Coverage Report

Created: 2026-04-29 19:21

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/tmp/bitcoin/src/net.cpp
Line
Count
Source
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <bitcoin-build-config.h> // IWYU pragma: keep
7
8
#include <net.h>
9
10
#include <addrdb.h>
11
#include <addrman.h>
12
#include <banman.h>
13
#include <clientversion.h>
14
#include <common/args.h>
15
#include <common/netif.h>
16
#include <compat/compat.h>
17
#include <consensus/consensus.h>
18
#include <crypto/sha256.h>
19
#include <i2p.h>
20
#include <key.h>
21
#include <logging.h>
22
#include <memusage.h>
23
#include <net_permissions.h>
24
#include <netaddress.h>
25
#include <netbase.h>
26
#include <node/eviction.h>
27
#include <node/interface_ui.h>
28
#include <protocol.h>
29
#include <random.h>
30
#include <scheduler.h>
31
#include <util/fs.h>
32
#include <util/sock.h>
33
#include <util/strencodings.h>
34
#include <util/thread.h>
35
#include <util/threadinterrupt.h>
36
#include <util/trace.h>
37
#include <util/translation.h>
38
#include <util/vector.h>
39
40
#include <algorithm>
41
#include <array>
42
#include <cmath>
43
#include <cstdint>
44
#include <cstring>
45
#include <functional>
46
#include <optional>
47
#include <string_view>
48
#include <unordered_map>
49
50
TRACEPOINT_SEMAPHORE(net, closed_connection);
51
TRACEPOINT_SEMAPHORE(net, evicted_inbound_connection);
52
TRACEPOINT_SEMAPHORE(net, inbound_connection);
53
TRACEPOINT_SEMAPHORE(net, outbound_connection);
54
TRACEPOINT_SEMAPHORE(net, outbound_message);
55
56
/** Maximum number of block-relay-only anchor connections */
57
static constexpr size_t MAX_BLOCK_RELAY_ONLY_ANCHORS = 2;
58
static_assert (MAX_BLOCK_RELAY_ONLY_ANCHORS <= static_cast<size_t>(MAX_BLOCK_RELAY_ONLY_CONNECTIONS), "MAX_BLOCK_RELAY_ONLY_ANCHORS must not exceed MAX_BLOCK_RELAY_ONLY_CONNECTIONS.");
59
/** Anchor IP address database file name */
60
const char* const ANCHORS_DATABASE_FILENAME = "anchors.dat";
61
62
// How often to dump addresses to peers.dat
63
static constexpr std::chrono::minutes DUMP_PEERS_INTERVAL{15};
64
65
/** Number of DNS seeds to query when the number of connections is low. */
66
static constexpr int DNSSEEDS_TO_QUERY_AT_ONCE = 3;
67
68
/** Minimum number of outbound connections under which we will keep fetching our address seeds. */
69
static constexpr int SEED_OUTBOUND_CONNECTION_THRESHOLD = 2;
70
71
/** How long to delay before querying DNS seeds
72
 *
73
 * If we have more than THRESHOLD entries in addrman, then it's likely
74
 * that we got those addresses from having previously connected to the P2P
75
 * network, and that we'll be able to successfully reconnect to the P2P
76
 * network via contacting one of them. So if that's the case, spend a
77
 * little longer trying to connect to known peers before querying the
78
 * DNS seeds.
79
 */
80
static constexpr std::chrono::seconds DNSSEEDS_DELAY_FEW_PEERS{11};
81
static constexpr std::chrono::minutes DNSSEEDS_DELAY_MANY_PEERS{5};
82
static constexpr int DNSSEEDS_DELAY_PEER_THRESHOLD = 1000; // "many" vs "few" peers
83
84
/** The default timeframe for -maxuploadtarget. 1 day. */
85
static constexpr std::chrono::seconds MAX_UPLOAD_TIMEFRAME{60 * 60 * 24};
86
87
// A random time period (0 to 1 seconds) is added to feeler connections to prevent synchronization.
88
static constexpr auto FEELER_SLEEP_WINDOW{1s};
89
90
/** Frequency to attempt extra connections to reachable networks we're not connected to yet **/
91
static constexpr auto EXTRA_NETWORK_PEER_INTERVAL{5min};
92
93
/** Used to pass flags to the Bind() function */
94
enum BindFlags {
95
    BF_NONE         = 0,
96
    BF_REPORT_ERROR = (1U << 0),
97
    /**
98
     * Do not call AddLocal() for our special addresses, e.g., for incoming
99
     * Tor connections, to prevent gossiping them over the network.
100
     */
101
    BF_DONT_ADVERTISE = (1U << 1),
102
};
103
104
// The set of sockets cannot be modified while waiting
105
// The sleep time needs to be small to avoid new sockets stalling
106
static const uint64_t SELECT_TIMEOUT_MILLISECONDS = 50;
107
108
const std::string NET_MESSAGE_TYPE_OTHER = "*other*";
109
110
static const uint64_t RANDOMIZER_ID_NETGROUP = 0x6c0edd8036ef4036ULL; // SHA256("netgroup")[0:8]
111
static const uint64_t RANDOMIZER_ID_LOCALHOSTNONCE = 0xd93e69e2bbfa5735ULL; // SHA256("localhostnonce")[0:8]
112
static const uint64_t RANDOMIZER_ID_NETWORKKEY = 0x0e8a2b136c592a7dULL; // SHA256("networkkey")[0:8]
113
//
114
// Global state variables
115
//
116
bool fDiscover = true;
117
bool fListen = true;
118
GlobalMutex g_maplocalhost_mutex;
119
std::map<CNetAddr, LocalServiceInfo> mapLocalHost GUARDED_BY(g_maplocalhost_mutex);
120
std::string strSubVersion;
121
122
size_t CSerializedNetMsg::GetMemoryUsage() const noexcept
123
658k
{
124
658k
    return sizeof(*this) + memusage::DynamicUsage(m_type) + memusage::DynamicUsage(data);
125
658k
}
126
127
size_t CNetMessage::GetMemoryUsage() const noexcept
128
320k
{
129
320k
    return sizeof(*this) + memusage::DynamicUsage(m_type) + m_recv.GetMemoryUsage();
130
320k
}
131
132
void CConnman::AddAddrFetch(const std::string& strDest)
133
11
{
134
11
    LOCK(m_addr_fetches_mutex);
135
11
    m_addr_fetches.push_back(strDest);
136
11
}
137
138
uint16_t GetListenPort()
139
1.62k
{
140
    // If -bind= is provided with ":port" part, use that (first one if multiple are provided).
141
1.65k
    for (const std::string& bind_arg : gArgs.GetArgs("-bind")) {
142
1.65k
        constexpr uint16_t dummy_port = 0;
143
144
1.65k
        const std::optional<CService> bind_addr{Lookup(bind_arg, dummy_port, /*fAllowLookup=*/false)};
145
1.65k
        if (bind_addr.has_value() && bind_addr->GetPort() != dummy_port) return bind_addr->GetPort();
146
1.65k
    }
147
148
    // Otherwise, if -whitebind= without NetPermissionFlags::NoBan is provided, use that
149
    // (-whitebind= is required to have ":port").
150
1.61k
    for (const std::string& whitebind_arg : gArgs.GetArgs("-whitebind")) {
151
1
        NetWhitebindPermissions whitebind;
152
1
        bilingual_str error;
153
1
        if (NetWhitebindPermissions::TryParse(whitebind_arg, whitebind, error)) {
154
1
            if (!NetPermissions::HasFlag(whitebind.m_flags, NetPermissionFlags::NoBan)) {
155
1
                return whitebind.m_service.GetPort();
156
1
            }
157
1
        }
158
1
    }
159
160
    // Otherwise, if -port= is provided, use that. Otherwise use the default port.
161
1.61k
    return static_cast<uint16_t>(gArgs.GetIntArg("-port", Params().GetDefaultPort()));
162
1.61k
}
163
164
// Determine the "best" local address for a particular peer.
165
[[nodiscard]] static std::optional<CService> GetLocal(const CNode& peer)
166
1.60k
{
167
1.60k
    if (!fListen) return std::nullopt;
168
169
1.60k
    std::optional<CService> addr;
170
1.60k
    int nBestScore = -1;
171
1.60k
    int nBestReachability = -1;
172
1.60k
    {
173
1.60k
        LOCK(g_maplocalhost_mutex);
174
1.60k
        for (const auto& [local_addr, local_service_info] : mapLocalHost) {
175
            // For privacy reasons, don't advertise our privacy-network address
176
            // to other networks and don't advertise our other-network address
177
            // to privacy networks.
178
95
            if (local_addr.GetNetwork() != peer.ConnectedThroughNetwork()
179
95
                && (local_addr.IsPrivacyNet() || peer.IsConnectedThroughPrivacyNet())) {
180
36
                continue;
181
36
            }
182
59
            const int nScore{local_service_info.nScore};
183
59
            const int nReachability{local_addr.GetReachabilityFrom(peer.addr)};
184
59
            if (nReachability > nBestReachability || (nReachability == nBestReachability && nScore > nBestScore)) {
185
42
                addr.emplace(CService{local_addr, local_service_info.nPort});
186
42
                nBestReachability = nReachability;
187
42
                nBestScore = nScore;
188
42
            }
189
59
        }
190
1.60k
    }
191
1.60k
    return addr;
192
1.60k
}
193
194
//! Convert the serialized seeds into usable address objects.
195
static std::vector<CAddress> ConvertSeeds(const std::vector<uint8_t> &vSeedsIn)
196
3
{
197
    // It'll only connect to one or two seed nodes because once it connects,
198
    // it'll get a pile of addresses with newer timestamps.
199
    // Seed nodes are given a random 'last seen time' of between one and two
200
    // weeks ago.
201
3
    const auto one_week{7 * 24h};
202
3
    std::vector<CAddress> vSeedsOut;
203
3
    FastRandomContext rng;
204
3
    ParamsStream s{SpanReader{vSeedsIn}, CAddress::V2_NETWORK};
205
3
    while (!s.empty()) {
206
0
        CService endpoint;
207
0
        s >> endpoint;
208
0
        CAddress addr{endpoint, SeedsServiceFlags()};
209
0
        addr.nTime = rng.rand_uniform_delay(Now<NodeSeconds>() - one_week, -one_week);
210
0
        LogDebug(BCLog::NET, "Added hardcoded seed: %s\n", addr.ToStringAddrPort());
211
0
        vSeedsOut.push_back(addr);
212
0
    }
213
3
    return vSeedsOut;
214
3
}
215
216
// Determine the "best" local address for a particular peer.
217
// If none, return the unroutable 0.0.0.0 but filled in with
218
// the normal parameters, since the IP may be changed to a useful
219
// one by discovery.
220
CService GetLocalAddress(const CNode& peer)
221
1.60k
{
222
1.60k
    return GetLocal(peer).value_or(CService{CNetAddr(), GetListenPort()});
223
1.60k
}
224
225
static int GetnScore(const CService& addr)
226
0
{
227
0
    LOCK(g_maplocalhost_mutex);
228
0
    const auto it = mapLocalHost.find(addr);
229
0
    return (it != mapLocalHost.end()) ? it->second.nScore : 0;
230
0
}
231
232
// Is our peer's addrLocal potentially useful as an external IP source?
233
[[nodiscard]] static bool IsPeerAddrLocalGood(CNode *pnode)
234
1.58k
{
235
1.58k
    CService addrLocal = pnode->GetAddrLocal();
236
1.58k
    return fDiscover && pnode->addr.IsRoutable() && addrLocal.IsRoutable() &&
237
1.58k
           g_reachable_nets.Contains(addrLocal);
238
1.58k
}
239
240
std::optional<CService> GetLocalAddrForPeer(CNode& node)
241
1.58k
{
242
1.58k
    CService addrLocal{GetLocalAddress(node)};
243
    // If discovery is enabled, sometimes give our peer the address it
244
    // tells us that it sees us as in case it has a better idea of our
245
    // address than we do.
