->Stop (); |
|
delete m_I2CPServer; |
|
m_I2CPServer = nullptr; |
|
} |
|
|
|
LogPrint(eLogInfo, "Clients: stopping AddressBook"); |
|
m_AddressBook.Stop (); |
|
|
|
{ |
|
std::lock_guard<std::mutex> lock(m_ForwardsMutex); |
|
m_ServerForwards.clear(); |
|
m_ClientForwards.clear(); |
|
} |
|
|
|
if (m_CleanupUDPTimer) |
|
{ |
|
m_CleanupUDPTimer->cancel (); |
|
m_CleanupUDPTimer = nullptr; |
|
} |
|
|
|
for (auto& it: m_Destinations) |
|
it.second->Stop (); |
|
m_Destinations.clear (); |
|
m_SharedLocalDestination = nullptr; |
|
} |
|
|
|
void ClientContext::ReloadConfig () |
|
{ |
|
// TODO: handle config changes |
|
/*std::string config; i2p::config::GetOption("conf", config); |
|
i2p::config::ParseConfig(config);*/ |
|
|
|
// handle tunnels |
|
// reset isUpdated for each tunnel |
|
VisitTunnels ([](I2PService * s)->bool { s->isUpdated = false; return true; }); |
|
// reload tunnels |
|
ReadTunnels(); |
|
// delete not updated tunnels (not in config anymore) |
|
VisitTunnels ([](I2PService * s)->bool { return s->isUpdated; }); |
|
|
|
// change shared local destination |
|
m_SharedLocalDestination->Release (); |
|
CreateNewSharedLocalDestination (); |
|
|
|
// recreate HTTP proxy |
|
if (m_HttpProxy) |
|
{ |
|
m_HttpProxy->Stop (); |
|
m_HttpProxy = nullptr; |
|
} |
|
ReadHttpProxy (); |
|
|
|
// recreate SOCKS proxy |
|
if (m_SocksProxy) |
|
{ |
|
m_SocksProxy->Stop (); |
|
m_SocksProxy = nullptr; |
|
} |
|
ReadSocksProxy (); |
|
|
|
// delete unused destinations |
|
std::unique_lock<std::mutex> l(m_DestinationsMutex); |
|
for (auto it = m_Destinations.begin (); it != m_Destinations.end ();) |
|
{ |
|
auto dest = it->second; |
|
if (dest->GetRefCounter () > 0) ++it; // skip |
|
else |
|
{ |
|
dest->Stop (); |
|
it = m_Destinations.erase (it); |
|
} |
|
} |
|
} |
|
|
|
bool ClientContext::LoadPrivateKeys (i2p::data::PrivateKeys& keys, const std::string& filename, |
|
i2p::data::SigningKeyType sigType, i2p::data::CryptoKeyType cryptoType) |
|
{ |
|
static const std::string transient("transient"); |
|
if (!filename.compare (0, transient.length (), transient)) // starts with transient |
|
{ |
|
keys = i2p::data::PrivateKeys::CreateRandomKeys (sigType, cryptoType); |
|
LogPrint (eLogInfo, "Clients: New transient keys address ", m_AddressBook.ToAddress(keys.GetPublic ()->GetIdentHash ()), " created"); |
|
return true; |
|
} |
|
|
|
bool success = true; |
|
std::string fullPath = i2p::fs::DataDirPath (filename); |
|
std::ifstream s(fullPath, std::ifstream::binary); |
|
if (s.is_open ()) |
|
{ |
|
s.seekg (0, std::ios::end); |
|
size_t len = s.tellg(); |
|
s.seekg (0, std::ios::beg); |
|
uint8_t * buf = new uint8_t[len]; |
|
s.read ((char *)buf, len); |
|
if(!keys.FromBuffer (buf, len)) |
|
{ |
|
LogPrint (eLogError, "Clients: failed to load keyfile ", filename); |
|
success = false; |
|
} |
|
else |
|
LogPrint (eLogInfo, "Clients: Local address ", m_AddressBook.ToAddress(keys.GetPublic ()->GetIdentHash ()), " loaded"); |
|
delete[] buf; |
|
} |
|
else |
|
{ |
|
LogPrint (eLogError, "Clients: can't open file ", fullPath, " Creating new one with signature type ", sigType, " crypto type ", cryptoType); |
|
keys = i2p::data::PrivateKeys::CreateRandomKeys (sigType, cryptoType); |
|
std::ofstream f (fullPath, std::ofstream::binary | std::ofstream::out); |
|
size_t len = keys.GetFullLen (); |
|
uint8_t * buf = new uint8_t[len]; |
|
len = keys.ToBuffer (buf, len); |
|
f.write ((char *)buf, len); |
|
delete[] buf; |
|
|
|
LogPrint (eLogInfo, "Clients: New private keys file ", fullPath, " for ", m_AddressBook.ToAddress(keys.GetPublic ()->GetIdentHash ()), " created"); |
|
} |
|
return success; |
|
} |
|
|
|
std::vector<std::shared_ptr<DatagramSessionInfo> > ClientContext::GetForwardInfosFor(const i2p::data::IdentHash & destination) |
|
{ |
|
std::vector<std::shared_ptr<DatagramSessionInfo> > infos; |
