serval-dna/overlay_address.c
2018-06-01 17:40:09 +09:30

573 lines
19 KiB
C

/*
Serval DNA MDP addressing
Copyright (C) 2016-2018 Flinders University
Copyright (C) 2012-2015 Serval Project Inc.
Copyright (C) 2012 Paul Gardner-Stephen
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*/
/*
Smart-flooding of broadcast information is also a requirement. The long addresses help here, as we can make any address that begins
with the first 192 bits all ones be broadcast, and use the remaining 64 bits as a "broadcast packet identifier" (BPI).
Nodes can remember recently seen BPIs and not forward broadcast frames that have been seen recently. This should get us smart flooding
of the majority of a mesh (with some node mobility issues being a factor). We could refine this later, but it will do for now, especially
since for things like number resolution we are happy to send repeat requests.
*/
#include <assert.h>
#include <arpa/inet.h>
#include "lang.h" // for bool_t
#include "serval.h"
#include "conf.h"
#include "keyring.h"
#include "crypto.h"
#include "str.h"
#include "overlay_address.h"
#include "overlay_buffer.h"
#include "overlay_interface.h"
#include "overlay_packet.h"
#include "server.h"
#include "route_link.h"
#include "commandline.h"
#include "debug.h"
#define MAX_BPIS 1024
#define BPI_MASK 0x3ff
static struct broadcast bpilist[MAX_BPIS];
#define OA_CODE_SELF 0xff
#define OA_CODE_PREVIOUS 0xfe
#define OA_CODE_P2P_YOU 0xfd
#define OA_CODE_P2P_ME 0xfc
#define OA_CODE_SIGNKEY 0xfb // full sign key of an identity, from which a SID can be derived
static __thread struct tree_root root={.index_size_bytes=SID_SIZE};
static __thread bool_t primary_sid_written = 0;
static __thread struct subscriber *primary_sid = NULL;
static __thread struct subscriber *my_subscriber = NULL;
struct subscriber *get_my_subscriber(bool_t create)
{
if (serverMode == SERVER_NOT_RUNNING)
return NULL;
if (my_subscriber && my_subscriber->reachable != REACHABLE_SELF)
my_subscriber = NULL;
// Look for a reachable self-identity in the keyring.
if (!my_subscriber) {
assert(keyring != NULL);
keyring_identity *id;
for (id = keyring->identities; id; id = id->next)
if (id->subscriber->reachable == REACHABLE_SELF) {
my_subscriber = id->subscriber;
break;
}
}
// If there is no reachable self-identity in the keyring, then roll one in-memory, which will
// persist until the server terminates.
if (!my_subscriber && create) {
keyring_identity *id = keyring_inmemory_identity();
if (id)
my_subscriber = id->subscriber;
}
// Normally, the server creates files in proc/ before it creates its pidfile, and does not modify
// those files while running. This avoids any race conditions with other processes that read the
// files. In this case, the proc/primary_sid file is written _after_ the pidfile, and could
// potentially be re-written while running (eg, if the primary identity is deleted, causing the
// server to choose another). Potential race conditions are avoided because (1) the size of the
// file never alters, and (2) the server_write_proc_state() function overwrites any existing
// content using a single, indivisible write(2) system call.