246
1.58k
    FastRandomContext rng;
247
1.58k
    if (IsPeerAddrLocalGood(&node) && (!addrLocal.IsRoutable() ||
248
4
         rng.randbits((GetnScore(addrLocal) > LOCAL_MANUAL) ? 3 : 1) == 0))
249
4
    {
250
4
        if (node.IsInboundConn()) {
251
            // For inbound connections, assume both the address and the port
252
            // as seen from the peer.
253
1
            addrLocal = CService{node.GetAddrLocal()};
254
3
        } else {
255
            // For outbound connections, assume just the address as seen from
256
            // the peer and leave the port in `addrLocal` as returned by
257
            // `GetLocalAddress()` above. The peer has no way to observe our
258
            // listening port when we have initiated the connection.
259
3
            addrLocal.SetIP(node.GetAddrLocal());
260
3
        }
261
4
    }
262
1.58k
    if (addrLocal.IsRoutable()) {
263
28
        LogDebug(BCLog::NET, "Advertising address %s to peer=%d\n", addrLocal.ToStringAddrPort(), node.GetId());
264
28
        return addrLocal;
265
28
    }
266
    // Address is unroutable. Don't advertise.
267
1.55k
    return std::nullopt;
268
1.58k
}
269
270
void ClearLocal()
271
668
{
272
668
    LOCK(g_maplocalhost_mutex);
273
668
    return mapLocalHost.clear();
274
668
}
275
276
// learn a new local address
277
bool AddLocal(const CService& addr_, int nScore)
278
23
{
279
23
    CService addr{MaybeFlipIPv6toCJDNS(addr_)};
280
281
23
    if (!addr.IsRoutable())
282
11
        return false;
283
284
12
    if (!fDiscover && nScore < LOCAL_MANUAL)
285
0
        return false;
286
287
12
    if (!g_reachable_nets.Contains(addr))
288
0
        return false;
289
290
12
    if (fLogIPs) {
291
0
        LogInfo("AddLocal(%s,%i)\n", addr.ToStringAddrPort(), nScore);
292
0
    }
293
294
12
    {
295
12
        LOCK(g_maplocalhost_mutex);
296
12
        const auto [it, is_newly_added] = mapLocalHost.emplace(addr, LocalServiceInfo());
297
12
        LocalServiceInfo &info = it->second;
298
12
        if (is_newly_added || nScore >= info.nScore) {
299
12
            info.nScore = nScore + (is_newly_added ? 0 : 1);
300
12
            info.nPort = addr.GetPort();
301
12
        }
302
12
    }
303
304
12
    return true;
305
12
}
306
307
bool AddLocal(const CNetAddr &addr, int nScore)
308
9
{
309
9
    return AddLocal(CService(addr, GetListenPort()), nScore);
310
9
}
311
312
void RemoveLocal(const CService& addr)
313
11
{
314
11
    LOCK(g_maplocalhost_mutex);
315
11
    if (fLogIPs) {
316
0
        LogInfo("RemoveLocal(%s)\n", addr.ToStringAddrPort());
317
0
    }
318
319
11
    mapLocalHost.erase(addr);
320
11
}
321
322
/** vote for a local address */
323
bool SeenLocal(const CService& addr)
324
0
{
325
0
    LOCK(g_maplocalhost_mutex);
326
0
    const auto it = mapLocalHost.find(addr);
327
0
    if (it == mapLocalHost.end()) return false;
328
0
    ++it->second.nScore;
329
0
    return true;
330
0
}
331
332
333
/** check whether a given address is potentially local */
334
bool IsLocal(const CService& addr)
335
78
{
336
78
    LOCK(g_maplocalhost_mutex);
337
78
    return mapLocalHost.contains(addr);
338
78
}
339
340
bool CConnman::AlreadyConnectedToHost(std::string_view host) const
341
584
{
342
584
    LOCK(m_nodes_mutex);
343
584
    return std::ranges::any_of(m_nodes, [&host](CNode* node) { return node->m_addr_name == host; });
344
584
}
345
346
bool CConnman::AlreadyConnectedToAddressPort(const CService& addr_port) const
347
602
{
348
602
    LOCK(m_nodes_mutex);
349
677
    return std::ranges::any_of(m_nodes, [&addr_port](CNode* node) { return node->addr == addr_port; });
350
602
}
351
352
bool CConnman::AlreadyConnectedToAddress(const CNetAddr& addr) const
353
31
{
354
31
    LOCK(m_nodes_mutex);
355
162
    return std::ranges::any_of(m_nodes, [&addr](CNode* node) { return node->addr == addr; });
356
31
}
357
358
bool CConnman::CheckIncomingNonce(uint64_t nonce)
359
990
{
360
990
    LOCK(m_nodes_mutex);
361
4.85k
    for (const CNode* pnode : m_nodes) {
362
        // Omit private broadcast connections from this check to prevent this privacy attack:
363
        // - We connect to a peer in an attempt to privately broadcast a transaction. From our
364
        //   VERSION message the peer deducts that this is a short-lived connection for
365
        //   broadcasting a transaction, takes our nonce and delays their VERACK.
366
        // - The peer starts connecting to (clearnet) nodes and sends them a VERSION message
367
        //   which contains our nonce. If the peer manages to connect to us we would disconnect.
368
        // - Upon a disconnect, the peer knows our clearnet address. They go back to the short
369
        //   lived privacy broadcast connection and continue with VERACK.
370
4.85k
        if (!pnode->fSuccessfullyConnected && !pnode->IsInboundConn() && !pnode->IsPrivateBroadcastConn() &&
371
4.85k
            pnode->GetLocalNonce() == nonce)
372
2
            return false;
373
4.85k
    }
374
988
    return true;
375
990
}
376
377
CNode* CConnman::ConnectNode(CAddress addrConnect,
378
                             const char* pszDest,
379
                             bool fCountFailure,
380
                             ConnectionType conn_type,
381
                             bool use_v2transport,
382
                             const std::optional<Proxy>& proxy_override)
383
618
{
384
618
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
385
618
    assert(conn_type != ConnectionType::INBOUND);
386
387
618
    if (pszDest == nullptr) {
388
24
        if (IsLocal(addrConnect))
389
0
            return nullptr;
390
391
        // Look for an existing connection
392
24
        if (AlreadyConnectedToAddressPort(addrConnect)) {
393
0
            LogInfo("Failed to open new connection to %s, already connected", addrConnect.ToStringAddrPort());
394
0
            return nullptr;
395
0
        }
396
24
    }
397
398
618
    LogDebug(BCLog::NET, "trying %s connection (%s) to %s, lastseen=%.1fhrs\n",
399
618
        use_v2transport ? "v2" : "v1",
400
618
        ConnectionTypeAsString(conn_type),
401
618
        pszDest ? pszDest : addrConnect.ToStringAddrPort(),
402
618
        Ticks<HoursDouble>(pszDest ? 0h : Now<NodeSeconds>() - addrConnect.nTime));
403
404
    // Resolve
405
618
    const uint16_t default_port{pszDest != nullptr ? GetDefaultPort(pszDest) :
406
618
                                                     m_params.GetDefaultPort()};
407
408
    // Collection of addresses to try to connect to: either all dns resolved addresses if a domain name (pszDest) is provided, or addrConnect otherwise.
409
618
    std::vector<CAddress> connect_to{};
410
618
    if (pszDest) {
411
594
        std::vector<CService> resolved{Lookup(pszDest, default_port, fNameLookup && !HaveNameProxy(), 256)};
412
594
        if (!resolved.empty()) {
413
580
            std::shuffle(resolved.begin(), resolved.end(), FastRandomContext());
414
            // If the connection is made by name, it can be the case that the name resolves to more than one address.
415
            // We don't want to connect any more of them if we are already connected to one
416
580
            for (const auto& r : resolved) {
417
580
                addrConnect = CAddress{MaybeFlipIPv6toCJDNS(r), NODE_NONE};
418
580
                if (!addrConnect.IsValid()) {
419
2
                    LogDebug(BCLog::NET, "Resolver returned invalid address %s for %s\n", addrConnect.ToStringAddrPort(), pszDest);
420
2
                    return nullptr;
421
2
                }
422
                // It is possible that we already have a connection to the IP/port pszDest resolved to.
423
                // In that case, drop the connection that was just created.
424
578
                if (AlreadyConnectedToAddressPort(addrConnect)) {
425
10
                    LogInfo("Not opening a connection to %s, already connected to %s\n", pszDest, addrConnect.ToStringAddrPort());
426
10
                    return nullptr;
427
10
                }
428
                // Add the address to the resolved addresses vector so we can try to connect to it later on
429
568
                connect_to.push_back(addrConnect);
430
568
            }
431
580
        } else {
432
            // For resolution via proxy
433
14
            connect_to.push_back(addrConnect);
434
14
        }
435
594
    } else {
436
        // Connect via addrConnect directly
437
24
        connect_to.push_back(addrConnect);
438
24
    }
439
440
    // Connect
441
606
    std::unique_ptr<Sock> sock;
442
606
    CService addr_bind;
443
606
    assert(!addr_bind.IsValid());
444
606
    std::unique_ptr<i2p::sam::Session> i2p_transient_session;
445
446
606
    for (auto& target_addr : connect_to) {
447
606
        if (target_addr.IsValid()) {
448
592
            const std::optional<Proxy> use_proxy{
449
592
                proxy_override.has_value() ? proxy_override : GetProxy(target_addr.GetNetwork()),
450
592
            };
451
592
            bool proxyConnectionFailed = false;
452
453
592
            if (target_addr.IsI2P() && use_proxy) {
454
5
                i2p::Connection conn;
455
5
                bool connected{false};
456
457
                // If an I2P SAM session already exists, normally we would re-use it. But in the case of
458
                // private broadcast we force a new transient session. A Connect() using m_i2p_sam_session
459
                // would use our permanent I2P address as a source address.
460
5
                if (m_i2p_sam_session && conn_type != ConnectionType::PRIVATE_BROADCAST) {
461
3
                    connected = m_i2p_sam_session->Connect(target_addr, conn, proxyConnectionFailed);
462
3
                } else {
463
2
                    {
464
2
                        LOCK(m_unused_i2p_sessions_mutex);
465
2
                        if (m_unused_i2p_sessions.empty()) {
466
2
                            i2p_transient_session =
467
2
                                std::make_unique<i2p::sam::Session>(*use_proxy, m_interrupt_net);
468
2
                        } else {
469
0
                            i2p_transient_session.swap(m_unused_i2p_sessions.front());
470
0
                            m_unused_i2p_sessions.pop();
471
0
                        }
472
2
                    }
473
2
                    connected = i2p_transient_session->Connect(target_addr, conn, proxyConnectionFailed);
474
2
                    if (!connected) {
475
2
                        LOCK(m_unused_i2p_sessions_mutex);
476
2
                        if (m_unused_i2p_sessions.size() < MAX_UNUSED_I2P_SESSIONS_SIZE) {
477
2
                            m_unused_i2p_sessions.emplace(i2p_transient_session.release());
478
2
                        }
479
2
                    }
480
2
                }
481
482
5
                if (connected) {
483
0
                    sock = std::move(conn.sock);
484
0
                    addr_bind = conn.me;
485
0
                }
486
587
            } else if (use_proxy) {
487
46
                LogDebug(BCLog::PROXY, "Using proxy: %s to connect to %s\n", use_proxy->ToString(), target_addr.ToStringAddrPort());
488
46
                sock = ConnectThroughProxy(*use_proxy, target_addr.ToStringAddr(), target_addr.GetPort(), proxyConnectionFailed);
489
541
            } else {
490
                // no proxy needed (none set for target network)
491
541
                sock = ConnectDirectly(target_addr, conn_type == ConnectionType::MANUAL);
492
541
            }
493
592
            if (!proxyConnectionFailed) {
494
                // If a connection to the node was attempted, and failure (if any) is not caused by a problem connecting to
495
                // the proxy, mark this as an attempt.