|
std::lock_guard<std::mutex> lock(m_ForwardsMutex); |
|
for(const auto & c : m_ClientForwards) |
|
{ |
|
if (c.second->IsLocalDestination(destination)) |
|
{ |
|
for (auto & i : c.second->GetSessions()) infos.push_back(i); |
|
break; |
|
} |
|
} |
|
for(const auto & s : m_ServerForwards) |
|
{ |
|
if(std::get<0>(s.first) == destination) |
|
{ |
|
for( auto & i : s.second->GetSessions()) infos.push_back(i); |
|
break; |
|
} |
|
} |
|
return infos; |
|
} |
|
|
|
std::shared_ptr<ClientDestination> ClientContext::CreateNewLocalDestination (bool isPublic, |
|
i2p::data::SigningKeyType sigType, i2p::data::CryptoKeyType cryptoType, |
|
const std::map<std::string, std::string> * params) |
|
{ |
|
i2p::data::PrivateKeys keys = i2p::data::PrivateKeys::CreateRandomKeys (sigType, cryptoType); |
|
auto localDestination = std::make_shared<RunnableClientDestination> (keys, isPublic, params); |
|
AddLocalDestination (localDestination); |
|
return localDestination; |
|
} |
|
|
|
std::shared_ptr<ClientDestination> ClientContext::CreateNewLocalDestination ( |
|
boost::asio::io_service& service, bool isPublic, |
|
i2p::data::SigningKeyType sigType, i2p::data::CryptoKeyType cryptoType, |
|
const std::map<std::string, std::string> * params) |
|
{ |
|
i2p::data::PrivateKeys keys = i2p::data::PrivateKeys::CreateRandomKeys (sigType, cryptoType); |
|
auto localDestination = std::make_shared<ClientDestination> (service, keys, isPublic, params); |
|
AddLocalDestination (localDestination); |
|
return localDestination; |
|
} |
|
|
|
std::shared_ptr<ClientDestination> ClientContext::CreateNewMatchedTunnelDestination(const i2p::data::PrivateKeys &keys, const std::string & name, const std::map<std::string, std::string> * params) |
|
{ |
|
auto localDestination = std::make_shared<MatchedTunnelDestination>(keys, name, params); |
|
AddLocalDestination (localDestination); |
|
return localDestination; |
|
} |
|
|
|
void ClientContext::AddLocalDestination (std::shared_ptr<ClientDestination> localDestination) |
|
{ |
|
std::unique_lock<std::mutex> l(m_DestinationsMutex); |
|
m_Destinations[localDestination->GetIdentHash ()] = localDestination; |
|
localDestination->Start (); |
|
} |
|
|
|
void ClientContext::DeleteLocalDestination (std::shared_ptr<ClientDestination> destination) |
|
{ |
|
if (!destination) return; |
|
auto it = m_Destinations.find (destination->GetIdentHash ()); |
|
if (it != m_Destinations.end ()) |
|
{ |
|
auto d = it->second; |
|
{ |
|
std::unique_lock<std::mutex> l(m_DestinationsMutex); |
|
m_Destinations.erase (it); |
|
} |
|
d->Stop (); |
|
} |
|
} |
|
|
|
std::shared_ptr<ClientDestination> ClientContext::CreateNewLocalDestination (const i2p::data::PrivateKeys& keys, bool isPublic, |
|
const std::map<std::string, std::string> * params) |
|
{ |
|
auto it = m_Destinations.find (keys.GetPublic ()->GetIdentHash ()); |
|
if (it != m_Destinations.end ()) |
|
{ |
|
LogPrint (eLogWarning, "Clients: Local destination ", m_AddressBook.ToAddress(keys.GetPublic ()->GetIdentHash ()), " exists"); |
|
it->second->Start (); // make sure to start |
|
return it->second; |
|
} |
|
auto localDestination = std::make_shared<RunnableClientDestination> (keys, isPublic, params); |
|
AddLocalDestination (localDestination); |
|
return localDestination; |
|
} |
|
|
|
std::shared_ptr<ClientDestination> ClientContext::CreateNewLocalDestination (boost::asio::io_service& service, |
|
const i2p::data::PrivateKeys& keys, bool isPublic, const std::map<std::string, std::string> * params) |
|
{ |
|
auto it = m_Destinations.find (keys.GetPublic ()->GetIdentHash ()); |
|
if (it != m_Destinations.end ()) |
|
{ |
|
LogPrint (eLogWarning, "Clients: Local destination ", m_AddressBook.ToAddress(keys.GetPublic ()->GetIdentHash ()), " exists"); |
|
it->second->Start (); // make sure to start |
|
return it->second; |