if (!primary_sid_written || primary_sid != my_subscriber) {
primary_sid = my_subscriber;
if (my_subscriber) {
const char *sidhex = alloca_tohex_sid_t(primary_sid->sid);
server_write_proc_state("primary_sid", "%s", sidhex);
INFOF("PRIMARY IDENTITY sid=%s", sidhex);
}
else {
server_unlink_proc_state("primary_sid");
INFOF("NO PRIMARY IDENTITY");
}
primary_sid_written = 1;
}
return my_subscriber;
}
void release_my_subscriber()
{
if (my_subscriber && my_subscriber->identity->slot==0) {
assert(keyring != NULL);
keyring_free_identity(keyring, my_subscriber->identity);
}
server_unlink_proc_state("primary_sid");
my_subscriber = NULL;
primary_sid = NULL;
primary_sid_written = 0;
}
static int free_node(void **record, void *UNUSED(context))
{
struct subscriber *subscriber = (struct subscriber *)*record;
if (subscriber->link_state || subscriber->destination)
FATALF("Can't free a subscriber that is being used in routing (%s, %p, %p)",
alloca_tohex_sid_t(subscriber->sid), subscriber->link_state, subscriber->destination);
if (subscriber->sync_state)
FATALF("Can't free a subscriber that is being used by rhizome (%s, %p)",
alloca_tohex_sid_t(subscriber->sid), subscriber->sync_state);
if (subscriber->identity)
FATAL("Can't free a subscriber that is unlocked in the keyring");
if (subscriber == my_subscriber)
FATAL("Can't free a subscriber that is the primary identity");
free(subscriber);
*record=NULL;
return 0;
}
void free_subscribers()
{
// don't attempt to free anything if we're running as a server
// who knows where subscriber ptr's may have leaked to.
if (serverMode != SERVER_NOT_RUNNING)
FATAL("Freeing subscribers from a running daemon is not supported");
tree_walk(&root, NULL, 0, free_node, NULL);
}
static void *create_subscriber(void *UNUSED(context), const uint8_t *binary, size_t bin_length)
{
assert(bin_length == SID_SIZE);
struct subscriber *ret = (struct subscriber *) emalloc_zero(sizeof(struct subscriber));
if (ret){
ret->sid = *(const sid_t *)binary;
DEBUGF(subscriber, "Stored %s", alloca_tohex_sid_t(ret->sid));
}
return ret;
}
// find a subscriber struct from a whole or abbreviated subscriber id
struct subscriber *find_subscriber(const uint8_t *sidp, int len, int create)
{
struct subscriber *result;
tree_find(&root, (void**)&result, sidp, len, create && len == SID_SIZE ? create_subscriber : NULL, NULL);
// ignore return code, just return the result
return result;
}
// iterate over subscribers in ascending binary order
void subscriber_iterator_start(subscriber_iterator *it)
{
tree_iterator_start(&it->tree_iterator, &root);
}
void subscriber_iterator_advance_to(subscriber_iterator *it, const sid_t *sid)
{
tree_iterator_advance_to(&it->tree_iterator, sid->binary, sizeof sid->binary);
}
struct subscriber **subscriber_iterator_get_current(subscriber_iterator *it)
{
return (struct subscriber **) tree_iterator_get_node(&it->tree_iterator);
}
void subscriber_iterator_advance(subscriber_iterator *it)
{
tree_iterator_advance(&it->tree_iterator);
}
void subscriber_iterator_free(subscriber_iterator *it)
{
tree_iterator_free(&it->tree_iterator);
}
/*
walk the tree, starting at start inclusive, calling the supplied callback function
*/
void enum_subscribers(struct subscriber *start, walk_callback callback, void *context)
{
tree_walk(&root, start?start->sid.binary:NULL, SID_SIZE, callback, context);
}
// generate a new random broadcast address
int overlay_broadcast_generate_address(struct broadcast *addr)
{
int i;
for(i=0;i<BROADCAST_LEN;i++) addr->id[i]=random()&0xff;
return 0;
}
// test if the broadcast address has been seen
int overlay_broadcast_drop_check(struct broadcast *addr)
{
/* Hash the BPI and see if we have seen it recently.
If so, drop the frame.