496
582
                addrman.get().Attempt(target_addr, fCountFailure);
497
582
            }
498
592
        } else if (pszDest) {
499
14
            if (const auto name_proxy = GetNameProxy()) {
500
14
                std::string host;
501
14
                uint16_t port{default_port};
502
14
                SplitHostPort(pszDest, port, host);
503
14
                bool proxyConnectionFailed;
504
14
                sock = ConnectThroughProxy(*name_proxy, host, port, proxyConnectionFailed);
505
14
            }
506
14
        }
507
        // Check any other resolved address (if any) if we fail to connect
508
606
        if (!sock) {
509
20
            continue;
510
20
        }
511
512
586
        NetPermissionFlags permission_flags = NetPermissionFlags::None;
513
586
        std::vector<NetWhitelistPermissions> whitelist_permissions = conn_type == ConnectionType::MANUAL ? vWhitelistedRangeOutgoing : std::vector<NetWhitelistPermissions>{};
514
586
        AddWhitelistPermissionFlags(permission_flags, target_addr, whitelist_permissions);
515
516
        // Add node
517
586
        NodeId id = GetNewNodeId();
518
586
        uint64_t nonce = GetDeterministicRandomizer(RANDOMIZER_ID_LOCALHOSTNONCE).Write(id).Finalize();
519
586
        if (!addr_bind.IsValid()) {
520
586
            addr_bind = GetBindAddress(*sock);
521
586
        }
522
586
        uint64_t network_id = GetDeterministicRandomizer(RANDOMIZER_ID_NETWORKKEY)
523
586
                            .Write(target_addr.GetNetClass())
524
586
                            .Write(addr_bind.GetAddrBytes())
525
                            // For outbound connections, the port of the bound address is randomly
526
                            // assigned by the OS and would therefore not be useful for seeding.
527
586
                            .Write(0)
528
586
                            .Finalize();
529
586
        CNode* pnode = new CNode(id,
530
586
                                std::move(sock),
531
586
                                target_addr,
532
586
                                CalculateKeyedNetGroup(target_addr),
533
586
                                nonce,
534
586
                                addr_bind,
535
586
                                pszDest ? pszDest : "",
536
586
                                conn_type,
537
586
                                /*inbound_onion=*/false,
538
586
                                network_id,
539
586
                                CNodeOptions{
540
586
                                    .permission_flags = permission_flags,
541
586
                                    .i2p_sam_session = std::move(i2p_transient_session),
542
586
                                    .recv_flood_size = nReceiveFloodSize,
543
586
                                    .use_v2transport = use_v2transport,
544
586
                                });
545
586
        pnode->AddRef();
546
547
        // We're making a new connection, harvest entropy from the time (and our peer count)
548
586
        RandAddEvent((uint32_t)id);
549
550
586
        return pnode;
551
606
    }
552
553
20
    return nullptr;
554
606
}
555
556
void CNode::CloseSocketDisconnect()
557
2.15k
{
558
2.15k
    fDisconnect = true;
559
2.15k
    LOCK(m_sock_mutex);
560
2.15k
    if (m_sock) {
561
1.59k
        LogDebug(BCLog::NET, "Resetting socket for %s", LogPeer());
562
1.59k
        m_sock.reset();
563
564
1.59k
        TRACEPOINT(net, closed_connection,
565
1.59k
            GetId(),
566
1.59k
            m_addr_name.c_str(),
567
1.59k
            ConnectionTypeAsString().c_str(),
568
1.59k
            ConnectedThroughNetwork(),
569
1.59k
            TicksSinceEpoch<std::chrono::seconds>(m_connected));
570
1.59k
    }
571
2.15k
    m_i2p_sam_session.reset();
572
2.15k
}
573
574
1.59k
void CConnman::AddWhitelistPermissionFlags(NetPermissionFlags& flags, std::optional<CNetAddr> addr, const std::vector<NetWhitelistPermissions>& ranges) const {
575
1.59k
    for (const auto& subnet : ranges) {
576
289
        if (addr.has_value() && subnet.m_subnet.Match(addr.value())) {
577
289
            NetPermissions::AddFlag(flags, subnet.m_flags);
578
289
        }
579
289
    }
580
1.59k
    if (NetPermissions::HasFlag(flags, NetPermissionFlags::Implicit)) {
581
5
        NetPermissions::ClearFlag(flags, NetPermissionFlags::Implicit);
582
5
        if (whitelist_forcerelay) NetPermissions::AddFlag(flags, NetPermissionFlags::ForceRelay);
583
5
        if (whitelist_relay) NetPermissions::AddFlag(flags, NetPermissionFlags::Relay);
584
5
        NetPermissions::AddFlag(flags, NetPermissionFlags::Mempool);
585
5
        NetPermissions::AddFlag(flags, NetPermissionFlags::NoBan);
586
5
    }
587
1.59k
}
588
589
CService CNode::GetAddrLocal() const
590
15.7k
{
591
15.7k
    AssertLockNotHeld(m_addr_local_mutex);
592
15.7k
    LOCK(m_addr_local_mutex);
593
15.7k
    return m_addr_local;
594
15.7k
}
595
596
1.52k
void CNode::SetAddrLocal(const CService& addrLocalIn) {
597
1.52k
    AssertLockNotHeld(m_addr_local_mutex);
598
1.52k
    LOCK(m_addr_local_mutex);
599
1.52k
    if (Assume(!m_addr_local.IsValid())) { // Addr local can only be set once during version msg processing
600
1.52k
        m_addr_local = addrLocalIn;
601
1.52k
    }
602
1.52k
}
603
604
Network CNode::ConnectedThroughNetwork() const
605
14.2k
{
606
14.2k
    return m_inbound_onion ? NET_ONION : addr.GetNetClass();
607
14.2k
}
608
609
bool CNode::IsConnectedThroughPrivacyNet() const
610
57
{
611
57
    return m_inbound_onion || addr.IsPrivacyNet();
612
57
}
613
614
#undef X
615
282k
#define X(name) stats.name = name
616
void CNode::CopyStats(CNodeStats& stats)
617
14.1k
{
618
14.1k
    stats.nodeid = this->GetId();
619
14.1k
    X(addr);
620
14.1k
    X(addrBind);
621
14.1k
    stats.m_network = ConnectedThroughNetwork();
622
14.1k
    X(m_last_send);
623
14.1k
    X(m_last_recv);
624
14.1k
    X(m_last_tx_time);
625
14.1k
    X(m_last_block_time);
626
14.1k
    X(m_connected);
627
14.1k
    X(m_addr_name);
628
14.1k
    X(nVersion);
629
14.1k
    {
630
14.1k
        LOCK(m_subver_mutex);
631
14.1k
        X(cleanSubVer);
632
14.1k
    }
633
14.1k
    stats.fInbound = IsInboundConn();
634
14.1k
    X(m_bip152_highbandwidth_to);
635
14.1k
    X(m_bip152_highbandwidth_from);
636
14.1k
    {
637
14.1k
        LOCK(cs_vSend);
638
14.1k
        X(mapSendBytesPerMsgType);
639
14.1k
        X(nSendBytes);
640
14.1k
    }
641
14.1k
    {
642
14.1k
        LOCK(cs_vRecv);
643
14.1k
        X(mapRecvBytesPerMsgType);
644
14.1k
        X(nRecvBytes);
645
14.1k
        Transport::Info info = m_transport->GetInfo();
646
14.1k
        stats.m_transport_type = info.transport_type;
647
14.1k
        if (info.session_id) stats.m_session_id = HexStr(*info.session_id);
648
14.1k
    }
649
14.1k
    X(m_permission_flags);
650
651
14.1k
    X(m_last_ping_time);
652
14.1k
    X(m_min_ping_time);
653
654
    // Leave string empty if addrLocal invalid (not filled in yet)
655
14.1k
    CService addrLocalUnlocked = GetAddrLocal();
656
14.1k
    stats.addrLocal = addrLocalUnlocked.IsValid() ? addrLocalUnlocked.ToStringAddrPort() : "";
657
658
14.1k
    X(m_conn_type);
659
14.1k
}
660
#undef X
661
662
bool CNode::ReceiveMsgBytes(std::span<const uint8_t> msg_bytes, bool& complete)
663
158k
{
664
158k
    complete = false;
665
158k
    const auto time{NodeClock::now()};
666
158k
    LOCK(cs_vRecv);
667
158k
    m_last_recv = time;
668
158k
    nRecvBytes += msg_bytes.size();
669
490k
    while (msg_bytes.size() > 0) {
670
        // absorb network data
671
331k
        if (!m_transport->ReceivedBytes(msg_bytes)) {
672
            // Serious transport problem, disconnect from the peer.
673
10
            return false;
674
10
        }
675
676
331k
        if (m_transport->ReceivedMessageComplete()) {
677
            // decompose a transport agnostic CNetMessage from the deserializer
678
160k
            bool reject_message{false};
679
160k
            CNetMessage msg = m_transport->GetReceivedMessage(time, reject_message);
680
160k
            if (reject_message) {
681
                // Message deserialization failed. Drop the message but don't disconnect the peer.
682
                // store the size of the corrupt message
683
82
                mapRecvBytesPerMsgType.at(NET_MESSAGE_TYPE_OTHER) += msg.m_raw_message_size;
684
82
                continue;
685
82
            }
686
687
            // Store received bytes per message type.
688
            // To prevent a memory DOS, only allow known message types.
689
160k
            auto i = mapRecvBytesPerMsgType.find(msg.m_type);
690
160k
            if (i == mapRecvBytesPerMsgType.end()) {
691
6
                i = mapRecvBytesPerMsgType.find(NET_MESSAGE_TYPE_OTHER);
692
6
            }
693
160k
            assert(i != mapRecvBytesPerMsgType.end());
694
160k
            i->second += msg.m_raw_message_size;
695
696
            // push the message to the process queue,
697
160k
            vRecvMsg.push_back(std::move(msg));
698
699
160k
            complete = true;
700
160k
        }
701
331k
    }
702
703
158k
    return true;
704
158k
}
705
706
std::string CNode::LogPeer() const
707
25.8k
{
708
25.8k
    auto peer_info{strprintf("peer=%d", GetId())};
709
25.8k
    if (fLogIPs) {
710
17
        return strprintf("%s, peeraddr=%s", peer_info, addr.ToStringAddrPort());
711
25.8k
    } else {
712
25.8k
        return peer_info;
713
25.8k
    }
714
25.8k
}
715
716
std::string CNode::DisconnectMsg() const
717
1.49k
{
718
1.49k
    return strprintf("disconnecting %s", LogPeer());
719
1.49k
}
720
721
V1Transport::V1Transport(const NodeId node_id) noexcept
722
1.70k
    : m_magic_bytes{Params().MessageStart()}, m_node_id{node_id}
723
1.70k
{
724
1.70k
    LOCK(m_recv_mutex);
725
1.70k
    Reset();
726
1.70k
}
727
728
Transport::Info V1Transport::GetInfo() const noexcept
729
13.3k
{
730
13.3k
    return {.transport_type = TransportProtocolType::V1, .session_id = {}};
731
13.3k
}
732
733
int V1Transport::readHeader(std::span<const uint8_t> msg_bytes)
734
152k
{
735
152k
    AssertLockHeld(m_recv_mutex);
736
    // copy data to temporary parsing buffer
737
152k
    unsigned int nRemaining = CMessageHeader::HEADER_SIZE - nHdrPos;
738
152k
    unsigned int nCopy = std::min<unsigned int>(nRemaining, msg_bytes.size());
739
740
152k
    memcpy(&hdrbuf[nHdrPos], msg_bytes.data(), nCopy);
741
152k
    nHdrPos += nCopy;
742
743
    // if header incomplete, exit
744
152k
    if (nHdrPos < CMessageHeader::HEADER_SIZE)
745
9
        return nCopy;
746
747
    // deserialize to CMessageHeader
748
152k
    try {
749
152k
        hdrbuf >> hdr;
750
152k
    }
751
152k
    catch (const std::exception&) {
752
0
        LogDebug(BCLog::NET, "Header error: Unable to deserialize, peer=%d\n", m_node_id);
753
0
        return -1;
754
0
    }
755
756
    // Check start string, network magic
757
152k
    if (hdr.pchMessageStart != m_magic_bytes) {
758
2
        LogDebug(BCLog::NET, "Header error: Wrong MessageStart %s received, peer=%d\n", HexStr(hdr.pchMessageStart), m_node_id);
759
2
        return -1;
760
2
    }
761
762
    // reject messages larger than MAX_SIZE or MAX_PROTOCOL_MESSAGE_LENGTH
763
    // NOTE: failing to perform this check previously allowed a malicious peer to make us allocate 32MiB of memory per
764
    // connection. See https://bitcoincore.org/en/2024/07/03/disclose_receive_buffer_oom.