|
} |
|
auto localDestination = std::make_shared<ClientDestination> (service, keys, isPublic, params); |
|
AddLocalDestination (localDestination); |
|
return localDestination; |
|
} |
|
|
|
void ClientContext::CreateNewSharedLocalDestination () |
|
{ |
|
std::map<std::string, std::string> params |
|
{ |
|
{ I2CP_PARAM_INBOUND_TUNNELS_QUANTITY, "2" }, |
|
{ I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY, "2" }, |
|
{ I2CP_PARAM_LEASESET_TYPE, "3" } |
|
}; |
|
m_SharedLocalDestination = CreateNewLocalDestination (false, i2p::data::SIGNING_KEY_TYPE_EDDSA_SHA512_ED25519, |
|
i2p::data::CRYPTO_KEY_TYPE_ELGAMAL, ¶ms); // non-public, EDDSA |
|
m_SharedLocalDestination->Acquire (); |
|
} |
|
|
|
std::shared_ptr<ClientDestination> ClientContext::FindLocalDestination (const i2p::data::IdentHash& destination) const |
|
{ |
|
auto it = m_Destinations.find (destination); |
|
if (it != m_Destinations.end ()) |
|
return it->second; |
|
return nullptr; |
|
} |
|
|
|
template<typename Section, typename Type> |
|
std::string ClientContext::GetI2CPOption (const Section& section, const std::string& name, const Type& value) const |
|
{ |
|
return section.second.get (boost::property_tree::ptree::path_type (name, '/'), std::to_string (value)); |
|
} |
|
|
|
template<typename Section> |
|
std::string ClientContext::GetI2CPStringOption (const Section& section, const std::string& name, const std::string& value) const |
|
{ |
|
return section.second.get (boost::property_tree::ptree::path_type (name, '/'), value); |
|
} |
|
|
|
template<typename Section> |
|
void ClientContext::ReadI2CPOptionsGroup (const Section& section, const std::string& group, std::map<std::string, std::string>& options) const |
|
{ |
|
for (auto it: section.second) |
|
{ |
|
if (it.first.length () >= group.length () && !it.first.compare (0, group.length (), group)) |
|
options[it.first] = it.second.get_value (""); |
|
} |
|
} |
|
|
|
template<typename Section> |
|
void ClientContext::ReadI2CPOptions (const Section& section, std::map<std::string, std::string>& options) const |
|
{ |
|
options[I2CP_PARAM_INBOUND_TUNNEL_LENGTH] = GetI2CPOption (section, I2CP_PARAM_INBOUND_TUNNEL_LENGTH, DEFAULT_INBOUND_TUNNEL_LENGTH); |
|
options[I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH] = GetI2CPOption (section, I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH, DEFAULT_OUTBOUND_TUNNEL_LENGTH); |
|
options[I2CP_PARAM_INBOUND_TUNNELS_QUANTITY] = GetI2CPOption (section, I2CP_PARAM_INBOUND_TUNNELS_QUANTITY, DEFAULT_INBOUND_TUNNELS_QUANTITY); |
|
options[I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY] = GetI2CPOption (section, I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY, DEFAULT_OUTBOUND_TUNNELS_QUANTITY); |
|
options[I2CP_PARAM_TAGS_TO_SEND] = GetI2CPOption (section, I2CP_PARAM_TAGS_TO_SEND, DEFAULT_TAGS_TO_SEND); |
|
options[I2CP_PARAM_MIN_TUNNEL_LATENCY] = GetI2CPOption(section, I2CP_PARAM_MIN_TUNNEL_LATENCY, DEFAULT_MIN_TUNNEL_LATENCY); |
|
options[I2CP_PARAM_MAX_TUNNEL_LATENCY] = GetI2CPOption(section, I2CP_PARAM_MAX_TUNNEL_LATENCY, DEFAULT_MAX_TUNNEL_LATENCY); |
|
options[I2CP_PARAM_STREAMING_INITIAL_ACK_DELAY] = GetI2CPOption(section, I2CP_PARAM_STREAMING_INITIAL_ACK_DELAY, DEFAULT_INITIAL_ACK_DELAY); |
|
options[I2CP_PARAM_LEASESET_TYPE] = GetI2CPOption(section, I2CP_PARAM_LEASESET_TYPE, DEFAULT_LEASESET_TYPE); |
|
std::string encType = GetI2CPStringOption(section, I2CP_PARAM_LEASESET_ENCRYPTION_TYPE, ""); |
|
if (encType.length () > 0) options[I2CP_PARAM_LEASESET_ENCRYPTION_TYPE] = encType; |
|
std::string privKey = GetI2CPStringOption(section, I2CP_PARAM_LEASESET_PRIV_KEY, ""); |
|
if (privKey.length () > 0) options[I2CP_PARAM_LEASESET_PRIV_KEY] = privKey; |
|
auto authType = GetI2CPOption(section, I2CP_PARAM_LEASESET_AUTH_TYPE, 0); |
|
if (authType != "0") // auth is set |
|
{ |
|
