id.go 13.5 KB
Newer Older
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
1
2
3
package identify

import (
4
	"context"
5
	"strings"
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
6
7
	"sync"

Jeromy's avatar
Jeromy committed
8
9
	pb "github.com/libp2p/go-libp2p/p2p/protocol/identify/pb"

Jeromy's avatar
Jeromy committed
10
11
	semver "github.com/coreos/go-semver/semver"
	ggio "github.com/gogo/protobuf/io"
Jeromy's avatar
Jeromy committed
12
	logging "github.com/ipfs/go-log"
Jeromy's avatar
Jeromy committed
13
	ic "github.com/libp2p/go-libp2p-crypto"
Jeromy's avatar
Jeromy committed
14
	host "github.com/libp2p/go-libp2p-host"
Jeromy's avatar
Jeromy committed
15
	lgbl "github.com/libp2p/go-libp2p-loggables"
Jeromy's avatar
Jeromy committed
16
	metrics "github.com/libp2p/go-libp2p-metrics"
Jeromy's avatar
Jeromy committed
17
18
	mstream "github.com/libp2p/go-libp2p-metrics/stream"
	inet "github.com/libp2p/go-libp2p-net"
Jeromy's avatar
Jeromy committed
19
20
21
	peer "github.com/libp2p/go-libp2p-peer"
	pstore "github.com/libp2p/go-libp2p-peerstore"
	ma "github.com/multiformats/go-multiaddr"
Jeromy's avatar
Jeromy committed
22
	msmux "github.com/multiformats/go-multistream"
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
23
24
)

Jeromy's avatar
Jeromy committed
25
var log = logging.Logger("net/identify")
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
26
27

// ID is the protocol.ID of the Identify Service.
Jeromy's avatar
Jeromy committed
28
const ID = "/ipfs/id/1.0.0"
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
29

Jeromy's avatar
Jeromy committed
30
// LibP2PVersion holds the current protocol version for a client running this code
31
// TODO(jbenet): fix the versioning mess.
Jeromy's avatar
Jeromy committed
32
const LibP2PVersion = "ipfs/0.1.0"
Jeromy's avatar
Jeromy committed
33
34

var ClientVersion = "go-libp2p/3.3.4"
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
35
36
37
38
39
40
41
42
43
44
45
46

// IDService is a structure that implements ProtocolIdentify.
// It is a trivial service that gives the other peer some
// useful information about the local peer. A sort of hello.
//
// The IDService sends:
//  * Our IPFS Protocol Version
//  * Our IPFS Agent Version
//  * Our public Listen Addresses
type IDService struct {
	Host host.Host

Jeromy's avatar
Jeromy committed
47
	Reporter metrics.Reporter
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
48
49
50
51
	// connections undergoing identification
	// for wait purposes
	currid map[inet.Conn]chan struct{}
	currmu sync.RWMutex
52

Steven Allen's avatar
Steven Allen committed
53
54
	addrMu sync.Mutex

55
56
	// our own observed addresses.
	// TODO: instead of expiring, remove these when we disconnect
57
	observedAddrs ObservedAddrSet
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
58
59
}

60
61
// NewIDService constructs a new *IDService and activates it by
// attaching its stream handler to the given host.Host.
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
62
63
64
65
66
67
func NewIDService(h host.Host) *IDService {
	s := &IDService{
		Host:   h,
		currid: make(map[inet.Conn]chan struct{}),
	}
	h.SetStreamHandler(ID, s.RequestHandler)
68
	h.Network().Notify((*netNotifiee)(s))
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
69
70
71
	return s
}

72
73
// OwnObservedAddrs returns the addresses peers have reported we've dialed from
func (ids *IDService) OwnObservedAddrs() []ma.Multiaddr {
74
	return ids.observedAddrs.Addrs()
75
76
}

