mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2024-12-20 05:28:01 +00:00
Merge branch 'dev' into edge
This commit is contained in:
commit
ff9317365a
@ -105,8 +105,9 @@ public:
|
|||||||
const _ArItem *const end = i + ZT_ANTIRECURSION_HISTORY_SIZE;
|
const _ArItem *const end = i + ZT_ANTIRECURSION_HISTORY_SIZE;
|
||||||
while (i != end) {
|
while (i != end) {
|
||||||
#ifdef ZT_NO_TYPE_PUNNING
|
#ifdef ZT_NO_TYPE_PUNNING
|
||||||
if (!memcmp(pp,i->tail,32))
|
if (!memcmp(pp,i->tail,32)) {
|
||||||
return false;
|
return false;
|
||||||
|
}
|
||||||
#else
|
#else
|
||||||
const uint64_t *t = i->tail;
|
const uint64_t *t = i->tail;
|
||||||
const uint64_t *p = reinterpret_cast<const uint64_t *>(pp);
|
const uint64_t *p = reinterpret_cast<const uint64_t *>(pp);
|
||||||
@ -114,8 +115,9 @@ public:
|
|||||||
bits |= *(t++) ^ *(p++);
|
bits |= *(t++) ^ *(p++);
|
||||||
bits |= *(t++) ^ *(p++);
|
bits |= *(t++) ^ *(p++);
|
||||||
bits |= *t ^ *p;
|
bits |= *t ^ *p;
|
||||||
if (!bits)
|
if (!bits) {
|
||||||
return false;
|
return false;
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
++i;
|
++i;
|
||||||
}
|
}
|
||||||
|
@ -264,13 +264,23 @@
|
|||||||
/**
|
/**
|
||||||
* Delay between ordinary case pings of direct links
|
* Delay between ordinary case pings of direct links
|
||||||
*/
|
*/
|
||||||
#define ZT_PEER_DIRECT_PING_DELAY 60000
|
#define ZT_PEER_DIRECT_PING_DELAY 90000
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Timeout for overall peer activity (measured from last receive)
|
* Timeout for overall peer activity (measured from last receive)
|
||||||
*/
|
*/
|
||||||
#define ZT_PEER_ACTIVITY_TIMEOUT ((ZT_PEER_DIRECT_PING_DELAY * 4) + ZT_PING_CHECK_INVERVAL)
|
#define ZT_PEER_ACTIVITY_TIMEOUT ((ZT_PEER_DIRECT_PING_DELAY * 4) + ZT_PING_CHECK_INVERVAL)
|
||||||
|
|
||||||
|
/**
|
||||||
|
* No answer timeout to trigger dead path detection
|
||||||
|
*/
|
||||||
|
#define ZT_PEER_DEAD_PATH_DETECTION_NO_ANSWER_TIMEOUT 2500
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Probation threshold after which a path becomes dead
|
||||||
|
*/
|
||||||
|
#define ZT_PEER_DEAD_PATH_DETECTION_MAX_PROBATION 3
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Delay between requests for updated network autoconf information
|
* Delay between requests for updated network autoconf information
|
||||||
*/
|
*/
|
||||||
|
@ -86,7 +86,7 @@ bool IncomingPacket::tryDecode(const RuntimeEnvironment *RR,bool deferred)
|
|||||||
switch(v) {
|
switch(v) {
|
||||||
//case Packet::VERB_NOP:
|
//case Packet::VERB_NOP:
|
||||||
default: // ignore unknown verbs, but if they pass auth check they are "received"
|
default: // ignore unknown verbs, but if they pass auth check they are "received"
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),v,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),v,0,Packet::VERB_NOP);
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
case Packet::VERB_HELLO: return _doHELLO(RR,peer);
|
case Packet::VERB_HELLO: return _doHELLO(RR,peer);
|
||||||
@ -185,7 +185,7 @@ bool IncomingPacket::_doERROR(const RuntimeEnvironment *RR,const SharedPtr<Peer>
|
|||||||
default: break;
|
default: break;
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_ERROR,inRePacketId,inReVerb);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_ERROR,inRePacketId,inReVerb);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped ERROR from %s(%s): unexpected exception",peer->address().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped ERROR from %s(%s): unexpected exception",peer->address().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -279,7 +279,7 @@ bool IncomingPacket::_doHELLO(const RuntimeEnvironment *RR,SharedPtr<Peer> &peer
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Check packet integrity and authentication
|
// Check packet integrity and authentication
|
||||||
SharedPtr<Peer> newPeer(new Peer(RR->identity,id));
|
SharedPtr<Peer> newPeer(new Peer(RR,RR->identity,id));
|
||||||
if (!dearmor(newPeer->key())) {
|
if (!dearmor(newPeer->key())) {
|
||||||
TRACE("rejected HELLO from %s(%s): packet failed authentication",id.address().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("rejected HELLO from %s(%s): packet failed authentication",id.address().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
return true;
|
return true;
|
||||||
@ -349,7 +349,7 @@ bool IncomingPacket::_doHELLO(const RuntimeEnvironment *RR,SharedPtr<Peer> &peer
|
|||||||
RR->node->putPacket(_localAddress,_remoteAddress,outp.data(),outp.size());
|
RR->node->putPacket(_localAddress,_remoteAddress,outp.data(),outp.size());
|
||||||
|
|
||||||
peer->setRemoteVersion(protoVersion,vMajor,vMinor,vRevision); // important for this to go first so received() knows the version
|
peer->setRemoteVersion(protoVersion,vMajor,vMinor,vRevision); // important for this to go first so received() knows the version
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),pid,Packet::VERB_HELLO,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),pid,Packet::VERB_HELLO,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped HELLO from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped HELLO from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -410,7 +410,7 @@ bool IncomingPacket::_doOK(const RuntimeEnvironment *RR,const SharedPtr<Peer> &p
|
|||||||
// roots. In the future it should be done if we query less trusted
|
// roots. In the future it should be done if we query less trusted
|
||||||
// sources.
|
// sources.
|
||||||
//if (id.locallyValidate())
|
//if (id.locallyValidate())
|
||||||
RR->sw->doAnythingWaitingForPeer(RR->topology->addPeer(SharedPtr<Peer>(new Peer(RR->identity,id))));
|
RR->sw->doAnythingWaitingForPeer(RR->topology->addPeer(SharedPtr<Peer>(new Peer(RR,RR->identity,id))));
|
||||||
}
|
}
|
||||||
} break;
|
} break;
|
||||||
|
|
||||||
@ -450,7 +450,7 @@ bool IncomingPacket::_doOK(const RuntimeEnvironment *RR,const SharedPtr<Peer> &p
|
|||||||
// OK(MULTICAST_FRAME) includes certificate of membership update
|
// OK(MULTICAST_FRAME) includes certificate of membership update
|
||||||
CertificateOfMembership com;
|
CertificateOfMembership com;
|
||||||
offset += com.deserialize(*this,ZT_PROTO_VERB_MULTICAST_FRAME__OK__IDX_COM_AND_GATHER_RESULTS);
|
offset += com.deserialize(*this,ZT_PROTO_VERB_MULTICAST_FRAME__OK__IDX_COM_AND_GATHER_RESULTS);
|
||||||
peer->validateAndSetNetworkMembershipCertificate(RR,nwid,com);
|
peer->validateAndSetNetworkMembershipCertificate(nwid,com);
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((flags & 0x02) != 0) {
|
if ((flags & 0x02) != 0) {
|
||||||
@ -465,7 +465,7 @@ bool IncomingPacket::_doOK(const RuntimeEnvironment *RR,const SharedPtr<Peer> &p
|
|||||||
default: break;
|
default: break;
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_OK,inRePacketId,inReVerb);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_OK,inRePacketId,inReVerb);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped OK from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped OK from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -494,7 +494,7 @@ bool IncomingPacket::_doWHOIS(const RuntimeEnvironment *RR,const SharedPtr<Peer>
|
|||||||
} else {
|
} else {
|
||||||
TRACE("dropped WHOIS from %s(%s): missing or invalid address",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped WHOIS from %s(%s): missing or invalid address",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_WHOIS,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_WHOIS,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped WHOIS from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped WHOIS from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -513,7 +513,7 @@ bool IncomingPacket::_doRENDEZVOUS(const RuntimeEnvironment *RR,const SharedPtr<
|
|||||||
if ((port > 0)&&((addrlen == 4)||(addrlen == 16))) {
|
if ((port > 0)&&((addrlen == 4)||(addrlen == 16))) {
|
||||||
InetAddress atAddr(field(ZT_PROTO_VERB_RENDEZVOUS_IDX_ADDRESS,addrlen),addrlen,port);
|
InetAddress atAddr(field(ZT_PROTO_VERB_RENDEZVOUS_IDX_ADDRESS,addrlen),addrlen,port);
|
||||||
TRACE("RENDEZVOUS from %s says %s might be at %s, starting NAT-t",peer->address().toString().c_str(),with.toString().c_str(),atAddr.toString().c_str());
|
TRACE("RENDEZVOUS from %s says %s might be at %s, starting NAT-t",peer->address().toString().c_str(),with.toString().c_str(),atAddr.toString().c_str());
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_RENDEZVOUS,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_RENDEZVOUS,0,Packet::VERB_NOP);
|
||||||
RR->sw->rendezvous(withPeer,_localAddress,atAddr);
|
RR->sw->rendezvous(withPeer,_localAddress,atAddr);