options[I2CP_PARAM_LEASESET_AUTH_TYPE] = authType; |
|
if (authType == "1") // DH |
|
ReadI2CPOptionsGroup (section, I2CP_PARAM_LEASESET_CLIENT_DH, options); |
|
else if (authType == "2") // PSK |
|
ReadI2CPOptionsGroup (section, I2CP_PARAM_LEASESET_CLIENT_PSK, options); |
|
} |
|
std::string explicitPeers = GetI2CPStringOption(section, I2CP_PARAM_EXPLICIT_PEERS, ""); |
|
if (explicitPeers.length () > 0) options[I2CP_PARAM_EXPLICIT_PEERS] = explicitPeers; |
|
std::string ratchetInboundTags = GetI2CPStringOption(section, I2CP_PARAM_RATCHET_INBOUND_TAGS, ""); |
|
if (ratchetInboundTags.length () > 0) options[I2CP_PARAM_RATCHET_INBOUND_TAGS] = ratchetInboundTags; |
|
} |
|
|
|
void ClientContext::ReadI2CPOptionsFromConfig (const std::string& prefix, std::map<std::string, std::string>& options) const |
|
{ |
|
std::string value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_INBOUND_TUNNEL_LENGTH, value)) |
|
options[I2CP_PARAM_INBOUND_TUNNEL_LENGTH] = value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_INBOUND_TUNNELS_QUANTITY, value)) |
|
options[I2CP_PARAM_INBOUND_TUNNELS_QUANTITY] = value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH, value)) |
|
options[I2CP_PARAM_OUTBOUND_TUNNEL_LENGTH] = value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY, value)) |
|
options[I2CP_PARAM_OUTBOUND_TUNNELS_QUANTITY] = value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_MIN_TUNNEL_LATENCY, value)) |
|
options[I2CP_PARAM_MIN_TUNNEL_LATENCY] = value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_MAX_TUNNEL_LATENCY, value)) |
|
options[I2CP_PARAM_MAX_TUNNEL_LATENCY] = value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_LEASESET_TYPE, value)) |
|
options[I2CP_PARAM_LEASESET_TYPE] = value; |
|
if (i2p::config::GetOption(prefix + I2CP_PARAM_LEASESET_ENCRYPTION_TYPE, value)) |
|
options[I2CP_PARAM_LEASESET_ENCRYPTION_TYPE] = value; |
|
} |
|
|
|
void ClientContext::ReadTunnels () |
|
{ |
|
int numClientTunnels = 0, numServerTunnels = 0; |
|
std::string tunConf; i2p::config::GetOption("tunconf", tunConf); |
|
if (tunConf.empty ()) |
|
{ |
|
// TODO: cleanup this in 2.8.0 |
|
tunConf = i2p::fs::DataDirPath ("tunnels.cfg"); |
|
if (i2p::fs::Exists(tunConf)) |
|
LogPrint(eLogWarning, "Clients: please rename tunnels.cfg -> tunnels.conf here: ", tunConf); |
|
else |
|
tunConf = i2p::fs::DataDirPath ("tunnels.conf"); |
|
} |
|
LogPrint(eLogDebug, "Clients: tunnels config file: ", tunConf); |
|
ReadTunnels (tunConf, numClientTunnels, numServerTunnels); |
|
|
|
std::string tunDir; i2p::config::GetOption("tunnelsdir", tunDir); |
|
if (tunDir.empty ()) |
|
tunDir = i2p::fs::DataDirPath ("tunnels.d"); |
|
if (i2p::fs::Exists (tunDir)) |
|
{ |
|
std::vector<std::string> files; |
|
if (i2p::fs::ReadDir (tunDir, files)) |
|
{ |
|
for (auto& it: files) |
|
{ |
|
if (it.substr(it.size() - 5) != ".conf") continue; // skip files which not ends with ".conf" |
|
LogPrint(eLogDebug, "Clients: tunnels extra config file: ", it); |
|
ReadTunnels (it, numClientTunnels, numServerTunnels); |
|
} |
|
} |
|
} |
|
|
|
LogPrint (eLogInfo, "Clients: ", numClientTunnels, " I2P client tunnels created"); |
|
LogPrint (eLogInfo, "Clients: ", numServerTunnels, " I2P server tunnels created"); |
|
} |
|
|
|
void ClientContext::ReadTunnels (const std::string& tunConf, int& numClientTunnels, int& numServerTunnels) |
|
{ |
|
boost::property_tree::ptree pt; |
|
try { |
|
boost::property_tree::read_ini (tunConf, pt); |
|
} catch (std::exception& ex) { |
|
LogPrint (eLogWarning, "Clients: Can't read ", tunConf, ": ", ex.what ()); |
|
return; |
|
} |
|
|
|
std::map<std::string, std::shared_ptr<ClientDestination> > destinations; // keys -> destination |
|
for (auto& section: pt) |
|
{ |
|
std::string name = section.first; |
|
try |
|
{ |
|
std::string type = section.second.get<std::string> (I2P_TUNNELS_SECTION_TYPE); |