The occassional failure to supress a broadcast frame is not
something we are going to worry about just yet. For byzantine
robustness it is however required. */
int bpi_index=0;
int i;
for(i=0;i<BROADCAST_LEN;i++)
{
bpi_index=((bpi_index<<3)&0xfff8)+((bpi_index>>13)&0x7);
bpi_index^=addr->id[i];
}
bpi_index&=BPI_MASK;
if (memcmp(bpilist[bpi_index].id, addr->id, BROADCAST_LEN)){
DEBUGF(broadcasts, "BPI %s is new", alloca_tohex(addr->id, BROADCAST_LEN));
bcopy(addr->id, bpilist[bpi_index].id, BROADCAST_LEN);
return 0; /* don't drop */
}else{
DEBUGF(broadcasts, "BPI %s is a duplicate", alloca_tohex(addr->id, BROADCAST_LEN));
return 1; /* drop frame because we have seen this BPI recently */
}
}
void overlay_broadcast_append(struct overlay_buffer *b, struct broadcast *broadcast)
{
ob_append_bytes(b, broadcast->id, BROADCAST_LEN);
}
// append an appropriate abbreviation into the address
void overlay_address_append(struct decode_context *context, struct overlay_buffer *b, struct subscriber *subscriber)
{
assert(subscriber != NULL);
if (context && subscriber == context->point_to_point_device)
ob_append_byte(b, OA_CODE_P2P_YOU);
else if(context
&& !subscriber->send_full
&& subscriber == get_my_subscriber(1)
&& context->point_to_point_device
&& ((context->flags & DECODE_FLAG_ENCODING_HEADER)==0 || !context->interface->local_echo))
ob_append_byte(b, OA_CODE_P2P_ME);
else if (context && subscriber==context->sender)
ob_append_byte(b, OA_CODE_SELF);
else if (context && subscriber==context->previous)
ob_append_byte(b, OA_CODE_PREVIOUS);
else {
if (subscriber->send_full){
// TODO work out when we can use OA_CODE_SIGNKEY
ob_append_byte(b, SID_SIZE);
ob_append_bytes(b, subscriber->sid.binary, SID_SIZE);
subscriber->send_full=0;
}else{
// always send 8-12 extra bits to disambiguate abbreviations
unsigned len=(subscriber->tree_depth >> 3) + 1;
// add another 8 bits when we need more certainty
if (context && (context->flags & DECODE_FLAG_EXTRA_BITS))
len++;
if (len>SID_SIZE)
len=SID_SIZE;
ob_append_byte(b, len);
ob_append_bytes(b, subscriber->sid.binary, len);
}
}
if (context)
context->previous = subscriber;
}
static int add_explain_response(void **record, void *context)
{
struct subscriber *subscriber = *record;
struct decode_context *response = context;
// only explain a SID once every half second.
time_ms_t now = gettime_ms();
if (now - subscriber->last_explained < 500)
return 0;
subscriber->last_explained = now;
if (!response->please_explain){
if ((response->please_explain = emalloc_zero(sizeof(struct overlay_frame))) == NULL)
return 1; // stop walking
if ((response->please_explain->payload = ob_new()) == NULL) {
free(response->please_explain);
response->please_explain = NULL;
return 1; // stop walking
}
ob_limitsize(response->please_explain->payload, 1024);
}
// if our primary routing identities is unknown,
// the header of this packet must include our full sid.
if (subscriber==get_my_subscriber(1)){
DEBUGF(subscriber, "Explaining SELF sid=%s", alloca_tohex_sid_t(subscriber->sid));
response->please_explain->source_full=1;
return 0;
}
struct overlay_buffer *b = response->please_explain->payload;
// add the whole subscriber id to the payload, stop if we run out of space
DEBUGF(subscriber, "Explaining sid=%s", alloca_tohex_sid_t(subscriber->sid));
ob_checkpoint(b);
if (subscriber->id_combined && response->sender && response->sender->id_combined){
// TODO better condition for when we should send this?