|
||||||
} else {
|
} else {
|
||||||
TRACE("dropped corrupt RENDEZVOUS from %s(%s) (bad address or port)",peer->address().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped corrupt RENDEZVOUS from %s(%s) (bad address or port)",peer->address().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
@ -553,7 +553,7 @@ bool IncomingPacket::_doFRAME(const RuntimeEnvironment *RR,const SharedPtr<Peer>
|
|||||||
RR->node->putFrame(network->id(),MAC(peer->address(),network->id()),network->mac(),etherType,0,field(ZT_PROTO_VERB_FRAME_IDX_PAYLOAD,payloadLen),payloadLen);
|
RR->node->putFrame(network->id(),MAC(peer->address(),network->id()),network->mac(),etherType,0,field(ZT_PROTO_VERB_FRAME_IDX_PAYLOAD,payloadLen),payloadLen);
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_FRAME,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_FRAME,0,Packet::VERB_NOP);
|
||||||
} else {
|
} else {
|
||||||
TRACE("dropped FRAME from %s(%s): we are not connected to network %.16llx",source().toString().c_str(),_remoteAddress.toString().c_str(),at<uint64_t>(ZT_PROTO_VERB_FRAME_IDX_NETWORK_ID));
|
TRACE("dropped FRAME from %s(%s): we are not connected to network %.16llx",source().toString().c_str(),_remoteAddress.toString().c_str(),at<uint64_t>(ZT_PROTO_VERB_FRAME_IDX_NETWORK_ID));
|
||||||
}
|
}
|
||||||
@ -575,7 +575,7 @@ bool IncomingPacket::_doEXT_FRAME(const RuntimeEnvironment *RR,const SharedPtr<P
|
|||||||
if ((flags & 0x01) != 0) {
|
if ((flags & 0x01) != 0) {
|
||||||
CertificateOfMembership com;
|
CertificateOfMembership com;
|
||||||
comLen = com.deserialize(*this,ZT_PROTO_VERB_EXT_FRAME_IDX_COM);
|
comLen = com.deserialize(*this,ZT_PROTO_VERB_EXT_FRAME_IDX_COM);
|
||||||
peer->validateAndSetNetworkMembershipCertificate(RR,network->id(),com);
|
peer->validateAndSetNetworkMembershipCertificate(network->id(),com);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!network->isAllowed(peer)) {
|
if (!network->isAllowed(peer)) {
|
||||||
@ -624,7 +624,7 @@ bool IncomingPacket::_doEXT_FRAME(const RuntimeEnvironment *RR,const SharedPtr<P
|
|||||||
RR->node->putFrame(network->id(),from,to,etherType,0,field(comLen + ZT_PROTO_VERB_EXT_FRAME_IDX_PAYLOAD,payloadLen),payloadLen);
|
RR->node->putFrame(network->id(),from,to,etherType,0,field(comLen + ZT_PROTO_VERB_EXT_FRAME_IDX_PAYLOAD,payloadLen),payloadLen);
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_EXT_FRAME,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_EXT_FRAME,0,Packet::VERB_NOP);
|
||||||
} else {
|
} else {
|
||||||
TRACE("dropped EXT_FRAME from %s(%s): we are not connected to network %.16llx",source().toString().c_str(),_remoteAddress.toString().c_str(),at<uint64_t>(ZT_PROTO_VERB_FRAME_IDX_NETWORK_ID));
|
TRACE("dropped EXT_FRAME from %s(%s): we are not connected to network %.16llx",source().toString().c_str(),_remoteAddress.toString().c_str(),at<uint64_t>(ZT_PROTO_VERB_FRAME_IDX_NETWORK_ID));
|
||||||
}
|
}
|
||||||
@ -646,7 +646,7 @@ bool IncomingPacket::_doECHO(const RuntimeEnvironment *RR,const SharedPtr<Peer>
|
|||||||
outp.armor(peer->key(),true);
|
outp.armor(peer->key(),true);
|
||||||
RR->antiRec->logOutgoingZT(outp.data(),outp.size());
|
RR->antiRec->logOutgoingZT(outp.data(),outp.size());
|
||||||
RR->node->putPacket(_localAddress,_remoteAddress,outp.data(),outp.size());
|
RR->node->putPacket(_localAddress,_remoteAddress,outp.data(),outp.size());
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),pid,Packet::VERB_ECHO,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),pid,Packet::VERB_ECHO,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped ECHO from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped ECHO from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -665,7 +665,7 @@ bool IncomingPacket::_doMULTICAST_LIKE(const RuntimeEnvironment *RR,const Shared
|
|||||||
RR->mc->add(now,nwid,group,peer->address());
|
RR->mc->add(now,nwid,group,peer->address());
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_MULTICAST_LIKE,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_MULTICAST_LIKE,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped MULTICAST_LIKE from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped MULTICAST_LIKE from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -680,10 +680,10 @@ bool IncomingPacket::_doNETWORK_MEMBERSHIP_CERTIFICATE(const RuntimeEnvironment
|
|||||||
unsigned int ptr = ZT_PACKET_IDX_PAYLOAD;
|
unsigned int ptr = ZT_PACKET_IDX_PAYLOAD;
|
||||||
while (ptr < size()) {
|
while (ptr < size()) {
|
||||||
ptr += com.deserialize(*this,ptr);
|
ptr += com.deserialize(*this,ptr);
|
||||||
peer->validateAndSetNetworkMembershipCertificate(RR,com.networkId(),com);
|
peer->validateAndSetNetworkMembershipCertificate(com.networkId(),com);
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_NETWORK_MEMBERSHIP_CERTIFICATE,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_NETWORK_MEMBERSHIP_CERTIFICATE,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped NETWORK_MEMBERSHIP_CERTIFICATE from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped NETWORK_MEMBERSHIP_CERTIFICATE from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -700,7 +700,7 @@ bool IncomingPacket::_doNETWORK_CONFIG_REQUEST(const RuntimeEnvironment *RR,cons
|
|||||||
|
|
||||||
const unsigned int h = hops();
|
const unsigned int h = hops();
|
||||||
const uint64_t pid = packetId();
|
const uint64_t pid = packetId();
|
||||||
peer->received(RR,_localAddress,_remoteAddress,h,pid,Packet::VERB_NETWORK_CONFIG_REQUEST,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,h,pid,Packet::VERB_NETWORK_CONFIG_REQUEST,0,Packet::VERB_NOP);
|
||||||
|
|
||||||
if (RR->localNetworkController) {
|
if (RR->localNetworkController) {
|
||||||
Dictionary netconf;
|
Dictionary netconf;
|
||||||
@ -789,7 +789,7 @@ bool IncomingPacket::_doNETWORK_CONFIG_REFRESH(const RuntimeEnvironment *RR,cons
|
|||||||
nw->requestConfiguration();
|
nw->requestConfiguration();
|
||||||
ptr += 8;
|
ptr += 8;
|
||||||
}
|
}
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_NETWORK_CONFIG_REFRESH,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_NETWORK_CONFIG_REFRESH,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped NETWORK_CONFIG_REFRESH from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped NETWORK_CONFIG_REFRESH from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -825,7 +825,7 @@ bool IncomingPacket::_doMULTICAST_GATHER(const RuntimeEnvironment *RR,const Shar
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_MULTICAST_GATHER,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_MULTICAST_GATHER,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped MULTICAST_GATHER from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped MULTICAST_GATHER from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -846,7 +846,7 @@ bool IncomingPacket::_doMULTICAST_FRAME(const RuntimeEnvironment *RR,const Share
|
|||||||
if ((flags & 0x01) != 0) {
|
if ((flags & 0x01) != 0) {
|
||||||
CertificateOfMembership com;
|
CertificateOfMembership com;
|
||||||
offset += com.deserialize(*this,ZT_PROTO_VERB_MULTICAST_FRAME_IDX_COM);
|
offset += com.deserialize(*this,ZT_PROTO_VERB_MULTICAST_FRAME_IDX_COM);
|
||||||
peer->validateAndSetNetworkMembershipCertificate(RR,nwid,com);
|
peer->validateAndSetNetworkMembershipCertificate(nwid,com);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check membership after we've read any included COM, since
|
// Check membership after we've read any included COM, since
|
||||||
@ -915,7 +915,7 @@ bool IncomingPacket::_doMULTICAST_FRAME(const RuntimeEnvironment *RR,const Share
|
|||||||
}
|
}
|
||||||
} // else ignore -- not a member of this network
|
} // else ignore -- not a member of this network
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_MULTICAST_FRAME,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_MULTICAST_FRAME,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped MULTICAST_FRAME from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped MULTICAST_FRAME from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -955,7 +955,7 @@ bool IncomingPacket::_doPUSH_DIRECT_PATHS(const RuntimeEnvironment *RR,const Sha
|
|||||||
if ( ((flags & 0x01) == 0) && (Path::isAddressValidForPath(a)) && (!peer->hasActivePathTo(now,a)) ) {
|
if ( ((flags & 0x01) == 0) && (Path::isAddressValidForPath(a)) && (!peer->hasActivePathTo(now,a)) ) {
|
||||||
if (++countPerScope[(int)a.ipScope()][0] <= ZT_PUSH_DIRECT_PATHS_MAX_PER_SCOPE_AND_FAMILY) {
|
if (++countPerScope[(int)a.ipScope()][0] <= ZT_PUSH_DIRECT_PATHS_MAX_PER_SCOPE_AND_FAMILY) {
|
||||||