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
77
78
79
80
81
82
83
84
func (ids *IDService) IdentifyConn(c inet.Conn) {
	ids.currmu.Lock()
	if wait, found := ids.currid[c]; found {
		ids.currmu.Unlock()
		log.Debugf("IdentifyConn called twice on: %s", c)
		<-wait // already identifying it. wait for it.
		return
	}
85
86
	ch := make(chan struct{})
	ids.currid[c] = ch
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
87
88
	ids.currmu.Unlock()

89
90
	defer close(ch)

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
91
92
	s, err := c.NewStream()
	if err != nil {
Jeromy's avatar
Jeromy committed
93
		log.Debugf("error opening initial stream for %s: %s", ID, err)
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
94
		log.Event(context.TODO(), "IdentifyOpenFailed", c.RemotePeer())
Jeromy's avatar
Jeromy committed
95
96
		c.Close()
		return
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
97
	}
98
	defer s.Close()
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
99

100
101
	s.SetProtocol(ID)

Jeromy's avatar
Jeromy committed
102
103
104
	if ids.Reporter != nil {
		s = mstream.WrapStream(s, ids.Reporter)
	}
105
106
107

	// ok give the response to our handler.
	if err := msmux.SelectProtoOrFail(ID, s); err != nil {
108
		log.Event(context.TODO(), "IdentifyOpenFailed", c.RemotePeer(), logging.Metadata{"error": err})
109
110
111
112
113
		return
	}

	ids.ResponseHandler(s)

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
114
	ids.currmu.Lock()
115
	_, found := ids.currid[c]
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
116
117
118
119
	delete(ids.currid, c)
	ids.currmu.Unlock()

	if !found {
120
		log.Errorf("IdentifyConn failed to find channel (programmer error) for %s", c)
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
121
122
123
124
125
126
127
128
		return
	}
}

func (ids *IDService) RequestHandler(s inet.Stream) {
	defer s.Close()
	c := s.Conn()

Jeromy's avatar
Jeromy committed
129
130
131
	if ids.Reporter != nil {
		s = mstream.WrapStream(s, ids.Reporter)
	}
Jeromy's avatar
Jeromy committed
132

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
	w := ggio.NewDelimitedWriter(s)
	mes := pb.Identify{}
	ids.populateMessage(&mes, s.Conn())
	w.WriteMsg(&mes)

	log.Debugf("%s sent message to %s %s", ID,
		c.RemotePeer(), c.RemoteMultiaddr())
}

func (ids *IDService) ResponseHandler(s inet.Stream) {
	defer s.Close()
	c := s.Conn()

	r := ggio.NewDelimitedReader(s, 2048)
	mes := pb.Identify{}
	if err := r.ReadMsg(&mes); err != nil {
149
		log.Warning("error reading identify message: ", err)
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
		return
	}
	ids.consumeMessage(&mes, c)

	log.Debugf("%s received message from %s %s", ID,
		c.RemotePeer(), c.RemoteMultiaddr())
}

func (ids *IDService) populateMessage(mes *pb.Identify, c inet.Conn) {

	// set protocols this node is currently handling
	protos := ids.Host.Mux().Protocols()
	mes.Protocols = make([]string, len(protos))
	for i, p := range protos {
		mes.Protocols[i] = string(p)
	}

	// observed address so other side is informed of their
	// "public" address, at least in relation to us.
	mes.ObservedAddr = c.RemoteMultiaddr().Bytes()

171
172
173
174
175
	// set listen addrs, get our latest addrs from Host.
	laddrs := ids.Host.Addrs()
	mes.ListenAddrs = make([][]byte, len(laddrs))
	for i, addr := range laddrs {
		mes.ListenAddrs[i] = addr.Bytes()
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
176
	}
177
	log.Debugf("%s sent listen addrs to %s: %s", c.LocalPeer(), c.RemotePeer(), laddrs)
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
178

