X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=src%2Ftransport%2Fgnunet-service-transport.c;h=d52d6ab699db612a27fb7966d49ecaa79620d8f2;hb=7e3cf5f461eb4fbb7581672bf0835da07c378136;hp=d518a3bf7ed52089ff2e12afb496dd29b878abc2;hpb=6fff2c158bad68c4623c6224c59e1bc67cdc17f1;p=oweals%2Fgnunet.git diff --git a/src/transport/gnunet-service-transport.c b/src/transport/gnunet-service-transport.c index d518a3bf7..7638839cc 100644 --- a/src/transport/gnunet-service-transport.c +++ b/src/transport/gnunet-service-transport.c @@ -1,26 +1,25 @@ /* - This file is part of GNUnet. - (C) 2010,2011 Christian Grothoff (and other contributing authors) + This file is part of GNUnet. + Copyright (C) 2010-2016 GNUnet e.V. - GNUnet is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published - by the Free Software Foundation; either version 3, or (at your - option) any later version. + GNUnet is free software: you can redistribute it and/or modify it + under the terms of the GNU Affero General Public License as published + by the Free Software Foundation, either version 3 of the License, + or (at your option) any later version. - GNUnet is distributed in the hope that it will be useful, but - WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - General Public License for more details. + GNUnet is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Affero General Public License for more details. - You should have received a copy of the GNU General Public License - along with GNUnet; see the file COPYING. If not, write to the - Free Software Foundation, Inc., 59 Temple Place - Suite 330, - Boston, MA 02111-1307, USA. -*/ + You should have received a copy of the GNU Affero General Public License + along with this program. If not, see . + SPDX-License-Identifier: AGPL3.0-or-later + */ /** * @file transport/gnunet-service-transport.c - * @brief + * @brief main for gnunet-service-transport * @author Christian Grothoff */ #include "platform.h" @@ -31,15 +30,336 @@ #include "gnunet_peerinfo_service.h" #include "gnunet_ats_service.h" #include "gnunet-service-transport.h" -#include "gnunet-service-transport_blacklist.h" -#include "gnunet-service-transport_clients.h" +#include "gnunet-service-transport_ats.h" #include "gnunet-service-transport_hello.h" #include "gnunet-service-transport_neighbours.h" #include "gnunet-service-transport_plugins.h" #include "gnunet-service-transport_validation.h" +#include "gnunet-service-transport_manipulation.h" #include "transport.h" -/* globals */ +/** + * Size of the blacklist hash map. + */ +#define TRANSPORT_BLACKLIST_HT_SIZE 64 + +/** + * How many messages can we have pending for a given client process + * before we start to drop incoming messages? We typically should + * have only one client and so this would be the primary buffer for + * messages, so the number should be chosen rather generously. + * + * The expectation here is that most of the time the queue is large + * enough so that a drop is virtually never required. Note that + * this value must be about as large as 'TOTAL_MSGS' in the + * 'test_transport_api_reliability.c', otherwise that testcase may + * fail. + */ +#define MAX_PENDING (128 * 1024) + + +/** + * Information we need for an asynchronous session kill. + */ +struct GNUNET_ATS_SessionKiller +{ + /** + * Kept in a DLL. + */ + struct GNUNET_ATS_SessionKiller *next; + + /** + * Kept in a DLL. + */ + struct GNUNET_ATS_SessionKiller *prev; + + /** + * Session to kill. + */ + struct GNUNET_ATS_Session *session; + + /** + * Plugin for the session. + */ + struct GNUNET_TRANSPORT_PluginFunctions *plugin; + + /** + * The kill task. + */ + struct GNUNET_SCHEDULER_Task *task; +}; + + +/** + * What type of client is the `struct TransportClient` about? + */ +enum ClientType +{ + /** + * We do not know yet (client is fresh). + */ + CT_NONE = 0, + + /** + * Is the CORE service, we need to forward traffic to it. + */ + CT_CORE = 1, + + /** + * It is a monitor, forward monitor data. + */ + CT_MONITOR = 2, + + /** + * It is a blacklist, query about allowed connections. + */ + CT_BLACKLIST = 3, + + /** + * CORE client without any handlers. + */ + CT_CORE_NO_HANDLERS = 4 +}; + + +/** + * Context we use when performing a blacklist check. + */ +struct GST_BlacklistCheck; + +/** + * Client connected to the transport service. + */ +struct TransportClient +{ + /** + * This is a doubly-linked list. + */ + struct TransportClient *next; + + /** + * This is a doubly-linked list. + */ + struct TransportClient *prev; + + /** + * Handle to the client. + */ + struct GNUNET_SERVICE_Client *client; + + /** + * Message queue to the client. + */ + struct GNUNET_MQ_Handle *mq; + + /** + * What type of client is this? + */ + enum ClientType type; + + union + { + /** + * Peer identity to monitor the addresses of. + * Zero to monitor all neighbours. Valid if + * @e type is CT_MONITOR. + */ + struct GNUNET_PeerIdentity monitor_peer; + + /** + * Additional details if @e type is CT_BLACKLIST. + */ + struct + { + /** + * Blacklist check that we're currently performing (or NULL + * if we're performing one that has been cancelled). + */ + struct GST_BlacklistCheck *bc; + + /** + * Set to #GNUNET_YES if we're currently waiting for a reply. + */ + int waiting_for_reply; + + /** + * #GNUNET_YES if we have to call receive_done for this client + */ + int call_receive_done; + } blacklist; + } details; +}; + + +/** + * Context we use when performing a blacklist check. + */ +struct GST_BlacklistCheck +{ + /** + * This is a linked list. + */ + struct GST_BlacklistCheck *next; + + /** + * This is a linked list. + */ + struct GST_BlacklistCheck *prev; + + /** + * Peer being checked. + */ + struct GNUNET_PeerIdentity peer; + + /** + * Continuation to call with the result. + */ + GST_BlacklistTestContinuation cont; + + /** + * Closure for @e cont. + */ + void *cont_cls; + + /** + * Address for #GST_blacklist_abort_matching(), can be NULL. + */ + struct GNUNET_HELLO_Address *address; + + /** + * Session for #GST_blacklist_abort_matching(), can be NULL. + */ + struct GNUNET_ATS_Session *session; + + /** + * Our current position in the blacklisters list. + */ + struct TransportClient *bl_pos; + + /** + * Current task performing the check. + */ + struct GNUNET_SCHEDULER_Task *task; +}; + + +/** + * Context for address to string operations + */ +struct AddressToStringContext +{ + /** + * This is a doubly-linked list. + */ + struct AddressToStringContext *next; + + /** + * This is a doubly-linked list. + */ + struct AddressToStringContext *prev; + + /** + * Client that made the request. + */ + struct TransportClient *tc; +}; + + +/** + * Closure for #handle_send_transmit_continuation() + */ +struct SendTransmitContinuationContext +{ + /** + * Client that made the request. + */ + struct TransportClient *tc; + + /** + * Peer that was the target. + */ + struct GNUNET_PeerIdentity target; + + /** + * At what time did we receive the message? + */ + struct GNUNET_TIME_Absolute send_time; + + /** + * Unique ID, for logging. + */ + unsigned long long uuid; + + /** + * Set to #GNUNET_YES if the connection for @e target goes + * down and we thus must no longer send the + * #GNUNET_MESSAGE_TYPE_TRANSPORT_SEND_OK message. + */ + int down; +}; + + +/** + * Head of linked list of all clients to this service. + */ +static struct TransportClient *clients_head; + +/** + * Tail of linked list of all clients to this service. + */ +static struct TransportClient *clients_tail; + +/** + * Map of peer identities to active send transmit continuation + * contexts. Used to flag contexts as 'dead' when a connection goes + * down. Values are of type `struct SendTransmitContinuationContext + * *`. + */ +static struct GNUNET_CONTAINER_MultiPeerMap *active_stccs; + +/** + * Head of linked list of all pending address iterations + */ +static struct AddressToStringContext *a2s_head; + +/** + * Tail of linked list of all pending address iterations + */ +static struct AddressToStringContext *a2s_tail; + +/** + * Head of DLL of active blacklisting queries. + */ +static struct GST_BlacklistCheck *bc_head; + +/** + * Tail of DLL of active blacklisting queries. + */ +static struct GST_BlacklistCheck *bc_tail; + +/** + * Hashmap of blacklisted peers. Values are of type 'char *' (transport names), + * can be NULL if we have no static blacklist. + */ +static struct GNUNET_CONTAINER_MultiPeerMap *blacklist; + +/** + * Notification context, to send updates on changes to active plugin + * connections. + */ +static struct GNUNET_NotificationContext *plugin_nc; + +/** + * Plugin monitoring client we are currently syncing, NULL if all + * monitoring clients are in sync. + */ +static struct TransportClient *sync_client; + +/** + * Peer identity that is all zeros, used as a way to indicate + * "all peers". Used for comparissons. + */ +static struct GNUNET_PeerIdentity all_zeros; /** * Statistics handle. @@ -62,45 +382,1041 @@ struct GNUNET_PeerIdentity GST_my_identity; struct GNUNET_PEERINFO_Handle *GST_peerinfo; /** - * Our public key. + * Our private key. */ -struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded GST_my_public_key; +struct GNUNET_CRYPTO_EddsaPrivateKey *GST_my_private_key; /** - * Our private key. + * ATS scheduling handle. + */ +struct GNUNET_ATS_SchedulingHandle *GST_ats; + +/** + * ATS connectivity handle. */ -struct GNUNET_CRYPTO_RsaPrivateKey *GST_my_private_key; +struct GNUNET_ATS_ConnectivityHandle *GST_ats_connect; /** - * ATS handle. + * Hello address expiration */ -struct GNUNET_ATS_SchedulingHandle *GST_ats; +struct GNUNET_TIME_Relative hello_expiration; + +/** + * Head of DLL of asynchronous tasks to kill sessions. + */ +static struct GNUNET_ATS_SessionKiller *sk_head; + +/** + * Tail of DLL of asynchronous tasks to kill sessions. + */ +static struct GNUNET_ATS_SessionKiller *sk_tail; + +/** + * Interface scanner determines our LAN address range(s). + */ +struct GNUNET_NT_InterfaceScanner *GST_is; + +/** + * Queue the given message for transmission to the given client + * + * @param tc target of the message + * @param msg message to transmit + * @param may_drop #GNUNET_YES if the message can be dropped + */ +static void +unicast (struct TransportClient *tc, + const struct GNUNET_MessageHeader *msg, + int may_drop) +{ + struct GNUNET_MQ_Envelope *env; + + if ((GNUNET_MQ_get_length (tc->mq) >= MAX_PENDING) && + (GNUNET_YES == may_drop)) + { + GNUNET_log ( + GNUNET_ERROR_TYPE_DEBUG, + "Dropping message of type %u and size %u, have %u/%u messages pending\n", + ntohs (msg->type), + ntohs (msg->size), + GNUNET_MQ_get_length (tc->mq), + MAX_PENDING); + GNUNET_STATISTICS_update (GST_stats, + gettext_noop ( + "# messages dropped due to slow client"), + 1, + GNUNET_NO); + return; + } + env = GNUNET_MQ_msg_copy (msg); + GNUNET_MQ_send (tc->mq, env); +} + + +/** + * Called whenever a client connects. Allocates our + * data structures associated