TRACE("attempting to contact %s at pushed direct path %s",peer->address().toString().c_str(),a.toString().c_str());
|
TRACE("attempting to contact %s at pushed direct path %s",peer->address().toString().c_str(),a.toString().c_str());
|
||||||
peer->sendHELLO(RR,_localAddress,a,now);
|
peer->sendHELLO(_localAddress,a,now);
|
||||||
} else {
|
} else {
|
||||||
TRACE("ignoring contact for %s at %s -- too many per scope",peer->address().toString().c_str(),a.toString().c_str());
|
TRACE("ignoring contact for %s at %s -- too many per scope",peer->address().toString().c_str(),a.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -966,7 +966,7 @@ bool IncomingPacket::_doPUSH_DIRECT_PATHS(const RuntimeEnvironment *RR,const Sha
|
|||||||
if ( ((flags & 0x01) == 0) && (Path::isAddressValidForPath(a)) && (!peer->hasActivePathTo(now,a)) ) {
|
if ( ((flags & 0x01) == 0) && (Path::isAddressValidForPath(a)) && (!peer->hasActivePathTo(now,a)) ) {
|
||||||
if (++countPerScope[(int)a.ipScope()][1] <= ZT_PUSH_DIRECT_PATHS_MAX_PER_SCOPE_AND_FAMILY) {
|
if (++countPerScope[(int)a.ipScope()][1] <= ZT_PUSH_DIRECT_PATHS_MAX_PER_SCOPE_AND_FAMILY) {
|
||||||
TRACE("attempting to contact %s at pushed direct path %s",peer->address().toString().c_str(),a.toString().c_str());
|
TRACE("attempting to contact %s at pushed direct path %s",peer->address().toString().c_str(),a.toString().c_str());
|
||||||
peer->sendHELLO(RR,_localAddress,a,now);
|
peer->sendHELLO(_localAddress,a,now);
|
||||||
} else {
|
} else {
|
||||||
TRACE("ignoring contact for %s at %s -- too many per scope",peer->address().toString().c_str(),a.toString().c_str());
|
TRACE("ignoring contact for %s at %s -- too many per scope",peer->address().toString().c_str(),a.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -976,7 +976,7 @@ bool IncomingPacket::_doPUSH_DIRECT_PATHS(const RuntimeEnvironment *RR,const Sha
|
|||||||
ptr += addrLen;
|
ptr += addrLen;
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_PUSH_DIRECT_PATHS,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_PUSH_DIRECT_PATHS,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped PUSH_DIRECT_PATHS from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped PUSH_DIRECT_PATHS from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -1143,7 +1143,7 @@ bool IncomingPacket::_doCIRCUIT_TEST(const RuntimeEnvironment *RR,const SharedPt
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_CIRCUIT_TEST,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),packetId(),Packet::VERB_CIRCUIT_TEST,0,Packet::VERB_NOP);
|
||||||
} catch ( ... ) {
|
} catch ( ... ) {
|
||||||
TRACE("dropped CIRCUIT_TEST from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped CIRCUIT_TEST from %s(%s): unexpected exception",source().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
@ -1238,7 +1238,7 @@ bool IncomingPacket::_doREQUEST_PROOF_OF_WORK(const RuntimeEnvironment *RR,const
|
|||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
peer->received(RR,_localAddress,_remoteAddress,hops(),pid,Packet::VERB_REQUEST_PROOF_OF_WORK,0,Packet::VERB_NOP);
|
peer->received(_localAddress,_remoteAddress,hops(),pid,Packet::VERB_REQUEST_PROOF_OF_WORK,0,Packet::VERB_NOP);
|
||||||
} else {
|
} else {
|
||||||
TRACE("dropped REQUEST_PROOF_OF_WORK from %s(%s): not trusted enough",peer->address().toString().c_str(),_remoteAddress.toString().c_str());
|
TRACE("dropped REQUEST_PROOF_OF_WORK from %s(%s): not trusted enough",peer->address().toString().c_str(),_remoteAddress.toString().c_str());
|
||||||
}
|
}
|
||||||
|
@ -244,20 +244,20 @@ public:
|
|||||||
// "Upstream" devices are roots and relays and get special treatment -- they stay alive
|
// "Upstream" devices are roots and relays and get special treatment -- they stay alive
|
||||||
// forever and we try to keep (if available) both IPv4 and IPv6 channels open to them.
|
// forever and we try to keep (if available) both IPv4 and IPv6 channels open to them.
|
||||||
bool needToContactIndirect = true;
|
bool needToContactIndirect = true;
|
||||||
if (p->doPingAndKeepalive(RR,_now,AF_INET)) {
|
if (p->doPingAndKeepalive(_now,AF_INET)) {
|
||||||
needToContactIndirect = false;
|
needToContactIndirect = false;
|
||||||
} else {
|
} else {
|
||||||
if (stableEndpoint4) {
|
if (stableEndpoint4) {
|
||||||
needToContactIndirect = false;
|
needToContactIndirect = false;
|
||||||
p->sendHELLO(RR,InetAddress(),stableEndpoint4,_now);
|
p->sendHELLO(InetAddress(),stableEndpoint4,_now);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (p->doPingAndKeepalive(RR,_now,AF_INET6)) {
|
if (p->doPingAndKeepalive(_now,AF_INET6)) {
|
||||||
needToContactIndirect = false;
|
needToContactIndirect = false;
|
||||||
} else {
|
} else {
|
||||||
if (stableEndpoint6) {
|
if (stableEndpoint6) {
|
||||||
needToContactIndirect = false;
|
needToContactIndirect = false;
|
||||||
p->sendHELLO(RR,InetAddress(),stableEndpoint6,_now);
|
p->sendHELLO(InetAddress(),stableEndpoint6,_now);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -273,7 +273,7 @@ public:
|
|||||||
lastReceiveFromUpstream = std::max(p->lastReceive(),lastReceiveFromUpstream);
|
lastReceiveFromUpstream = std::max(p->lastReceive(),lastReceiveFromUpstream);
|
||||||
} else if (p->activelyTransferringFrames(_now)) {
|
} else if (p->activelyTransferringFrames(_now)) {
|
||||||
// Normal nodes get their preferred link kept alive if the node has generated frame traffic recently
|
// Normal nodes get their preferred link kept alive if the node has generated frame traffic recently
|
||||||
p->doPingAndKeepalive(RR,_now,0);
|
p->doPingAndKeepalive(_now,0);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -101,15 +101,6 @@
|
|||||||
*/
|
*/
|
||||||
#define ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_SALSA2012 1
|
#define ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_SALSA2012 1
|
||||||
|
|
||||||
/**
|
|
||||||
* Cipher suite: PFS negotiated ephemeral cipher suite and authentication
|
|
||||||
*
|
|
||||||
* This message is encrypted with the latest negotiated ephemeral (PFS)
|
|
||||||
* key pair and cipher suite. If authentication fails, VERB_SET_EPHEMERAL_KEY
|
|
||||||
* may be sent to renegotiate ephemeral keys.
|
|
||||||
*/
|
|
||||||
#define ZT_PROTO_CIPHER_SUITE__EPHEMERAL 7
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* DEPRECATED payload encrypted flag, will be removed for re-use soon.
|
* DEPRECATED payload encrypted flag, will be removed for re-use soon.
|
||||||
*
|
*
|
||||||
@ -235,17 +226,6 @@
|
|||||||
*/
|
*/
|
||||||
#define ZT_PROTO_MIN_FRAGMENT_LENGTH ZT_PACKET_FRAGMENT_IDX_PAYLOAD
|
#define ZT_PROTO_MIN_FRAGMENT_LENGTH ZT_PACKET_FRAGMENT_IDX_PAYLOAD
|
||||||
|
|
||||||
// Ephemeral key record flags
|
|
||||||
#define ZT_PROTO_EPHEMERAL_KEY_FLAG_FIPS 0x01 // future use
|
|
||||||
|
|
||||||
// Ephemeral key record symmetric cipher types
|
|
||||||
#define ZT_PROTO_EPHEMERAL_KEY_SYMMETRIC_CIPHER_SALSA2012_POLY1305 0x01
|
|
||||||
#define ZT_PROTO_EPHEMERAL_KEY_SYMMETRIC_CIPHER_AES256_GCM 0x02
|
|
||||||
|
|
||||||
// Ephemeral key record public key types
|
|
||||||
#define ZT_PROTO_EPHEMERAL_KEY_PK_C25519 0x01
|
|
||||||
#define ZT_PROTO_EPHEMERAL_KEY_PK_NISTP256 0x02
|
|
||||||
|
|
||||||
// Field incides for parsing verbs -------------------------------------------
|
// Field incides for parsing verbs -------------------------------------------
|
||||||
|
|
||||||
// Some verbs have variable-length fields. Those aren't fully defined here
|
// Some verbs have variable-length fields. Those aren't fully defined here
|
||||||
@ -675,20 +655,11 @@ public:
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* ECHO request (a.k.a. ping):
|
* ECHO request (a.k.a. ping):
|
||||||
* <[...] arbitrary payload to be echoed back>
|
* <[...] arbitrary payload>
|
||||||
*
|
*
|
||||||
* This generates OK with a copy of the transmitted payload. No ERROR
|
* This generates OK with a copy of the transmitted payload. No ERROR
|
||||||
* is generated. Response to ECHO requests is optional and ECHO may be
|
* is generated. Response to ECHO requests is optional and ECHO may be
|
||||||
* ignored if a node detects a possible flood.
|
* ignored if a node detects a possible flood.
|
||||||
*
|
|
||||||
* There is a de-facto standard for ECHO payload. No payload indicates an
|
|
||||||
* ECHO used for path confirmation. Otherwise the first byte contains
|
|
||||||
* flags, in which currently the only flag is 0x01 for a user-requested
|
|
||||||
* echo. For user-requested echoes the result may be reported back through
|
|
||||||
* the API. Otherwise the payload is for internal use.
|
|
||||||
*
|
|
||||||
* Support for fragmented echo packets is optional and their use is not
|
|
||||||
* recommended.