179
	// set our public key
jbenet's avatar
jbenet committed
180
181
182
183
184
185
186
187
188
189
190
	ownKey := ids.Host.Peerstore().PubKey(ids.Host.ID())
	if ownKey == nil {
		log.Errorf("did not have own public key in Peerstore")
	} else {
		if kb, err := ownKey.Bytes(); err != nil {
			log.Errorf("failed to convert key to bytes")
		} else {
			mes.PublicKey = kb
		}
	}

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
191
	// set protocol versions
Jeromy's avatar
Jeromy committed
192
	pv := LibP2PVersion
193
194
195
	av := ClientVersion
	mes.ProtocolVersion = &pv
	mes.AgentVersion = &av
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
196
197
198
199
200
201
}

func (ids *IDService) consumeMessage(mes *pb.Identify, c inet.Conn) {
	p := c.RemotePeer()

	// mes.Protocols
202
	ids.Host.Peerstore().SetProtocols(p, mes.Protocols...)
203

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
204
	// mes.ObservedAddr
205
	ids.consumeObservedAddress(mes.GetObservedAddr(), c)
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
206
207
208
209
210
211
212

	// mes.ListenAddrs
	laddrs := mes.GetListenAddrs()
	lmaddrs := make([]ma.Multiaddr, 0, len(laddrs))
	for _, addr := range laddrs {
		maddr, err := ma.NewMultiaddrBytes(addr)
		if err != nil {
213
			log.Debugf("%s failed to parse multiaddr from %s %s", ID,
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
214
215
216
217
218
219
				p, c.RemoteMultiaddr())
			continue
		}
		lmaddrs = append(lmaddrs, maddr)
	}

220
221
222
223
224
	// if the address reported by the connection roughly matches their annoucned
	// listener addresses, its likely to be an external NAT address
	if HasConsistentTransport(c.RemoteMultiaddr(), lmaddrs) {
		lmaddrs = append(lmaddrs, c.RemoteMultiaddr())
	}
225

Steven Allen's avatar
Steven Allen committed
226
227
228
229
230
231
232
233
234
235
236
	// Extend the TTLs on the known (probably) good addresses.
	// Taking the lock ensures that we don't concurrently process a disconnect.
	ids.addrMu.Lock()
	switch ids.Host.Network().Connectedness(p) {
	case inet.Connected:
		ids.Host.Peerstore().AddAddrs(p, lmaddrs, pstore.ConnectedAddrTTL)
	default:
		ids.Host.Peerstore().AddAddrs(p, lmaddrs, pstore.RecentlyConnectedAddrTTL)
	}
	ids.addrMu.Unlock()

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
237
238
239
	log.Debugf("%s received listen addrs for %s: %s", c.LocalPeer(), c.RemotePeer(), lmaddrs)

	// get protocol versions
240
241
	pv := mes.GetProtocolVersion()
	av := mes.GetAgentVersion()
242
243
244
245

	// version check. if we shouldn't talk, bail.
	// TODO: at this point, we've already exchanged information.
	// move this into a first handshake before the connection can open streams.
Jeromy's avatar
Jeromy committed
246
	if !protocolVersionsAreCompatible(pv, LibP2PVersion) {
247
		logProtocolMismatchDisconnect(c, pv, av)
248
249
250
251
		c.Close()
		return
	}

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
252
253
	ids.Host.Peerstore().Put(p, "ProtocolVersion", pv)
	ids.Host.Peerstore().Put(p, "AgentVersion", av)
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279

	// get the key from the other side. we may not have it (no-auth transport)
	ids.consumeReceivedPubKey(c, mes.PublicKey)
}

func (ids *IDService) consumeReceivedPubKey(c inet.Conn, kb []byte) {
	lp := c.LocalPeer()
	rp := c.RemotePeer()

	if kb == nil {
		log.Debugf("%s did not receive public key for remote peer: %s", lp, rp)
		return
	}

	newKey, err := ic.UnmarshalPublicKey(kb)
	if err != nil {
		log.Errorf("%s cannot unmarshal key from remote peer: %s", lp, rp)
		return
	}