with that client. + * + * @param cls closure, NULL + * @param client identification of the client + * @param mq message queue for the client + * @return our `struct TransportClient` + */ +static void * +client_connect_cb (void *cls, + struct GNUNET_SERVICE_Client *client, + struct GNUNET_MQ_Handle *mq) +{ + struct TransportClient *tc; + + tc = GNUNET_new (struct TransportClient); + tc->client = client; + tc->mq = mq; + GNUNET_CONTAINER_DLL_insert (clients_head, clients_tail, tc); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Client %p connected\n", tc); + return tc; +} + /** - * DEBUGGING connection counter + * Perform next action in the blacklist check. + * + * @param cls the `struct BlacklistCheck*` */ -static int connections; +static void +do_blacklist_check (void *cls); + + +/** + * Mark the peer as down so we don't call the continuation + * context in the future. + * + * @param cls a `struct TransportClient` + * @param peer a peer we are sending to + * @param value a `struct SendTransmitContinuationContext` to mark + * @return #GNUNET_OK (continue to iterate) + */ +static int +mark_match_down (void *cls, const struct GNUNET_PeerIdentity *peer, void *value) +{ + struct TransportClient *tc = cls; + struct SendTransmitContinuationContext *stcc = value; + + if (tc == stcc->tc) + { + stcc->down = GNUNET_YES; + stcc->tc = NULL; + } + return GNUNET_OK; +} + + +/** + * Called whenever a client is disconnected. Frees our + * resources associated with that client. + * + * @param cls closure, NULL + * @param client identification of the client + * @param app_ctx our `struct TransportClient` + */ +static void +client_disconnect_cb (void *cls, + struct GNUNET_SERVICE_Client *client, + void *app_ctx) +{ + struct TransportClient *tc = app_ctx; + struct GST_BlacklistCheck *bc; + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Client %p disconnected, cleaning up.\n", + tc); + GNUNET_CONTAINER_multipeermap_iterate (active_stccs, &mark_match_down, tc); + for (struct AddressToStringContext *cur = a2s_head; NULL != cur; + cur = cur->next) + { + if (cur->tc == tc) + cur->tc = NULL; + } + GNUNET_CONTAINER_DLL_remove (clients_head, clients_tail, tc); + switch (tc->type) + { + case CT_NONE: + break; + + case CT_CORE: + break; + + case CT_MONITOR: + break; + + case CT_BLACKLIST: + for (bc = bc_head; NULL != bc; bc = bc->next) + { + if (bc->bl_pos != tc) + continue; + bc->bl_pos = tc->next; + if (NULL == bc->task) + bc->task = GNUNET_SCHEDULER_add_now (&do_blacklist_check, bc); + } + break; + + case CT_CORE_NO_HANDLERS: + break; + } + GNUNET_free (tc); +} + + +/** + * Function called for each of our connected neighbours. Notify the + * client about the existing neighbour. + * + * @param cls the `struct TransportClient *` to notify + * @param peer identity of the neighbour + * @param address the address + * @param state the current state of the peer + * @param state_timeout the time out for the state + * @param bandwidth_in inbound bandwidth in NBO + * @param bandwidth_out outbound bandwidth in NBO + */ +static void +notify_client_about_neighbour (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + enum GNUNET_TRANSPORT_PeerState state, + struct GNUNET_TIME_Absolute state_timeout, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out) +{ + struct TransportClient *tc = cls; + struct ConnectInfoMessage cim; + + if (GNUNET_NO == GST_neighbours_test_connected (peer)) + return; + cim.header.size = htons (sizeof(struct ConnectInfoMessage)); + cim.header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_CONNECT); + cim.id = *peer; + cim.quota_out = bandwidth_out; + unicast (tc, &cim.header, GNUNET_NO); +} + + +/** + * Initialize a normal client. We got a start message from this + * client, add it to the list of clients for broadcasting of inbound + * messages. + * + * @param cls the client + * @param start the start message that was sent + */ +static void +handle_client_start (void *cls, const struct StartMessage *start) +{ + struct TransportClient *tc = cls; + const struct GNUNET_MessageHeader *hello; + uint32_t options; + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Client %p sent START\n", tc); + options = ntohl (start->options); + if ((0 != (1 & options)) && + (0 != memcmp (&start->self, + &GST_my_identity, + sizeof(struct GNUNET_PeerIdentity)))) + { + /* client thinks this is a different peer, reject */ + GNUNET_break (0); + GNUNET_SERVICE_client_drop (tc->client); + return; + } + if (CT_NONE != tc->type) + { + GNUNET_break (0); + GNUNET_SERVICE_client_drop (tc->client); + return; + } + if (0 != (2 & options)) + tc->type = CT_CORE; + else + tc->type = CT_CORE_NO_HANDLERS; + hello = GST_hello_get (); + if (NULL != hello) + unicast (tc, hello, GNUNET_NO); + GST_neighbours_iterate (¬ify_client_about_neighbour, tc); + GNUNET_SERVICE_client_continue (tc->client); +} + + +/** + * Client sent us a HELLO. Check the request. + * + * @param cls the client + * @param message the HELLO message + */ +static int +check_client_hello (void *cls, const struct GNUNET_MessageHeader *message) +{ + return GNUNET_OK; /* FIXME: check here? */ +} + + +/** + * Client sent us a HELLO. Process the request. + * + * @param cls the client + * @param message the HELLO message + */ +static void +handle_client_hello (void *cls, const struct GNUNET_MessageHeader *message) +{ + struct TransportClient *tc = cls; + + GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Received HELLO message\n"); + GST_validation_handle_hello (message); + GNUNET_SERVICE_client_continue (tc->client); +} + + +/** + * Function called after the transmission is done. Notify the client that it is + * OK to send the next message. + * + * @param cls closure + * @param success #GNUNET_OK on success, #GNUNET_NO on failure, #GNUNET_SYSERR if we're not connected + * @param bytes_payload bytes payload sent + * @param bytes_on_wire bytes sent on wire + */ +static void +handle_send_transmit_continuation (void *cls, + int success, + size_t bytes_payload, + size_t bytes_on_wire) +{ + struct SendTransmitContinuationContext *stcc = cls; + struct SendOkMessage send_ok_msg; + struct GNUNET_TIME_Relative delay; + const struct GNUNET_HELLO_Address *addr; + + delay = GNUNET_TIME_absolute_get_duration (stcc->send_time); + addr = GST_neighbour_get_current_address (&stcc->target); + if (delay.rel_value_us > GNUNET_CONSTANTS_LATENCY_WARN.rel_value_us) + GNUNET_log (GNUNET_ERROR_TYPE_WARNING, + "It took us %s to send %u/%u bytes to %s (%d, %s)\n", + GNUNET_STRINGS_relative_time_to_string (delay, GNUNET_YES), + (unsigned int) bytes_payload, + (unsigned int) bytes_on_wire, + GNUNET_i2s (&stcc->target), + success, + (NULL != addr) ? addr->transport_name : "%"); + else + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "It took us %s to send %u/%u bytes to %s (%d, %s)\n", + GNUNET_STRINGS_relative_time_to_string (delay, GNUNET_YES), + (unsigned int) bytes_payload, + (unsigned int) bytes_on_wire, + GNUNET_i2s (&stcc->target), + success, + (NULL != addr) ? addr->transport_name : "%"); + + if (GNUNET_NO == stcc->down) + { + /* Only send confirmation if we are still connected */ + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Sending SEND_OK for transmission request %llu\n", + stcc->uuid); + send_ok_msg.header.size = htons (sizeof(send_ok_msg)); + send_ok_msg.header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_SEND_OK); + send_ok_msg.bytes_msg = htonl (bytes_payload); + send_ok_msg.bytes_physical = htonl (bytes_on_wire); + send_ok_msg.success = htonl (success); + send_ok_msg.peer = stcc->target; + unicast (stcc->tc, &send_ok_msg.header, GNUNET_NO); + } + GNUNET_assert ( + GNUNET_OK == + GNUNET_CONTAINER_multipeermap_remove (active_stccs, &stcc->target, stcc)); + GNUNET_free (stcc); +} + + +/** + * Client asked for transmission to a peer. Process the request. + * + * @param cls the client + * @param obm the send message that was sent + */ +static int +check_client_send (void *cls, const struct OutboundMessage *obm) +{ + uint16_t size; + const struct GNUNET_MessageHeader *obmm; + + size = ntohs (obm->header.size) - sizeof(struct OutboundMessage); + if (size < sizeof(struct GNUNET_MessageHeader)) + { + GNUNET_break (0); + return GNUNET_SYSERR; + } + obmm = (const struct GNUNET_MessageHeader *) &obm[1]; + if (size != ntohs (obmm->size)) + { + GNUNET_break (0); + return GNUNET_SYSERR; + } + return GNUNET_OK; +} + + +/** + * Client asked for transmission to a peer. Process the request. + * + * @param cls the client + * @param obm the send message that was sent + */ +static void +handle_client_send (void *cls, const struct OutboundMessage *obm) +{ + static unsigned long long uuid_gen; + struct TransportClient *tc = cls; + const struct GNUNET_MessageHeader *obmm; + struct SendTransmitContinuationContext *stcc; + + obmm = (const struct GNUNET_MessageHeader *) &obm[1]; + if (GNUNET_NO == GST_neighbours_test_connected (&obm->peer)) + { + /* not connected, not allowed to send; can happen due to asynchronous operations */ + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Could not send message to peer `%s': not connected\n", + GNUNET_i2s (&obm->peer)); + GNUNET_STATISTICS_update ( + GST_stats, + gettext_noop ("# bytes payload dropped (other peer was not connected)"), + ntohs (obmm->size), + GNUNET_NO); + GNUNET_SERVICE_client_continue (tc->client); + return; + } + GNUNET_log ( + GNUNET_ERROR_TYPE_DEBUG, + "Received SEND request %llu for `%s' and first message of type %u and total size %u\n", + uuid_gen, + GNUNET_i2s (&obm->peer), + ntohs (obmm->type), + ntohs (obmm->size)); + GNUNET_SERVICE_client_continue (tc->client); + + stcc = GNUNET_new (struct SendTransmitContinuationContext); + stcc->target = obm->peer; + stcc->tc = tc; + stcc->send_time = GNUNET_TIME_absolute_get (); + stcc->uuid = uuid_gen++; + (void) GNUNET_CONTAINER_multipeermap_put ( + active_stccs, + &stcc->target, + stcc, + GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE); + GST_manipulation_send (&obm->peer, + obmm, + ntohs (obmm->size), + GNUNET_TIME_relative_ntoh (obm->timeout), + &handle_send_transmit_continuation, + stcc); +} + + +/** + * Take the given address and append it to the set of results sent back to + * the client. This function may be called serveral times for a single + * conversion. The last invocation will be with a @a address of + * NULL and a @a res of #GNUNET_OK. Thus, to indicate conversion + * errors, the callback might be called first with @a address NULL and + * @a res being #GNUNET_SYSERR. In that case, there will still be a + * subsequent call later with @a address NULL and @a res #GNUNET_OK. + * + * @param cls the `struct AddressToStringContext` + * @param buf text to transmit (contains the human-readable address, or NULL) + * @param res #GNUNET_OK if conversion was successful, #GNUNET_SYSERR on error, + * never #GNUNET_NO + */ +static void +transmit_address_to_client (void *cls, const char *buf, int res) +{ + struct AddressToStringContext *actx = cls; + struct GNUNET_MQ_Envelope *env; + struct AddressToStringResultMessage *atsm; + size_t slen; + + GNUNET_assert ((GNUNET_OK == res) || (GNUNET_SYSERR == res)); + if (NULL == actx->tc) + return; + if (NULL == buf) + { + env = GNUNET_MQ_msg (atsm, + GNUNET_MESSAGE_TYPE_TRANSPORT_ADDRESS_TO_STRING_REPLY); + if (GNUNET_OK == res) + { + /* this was the last call, transmit */ + atsm->res = htonl (GNUNET_OK); + atsm->addr_len = htonl (0); + GNUNET_MQ_send (actx->tc->mq, env); + GNUNET_CONTAINER_DLL_remove (a2s_head, a2s_tail, actx); + GNUNET_free (actx); + return; + } + if (GNUNET_SYSERR == res) + { + /* address conversion failed, but there will be more callbacks */ + atsm->res = htonl (GNUNET_SYSERR); + atsm->addr_len = htonl (0); + GNUNET_MQ_send (actx->tc->mq, env); + return; + } + } + GNUNET_assert (GNUNET_OK == res); + /* succesful conversion, append*/ + slen = strlen (buf) + 1; + env = + GNUNET_MQ_msg_extra (atsm, + slen, + GNUNET_MESSAGE_TYPE_TRANSPORT_ADDRESS_TO_STRING_REPLY); + atsm->res = htonl (GNUNET_YES); + atsm->addr_len = htonl (slen); + GNUNET_memcpy (&atsm[1], buf, slen); + GNUNET_MQ_send (actx->tc->mq, env); +} + + +/** + * Client asked to resolve an address. Check the request. + * + * @param cls the client + * @param alum the resolution request + * @return #GNUNET_OK if @a alum is well-formed + */ +static int +check_client_address_to_string (void *cls, + const struct AddressLookupMessage *alum) +{ + const char *plugin_name; + const char *address; + uint32_t address_len; + uint16_t size; + + size = ntohs (alum->header.size); + address_len = ntohs (alum->addrlen); + if (size <= sizeof(struct AddressLookupMessage) + address_len) + { + GNUNET_break (0); + return GNUNET_SYSERR; + } + address = (const char *) &alum[1]; + plugin_name = (const char *) &address[address_len]; + if ('\0' != plugin_name[size - sizeof(struct AddressLookupMessage) + - address_len - 1]) + { + GNUNET_break (0); + return GNUNET_SYSERR; + } + return GNUNET_OK; +} + + +/** + * Client asked to resolve an address. Process the request. + * + * @param cls the client + * @param alum the resolution request + */ +static void +handle_client_address_to_string (void *cls, + const struct AddressLookupMessage *alum) +{ + struct TransportClient *tc = cls; + struct GNUNET_TRANSPORT_PluginFunctions *papi; + const char *plugin_name; + const char *address; + uint32_t address_len; + struct AddressToStringContext *actx; + struct GNUNET_MQ_Envelope *env; + struct AddressToStringResultMessage *atsm; + struct GNUNET_TIME_Relative rtimeout; + int32_t numeric; + + address_len = ntohs (alum->addrlen); + address = (const char *) &alum[1]; + plugin_name = (const char *) &address[address_len]; + rtimeout = GNUNET_TIME_relative_ntoh (alum->timeout); + numeric = ntohs (alum->numeric_only); + papi = GST_plugins_printer_find (plugin_name); + if (NULL == papi) + { + GNUNET_log (GNUNET_ERROR_TYPE_WARNING, + "Failed to find plugin `%s'\n", + plugin_name); + env = GNUNET_MQ_msg (atsm, + GNUNET_MESSAGE_TYPE_TRANSPORT_ADDRESS_TO_STRING_REPLY); + atsm->res = htonl (GNUNET_SYSERR); + atsm->addr_len = htonl (0); + GNUNET_MQ_send (tc->mq, env); + env = GNUNET_MQ_msg (atsm, + GNUNET_MESSAGE_TYPE_TRANSPORT_ADDRESS_TO_STRING_REPLY); + atsm->res = htonl (GNUNET_OK); + atsm->addr_len = htonl (0); + GNUNET_MQ_send (tc->mq, env); + return; + } + actx = GNUNET_new (struct AddressToStringContext); + actx->tc = tc; + GNUNET_CONTAINER_DLL_insert (a2s_head, a2s_tail, actx); + GNUNET_SERVICE_client_disable_continue_warning (tc->client); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Pretty-printing address of %u bytes using plugin `%s'\n", + address_len, + plugin_name); + papi->address_pretty_printer (papi->cls, + plugin_name, + address, + address_len, + numeric, + rtimeout, + &transmit_address_to_client, + actx); +} + + +/** + * Compose #PeerIterateResponseMessage using the given peer and address. + * + * @param peer identity of the peer + * @param address the address, NULL on disconnect + * @return composed message + */ +static struct PeerIterateResponseMessage * +compose_address_iterate_response_message ( + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address) +{ + struct PeerIterateResponseMessage *msg; + size_t size; + size_t tlen; + size_t alen; + char *addr; + + GNUNET_assert (NULL != peer); + if (NULL != address) + { + tlen = strlen (address->transport_name) + 1; + alen = address->address_length; + } + else + { + tlen = 0; + alen = 0; + } + size = (sizeof(struct PeerIterateResponseMessage) + alen + tlen); + msg = GNUNET_malloc (size); + msg->header.size = htons (size); + msg->header.type = + htons (GNUNET_MESSAGE_TYPE_TRANSPORT_MONITOR_PEER_RESPONSE); + msg->reserved = htonl (0); + msg->peer = *peer; + msg->addrlen = htonl (alen); + msg->pluginlen = htonl (tlen); + + if (NULL != address) + { + msg->local_address_info = htonl ((uint32_t) address->local_info); + addr = (char *) &msg[1]; + GNUNET_memcpy (addr, address->address, alen); + GNUNET_memcpy (&addr[alen], address->transport_name, tlen); + } + return msg; +} + + +/** + * Context for #send_validation_information() and + * #send_peer_information(). + */ +struct IterationContext +{ + /** + * Context to use for the transmission. + */ + struct TransportClient *tc; + + /** + * Which peers do we care about? + */ + struct GNUNET_PeerIdentity id; + + /** + * #GNUNET_YES if @e id should be ignored because we want all peers. + */ + int all; +}; + + +/** + * Output information of neighbours to the given client. + * + * @param cls the `struct PeerIterationContext *` + * @param peer identity of the neighbour + * @param address the address + * @param state current state this peer is in + * @param state_timeout timeout for the current state of the peer + * @param bandwidth_in inbound quota in NBO + * @param bandwidth_out outbound quota in NBO + */ +static void +send_peer_information (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + enum GNUNET_TRANSPORT_PeerState state, + struct GNUNET_TIME_Absolute state_timeout, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out) +{ + struct IterationContext *pc = cls; + struct GNUNET_MQ_Envelope *env; + struct PeerIterateResponseMessage *msg; + + if ((GNUNET_YES != pc->all) && (0 != memcmp (peer, &pc->id, sizeof(pc->id)))) + return; + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Sending information about `%s' using address `%s' in state `%s'\n", + GNUNET_i2s (peer), + (NULL != address) ? GST_plugins_a2s (address) : "", + GNUNET_TRANSPORT_ps2s (state)); + msg = compose_address_iterate_response_message (peer, address); + msg->state = htonl (state); + msg->state_timeout = GNUNET_TIME_absolute_hton (state_timeout); + env = GNUNET_MQ_msg_copy (&msg->header); + GNUNET_free (msg); + GNUNET_MQ_send (pc->tc->mq, env); +} + + +/** + * Client asked to obtain information about a specific or all peers + * Process the request. + * + * @param cls the client + * @param msg the peer address information request + */ +static void +handle_client_monitor_peers (void *cls, const struct PeerMonitorMessage *msg) +{ + struct TransportClient *tc = cls; + struct IterationContext pc; + + if (CT_NONE != tc->type) + { + GNUNET_break (0); + GNUNET_SERVICE_client_drop (tc->client); + return; + } + GNUNET_SERVICE_client_disable_continue_warning (tc->client); + GNUNET_SERVICE_client_mark_monitor (tc->client); + + /* Send initial list */ + pc.tc = tc; + if (0 == memcmp (&msg->peer, &all_zeros, sizeof(struct GNUNET_PeerIdentity))) + { + /* iterate over all neighbours */ + pc.all = GNUNET_YES; + pc.id = msg->peer; + } + else + { + /* just return one neighbour */ + pc.all = GNUNET_NO; + pc.id = msg->peer; + } + GST_neighbours_iterate (&send_peer_information, &pc); + + if (GNUNET_YES != ntohl (msg->one_shot)) + { + tc->details.monitor_peer = msg->peer; + tc->type = CT_MONITOR; + if (0 != + memcmp (&msg->peer, &all_zeros, sizeof(struct GNUNET_PeerIdentity))) + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Client %p started monitoring of the peer `%s'\n", + tc, + GNUNET_i2s (&msg->peer)); + else + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Client %p started monitoring all peers\n", + tc); + } + else + { + struct GNUNET_MessageHeader *msg; + struct GNUNET_MQ_Envelope *env; + + env = + GNUNET_MQ_msg (msg, + GNUNET_MESSAGE_TYPE_TRANSPORT_MONITOR_PEER_RESPONSE_END); + GNUNET_MQ_send (tc->mq, env); + } +} + + +/** + * Function called by the plugin with information about the + * current sessions managed by the plugin (for monitoring). + * + * @param cls closure + * @param session session handle this information is about, + * NULL to indicate that we are "in sync" (initial + * iteration complete) + * @param info information about the state of the session, + * NULL if @a session is also NULL and we are + * merely signalling that the initial iteration is over + */ +static void +plugin_session_info_cb (void *cls, + struct GNUNET_ATS_Session *session, + const struct GNUNET_TRANSPORT_SessionInfo *info) +{ + struct GNUNET_MQ_Envelope *env; + struct TransportPluginMonitorMessage *msg; + struct GNUNET_MessageHeader *sync; + size_t size; + size_t slen; + uint16_t alen; + char *name; + char *addr; + + if (0 == GNUNET_notification_context_get_size (plugin_nc)) + { + GST_plugins_monitor_subscribe (NULL, NULL); + return; + } + if ((NULL == info) && (NULL == session)) + { + /* end of initial iteration */ + if (NULL != sync_client) + { + env = + GNUNET_MQ_msg (sync, GNUNET_MESSAGE_TYPE_TRANSPORT_MONITOR_PLUGIN_SYNC); + GNUNET_MQ_send (sync_client->mq, env); + sync_client = NULL; + } + return; + } + GNUNET_assert (NULL != info); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Plugin event for peer %s on transport %s\n", + GNUNET_i2s (&info->address->peer), + info->address->transport_name); + slen = strlen (info->address->transport_name) + 1; + alen = info->address->address_length; + size = sizeof(struct TransportPluginMonitorMessage) + slen + alen; + if (size > UINT16_MAX) + { + GNUNET_break (0); + return; + } + msg = GNUNET_malloc (size); + msg->header.size = htons (size); + msg->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_MONITOR_PLUGIN_EVENT); + msg->session_state = htons ((uint16_t) info->state); + msg->is_inbound = htons ((int16_t) info->is_inbound); + msg->msgs_pending = htonl (info->num_msg_pending); + msg->bytes_pending = htonl (info->num_bytes_pending); + msg->timeout = GNUNET_TIME_absolute_hton (info->session_timeout); + msg->delay = GNUNET_TIME_absolute_hton (info->receive_delay); + msg->peer = info->address->peer; + msg->session_id = (uint64_t) (intptr_t) session; + msg->plugin_name_len = htons (slen); + msg->plugin_address_len = htons (alen); + name = (char *) &msg[1]; + GNUNET_memcpy (name, info->address->transport_name, slen); + addr = &name[slen]; + GNUNET_memcpy (addr, info->address->address, alen); + if (NULL != sync_client) + { + struct GNUNET_MQ_Envelope *env; + + env = GNUNET_MQ_msg_copy (&msg->header); + GNUNET_MQ_send (sync_client->mq, env); + } + else + { + GNUNET_notification_context_broadcast (plugin_nc, &msg->header, GNUNET_NO); + } + GNUNET_free (msg); +} + + +/** + * Client asked to obtain information about all plugin connections. + * + * @param cls the client + * @param message the peer address information request + */ +static void +handle_client_monitor_plugins (void *cls, + const struct GNUNET_MessageHeader *message) +{ + struct TransportClient *tc = cls; + + GNUNET_SERVICE_client_mark_monitor (tc->client); + GNUNET_SERVICE_client_disable_continue_warning (tc->client); + GNUNET_notification_context_add (plugin_nc, tc->mq); + GNUNET_assert (NULL == sync_client); + sync_client = tc; + GST_plugins_monitor_subscribe (&plugin_session_info_cb, NULL); +} + + +/** + * Broadcast the given message to all of our clients. + * + * @param msg message to broadcast + * @param may_drop #GNUNET_YES if the message can be dropped / is payload + */ +void +GST_clients_broadcast (const struct GNUNET_MessageHeader *msg, int may_drop) +{ + int done; + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Asked to broadcast message of type %u with %u bytes\n", + (unsigned int) ntohs (msg->type), + (unsigned int) ntohs (msg->size)); + done = GNUNET_NO; + for (struct TransportClient *tc = clients_head; NULL != tc; tc = tc->next) + { + if (CT_NONE == tc->type) + continue; /* client not yet ready */ + if ((GNUNET_YES == may_drop) && (CT_CORE != tc->type)) + continue; /* skip, this client does not care about payload */ + unicast (tc, msg, may_drop); + done = GNUNET_YES; + } + if (GNUNET_NO == done) + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Message of type %u not delivered, is CORE service up?\n", + ntohs (msg->type)); +} + + +/** + * Broadcast the new active address to all clients monitoring the peer. + * + * @param peer peer this update is about (never NULL) + * @param address address, NULL on disconnect + * @param state the current state of the peer + * @param state_timeout the time out for the state + */ +void +GST_clients_broadcast_peer_notification ( + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + enum GNUNET_TRANSPORT_PeerState state, + struct GNUNET_TIME_Absolute state_timeout) +{ + struct GNUNET_MQ_Envelope *env; + struct PeerIterateResponseMessage *msg; + + msg = compose_address_iterate_response_message (peer, address); + msg->state = htonl (state); + msg->state_timeout = GNUNET_TIME_absolute_hton (state_timeout); + for (struct TransportClient *tc = clients_head; NULL != tc; tc = tc->next) + { + if (CT_MONITOR != tc->type) + continue; + if ((0 == memcmp (&tc->details.monitor_peer, + &all_zeros, + sizeof(struct GNUNET_PeerIdentity))) || + (0 == memcmp (&tc->details.monitor_peer, + peer, + sizeof(struct GNUNET_PeerIdentity)))) + { + env = GNUNET_MQ_msg_copy (&msg->header); + GNUNET_MQ_send (tc->mq, env); + } + } + GNUNET_free (msg); +} + + +/** + * Mark the peer as down so we don't call the continuation + * context in the future. + * + * @param cls NULL + * @param peer peer that got disconnected + * @param value a `struct SendTransmitContinuationContext` to mark + * @return #GNUNET_OK (continue to iterate) + */ +static int +mark_peer_down (void *cls, const struct GNUNET_PeerIdentity *peer, void *value) +{ + struct SendTransmitContinuationContext *stcc = value; + + stcc->down = GNUNET_YES; + return GNUNET_OK; +} + + +/** + * Notify all clients about a disconnect, and cancel + * pending SEND_OK messages for this peer. + * + * @param peer peer that disconnected + */ +void +GST_clients_broadcast_disconnect (const struct GNUNET_PeerIdentity *peer) +{ + struct DisconnectInfoMessage disconnect_msg; + + GNUNET_CONTAINER_multipeermap_get_multiple (active_stccs, + peer, + &mark_peer_down, + NULL); + disconnect_msg.header.size = htons (sizeof(struct DisconnectInfoMessage)); + disconnect_msg.header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_DISCONNECT); + disconnect_msg.reserved = htonl (0); + disconnect_msg.peer = *peer; + GST_clients_broadcast (&disconnect_msg.header, GNUNET_NO); +} /** * Transmit our HELLO message to the given (connected) neighbour. * * @param cls the 'HELLO' message - * @param target a connected neighbour - * @param ats performance information (unused) - * @param ats_count number of records in ats (unused) + * @param peer identity of the peer * @param address the address + * @param state current state this peer is in + * @param state_timeout timeout for the current state of the peer + * @param bandwidth_in inbound quota in NBO + * @param bandwidth_out outbound quota in NBO */ static void -transmit_our_hello (void *cls, const struct GNUNET_PeerIdentity *target, - const struct GNUNET_ATS_Information *ats, - uint32_t ats_count, - const struct GNUNET_HELLO_Address *address) +transmit_our_hello (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + enum GNUNET_TRANSPORT_PeerState state, + struct GNUNET_TIME_Absolute state_timeout, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out) { const struct GNUNET_MessageHeader *hello = cls; - GST_neighbours_send (target, (const char *) hello, ntohs (hello->size), - GNUNET_CONSTANTS_HELLO_ADDRESS_EXPIRATION, NULL, NULL); + if (0 == memcmp (peer, &GST_my_identity, sizeof(struct GNUNET_PeerIdentity))) + return; /* not to ourselves */ + if (GNUNET_NO == GST_neighbours_test_connected (peer)) + return; + + GST_neighbours_send (peer, + hello, + ntohs (hello->size), + hello_expiration, + NULL, + NULL); } @@ -113,188 +1429,294 @@ transmit_our_hello (void *cls, const struct GNUNET_PeerIdentity *target, static void process_hello_update (void *cls, const struct GNUNET_MessageHeader *hello) { + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Broadcasting HELLO to clients\n"); GST_clients_broadcast (hello, GNUNET_NO); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Broadcasting HELLO to neighbours\n"); GST_neighbours_iterate (&transmit_our_hello, (void *) hello); } - /** * We received some payload. Prepare to pass it on to our clients. * - * @param peer (claimed) identity of the other peer - * @param address the address - * @param session session used + * @param address address and (claimed) identity of the other peer + * @param session identifier used for this session (NULL for plugins + * that do not offer bi-directional communication to the sender + * using the same "connection") * @param message the message to process - * @param ats performance information - * @param ats_count number of records in ats * @return how long the plugin should wait until receiving more data */ static struct GNUNET_TIME_Relative -process_payload (const struct GNUNET_PeerIdentity *peer, - const struct GNUNET_HELLO_Address *address, - struct Session *session, - const struct GNUNET_MessageHeader *message, - const struct GNUNET_ATS_Information *ats, uint32_t ats_count) +process_payload (const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session, + const struct GNUNET_MessageHeader *message) { struct GNUNET_TIME_Relative ret; int do_forward; struct InboundMessage *im; size_t msg_size = ntohs (message->size); - size_t size = - sizeof (struct InboundMessage) + msg_size + - sizeof (struct GNUNET_ATS_Information) * (ats_count + 1); - char buf[size]; - struct GNUNET_ATS_Information *ap; + size_t size = sizeof(struct InboundMessage) + msg_size; + char buf[size] GNUNET_ALIGN; - ret = GNUNET_TIME_UNIT_ZERO; do_forward = GNUNET_SYSERR; - ret = GST_neighbours_calculate_receive_delay (peer, msg_size, &do_forward); - - if (!GST_neighbours_test_connected (peer)) + ret = GST_neighbours_calculate_receive_delay (&address->peer, + msg_size, + &do_forward); + if (! GST_neighbours_test_connected (&address->peer)) { - GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, - "Discarded %u bytes type %u payload from peer `%s'\n", msg_size, - ntohs (message->type), GNUNET_i2s (peer)); - - GNUNET_STATISTICS_update (GST_stats, - gettext_noop - ("# bytes payload discarded due to not connected peer "), - msg_size, GNUNET_NO); + "Discarded %u bytes type %u payload from peer `%s'\n", + (unsigned int) msg_size, + ntohs (message->type), + GNUNET_i2s (&address->peer)); + GNUNET_STATISTICS_update ( + GST_stats, + gettext_noop ("# bytes payload discarded due to not connected peer"), + msg_size, + GNUNET_NO); return ret; } - if (do_forward != GNUNET_YES) + if (GNUNET_YES != do_forward) return ret; im = (struct InboundMessage *) buf; im->header.size = htons (size); im->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_RECV); - im->ats_count = htonl (ats_count + 1); - im->peer = *peer; - ap = (struct GNUNET_ATS_Information *) &im[1]; - memcpy (ap, ats, ats_count * sizeof (struct GNUNET_ATS_Information)); - ap[ats_count].type = htonl (GNUNET_ATS_QUALITY_NET_DELAY); - ap[ats_count].value = - htonl ((uint32_t) GST_neighbour_get_latency (peer).rel_value); - memcpy (&ap[ats_count + 1], message, ntohs (message->size)); - - GNUNET_ATS_address_update (GST_ats, address, session, ap, ats_count + 1); + im->peer = address->peer; + GNUNET_memcpy (&im[1], message, ntohs (message->size)); GST_clients_broadcast (&im->header, GNUNET_YES); - return ret; } +/** + * Task to asynchronously terminate a session. + * + * @param cls the `struct GNUNET_ATS_SessionKiller` with the information for the kill + */ +static void +kill_session_task (void *cls) +{ + struct GNUNET_ATS_SessionKiller *sk = cls; + + sk->task = NULL; + GNUNET_CONTAINER_DLL_remove (sk_head, sk_tail, sk); + sk->plugin->disconnect_session (sk->plugin->cls, sk->session); + GNUNET_free (sk); +} + + +/** + * Force plugin to terminate session due to communication + * issue. + * + * @param plugin_name name of the plugin + * @param session session to termiante + */ +static void +kill_session (const char *plugin_name, struct GNUNET_ATS_Session *session) +{ + struct GNUNET_TRANSPORT_PluginFunctions *plugin; + struct GNUNET_ATS_SessionKiller *sk; + + for (sk = sk_head; NULL != sk; sk = sk->next) + if (sk->session == session) + return; + plugin = GST_plugins_find (plugin_name); + if (NULL == plugin) + { + GNUNET_break (0); + return; + } + /* need to issue disconnect asynchronously */ + sk = GNUNET_new (struct GNUNET_ATS_SessionKiller); + sk->session = session; + sk->plugin = plugin; + sk->task = GNUNET_SCHEDULER_add_now (&kill_session_task, sk); + GNUNET_CONTAINER_DLL_insert (sk_head, sk_tail, sk); +} + + +/** + * Black list check result for try_connect call + * If connection to the peer is allowed request adddress and ??? + * + * @param cls the message + * @param peer the peer + * @param address the address + * @param session the session + * @param result the result + */ +static void +connect_bl_check_cont (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session, + int result) +{ + struct GNUNET_MessageHeader *msg = cls; + + if (GNUNET_OK == result) + { + /* Blacklist allows to speak to this peer, forward SYN to neighbours */ + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + "Received SYN message from peer `%s' at `%s'\n", + GNUNET_i2s (peer), + GST_plugins_a2s (address)); + if (GNUNET_OK != GST_neighbours_handle_session_syn (msg, peer)) + { + GST_blacklist_abort_matching (address, session); + kill_session (address->transport_name, session); + } + GNUNET_free (msg); + return; + } + GNUNET_free (msg); + if (GNUNET_SYSERR == result) + return; /* check was aborted, session destroyed */ + /* Blacklist denies to speak to this peer */ + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + "Discarding SYN message from `%s' due to denied blacklist check\n", + GNUNET_i2s (peer)); + kill_session (address->transport_name, session); +} + + /** * Function called by the transport for each received message. - * This function should also be called with "NULL" for the - * message to signal that the other peer disconnected. * * @param cls closure, const char* with the name of the plugin we received the message from - * @param peer (claimed) identity of the other peer + * @param address address and (claimed) identity of the other peer * @param message the message, NULL if we only care about - * learning about the delay until we should receive again -- FIXME! - * @param ats performance information - * @param ats_count number of records in ats + * learning about the delay until we should receive again * @param session identifier used for this session (NULL for plugins * that do not offer bi-directional communication to the sender * using the same "connection") - * @param sender_address binary address of the sender (if we established the - * connection or are otherwise sure of it; should be NULL - * for inbound TCP/UDP connections since it it not clear - * that we could establish ourselves a connection to that - * IP address and get the same system) - * @param sender_address_len number of bytes in sender_address * @return how long the plugin should wait until receiving more data * (plugins that do not support this, can ignore the return value) */ -static struct GNUNET_TIME_Relative -plugin_env_receive_callback (void *cls, const struct GNUNET_PeerIdentity *peer, - const struct GNUNET_MessageHeader *message, - const struct GNUNET_ATS_Information *ats, - uint32_t ats_count, struct Session *session, - const char *sender_address, - uint16_t sender_address_len) +struct GNUNET_TIME_Relative +GST_receive_callback (void *cls, + const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session, + const struct GNUNET_MessageHeader *message) { const char *plugin_name = cls; struct GNUNET_TIME_Relative ret; - struct GNUNET_HELLO_Address address; uint16_t type; - address.peer = *peer; - address.address = sender_address; - address.address_length = sender_address_len; - address.transport_name = plugin_name; ret = GNUNET_TIME_UNIT_ZERO; if (NULL == message) goto end; type = ntohs (message->type); -#if DEBUG_TRANSPORT - - GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received Message with type %u\n", type); -#endif - + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Received message with type %u from peer `%s' at %s\n", + type, + GNUNET_i2s (&address->peer), + GST_plugins_a2s (address)); + + GNUNET_STATISTICS_update (GST_stats, + gettext_noop ("# bytes total received"), + ntohs (message->size), + GNUNET_NO); + GST_neighbours_notify_data_recv (address, message); switch (type) { + case GNUNET_MESSAGE_TYPE_HELLO_LEGACY: + /* Legacy HELLO message, discard */ + return ret; + case GNUNET_MESSAGE_TYPE_HELLO: - GST_validation_handle_hello (message); + if (GNUNET_OK != GST_validation_handle_hello (message)) + { + GNUNET_break_op (0); + GST_blacklist_abort_matching (address, session); + } return ret; + case GNUNET_MESSAGE_TYPE_TRANSPORT_PING: -#if DEBUG_TRANSPORT - GNUNET_log (GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK, - "Processing `%s' from `%s'\n", "PING", - (sender_address != - NULL) ? GST_plugins_a2s (&address) : ""); -#endif - GST_validation_handle_ping (peer, message, &address, session); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Processing PING from `%s'\n", + GST_plugins_a2s (address)); + if (GNUNET_OK != + GST_validation_handle_ping (&address->peer, message, address, session)) + { + GST_blacklist_abort_matching (address, session); + kill_session (plugin_name, session); + } break; + case GNUNET_MESSAGE_TYPE_TRANSPORT_PONG: -#if DEBUG_TRANSPORT - GNUNET_log (GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK, - "Processing `%s' from `%s'\n", "PONG", - (sender_address != - NULL) ? GST_plugins_a2s (&address) : ""); -#endif - GST_validation_handle_pong (peer, message); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Processing PONG from `%s'\n", + GST_plugins_a2s (address)); + if (GNUNET_OK != GST_validation_handle_pong (&address->peer, message)) + { + GNUNET_break_op (0); + GST_blacklist_abort_matching (address, session); + kill_session (plugin_name, session); + } break; - case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_CONNECT: - GST_neighbours_handle_connect (message, peer, &address, session, ats, - ats_count); + + case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_SYN: + /* Do blacklist check if communication with this peer is allowed */ + (void) GST_blacklist_test_allowed (&address->peer, + NULL, + &connect_bl_check_cont, + GNUNET_copy_message (message), + address, + session); break; - case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_CONNECT_ACK: - GST_neighbours_handle_connect_ack (message, peer, &address, session, ats, - ats_count); + + case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_SYN_ACK: + if (GNUNET_OK != + GST_neighbours_handle_session_syn_ack (message, address, session)) + { + GST_blacklist_abort_matching (address, session); + kill_session (plugin_name, session); + } break; + case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_ACK: - GST_neighbours_handle_ack (message, peer, &address, session, ats, - ats_count); + if (GNUNET_OK != + GST_neighbours_handle_session_ack (message, address, session)) + { + GNUNET_break_op (0); + GST_blacklist_abort_matching (address, session); + kill_session (plugin_name, session); + } break; + case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_DISCONNECT: - GST_neighbours_handle_disconnect_message (peer, message); + GST_neighbours_handle_disconnect_message (&address->peer, message); + break; + + case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_QUOTA: + GST_neighbours_handle_quota_message (&address->peer, message); break; + case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_KEEPALIVE: - GST_neighbours_keepalive (peer); + GST_neighbours_keepalive (&address->peer, message); break; + case GNUNET_MESSAGE_TYPE_TRANSPORT_SESSION_KEEPALIVE_RESPONSE: - GST_neighbours_keepalive_response (peer, ats, ats_count); + GST_neighbours_keepalive_response (&address->peer, message); break; + default: /* should be payload */ - ret = process_payload (peer, &address, session, message, ats, ats_count); + GNUNET_STATISTICS_update (GST_stats, + gettext_noop ("# bytes payload received"), + ntohs (message->size), + GNUNET_NO); + ret = process_payload (address, session, message); break; } end: -#if 1 - /* FIXME: this should not be needed, and not sure it's good to have it, but without - * this connections seem to go extra-slow */ - GNUNET_ATS_address_update (GST_ats, &address, session, ats, ats_count); -#endif -#if DEBUG_TRANSPORT GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, - "Allowing receive from peer %s to continue in %llu ms\n", - GNUNET_i2s (peer), (unsigned long long) ret.rel_value); -#endif + "Allowing receive from peer %s to continue in %s\n", + GNUNET_i2s (&address->peer), + GNUNET_STRINGS_relative_time_to_string (ret, GNUNET_YES)); return ret; } @@ -306,22 +1728,40 @@ end: * @param cls name of the plugin (const char*) * @param add_remove should the address added (YES) or removed (NO) from the * set of valid addresses? - * @param addr one of the addresses of the host - * the specific address format depends on the transport - * @param addrlen length of the address + * @param address the address to add or remove */ static void -plugin_env_address_change_notification (void *cls, int add_remove, - const void *addr, size_t addrlen) +plugin_env_address_change_notification ( + void *cls, + int add_remove, + const struct GNUNET_HELLO_Address *address) { - const char *plugin_name = cls; - struct GNUNET_HELLO_Address address; + static int addresses = 0; - address.peer = GST_my_identity; - address.transport_name = plugin_name; - address.address = addr; - address.address_length = addrlen; - GST_hello_modify_addresses (add_remove, &address); + if (GNUNET_YES == add_remove) + { + addresses++; + GNUNET_STATISTICS_update (GST_stats, "# transport addresses", 1, GNUNET_NO); + } + else if (GNUNET_NO == add_remove) + { + if (0 == addresses) + { + GNUNET_break (0); + } + else + { + addresses--; + GNUNET_STATISTICS_update (GST_stats, + "# transport addresses", + -1, + GNUNET_NO); + } + } + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + "Transport now has %u addresses to communicate\n", + addresses); + GST_hello_modify_addresses (add_remove, address); } @@ -335,68 +1775,140 @@ plugin_env_address_change_notification (void *cls, int add_remove, * from the "TransmitFunction". * * @param cls closure - * @param peer which peer was the session for + * @param address which address was the session for * @param session which session is being destoyed */ static void -plugin_env_session_end (void *cls, const struct GNUNET_PeerIdentity *peer, - struct Session *session) +plugin_env_session_end (void *cls, + const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session) { - const char *transport_name = cls; - struct GNUNET_HELLO_Address address; + struct GNUNET_ATS_SessionKiller *sk; - GNUNET_assert (strlen (transport_name) > 0); -#if DEBUG_TRANSPORT - GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Session %X to peer `%s' ended \n", - session, GNUNET_i2s (peer)); -#endif - if (NULL != session) - GNUNET_log_from (GNUNET_ERROR_TYPE_DEBUG | GNUNET_ERROR_TYPE_BULK, - "transport-ats", - "Telling ATS to destroy session %p from peer %s\n", - session, GNUNET_i2s (peer)); - address.peer = *peer; - address.address = NULL; - address.address_length = 0; - address.transport_name = transport_name; - GST_neighbours_session_terminated (peer, session); - GNUNET_ATS_address_destroyed (GST_ats, &address, session); + if (NULL == address) + { + GNUNET_break (0); + return; + } + if (NULL == session) + { + GNUNET_break (0); + return; + } + GNUNET_assert (strlen (address->transport_name) > 0); + + GNUNET_log ( + GNUNET_ERROR_TYPE_DEBUG, + "Notification from plugin about terminated session %p from peer `%s' address `%s'\n", + session, + GNUNET_i2s (&address->peer), + GST_plugins_a2s (address)); + + GST_neighbours_session_terminated (&address->peer, session); + GST_ats_del_session (address, session); + GST_blacklist_abort_matching (address, session); + + for (sk = sk_head; NULL != sk; sk = sk->next) + { + if (sk->session == session) + { + GNUNET_CONTAINER_DLL_remove (sk_head, sk_tail, sk); + GNUNET_SCHEDULER_cancel (sk->task); + GNUNET_free (sk); + break; + } + } } /** - * Function that will be called to figure if an address is an loopback, - * LAN, WAN etc. address + * Black list check result from blacklist check triggered when a + * plugin gave us a new session in #plugin_env_session_start(). If + * connection to the peer is disallowed, kill the session. * - * @param cls closure - * @param addr binary address - * @param addrlen length of the address - * @return ATS Information containing the network type + * @param cls NULL + * @param peer the peer + * @param address address associated with the request + * @param session session associated with the request + * @param result the result + */ +static void +plugin_env_session_start_bl_check_cont ( + void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session, + int result) +{ + if (GNUNET_OK != result) + { + kill_session (address->transport_name, session); + return; + } + if (GNUNET_YES != + GNUNET_HELLO_address_check_option (address, + GNUNET_HELLO_ADDRESS_INFO_INBOUND)) + { + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Informing verifier about inbound session's address `%s'\n", + GST_plugins_a2s (address)); + GST_validation_handle_address (address); + } +} + + +/** + * Plugin tells transport service about a new inbound session + * + * @param cls unused + * @param address the address + * @param session the new session + * @param scope network scope information */ -static const struct GNUNET_ATS_Information -plugin_env_address_to_type (void *cls, - const struct sockaddr *addr, - size_t addrlen) +static void +plugin_env_session_start (void *cls, + const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session, + enum GNUNET_NetworkType scope) { - struct GNUNET_ATS_Information ats; - ats.type = htonl (GNUNET_ATS_NETWORK_TYPE); - ats.value = htonl (GNUNET_ATS_NET_UNSPECIFIED); - if (GST_ats == NULL) + struct GNUNET_ATS_Properties prop; + + if (NULL == address) { GNUNET_break (0); - return ats; + return; } - if (((addr->sa_family != AF_INET) && (addrlen != sizeof (struct sockaddr_in))) && - ((addr->sa_family != AF_INET6) && (addrlen != sizeof (struct sockaddr_in6))) && - (addr->sa_family != AF_UNIX)) + if (NULL == session) { - GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Malformed address with length %u `%s'\n", - addrlen, - GNUNET_a2s(addr, addrlen)); GNUNET_break (0); - return (const struct GNUNET_ATS_Information) ats; + return; + } + GNUNET_log ( + GNUNET_ERROR_TYPE_INFO, + "Notification from plugin `%s' about new session from peer `%s' address `%s'\n", + address->transport_name, + GNUNET_i2s (&address->peer), + GST_plugins_a2s (address)); + if (GNUNET_YES == + GNUNET_HELLO_address_check_option (address, + GNUNET_HELLO_ADDRESS_INFO_INBOUND)) + { + /* inbound is always new, but outbound MAY already be known, but + for example for UNIX, we have symmetric connections and thus we + may not know the address yet; add if necessary! */ + /* FIXME: maybe change API here so we just pass scope? */ + memset (&prop, 0, sizeof(prop)); + GNUNET_break (GNUNET_NT_UNSPECIFIED != scope); + prop.scope = scope; + GST_ats_add_inbound_address (address, session, &prop); } - return GNUNET_ATS_address_get_type(GST_ats, addr, addrlen); + /* Do blacklist check if communication with this peer is allowed */ + (void) GST_blacklist_test_allowed (&address->peer, + address->transport_name, + &plugin_env_session_start_bl_check_cont, + NULL, + address, + session); } @@ -408,120 +1920,209 @@ plugin_env_address_to_type (void *cls, * actually happened. * * @param cls closure + * @param peer the peer this address is intended for * @param address address to use (for peer given in address) * @param session session to use (if available) - * @param bandwidth_out assigned outbound bandwidth for the connection, 0 to disconnect from peer - * @param bandwidth_in assigned inbound bandwidth for the connection, 0 to disconnect from peer + * @param bandwidth_out assigned outbound bandwidth for the connection in NBO, + * 0 to disconnect from peer + * @param bandwidth_in assigned inbound bandwidth for the connection in NBO, + * 0 to disconnect from peer * @param ats ATS information - * @param ats_count number of ATS elements + * @param ats_count number of @a ats elements */ static void ats_request_address_change (void *cls, + const struct GNUNET_PeerIdentity *peer, const struct GNUNET_HELLO_Address *address, - struct Session *session, + struct GNUNET_ATS_Session *session, struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out, - struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in, - const struct GNUNET_ATS_Information *ats, - uint32_t ats_count) + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in) { uint32_t bw_in = ntohl (bandwidth_in.value__); uint32_t bw_out = ntohl (bandwidth_out.value__); + if (NULL == peer) + { + /* ATS service died, all suggestions become invalid! + (but we'll keep using the allocations for a little + while, to keep going while ATS restarts) */ + /* FIXME: We should drop all + connections now, as ATS won't explicitly tell + us and be unaware of ongoing resource allocations! */ + return; + } /* ATS tells me to disconnect from peer */ - if ((bw_in == 0) && (bw_out == 0)) + if ((0 == bw_in) && (0 == bw_out)) { -#if DEBUG_TRANSPORT - GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + GNUNET_log (GNUNET_ERROR_TYPE_INFO, "ATS tells me to disconnect from peer `%s'\n", - GNUNET_i2s (&address->peer)); -#endif - GST_neighbours_force_disconnect (&address->peer); + GNUNET_i2s (peer)); + GST_neighbours_force_disconnect (peer); return; } - /* will never return GNUNET_YES since connection is to be established */ - GST_neighbours_switch_to_address (&address->peer, address, session, ats, - ats_count, bandwidth_in, - bandwidth_out); + GNUNET_assert (NULL != address); + GNUNET_STATISTICS_update (GST_stats, + "# ATS suggestions received", + 1, + GNUNET_NO); + GST_neighbours_switch_to_address (address, + session, + bandwidth_in, + bandwidth_out); } /** - * Function called to notify transport users that another - * peer connected to us. + * Closure for #test_connection_ok(). + */ +struct TestConnectionContext +{ + /** + * Is this the first neighbour we're checking? + */ + int first; + + /** + * Handle to the blacklisting client we need to ask. + */ + struct TransportClient *tc; +}; + + +/** + * Got the result about an existing connection from a new blacklister. + * Shutdown the neighbour if necessary. * - * @param cls closure - * @param peer the peer that connected - * @param ats performance data - * @param ats_count number of entries in ats + * @param cls unused + * @param peer the neighbour that was investigated + * @param address address associated with the request + * @param session session associated with the request + * @param allowed #GNUNET_OK if we can keep it, + * #GNUNET_NO if we must shutdown the connection */ static void -neighbours_connect_notification (void *cls, - const struct GNUNET_PeerIdentity *peer, - const struct GNUNET_ATS_Information *ats, - uint32_t ats_count) +confirm_or_drop_neighbour (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session, + int allowed) { - size_t len = - sizeof (struct ConnectInfoMessage) + - ats_count * sizeof (struct GNUNET_ATS_Information); - char buf[len]; - struct ConnectInfoMessage *connect_msg = (struct ConnectInfoMessage *) buf; - struct GNUNET_ATS_Information *ap; + if (GNUNET_OK == allowed) + return; /* we're done */ + GNUNET_STATISTICS_update (GST_stats, + gettext_noop ("# disconnects due to blacklist"), + 1, + GNUNET_NO); + GST_neighbours_force_disconnect (peer); +} - connections++; - GNUNET_log (GNUNET_ERROR_TYPE_INFO, - "We are now connected to peer `%s' and %u peers in total\n", - GNUNET_i2s (peer), connections); - connect_msg->header.size = htons (sizeof (buf)); - connect_msg->header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_CONNECT); - connect_msg->ats_count = htonl (ats_count); - connect_msg->id = *peer; - ap = (struct GNUNET_ATS_Information *) &connect_msg[1]; - memcpy (ap, ats, ats_count * sizeof (struct GNUNET_ATS_Information)); - GST_clients_broadcast (&connect_msg->header, GNUNET_NO); +/** + * Test if an existing connection is still acceptable given a new + * blacklisting client. + * + * @param cls the `struct TestConnectionContext *` + * @param peer identity of the peer + * @param address the address + * @param state current state this peer is in + * @param state_timeout timeout for the current state of the peer + * @param bandwidth_in bandwidth assigned inbound + * @param bandwidth_out bandwidth assigned outbound + */ +static void +test_connection_ok (void *cls, + const struct GNUNET_PeerIdentity *peer, + const struct GNUNET_HELLO_Address *address, + enum GNUNET_TRANSPORT_PeerState state, + struct GNUNET_TIME_Absolute state_timeout, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_in, + struct GNUNET_BANDWIDTH_Value32NBO bandwidth_out) +{ + struct TestConnectionContext *tcc = cls; + struct GST_BlacklistCheck *bc; + + bc = GNUNET_new (struct GST_BlacklistCheck); + GNUNET_CONTAINER_DLL_insert (bc_head, bc_tail, bc); + bc->peer = *peer; + bc->address = GNUNET_HELLO_address_copy (address); + bc->cont = &confirm_or_drop_neighbour; + bc->cont_cls = NULL; + bc->bl_pos = tcc->tc; + if (GNUNET_YES == tcc->first) + { + /* all would wait for the same client, no need to + * create more than just the first task right now */ + bc->task = GNUNET_SCHEDULER_add_now (&do_blacklist_check, bc); + tcc->first = GNUNET_NO; + } } /** - * Function called to notify transport users that another - * peer disconnected from us. + * Initialize a blacklisting client. We got a blacklist-init + * message from this client, add it to the list of clients + * to query for blacklisting. * - * @param cls closure - * @param peer the peer that disconnected + * @param cls the client + * @param message the blacklist-init message that was sent */ static void -neighbours_disconnect_notification (void *cls, - const struct GNUNET_PeerIdentity *peer) +handle_client_blacklist_init (void *cls, + const struct GNUNET_MessageHeader *message) { - struct DisconnectInfoMessage disconnect_msg; + struct TransportClient *tc = cls; + struct TestConnectionContext tcc; - connections--; - GNUNET_log (GNUNET_ERROR_TYPE_INFO, - "Peer `%s' disconnected and we are connected to %u peers\n", - GNUNET_i2s (peer), connections); + if (CT_NONE != tc->type) + { + GNUNET_break (0); + GNUNET_SERVICE_client_drop (tc->client); + return; + } + GNUNET_SERVICE_client_mark_monitor (tc->client); + tc->type = CT_BLACKLIST; + tc->details.blacklist.call_receive_done = GNUNET_YES; + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "New blacklist client %p\n", tc); + /* confirm that all existing connections are OK! */ + tcc.tc = tc; + tcc.first = GNUNET_YES; + GST_neighbours_iterate (&test_connection_ok, &tcc); +} - disconnect_msg.header.size = htons (sizeof (struct DisconnectInfoMessage)); - disconnect_msg.header.type = htons (GNUNET_MESSAGE_TYPE_TRANSPORT_DISCONNECT); - disconnect_msg.reserved = htonl (0); - disconnect_msg.peer = *peer; - GST_clients_broadcast (&disconnect_msg.header, GNUNET_NO); + +/** + * Free the given entry in the blacklist. + * + * @param cls unused + * @param key host identity (unused) + * @param value the blacklist entry + * @return #GNUNET_OK (continue to iterate) + */ +static int +free_blacklist_entry (void *cls, + const struct GNUNET_PeerIdentity *key, + void *value) +{ + char *be = value; + + GNUNET_free_non_null (be); + return GNUNET_OK; } /** - * Function called to notify transport users that a neighbour peer changed its - * active address. + * Set traffic metric to manipulate * * @param cls closure - * @param peer peer this update is about (never NULL) - * @param address address, NULL on disconnect + * @param message containing information */ static void -neighbours_address_notification (void *cls, - const struct GNUNET_PeerIdentity *peer, - const struct GNUNET_HELLO_Address *address) +handle_client_set_metric (void *cls, const struct TrafficMetricMessage *tm) { - GST_clients_broadcast_address_notification (peer, address); + struct TransportClient *tc = cls; + + GST_manipulation_set_metric (tm); + GNUNET_SERVICE_client_continue (tc->client); } @@ -530,119 +2131,653 @@ neighbours_address_notification (void *cls, * and cancels pending validations. * * @param cls closure, unused - * @param tc task context (unused) */ static void -shutdown_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) +shutdown_task (void *cls) { + struct AddressToStringContext *cur; + GST_neighbours_stop (); - GST_validation_stop (); GST_plugins_unload (); - + GST_validation_stop (); + GST_ats_done (); GNUNET_ATS_scheduling_done (GST_ats); GST_ats = NULL; - GST_clients_stop (); - GST_blacklist_stop (); + GNUNET_ATS_connectivity_done (GST_ats_connect); + GST_ats_connect = NULL; + GNUNET_NT_scanner_done (GST_is); + GST_is = NULL; + while (NULL != (cur = a2s_head)) + { + GNUNET_CONTAINER_DLL_remove (a2s_head, a2s_tail, cur); + GNUNET_free (cur); + } + if (NULL != plugin_nc) + { + GNUNET_notification_context_destroy (plugin_nc); + plugin_nc = NULL; + } + GNUNET_CONTAINER_multipeermap_destroy (active_stccs); + active_stccs = NULL; + if (NULL != blacklist) + { + GNUNET_CONTAINER_multipeermap_iterate (blacklist, + &free_blacklist_entry, + NULL); + GNUNET_CONTAINER_multipeermap_destroy (blacklist); + blacklist = NULL; + } GST_hello_stop (); + GST_manipulation_stop (); - if (GST_peerinfo != NULL) + if (NULL != GST_peerinfo) { GNUNET_PEERINFO_disconnect (GST_peerinfo); GST_peerinfo = NULL; } - if (GST_stats != NULL) + if (NULL != GST_stats) { GNUNET_STATISTICS_destroy (GST_stats, GNUNET_NO); GST_stats = NULL; } - if (GST_my_private_key != NULL) + if (NULL != GST_my_private_key) { - GNUNET_CRYPTO_rsa_key_free (GST_my_private_key); + GNUNET_free (GST_my_private_key); GST_my_private_key = NULL; } } +/** + * Perform next action in the blacklist check. + * + * @param cls the `struct GST_BlacklistCheck *` + */ +static void +do_blacklist_check (void *cls) +{ + struct GST_BlacklistCheck *bc = cls; + struct TransportClient *tc; + struct GNUNET_MQ_Envelope *env; + struct BlacklistMessage *bm; + + bc->task = NULL; + while (NULL != (tc = bc->bl_pos)) + { + if (CT_BLACKLIST == tc->type) + break; + bc->bl_pos = tc->next; + } + if (NULL == tc) + { + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "No other blacklist clients active, will allow neighbour `%s'\n", + GNUNET_i2s (&bc->peer)); + + bc->cont (bc->cont_cls, &bc->peer, bc->address, bc->session, GNUNET_OK); + GST_blacklist_test_cancel (bc); + return; + } + if ((NULL != tc->details.blacklist.bc) || + (GNUNET_NO != tc->details.blacklist.waiting_for_reply)) + return; /* someone else busy with this client */ + tc->details.blacklist.bc = bc; + env = GNUNET_MQ_msg (bm, GNUNET_MESSAGE_TYPE_TRANSPORT_BLACKLIST_QUERY); + bm->is_allowed = htonl (0); + bm->peer = bc->peer; + GNUNET_MQ_send (tc->mq, env); + if (GNUNET_YES == tc->details.blacklist.call_receive_done) + { + tc->details.blacklist.call_receive_done = GNUNET_NO; + GNUNET_SERVICE_client_continue (tc->client); + } + tc->details.blacklist.waiting_for_reply = GNUNET_YES; +} + + +/** + * A blacklisting client has sent us reply. Process it. + * + * @param cls the client + * @param msg the blacklist-reply message that was sent + */ +static void +handle_client_blacklist_reply (void *cls, const struct BlacklistMessage *msg) +{ + struct TransportClient *tc = cls; + struct GST_BlacklistCheck *bc; + + if (CT_BLACKLIST != tc->type) + { + GNUNET_break (0); + GNUNET_SERVICE_client_drop (tc->client); + return; + } + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Blacklist client %p sent reply for `%s'\n", + tc, + GNUNET_i2s (&msg->peer)); + bc = tc->details.blacklist.bc; + tc->details.blacklist.bc = NULL; + tc->details.blacklist.waiting_for_reply = GNUNET_NO; + tc->details.blacklist.call_receive_done = GNUNET_YES; + if (NULL != bc) + { + /* only run this if the blacklist check has not been + * cancelled in the meantime... */ + GNUNET_assert (bc->bl_pos == tc); + if (ntohl (msg->is_allowed) == GNUNET_SYSERR) + { + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Blacklist check failed, peer not allowed\n"); + /* For the duration of the continuation, make the ongoing + check invisible (to avoid double-cancellation); then + add it back again so we can re-use GST_blacklist_test_cancel() */ + GNUNET_CONTAINER_DLL_remove (bc_head, bc_tail, bc); + bc->cont (bc->cont_cls, &bc->peer, bc->address, bc->session, GNUNET_NO); + GNUNET_CONTAINER_DLL_insert (bc_head, bc_tail, bc); + GST_blacklist_test_cancel (bc); + tc->details.blacklist.call_receive_done = GNUNET_NO; + GNUNET_SERVICE_client_continue (tc->client); + return; + } + else + { + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Blacklist check succeeded, continuing with checks\n"); + tc->details.blacklist.call_receive_done = GNUNET_NO; + GNUNET_SERVICE_client_continue (tc->client); + bc->bl_pos = tc->next; + bc->task = GNUNET_SCHEDULER_add_now (&do_blacklist_check, bc); + } + } + /* check if any other blacklist checks are waiting for this blacklister */ + for (bc = bc_head; bc != NULL; bc = bc->next) + if ((bc->bl_pos == tc) && (NULL == bc->task)) + { + bc->task = GNUNET_SCHEDULER_add_now (&do_blacklist_check, bc); + break; + } +} + + +/** + * Add the given peer to the blacklist (for the given transport). + * + * @param peer peer to blacklist + * @param transport_name transport to blacklist for this peer, NULL for all + */ +void +GST_blacklist_add_peer (const struct GNUNET_PeerIdentity *peer, + const char *transport_name) +{ + char *transport = NULL; + + if (NULL != transport_name) + { + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + "Adding peer `%s' with plugin `%s' to blacklist\n", + GNUNET_i2s (peer), + transport_name); + transport = GNUNET_strdup (transport_name); + } + else + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + "Adding peer `%s' with all plugins to blacklist\n", + GNUNET_i2s (peer)); + if (NULL == blacklist) + blacklist = + GNUNET_CONTAINER_multipeermap_create (TRANSPORT_BLACKLIST_HT_SIZE, + GNUNET_NO); + + GNUNET_CONTAINER_multipeermap_put (blacklist, + peer, + transport, + GNUNET_CONTAINER_MULTIHASHMAPOPTION_MULTIPLE); +} + + +/** + * Abort blacklist if @a address and @a session match. + * + * @param address address used to abort matching checks + * @param session session used to abort matching checks + */ +void +GST_blacklist_abort_matching (const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session) +{ + struct GST_BlacklistCheck *bc; + struct GST_BlacklistCheck *n; + + n = bc_head; + while (NULL != (bc = n)) + { + n = bc->next; + if ((bc->session == session) && + (0 == GNUNET_HELLO_address_cmp (bc->address, address))) + { + bc->cont (bc->cont_cls, + &bc->peer, + bc->address, + bc->session, + GNUNET_SYSERR); + GST_blacklist_test_cancel (bc); + } + } +} + + +/** + * Test if the given blacklist entry matches. If so, + * abort the iteration. + * + * @param cls the transport name to match (const char*) + * @param key the key (unused) + * @param value the 'char *' (name of a blacklisted transport) + * @return #GNUNET_OK if the entry does not match, #GNUNET_NO if it matches + */ +static int +test_blacklisted (void *cls, const struct GNUNET_PeerIdentity *key, void *value) +{ + const char *transport_name = cls; + char *be = value; + + /* Blacklist entry be: + * (NULL == be): peer is blacklisted with all plugins + * (NULL != be): peer is blacklisted for a specific plugin + * + * If (NULL != transport_name) we look for a transport specific entry: + * if (transport_name == be) forbidden + * + */GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Comparing BL request for peer `%4s':`%s' with BL entry: `%s'\n", + GNUNET_i2s (key), + (NULL == transport_name) ? "unspecified" : transport_name, + (NULL == be) ? "all plugins" : be); + /* all plugins for this peer were blacklisted: disallow */ + if (NULL == value) + return GNUNET_NO; + + /* blacklist check for specific transport */ + if ((NULL != transport_name) && (NULL != value)) + { + if (0 == strcmp (transport_name, be)) + return GNUNET_NO; /* plugin is blacklisted! */ + } + return GNUNET_OK; +} + + +/** + * Test if a peer/transport combination is blacklisted. + * + * @param peer the identity of the peer to test + * @param transport_name name of the transport to test, never NULL + * @param cont function to call with result + * @param cont_cls closure for @a cont + * @param address address to pass back to @a cont, can be NULL + * @param session session to pass back to @a cont, can be NULL + * @return handle to the blacklist check, NULL if the decision + * was made instantly and @a cont was already called + */ +struct GST_BlacklistCheck * +GST_blacklist_test_allowed (const struct GNUNET_PeerIdentity *peer, + const char *transport_name, + GST_BlacklistTestContinuation cont, + void *cont_cls, + const struct GNUNET_HELLO_Address *address, + struct GNUNET_ATS_Session *session) +{ + struct GST_BlacklistCheck *bc; + struct TransportClient *tc; + + GNUNET_assert (NULL != peer); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Blacklist check for peer `%s':%s\n", + GNUNET_i2s (peer), + (NULL != transport_name) ? transport_name : "unspecified"); + + /* Check local blacklist by iterating over hashmap + * If iteration is aborted, we found a matching blacklist entry */ + if ((NULL != blacklist) && + (GNUNET_SYSERR == + GNUNET_CONTAINER_multipeermap_get_multiple (blacklist, + peer, + &test_blacklisted, + (void *) transport_name))) + { + /* Disallowed by config, disapprove instantly */ + GNUNET_STATISTICS_update (GST_stats, + gettext_noop ("# disconnects due to blacklist"), + 1, + GNUNET_NO); + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + _ ("Disallowing connection to peer `%s' on transport %s\n"), + GNUNET_i2s (peer), + (NULL != transport_name) ? transport_name : "unspecified"); + if (NULL != cont) + cont (cont_cls, peer, address, session, GNUNET_NO); + return NULL; + } + + for (tc = clients_head; NULL != tc; tc = tc->next) + if (CT_BLACKLIST == tc->type) + break; + if (NULL == tc) + { + /* no blacklist clients, approve instantly */ + if (NULL != cont) + cont (cont_cls, peer, address, session, GNUNET_OK); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Allowing connection to peer `%s' %s\n", + GNUNET_i2s (peer), + (NULL != transport_name) ? transport_name : ""); + return NULL; + } + + /* need to query blacklist clients */ + bc = GNUNET_new (struct GST_BlacklistCheck); + GNUNET_CONTAINER_DLL_insert (bc_head, bc_tail, bc); + bc->peer = *peer; + bc->address = GNUNET_HELLO_address_copy (address); + bc->session = session; + bc->cont = cont; + bc->cont_cls = cont_cls; + bc->bl_pos = tc; + bc->task = GNUNET_SCHEDULER_add_now (&do_blacklist_check, bc); + return bc; +} + + +/** + * Cancel a blacklist check. + * + * @param bc check to cancel + */ +void +GST_blacklist_test_cancel (struct GST_BlacklistCheck *bc) +{ + GNUNET_CONTAINER_DLL_remove (bc_head, bc_tail, bc); + if (NULL != bc->bl_pos) + { + if ((CT_BLACKLIST == bc->bl_pos->type) && + (bc->bl_pos->details.blacklist.bc == bc)) + { + /* we're at the head of the queue, remove us! */ + bc->bl_pos->details.blacklist.bc = NULL; + } + } + if (NULL != bc->task) + { + GNUNET_SCHEDULER_cancel (bc->task); + bc->task = NULL; + } + GNUNET_free_non_null (bc->address); + GNUNET_free (bc); +} + + +/** + * Function to iterate over options in the blacklisting section for a peer. + * + * @param cls closure + * @param section name of the section + * @param option name of the option + * @param value value of the option + */ +static void +blacklist_cfg_iter (void *cls, + const char *section, + const char *option, + const char *value) +{ + unsigned int *res = cls; + struct GNUNET_PeerIdentity peer; + char *plugs; + char *pos; + + if (GNUNET_OK != + GNUNET_CRYPTO_eddsa_public_key_from_string (option, + strlen (option), + &peer.public_key)) + return; + + if ((NULL == value) || (0 == strcmp (value, ""))) + { + /* Blacklist whole peer */ + GST_blacklist_add_peer (&peer, NULL); + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + _ ("Adding blacklisting entry for peer `%s'\n"), + GNUNET_i2s (&peer)); + } + else + { + plugs = GNUNET_strdup (value); + for (pos = strtok (plugs, " "); pos != NULL; pos = strtok (NULL, " ")) + { + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + _ ("Adding blacklisting entry for peer `%s':`%s'\n"), + GNUNET_i2s (&peer), + pos); + GST_blacklist_add_peer (&peer, pos); + } + GNUNET_free (plugs); + } + (*res)++; +} + + +/** + * Read blacklist configuration + * + * @param cfg the configuration handle + * @param my_id my peer identity + */ +static void +read_blacklist_configuration (const struct GNUNET_CONFIGURATION_Handle *cfg, + const struct GNUNET_PeerIdentity *my_id) +{ + char cfg_sect[512]; + unsigned int res = 0; + + GNUNET_snprintf (cfg_sect, + sizeof(cfg_sect), + "transport-blacklist-%s", + GNUNET_i2s_full (my_id)); + GNUNET_CONFIGURATION_iterate_section_values (cfg, + cfg_sect, + &blacklist_cfg_iter, + &res); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Loaded %u blacklisting entries from configuration\n", + res); +} + + /** * Initiate transport service. * * @param cls closure - * @param server the initialized server * @param c configuration to use + * @param service the initialized service */ static void -run (void *cls, struct GNUNET_SERVER_Handle *server, - const struct GNUNET_CONFIGURATION_Handle *c) +run (void *cls, + const struct GNUNET_CONFIGURATION_Handle *c, + struct GNUNET_SERVICE_Handle *service) { char *keyfile; + struct GNUNET_CRYPTO_EddsaPrivateKey *pk; + long long unsigned int max_fd_cfg; + int max_fd_rlimit; + int max_fd; + int friend_only; /* setup globals */ GST_cfg = c; - if (GNUNET_OK != - GNUNET_CONFIGURATION_get_value_filename (c, "GNUNETD", "HOSTKEY", - &keyfile)) + if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (c, + "PEER", + "PRIVATE_KEY", + &keyfile)) { - GNUNET_log (GNUNET_ERROR_TYPE_ERROR, - _ - ("Transport service is lacking key configuration settings. Exiting.\n")); + GNUNET_log ( + GNUNET_ERROR_TYPE_ERROR, + _ ( + "Transport service is lacking key configuration settings. Exiting.\n")); GNUNET_SCHEDULER_shutdown (); return; } - GST_my_private_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile); + if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_time (c, + "transport", + "HELLO_EXPIRATION", + &hello_expiration)) + { + hello_expiration = GNUNET_CONSTANTS_HELLO_ADDRESS_EXPIRATION; + } + pk = GNUNET_CRYPTO_eddsa_key_create_from_file (keyfile); GNUNET_free (keyfile); - if (GST_my_private_key == NULL) + GNUNET_assert (NULL != pk); + GST_my_private_key = pk; + + GST_stats = GNUNET_STATISTICS_create ("transport", GST_cfg); + GST_peerinfo = GNUNET_PEERINFO_connect (GST_cfg); + GNUNET_CRYPTO_eddsa_key_get_public (GST_my_private_key, + &GST_my_identity.public_key); + GNUNET_assert (NULL != GST_my_private_key); + + GNUNET_log (GNUNET_ERROR_TYPE_INFO, + "My identity is `%s'\n", + GNUNET_i2s_full (&GST_my_identity)); + + GNUNET_SCHEDULER_add_shutdown (&shutdown_task, NULL); + if (NULL == GST_peerinfo) { GNUNET_log (GNUNET_ERROR_TYPE_ERROR, - _("Transport service could not access hostkey. Exiting.\n")); + _ ("Could not access PEERINFO service. Exiting.\n")); GNUNET_SCHEDULER_shutdown (); return; } - GST_stats = GNUNET_STATISTICS_create ("transport", c); - GST_peerinfo = GNUNET_PEERINFO_connect (c); - GNUNET_CRYPTO_rsa_key_get_public (GST_my_private_key, &GST_my_public_key); - GNUNET_CRYPTO_hash (&GST_my_public_key, sizeof (GST_my_public_key), - &GST_my_identity.hashPubKey); - GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &shutdown_task, - NULL); - if (GST_peerinfo == NULL) + + max_fd_rlimit = 0; +#if HAVE_GETRLIMIT { - GNUNET_log (GNUNET_ERROR_TYPE_ERROR, - _("Could not access PEERINFO service. Exiting.\n")); - GNUNET_SCHEDULER_shutdown (); - return; + struct rlimit r_file; + + if (0 == getrlimit (RLIMIT_NOFILE, &r_file)) + { + max_fd_rlimit = r_file.rlim_cur; + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Maximum number of open files was: %u/%u\n", + (unsigned int) r_file.rlim_cur, + (unsigned int) r_file.rlim_max); + } + max_fd_rlimit = + (9 * max_fd_rlimit) / 10; /* Keep 10% for rest of transport */ } +#endif + if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_number (GST_cfg, + "transport", + "MAX_FD", + &max_fd_cfg)) + max_fd_cfg = max_fd_rlimit; + + if (max_fd_cfg > max_fd_rlimit) + max_fd = max_fd_cfg; + else + max_fd = max_fd_rlimit; + if (max_fd < DEFAULT_MAX_FDS) + max_fd = DEFAULT_MAX_FDS; + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Limiting number of sockets to %u: validation %u, neighbors: %u\n", + max_fd, + (max_fd / 3), + (max_fd / 3) * 2); + + friend_only = + GNUNET_CONFIGURATION_get_value_yesno (GST_cfg, "topology", "FRIENDS-ONLY"); + if (GNUNET_SYSERR == friend_only) + friend_only = GNUNET_NO; /* According to topology defaults */ /* start subsystems */ - GST_hello_start (&process_hello_update, NULL); - GST_blacklist_start (server); + /* Disable DSTJ peer */ + { + struct GNUNET_PeerIdentity dstj; + const char *ds = "DSTJBRRKZ8TBW3FGK6B0M5QXWT9WYNZ45H5MCV4HY7ST64Q8T9F0"; + + GNUNET_assert ( + GNUNET_OK == + GNUNET_CRYPTO_eddsa_public_key_from_string (ds, + strlen (ds), + &dstj.public_key)); + GST_blacklist_add_peer (&dstj, NULL); + } + read_blacklist_configuration (GST_cfg, &GST_my_identity); + GST_is = GNUNET_NT_scanner_init (); + GST_ats_connect = GNUNET_ATS_connectivity_init (GST_cfg); GST_ats = - GNUNET_ATS_scheduling_init (GST_cfg, &ats_request_address_change, NULL); - GST_plugins_load (&plugin_env_receive_callback, + GNUNET_ATS_scheduling_init (GST_cfg, &ats_request_address_change, NULL); + GST_ats_init (); + GST_manipulation_init (); + GST_plugins_load (&GST_manipulation_recv, &plugin_env_address_change_notification, - &plugin_env_session_end, - &plugin_env_address_to_type); - GST_neighbours_start (NULL, - &neighbours_connect_notification, - &neighbours_disconnect_notification, - &neighbours_address_notification); - GST_clients_start (server); - GST_validation_start (); + &plugin_env_session_start, + &plugin_env_session_end); + GST_hello_start (friend_only, &process_hello_update, NULL); + GST_neighbours_start ((max_fd / 3) * 2); + active_stccs = GNUNET_CONTAINER_multipeermap_create (128, GNUNET_YES); + plugin_nc = GNUNET_notification_context_create (0); + GST_validation_start ((max_fd / 3)); } /** - * The main function for the transport service. - * - * @param argc number of arguments from the command line - * @param argv command line arguments - * @return 0 ok, 1 on error + * Define "main" method using service macro. */ -int -main (int argc, char *const *argv) -{ - return (GNUNET_OK == - GNUNET_SERVICE_run (argc, argv, "transport", - GNUNET_SERVICE_OPTION_NONE, &run, NULL)) ? 0 : 1; -} - -/* end of file gnunet-service-transport-new.c */ +GNUNET_SERVICE_MAIN ( + "transport", + GNUNET_SERVICE_OPTION_NONE, + &run, + &client_connect_cb, + &client_disconnect_cb, + NULL, + GNUNET_MQ_hd_fixed_size (client_start, + GNUNET_MESSAGE_TYPE_TRANSPORT_START, + struct StartMessage, + NULL), + GNUNET_MQ_hd_var_size (client_hello, + GNUNET_MESSAGE_TYPE_HELLO, + struct GNUNET_MessageHeader, + NULL), + GNUNET_MQ_hd_var_size (client_send, + GNUNET_MESSAGE_TYPE_TRANSPORT_SEND, + struct OutboundMessage, + NULL), + GNUNET_MQ_hd_var_size (client_address_to_string, + GNUNET_MESSAGE_TYPE_TRANSPORT_ADDRESS_TO_STRING, + struct AddressLookupMessage, + NULL), + GNUNET_MQ_hd_fixed_size (client_monitor_peers, + GNUNET_MESSAGE_TYPE_TRANSPORT_MONITOR_PEER_REQUEST, + struct PeerMonitorMessage, + NULL), + GNUNET_MQ_hd_fixed_size (client_blacklist_init, + GNUNET_MESSAGE_TYPE_TRANSPORT_BLACKLIST_INIT, + struct GNUNET_MessageHeader, + NULL), + GNUNET_MQ_hd_fixed_size (client_blacklist_reply, + GNUNET_MESSAGE_TYPE_TRANSPORT_BLACKLIST_REPLY, + struct BlacklistMessage, + NULL), + GNUNET_MQ_hd_fixed_size (client_set_metric, + GNUNET_MESSAGE_TYPE_TRANSPORT_TRAFFIC_METRIC, + struct TrafficMetricMessage, + NULL), + GNUNET_MQ_hd_fixed_size (client_monitor_plugins, + GNUNET_MESSAGE_TYPE_TRANSPORT_MONITOR_PLUGIN_START, + struct GNUNET_MessageHeader, + NULL), + GNUNET_MQ_handler_end ()); + + +/* end of file gnunet-service-transport.c */