|
|
||||||
*/
|
*/
|
||||||
VERB_ECHO = 8,
|
VERB_ECHO = 8,
|
||||||
|
|
||||||
|
@ -34,9 +34,9 @@ namespace ZeroTier {
|
|||||||
|
|
||||||
bool Path::send(const RuntimeEnvironment *RR,const void *data,unsigned int len,uint64_t now)
|
bool Path::send(const RuntimeEnvironment *RR,const void *data,unsigned int len,uint64_t now)
|
||||||
{
|
{
|
||||||
|
RR->antiRec->logOutgoingZT(data,len);
|
||||||
if (RR->node->putPacket(_localAddress,address(),data,len)) {
|
if (RR->node->putPacket(_localAddress,address(),data,len)) {
|
||||||
sent(now);
|
sent(now);
|
||||||
RR->antiRec->logOutgoingZT(data,len);
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
return false;
|
return false;
|
||||||
|
@ -66,6 +66,8 @@ class Path
|
|||||||
public:
|
public:
|
||||||
Path() :
|
Path() :
|
||||||
_lastSend(0),
|
_lastSend(0),
|
||||||
|
_lastPing(0),
|
||||||
|
_lastKeepalive(0),
|
||||||
_lastReceived(0),
|
_lastReceived(0),
|
||||||
_addr(),
|
_addr(),
|
||||||
_localAddress(),
|
_localAddress(),
|
||||||
@ -76,6 +78,8 @@ public:
|
|||||||
|
|
||||||
Path(const InetAddress &localAddress,const InetAddress &addr) :
|
Path(const InetAddress &localAddress,const InetAddress &addr) :
|
||||||
_lastSend(0),
|
_lastSend(0),
|
||||||
|
_lastPing(0),
|
||||||
|
_lastKeepalive(0),
|
||||||
_lastReceived(0),
|
_lastReceived(0),
|
||||||
_addr(addr),
|
_addr(addr),
|
||||||
_localAddress(localAddress),
|
_localAddress(localAddress),
|
||||||
@ -100,12 +104,30 @@ public:
|
|||||||
*/
|
*/
|
||||||
inline void sent(uint64_t t) { _lastSend = t; }
|
inline void sent(uint64_t t) { _lastSend = t; }
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Called when we've sent a ping or echo
|
||||||
|
*
|
||||||
|
* @param t Time of send
|
||||||
|
*/
|
||||||
|
inline void pinged(uint64_t t) { _lastPing = t; }
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Called when we send a NAT keepalive
|
||||||
|
*
|
||||||
|
* @param t Time of send
|
||||||
|
*/
|
||||||
|
inline void sentKeepalive(uint64_t t) { _lastKeepalive = t; }
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Called when a packet is received from this remote path
|
* Called when a packet is received from this remote path
|
||||||
*
|
*
|
||||||
* @param t Time of receive
|
* @param t Time of receive
|
||||||
*/
|
*/
|
||||||
inline void received(uint64_t t) { _lastReceived = t; }
|
inline void received(uint64_t t)
|
||||||
|
{
|
||||||
|
_lastReceived = t;
|
||||||
|
_probation = 0;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @param now Current time
|
* @param now Current time
|
||||||
@ -114,7 +136,7 @@ public:
|
|||||||
inline bool active(uint64_t now) const
|
inline bool active(uint64_t now) const
|
||||||
throw()
|
throw()
|
||||||
{
|
{
|
||||||
return ((now - _lastReceived) < ZT_PEER_ACTIVITY_TIMEOUT);
|
return (((now - _lastReceived) < ZT_PEER_ACTIVITY_TIMEOUT)&&(_probation < ZT_PEER_DEAD_PATH_DETECTION_MAX_PROBATION));
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -138,6 +160,16 @@ public:
|
|||||||
*/
|
*/
|
||||||
inline uint64_t lastSend() const throw() { return _lastSend; }
|
inline uint64_t lastSend() const throw() { return _lastSend; }
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @return Time we last pinged or dead path checked this link
|
||||||
|
*/
|
||||||
|
inline uint64_t lastPing() const throw() { return _lastPing; }
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @return Time of last keepalive
|
||||||
|
*/
|
||||||
|
inline uint64_t lastKeepalive() const throw() { return _lastKeepalive; }
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @return Time of last receive from this path
|
* @return Time of last receive from this path
|
||||||
*/
|
*/
|
||||||
@ -240,28 +272,44 @@ public:
|
|||||||
inline bool isClusterSuboptimal() const { return ((_flags & ZT_PATH_FLAG_CLUSTER_SUBOPTIMAL) != 0); }
|
inline bool isClusterSuboptimal() const { return ((_flags & ZT_PATH_FLAG_CLUSTER_SUBOPTIMAL) != 0); }
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @return Current path probation count (for dead path detect)
|
||||||
|
*/
|
||||||
|
inline unsigned int probation() const { return _probation; }
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Increase this path's probation violation count (for dead path detect)
|
||||||
|
*/
|
||||||
|
inline void increaseProbation() { ++_probation; }
|
||||||
|
|
||||||
template<unsigned int C>
|
template<unsigned int C>
|
||||||
inline void serialize(Buffer<C> &b) const
|
inline void serialize(Buffer<C> &b) const
|
||||||
{
|
{
|
||||||
b.append((uint8_t)0); // version
|
b.append((uint8_t)2); // version
|
||||||
b.append((uint64_t)_lastSend);
|
b.append((uint64_t)_lastSend);
|
||||||
|
b.append((uint64_t)_lastPing);
|
||||||
|
b.append((uint64_t)_lastKeepalive);
|
||||||
b.append((uint64_t)_lastReceived);
|
b.append((uint64_t)_lastReceived);
|
||||||
_addr.serialize(b);
|
_addr.serialize(b);
|
||||||
_localAddress.serialize(b);
|
_localAddress.serialize(b);
|
||||||
b.append((uint16_t)_flags);
|
b.append((uint16_t)_flags);
|
||||||
|
b.append((uint16_t)_probation);
|
||||||
}
|
}
|
||||||
|
|
||||||
template<unsigned int C>
|
template<unsigned int C>
|
||||||
inline unsigned int deserialize(const Buffer<C> &b,unsigned int startAt = 0)
|
inline unsigned int deserialize(const Buffer<C> &b,unsigned int startAt = 0)
|
||||||
{
|
{
|
||||||
unsigned int p = startAt;
|
unsigned int p = startAt;
|
||||||
if (b[p++] != 0)
|
if (b[p++] != 2)
|
||||||
throw std::invalid_argument("invalid serialized Path");
|
throw std::invalid_argument("invalid serialized Path");
|
||||||
_lastSend = b.template at<uint64_t>(p); p += 8;
|
_lastSend = b.template at<uint64_t>(p); p += 8;
|
||||||
|
_lastPing = b.template at<uint64_t>(p); p += 8;
|
||||||
|
_lastKeepalive = b.template at<uint64_t>(p); p += 8;
|
||||||
_lastReceived = b.template at<uint64_t>(p); p += 8;
|
_lastReceived = b.template at<uint64_t>(p); p += 8;
|
||||||
p += _addr.deserialize(b,p);
|
p += _addr.deserialize(b,p);
|
||||||
p += _localAddress.deserialize(b,p);
|
p += _localAddress.deserialize(b,p);
|
||||||
_flags = b.template at<uint16_t>(p); p += 2;
|
_flags = b.template at<uint16_t>(p); p += 2;
|
||||||
|
_probation = b.template at<uint16_t>(p); p += 2;
|
||||||
_ipScope = _addr.ipScope();
|
_ipScope = _addr.ipScope();
|
||||||
return (p - startAt);
|
return (p - startAt);
|
||||||
}
|
}
|
||||||
@ -271,10 +319,13 @@ public:
|
|||||||
|
|
||||||
private:
|
private:
|
||||||
uint64_t _lastSend;
|
uint64_t _lastSend;
|
||||||
|
uint64_t _lastPing;
|
||||||
|
uint64_t _lastKeepalive;
|
||||||
uint64_t _lastReceived;
|
uint64_t _lastReceived;
|
||||||
InetAddress _addr;
|
InetAddress _addr;
|
||||||
InetAddress _localAddress;
|
InetAddress _localAddress;
|
||||||
unsigned int _flags;
|
unsigned int _flags;
|
||||||
|
unsigned int _probation;
|
||||||
InetAddress::IpScope _ipScope; // memoize this since it's a computed value checked often
|
InetAddress::IpScope _ipScope; // memoize this since it's a computed value checked often
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -46,8 +46,8 @@ namespace ZeroTier {
|
|||||||
// Used to send varying values for NAT keepalive
|
// Used to send varying values for NAT keepalive
|
||||||
static uint32_t _natKeepaliveBuf = 0;
|
static uint32_t _natKeepaliveBuf = 0;
|
||||||
|
|
||||||
Peer::Peer(const Identity &myIdentity,const Identity &peerIdentity)
|
Peer::Peer(const RuntimeEnvironment *renv,const Identity &myIdentity,const Identity &peerIdentity) :
|
||||||
throw(std::runtime_error) :
|
RR(renv),
|
||||||
_lastUsed(0),
|
_lastUsed(0),
|
||||||
_lastReceive(0),
|
_lastReceive(0),
|
||||||
_lastUnicastFrame(0),
|
_lastUnicastFrame(0),
|
||||||
@ -72,7 +72,6 @@ Peer::Peer(const Identity &myIdentity,const Identity &peerIdentity)
|
|||||||
}
|
}
|
||||||
|
|
||||||
void Peer::received(
|
void Peer::received(
|
||||||
const RuntimeEnvironment *RR,
|
|
||||||
const InetAddress &localAddr,
|
const InetAddress &localAddr,
|
||||||
const InetAddress &remoteAddr,
|
const InetAddress &remoteAddr,
|
||||||
unsigned int hops,
|
unsigned int hops,
|
||||||
@ -169,7 +168,10 @@ void Peer::received(
|
|||||||
} else {
|
} else {
|
||||||
uint64_t slotLRmin = 0xffffffffffffffffULL;
|
uint64_t slotLRmin = 0xffffffffffffffffULL;
|
||||||
