2017-12-20 00:09:34 +01:00
/*
* libretroshare / src / gxs : rsgxsnettunnel . h
*
* General Data service , interface for RetroShare .
*
2018-03-15 17:46:21 +01:00
* Copyright 2018 - 2018 by Cyril Soler
2017-12-20 00:09:34 +01:00
*
* This library is free software ; you can redistribute it and / or
* modify it under the terms of the GNU Library General Public
* License Version 2 as published by the Free Software Foundation .
*
* This library is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
* Library General Public License for more details .
*
* You should have received a copy of the GNU Library General Public
* License along with this library ; if not , write to the Free Software
* Foundation , Inc . , 59 Temple Place , Suite 330 , Boston , MA 02111 - 1307
* USA .
*
* Please report all bugs and problems to " retroshare.project@gmail.com "
*
*/
2018-04-27 00:00:29 +02:00
# pragma once
2017-12-20 00:09:34 +01:00
# include <map>
# include <turtle/p3turtle.h>
/*!
* \ brief The RsGxsNetTunnelService class takes care of requesting tunnels to the turtle router , through which it is possible to sync
2018-03-15 17:46:21 +01:00
* a particular GXS group . For each group , a set of virtual peers , corresponding to active tunnels will be made available
* to RsGxsNetService .
2017-12-20 00:09:34 +01:00
*
2018-03-15 17:46:21 +01:00
* It is the responsibility of RsGxsNetService to activate / desactivate tunnels for each particular group , depending on wether the group
* is already available at friends or not .
2018-03-29 10:54:58 +02:00
*
* Tunnel management is done at the level of groups rather than services , because we would like to keep the possibility to not
* request tunnels for some groups which do not need it , and only request tunnels for specific groups that cannot be provided
* by direct connections .
2017-12-20 00:09:34 +01:00
*/
2018-03-15 17:46:21 +01:00
// Protocol:
2017-12-20 00:09:34 +01:00
// * request tunnels based on H(GroupId)
// * encrypt tunnel data using chacha20+HMAC-SHA256 using AEAD( GroupId, 96bits IV, tunnel ID ) (similar to what FT does)
// * when tunnel is established, exchange virtual peer names: vpid = H( GroupID | Random bias )
// * when vpid is known, notify the client (GXS net service) which can use the virtual peer to sync
//
// * only use a single tunnel per virtual peer ID
2018-03-15 17:46:21 +01:00
// -
// Client ------------------ TR(H(GroupId)) --------------> Server |
// | Turtle
// Client <-------------------- T OK ---------------------- Server |
// -
// Here, a turtle vpid is known | [ addVirtualPeer() called by turtle ]
// -
// [Encrypted traffic using H(GroupId | Tunnel ID, 96bits IV)] |
// |
// Client <--------- VPID = H( Random IV | GroupId ) ------ Server |
// | | |
// +--------------> Mark the virtual peer active <-----------+ | Encrypted traffic decoded locally and sorted
// |
// Here, a consistent virtual peer ID is known |
// |
// Client <------------------- GXS Data ------------------> Server |
// -
// Notes:
2018-03-29 10:54:58 +02:00
// * tunnels are established symetrically. If a distant peers wants to sync the same group, they'll have to open a single tunnel, with a different ID.
// Groups therefore have two states:
// - managed : the group can be used to answer tunnel requests. If server tunnels are established, the group will be synced with these peers
// - tunneled: the group will actively request tunnels. If tunnels are established both ways, the same virtual peers will be used so the tunnels are "merged".
// * In practice, that means one of the two tunnels will not be used and therefore die.
// * If a tunneled group already has enough virtual peers, it will not request for tunnels itself.
//
// Group policy | Request tunnels | SyncWithPeers | Item receipt
// --------------------+-------------------+-----------------------+----------------
// Passive | no | If peers present | If peers present
// Active | yes, if no peers | If peers present | If peers present
// | | |
//
// * when a service has the DistSync flag set, groups to sync are communicated passively to the GxsNetTunnel service when requesting distant peers.
// However, a call should be made to set a particular group policy to "ACTIVE" for group that do not have peers and need some.
//
// * services also need to retrieve GXS data items that come out of tunnels. These will be available as (data,len) type, since they are not de-serialized.
2018-03-29 16:26:36 +02:00
//
// * GxsNetService stores data information (such as update maps) per peerId, so it makes sense to use the same PeerId for all groups of a given service
// Therefore, virtual peers are stored separately from groups, because each one can sync multiple groups.
//
// * virtual peers are also shared among services. This reduces the required amount of tunnels and tunnel requests to send.