765
152k
    if (hdr.nMessageSize > MAX_SIZE || hdr.nMessageSize > MAX_PROTOCOL_MESSAGE_LENGTH) {
766
3
        LogDebug(BCLog::NET, "Header error: Size too large (%s, %u bytes), peer=%d\n", SanitizeString(hdr.GetMessageType()), hdr.nMessageSize, m_node_id);
767
3
        return -1;
768
3
    }
769
770
    // switch state to reading message data
771
152k
    in_data = true;
772
773
152k
    return nCopy;
774
152k
}
775
776
int V1Transport::readData(std::span<const uint8_t> msg_bytes)
777
170k
{
778
170k
    AssertLockHeld(m_recv_mutex);
779
170k
    unsigned int nRemaining = hdr.nMessageSize - nDataPos;
780
170k
    unsigned int nCopy = std::min<unsigned int>(nRemaining, msg_bytes.size());
781
782
170k
    if (vRecv.size() < nDataPos + nCopy) {
783
        // Allocate up to 256 KiB ahead, but never more than the total message size.
784
152k
        vRecv.resize(std::min(hdr.nMessageSize, nDataPos + nCopy + 256 * 1024));
785
152k
    }
786
787
170k
    hasher.Write(msg_bytes.first(nCopy));
788
170k
    memcpy(&vRecv[nDataPos], msg_bytes.data(), nCopy);
789
170k
    nDataPos += nCopy;
790
791
170k
    return nCopy;
792
170k
}
793
794
const uint256& V1Transport::GetMessageHash() const
795
152k
{
796
152k
    AssertLockHeld(m_recv_mutex);
797
152k
    assert(CompleteInternal());
798
152k
    if (data_hash.IsNull())
799
152k
        hasher.Finalize(data_hash);
800
152k
    return data_hash;
801
152k
}
802
803
CNetMessage V1Transport::GetReceivedMessage(NodeClock::time_point time, bool& reject_message)
804
152k
{
805
152k
    AssertLockNotHeld(m_recv_mutex);
806
    // Initialize out parameter
807
152k
    reject_message = false;
808
    // decompose a single CNetMessage from the TransportDeserializer
809
152k
    LOCK(m_recv_mutex);
810
152k
    CNetMessage msg(std::move(vRecv));
811
812
    // store message type string, time, and sizes
813
152k
    msg.m_type = hdr.GetMessageType();
814
152k
    msg.m_time = time;
815
152k
    msg.m_message_size = hdr.nMessageSize;
816
152k
    msg.m_raw_message_size = hdr.nMessageSize + CMessageHeader::HEADER_SIZE;
817
818
152k
    uint256 hash = GetMessageHash();
819
820
    // We just received a message off the wire, harvest entropy from the time (and the message checksum)
821
152k
    RandAddEvent(ReadLE32(hash.begin()));
822
823
    // Check checksum and header message type string
824
152k
    if (memcmp(hash.begin(), hdr.pchChecksum, CMessageHeader::CHECKSUM_SIZE) != 0) {
825
1
        LogDebug(BCLog::NET, "Header error: Wrong checksum (%s, %u bytes), expected %s was %s, peer=%d\n",
826
1
                 SanitizeString(msg.m_type), msg.m_message_size,
827
1
                 HexStr(std::span{hash}.first(CMessageHeader::CHECKSUM_SIZE)),
828
1
                 HexStr(hdr.pchChecksum),
829
1
                 m_node_id);
830
1
        reject_message = true;
831
152k
    } else if (!hdr.IsMessageTypeValid()) {
832
81
        LogDebug(BCLog::NET, "Header error: Invalid message type (%s, %u bytes), peer=%d\n",
833
81
                 SanitizeString(hdr.GetMessageType()), msg.m_message_size, m_node_id);
834
81
        reject_message = true;
835
81
    }
836
837
    // Always reset the network deserializer (prepare for the next message)
838
152k
    Reset();
839
152k
    return msg;
840
152k
}
841
842
bool V1Transport::SetMessageToSend(CSerializedNetMsg& msg) noexcept
843
160k
{
844
160k
    AssertLockNotHeld(m_send_mutex);
845
    // Determine whether a new message can be set.
846
160k
    LOCK(m_send_mutex);
847
160k
    if (m_sending_header || m_bytes_sent < m_message_to_send.data.size()) return false;
848
849
    // create dbl-sha256 checksum
850
160k
    uint256 hash = Hash(msg.data);
851
852
    // create header
853
160k
    CMessageHeader hdr(m_magic_bytes, msg.m_type.c_str(), msg.data.size());
854
160k
    memcpy(hdr.pchChecksum, hash.begin(), CMessageHeader::CHECKSUM_SIZE);
855
856
    // serialize header
857
160k
    m_header_to_send.clear();
858
160k
    VectorWriter{m_header_to_send, 0, hdr};
859
860
    // update state
861
160k
    m_message_to_send = std::move(msg);
862
160k
    m_sending_header = true;
863
160k
    m_bytes_sent = 0;
864
160k
    return true;
865
160k
}
866
867
Transport::BytesToSend V1Transport::GetBytesToSend(bool have_next_message) const noexcept
868
1.10M
{
869
1.10M
    AssertLockNotHeld(m_send_mutex);
870
1.10M
    LOCK(m_send_mutex);
871
1.10M
    if (m_sending_header) {
872
160k
        return {std::span{m_header_to_send}.subspan(m_bytes_sent),
873
                // We have more to send after the header if the message has payload, or if there
874
                // is a next message after that.
875
160k
                have_next_message || !m_message_to_send.data.empty(),
876
160k
                m_message_to_send.m_type
877
160k
               };
878
943k
    } else {
879
943k
        return {std::span{m_message_to_send.data}.subspan(m_bytes_sent),
880
                // We only have more to send after this message's payload if there is another
881
                // message.
882
943k
                have_next_message,
883
943k
                m_message_to_send.m_type
884
943k
               };
885
943k
    }
886
1.10M
}
887
888
void V1Transport::MarkBytesSent(size_t bytes_sent) noexcept
889
315k
{
890
315k
    AssertLockNotHeld(m_send_mutex);
891
315k
    LOCK(m_send_mutex);
892
315k
    m_bytes_sent += bytes_sent;
893
315k
    if (m_sending_header && m_bytes_sent == m_header_to_send.size()) {
894
        // We're done sending a message's header. Switch to sending its data bytes.
895
160k
        m_sending_header = false;
896
160k
        m_bytes_sent = 0;
897
160k
    } else if (!m_sending_header && m_bytes_sent == m_message_to_send.data.size()) {
898
        // We're done sending a message's data. Wipe the data vector to reduce memory consumption.
899
155k
        ClearShrink(m_message_to_send.data);
900
155k
        m_bytes_sent = 0;
901
155k
    }
902
315k
}
903
904
size_t V1Transport::GetSendMemoryUsage() const noexcept
905
320k
{
906
320k
    AssertLockNotHeld(m_send_mutex);
907
320k
    LOCK(m_send_mutex);
908
    // Don't count sending-side fields besides m_message_to_send, as they're all small and bounded.
909
320k
    return m_message_to_send.GetMemoryUsage();
910
320k
}
911
912
namespace {
913
914
/** List of short messages as defined in BIP324, in order.
915
 *
916
 * Only message types that are actually implemented in this codebase need to be listed, as other
917
 * messages get ignored anyway - whether we know how to decode them or not.
918
 */
919
const std::array<std::string, 33> V2_MESSAGE_IDS = {
920
    "", // 12 bytes follow encoding the message type like in V1
921
    NetMsgType::ADDR,
922
    NetMsgType::BLOCK,
923
    NetMsgType::BLOCKTXN,
924
    NetMsgType::CMPCTBLOCK,
925
    NetMsgType::FEEFILTER,
926
    NetMsgType::FILTERADD,
927
    NetMsgType::FILTERCLEAR,
928
    NetMsgType::FILTERLOAD,
929
    NetMsgType::GETBLOCKS,
930
    NetMsgType::GETBLOCKTXN,
931
    NetMsgType::GETDATA,
932
    NetMsgType::GETHEADERS,
933
    NetMsgType::HEADERS,
934
    NetMsgType::INV,
935
    NetMsgType::MEMPOOL,
936
    NetMsgType::MERKLEBLOCK,
937
    NetMsgType::NOTFOUND,
938
    NetMsgType::PING,
939
    NetMsgType::PONG,
940
    NetMsgType::SENDCMPCT,
941
    NetMsgType::TX,
942
    NetMsgType::GETCFILTERS,
943
    NetMsgType::CFILTER,
944
    NetMsgType::GETCFHEADERS,
945
    NetMsgType::CFHEADERS,
946
    NetMsgType::GETCFCHECKPT,
947
    NetMsgType::CFCHECKPT,
948
    NetMsgType::ADDRV2,
949
    // Unimplemented message types that are assigned in BIP324:
950
    "",
951
    "",
952
    "",
953
    ""
954
};
955
956
class V2MessageMap
957
{
958
    std::unordered_map<std::string, uint8_t> m_map;
959
960
public:
961
    V2MessageMap() noexcept
962
1.33k
    {
963
43.9k
        for (size_t i = 1; i < std::size(V2_MESSAGE_IDS); ++i) {
964
42.6k
            m_map.emplace(V2_MESSAGE_IDS[i], i);
965
42.6k
        }
966
1.33k
    }
967
968
    std::optional<uint8_t> operator()(const std::string& message_name) const noexcept
969
8.55k
    {
970
8.55k
        auto it = m_map.find(message_name);
971
8.55k
        if (it == m_map.end()) return std::nullopt;
972
7.75k
        return it->second;
973
8.55k
    }
974
};
975
976
const V2MessageMap V2_MESSAGE_MAP;
977
978
std::vector<uint8_t> GenerateRandomGarbage() noexcept
979
252
{
980
252
    std::vector<uint8_t> ret;
981
252
    FastRandomContext rng;
982
252
    ret.resize(rng.randrange(V2Transport::MAX_GARBAGE_LEN + 1));
983
252
    rng.fillrand(MakeWritableByteSpan(ret));
984
252
    return ret;
985
252
}
986
987
} // namespace
988
989
void V2Transport::StartSendingHandshake() noexcept
990
246
{
991
246
    AssertLockHeld(m_send_mutex);
992
246
    Assume(m_send_state == SendState::AWAITING_KEY);
993
246
    Assume(m_send_buffer.empty());
994
    // Initialize the send buffer with ellswift pubkey + provided garbage.
995
246
    m_send_buffer.resize(EllSwiftPubKey::size() + m_send_garbage.size());
996
246
    std::copy(std::begin(m_cipher.GetOurPubKey()), std::end(m_cipher.GetOurPubKey()), MakeWritableByteSpan(m_send_buffer).begin());
997
246
    std::copy(m_send_garbage.begin(), m_send_garbage.end(), m_send_buffer.begin() + EllSwiftPubKey::size());
998
    // We cannot wipe m_send_garbage as it will still be used as AAD later in the handshake.