	// verify key matches peer.ID
	np, err := peer.IDFromPublicKey(newKey)
	if err != nil {
		log.Debugf("%s cannot get peer.ID from key of remote peer: %s, %s", lp, rp, err)
		return
	}
280

281
	if np != rp {
282
283
284
285
286
287
288
289
290
291
292
293
294
		// if the newKey's peer.ID does not match known peer.ID...

		if rp == "" && np != "" {
			// if local peerid is empty, then use the new, sent key.
			err := ids.Host.Peerstore().AddPubKey(rp, newKey)
			if err != nil {
				log.Debugf("%s could not add key for %s to peerstore: %s", lp, rp, err)
			}

		} else {
			// we have a local peer.ID and it does not match the sent key... error.
			log.Errorf("%s received key for remote peer %s mismatch: %s", lp, rp, np)
		}
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
		return
	}

	currKey := ids.Host.Peerstore().PubKey(rp)
	if currKey == nil {
		// no key? no auth transport. set this one.
		err := ids.Host.Peerstore().AddPubKey(rp, newKey)
		if err != nil {
			log.Debugf("%s could not add key for %s to peerstore: %s", lp, rp, err)
		}
		return
	}

	// ok, we have a local key, we should verify they match.
	if currKey.Equals(newKey) {
		return // ok great. we're done.
	}

	// weird, got a different key... but the different key MATCHES the peer.ID.
	// this odd. let's log error and investigate. this should basically never happen
	// and it means we have something funky going on and possibly a bug.
	log.Errorf("%s identify got a different key for: %s", lp, rp)

	// okay... does ours NOT match the remote peer.ID?
	cp, err := peer.IDFromPublicKey(currKey)
	if err != nil {
		log.Errorf("%s cannot get peer.ID from local key of remote peer: %s, %s", lp, rp, err)
		return
	}
	if cp != rp {
		log.Errorf("%s local key for remote peer %s yields different peer.ID: %s", lp, rp, cp)
		return
	}

	// okay... curr key DOES NOT match new key. both match peer.ID. wat?
	log.Errorf("%s local key and received key for %s do not match, but match peer.ID", lp, rp)
Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
331
332
}

333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
// HasConsistentTransport returns true if the address 'a' shares a
// protocol set with any address in the green set. This is used
// to check if a given address might be one of the addresses a peer is
// listening on.
func HasConsistentTransport(a ma.Multiaddr, green []ma.Multiaddr) bool {
	protosMatch := func(a, b []ma.Protocol) bool {
		if len(a) != len(b) {
			return false
		}

		for i, p := range a {
			if b[i].Code != p.Code {
				return false
			}
		}
		return true
	}

	protos := a.Protocols()

	for _, ga := range green {
		if protosMatch(protos, ga.Protocols()) {
			return true
		}
	}

	return false
}

Juan Batiz-Benet's avatar
Juan Batiz-Benet committed
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
// IdentifyWait returns a channel which will be closed once
// "ProtocolIdentify" (handshake3) finishes on given conn.
// This happens async so the connection can start to be used
// even if handshake3 knowledge is not necesary.
// Users **MUST** call IdentifyWait _after_ IdentifyConn
func (ids *IDService) IdentifyWait(c inet.Conn) <-chan struct{} {
	ids.currmu.Lock()
	ch, found := ids.currid[c]
	ids.currmu.Unlock()
	if found {
		return ch
	}

	// if not found, it means we are already done identifying it, or
	// haven't even started. either way, return a new channel closed.
	ch = make(chan struct{})
	close(ch)
	return ch
}
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410

func (ids *IDService) consumeObservedAddress(observed []byte, c inet.Conn) {
	if observed == nil {
		return
	}

	maddr, err := ma.NewMultiaddrBytes(observed)
	if err != nil {
		log.Debugf("error parsing received observed addr for %s: %s", c, err)
		return
	}