ob_append_byte(b, OA_CODE_SIGNKEY);
ob_append_bytes(b, subscriber->id_public.binary, crypto_sign_PUBLICKEYBYTES);
}else{
ob_append_byte(b, SID_SIZE);
ob_append_bytes(b, subscriber->sid.binary, SID_SIZE);
}
if (ob_overrun(b)) {
ob_rewind(b);
return 1;
}
// let the routing engine know that we had to explain this sid, we probably need to re-send routing info
link_explained(subscriber);
return 0;
}
static int find_subscr_buffer(struct decode_context *context, struct overlay_buffer *b, unsigned len, struct subscriber **subscriber)
{
assert(subscriber);
if (len>SID_SIZE)
return WHYF("Invalid abbreviation length %d", len);
uint8_t *id = ob_get_bytes_ptr(b, len);
if (!id)
return WHY("Not enough space in buffer to parse address");
*subscriber=find_subscriber(id, len, 1);
if (!*subscriber){
if (!context)
return WHYF("Unable to decode %s, with no context", alloca_tohex(id, len));
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
if (context->flags & DECODE_FLAG_DONT_EXPLAIN){
DEBUGF(subscriber, "Ignoring unknown prefix %s", alloca_tohex(id, len));
}else{
// generate a please explain in the passed in context
// add the abbreviation you told me about
if (!context->please_explain){
context->please_explain = calloc(sizeof(struct overlay_frame),1);
if ((context->please_explain->payload = ob_new()) == NULL)
return -1;
ob_limitsize(context->please_explain->payload, MDP_MTU);
}
// And I'll tell you about any subscribers I know that match this abbreviation,
// so you don't try to use an abbreviation that's too short in future.
tree_walk_prefix(&root, id, len, add_explain_response, context);
DEBUGF(subscriber, "Asking for explanation of %s", alloca_tohex(id, len));
ob_append_byte(context->please_explain->payload, len);
ob_append_bytes(context->please_explain->payload, id, len);
}
}else{
if (context)
context->previous=*subscriber;
}
return 0;
}
int overlay_broadcast_parse(struct overlay_buffer *b, struct broadcast *broadcast)
{
return ob_get_bytes(b, broadcast->id, BROADCAST_LEN);
}
static int decode_sid_from_signkey(struct overlay_buffer *b, struct subscriber **subscriber)
{
const sign_public_t *id = (const sign_public_t *)ob_get_bytes_ptr(b, crypto_sign_PUBLICKEYBYTES);
if (!id)
return WHY("Not enough space in buffer to parse address");
sid_t sid;
if (crypto_sign_to_sid(id, &sid))
return -1;
struct subscriber *s = find_subscriber(sid.binary, SID_SIZE, 1);
if (s && !s->id_combined){
bcopy(id, s->id_public.binary, crypto_sign_PUBLICKEYBYTES);
s->id_valid=1;
s->id_combined=1;
DEBUGF(subscriber, "Stored combined SID:SAS mapping, SID=%s SAS=%s",
alloca_tohex_sid_t(s->sid),
alloca_tohex_identity_t(&s->id_public)
);
}
if (subscriber)
*subscriber=s;
return 0;
}
// returns 0 = success, -1 = fatal parsing error, 1 = unable to identify address
int overlay_address_parse(struct decode_context *context, struct overlay_buffer *b, struct subscriber **subscriber)
{
int len = ob_get(b);
if (len<0)
return WHY("Buffer too small");
switch(len){
case OA_CODE_P2P_YOU:
// if we don't know who they are, we can't assume they mean us.