for(unsigned int p=0;p<ZT_MAX_PEER_NETWORK_PATHS;++p) {
|
for(unsigned int p=0;p<ZT_MAX_PEER_NETWORK_PATHS;++p) {
|
||||||
if (_paths[p].lastReceived() <= slotLRmin) {
|
if (!_paths[p].active(now)) {
|
||||||
|
slot = &(_paths[p]);
|
||||||
|
break;
|
||||||
|
} else if (_paths[p].lastReceived() <= slotLRmin) {
|
||||||
slotLRmin = _paths[p].lastReceived();
|
slotLRmin = _paths[p].lastReceived();
|
||||||
slot = &(_paths[p]);
|
slot = &(_paths[p]);
|
||||||
}
|
}
|
||||||
@ -199,7 +201,7 @@ void Peer::received(
|
|||||||
outp.armor(_key,true);
|
outp.armor(_key,true);
|
||||||
RR->node->putPacket(localAddr,remoteAddr,outp.data(),outp.size());
|
RR->node->putPacket(localAddr,remoteAddr,outp.data(),outp.size());
|
||||||
} else {
|
} else {
|
||||||
sendHELLO(RR,localAddr,remoteAddr,now);
|
sendHELLO(localAddr,remoteAddr,now);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
@ -214,7 +216,7 @@ void Peer::received(
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void Peer::sendHELLO(const RuntimeEnvironment *RR,const InetAddress &localAddr,const InetAddress &atAddress,uint64_t now,unsigned int ttl)
|
void Peer::sendHELLO(const InetAddress &localAddr,const InetAddress &atAddress,uint64_t now,unsigned int ttl)
|
||||||
{
|
{
|
||||||
// _lock not required here since _id is immutable and nothing else is accessed
|
// _lock not required here since _id is immutable and nothing else is accessed
|
||||||
|
|
||||||
@ -234,7 +236,7 @@ void Peer::sendHELLO(const RuntimeEnvironment *RR,const InetAddress &localAddr,c
|
|||||||
RR->node->putPacket(localAddr,atAddress,outp.data(),outp.size(),ttl);
|
RR->node->putPacket(localAddr,atAddress,outp.data(),outp.size(),ttl);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool Peer::doPingAndKeepalive(const RuntimeEnvironment *RR,uint64_t now,int inetAddressFamily)
|
bool Peer::doPingAndKeepalive(uint64_t now,int inetAddressFamily)
|
||||||
{
|
{
|
||||||
Path *p = (Path *)0;
|
Path *p = (Path *)0;
|
||||||
|
|
||||||
@ -248,13 +250,14 @@ bool Peer::doPingAndKeepalive(const RuntimeEnvironment *RR,uint64_t now,int inet
|
|||||||
if (p) {
|
if (p) {
|
||||||
if ((now - p->lastReceived()) >= ZT_PEER_DIRECT_PING_DELAY) {
|
if ((now - p->lastReceived()) >= ZT_PEER_DIRECT_PING_DELAY) {
|
||||||
//TRACE("PING %s(%s) after %llums/%llums send/receive inactivity",_id.address().toString().c_str(),p->address().toString().c_str(),now - p->lastSend(),now - p->lastReceived());
|
//TRACE("PING %s(%s) after %llums/%llums send/receive inactivity",_id.address().toString().c_str(),p->address().toString().c_str(),now - p->lastSend(),now - p->lastReceived());
|
||||||
sendHELLO(RR,p->localAddress(),p->address(),now);
|
sendHELLO(p->localAddress(),p->address(),now);
|
||||||
p->sent(now);
|
p->sent(now);
|
||||||
} else if (((now - p->lastSend()) >= ZT_NAT_KEEPALIVE_DELAY)&&(!p->reliable())) {
|
p->pinged(now);
|
||||||
|
} else if ( ((now - std::max(p->lastSend(),p->lastKeepalive())) >= ZT_NAT_KEEPALIVE_DELAY) && (!p->reliable()) ) {
|
||||||
//TRACE("NAT keepalive %s(%s) after %llums/%llums send/receive inactivity",_id.address().toString().c_str(),p->address().toString().c_str(),now - p->lastSend(),now - p->lastReceived());
|
//TRACE("NAT keepalive %s(%s) after %llums/%llums send/receive inactivity",_id.address().toString().c_str(),p->address().toString().c_str(),now - p->lastSend(),now - p->lastReceived());
|
||||||
_natKeepaliveBuf += (uint32_t)((now * 0x9e3779b1) >> 1); // tumble this around to send constantly varying (meaningless) payloads
|
_natKeepaliveBuf += (uint32_t)((now * 0x9e3779b1) >> 1); // tumble this around to send constantly varying (meaningless) payloads
|
||||||
RR->node->putPacket(p->localAddress(),p->address(),&_natKeepaliveBuf,sizeof(_natKeepaliveBuf));
|
RR->node->putPacket(p->localAddress(),p->address(),&_natKeepaliveBuf,sizeof(_natKeepaliveBuf));
|
||||||
p->sent(now);
|
p->sentKeepalive(now);
|
||||||
} else {
|
} else {
|
||||||
//TRACE("no PING or NAT keepalive: addr==%s reliable==%d %llums/%llums send/receive inactivity",p->address().toString().c_str(),(int)p->reliable(),now - p->lastSend(),now - p->lastReceived());
|
//TRACE("no PING or NAT keepalive: addr==%s reliable==%d %llums/%llums send/receive inactivity",p->address().toString().c_str(),(int)p->reliable(),now - p->lastSend(),now - p->lastReceived());
|
||||||
}
|
}
|
||||||
@ -264,7 +267,7 @@ bool Peer::doPingAndKeepalive(const RuntimeEnvironment *RR,uint64_t now,int inet
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
void Peer::pushDirectPaths(const RuntimeEnvironment *RR,Path *path,uint64_t now,bool force)
|
void Peer::pushDirectPaths(Path *path,uint64_t now,bool force)
|
||||||
{
|
{
|
||||||
#ifdef ZT_ENABLE_CLUSTER
|
#ifdef ZT_ENABLE_CLUSTER
|
||||||
// Cluster mode disables normal PUSH_DIRECT_PATHS in favor of cluster-based peer redirection
|
// Cluster mode disables normal PUSH_DIRECT_PATHS in favor of cluster-based peer redirection
|
||||||
@ -332,7 +335,7 @@ void Peer::pushDirectPaths(const RuntimeEnvironment *RR,Path *path,uint64_t now,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
bool Peer::resetWithinScope(const RuntimeEnvironment *RR,InetAddress::IpScope scope,uint64_t now)
|
bool Peer::resetWithinScope(InetAddress::IpScope scope,uint64_t now)
|
||||||
{
|
{
|
||||||
Mutex::Lock _l(_lock);
|
Mutex::Lock _l(_lock);
|
||||||
unsigned int np = _numPaths;
|
unsigned int np = _numPaths;
|
||||||
@ -340,7 +343,9 @@ bool Peer::resetWithinScope(const RuntimeEnvironment *RR,InetAddress::IpScope sc
|
|||||||
unsigned int y = 0;
|
unsigned int y = 0;
|
||||||
while (x < np) {
|
while (x < np) {
|
||||||
if (_paths[x].address().ipScope() == scope) {
|
if (_paths[x].address().ipScope() == scope) {
|
||||||
sendHELLO(RR,_paths[x].localAddress(),_paths[x].address(),now);
|
// Resetting a path means sending a HELLO and then forgetting it. If we
|
||||||
|
// get OK(HELLO) then it will be re-learned.
|
||||||
|
sendHELLO(_paths[x].localAddress(),_paths[x].address(),now);
|
||||||
} else {
|
} else {
|
||||||
_paths[y++] = _paths[x];
|
_paths[y++] = _paths[x];
|
||||||
}
|
}
|
||||||
@ -383,7 +388,7 @@ bool Peer::networkMembershipCertificatesAgree(uint64_t nwid,const CertificateOfM
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool Peer::validateAndSetNetworkMembershipCertificate(const RuntimeEnvironment *RR,uint64_t nwid,const CertificateOfMembership &com)
|
bool Peer::validateAndSetNetworkMembershipCertificate(uint64_t nwid,const CertificateOfMembership &com)
|
||||||
{
|
{
|
||||||
// Sanity checks
|
// Sanity checks
|
||||||
if ((!com)||(com.issuedTo() != _id.address()))
|
if ((!com)||(com.issuedTo() != _id.address()))
|
||||||
@ -448,7 +453,7 @@ bool Peer::needsOurNetworkMembershipCertificate(uint64_t nwid,uint64_t now,bool
|
|||||||
return ((now - tmp) >= (ZT_NETWORK_AUTOCONF_DELAY / 2));
|
return ((now - tmp) >= (ZT_NETWORK_AUTOCONF_DELAY / 2));
|
||||||
}
|
}
|
||||||
|
|
||||||
void Peer::clean(const RuntimeEnvironment *RR,uint64_t now)
|
void Peer::clean(uint64_t now)
|
||||||
{
|
{
|
||||||
Mutex::Lock _l(_lock);
|
Mutex::Lock _l(_lock);
|
||||||
|
|
||||||
@ -485,6 +490,49 @@ void Peer::clean(const RuntimeEnvironment *RR,uint64_t now)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool Peer::_checkPath(Path &p,const uint64_t now)
|
||||||
|
{
|
||||||
|
// assumes _lock is locked
|
||||||
|
|
||||||
|
if (!p.active(now))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
/* Dead path detection: if we have sent something to this peer and have not
|
||||||
|
* yet received a reply, double check this path. The majority of outbound
|
||||||
|
* packets including Ethernet frames do generate some kind of reply either
|
||||||
|
* immediately or at some point in the near future. This will occasionally
|
||||||
|
* (every NO_ANSWER_TIMEOUT ms) check paths unnecessarily if traffic that
|
||||||
|
* does not generate a response is being sent such as multicast announcements
|
||||||
|
* or frames belonging to unidirectional UDP protocols, but the cost is very
|
||||||
|
* tiny and the benefit in reliability is very large. This takes care of many
|
||||||
|
* failure modes including crap NATs that forget links and spurious changes
|
||||||
|
* to physical network topology that cannot be otherwise detected.
