2020-09-22 08:17:39 +00:00
|
|
|
// Copyright 2015 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package p2p
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net"
|
2023-08-24 11:49:19 +00:00
|
|
|
"strings"
|
2020-09-22 08:17:39 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2023-11-20 12:23:23 +00:00
|
|
|
"github.com/ledgerwatch/erigon-lib/common"
|
2021-05-20 18:25:53 +00:00
|
|
|
"github.com/ledgerwatch/erigon/common/bitutil"
|
|
|
|
"github.com/ledgerwatch/erigon/p2p/rlpx"
|
|
|
|
"github.com/ledgerwatch/erigon/rlp"
|
2020-09-22 08:17:39 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// total timeout for encryption handshake and protocol
|
|
|
|
// handshake in both directions.
|
|
|
|
handshakeTimeout = 5 * time.Second
|
|
|
|
|
|
|
|
// This is the timeout for sending the disconnect reason.
|
|
|
|
// This is shorter than the usual timeout because we don't want
|
|
|
|
// to wait if the connection is known to be bad anyway.
|
|
|
|
discWriteTimeout = 1 * time.Second
|
|
|
|
)
|
|
|
|
|
|
|
|
// rlpxTransport is the transport used by actual (non-test) connections.
|
|
|
|
// It wraps an RLPx connection with locks and read/write deadlines.
|
|
|
|
type rlpxTransport struct {
|
|
|
|
rmu, wmu sync.Mutex
|
|
|
|
wbuf bytes.Buffer
|
|
|
|
conn *rlpx.Conn
|
|
|
|
}
|
|
|
|
|
|
|
|
func newRLPX(conn net.Conn, dialDest *ecdsa.PublicKey) transport {
|
|
|
|
return &rlpxTransport{conn: rlpx.NewConn(conn, dialDest)}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *rlpxTransport) ReadMsg() (Msg, error) {
|
|
|
|
t.rmu.Lock()
|
|
|
|
defer t.rmu.Unlock()
|
|
|
|
|
|
|
|
var msg Msg
|
2020-10-06 09:29:59 +00:00
|
|
|
err1 := t.conn.SetReadDeadline(time.Now().Add(frameReadTimeout))
|
|
|
|
if err1 != nil {
|
|
|
|
return msg, err1
|
|
|
|
}
|
2020-09-22 08:17:39 +00:00
|
|
|
code, data, wireSize, err := t.conn.Read()
|
|
|
|
if err == nil {
|
2021-06-18 11:47:46 +00:00
|
|
|
// Protocol messages are dispatched to subprotocol handlers asynchronously,
|
|
|
|
// but package rlpx may reuse the returned 'data' buffer on the next call
|
|
|
|
// to Read. Copy the message data to avoid this being an issue.
|
|
|
|
data = common.CopyBytes(data)
|
2020-09-22 08:17:39 +00:00
|
|
|
msg = Msg{
|
|
|
|
ReceivedAt: time.Now(),
|
|
|
|
Code: code,
|
|
|
|
Size: uint32(len(data)),
|
|
|
|
meterSize: uint32(wireSize),
|
|
|
|
Payload: bytes.NewReader(data),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return msg, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *rlpxTransport) WriteMsg(msg Msg) error {
|
|
|
|
t.wmu.Lock()
|
|
|
|
defer t.wmu.Unlock()
|
|
|
|
|
|
|
|
// Copy message data to write buffer.
|
|
|
|
t.wbuf.Reset()
|
|
|
|
if _, err := io.CopyN(&t.wbuf, msg.Payload, int64(msg.Size)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write the message.
|
2020-10-06 09:29:59 +00:00
|
|
|
if err := t.conn.SetWriteDeadline(time.Now().Add(frameWriteTimeout)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-22 08:17:39 +00:00
|
|
|
size, err := t.conn.Write(msg.Code, t.wbuf.Bytes())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set metrics.
|
|
|
|
msg.meterSize = size
|
2023-11-20 12:23:23 +00:00
|
|
|
// TODO: use "github.com/ledgerwatch/erigon-lib/metrics"
|
2022-05-07 07:52:04 +00:00
|
|
|
//if metrics.Enabled && msg.meterCap.Name != "" { // don't meter non-subprotocol messages
|
|
|
|
// m := fmt.Sprintf("%s/%s/%d/%#02x", egressMeterName, msg.meterCap.Name, msg.meterCap.Version, msg.meterCode)
|
|
|
|
// metrics.GetOrRegisterMeter(m, nil).Mark(int64(msg.meterSize))
|
|
|
|
// metrics.GetOrRegisterMeter(m+"/packets", nil).Mark(1)
|
|
|
|
//}
|
2020-09-22 08:17:39 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *rlpxTransport) close(err error) {
|
|
|
|
t.wmu.Lock()
|
|
|
|
defer t.wmu.Unlock()
|
|
|
|
|
|
|
|
// Tell the remote end why we're disconnecting if possible.
|
|
|
|
// We only bother doing this if the underlying connection supports
|
|
|
|
// setting a timeout tough.