|
if (type == I2P_TUNNELS_SECTION_TYPE_CLIENT |
|
|| type == I2P_TUNNELS_SECTION_TYPE_SOCKS |
|
|| type == I2P_TUNNELS_SECTION_TYPE_WEBSOCKS |
|
|| type == I2P_TUNNELS_SECTION_TYPE_HTTPPROXY |
|
|| type == I2P_TUNNELS_SECTION_TYPE_UDPCLIENT) |
|
{ |
|
// mandatory params |
|
std::string dest; |
|
if (type == I2P_TUNNELS_SECTION_TYPE_CLIENT || type == I2P_TUNNELS_SECTION_TYPE_UDPCLIENT) |
|
dest = section.second.get<std::string> (I2P_CLIENT_TUNNEL_DESTINATION); |
|
int port = section.second.get<int> (I2P_CLIENT_TUNNEL_PORT); |
|
// optional params |
|
bool matchTunnels = section.second.get(I2P_CLIENT_TUNNEL_MATCH_TUNNELS, false); |
|
std::string keys = section.second.get (I2P_CLIENT_TUNNEL_KEYS, "transient"); |
|
std::string address = section.second.get (I2P_CLIENT_TUNNEL_ADDRESS, "127.0.0.1"); |
|
int destinationPort = section.second.get (I2P_CLIENT_TUNNEL_DESTINATION_PORT, 0); |
|
i2p::data::SigningKeyType sigType = section.second.get (I2P_CLIENT_TUNNEL_SIGNATURE_TYPE, i2p::data::SIGNING_KEY_TYPE_EDDSA_SHA512_ED25519); |
|
i2p::data::CryptoKeyType cryptoType = section.second.get (I2P_CLIENT_TUNNEL_CRYPTO_TYPE, i2p::data::CRYPTO_KEY_TYPE_ELGAMAL); |
|
// I2CP |
|
std::map<std::string, std::string> options; |
|
ReadI2CPOptions (section, options); |
|
|
|
std::shared_ptr<ClientDestination> localDestination = nullptr; |
|
if (keys.length () > 0) |
|
{ |
|
auto it = destinations.find (keys); |
|
if (it != destinations.end ()) |
|
localDestination = it->second; |
|
else |
|
{ |
|
i2p::data::PrivateKeys k; |
|
if(LoadPrivateKeys (k, keys, sigType, cryptoType)) |
|
{ |
|
localDestination = FindLocalDestination (k.GetPublic ()->GetIdentHash ()); |
|
if (!localDestination) |
|
{ |
|
if(matchTunnels) |
|
localDestination = CreateNewMatchedTunnelDestination(k, dest, &options); |
|
else |
|
localDestination = CreateNewLocalDestination (k, type == I2P_TUNNELS_SECTION_TYPE_UDPCLIENT, &options); |
|
destinations[keys] = localDestination; |
|
} |
|
} |
|
} |
|
} |
|
|
|
if (type == I2P_TUNNELS_SECTION_TYPE_UDPCLIENT) { |
|
// udp client |
|
// TODO: hostnames |
|
boost::asio::ip::udp::endpoint end(boost::asio::ip::address::from_string(address), port); |
|
if (!localDestination) |
|
localDestination = m_SharedLocalDestination; |
|
|
|
bool gzip = section.second.get (I2P_CLIENT_TUNNEL_GZIP, true); |
|
auto clientTunnel = std::make_shared<I2PUDPClientTunnel>(name, dest, end, localDestination, destinationPort, gzip); |
|
if(m_ClientForwards.insert(std::make_pair(end, clientTunnel)).second) |
|
clientTunnel->Start(); |
|
else |
|
LogPrint(eLogError, "Clients: I2P Client forward for endpoint ", end, " already exists"); |
|
|
|
} else { |
|
boost::asio::ip::tcp::endpoint clientEndpoint; |
|
std::shared_ptr<I2PService> clientTunnel; |
|
if (type == I2P_TUNNELS_SECTION_TYPE_SOCKS) |
|
{ |
|
// socks proxy |
|
std::string outproxy = section.second.get("outproxy", ""); |
|
auto tun = std::make_shared<i2p::proxy::SOCKSProxy>(name, address, port, !outproxy.empty(), outproxy, destinationPort, localDestination); |
|
clientTunnel = tun; |
|
clientEndpoint = tun->GetLocalEndpoint (); |
|
} |
|
else if (type == I2P_TUNNELS_SECTION_TYPE_HTTPPROXY) |
|
{ |
|
// http proxy |
|
std::string outproxy = section.second.get("outproxy", ""); |
|
bool addresshelper = section.second.get("addresshelper", true); |
|
auto tun = std::make_shared<i2p::proxy::HTTPProxy>(name, address, port, outproxy, addresshelper, localDestination); |
|
clientTunnel = tun; |
|
clientEndpoint = tun->GetLocalEndpoint (); |
|
} |
|
else if (type == I2P_TUNNELS_SECTION_TYPE_WEBSOCKS) |
|
{ |
|
LogPrint(eLogWarning, "Clients: I2P Client tunnel websocks is deprecated, not starting ", name, " tunnel"); |
|
continue; |
|
} |
|
else |
|
{ |
|
// tcp client |
|
auto tun = std::make_shared<I2PClientTunnel> (name, dest, address, port, localDestination, destinationPort); |