2018-04-01 22:04:16 +02:00
//
// How do we know that a group needs distant sync?
// * look into GrpConfigMap for suppliers. Suppliers is cleared at load.
// * last_update_TS in GrpConfigMap is randomised so it cannot be used
// * we need a way to know that there's no suppliers for good reasons (not that we just started)
2018-04-25 17:58:37 +02:00
//
// Security
2018-04-01 22:04:16 +02:00
// *
2017-12-20 00:09:34 +01:00
typedef RsPeerId RsGxsNetTunnelVirtualPeerId ;
2018-03-24 16:42:16 +01:00
class RsGxsNetTunnelItem ;
2017-12-20 00:09:34 +01:00
struct RsGxsNetTunnelVirtualPeerInfo
{
enum { RS_GXS_NET_TUNNEL_VP_STATUS_UNKNOWN = 0x00 , // unknown status.
RS_GXS_NET_TUNNEL_VP_STATUS_TUNNEL_OK = 0x01 , // tunnel has been established and we're waiting for virtual peer id
RS_GXS_NET_TUNNEL_VP_STATUS_ACTIVE = 0x02 // virtual peer id is known. Data can transfer.
} ;
2018-04-01 22:04:16 +02:00
RsGxsNetTunnelVirtualPeerInfo ( ) : vpid_status ( RS_GXS_NET_TUNNEL_VP_STATUS_UNKNOWN ) , last_contact ( 0 ) , side ( 0 ) { memset ( encryption_master_key , 0 , 32 ) ; }
2018-04-04 21:41:21 +02:00
virtual ~ RsGxsNetTunnelVirtualPeerInfo ( ) { }
2018-03-15 17:46:21 +01:00
2018-03-22 14:41:50 +01:00
uint8_t vpid_status ; // status of the peer
2018-03-15 17:46:21 +01:00
time_t last_contact ; // last time some data was sent/recvd
2018-04-01 22:04:16 +02:00
uint8_t side ; // client/server
uint8_t encryption_master_key [ 32 ] ;
2018-03-22 14:41:50 +01:00
2018-04-25 18:29:49 +02:00
TurtleVirtualPeerId turtle_virtual_peer_id ; // turtle peer to use when sending data to this vpid.
2018-03-22 14:41:50 +01:00
2018-04-25 18:29:49 +02:00
RsGxsGroupId group_id ; // group that virtual peer is providing
2017-12-20 00:09:34 +01:00
} ;
2018-03-15 17:46:21 +01:00
struct RsGxsNetTunnelGroupInfo
2017-12-20 00:09:34 +01:00
{
2018-03-29 10:54:58 +02:00
enum GroupStatus {
RS_GXS_NET_TUNNEL_GRP_STATUS_UNKNOWN = 0x00 , // unknown status
RS_GXS_NET_TUNNEL_GRP_STATUS_IDLE = 0x01 , // no virtual peers requested, just waiting
2018-04-11 23:14:10 +02:00
// RS_GXS_NET_TUNNEL_GRP_STATUS_TUNNELS_REQUESTED = 0x02, // virtual peers requested, and waiting for turtle to answer
2018-03-29 10:54:58 +02:00
RS_GXS_NET_TUNNEL_GRP_STATUS_VPIDS_AVAILABLE = 0x03 // some virtual peers are available. Data can be read/written
2017-12-20 00:09:34 +01:00
} ;
2018-03-29 10:54:58 +02:00
enum GroupPolicy {
RS_GXS_NET_TUNNEL_GRP_POLICY_UNKNOWN = 0x00 , // nothing has been set
RS_GXS_NET_TUNNEL_GRP_POLICY_PASSIVE = 0x01 , // group is available for server side tunnels, but does not explicitely request tunnels
2018-04-29 16:19:45 +02:00
RS_GXS_NET_TUNNEL_GRP_POLICY_ACTIVE = 0x02 , // group will only explicitely request tunnels if none available
RS_GXS_NET_TUNNEL_GRP_POLICY_REQUESTING = 0x03 , // group explicitely requests tunnels
2018-03-29 10:54:58 +02:00
} ;
2018-04-25 18:29:49 +02:00
RsGxsNetTunnelGroupInfo ( ) : group_policy ( RS_GXS_NET_TUNNEL_GRP_POLICY_PASSIVE ) , group_status ( RS_GXS_NET_TUNNEL_GRP_STATUS_IDLE ) , last_contact ( 0 ) { }
2018-03-15 17:46:21 +01:00
2018-03-29 10:54:58 +02:00
GroupPolicy group_policy ;
GroupStatus group_status ;
2018-03-15 17:46:21 +01:00
time_t last_contact ;
TurtleFileHash hash ;
2017-12-20 00:09:34 +01:00
2018-04-11 23:14:10 +02:00
std : : set < TurtleVirtualPeerId > virtual_peers ; // list of which virtual peers provide this group. Can me more than 1.
