2021-12-08 14:46:53 -05:00
|
|
|
from .Interface import Interface
|
|
|
|
import socketserver
|
|
|
|
import threading
|
|
|
|
import socket
|
|
|
|
import struct
|
|
|
|
import time
|
|
|
|
import sys
|
|
|
|
import RNS
|
|
|
|
|
|
|
|
|
|
|
|
class AutoInterface(Interface):
|
|
|
|
DEFAULT_DISCOVERY_PORT = 29716
|
|
|
|
DEFAULT_DATA_PORT = 42671
|
|
|
|
DEFAULT_GROUP_ID = "reticulum".encode("utf-8")
|
|
|
|
|
|
|
|
SCOPE_LINK = "2"
|
|
|
|
SCOPE_ADMIN = "4"
|
|
|
|
SCOPE_SITE = "5"
|
|
|
|
SCOPE_ORGANISATION = "8"
|
2021-12-09 10:07:36 -05:00
|
|
|
SCOPE_GLOBAL = "e"
|
2021-12-08 14:46:53 -05:00
|
|
|
|
2021-12-11 10:42:15 -05:00
|
|
|
PEERING_TIMEOUT = 6.0
|
2021-12-08 14:46:53 -05:00
|
|
|
|
2021-12-10 05:10:09 -05:00
|
|
|
DARWIN_IGNORE_IFS = ["awdl0", "llw0", "lo0", "en5"]
|
2022-01-12 06:12:04 -05:00
|
|
|
ANDROID_IGNORE_IFS = ["dummy0", "lo", "tun0"]
|
2021-12-10 04:58:28 -05:00
|
|
|
|
2021-12-09 10:07:36 -05:00
|
|
|
def __init__(self, owner, name, group_id=None, discovery_scope=None, discovery_port=None, data_port=None, allowed_interfaces=None, ignored_interfaces=None):
|
2021-12-08 14:46:53 -05:00
|
|
|
import importlib
|
|
|
|
if importlib.util.find_spec('netifaces') != None:
|
|
|
|
import netifaces
|
|
|
|
else:
|
|
|
|
RNS.log("Using AutoInterface requires the netifaces module.", RNS.LOG_CRITICAL)
|
|
|
|
RNS.log("You can install it with the command: python3 -m pip install netifaces", RNS.LOG_CRITICAL)
|
|
|
|
RNS.panic()
|
|
|
|
|
|
|
|
self.netifaces = netifaces
|
|
|
|
self.rxb = 0
|
|
|
|
self.txb = 0
|
|
|
|
self.IN = True
|
|
|
|
self.OUT = False
|
|
|
|
self.name = name
|
|
|
|
self.online = False
|
|
|
|
self.peers = {}
|
2021-12-09 10:07:36 -05:00
|
|
|
self.link_local_addresses = []
|
|
|
|
self.adopted_interfaces = {}
|
2021-12-08 14:46:53 -05:00
|
|
|
|
|
|
|
self.outbound_udp_socket = None
|
|
|
|
|
2021-12-11 10:42:15 -05:00
|
|
|
self.announce_interval = AutoInterface.PEERING_TIMEOUT/4.0
|
2021-12-11 09:41:34 -05:00
|
|
|
self.peer_job_interval = AutoInterface.PEERING_TIMEOUT*1.1
|
2021-12-09 10:07:36 -05:00
|
|
|
self.peering_timeout = AutoInterface.PEERING_TIMEOUT
|
|
|
|
|
|
|
|
if allowed_interfaces == None:
|
|
|
|
self.allowed_interfaces = []
|
|
|
|
else:
|
|
|
|
self.allowed_interfaces = allowed_interfaces
|
|
|
|
|
|
|
|
if ignored_interfaces == None:
|
|
|
|
self.ignored_interfaces = []
|
|
|
|
else:
|
|
|
|
self.ignored_interfaces = ignored_interfaces
|
|
|
|
|
2021-12-08 14:46:53 -05:00
|
|
|
if group_id == None:
|
|
|
|
self.group_id = AutoInterface.DEFAULT_GROUP_ID
|
|
|
|
else:
|
|
|
|
self.group_id = group_id.encode("utf-8")
|
|
|
|
|
|
|
|
if discovery_port == None:
|
|
|
|