999
246
}
1000
1001
V2Transport::V2Transport(NodeId nodeid, bool initiating, const CKey& key, std::span<const std::byte> ent32, std::vector<uint8_t> garbage) noexcept
1002
252
    : m_cipher{key, ent32},
1003
252
      m_initiating{initiating},
1004
252
      m_nodeid{nodeid},
1005
252
      m_v1_fallback{nodeid},
1006
252
      m_recv_state{initiating ? RecvState::KEY : RecvState::KEY_MAYBE_V1},
1007
252
      m_send_garbage{std::move(garbage)},
1008
252
      m_send_state{initiating ? SendState::AWAITING_KEY : SendState::MAYBE_V1}
1009
252
{
1010
252
    Assume(m_send_garbage.size() <= MAX_GARBAGE_LEN);
1011
    // Start sending immediately if we're the initiator of the connection.
1012
252
    if (initiating) {
1013
124
        LOCK(m_send_mutex);
1014
124
        StartSendingHandshake();
1015
124
    }
1016
252
}
1017
1018
V2Transport::V2Transport(NodeId nodeid, bool initiating) noexcept
1019
252
    : V2Transport{nodeid, initiating, GenerateRandomKey(),
1020
252
                  MakeByteSpan(GetRandHash()), GenerateRandomGarbage()} {}
1021
1022
void V2Transport::SetReceiveState(RecvState recv_state) noexcept
1023
16.8k
{
1024
16.8k
    AssertLockHeld(m_recv_mutex);
1025
    // Enforce allowed state transitions.
1026
16.8k
    switch (m_recv_state) {
1027
128
    case RecvState::KEY_MAYBE_V1:
1028
128
        Assume(recv_state == RecvState::KEY || recv_state == RecvState::V1);
1029
128
        break;
1030
241
    case RecvState::KEY:
1031
241
        Assume(recv_state == RecvState::GARB_GARBTERM);
1032
241
        break;
1033
235
    case RecvState::GARB_GARBTERM:
1034
235
        Assume(recv_state == RecvState::VERSION);
1035
235
        break;
1036
233
    case RecvState::VERSION:
1037
233
        Assume(recv_state == RecvState::APP);
1038
233
        break;
1039
8.00k
    case RecvState::APP:
1040
8.00k
        Assume(recv_state == RecvState::APP_READY);
1041
8.00k
        break;
1042
8.00k
    case RecvState::APP_READY:
1043
8.00k
        Assume(recv_state == RecvState::APP);
1044
8.00k
        break;
1045
0
    case RecvState::V1:
1046
0
        Assume(false); // V1 state cannot be left
1047
0
        break;
1048
16.8k
    }
1049
    // Change state.
1050
16.8k
    m_recv_state = recv_state;
1051
16.8k
}
1052
1053
void V2Transport::SetSendState(SendState send_state) noexcept
1054
369
{
1055
369
    AssertLockHeld(m_send_mutex);
1056
    // Enforce allowed state transitions.
1057
369
    switch (m_send_state) {
1058
128
    case SendState::MAYBE_V1:
1059
128
        Assume(send_state == SendState::V1 || send_state == SendState::AWAITING_KEY);
1060
128
        break;
1061
241
    case SendState::AWAITING_KEY:
1062
241
        Assume(send_state == SendState::READY);
1063
241
        break;
1064
0
    case SendState::READY:
1065
0
    case SendState::V1:
1066
0
        Assume(false); // Final states
1067
0
        break;
1068
369
    }
1069
    // Change state.
1070
369
    m_send_state = send_state;
1071
369
}
1072
1073
bool V2Transport::ReceivedMessageComplete() const noexcept
1074
11.7k
{
1075
11.7k
    AssertLockNotHeld(m_recv_mutex);
1076
11.7k
    LOCK(m_recv_mutex);
1077
11.7k
    if (m_recv_state == RecvState::V1) return m_v1_fallback.ReceivedMessageComplete();
1078
1079
11.2k
    return m_recv_state == RecvState::APP_READY;
1080
11.7k
}
1081
1082
void V2Transport::ProcessReceivedMaybeV1Bytes() noexcept
1083
131
{
1084
131
    AssertLockHeld(m_recv_mutex);
1085
131
    AssertLockNotHeld(m_send_mutex);
1086
131
    Assume(m_recv_state == RecvState::KEY_MAYBE_V1);
1087
    // We still have to determine if this is a v1 or v2 connection. The bytes being received could
1088
    // be the beginning of either a v1 packet (network magic + "version\x00\x00\x00\x00\x00"), or
1089
    // of a v2 public key. BIP324 specifies that a mismatch with this 16-byte string should trigger
1090
    // sending of the key.
1091
131
    std::array<uint8_t, V1_PREFIX_LEN> v1_prefix = {0, 0, 0, 0, 'v', 'e', 'r', 's', 'i', 'o', 'n', 0, 0, 0, 0, 0};
1092
131
    std::copy(std::begin(Params().MessageStart()), std::end(Params().MessageStart()), v1_prefix.begin());
1093
131
    Assume(m_recv_buffer.size() <= v1_prefix.size());
1094
131
    if (!std::equal(m_recv_buffer.begin(), m_recv_buffer.end(), v1_prefix.begin())) {
1095
        // Mismatch with v1 prefix, so we can assume a v2 connection.
1096
122
        SetReceiveState(RecvState::KEY); // Convert to KEY state, leaving received bytes around.
1097
        // Transition the sender to AWAITING_KEY state and start sending.
1098
122
        LOCK(m_send_mutex);
1099
122
        SetSendState(SendState::AWAITING_KEY);
1100
122
        StartSendingHandshake();
1101
122
    } else if (m_recv_buffer.size() == v1_prefix.size()) {
1102
        // Full match with the v1 prefix, so fall back to v1 behavior.
1103
6
        LOCK(m_send_mutex);
1104
6
        std::span<const uint8_t> feedback{m_recv_buffer};
1105
        // Feed already received bytes to v1 transport. It should always accept these, because it's
1106
        // less than the size of a v1 header, and these are the first bytes fed to m_v1_fallback.
1107
6
        bool ret = m_v1_fallback.ReceivedBytes(feedback);
1108
6
        Assume(feedback.empty());
1109
6
        Assume(ret);
1110
6
        SetReceiveState(RecvState::V1);
1111
6
        SetSendState(SendState::V1);
1112
        // Reset v2 transport buffers to save memory.
1113
6
        ClearShrink(m_recv_buffer);
1114
6
        ClearShrink(m_send_buffer);
1115
6
    } else {
1116
        // We have not received enough to distinguish v1 from v2 yet. Wait until more bytes come.
1117
3
    }
1118
131
}
1119
1120
bool V2Transport::ProcessReceivedKeyBytes() noexcept
1121
319
{
1122
319
    AssertLockHeld(m_recv_mutex);
1123
319
    AssertLockNotHeld(m_send_mutex);
1124
319
    Assume(m_recv_state == RecvState::KEY);
1125
319
    Assume(m_recv_buffer.size() <= EllSwiftPubKey::size());
1126
1127
    // As a special exception, if bytes 4-16 of the key on a responder connection match the
1128
    // corresponding bytes of a V1 version message, but bytes 0-4 don't match the network magic
1129
    // (if they did, we'd have switched to V1 state already), assume this is a peer from
1130
    // another network, and disconnect them. They will almost certainly disconnect us too when
1131
    // they receive our uniformly random key and garbage, but detecting this case specially
1132
    // means we can log it.
1133
319
    static constexpr std::array<uint8_t, 12> MATCH = {'v', 'e', 'r', 's', 'i', 'o', 'n', 0, 0, 0, 0, 0};
1134
319
    static constexpr size_t OFFSET = std::tuple_size_v<MessageStartChars>;
1135
319
    if (!m_initiating && m_recv_buffer.size() >= OFFSET + MATCH.size()) {
1136
167
        if (std::equal(MATCH.begin(), MATCH.end(), m_recv_buffer.begin() + OFFSET)) {
1137
2
            LogDebug(BCLog::NET, "V2 transport error: V1 peer with wrong MessageStart %s\n",
1138
2
                     HexStr(std::span(m_recv_buffer).first(OFFSET)));
1139
2
            return false;
1140
2
        }
1141
167
    }
1142
1143
317
    if (m_recv_buffer.size() == EllSwiftPubKey::size()) {
1144
        // Other side's key has been fully received, and can now be Diffie-Hellman combined with
1145
        // our key to initialize the encryption ciphers.
1146
1147
        // Initialize the ciphers.
1148
241
        EllSwiftPubKey ellswift(MakeByteSpan(m_recv_buffer));
1149
241
        LOCK(m_send_mutex);
1150
241
        m_cipher.Initialize(ellswift, m_initiating);
1151
1152
        // Switch receiver state to GARB_GARBTERM.
1153
241
        SetReceiveState(RecvState::GARB_GARBTERM);
1154
241
        m_recv_buffer.clear();
1155
1156
        // Switch sender state to READY.
1157
241
        SetSendState(SendState::READY);
1158
1159
        // Append the garbage terminator to the send buffer.
1160
241
        m_send_buffer.resize(m_send_buffer.size() + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1161
241
        std::copy(m_cipher.GetSendGarbageTerminator().begin(),
1162
241
                  m_cipher.GetSendGarbageTerminator().end(),
1163
241
                  MakeWritableByteSpan(m_send_buffer).last(BIP324Cipher::GARBAGE_TERMINATOR_LEN).begin());
1164
1165
        // Construct version packet in the send buffer, with the sent garbage data as AAD.
1166
241
        m_send_buffer.resize(m_send_buffer.size() + BIP324Cipher::EXPANSION + VERSION_CONTENTS.size());
1167
241
        m_cipher.Encrypt(
1168
241
            /*contents=*/VERSION_CONTENTS,
1169
241
            /*aad=*/MakeByteSpan(m_send_garbage),
1170
241
            /*ignore=*/false,
1171
241
            /*output=*/MakeWritableByteSpan(m_send_buffer).last(BIP324Cipher::EXPANSION + VERSION_CONTENTS.size()));
1172
        // We no longer need the garbage.
1173
241
        ClearShrink(m_send_garbage);
1174
241
    } else {
1175
        // We still have to receive more key bytes.
1176
76
    }
1177
317
    return true;
1178
319
}
1179
1180
bool V2Transport::ProcessReceivedGarbageBytes() noexcept
1181
483k
{
1182
483k
    AssertLockHeld(m_recv_mutex);
1183
483k
    Assume(m_recv_state == RecvState::GARB_GARBTERM);
1184
483k
    Assume(m_recv_buffer.size() <= MAX_GARBAGE_LEN + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1185
483k
    if (m_recv_buffer.size() >= BIP324Cipher::GARBAGE_TERMINATOR_LEN) {
1186
479k
        if (std::ranges::equal(MakeByteSpan(m_recv_buffer).last(BIP324Cipher::GARBAGE_TERMINATOR_LEN), m_cipher.GetReceiveGarbageTerminator())) {
1187
            // Garbage terminator received. Store garbage to authenticate it as AAD later.
1188
235
            m_recv_aad = std::move(m_recv_buffer);
1189
235
            m_recv_aad.resize(m_recv_aad.size() - BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1190
235
            m_recv_buffer.clear();
1191
235
            SetReceiveState(RecvState::VERSION);
1192
479k
        } else if (m_recv_buffer.size() == MAX_GARBAGE_LEN + BIP324Cipher::GARBAGE_TERMINATOR_LEN) {
1193
            // We've reached the maximum length for garbage + garbage terminator, and the
1194
            // terminator still does not match. Abort.
1195
4
            LogDebug(BCLog::NET, "V2 transport error: missing garbage terminator, peer=%d\n", m_nodeid);
1196
4
            return false;
1197
479k
        } else {
1198
            // We still need to receive more garbage and/or garbage terminator bytes.