2017-12-20 00:09:34 +01:00
} ;
2018-04-25 17:58:37 +02:00
class RsGxsNetTunnelService : public RsTurtleClientService
2017-12-20 00:09:34 +01:00
{
public :
2018-03-15 17:46:21 +01:00
RsGxsNetTunnelService ( ) ;
2018-03-29 16:26:36 +02:00
virtual ~ RsGxsNetTunnelService ( ) ;
2017-12-20 00:09:34 +01:00
2018-04-29 16:19:45 +02:00
/*!
* \ brief serviceType
* \ return returns the service that is currently using this as a subclass .
*/
virtual uint16_t serviceType ( ) const = 0 ;
2017-12-20 00:09:34 +01:00
/*!
2018-03-29 10:54:58 +02:00
* \ brief Manage tunnels for this group
* @ param group_id group for which tunnels should be released
2017-12-20 00:09:34 +01:00
*/
2018-04-25 18:29:49 +02:00
bool requestDistantPeers ( const RsGxsGroupId & group_id ) ;
2017-12-20 00:09:34 +01:00
/*!
* \ brief Stop managing tunnels for this group
* @ param group_id group for which tunnels should be released
*/
2018-04-25 18:29:49 +02:00
bool releaseDistantPeers ( const RsGxsGroupId & group_id ) ;
2017-12-20 00:09:34 +01:00
2018-03-29 10:54:58 +02:00
/*!
* \ brief Get the list of active virtual peers for a given group . This implies that a tunnel is up and
* alive . This function also " registers " the group which allows to handle tunnel requests in the server side .
*/
2018-04-25 18:29:49 +02:00
bool getVirtualPeers ( std : : list < RsGxsNetTunnelVirtualPeerId > & peers ) ; // returns the virtual peers for this group
2018-03-22 14:41:50 +01:00
2017-12-20 00:09:34 +01:00
/*!
2018-03-29 10:54:58 +02:00
* \ brief sendData
2018-03-22 14:41:50 +01:00
* send data to this virtual peer , and takes memory ownership ( deletes the item )
* \ param item item to send
* \ param virtual_peer destination virtual peer
* \ return
* true if succeeded .
2017-12-20 00:09:34 +01:00
*/
2018-04-25 17:58:37 +02:00
bool sendTunnelData ( unsigned char * & data , uint32_t data_len , const RsGxsNetTunnelVirtualPeerId & virtual_peer ) ;
2018-03-22 14:41:50 +01:00
/*!
2018-04-04 21:41:21 +02:00
* \ brief receiveData
2018-04-25 18:29:49 +02:00
* returns the next piece of data received , and the virtual GXS peer that sended it .
2018-04-04 21:41:21 +02:00
* \ param data memory check containing the data . Memory ownership belongs to the client .
* \ param data_len length of memory chunk
* \ param virtual_peer peer who sent the data
2018-03-22 14:41:50 +01:00
* \ return
2018-04-04 21:41:21 +02:00
* true if something is returned . If not , data is set to NULL , data_len to 0.
2018-03-22 14:41:50 +01:00
*/
2018-04-25 18:29:49 +02:00
bool receiveTunnelData ( unsigned char * & data , uint32_t & data_len , RsGxsNetTunnelVirtualPeerId & virtual_peer ) ;
2018-04-04 21:41:21 +02:00
/*!
* \ brief isDistantPeer
* returns wether the peer is in the list of available distant peers or not
2018-04-25 18:52:07 +02:00
* \ param group_id returned by the service to indicate which group this peer id is designed for .
2018-04-04 21:41:21 +02:00
* \ return true if the peer is a distant GXS peer .
*/
2018-04-25 18:52:07 +02:00
bool isDistantPeer ( const RsGxsNetTunnelVirtualPeerId & virtual_peer , RsGxsGroupId & group_id ) ;
2017-12-20 00:09:34 +01:00
/*!
* \ brief dumps all information about monitored groups .
*/
void dump ( ) const ;
// other methods are still missing.
// - derived from p3Config, to load/save data
// - method to respond to tunnel requests, probably using RsGxsNetService
// - method to encrypt/decrypt data and send/receive to/from turtle.