|
||||||
|
*
|
||||||
|
* Each time we do this we increment a probation counter in the path. This
|
||||||
|
* counter is reset on any packet receive over this path. If it reaches the
|
||||||
|
* MAX_PROBATION threshold the path is considred dead. */
|
||||||
|
|
||||||
|
if ( (p.lastSend() > p.lastReceived()) && ((p.lastSend() - p.lastReceived()) >= ZT_PEER_DEAD_PATH_DETECTION_NO_ANSWER_TIMEOUT) && ((now - p.lastPing()) >= ZT_PEER_DEAD_PATH_DETECTION_NO_ANSWER_TIMEOUT) ) {
|
||||||
|
TRACE("%s(%s) does not seem to be answering in a timely manner, checking if dead (probation == %u)",_id.address().toString().c_str(),p.address().toString().c_str(),p.probation());
|
||||||
|
|
||||||
|
if ( (_vProto >= 5) && ( !((_vMajor == 1)&&(_vMinor == 1)&&(_vRevision == 0)) ) ) {
|
||||||
|
// 1.1.1 and newer nodes support ECHO, which is smaller -- but 1.1.0 has a bug so use HELLO there too
|
||||||
|
Packet outp(_id.address(),RR->identity.address(),Packet::VERB_ECHO);
|
||||||
|
outp.armor(_key,true);
|
||||||
|
p.send(RR,outp.data(),outp.size(),now);
|
||||||
|
p.pinged(now);
|
||||||
|
} else {
|
||||||
|
sendHELLO(p.localAddress(),p.address(),now);
|
||||||
|
p.sent(now);
|
||||||
|
p.pinged(now);
|
||||||
|
}
|
||||||
|
|
||||||
|
p.increaseProbation();
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
Path *Peer::_getBestPath(const uint64_t now)
|
Path *Peer::_getBestPath(const uint64_t now)
|
||||||
{
|
{
|
||||||
// assumes _lock is locked
|
// assumes _lock is locked
|
||||||
@ -492,7 +540,7 @@ Path *Peer::_getBestPath(const uint64_t now)
|
|||||||
uint64_t bestPathScore = 0;
|
uint64_t bestPathScore = 0;
|
||||||
for(unsigned int i=0;i<_numPaths;++i) {
|
for(unsigned int i=0;i<_numPaths;++i) {
|
||||||
const uint64_t score = _paths[i].score();
|
const uint64_t score = _paths[i].score();
|
||||||
if ((score >= bestPathScore)&&(_paths[i].active(now))) {
|
if ((score >= bestPathScore)&&(_checkPath(_paths[i],now))) {
|
||||||
bestPathScore = score;
|
bestPathScore = score;
|
||||||
bestPath = &(_paths[i]);
|
bestPath = &(_paths[i]);
|
||||||
}
|
}
|
||||||
@ -507,7 +555,7 @@ Path *Peer::_getBestPath(const uint64_t now,int inetAddressFamily)
|
|||||||
uint64_t bestPathScore = 0;
|
uint64_t bestPathScore = 0;
|
||||||
for(unsigned int i=0;i<_numPaths;++i) {
|
for(unsigned int i=0;i<_numPaths;++i) {
|
||||||
const uint64_t score = _paths[i].score();
|
const uint64_t score = _paths[i].score();
|
||||||
if (((int)_paths[i].address().ss_family == inetAddressFamily)&&(score >= bestPathScore)&&(_paths[i].active(now))) {
|
if (((int)_paths[i].address().ss_family == inetAddressFamily)&&(score >= bestPathScore)&&(_checkPath(_paths[i],now))) {
|
||||||
bestPathScore = score;
|
bestPathScore = score;
|
||||||
bestPath = &(_paths[i]);
|
bestPath = &(_paths[i]);
|
||||||
}
|
}
|
||||||
|
@ -75,12 +75,12 @@ public:
|
|||||||
/**
|
/**
|
||||||
* Construct a new peer
|
* Construct a new peer
|
||||||
*
|
*
|
||||||
|
* @param renv Runtime environment
|
||||||
* @param myIdentity Identity of THIS node (for key agreement)
|
* @param myIdentity Identity of THIS node (for key agreement)
|
||||||
* @param peerIdentity Identity of peer
|
* @param peerIdentity Identity of peer
|
||||||
* @throws std::runtime_error Key agreement with peer's identity failed
|
* @throws std::runtime_error Key agreement with peer's identity failed
|
||||||
*/
|
*/
|
||||||
Peer(const Identity &myIdentity,const Identity &peerIdentity)
|
Peer(const RuntimeEnvironment *renv,const Identity &myIdentity,const Identity &peerIdentity);
|
||||||
throw(std::runtime_error);
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @return Time peer record was last used in any way
|
* @return Time peer record was last used in any way
|
||||||
@ -120,7 +120,6 @@ public:
|
|||||||
* @param inReVerb Verb in reply to (for OK/ERROR, default: VERB_NOP)
|
* @param inReVerb Verb in reply to (for OK/ERROR, default: VERB_NOP)
|
||||||
*/
|
*/
|
||||||
void received(
|
void received(
|
||||||
const RuntimeEnvironment *RR,
|
|
||||||
const InetAddress &localAddr,
|
const InetAddress &localAddr,
|
||||||
const InetAddress &remoteAddr,
|
const InetAddress &remoteAddr,
|
||||||
unsigned int hops,
|
unsigned int hops,
|
||||||
@ -144,13 +143,12 @@ public:
|
|||||||
/**
|
/**
|
||||||
* Send via best path
|
* Send via best path
|
||||||
*
|
*
|
||||||
* @param RR Runtime environment
|
|
||||||
* @param data Packet data
|
* @param data Packet data
|
||||||
* @param len Packet length
|
* @param len Packet length
|
||||||
* @param now Current time
|
* @param now Current time
|
||||||
* @return Path used on success or NULL on failure
|
* @return Path used on success or NULL on failure
|
||||||
*/
|
*/
|
||||||
inline Path *send(const RuntimeEnvironment *RR,const void *data,unsigned int len,uint64_t now)
|
inline Path *send(const void *data,unsigned int len,uint64_t now)
|
||||||
{
|
{
|
||||||
Path *const bestPath = getBestPath(now);
|
Path *const bestPath = getBestPath(now);
|
||||||
if (bestPath) {
|
if (bestPath) {
|
||||||
@ -166,33 +164,30 @@ public:
|
|||||||
* This does not update any statistics. It's used to send initial HELLOs
|
* This does not update any statistics. It's used to send initial HELLOs
|
||||||
* for NAT traversal and path verification.
|
* for NAT traversal and path verification.
|
||||||
*
|
*
|
||||||
* @param RR Runtime environment
|
|
||||||
* @param localAddr Local address
|
* @param localAddr Local address
|
||||||
* @param atAddress Destination address
|
* @param atAddress Destination address
|
||||||
* @param now Current time
|
* @param now Current time
|
||||||
* @param ttl Desired IP TTL (default: 0 to leave alone)
|
* @param ttl Desired IP TTL (default: 0 to leave alone)
|
||||||
*/
|
*/
|
||||||
void sendHELLO(const RuntimeEnvironment *RR,const InetAddress &localAddr,const InetAddress &atAddress,uint64_t now,unsigned int ttl = 0);
|
void sendHELLO(const InetAddress &localAddr,const InetAddress &atAddress,uint64_t now,unsigned int ttl = 0);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Send pings or keepalives depending on configured timeouts
|
* Send pings or keepalives depending on configured timeouts
|
||||||
*
|
*
|
||||||
* @param RR Runtime environment
|
|
||||||
* @param now Current time
|
* @param now Current time
|
||||||
* @param inetAddressFamily Keep this address family alive, or 0 to simply pick current best ignoring family
|
* @param inetAddressFamily Keep this address family alive, or 0 to simply pick current best ignoring family
|
||||||
* @return True if at least one direct path seems alive
|
* @return True if at least one direct path seems alive
|
||||||
*/
|
*/
|
||||||
bool doPingAndKeepalive(const RuntimeEnvironment *RR,uint64_t now,int inetAddressFamily);
|
bool doPingAndKeepalive(uint64_t now,int inetAddressFamily);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Push direct paths back to self if we haven't done so in the configured timeout
|
* Push direct paths back to self if we haven't done so in the configured timeout
|
||||||
*
|
*
|
||||||
* @param RR Runtime environment
|
|
||||||
* @param path Remote path to use to send the push
|
* @param path Remote path to use to send the push
|
||||||
* @param now Current time
|
* @param now Current time
|
||||||
* @param force If true, push regardless of rate limit
|
* @param force If true, push regardless of rate limit
|
||||||
*/
|
*/
|
||||||
void pushDirectPaths(const RuntimeEnvironment *RR,Path *path,uint64_t now,bool force);
|
void pushDirectPaths(Path *path,uint64_t now,bool force);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @return All known direct paths to this peer
|
* @return All known direct paths to this peer
|
||||||
@ -324,12 +319,11 @@ public:
|
|||||||
/**
|
/**
|
||||||
* Reset paths within a given scope
|
* Reset paths within a given scope
|
||||||
*
|
*
|
||||||
* @param RR Runtime environment
|
|
||||||
* @param scope IP scope of paths to reset
|
* @param scope IP scope of paths to reset
|
||||||
* @param now Current time
|
* @param now Current time
|
||||||
* @return True if at least one path was forgotten
|
* @return True if at least one path was forgotten
|
||||||
*/
|
*/
|
||||||
bool resetWithinScope(const RuntimeEnvironment *RR,InetAddress::IpScope scope,uint64_t now);
|
bool resetWithinScope(InetAddress::IpScope scope,uint64_t now);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @return 256-bit secret symmetric encryption key
|
* @return 256-bit secret symmetric encryption key
|
||||||
@ -383,11 +377,10 @@ public:
|
|||||||
/**
|
/**
|
||||||
* Check the validity of the COM and add/update if valid and new
|
* Check the validity of the COM and add/update if valid and new
|
||||||
*
|
*
|
||||||
* @param RR Runtime Environment
|
|
||||||
* @param nwid Network ID
|
* @param nwid Network ID
|
||||||
* @param com Externally supplied COM
|
* @param com Externally supplied COM
|
||||||
*/
|
*/
|
||||||