1199
479k
        }
1200
479k
    } else {
1201
        // We have less than GARBAGE_TERMINATOR_LEN (16) bytes, so we certainly need to receive
1202
        // more first.
1203
3.61k
    }
1204
483k
    return true;
1205
483k
}
1206
1207
bool V2Transport::ProcessReceivedPacketBytes() noexcept
1208
126k
{
1209
126k
    AssertLockHeld(m_recv_mutex);
1210
126k
    Assume(m_recv_state == RecvState::VERSION || m_recv_state == RecvState::APP);
1211
1212
    // The maximum permitted contents length for a packet, consisting of:
1213
    // - 0x00 byte: indicating long message type encoding
1214
    // - 12 bytes of message type
1215
    // - payload
1216
126k
    static constexpr size_t MAX_CONTENTS_LEN =
1217
126k
        1 + CMessageHeader::MESSAGE_TYPE_SIZE +
1218
126k
        std::min<size_t>(MAX_SIZE, MAX_PROTOCOL_MESSAGE_LENGTH);
1219
1220
126k
    if (m_recv_buffer.size() == BIP324Cipher::LENGTH_LEN) {
1221
        // Length descriptor received.
1222
62.4k
        m_recv_len = m_cipher.DecryptLength(MakeByteSpan(m_recv_buffer));
1223
62.4k
        if (m_recv_len > MAX_CONTENTS_LEN) {
1224
10
            LogDebug(BCLog::NET, "V2 transport error: packet too large (%u bytes), peer=%d\n", m_recv_len, m_nodeid);
1225
10
            return false;
1226
10
        }
1227
63.9k
    } else if (m_recv_buffer.size() > BIP324Cipher::LENGTH_LEN && m_recv_buffer.size() == m_recv_len + BIP324Cipher::EXPANSION) {
1228
        // Ciphertext received, decrypt it into m_recv_decode_buffer.
1229
        // Note that it is impossible to reach this branch without hitting the branch above first,
1230
        // as GetMaxBytesToProcess only allows up to LENGTH_LEN into the buffer before that point.
1231
62.3k
        m_recv_decode_buffer.resize(m_recv_len);
1232
62.3k
        bool ignore{false};
1233
62.3k
        bool ret = m_cipher.Decrypt(
1234
62.3k
            /*input=*/MakeByteSpan(m_recv_buffer).subspan(BIP324Cipher::LENGTH_LEN),
1235
62.3k
            /*aad=*/MakeByteSpan(m_recv_aad),
1236
62.3k
            /*ignore=*/ignore,
1237
62.3k
            /*contents=*/MakeWritableByteSpan(m_recv_decode_buffer));
1238
62.3k
        if (!ret) {
1239
12
            LogDebug(BCLog::NET, "V2 transport error: packet decryption failure (%u bytes), peer=%d\n", m_recv_len, m_nodeid);
1240
12
            return false;
1241
12
        }
1242
        // We have decrypted a valid packet with the AAD we expected, so clear the expected AAD.
1243
62.3k
        ClearShrink(m_recv_aad);
1244
        // Feed the last 4 bytes of the Poly1305 authentication tag (and its timing) into our RNG.
1245
62.3k
        RandAddEvent(ReadLE32(m_recv_buffer.data() + m_recv_buffer.size() - 4));
1246
1247
        // At this point we have a valid packet decrypted into m_recv_decode_buffer. If it's not a
1248
        // decoy, which we simply ignore, use the current state to decide what to do with it.
1249
62.3k
        if (!ignore) {
1250
8.23k
            switch (m_recv_state) {
1251
233
            case RecvState::VERSION:
1252
                // Version message received; transition to application phase. The contents is
1253
                // ignored, but can be used for future extensions.
1254
233
                SetReceiveState(RecvState::APP);
1255
233
                break;
1256
8.00k
            case RecvState::APP:
1257
                // Application message decrypted correctly. It can be extracted using GetMessage().
1258
8.00k
                SetReceiveState(RecvState::APP_READY);
1259
8.00k
                break;
1260
0
            default:
1261
                // Any other state is invalid (this function should not have been called).
1262
0
                Assume(false);
1263
8.23k
            }
1264
8.23k
        }
1265
        // Wipe the receive buffer where the next packet will be received into.
1266
62.3k
        ClearShrink(m_recv_buffer);
1267
        // In all but APP_READY state, we can wipe the decoded contents.
1268
62.3k
        if (m_recv_state != RecvState::APP_READY) ClearShrink(m_recv_decode_buffer);
1269
62.3k
    } else {
1270
        // We either have less than 3 bytes, so we don't know the packet's length yet, or more
1271
        // than 3 bytes but less than the packet's full ciphertext. Wait until those arrive.
1272
1.53k
    }
1273
126k
    return true;
1274
126k
}
1275
1276
size_t V2Transport::GetMaxBytesToProcess() noexcept
1277
611k
{
1278
611k
    AssertLockHeld(m_recv_mutex);
1279
611k
    switch (m_recv_state) {
1280
131
    case RecvState::KEY_MAYBE_V1:
1281
        // During the KEY_MAYBE_V1 state we do not allow more than the length of v1 prefix into the
1282
        // receive buffer.
1283
131
        Assume(m_recv_buffer.size() <= V1_PREFIX_LEN);
1284
        // As long as we're not sure if this is a v1 or v2 connection, don't receive more than what
1285
        // is strictly necessary to distinguish the two (16 bytes). If we permitted more than
1286
        // the v1 header size (24 bytes), we may not be able to feed the already-received bytes
1287
        // back into the m_v1_fallback V1 transport.
1288
131
        return V1_PREFIX_LEN - m_recv_buffer.size();
1289
319
    case RecvState::KEY:
1290
        // During the KEY state, we only allow the 64-byte key into the receive buffer.
1291
319
        Assume(m_recv_buffer.size() <= EllSwiftPubKey::size());
1292
        // As long as we have not received the other side's public key, don't receive more than
1293
        // that (64 bytes), as garbage follows, and locating the garbage terminator requires the
1294
        // key exchange first.
1295
319
        return EllSwiftPubKey::size() - m_recv_buffer.size();
1296
483k
    case RecvState::GARB_GARBTERM:
1297
        // Process garbage bytes one by one (because terminator may appear anywhere).
1298
483k
        return 1;
1299
1.73k
    case RecvState::VERSION:
1300
126k
    case RecvState::APP:
1301
        // These three states all involve decoding a packet. Process the length descriptor first,
1302
        // so that we know where the current packet ends (and we don't process bytes from the next
1303
        // packet or decoy yet). Then, process the ciphertext bytes of the current packet.
1304
126k
        if (m_recv_buffer.size() < BIP324Cipher::LENGTH_LEN) {
1305
62.4k
            return BIP324Cipher::LENGTH_LEN - m_recv_buffer.size();
1306
63.9k
        } else {
1307
            // Note that BIP324Cipher::EXPANSION is the total difference between contents size
1308
            // and encoded packet size, which includes the 3 bytes due to the packet length.
1309
            // When transitioning from receiving the packet length to receiving its ciphertext,
1310
            // the encrypted packet length is left in the receive buffer.
1311
63.9k
            return BIP324Cipher::EXPANSION + m_recv_len - m_recv_buffer.size();
1312
63.9k
        }
1313
1.45k
    case RecvState::APP_READY:
1314
        // No bytes can be processed until GetMessage() is called.
1315
1.45k
        return 0;
1316
0
    case RecvState::V1:
1317
        // Not allowed (must be dealt with by the caller).
1318
0
        Assume(false);
1319
0
        return 0;
1320
611k
    }
1321
0
    Assume(false); // unreachable
1322
0
    return 0;
1323
611k
}
1324
1325
bool V2Transport::ReceivedBytes(std::span<const uint8_t>& msg_bytes) noexcept
1326
11.0k
{
1327
11.0k
    AssertLockNotHeld(m_recv_mutex);
1328
    /** How many bytes to allocate in the receive buffer at most above what is received so far. */
1329
11.0k
    static constexpr size_t MAX_RESERVE_AHEAD = 256 * 1024;
1330
1331
11.0k
    LOCK(m_recv_mutex);
1332
11.0k
    if (m_recv_state == RecvState::V1) return m_v1_fallback.ReceivedBytes(msg_bytes);
1333
1334
    // Process the provided bytes in msg_bytes in a loop. In each iteration a nonzero number of
1335
    // bytes (decided by GetMaxBytesToProcess) are taken from the beginning om msg_bytes, and
1336
    // appended to m_recv_buffer. Then, depending on the receiver state, one of the
1337
    // ProcessReceived*Bytes functions is called to process the bytes in that buffer.
1338
620k
    while (!msg_bytes.empty()) {
1339
        // Decide how many bytes to copy from msg_bytes to m_recv_buffer.
1340
611k
        size_t max_read = GetMaxBytesToProcess();
1341
1342
        // Reserve space in the buffer if there is not enough.
1343
611k
        if (m_recv_buffer.size() + std::min(msg_bytes.size(), max_read) > m_recv_buffer.capacity()) {
1344
125k
            switch (m_recv_state) {
1345
128
            case RecvState::KEY_MAYBE_V1:
1346
249
            case RecvState::KEY:
1347
249
            case RecvState::GARB_GARBTERM:
1348
                // During the initial states (key/garbage), allocate once to fit the maximum (4111
1349
                // bytes).
1350
249
                m_recv_buffer.reserve(MAX_GARBAGE_LEN + BIP324Cipher::GARBAGE_TERMINATOR_LEN);
1351
249
                break;
1352
1.36k
            case RecvState::VERSION:
1353
124k
            case RecvState::APP: {
1354
                // During states where a packet is being received, as much as is expected but never
1355
                // more than MAX_RESERVE_AHEAD bytes in addition to what is received so far.
1356
                // This means attackers that want to cause us to waste allocated memory are limited
1357
                // to MAX_RESERVE_AHEAD above the largest allowed message contents size, and to
1358
                // MAX_RESERVE_AHEAD more than they've actually sent us.
1359
124k
                size_t alloc_add = std::min(max_read, msg_bytes.size() + MAX_RESERVE_AHEAD);
1360
124k
                m_recv_buffer.reserve(m_recv_buffer.size() + alloc_add);
1361
124k
                break;
1362
1.36k
            }
1363
0
            case RecvState::APP_READY:
1364
                // The buffer is empty in this state.
1365
0
                Assume(m_recv_buffer.empty());
1366
0
                break;
1367
0
            case RecvState::V1:
1368
                // Should have bailed out above.
1369
0
                Assume(false);
1370
0
                break;
1371
125k
            }
1372
125k
        }
1373
1374
        // Can't read more than provided input.
1375
611k
        max_read = std::min(msg_bytes.size(), max_read);
1376
        // Copy data to buffer.
1377
611k
        m_recv_buffer.insert(m_recv_buffer.end(), UCharCast(msg_bytes.data()), UCharCast(msg_bytes.data() + max_read));
1378
611k
        msg_bytes = msg_bytes.subspan(max_read);
1379
1380
        // Process data in the buffer.
1381
611k
        switch (m_recv_state) {
1382
131
        case RecvState::KEY_MAYBE_V1:
1383
131
            ProcessReceivedMaybeV1Bytes();
1384
131
            if (m_recv_state == RecvState::V1) return true;
1385
125
            break;
1386
1387
319
        case RecvState::KEY:
1388
319
            if (!ProcessReceivedKeyBytes()) return false;
1389
317
            break;
1390
1391
483k
        case RecvState::GARB_GARBTERM:
1392
483k
            if (!ProcessReceivedGarbageBytes()) return false;
1393
483k
            break;
1394
1395
483k
        case RecvState::VERSION:
1396
126k
        case RecvState::APP:
1397
126k
            if (!ProcessReceivedPacketBytes()) return false;
1398
126k
            break;
1399
1400
126k
        case RecvState::APP_READY:
1401
1.45k
            return true;
1402
1403
0
        case RecvState::V1:
1404
            // We should have bailed out before.