self.discovery_port = AutoInterface.DEFAULT_DISCOVERY_PORT
|
|
|
|
else:
|
|
|
|
self.discovery_port = discovery_port
|
|
|
|
|
|
|
|
if data_port == None:
|
|
|
|
self.data_port = AutoInterface.DEFAULT_DATA_PORT
|
|
|
|
else:
|
|
|
|
self.data_port = data_port
|
|
|
|
|
|
|
|
if discovery_scope == None:
|
|
|
|
self.discovery_scope = AutoInterface.SCOPE_LINK
|
|
|
|
elif str(discovery_scope).lower() == "link":
|
|
|
|
self.discovery_scope = AutoInterface.SCOPE_LINK
|
|
|
|
elif str(discovery_scope).lower() == "admin":
|
|
|
|
self.discovery_scope = AutoInterface.SCOPE_ADMIN
|
|
|
|
elif str(discovery_scope).lower() == "site":
|
|
|
|
self.discovery_scope = AutoInterface.SCOPE_SITE
|
|
|
|
elif str(discovery_scope).lower() == "organisation":
|
|
|
|
self.discovery_scope = AutoInterface.SCOPE_ORGANISATION
|
|
|
|
elif str(discovery_scope).lower() == "global":
|
|
|
|
self.discovery_scope = AutoInterface.SCOPE_GLOBAL
|
|
|
|
|
2021-12-09 10:07:36 -05:00
|
|
|
self.group_hash = RNS.Identity.full_hash(self.group_id)
|
|
|
|
g = self.group_hash
|
|
|
|
#gt = "{:02x}".format(g[1]+(g[0]<<8))
|
|
|
|
gt = "0"
|
|
|
|
gt += ":"+"{:02x}".format(g[3]+(g[2]<<8))
|
|
|
|
gt += ":"+"{:02x}".format(g[5]+(g[4]<<8))
|
|
|
|
gt += ":"+"{:02x}".format(g[7]+(g[6]<<8))
|
|
|
|
gt += ":"+"{:02x}".format(g[9]+(g[8]<<8))
|
|
|
|
gt += ":"+"{:02x}".format(g[11]+(g[10]<<8))
|
|
|
|
gt += ":"+"{:02x}".format(g[13]+(g[12]<<8))
|
|
|
|
self.mcast_discovery_address = "ff1"+self.discovery_scope+":"+gt
|
|
|
|
|
2021-12-08 14:46:53 -05:00
|
|
|
suitable_interfaces = 0
|
|
|
|
for ifname in self.netifaces.interfaces():
|
2022-01-12 06:12:04 -05:00
|
|
|
if RNS.vendor.platformutils.is_darwin() and ifname in AutoInterface.DARWIN_IGNORE_IFS and not ifname in self.allowed_interfaces:
|
2021-12-10 05:10:09 -05:00
|
|
|
RNS.log(str(self)+" skipping Darwin AWDL or tethering interface "+str(ifname), RNS.LOG_EXTREME)
|
2022-01-12 06:12:04 -05:00
|
|
|
elif RNS.vendor.platformutils.is_darwin() and ifname == "lo0":
|
2021-12-10 08:48:30 -05:00
|
|
|
RNS.log(str(self)+" skipping Darwin loopback interface "+str(ifname), RNS.LOG_EXTREME)
|
2022-01-12 06:12:04 -05:00
|
|
|
elif RNS.vendor.platformutils.is_android() and ifname in AutoInterface.ANDROID_IGNORE_IFS and not ifname in self.allowed_interfaces:
|
|
|
|
RNS.log(str(self)+" skipping Android system interface "+str(ifname), RNS.LOG_EXTREME)
|
2021-12-10 05:10:09 -05:00
|
|
|
elif ifname in self.ignored_interfaces:
|
2021-12-09 10:07:36 -05:00
|
|
|
RNS.log(str(self)+" ignoring disallowed interface "+str(ifname), RNS.LOG_EXTREME)
|
|
|
|
else:
|
|
|
|
if len(self.allowed_interfaces) > 0 and not ifname in self.allowed_interfaces:
|
|
|
|