|
clientTunnel = tun; |
|
clientEndpoint = tun->GetLocalEndpoint (); |
|
} |
|
|
|
uint32_t timeout = section.second.get<uint32_t>(I2P_CLIENT_TUNNEL_CONNECT_TIMEOUT, 0); |
|
if(timeout) |
|
{ |
|
clientTunnel->SetConnectTimeout(timeout); |
|
LogPrint(eLogInfo, "Clients: I2P Client tunnel connect timeout set to ", timeout); |
|
} |
|
|
|
auto ins = m_ClientTunnels.insert (std::make_pair (clientEndpoint, clientTunnel)); |
|
if (ins.second) |
|
{ |
|
clientTunnel->Start (); |
|
numClientTunnels++; |
|
} |
|
else |
|
{ |
|
// TODO: update |
|
if (ins.first->second->GetLocalDestination () != clientTunnel->GetLocalDestination ()) |
|
{ |
|
LogPrint (eLogInfo, "Clients: I2P client tunnel destination updated"); |
|
ins.first->second->SetLocalDestination (clientTunnel->GetLocalDestination ()); |
|
} |
|
ins.first->second->isUpdated = true; |
|
LogPrint (eLogInfo, "Clients: I2P client tunnel for endpoint ", clientEndpoint, " already exists"); |
|
} |
|
} |
|
} |
|
else if (type == I2P_TUNNELS_SECTION_TYPE_SERVER |
|
|| type == I2P_TUNNELS_SECTION_TYPE_HTTP |
|
|| type == I2P_TUNNELS_SECTION_TYPE_IRC |
|
|| type == I2P_TUNNELS_SECTION_TYPE_UDPSERVER) |
|
{ |
|
// mandatory params |
|
std::string host = section.second.get<std::string> (I2P_SERVER_TUNNEL_HOST); |
|
int port = section.second.get<int> (I2P_SERVER_TUNNEL_PORT); |
|
std::string keys = section.second.get<std::string> (I2P_SERVER_TUNNEL_KEYS); |
|
// optional params |
|
int inPort = section.second.get (I2P_SERVER_TUNNEL_INPORT, 0); |
|
std::string accessList = section.second.get (I2P_SERVER_TUNNEL_ACCESS_LIST, ""); |
|
if(accessList == "") |
|
accessList=section.second.get (I2P_SERVER_TUNNEL_WHITE_LIST, ""); |
|
std::string hostOverride = section.second.get (I2P_SERVER_TUNNEL_HOST_OVERRIDE, ""); |
|
std::string webircpass = section.second.get<std::string> (I2P_SERVER_TUNNEL_WEBIRC_PASSWORD, ""); |
|
bool gzip = section.second.get (I2P_SERVER_TUNNEL_GZIP, true); |
|
i2p::data::SigningKeyType sigType = section.second.get (I2P_SERVER_TUNNEL_SIGNATURE_TYPE, i2p::data::SIGNING_KEY_TYPE_EDDSA_SHA512_ED25519); |
|
i2p::data::CryptoKeyType cryptoType = section.second.get (I2P_CLIENT_TUNNEL_CRYPTO_TYPE, i2p::data::CRYPTO_KEY_TYPE_ELGAMAL); |
|
|
|
std::string address = section.second.get<std::string> (I2P_SERVER_TUNNEL_ADDRESS, "127.0.0.1"); |
|
bool isUniqueLocal = section.second.get(I2P_SERVER_TUNNEL_ENABLE_UNIQUE_LOCAL, true); |
|
|
|
// I2CP |
|
std::map<std::string, std::string> options; |
|
ReadI2CPOptions (section, options); |
|
|
|
std::shared_ptr<ClientDestination> localDestination = nullptr; |
|
auto it = destinations.find (keys); |
|
if (it != destinations.end ()) |
|
localDestination = it->second; |
|
else |
|
{ |
|
i2p::data::PrivateKeys k; |
|
if(!LoadPrivateKeys (k, keys, sigType, cryptoType)) |
|
continue; |
|
localDestination = FindLocalDestination (k.GetPublic ()->GetIdentHash ()); |
|
if (!localDestination) |
|
{ |
|
localDestination = CreateNewLocalDestination (k, true, &options); |
|
destinations[keys] = localDestination; |
|
} |
|
} |
|
if (type == I2P_TUNNELS_SECTION_TYPE_UDPSERVER) |
|
{ |
|
// udp server tunnel |
|
// TODO: hostnames |
|
auto localAddress = boost::asio::ip::address::from_string(address); |
|
boost::asio::ip::udp::endpoint endpoint(boost::asio::ip::address::from_string(host), port); |
|
auto serverTunnel = std::make_shared<I2PUDPServerTunnel>(name, localDestination, localAddress, endpoint, port, gzip); |
|
if(!isUniqueLocal) |
|
{ |
|
LogPrint(eLogInfo, "Clients: disabling loopback address mapping"); |
|
serverTunnel->SetUniqueLocal(isUniqueLocal); |
|
} |
|
std::lock_guard<std::mutex> lock(m_ForwardsMutex); |
|
if(m_ServerForwards.insert( |
|
std::make_pair( |
|
std::make_pair( |
|
localDestination->GetIdentHash(), port), |
|
serverTunnel)).second) |
|