bool validateAndSetNetworkMembershipCertificate(const RuntimeEnvironment *RR,uint64_t nwid,const CertificateOfMembership &com);
|
bool validateAndSetNetworkMembershipCertificate(uint64_t nwid,const CertificateOfMembership &com);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @param nwid Network ID
|
* @param nwid Network ID
|
||||||
@ -399,8 +392,10 @@ public:
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Perform periodic cleaning operations
|
* Perform periodic cleaning operations
|
||||||
|
*
|
||||||
|
* @param now Current time
|
||||||
*/
|
*/
|
||||||
void clean(const RuntimeEnvironment *RR,uint64_t now);
|
void clean(uint64_t now);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Update direct path push stats and return true if we should respond
|
* Update direct path push stats and return true if we should respond
|
||||||
@ -503,13 +498,14 @@ public:
|
|||||||
/**
|
/**
|
||||||
* Create a new Peer from a serialized instance
|
* Create a new Peer from a serialized instance
|
||||||
*
|
*
|
||||||
|
* @param renv Runtime environment
|
||||||
* @param myIdentity This node's identity
|
* @param myIdentity This node's identity
|
||||||
* @param b Buffer containing serialized Peer data
|
* @param b Buffer containing serialized Peer data
|
||||||
* @param p Pointer to current position in buffer, will be updated in place as buffer is read (value/result)
|
* @param p Pointer to current position in buffer, will be updated in place as buffer is read (value/result)
|
||||||
* @return New instance of Peer or NULL if serialized data was corrupt or otherwise invalid (may also throw an exception via Buffer)
|
* @return New instance of Peer or NULL if serialized data was corrupt or otherwise invalid (may also throw an exception via Buffer)
|
||||||
*/
|
*/
|
||||||
template<unsigned int C>
|
template<unsigned int C>
|
||||||
static inline SharedPtr<Peer> deserializeNew(const Identity &myIdentity,const Buffer<C> &b,unsigned int &p)
|
static inline SharedPtr<Peer> deserializeNew(const RuntimeEnvironment *renv,const Identity &myIdentity,const Buffer<C> &b,unsigned int &p)
|
||||||
{
|
{
|
||||||
const unsigned int recSize = b.template at<uint32_t>(p); p += 4;
|
const unsigned int recSize = b.template at<uint32_t>(p); p += 4;
|
||||||
if ((p + recSize) > b.size())
|
if ((p + recSize) > b.size())
|
||||||
@ -523,7 +519,7 @@ public:
|
|||||||
if (!npid)
|
if (!npid)
|
||||||
return SharedPtr<Peer>();
|
return SharedPtr<Peer>();
|
||||||
|
|
||||||
SharedPtr<Peer> np(new Peer(myIdentity,npid));
|
SharedPtr<Peer> np(new Peer(renv,myIdentity,npid));
|
||||||
|
|
||||||
np->_lastUsed = b.template at<uint64_t>(p); p += 8;
|
np->_lastUsed = b.template at<uint64_t>(p); p += 8;
|
||||||
np->_lastReceive = b.template at<uint64_t>(p); p += 8;
|
np->_lastReceive = b.template at<uint64_t>(p); p += 8;
|
||||||
@ -569,11 +565,13 @@ public:
|
|||||||
}
|
}
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
bool _checkPath(Path &p,const uint64_t now);
|
||||||
Path *_getBestPath(const uint64_t now);
|
Path *_getBestPath(const uint64_t now);
|
||||||
Path *_getBestPath(const uint64_t now,int inetAddressFamily);
|
Path *_getBestPath(const uint64_t now,int inetAddressFamily);
|
||||||
|
|
||||||
unsigned char _key[ZT_PEER_SECRET_KEY_LENGTH]; // computed with key agreement, not serialized
|
unsigned char _key[ZT_PEER_SECRET_KEY_LENGTH]; // computed with key agreement, not serialized
|
||||||
|
|
||||||
|
const RuntimeEnvironment *RR;
|
||||||
uint64_t _lastUsed;
|
uint64_t _lastUsed;
|
||||||
uint64_t _lastReceive; // direct or indirect
|
uint64_t _lastReceive; // direct or indirect
|
||||||
uint64_t _lastUnicastFrame;
|
uint64_t _lastUnicastFrame;
|
||||||
|
@ -46,21 +46,19 @@ namespace ZeroTier {
|
|||||||
class _ResetWithinScope
|
class _ResetWithinScope
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
_ResetWithinScope(const RuntimeEnvironment *renv,uint64_t now,InetAddress::IpScope scope) :
|
_ResetWithinScope(uint64_t now,InetAddress::IpScope scope) :
|
||||||
RR(renv),
|
|
||||||
_now(now),
|
_now(now),
|
||||||
_scope(scope) {}
|
_scope(scope) {}
|
||||||
|
|
||||||
inline void operator()(Topology &t,const SharedPtr<Peer> &p)
|
inline void operator()(Topology &t,const SharedPtr<Peer> &p)
|
||||||
{
|
{
|
||||||
if (p->resetWithinScope(RR,_scope,_now))
|
if (p->resetWithinScope(_scope,_now))
|
||||||
peersReset.push_back(p);
|
peersReset.push_back(p);
|
||||||
}
|
}
|
||||||
|
|
||||||
std::vector< SharedPtr<Peer> > peersReset;
|
std::vector< SharedPtr<Peer> > peersReset;
|
||||||
|
|
||||||
private:
|
private:
|
||||||
const RuntimeEnvironment *RR;
|
|
||||||
uint64_t _now;
|
uint64_t _now;
|
||||||
InetAddress::IpScope _scope;
|
InetAddress::IpScope _scope;
|
||||||
};
|
};
|
||||||
@ -121,7 +119,7 @@ void SelfAwareness::iam(const Address &reporter,const InetAddress &reporterPhysi
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Reset all paths within this scope
|
// Reset all paths within this scope
|
||||||
_ResetWithinScope rset(RR,now,(InetAddress::IpScope)scope);
|
_ResetWithinScope rset(now,(InetAddress::IpScope)scope);
|
||||||
RR->topology->eachPeer<_ResetWithinScope &>(rset);
|
RR->topology->eachPeer<_ResetWithinScope &>(rset);
|
||||||
|
|
||||||
// Send a NOP to all peers for whom we forgot a path. This will cause direct
|
// Send a NOP to all peers for whom we forgot a path. This will cause direct
|
||||||
|
@ -408,7 +408,7 @@ bool Switch::unite(const Address &p1,const Address &p2)
|
|||||||
outp.append(cg.first.rawIpData(),4);
|
outp.append(cg.first.rawIpData(),4);
|
||||||
}
|
}
|
||||||
outp.armor(p1p->key(),true);
|
outp.armor(p1p->key(),true);
|
||||||
p1p->send(RR,outp.data(),outp.size(),now);
|
p1p->send(outp.data(),outp.size(),now);
|
||||||
} else {
|
} else {
|
||||||
// Tell p2 where to find p1.
|
// Tell p2 where to find p1.
|
||||||
Packet outp(p2,RR->identity.address(),Packet::VERB_RENDEZVOUS);
|
Packet outp(p2,RR->identity.address(),Packet::VERB_RENDEZVOUS);
|
||||||
@ -423,7 +423,7 @@ bool Switch::unite(const Address &p1,const Address &p2)
|
|||||||
outp.append(cg.second.rawIpData(),4);
|
outp.append(cg.second.rawIpData(),4);
|
||||||
}
|
}
|
||||||
outp.armor(p2p->key(),true);
|
outp.armor(p2p->key(),true);
|
||||||
p2p->send(RR,outp.data(),outp.size(),now);
|
p2p->send(outp.data(),outp.size(),now);
|
||||||
}
|
}
|
||||||
++alt; // counts up and also flips LSB
|
++alt; // counts up and also flips LSB
|
||||||
}
|
}
|
||||||
@ -435,7 +435,7 @@ void Switch::rendezvous(const SharedPtr<Peer> &peer,const InetAddress &localAddr
|
|||||||
{
|
{
|
||||||
TRACE("sending NAT-t message to %s(%s)",peer->address().toString().c_str(),atAddr.toString().c_str());
|
TRACE("sending NAT-t message to %s(%s)",peer->address().toString().c_str(),atAddr.toString().c_str());
|
||||||
const uint64_t now = RR->node->now();
|
const uint64_t now = RR->node->now();
|
||||||
peer->sendHELLO(RR,localAddr,atAddr,now,2); // first attempt: send low-TTL packet to 'open' local NAT
|
peer->sendHELLO(localAddr,atAddr,now,2); // first attempt: send low-TTL packet to 'open' local NAT
|
||||||
{
|
{
|
||||||
Mutex::Lock _l(_contactQueue_m);
|
Mutex::Lock _l(_contactQueue_m);
|
||||||
_contactQueue.push_back(ContactQueueEntry(peer,now + ZT_NAT_T_TACTICAL_ESCALATION_DELAY,localAddr,atAddr));
|
_contactQueue.push_back(ContactQueueEntry(peer,now + ZT_NAT_T_TACTICAL_ESCALATION_DELAY,localAddr,atAddr));
|
||||||
@ -508,14 +508,14 @@ unsigned long Switch::doTimerTasks(uint64_t now)
|
|||||||
} else {
|
} else {
|
||||||
if (qi->strategyIteration == 0) {
|
if (qi->strategyIteration == 0) {
|
||||||
// First strategy: send packet directly to destination
|
// First strategy: send packet directly to destination
|
||||||
qi->peer->sendHELLO(RR,qi->localAddr,qi->inaddr,now);
|
qi->peer->sendHELLO(qi->localAddr,qi->inaddr,now);
|
||||||
} else if (qi->strategyIteration <= 3) {
|
} else if (qi->strategyIteration <= 3) {
|
||||||
// Strategies 1-3: try escalating ports for symmetric NATs that remap sequentially
|
// Strategies 1-3: try escalating ports for symmetric NATs that remap sequentially
|
||||||
InetAddress tmpaddr(qi->inaddr);
|
InetAddress tmpaddr(qi->inaddr);
|
||||||
int p = (int)qi->inaddr.port() + qi->strategyIteration;
|
int p = (int)qi->inaddr.port() + qi->strategyIteration;
|
||||||
if (p < 0xffff) {
|
if (p < 0xffff) {
|
||||||
tmpaddr.setPort((unsigned int)p);
|
tmpaddr.setPort((unsigned int)p);
|
||||||
qi->peer->sendHELLO(RR,qi->localAddr,tmpaddr,now);
|
qi->peer->sendHELLO(qi->localAddr,tmpaddr,now);
|
||||||
} else qi->strategyIteration = 5;
|
} else qi->strategyIteration = 5;
|
||||||
} else {
|
} else {
|
||||||
// All strategies tried, expire entry
|
// All strategies tried, expire entry
|
||||||
@ -619,7 +619,7 @@ void Switch::_handleRemotePacketFragment(const InetAddress &localAddr,const Inet
|
|||||||
// Note: we don't bother initiating NAT-t for fragments, since heads will set that off.