	// we should only use ObservedAddr when our connection's LocalAddr is one
	// of our ListenAddrs. If we Dial out using an ephemeral addr, knowing that
	// address's external mapping is not very useful because the port will not be
	// the same as the listen addr.
	ifaceaddrs, err := ids.Host.Network().InterfaceListenAddresses()
	if err != nil {
		log.Infof("failed to get interface listen addrs", err)
		return
	}

	log.Debugf("identify identifying observed multiaddr: %s %s", c.LocalMultiaddr(), ifaceaddrs)
	if !addrInAddrs(c.LocalMultiaddr(), ifaceaddrs) {
		// not in our list
		return
	}

	// ok! we have the observed version of one of our ListenAddresses!
	log.Debugf("added own observed listen addr: %s --> %s", c.LocalMultiaddr(), maddr)
411
	ids.observedAddrs.Add(maddr, c.RemoteMultiaddr())
412
413
414
415
416
417
418
419
420
421
}

func addrInAddrs(a ma.Multiaddr, as []ma.Multiaddr) bool {
	for _, b := range as {
		if a.Equal(b) {
			return true
		}
	}
	return false
}
422

423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
// protocolVersionsAreCompatible checks that the two implementations
// can talk to each other. It will use semver, but for now while
// we're in tight development, we will return false for minor version
// changes too.
func protocolVersionsAreCompatible(v1, v2 string) bool {
	if strings.HasPrefix(v1, "ipfs/") {
		v1 = v1[5:]
	}
	if strings.HasPrefix(v2, "ipfs/") {
		v2 = v2[5:]
	}

	v1s, err := semver.NewVersion(v1)
	if err != nil {
		return false
	}

	v2s, err := semver.NewVersion(v2)
	if err != nil {
		return false
	}

	return v1s.Major == v2s.Major && v1s.Minor == v2s.Minor
}

448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
// netNotifiee defines methods to be used with the IpfsDHT
type netNotifiee IDService

func (nn *netNotifiee) IDService() *IDService {
	return (*IDService)(nn)
}

func (nn *netNotifiee) Connected(n inet.Network, v inet.Conn) {
	// TODO: deprecate the setConnHandler hook, and kick off
	// identification here.
}

func (nn *netNotifiee) Disconnected(n inet.Network, v inet.Conn) {
	// undo the setting of addresses to peer.ConnectedAddrTTL we did
	ids := nn.IDService()
Steven Allen's avatar
Steven Allen committed
463
464
465
466
467
468
469
470
	ids.addrMu.Lock()
	defer ids.addrMu.Unlock()

	if ids.Host.Network().Connectedness(v.RemotePeer()) != inet.Connected {
		// Last disconnect.
		ps := ids.Host.Peerstore()
		ps.UpdateAddrs(v.RemotePeer(), pstore.ConnectedAddrTTL, pstore.RecentlyConnectedAddrTTL)
	}
471
472
473
474
475
476
}

func (nn *netNotifiee) OpenedStream(n inet.Network, v inet.Stream) {}
func (nn *netNotifiee) ClosedStream(n inet.Network, v inet.Stream) {}
func (nn *netNotifiee) Listen(n inet.Network, a ma.Multiaddr)      {}
func (nn *netNotifiee) ListenClose(n inet.Network, a ma.Multiaddr) {}
477
478
479
480
481
482
483
484

func logProtocolMismatchDisconnect(c inet.Conn, protocol, agent string) {
	lm := make(lgbl.DeferredMap)
	lm["remotePeer"] = func() interface{} { return c.RemotePeer().Pretty() }
	lm["remoteAddr"] = func() interface{} { return c.RemoteMultiaddr().String() }
	lm["protocolVersion"] = protocol
	lm["agentVersion"] = agent
	log.Event(context.TODO(), "IdentifyProtocolMismatch", lm)
Jakub Sztandera's avatar
Jakub Sztandera committed
485
	log.Debugf("IdentifyProtocolMismatch %s %s %s (disconnected)", c.RemotePeer(), protocol, agent)
486
}