if (context->point_to_point_device){
context->previous = *subscriber = get_my_subscriber(1);
}else{
WHYF("Could not resolve address on %s, this isn't a configured point to point link", context->interface->name);
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
}
return 0;
case OA_CODE_P2P_ME:
if (context->point_to_point_device){
*subscriber=context->point_to_point_device;
context->previous=*subscriber;
}else{
if ((context->flags & DECODE_FLAG_DONT_EXPLAIN) == 0){
// add the abbreviation you told me about
if (!context->please_explain){
context->please_explain = calloc(sizeof(struct overlay_frame),1);
if ((context->please_explain->payload = ob_new()) == NULL)
return -1;
ob_limitsize(context->please_explain->payload, MDP_MTU);
}
DEBUGF(subscriber, "Asking for explanation of YOU");
ob_append_byte(context->please_explain->payload, OA_CODE_P2P_YOU);
}
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
}
return 0;
case OA_CODE_SELF:
if (!context->sender){
DEBUGF(subscriber, "Could not resolve address, sender has not been set");
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
}else{
*subscriber=context->sender;
context->previous=context->sender;
}
return 0;
case OA_CODE_PREVIOUS:
if (!context->previous){
DEBUGF(subscriber, "Unable to decode previous address");
context->flags|=DECODE_FLAG_INVALID_ADDRESS;
}else{
*subscriber=context->previous;
}
return 0;
case OA_CODE_SIGNKEY:
if (decode_sid_from_signkey(b, subscriber) == -1)
return -1;
context->previous = *subscriber;
return 0;
}
return find_subscr_buffer(context, b, len, subscriber);
}
// once we've finished parsing a packet, complete and send a please explain if required.
int send_please_explain(struct decode_context *context, struct subscriber *source, struct subscriber *destination)
{
IN();
struct overlay_frame *frame=context->please_explain;
if (frame == NULL)
RETURN(0);
assert(frame->payload != NULL);
frame->type = OF_TYPE_PLEASEEXPLAIN;
if (source)
frame->source = source;
else
frame->source = get_my_subscriber(1);
if (!context->sender)
frame->source_full=1;
frame->destination = destination;
if (destination){
frame->ttl = PAYLOAD_TTL_DEFAULT; // MAX?
frame->source_full=1;
}else{
// send both a broadcast & unicast response out the same interface this packet arrived on.
frame->ttl=1;// how will this work with olsr??
if (context->interface){
frame_add_destination(frame, NULL, context->interface->destination);
struct network_destination *dest = create_unicast_destination(&context->addr, context->interface);
if (dest){
frame_add_destination(frame, NULL, dest);
release_destination_ref(dest);
}
}else{
FATAL("This context doesn't have an interface?");
}
}
frame->queue=OQ_MESH_MANAGEMENT;
if (overlay_payload_enqueue(frame) != -1)
RETURN(0);
op_free(frame);
RETURN(-1);
OUT();
}
// process an incoming request for explanation of subscriber abbreviations
int process_explain(struct overlay_frame *frame)
{
struct overlay_buffer *b=frame->payload;
struct decode_context context;
bzero(&context, sizeof context);
context.sender = frame->source;
context.interface = frame->interface;
while(ob_remaining(b)>0){
int len = ob_get(b);
if (len<0)
return WHY("Badly formatted explain message");
switch (len){
case OA_CODE_P2P_YOU:
{
void *sid = get_my_subscriber(1);
add_explain_response(&sid, &context);
}
break;
case OA_CODE_SIGNKEY:
decode_sid_from_signkey(b, NULL);
break;
case SID_SIZE:
{
// This message is also used to inform people of previously unknown subscribers
// make sure we know this one
uint8_t *sid = ob_get_bytes_ptr(b, SID_SIZE);
if (!sid)
return WHY("Ran past end of buffer");
DEBUGF(subscriber, "Storing explain response for %s", alloca_tohex(sid, SID_SIZE));
find_subscriber(sid, SID_SIZE, 1);
break;
}
default:
{
if ((unsigned)len>SID_SIZE)
return WHY("Badly formatted explain message");
uint8_t *sid = ob_get_bytes_ptr(b, len);
// reply to the sender with all subscribers that match this abbreviation
DEBUGF(subscriber, "Sending explain responses for %s", alloca_tohex(sid, len));
tree_walk_prefix(&root, sid, len, add_explain_response, &context);
}
}
}
if (context.please_explain)
send_please_explain(&context, frame->destination, frame->source);
return 0;
}