|
// Note: we don't bother initiating NAT-t for fragments, since heads will set that off.
|
||||||
// It wouldn't hurt anything, just redundant and unnecessary.
|
// It wouldn't hurt anything, just redundant and unnecessary.
|
||||||
SharedPtr<Peer> relayTo = RR->topology->getPeer(destination);
|
SharedPtr<Peer> relayTo = RR->topology->getPeer(destination);
|
||||||
if ((!relayTo)||(!relayTo->send(RR,fragment.data(),fragment.size(),RR->node->now()))) {
|
if ((!relayTo)||(!relayTo->send(fragment.data(),fragment.size(),RR->node->now()))) {
|
||||||
#ifdef ZT_ENABLE_CLUSTER
|
#ifdef ZT_ENABLE_CLUSTER
|
||||||
if (RR->cluster) {
|
if (RR->cluster) {
|
||||||
RR->cluster->sendViaCluster(Address(),destination,fragment.data(),fragment.size(),false);
|
RR->cluster->sendViaCluster(Address(),destination,fragment.data(),fragment.size(),false);
|
||||||
@ -630,7 +630,7 @@ void Switch::_handleRemotePacketFragment(const InetAddress &localAddr,const Inet
|
|||||||
// Don't know peer or no direct path -- so relay via root server
|
// Don't know peer or no direct path -- so relay via root server
|
||||||
relayTo = RR->topology->getBestRoot();
|
relayTo = RR->topology->getBestRoot();
|
||||||
if (relayTo)
|
if (relayTo)
|
||||||
relayTo->send(RR,fragment.data(),fragment.size(),RR->node->now());
|
relayTo->send(fragment.data(),fragment.size(),RR->node->now());
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
TRACE("dropped relay [fragment](%s) -> %s, max hops exceeded",fromAddr.toString().c_str(),destination.toString().c_str());
|
TRACE("dropped relay [fragment](%s) -> %s, max hops exceeded",fromAddr.toString().c_str(),destination.toString().c_str());
|
||||||
@ -705,7 +705,7 @@ void Switch::_handleRemotePacketHead(const InetAddress &localAddr,const InetAddr
|
|||||||
packet->incrementHops();
|
packet->incrementHops();
|
||||||
|
|
||||||
SharedPtr<Peer> relayTo = RR->topology->getPeer(destination);
|
SharedPtr<Peer> relayTo = RR->topology->getPeer(destination);
|
||||||
if ((relayTo)&&((relayTo->send(RR,packet->data(),packet->size(),now)))) {
|
if ((relayTo)&&((relayTo->send(packet->data(),packet->size(),now)))) {
|
||||||
Mutex::Lock _l(_lastUniteAttempt_m);
|
Mutex::Lock _l(_lastUniteAttempt_m);
|
||||||
uint64_t &luts = _lastUniteAttempt[_LastUniteKey(source,destination)];
|
uint64_t &luts = _lastUniteAttempt[_LastUniteKey(source,destination)];
|
||||||
if ((now - luts) >= ZT_MIN_UNITE_INTERVAL) {
|
if ((now - luts) >= ZT_MIN_UNITE_INTERVAL) {
|
||||||
@ -730,7 +730,7 @@ void Switch::_handleRemotePacketHead(const InetAddress &localAddr,const InetAddr
|
|||||||
|
|
||||||
relayTo = RR->topology->getBestRoot(&source,1,true);
|
relayTo = RR->topology->getBestRoot(&source,1,true);
|
||||||
if (relayTo)
|
if (relayTo)
|
||||||
relayTo->send(RR,packet->data(),packet->size(),now);
|
relayTo->send(packet->data(),packet->size(),now);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
TRACE("dropped relay %s(%s) -> %s, max hops exceeded",packet->source().toString().c_str(),fromAddr.toString().c_str(),destination.toString().c_str());
|
TRACE("dropped relay %s(%s) -> %s, max hops exceeded",packet->source().toString().c_str(),fromAddr.toString().c_str(),destination.toString().c_str());
|
||||||
@ -787,7 +787,7 @@ Address Switch::_sendWhoisRequest(const Address &addr,const Address *peersAlread
|
|||||||
Packet outp(root->address(),RR->identity.address(),Packet::VERB_WHOIS);
|
Packet outp(root->address(),RR->identity.address(),Packet::VERB_WHOIS);
|
||||||
addr.appendTo(outp);
|
addr.appendTo(outp);
|
||||||
outp.armor(root->key(),true);
|
outp.armor(root->key(),true);
|
||||||
if (root->send(RR,outp.data(),outp.size(),RR->node->now()))
|
if (root->send(outp.data(),outp.size(),RR->node->now()))
|
||||||
return root->address();
|
return root->address();
|
||||||
}
|
}
|
||||||
return Address();
|
return Address();
|
||||||
@ -841,7 +841,7 @@ bool Switch::_trySend(const Packet &packet,bool encrypt,uint64_t nwid)
|
|||||||
|
|
||||||
if ((network)&&(relay)&&(network->isAllowed(peer))) {
|
if ((network)&&(relay)&&(network->isAllowed(peer))) {
|
||||||
// Push hints for direct connectivity to this peer if we are relaying
|
// Push hints for direct connectivity to this peer if we are relaying
|
||||||
peer->pushDirectPaths(RR,viaPath,now,false);
|
peer->pushDirectPaths(viaPath,now,false);
|
||||||
}
|
}
|
||||||
|
|
||||||
Packet tmp(packet);
|
Packet tmp(packet);
|
||||||
|
@ -67,7 +67,7 @@ Topology::Topology(const RuntimeEnvironment *renv) :
|
|||||||
);
|
);
|
||||||
unsigned int pos = 0;
|
unsigned int pos = 0;
|
||||||
deserializeBuf->copyFrom(all + ptr,reclen + 4);
|
deserializeBuf->copyFrom(all + ptr,reclen + 4);
|
||||||
SharedPtr<Peer> p(Peer::deserializeNew(RR->identity,*deserializeBuf,pos));
|
SharedPtr<Peer> p(Peer::deserializeNew(RR,RR->identity,*deserializeBuf,pos));
|
||||||
ptr += pos;
|
ptr += pos;
|
||||||
if (!p)
|
if (!p)
|
||||||
break; // stop if invalid records
|
break; // stop if invalid records
|
||||||
@ -180,7 +180,7 @@ SharedPtr<Peer> Topology::getPeer(const Address &zta)
|
|||||||
try {
|
try {
|
||||||
Identity id(_getIdentity(zta));
|
Identity id(_getIdentity(zta));
|
||||||
if (id) {
|
if (id) {
|
||||||
SharedPtr<Peer> np(new Peer(RR->identity,id));
|
SharedPtr<Peer> np(new Peer(RR,RR->identity,id));
|
||||||
{
|
{
|
||||||
Mutex::Lock _l(_lock);
|
Mutex::Lock _l(_lock);
|
||||||
SharedPtr<Peer> &ap = _peers[zta];
|
SharedPtr<Peer> &ap = _peers[zta];
|
||||||
@ -327,7 +327,7 @@ void Topology::clean(uint64_t now)
|
|||||||
if (((now - (*p)->lastUsed()) >= ZT_PEER_IN_MEMORY_EXPIRATION)&&(std::find(_rootAddresses.begin(),_rootAddresses.end(),*a) == _rootAddresses.end())) {
|
if (((now - (*p)->lastUsed()) >= ZT_PEER_IN_MEMORY_EXPIRATION)&&(std::find(_rootAddresses.begin(),_rootAddresses.end(),*a) == _rootAddresses.end())) {
|
||||||
_peers.erase(*a);
|
_peers.erase(*a);
|
||||||
} else {
|
} else {
|
||||||
(*p)->clean(RR,now);
|
(*p)->clean(now);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -361,7 +361,7 @@ void Topology::_setWorld(const World &newWorld)
|
|||||||
if (rp) {
|
if (rp) {
|
||||||
_rootPeers.push_back(*rp);
|
_rootPeers.push_back(*rp);
|
||||||
} else {
|
} else {
|
||||||
SharedPtr<Peer> newrp(new Peer(RR->identity,r->identity));
|
SharedPtr<Peer> newrp(new Peer(RR,RR->identity,r->identity));
|
||||||
_peers.set(r->identity.address(),newrp);
|
_peers.set(r->identity.address(),newrp);
|
||||||
_rootPeers.push_back(newrp);
|
_rootPeers.push_back(newrp);
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user