// Copyright (c) 2014-2022, The Monero Project // // All rights reserved. // // Redistribution and use in source and binary forms, with or without modification, are // permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, this list of // conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, this list // of conditions and the following disclaimer in the documentation and/or other // materials provided with the distribution. // // 3. Neither the name of the copyright holder nor the names of its contributors may be // used to endorse or promote products derived from this software without specific // prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY // EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL // THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, // STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF // THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // // Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers #pragma once #include #include #include #include #include #include #include #include #include #include #include "crypto/crypto.h" #include "cryptonote_config.h" #include "net/enums.h" #include "net/local_ip.h" #include "p2p_protocol_defs.h" #include "syncobj.h" namespace nodetool { struct peerlist_types { std::vector white; std::vector gray; std::vector anchor; }; class peerlist_storage { public: peerlist_storage() : m_types{} {} //! \return Peers stored in stream `src` in `new_format` (portable archive or older non-portable). static boost::optional open(std::istream& src, const bool new_format); //! \return Peers stored in file at `path` static boost::optional open(const std::string& path); peerlist_storage(peerlist_storage&&) = default; peerlist_storage(const peerlist_storage&) = delete; ~peerlist_storage() noexcept; peerlist_storage& operator=(peerlist_storage&&) = default; peerlist_storage& operator=(const peerlist_storage&) = delete; //! Save peers from `this` and `other` in stream `dest`. bool store(std::ostream& dest, const peerlist_types& other) const; //! Save peers from `this` and `other` in one file at `path`. bool store(const std::string& path, const peerlist_types& other) const; //! \return Peers in `zone` and from remove from `this`. peerlist_types take_zone(epee::net_utils::zone zone); private: peerlist_types m_types; }; /************************************************************************/ /* */ /************************************************************************/ class peerlist_manager { public: bool init(peerlist_types&& peers, bool allow_local_ip); size_t get_white_peers_count(){CRITICAL_REGION_LOCAL(m_peerlist_lock); return m_peers_white.size();} size_t get_gray_peers_count(){CRITICAL_REGION_LOCAL(m_peerlist_lock); return m_peers_gray.size();} bool merge_peerlist(const std::vector& outer_bs, const std::function &f = NULL); bool get_peerlist_head(std::vector& bs_head, bool anonymize, uint32_t depth = P2P_DEFAULT_PEERS_IN_HANDSHAKE); void get_peerlist(std::vector& pl_gray, std::vector& pl_white); void get_peerlist(peerlist_types& peers); bool get_white_peer_by_index(peerlist_entry& p, size_t i); bool get_gray_peer_by_index(peerlist_entry& p, size_t i); template bool foreach(bool white, const F &f); void evict_host_from_peerlist(bool white, const peerlist_entry& pr); bool append_with_peer_white(const peerlist_entry& pr, bool trust_last_seen = false); bool append_with_peer_gray(const peerlist_entry& pr); bool append_with_peer_anchor(const anchor_peerlist_entry& ple); bool set_peer_just_seen(peerid_type peer, const epee::net_utils::network_address& addr, uint32_t pruning_seed, uint16_t rpc_port, uint32_t rpc_credits_per_hash); bool is_host_allowed(const epee::net_utils::network_address &address); bool get_random_gray_peer(peerlist_entry& pe); bool remove_from_peer_gray(const peerlist_entry& pe); bool get_and_empty_anchor_peerlist(std::vector& apl); bool remove_from_peer_anchor(const epee::net_utils::network_address& addr); bool remove_from_peer_white(const peerlist_entry& pe); template size_t filter(bool white, const F &f); // f returns true: drop, false: keep private: struct by_time{}; struct by_id{}; struct by_addr{}; struct modify_all_but_id { modify_all_but_id(const peerlist_entry& ple):m_ple(ple){} void operator()(peerlist_entry& e) { e.id = m_ple.id; } private: const peerlist_entry& m_ple; }; struct modify_all { modify_all(const peerlist_entry& ple):m_ple(ple){} void operator()(peerlist_entry& e) { e = m_ple; } private: const peerlist_entry& m_ple; }; struct modify_last_seen { modify_last_seen(time_t last_seen):m_last_seen(last_seen){} void operator()(peerlist_entry& e) { e.last_seen = m_last_seen; } private: time_t m_last_seen; }; typedef boost::multi_index_container< peerlist_entry, boost::multi_index::indexed_by< // access by peerlist_entry::net_adress boost::multi_index::ordered_unique, boost::multi_index::member >, // sort by peerlist_entry::last_seen< boost::multi_index::ordered_non_unique, boost::multi_index::member > > > peers_indexed; typedef boost::multi_index_container< anchor_peerlist_entry, boost::multi_index::indexed_by< // access by anchor_peerlist_entry::net_adress boost::multi_index::ordered_unique, boost::multi_index::member >, // sort by anchor_peerlist_entry::first_seen