RNS.log(str(self)+" ignoring interface "+str(ifname)+" since it was not allowed", RNS.LOG_EXTREME)
|
2021-12-08 14:46:53 -05:00
|
|
|
else:
|
2021-12-09 10:07:36 -05:00
|
|
|
addresses = self.netifaces.ifaddresses(ifname)
|
|
|
|
if self.netifaces.AF_INET6 in addresses:
|
|
|
|
link_local_addr = None
|
|
|
|
for address in addresses[self.netifaces.AF_INET6]:
|
|
|
|
if "addr" in address:
|
|
|
|
if address["addr"].startswith("fe80:"):
|
|
|
|
link_local_addr = address["addr"]
|
|
|
|
self.link_local_addresses.append(link_local_addr.split("%")[0])
|
|
|
|
self.adopted_interfaces[ifname] = link_local_addr.split("%")[0]
|
|
|
|
RNS.log(str(self)+" Selecting link-local address "+str(link_local_addr)+" for interface "+str(ifname), RNS.LOG_EXTREME)
|
|
|
|
|
|
|
|
if link_local_addr == None:
|
|
|
|
RNS.log(str(self)+" No link-local IPv6 address configured for "+str(ifname)+", skipping interface", RNS.LOG_EXTREME)
|
|
|
|
else:
|
|
|
|
mcast_addr = self.mcast_discovery_address
|
|
|
|
RNS.log(str(self)+" Creating multicast discovery listener on "+str(ifname)+" with address "+str(mcast_addr), RNS.LOG_EXTREME)
|
|
|
|
|
|
|
|
# Struct with interface index
|
|
|
|
if_struct = struct.pack("I", socket.if_nametoindex(ifname))
|
|
|
|
|
|
|
|
# Set up multicast socket
|
|
|
|
discovery_socket = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
|
|
|
|
discovery_socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
discovery_socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEPORT, 1)
|
|
|
|
discovery_socket.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_MULTICAST_IF, if_struct)
|
|
|
|
|
|
|
|
# Join multicast group
|
2021-12-10 04:35:25 -05:00
|
|
|
mcast_group = socket.inet_pton(socket.AF_INET6, mcast_addr) + if_struct
|
|
|
|
discovery_socket.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_JOIN_GROUP, mcast_group)
|
2021-12-09 10:07:36 -05:00
|
|
|
|
|
|
|
# Bind socket
|
|
|
|
addr_info = socket.getaddrinfo(mcast_addr+"%"+ifname, self.discovery_port, socket.AF_INET6, socket.SOCK_DGRAM)
|
|
|
|
discovery_socket.bind(addr_info[0][4])
|
|
|
|
|
|
|
|
# Set up thread for discovery packets
|
|
|
|
def discovery_loop():
|
|
|
|
self.discovery_handler(discovery_socket, ifname)
|
|
|
|
|
|
|
|
thread = threading.Thread(target=discovery_loop)
|
|
|
|
thread.setDaemon(True)
|
|
|
|
thread.start()
|
|
|
|
|
|
|
|
suitable_interfaces += 1
|
2021-12-08 14:46:53 -05:00
|
|
|
|
|
|
|
if suitable_interfaces == 0:
|
2021-12-11 09:41:34 -05:00
|
|
|
RNS.log(str(self)+" could not autoconfigure. This interface currently provides no connectivity.", RNS.LOG_WARNING)
|
2021-12-08 14:46:53 -05:00
|
|
|
else:
|
|
|
|
self.receives = True
|