|
|
|
|
if t.conn != nil {
|
|
|
|
if r, ok := err.(DiscReason); ok && r != DiscNetworkError {
|
|
|
|
deadline := time.Now().Add(discWriteTimeout)
|
|
|
|
if err := t.conn.SetWriteDeadline(deadline); err == nil {
|
|
|
|
// Connection supports write deadline.
|
|
|
|
t.wbuf.Reset()
|
2023-08-24 11:49:19 +00:00
|
|
|
_ = DisconnectMessagePayloadEncode(&t.wbuf, r)
|
2020-10-06 09:29:59 +00:00
|
|
|
t.conn.Write(discMsg, t.wbuf.Bytes()) //nolint:errcheck
|
2020-09-22 08:17:39 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-10-06 09:29:59 +00:00
|
|
|
t.conn.Close() //nolint:errcheck
|
2020-09-22 08:17:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t *rlpxTransport) doEncHandshake(prv *ecdsa.PrivateKey) (*ecdsa.PublicKey, error) {
|
2020-10-06 09:29:59 +00:00
|
|
|
if err := t.conn.SetDeadline(time.Now().Add(handshakeTimeout)); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2020-09-22 08:17:39 +00:00
|
|
|
return t.conn.Handshake(prv)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *rlpxTransport) doProtoHandshake(our *protoHandshake) (their *protoHandshake, err error) {
|
|
|
|
// Writing our handshake happens concurrently, we prefer
|
|
|
|
// returning the handshake read error. If the remote side
|
|
|
|
// disconnects us early with a valid reason, we should return it
|
|
|
|
// as the error so it can be tracked elsewhere.
|
|
|
|
werr := make(chan error, 1)
|
|
|
|
go func() { werr <- Send(t, handshakeMsg, our) }()
|
|
|
|
if their, err = readProtocolHandshake(t); err != nil {
|
|
|
|
<-werr // make sure the write terminates too
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := <-werr; err != nil {
|
2021-10-04 15:16:52 +00:00
|
|
|
return nil, fmt.Errorf("write error: %w", err)
|
2020-09-22 08:17:39 +00:00
|
|
|
}
|
|
|
|
// If the protocol version supports Snappy encoding, upgrade immediately
|
|
|
|
t.conn.SetSnappy(their.Version >= snappyProtocolVersion)
|
|
|
|
|
|
|
|
return their, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func readProtocolHandshake(rw MsgReader) (*protoHandshake, error) {
|
|
|
|
msg, err := rw.ReadMsg()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if msg.Size > baseProtocolMaxMsgSize {
|
|
|
|
return nil, fmt.Errorf("message too big")
|
|
|
|
}
|
|
|
|
if msg.Code == discMsg {
|
|
|
|
// Disconnect before protocol handshake is valid according to the
|
|
|
|
// spec and we send it ourself if the post-handshake checks fail.
|
2023-08-24 11:49:19 +00:00
|
|
|
reason, _ := DisconnectMessagePayloadDecode(msg.Payload)
|
|
|
|
return nil, reason
|
2020-09-22 08:17:39 +00:00
|
|
|
}
|
|
|
|
if msg.Code != handshakeMsg {
|
|
|
|
return nil, fmt.Errorf("expected handshake, got %x", msg.Code)
|
|
|
|
}
|
|
|
|
var hs protoHandshake
|
|
|
|
if err := msg.Decode(&hs); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-11-22 05:39:31 +00:00
|
|
|
if len(hs.Pubkey) != 64 || !bitutil.TestBytes(hs.Pubkey) {
|
2020-09-22 08:17:39 +00:00
|
|
|
return nil, DiscInvalidIdentity
|
|
|
|
}
|
|
|
|
return &hs, nil
|
|
|
|
}
|
2023-08-24 11:49:19 +00:00
|
|
|
|
|
|
|
func DisconnectMessagePayloadDecode(reader io.Reader) (DiscReason, error) {
|
|
|
|
var buffer bytes.Buffer
|
|
|
|
_, err := buffer.ReadFrom(reader)
|
|
|
|
if err != nil {
|
|
|
|
return DiscRequested, err
|
|
|
|
}
|
|
|
|
data := buffer.Bytes()
|
|
|
|
if len(data) == 0 {
|
|
|
|
return DiscRequested, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var reasonList struct{ Reason DiscReason }
|
|
|
|
err = rlp.DecodeBytes(data, &reasonList)
|
|
|
|
|
|
|
|
// en empty list
|
|
|
|
if (err != nil) && strings.Contains(err.Error(), "rlp: too few elements") {
|
|
|
|
return DiscRequested, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// not a list, try to decode as a plain integer
|
|
|
|
if (err != nil) && strings.Contains(err.Error(), "rlp: expected input list") {
|
|
|
|
err = rlp.DecodeBytes(data, &reasonList.Reason)
|
|
|
|
}
|
|
|
|
|
|
|
|
return reasonList.Reason, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func DisconnectMessagePayloadEncode(writer io.Writer, reason DiscReason) error {
|
|
|
|
return rlp.Encode(writer, []DiscReason{reason})
|
|
|
|
}
|