1405
0
            Assume(false);
1406
0
            break;
1407
611k
        }
1408
        // Make sure we have made progress before continuing.
1409
609k
        Assume(max_read > 0);
1410
609k
    }
1411
1412
9.14k
    return true;
1413
10.6k
}
1414
1415
std::optional<std::string> V2Transport::GetMessageType(std::span<const uint8_t>& contents) noexcept
1416
8.00k
{
1417
8.00k
    if (contents.size() == 0) return std::nullopt; // Empty contents
1418
8.00k
    uint8_t first_byte = contents[0];
1419
8.00k
    contents = contents.subspan(1); // Strip first byte.
1420
1421
8.00k
    if (first_byte != 0) {
1422
        // Short (1 byte) encoding.
1423
7.14k
        if (first_byte < std::size(V2_MESSAGE_IDS)) {
1424
            // Valid short message id.
1425
7.14k
            return V2_MESSAGE_IDS[first_byte];
1426
7.14k
        } else {
1427
            // Unknown short message id.
1428
1
            return std::nullopt;
1429
1
        }
1430
7.14k
    }
1431
1432
863
    if (contents.size() < CMessageHeader::MESSAGE_TYPE_SIZE) {
1433
10
        return std::nullopt; // Long encoding needs 12 message type bytes.
1434
10
    }
1435
1436
853
    size_t msg_type_len{0};
1437
7.75k
    while (msg_type_len < CMessageHeader::MESSAGE_TYPE_SIZE && contents[msg_type_len] != 0) {
1438
        // Verify that message type bytes before the first 0x00 are in range.
1439
6.90k
        if (contents[msg_type_len] < ' ' || contents[msg_type_len] > 0x7F) {
1440
0
            return {};
1441
0
        }
1442
6.90k
        ++msg_type_len;
1443
6.90k
    }
1444
853
    std::string ret{reinterpret_cast<const char*>(contents.data()), msg_type_len};
1445
4.08k
    while (msg_type_len < CMessageHeader::MESSAGE_TYPE_SIZE) {
1446
        // Verify that message type bytes after the first 0x00 are also 0x00.
1447
3.28k
        if (contents[msg_type_len] != 0) return {};
1448
3.23k
        ++msg_type_len;
1449
3.23k
    }
1450
    // Strip message type bytes of contents.
1451
803
    contents = contents.subspan(CMessageHeader::MESSAGE_TYPE_SIZE);
1452
803
    return ret;
1453
853
}
1454
1455
CNetMessage V2Transport::GetReceivedMessage(NodeClock::time_point time, bool& reject_message) noexcept
1456
8.22k
{
1457
8.22k
    AssertLockNotHeld(m_recv_mutex);
1458
8.22k
    LOCK(m_recv_mutex);
1459
8.22k
    if (m_recv_state == RecvState::V1) return m_v1_fallback.GetReceivedMessage(time, reject_message);
1460
1461
8.00k
    Assume(m_recv_state == RecvState::APP_READY);
1462
8.00k
    std::span<const uint8_t> contents{m_recv_decode_buffer};
1463
8.00k
    auto msg_type = GetMessageType(contents);
1464
8.00k
    CNetMessage msg{DataStream{}};
1465
    // Note that BIP324Cipher::EXPANSION also includes the length descriptor size.
1466
8.00k
    msg.m_raw_message_size = m_recv_decode_buffer.size() + BIP324Cipher::EXPANSION;
1467
8.00k
    if (msg_type) {
1468
7.94k
        reject_message = false;
1469
7.94k
        msg.m_type = std::move(*msg_type);
1470
7.94k
        msg.m_time = time;
1471
7.94k
        msg.m_message_size = contents.size();
1472
7.94k
        msg.m_recv.resize(contents.size());
1473
7.94k
        std::copy(contents.begin(), contents.end(), UCharCast(msg.m_recv.data()));
1474
7.94k
    } else {
1475
61
        LogDebug(BCLog::NET, "V2 transport error: invalid message type (%u bytes contents), peer=%d\n", m_recv_decode_buffer.size(), m_nodeid);
1476
61
        reject_message = true;
1477
61
    }
1478
8.00k
    ClearShrink(m_recv_decode_buffer);
1479
8.00k
    SetReceiveState(RecvState::APP);
1480
1481
8.00k
    return msg;
1482
8.22k
}
1483
1484
bool V2Transport::SetMessageToSend(CSerializedNetMsg& msg) noexcept
1485
9.01k
{
1486
9.01k
    AssertLockNotHeld(m_send_mutex);
1487
9.01k
    LOCK(m_send_mutex);
1488
9.01k
    if (m_send_state == SendState::V1) return m_v1_fallback.SetMessageToSend(msg);
1489
    // We only allow adding a new message to be sent when in the READY state (so the packet cipher
1490
    // is available) and the send buffer is empty. This limits the number of messages in the send
1491
    // buffer to just one, and leaves the responsibility for queueing them up to the caller.
1492
8.64k
    if (!(m_send_state == SendState::READY && m_send_buffer.empty())) return false;
1493
    // Construct contents (encoding message type + payload).
1494
8.55k
    std::vector<uint8_t> contents;
1495
8.55k
    auto short_message_id = V2_MESSAGE_MAP(msg.m_type);
1496
8.55k
    if (short_message_id) {
1497
7.75k
        contents.resize(1 + msg.data.size());
1498
7.75k
        contents[0] = *short_message_id;
1499
7.75k
        std::copy(msg.data.begin(), msg.data.end(), contents.begin() + 1);
1500
7.75k
    } else {
1501
        // Initialize with zeroes, and then write the message type string starting at offset 1.
1502
        // This means contents[0] and the unused positions in contents[1..13] remain 0x00.
1503
805
        contents.resize(1 + CMessageHeader::MESSAGE_TYPE_SIZE + msg.data.size(), 0);
1504
805
        std::copy(msg.m_type.begin(), msg.m_type.end(), contents.data() + 1);
1505
805
        std::copy(msg.data.begin(), msg.data.end(), contents.begin() + 1 + CMessageHeader::MESSAGE_TYPE_SIZE);
1506
805
    }
1507
    // Construct ciphertext in send buffer.
1508
8.55k
    m_send_buffer.resize(contents.size() + BIP324Cipher::EXPANSION);
1509
8.55k
    m_cipher.Encrypt(MakeByteSpan(contents), {}, false, MakeWritableByteSpan(m_send_buffer));
1510
8.55k
    m_send_type = msg.m_type;
1511
    // Release memory
1512
8.55k
    ClearShrink(msg.data);
1513
8.55k
    return true;
1514
8.64k
}
1515
1516
Transport::BytesToSend V2Transport::GetBytesToSend(bool have_next_message) const noexcept
1517
64.0k
{
1518
64.0k
    AssertLockNotHeld(m_send_mutex);
1519
64.0k
    LOCK(m_send_mutex);
1520
64.0k
    if (m_send_state == SendState::V1) return m_v1_fallback.GetBytesToSend(have_next_message);
1521
1522
61.1k
    if (m_send_state == SendState::MAYBE_V1) Assume(m_send_buffer.empty());
1523
61.1k
    Assume(m_send_pos <= m_send_buffer.size());
1524
61.1k
    return {
1525
61.1k
        std::span{m_send_buffer}.subspan(m_send_pos),
1526
        // We only have more to send after the current m_send_buffer if there is a (next)
1527
        // message to be sent, and we're capable of sending packets. */
1528
61.1k
        have_next_message && m_send_state == SendState::READY,
1529
61.1k
        m_send_type
1530
61.1k
    };
1531
64.0k
}
1532
1533
void V2Transport::MarkBytesSent(size_t bytes_sent) noexcept
1534
10.3k
{
1535
10.3k
    AssertLockNotHeld(m_send_mutex);
1536
10.3k
    LOCK(m_send_mutex);
1537
10.3k
    if (m_send_state == SendState::V1) return m_v1_fallback.MarkBytesSent(bytes_sent);
1538
1539
9.64k
    if (m_send_state == SendState::AWAITING_KEY && m_send_pos == 0 && bytes_sent > 0) {
1540
127
        LogDebug(BCLog::NET, "start sending v2 handshake to peer=%d\n", m_nodeid);
1541
127
    }
1542
1543
9.64k
    m_send_pos += bytes_sent;
1544
9.64k
    Assume(m_send_pos <= m_send_buffer.size());
1545
9.64k
    if (m_send_pos >= CMessageHeader::HEADER_SIZE) {
1546
9.51k
        m_sent_v1_header_worth = true;
1547
9.51k
    }
1548
    // Wipe the buffer when everything is sent.
1549
9.64k
    if (m_send_pos == m_send_buffer.size()) {
1550
8.90k
        m_send_pos = 0;
1551
8.90k
        ClearShrink(m_send_buffer);
1552
8.90k
    }
1553
9.64k
}
1554
1555
bool V2Transport::ShouldReconnectV1() const noexcept
1556
121
{
1557
121
    AssertLockNotHeld(m_send_mutex);
1558
121
    AssertLockNotHeld(m_recv_mutex);
1559
    // Only outgoing connections need reconnection.
1560
121
    if (!m_initiating) return false;
1561
1562
63
    LOCK(m_recv_mutex);
1563
    // We only reconnect in the very first state and when the receive buffer is empty. Together
1564
    // these conditions imply nothing has been received so far.
1565
63
    if (m_recv_state != RecvState::KEY) return false;
1566
3
    if (!m_recv_buffer.empty()) return false;
1567
    // Check if we've sent enough for the other side to disconnect us (if it was V1).
1568
3
    LOCK(m_send_mutex);
1569
3
    return m_sent_v1_header_worth;
1570
3
}
1571
1572
size_t V2Transport::GetSendMemoryUsage() const noexcept
1573
17.9k
{
1574
17.9k
    AssertLockNotHeld(m_send_mutex);
1575
17.9k
    LOCK(m_send_mutex);
1576
17.9k
    if (m_send_state == SendState::V1) return m_v1_fallback.GetSendMemoryUsage();
1577
1578
17.2k
    return sizeof(m_send_buffer) + memusage::DynamicUsage(m_send_buffer);
1579
17.9k
}
1580
1581
Transport::Info V2Transport::GetInfo() const noexcept
1582
2.40k
{
1583
2.40k
    AssertLockNotHeld(m_recv_mutex);
1584
2.40k
    LOCK(m_recv_mutex);
1585
2.40k
    if (m_recv_state == RecvState::V1) return m_v1_fallback.GetInfo();
1586
1587
2.35k
    Transport::Info info;
1588
1589
    // Do not report v2 and session ID until the version packet has been received
1590
    // and verified (confirming that the other side very likely has the same keys as us).
1591
2.35k
    if (m_recv_state != RecvState::KEY_MAYBE_V1 && m_recv_state != RecvState::KEY &&
1592
2.35k
        m_recv_state != RecvState::GARB_GARBTERM && m_recv_state != RecvState::VERSION) {
1593
2.28k
        info.transport_type = TransportProtocolType::V2;
1594
2.28k
        info.session_id = uint256(MakeUCharSpan(m_cipher.GetSessionID()));
1595
2.28k
    } else {
1596
70
        info.transport_type = TransportProtocolType::DETECTING;
1597
70
    }
1598
1599
2.35k
    return info;
1600
2.40k
}
1601
1602
std::pair<size_t, bool> CConnman::SocketSendData(CNode& node) const
1603
169k
{
1604
169k
    auto it = node.vSendMsg.begin();
1605
169k
    size_t nSentSize = 0;
1606
169k
    bool data_left{false}; //!< second return value (whether unsent data remains)
1607
169k
    std::optional<bool> expected_more;
1608
1609
493k
    while (true) {
1610
493k
        if (it != node.vSendMsg.end()) {
1611
            // If possible, move one message from the send queue to the transport. This fails when
1612
            // there is an existing message still being sent, or (for v2 transports) when the
1613
            // handshake has not yet completed.