{ |
|
serverTunnel->Start(); |
|
LogPrint(eLogInfo, "Clients: I2P Server Forward created for UDP Endpoint ", host, ":", port, " bound on ", address, " for ",localDestination->GetIdentHash().ToBase32()); |
|
} |
|
else |
|
LogPrint(eLogError, "Clients: I2P Server Forward for destination/port ", m_AddressBook.ToAddress(localDestination->GetIdentHash()), "/", port, "already exists"); |
|
|
|
continue; |
|
} |
|
|
|
std::shared_ptr<I2PServerTunnel> serverTunnel; |
|
if (type == I2P_TUNNELS_SECTION_TYPE_HTTP) |
|
serverTunnel = std::make_shared<I2PServerTunnelHTTP> (name, host, port, localDestination, hostOverride, inPort, gzip); |
|
else if (type == I2P_TUNNELS_SECTION_TYPE_IRC) |
|
serverTunnel = std::make_shared<I2PServerTunnelIRC> (name, host, port, localDestination, webircpass, inPort, gzip); |
|
else // regular server tunnel by default |
|
serverTunnel = std::make_shared<I2PServerTunnel> (name, host, port, localDestination, inPort, gzip); |
|
|
|
if(!isUniqueLocal) |
|
{ |
|
LogPrint(eLogInfo, "Clients: disabling loopback address mapping"); |
|
serverTunnel->SetUniqueLocal(isUniqueLocal); |
|
} |
|
|
|
if (accessList.length () > 0) |
|
{ |
|
std::set<i2p::data::IdentHash> idents; |
|
size_t pos = 0, comma; |
|
do |
|
{ |
|
comma = accessList.find (',', pos); |
|
i2p::data::IdentHash ident; |
|
ident.FromBase32 (accessList.substr (pos, comma != std::string::npos ? comma - pos : std::string::npos)); |
|
idents.insert (ident); |
|
pos = comma + 1; |
|
} |
|
while (comma != std::string::npos); |
|
serverTunnel->SetAccessList (idents); |
|
} |
|
auto ins = m_ServerTunnels.insert (std::make_pair ( |
|
std::make_pair (localDestination->GetIdentHash (), inPort), |
|
serverTunnel)); |
|
if (ins.second) |
|
{ |
|
serverTunnel->Start (); |
|
numServerTunnels++; |
|
} |
|
else |
|
{ |
|
// TODO: update |
|
if (ins.first->second->GetLocalDestination () != serverTunnel->GetLocalDestination ()) |
|
{ |
|
LogPrint (eLogInfo, "Clients: I2P server tunnel destination updated"); |
|
ins.first->second->SetLocalDestination (serverTunnel->GetLocalDestination ()); |
|
} |
|
ins.first->second->isUpdated = true; |
|
LogPrint (eLogInfo, "Clients: I2P server tunnel for destination/port ", m_AddressBook.ToAddress(localDestination->GetIdentHash ()), "/", inPort, " already exists"); |
|
} |
|
|
|
} |
|
else |
|
LogPrint (eLogWarning, "Clients: Unknown section type = ", type, " of ", name, " in ", tunConf); |
|
} |
|
catch (std::exception& ex) |
|
{ |
|
LogPrint (eLogError, "Clients: Can't read tunnel ", name, " params: ", ex.what ()); |
|
ThrowFatal ("Unable to start tunnel ", name, ": ", ex.what ()); |
|
} |
|
} |
|
} |
|
|
|
void ClientContext::ReadHttpProxy () |
|
{ |
|
std::shared_ptr<ClientDestination> localDestination; |
|
bool httproxy; i2p::config::GetOption("httpproxy.enabled", httproxy); |
|
if (httproxy) |
|
{ |
|
std::string httpProxyKeys; i2p::config::GetOption("httpproxy.keys", httpProxyKeys); |
|
std::string httpProxyAddr; i2p::config::GetOption("httpproxy.address", httpProxyAddr); |
|
uint16_t httpProxyPort; i2p::config::GetOption("httpproxy.port", httpProxyPort); |
|
std::string httpOutProxyURL; i2p::config::GetOption("httpproxy.outproxy", httpOutProxyURL); |
|
bool httpAddresshelper; i2p::config::GetOption("httpproxy.addresshelper", httpAddresshelper); |
|
i2p::data::SigningKeyType sigType; i2p::config::GetOption("httpproxy.signaturetype", sigType); |
|
LogPrint(eLogInfo, "Clients: starting HTTP Proxy at ", httpProxyAddr, ":", httpProxyPort); |
|
if (httpProxyKeys.length () > 0) |
|
{ |
|
i2p::data::PrivateKeys keys; |
|
if(LoadPrivateKeys (keys, httpProxyKeys, sigType)) |
|
{ |
|
std::map<std::string, std::string> params; |
|
ReadI2CPOptionsFromConfig ("httpproxy.", params); |
|
localDestination = CreateNewLocalDestination (keys, false, ¶ms); |
|
if (localDestination) localDestination->Acquire (); |