2018-03-15 17:46:21 +01:00
virtual void connectToTurtleRouter ( p3turtle * tr ) ;
2018-03-24 16:42:16 +01:00
// Overloaded from RsTickingThread
void data_tick ( ) ;
2018-03-15 17:46:21 +01:00
protected :
// interaction with turtle router
virtual bool handleTunnelRequest ( const RsFileHash & hash , const RsPeerId & peer_id ) ;
virtual void receiveTurtleData ( RsTurtleGenericTunnelItem * item , const RsFileHash & hash , const RsPeerId & virtual_peer_id , RsTurtleGenericTunnelItem : : Direction direction ) ;
void addVirtualPeer ( const TurtleFileHash & , const TurtleVirtualPeerId & , RsTurtleGenericTunnelItem : : Direction dir ) ;
void removeVirtualPeer ( const TurtleFileHash & , const TurtleVirtualPeerId & ) ;
p3turtle * mTurtle ;
2018-04-27 00:00:29 +02:00
static const uint32_t RS_GXS_TUNNEL_CONST_RANDOM_BIAS_SIZE = 20 ;
static const uint32_t RS_GXS_TUNNEL_CONST_EKEY_SIZE = 32 ;
2018-04-29 16:19:45 +02:00
mutable Bias20Bytes mRandomBias ; // constant accross reboots. Allows to disguise the real SSL id while providing a consistent value accross time.
2017-12-20 00:09:34 +01:00
private :
2018-03-24 16:42:16 +01:00
void autowash ( ) ;
2018-04-11 23:14:10 +02:00
void sendKeepAlivePackets ( ) ;
2018-03-24 16:42:16 +01:00
void handleIncoming ( RsGxsNetTunnelItem * item ) ;
2018-04-02 17:07:32 +02:00
void flush_pending_items ( ) ;
2018-03-24 16:42:16 +01:00
2018-03-22 14:41:50 +01:00
std : : map < RsGxsGroupId , RsGxsNetTunnelGroupInfo > mGroups ; // groups on the client and server side
2017-12-20 00:09:34 +01:00
2018-03-29 16:26:36 +02:00
std : : map < RsGxsNetTunnelVirtualPeerId , RsGxsNetTunnelVirtualPeerInfo > mVirtualPeers ; // current virtual peers, which group they provide, and how to talk to them through turtle
std : : map < RsFileHash , RsGxsGroupId > mHandledHashes ; // hashes asked to turtle. Used to answer tunnel requests
std : : map < TurtleVirtualPeerId , RsGxsNetTunnelVirtualPeerId > mTurtle2GxsPeer ; // convertion table to find GXS peer id from turtle
2017-12-20 00:09:34 +01:00
2018-04-02 17:07:32 +02:00
std : : list < std : : pair < TurtleVirtualPeerId , RsTurtleGenericDataItem * > > mPendingTurtleItems ; // items that need to be sent off-turtle Mutex.
2018-04-25 18:29:49 +02:00
std : : list < std : : pair < RsGxsNetTunnelVirtualPeerId , RsTlvBinaryData * > > mIncomingData ; // list of incoming data items
2018-04-04 21:41:21 +02:00
2017-12-20 00:09:34 +01:00
/*!
* \ brief Generates the hash to request tunnels for this group . This hash is only used by turtle , and is used to
* hide the real group id .
*/
2018-03-21 22:09:40 +01:00
RsFileHash calculateGroupHash ( const RsGxsGroupId & group_id ) const ;
2017-12-20 00:09:34 +01:00
/*!
* \ brief makeVirtualPeerIdForGroup creates a virtual peer id that can be used and that will be constant accross time , whatever the
* tunnel ID and turtle virtual peer id . This allows RsGxsNetService to keep sync - ing the data consistently .
*/
2018-04-25 18:29:49 +02:00
RsGxsNetTunnelVirtualPeerId locked_makeVirtualPeerId ( const RsGxsGroupId & group_id ) const ;
2018-03-21 22:09:40 +01:00
2018-03-29 16:26:36 +02:00
static void generateEncryptionKey ( const RsGxsGroupId & group_id , const TurtleVirtualPeerId & vpid , unsigned char key [ RS_GXS_TUNNEL_CONST_EKEY_SIZE ] ) ;
2017-12-20 00:09:34 +01:00
2018-03-22 14:41:50 +01:00
mutable RsMutex mGxsNetTunnelMtx ;
2018-04-27 00:00:29 +02:00
friend class RsGxsTunnelRandomBiasItem ;
friend class StoreHere ;
2018-04-29 19:20:14 +02:00
time_t mLastKeepAlive ;
time_t mLastAutoWash ;
time_t mLastDump ;
2017-12-20 00:09:34 +01:00
} ;