boost::multi_index::ordered_non_unique, boost::multi_index::member > > > anchor_peers_indexed; private: void trim_white_peerlist(); void trim_gray_peerlist(); friend class boost::serialization::access; epee::critical_section m_peerlist_lock; std::string m_config_folder; bool m_allow_local_ip; peers_indexed m_peers_gray; peers_indexed m_peers_white; anchor_peers_indexed m_peers_anchor; }; //-------------------------------------------------------------------------------------------------- inline void peerlist_manager::trim_gray_peerlist() { while(m_peers_gray.size() > P2P_LOCAL_GRAY_PEERLIST_LIMIT) { peers_indexed::index::type& sorted_index=m_peers_gray.get(); sorted_index.erase(sorted_index.begin()); } } //-------------------------------------------------------------------------------------------------- inline void peerlist_manager::trim_white_peerlist() { while(m_peers_white.size() > P2P_LOCAL_WHITE_PEERLIST_LIMIT) { peers_indexed::index::type& sorted_index=m_peers_white.get(); sorted_index.erase(sorted_index.begin()); } } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::merge_peerlist(const std::vector& outer_bs, const std::function &f) { CRITICAL_REGION_LOCAL(m_peerlist_lock); for(const peerlist_entry& be: outer_bs) { if (!f || f(be)) append_with_peer_gray(be); } // delete extra elements trim_gray_peerlist(); return true; } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::get_white_peer_by_index(peerlist_entry& p, size_t i) { CRITICAL_REGION_LOCAL(m_peerlist_lock); if(i >= m_peers_white.size()) return false; peers_indexed::index::type& by_time_index = m_peers_white.get(); p = *epee::misc_utils::move_it_backward(--by_time_index.end(), i); return true; } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::get_gray_peer_by_index(peerlist_entry& p, size_t i) { CRITICAL_REGION_LOCAL(m_peerlist_lock); if(i >= m_peers_gray.size()) return false; peers_indexed::index::type& by_time_index = m_peers_gray.get(); p = *epee::misc_utils::move_it_backward(--by_time_index.end(), i); return true; } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::is_host_allowed(const epee::net_utils::network_address &address) { //never allow loopback ip if(address.is_loopback()) return false; if(!m_allow_local_ip && address.is_local()) return false; return true; } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::get_peerlist_head(std::vector& bs_head, bool anonymize, uint32_t depth) { CRITICAL_REGION_LOCAL(m_peerlist_lock); peers_indexed::index::type& by_time_index=m_peers_white.get(); uint32_t cnt = 0; // picks a random set of peers within the whole set, rather pick the first depth elements. // The intent is that if someone asks twice, they can't easily tell: // - this address was not in the first list, but is in the second, so the only way this can be // is if its last_seen was recently reset, so this means the target node recently had a new // connection to that address // - this address was in the first list, and not in the second, which means either the address // was moved to the gray list (if it's not accessible, which the attacker can check if // the address accepts incoming connections) or it was the oldest to still fit in the 250 items, // so its last_seen is old. // // See Cao, Tong et al. "Exploring the Monero Peer-to-Peer Network". https://eprint.iacr.org/2019/411 // const uint32_t pick_depth = anonymize ? m_peers_white.size() : depth; bs_head.reserve(pick_depth); for(const peers_indexed::value_type& vl: boost::adaptors::reverse(by_time_index)) { if(cnt++ >= pick_depth) break; bs_head.push_back(vl); } if (anonymize) { std::shuffle(bs_head.begin(), bs_head.end(), crypto::random_device{}); if (bs_head.size() > depth) bs_head.resize(depth); for (auto &e: bs_head) e.last_seen = 0; } return true; } //-------------------------------------------------------------------------------------------------- template inline bool peerlist_manager::foreach(bool white, const F &f) { CRITICAL_REGION_LOCAL(m_peerlist_lock); peers_indexed::index::type& by_time_index = white ? m_peers_white.get() : m_peers_gray.get(); for(const peers_indexed::value_type& vl: boost::adaptors::reverse(by_time_index)) if (!f(vl)) return false; return true; } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::set_peer_just_seen(peerid_type peer, const epee::net_utils::network_address& addr, uint32_t pruning_seed, uint16_t rpc_port, uint32_t rpc_credits_per_hash) { TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); //find in white list peerlist_entry ple; ple.adr = addr; ple.id = peer; ple.last_seen = time(NULL); ple.pruning_seed = pruning_seed; ple.rpc_port = rpc_port; ple.rpc_credits_per_hash = rpc_credits_per_hash; return append_with_peer_white(ple, true); CATCH_ENTRY_L0("peerlist_manager::set_peer_just_seen()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::append_with_peer_white(const peerlist_entry& ple, bool trust_last_seen) { TRY_ENTRY(); if(!is_host_allowed(ple.adr)) return true; CRITICAL_REGION_LOCAL(m_peerlist_lock); //find in white list auto by_addr_it_wt = m_peers_white.get().find(ple.adr); if(by_addr_it_wt == m_peers_white.get().end()) { //put new record into white list evict_host_from_peerlist(true, ple); m_peers_white.insert(ple); trim_white_peerlist(); }else { //update record in white list peerlist_entry new_ple = ple; if (by_addr_it_wt->pruning_seed && ple.pruning_seed == 0) // guard against older nodes not passing pruning info around new_ple.pruning_seed = by_addr_it_wt->pruning_seed; if (by_addr_it_wt->rpc_port && ple.rpc_port == 0) // guard against older nodes not passing RPC port around new_ple.rpc_port = by_addr_it_wt->rpc_port; if (!trust_last_seen) new_ple.last_seen = by_addr_it_wt->last_seen; // do not overwrite the last seen timestamp, incoming peer lists are untrusted m_peers_white.replace(by_addr_it_wt, new_ple); } //remove from gray list, if need auto by_addr_it_gr = m_peers_gray.get().find(ple.adr); if(by_addr_it_gr != m_peers_gray.get().end()) { m_peers_gray.erase(by_addr_it_gr); } return true; CATCH_ENTRY_L0("peerlist_manager::append_with_peer_white()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::append_with_peer_gray(const peerlist_entry& ple) { TRY_ENTRY(); if(!is_host_allowed(ple.adr)) return true; CRITICAL_REGION_LOCAL(m_peerlist_lock); //find in white list auto by_addr_it_wt = m_peers_white.get().find(ple.adr); if(by_addr_it_wt != m_peers_white.get().end()) return true; //update gray list auto by_addr_it_gr = m_peers_gray.get().find(ple.adr); if(by_addr_it_gr == m_peers_gray.get().end()) { //put new record into white list m_peers_gray.insert(ple); trim_gray_peerlist(); }else { //update record in gray list peerlist_entry new_ple = ple; if (by_addr_it_gr->pruning_seed && ple.pruning_seed == 0) // guard against older nodes not passing pruning info around new_ple.pruning_seed = by_addr_it_gr->pruning_seed; if (by_addr_it_gr->rpc_port && ple.rpc_port == 0) // guard against older nodes not passing RPC port around new_ple.rpc_port = by_addr_it_gr->rpc_port; new_ple.last_seen = by_addr_it_gr->last_seen; // do not overwrite the last seen timestamp, incoming peer list are untrusted m_peers_gray.replace(by_addr_it_gr, new_ple); } return true; CATCH_ENTRY_L0("peerlist_manager::append_with_peer_gray()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::append_with_peer_anchor(const anchor_peerlist_entry& ple) { TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); auto by_addr_it_anchor = m_peers_anchor.get().find(ple.adr); if(by_addr_it_anchor == m_peers_anchor.get().end()) { m_peers_anchor.insert(ple); } return true; CATCH_ENTRY_L0("peerlist_manager::append_with_peer_anchor()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::get_random_gray_peer(peerlist_entry& pe) { TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); if (m_peers_gray.empty()) { return false; } size_t random_index = crypto::rand_idx(m_peers_gray.size()); peers_indexed::index::type& by_time_index = m_peers_gray.get(); pe = *epee::misc_utils::move_it_backward(--by_time_index.end(), random_index); return true; CATCH_ENTRY_L0("peerlist_manager::get_random_gray_peer()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::remove_from_peer_white(const peerlist_entry& pe) { TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); peers_indexed::index_iterator::type iterator = m_peers_white.get().find(pe.adr); if (iterator != m_peers_white.get().end()) { m_peers_white.erase(iterator); } return true; CATCH_ENTRY_L0("peerlist_manager::remove_from_peer_white()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::remove_from_peer_gray(const peerlist_entry& pe) { TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); peers_indexed::index_iterator::type iterator = m_peers_gray.get().find(pe.adr); if (iterator != m_peers_gray.get().end()) { m_peers_gray.erase(iterator); } return true; CATCH_ENTRY_L0("peerlist_manager::remove_from_peer_gray()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::get_and_empty_anchor_peerlist(std::vector& apl) { TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); auto begin = m_peers_anchor.get().begin(); auto end = m_peers_anchor.get().end(); std::for_each(begin, end, [&apl](const anchor_peerlist_entry &a) { apl.push_back(a); }); m_peers_anchor.get().clear(); return true; CATCH_ENTRY_L0("peerlist_manager::get_and_empty_anchor_peerlist()", false); } //-------------------------------------------------------------------------------------------------- inline bool peerlist_manager::remove_from_peer_anchor(const epee::net_utils::network_address& addr) { TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); anchor_peers_indexed::index_iterator::type iterator = m_peers_anchor.get().find(addr); if (iterator != m_peers_anchor.get().end()) { m_peers_anchor.erase(iterator); } return true; CATCH_ENTRY_L0("peerlist_manager::remove_from_peer_anchor()", false); } //-------------------------------------------------------------------------------------------------- template size_t peerlist_manager::filter(bool white, const F &f) { size_t filtered = 0; TRY_ENTRY(); CRITICAL_REGION_LOCAL(m_peerlist_lock); peers_indexed::index::type& sorted_index = white ? m_peers_gray.get() : m_peers_white.get(); auto i = sorted_index.begin(); while (i != sorted_index.end()) { if (f(*i)) { i = sorted_index.erase(i); ++filtered; } else ++i; } CATCH_ENTRY_L0("peerlist_manager::filter()", filtered); return filtered; } //-------------------------------------------------------------------------------------------------- }