|
|
|
|
2021-12-11 10:42:15 -05:00
|
|
|
peering_wait = self.announce_interval*1.2
|
|
|
|
RNS.log(str(self)+" discovering peers for "+str(round(peering_wait, 2))+" seconds...", RNS.LOG_VERBOSE)
|
2021-12-11 09:41:34 -05:00
|
|
|
|
2021-12-08 14:46:53 -05:00
|
|
|
def handlerFactory(callback):
|
|
|
|
def createHandler(*args, **keys):
|
|
|
|
return AutoInterfaceHandler(callback, *args, **keys)
|
|
|
|
return createHandler
|
|
|
|
|
|
|
|
self.owner = owner
|
|
|
|
socketserver.UDPServer.address_family = socket.AF_INET6
|
|
|
|
|
2021-12-10 04:35:25 -05:00
|
|
|
for ifname in self.adopted_interfaces:
|
|
|
|
local_addr = self.adopted_interfaces[ifname]+"%"+ifname
|
|
|
|
addr_info = socket.getaddrinfo(local_addr, self.data_port, socket.AF_INET6, socket.SOCK_DGRAM)
|
|
|
|
address = addr_info[0][4]
|
|
|
|
|
|
|
|
self.server = socketserver.UDPServer(address, handlerFactory(self.processIncoming))
|
|
|
|
|
|
|
|
thread = threading.Thread(target=self.server.serve_forever)
|
|
|
|
thread.setDaemon(True)
|
|
|
|
thread.start()
|
2021-12-08 14:46:53 -05:00
|
|
|
|
2021-12-09 10:07:36 -05:00
|
|
|
job_thread = threading.Thread(target=self.peer_jobs)
|
|
|
|
job_thread.setDaemon(True)
|
|
|
|
job_thread.start()
|
|
|
|
|
2021-12-11 09:41:34 -05:00
|
|
|
time.sleep(peering_wait)
|
|
|
|
|
2021-12-08 14:46:53 -05:00
|
|
|
self.online = True
|
|
|
|
|
|
|
|
|
|
|
|
def discovery_handler(self, socket, ifname):
|
2021-12-09 10:07:36 -05:00
|
|
|
def announce_loop():
|
|
|
|
self.announce_handler(ifname)
|
|
|
|
|
|
|
|
thread = threading.Thread(target=announce_loop)
|
|
|
|
thread.setDaemon(True)
|
|
|
|
thread.start()
|
|
|
|
|
2021-12-08 14:46:53 -05:00
|
|
|
while True:
|
|
|
|
data, ipv6_src = socket.recvfrom(1024)
|
2021-12-09 10:07:36 -05:00
|
|
|
expected_hash = RNS.Identity.full_hash(self.group_id+ipv6_src[0].encode("utf-8"))
|
|
|
|
if data == expected_hash:
|
2021-12-08 14:46:53 -05:00
|
|
|
self.add_peer(ipv6_src[0], ifname)
|
2021-12-09 10:07:36 -05:00
|
|
|
else:
|
|
|
|
RNS.log(str(self)+" received peering packet on "+str(ifname)+" from "+str(ipv6_src[0])+", but authentication hash was incorrect.", RNS.LOG_DEBUG)
|
2021-12-08 14:46:53 -05:00
|
|
|
|
2021-12-09 10:07:36 -05:00
|
|
|
def peer_jobs(self):
|
|
|
|
while True:
|
|
|
|
time.sleep(self.peer_job_interval)
|
|
|
|
now = time.time()
|
|
|
|
timed_out_peers = []
|
|
|
|
for peer_addr in self.peers:
|
|
|
|
peer = self.peers[peer_addr]
|
|
|
|
last_heard = peer[1]
|
|
|
|
if now > last_heard+self.peering_timeout:
|
|
|
|
timed_out_peers.append(peer_addr)
|
|
|
|
|
|
|
|
for peer_addr in timed_out_peers:
|
2021-12-10 08:48:30 -05:00
|
|
|
removed_peer = self.peers.pop(peer_addr)