|
} |
|
else |
|
LogPrint(eLogError, "Clients: failed to load HTTP Proxy key"); |
|
} |
|
try |
|
{ |
|
m_HttpProxy = new i2p::proxy::HTTPProxy("HTTP Proxy", httpProxyAddr, httpProxyPort, httpOutProxyURL, httpAddresshelper, localDestination); |
|
m_HttpProxy->Start(); |
|
} |
|
catch (std::exception& e) |
|
{ |
|
LogPrint(eLogError, "Clients: Exception in HTTP Proxy: ", e.what()); |
|
ThrowFatal ("Unable to start HTTP Proxy at ", httpProxyAddr, ":", httpProxyPort, ": ", e.what ()); |
|
} |
|
} |
|
} |
|
|
|
void ClientContext::ReadSocksProxy () |
|
{ |
|
std::shared_ptr<ClientDestination> localDestination; |
|
bool socksproxy; i2p::config::GetOption("socksproxy.enabled", socksproxy); |
|
if (socksproxy) |
|
{ |
|
std::string httpProxyKeys; i2p::config::GetOption("httpproxy.keys", httpProxyKeys); |
|
// we still need httpProxyKeys to compare with sockProxyKeys |
|
std::string socksProxyKeys; i2p::config::GetOption("socksproxy.keys", socksProxyKeys); |
|
std::string socksProxyAddr; i2p::config::GetOption("socksproxy.address", socksProxyAddr); |
|
uint16_t socksProxyPort; i2p::config::GetOption("socksproxy.port", socksProxyPort); |
|
bool socksOutProxy; i2p::config::GetOption("socksproxy.outproxy.enabled", socksOutProxy); |
|
std::string socksOutProxyAddr; i2p::config::GetOption("socksproxy.outproxy", socksOutProxyAddr); |
|
uint16_t socksOutProxyPort; i2p::config::GetOption("socksproxy.outproxyport", socksOutProxyPort); |
|
i2p::data::SigningKeyType sigType; i2p::config::GetOption("socksproxy.signaturetype", sigType); |
|
LogPrint(eLogInfo, "Clients: starting SOCKS Proxy at ", socksProxyAddr, ":", socksProxyPort); |
|
if (httpProxyKeys == socksProxyKeys && m_HttpProxy) |
|
{ |
|
localDestination = m_HttpProxy->GetLocalDestination (); |
|
localDestination->Acquire (); |
|
} |
|
else if (socksProxyKeys.length () > 0) |
|
{ |
|
i2p::data::PrivateKeys keys; |
|
if (LoadPrivateKeys (keys, socksProxyKeys, sigType)) |
|
{ |
|
std::map<std::string, std::string> params; |
|
ReadI2CPOptionsFromConfig ("socksproxy.", params); |
|
localDestination = CreateNewLocalDestination (keys, false, ¶ms); |
|
if (localDestination) localDestination->Acquire (); |
|
} |
|
else |
|
LogPrint(eLogError, "Clients: failed to load SOCKS Proxy key"); |
|
} |
|
try |
|
{ |
|
m_SocksProxy = new i2p::proxy::SOCKSProxy("SOCKS", socksProxyAddr, socksProxyPort, |
|
socksOutProxy, socksOutProxyAddr, socksOutProxyPort, localDestination); |
|
m_SocksProxy->Start(); |
|
} |
|
catch (std::exception& e) |
|
{ |
|
LogPrint(eLogError, "Clients: Exception in SOCKS Proxy: ", e.what()); |
|
ThrowFatal ("Unable to start SOCKS Proxy at ", socksProxyAddr, ":", socksProxyPort, ": ", e.what ()); |
|
} |
|
} |
|
} |
|
|
|
void ClientContext::ScheduleCleanupUDP() |
|
{ |
|
if (m_CleanupUDPTimer) |
|
{ |
|
// schedule cleanup in 17 seconds |
|
m_CleanupUDPTimer->expires_from_now (boost::posix_time::seconds (17)); |
|
m_CleanupUDPTimer->async_wait(std::bind(&ClientContext::CleanupUDP, this, std::placeholders::_1)); |
|
} |
|
} |
|
|
|
void ClientContext::CleanupUDP(const boost::system::error_code & ecode) |
|
{ |
|
if(!ecode) |
|
{ |
|
std::lock_guard<std::mutex> lock(m_ForwardsMutex); |
|
for (auto & s : m_ServerForwards ) s.second->ExpireStale(); |
|
ScheduleCleanupUDP(); |
|
} |
|
} |
|
|
|
template<typename Container, typename Visitor> |
|
void VisitTunnelsContainer (Container& c, Visitor v) |
|
{ |
|
for (auto it = c.begin (); it != c.end ();) |
|
{ |
|
if (!v (it->second.get ())) |
|
{ |
|
it->second->Stop (); |
|
it = c.erase (it); |
|
} |
|
else |
|
it++; |
|
} |
|
} |
|
|
|
template<typename Visitor> |
|
void ClientContext::VisitTunnels (Visitor v) |
|
{ |
|
VisitTunnelsContainer (m_ClientTunnels, v); |
|
VisitTunnelsContainer (m_ServerTunnels, v); |
|
// TODO: implement UDP forwards |
|
} |
|
} |
|
}
|
|
|