|
|
|
|
RNS.log(str(self)+" removed peer "+str(peer_addr)+" on "+str(removed_peer[0]), RNS.LOG_DEBUG)
|
2021-12-09 10:07:36 -05:00
|
|
|
|
|
|
|
|
|
|
|
def announce_handler(self, ifname):
|
|
|
|
while True:
|
|
|
|
self.peer_announce(ifname)
|
|
|
|
time.sleep(self.announce_interval)
|
|
|
|
|
|
|
|
def peer_announce(self, ifname):
|
|
|
|
link_local_address = self.adopted_interfaces[ifname]
|
|
|
|
discovery_token = RNS.Identity.full_hash(self.group_id+link_local_address.encode("utf-8"))
|
|
|
|
announce_socket = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
|
|
|
|
addr_info = socket.getaddrinfo(self.mcast_discovery_address, self.discovery_port, socket.AF_INET6, socket.SOCK_DGRAM)
|
2021-12-08 14:46:53 -05:00
|
|
|
|
2021-12-09 10:07:36 -05:00
|
|
|
ifis = struct.pack("I", socket.if_nametoindex(ifname))
|
|
|
|
announce_socket.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_MULTICAST_IF, ifis)
|
|
|
|
announce_socket.sendto(discovery_token, addr_info[0][4])
|
|
|
|
|
|
|
|
def add_peer(self, addr, ifname):
|
|
|
|
if not addr in self.link_local_addresses:
|
|
|
|
if not addr in self.peers:
|
|
|
|
self.peers[addr] = [ifname, time.time()]
|
|
|
|
RNS.log(str(self)+" added peer "+str(addr)+" on "+str(ifname), RNS.LOG_DEBUG)
|
|
|
|
else:
|
|
|
|
self.refresh_peer(addr)
|
|
|
|
|
|
|
|
def refresh_peer(self, addr):
|
2021-12-08 14:46:53 -05:00
|
|
|
self.peers[addr][1] = time.time()
|
|
|
|
|
|
|
|
def processIncoming(self, data):
|
|
|
|
self.rxb += len(data)
|
|
|
|
self.owner.inbound(data, self)
|
|
|
|
|
|
|
|
def processOutgoing(self,data):
|
|
|
|
for peer in self.peers:
|
|
|
|
try:
|
|
|
|
if self.outbound_udp_socket == None:
|
|
|
|
self.outbound_udp_socket = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
|
|
|
|
|
2021-12-10 10:23:35 -05:00
|
|
|
peer_addr = str(peer)+"%"+str(self.peers[peer][0])
|
|
|
|
addr_info = socket.getaddrinfo(peer_addr, self.data_port, socket.AF_INET6, socket.SOCK_DGRAM)
|
|
|
|
self.outbound_udp_socket.sendto(data, addr_info[0][4])
|
2021-12-08 14:46:53 -05:00
|
|
|
except Exception as e:
|
|
|
|
RNS.log("Could not transmit on "+str(self)+". The contained exception was: "+str(e), RNS.LOG_ERROR)
|
|
|
|
|
|
|
|
|
|
|
|
self.txb += len(data)
|
|
|
|
|
|
|
|
|
|
|
|
def __str__(self):
|
|
|
|
return "AutoInterface["+self.name+"]"
|
|
|
|
|
|
|
|
class AutoInterfaceHandler(socketserver.BaseRequestHandler):
|
|
|
|
def __init__(self, callback, *args, **keys):
|
|
|
|
self.callback = callback
|
|
|
|
socketserver.BaseRequestHandler.__init__(self, *args, **keys)
|
|
|
|
|
|
|
|
def handle(self):
|
|
|
|
data = self.request[0]
|
2021-12-09 10:07:36 -05:00
|
|
|
self.callback(data)
|