1614
168k
            size_t memusage = it->GetMemoryUsage();
1615
168k
            if (node.m_transport->SetMessageToSend(*it)) {
1616
                // Update memory usage of send buffer (as *it will be deleted).
1617
168k
                node.m_send_memusage -= memusage;
1618
168k
                ++it;
1619
168k
            }
1620
168k
        }
1621
493k
        const auto& [data, more, msg_type] = node.m_transport->GetBytesToSend(it != node.vSendMsg.end());
1622
        // We rely on the 'more' value returned by GetBytesToSend to correctly predict whether more
1623
        // bytes are still to be sent, to correctly set the MSG_MORE flag. As a sanity check,
1624
        // verify that the previously returned 'more' was correct.
1625
493k
        if (expected_more.has_value()) Assume(!data.empty() == *expected_more);
1626
493k
        expected_more = more;
1627
493k
        data_left = !data.empty(); // will be overwritten on next loop if all of data gets sent
1628
493k
        int nBytes = 0;
1629
493k
        if (!data.empty()) {
1630
324k
            LOCK(node.m_sock_mutex);
1631
            // There is no socket in case we've already disconnected, or in test cases without
1632
            // real connections. In these cases, we bail out immediately and just leave things
1633
            // in the send queue and transport.
1634
324k
            if (!node.m_sock) {
1635
10
                break;
1636
10
            }
1637
324k
            int flags = MSG_NOSIGNAL | MSG_DONTWAIT;
1638
324k
#ifdef MSG_MORE
1639
324k
            if (more) {
1640
155k
                flags |= MSG_MORE;
1641
155k
            }
1642
324k
#endif
1643
324k
            nBytes = node.m_sock->Send(data.data(), data.size(), flags);
1644
324k
        }
1645
493k
        if (nBytes > 0) {
1646
324k
            node.m_last_send = NodeClock::now();
1647
324k
            node.nSendBytes += nBytes;
1648
            // Notify transport that bytes have been processed.
1649
324k
            node.m_transport->MarkBytesSent(nBytes);
1650
            // Update statistics per message type.
1651
324k
            if (!msg_type.empty()) { // don't report v2 handshake bytes for now
1652
323k
                node.AccountForSentBytes(msg_type, nBytes);
1653
323k
            }
1654
324k
            nSentSize += nBytes;
1655
324k
            if ((size_t)nBytes != data.size()) {
1656
                // could not send full message; stop sending more
1657
7
                break;
1658
7
            }
1659
324k
        } else {
1660
168k
            if (nBytes < 0) {
1661
                // error
1662
3
                int nErr = WSAGetLastError();
1663
3
                if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS) {
1664
3
                    LogDebug(BCLog::NET, "socket send error, %s: %s", node.DisconnectMsg(), NetworkErrorString(nErr));
1665
3
                    node.CloseSocketDisconnect();
1666
3
                }
1667
3
            }
1668
168k
            break;
1669
168k
        }
1670
493k
    }
1671
1672
169k
    node.fPauseSend = node.m_send_memusage + node.m_transport->GetSendMemoryUsage() > nSendBufferMaxSize;
1673
1674
169k
    if (it == node.vSendMsg.end()) {
1675
168k
        assert(node.m_send_memusage == 0);
1676
168k
    }
1677
169k
    node.vSendMsg.erase(node.vSendMsg.begin(), it);
1678
169k
    return {nSentSize, data_left};
1679
169k
}
1680
1681
/** Try to find a connection to evict when the node is full.
1682
 *  Extreme care must be taken to avoid opening the node to attacker
1683
 *   triggered network partitioning.
1684
 *  The strategy used here is to protect a small number of peers
1685
 *   for each of several distinct characteristics which are difficult
1686
 *   to forge.  In order to partition a node the attacker must be
1687
 *   simultaneously better at all of them than honest peers.
1688
 */
1689
bool CConnman::AttemptToEvictConnection()
1690
1
{
1691
1
    std::vector<NodeEvictionCandidate> vEvictionCandidates;
1692
1
    {
1693
1694
1
        LOCK(m_nodes_mutex);
1695
21
        for (const CNode* node : m_nodes) {
1696
21
            if (node->fDisconnect)
1697
0
                continue;
1698
21
            NodeEvictionCandidate candidate{
1699
21
                .id = node->GetId(),
1700
21
                .m_connected = node->m_connected,
1701
21
                .m_min_ping_time = node->m_min_ping_time,
1702
21
                .m_last_block_time = node->m_last_block_time,
1703
21
                .m_last_tx_time = node->m_last_tx_time,
1704
21
                .fRelevantServices = node->m_has_all_wanted_services,
1705
21
                .m_relay_txs = node->m_relays_txs.load(),
1706
21
                .fBloomFilter = node->m_bloom_filter_loaded.load(),
1707
21
                .nKeyedNetGroup = node->nKeyedNetGroup,
1708
21
                .prefer_evict = node->m_prefer_evict,
1709
21
                .m_is_local = node->addr.IsLocal(),
1710
21
                .m_network = node->ConnectedThroughNetwork(),
1711
21
                .m_noban = node->HasPermission(NetPermissionFlags::NoBan),
1712
21
                .m_conn_type = node->m_conn_type,
1713
21
            };
1714
21
            vEvictionCandidates.push_back(candidate);
1715
21
        }
1716
1
    }
1717
1
    const std::optional<NodeId> node_id_to_evict = SelectNodeToEvict(std::move(vEvictionCandidates));
1718
1
    if (!node_id_to_evict) {
1719
0
        return false;
1720
0
    }
1721
1
    LOCK(m_nodes_mutex);
1722
9
    for (CNode* pnode : m_nodes) {
1723
9
        if (pnode->GetId() == *node_id_to_evict) {
1724
1
            LogDebug(BCLog::NET, "selected %s connection for eviction, %s", pnode->ConnectionTypeAsString(), pnode->DisconnectMsg());
1725
1
            TRACEPOINT(net, evicted_inbound_connection,
1726
1
                pnode->GetId(),
1727
1
                pnode->m_addr_name.c_str(),
1728
1
                pnode->ConnectionTypeAsString().c_str(),
1729
1
                pnode->ConnectedThroughNetwork(),
1730
1
                TicksSinceEpoch<std::chrono::seconds>(pnode->m_connected));
1731
1
            pnode->fDisconnect = true;
1732
1
            return true;
1733
1
        }
1734
9
    }
1735
0
    return false;
1736
1
}
1737
1738
1.01k
void CConnman::AcceptConnection(const ListenSocket& hListenSocket) {
1739
1.01k
    struct sockaddr_storage sockaddr;
1740
1.01k
    socklen_t len = sizeof(sockaddr);
1741
1.01k
    auto sock = hListenSocket.sock->Accept((struct sockaddr*)&sockaddr, &len);
1742
1743
1.01k
    if (!sock) {
1744
0
        const int nErr = WSAGetLastError();
1745
0
        if (nErr != WSAEWOULDBLOCK) {
1746
0
            LogInfo("socket error accept failed: %s\n", NetworkErrorString(nErr));
1747
0
        }
1748
0
        return;
1749
0
    }
1750
1751
1.01k
    CService addr;
1752
1.01k
    if (!addr.SetSockAddr((const struct sockaddr*)&sockaddr, len)) {
1753
0
        LogWarning("Unknown socket family\n");
1754
1.01k
    } else {
1755
1.01k
        addr = MaybeFlipIPv6toCJDNS(addr);
1756
1.01k
    }
1757
1758
1.01k
    const CService addr_bind{MaybeFlipIPv6toCJDNS(GetBindAddress(*sock))};
1759
1760
1.01k
    NetPermissionFlags permission_flags = NetPermissionFlags::None;
1761
1.01k
    hListenSocket.AddSocketPermissionFlags(permission_flags);
1762
1763
1.01k
    CreateNodeFromAcceptedSocket(std::move(sock), permission_flags, addr_bind, addr);
1764
1.01k
}
1765
1766
void CConnman::CreateNodeFromAcceptedSocket(std::unique_ptr<Sock>&& sock,
1767
                                            NetPermissionFlags permission_flags,
1768
                                            const CService& addr_bind,
1769
                                            const CService& addr)
1770
1.01k
{
1771
1.01k
    int nInbound = 0;
1772
1773
1.01k
    const bool inbound_onion = std::find(m_onion_binds.begin(), m_onion_binds.end(), addr_bind) != m_onion_binds.end();
1774
1775
    // Tor inbound connections do not reveal the peer's actual network address.
1776
    // Therefore do not apply address-based whitelist permissions to them.
1777
1.01k
    AddWhitelistPermissionFlags(permission_flags, inbound_onion ? std::optional<CNetAddr>{} : addr, vWhitelistedRangeIncoming);
1778
1779
1.01k
    {
1780
1.01k
        LOCK(m_nodes_mutex);
1781
3.89k
        for (const CNode* pnode : m_nodes) {
1782
3.89k
            if (pnode->IsInboundConn()) nInbound++;
1783
3.89k
        }
1784
1.01k
    }
1785
1786
1.01k
    if (!fNetworkActive) {
1787
0
        LogDebug(BCLog::NET, "connection from %s dropped: not accepting new connections\n", addr.ToStringAddrPort());
1788
0
        return;
1789
0
    }
1790
1791
1.01k
    if (!sock->IsSelectable()) {
1792
0
        LogInfo("connection from %s dropped: non-selectable socket\n", addr.ToStringAddrPort());
1793
0
        return;
1794
0
    }
1795
1796
    // According to the internet TCP_NODELAY is not carried into accepted sockets
1797
    // on all platforms.  Set it again here just to be sure.
1798
1.01k
    const int on{1};
1799
1.01k
    if (sock->SetSockOpt(IPPROTO_TCP, TCP_NODELAY, &on, sizeof(on)) == SOCKET_ERROR) {
1800
0
        LogDebug(BCLog::NET, "connection from %s: unable to set TCP_NODELAY, continuing anyway\n",
1801
0
                 addr.ToStringAddrPort());
1802
0
    }
1803
1804
    // Don't accept connections from banned peers.
1805
1.01k
    bool banned = m_banman && m_banman->IsBanned(addr);
1806
1.01k
    if (!NetPermissions::HasFlag(permission_flags, NetPermissionFlags::NoBan) && banned)
1807
3
    {
1808
3
        LogDebug(BCLog::NET, "connection from %s dropped (banned)\n", addr.ToStringAddrPort());
1809
3
        return;
1810
3
    }
1811
1812
    // Only accept connections from discouraged peers if our inbound slots aren't (almost) full.
1813
1.00k
    bool discouraged = m_banman && m_banman->IsDiscouraged(addr);
1814
1.00k
    if (!NetPermissions::HasFlag(permission_flags, NetPermissionFlags::NoBan) && nInbound + 1 >= m_max_inbound && discouraged)
1815
0
    {
1816
0
        LogDebug(BCLog::NET, "connection from %s dropped (discouraged)\n", addr.ToStringAddrPort());
1817
0
        return;
1818
0
    }
1819
1820
1.00k
    if (nInbound >= m_max_inbound)
1821
1
    {
1822
1
        if (!AttemptToEvictConnection()) {
1823
            // No connection to evict, disconnect the new connection
1824
0
            LogDebug(BCLog::NET, "failed to find an eviction candidate - connection dropped (full)\n");
1825
0
            return;
1826
0
        }
1827
1
    }
1828
1829
1.00k
    NodeId id = GetNewNodeId();
1830
1.00k
    uint64_t nonce = GetDeterministicRandomizer(RANDOMIZER_ID_LOCALHOSTNONCE).Write(id).Finalize();
1831
1832
    // The V2Transport transparently falls back to V1 behavior when an incoming V1 connection is
1833
    // detected, so use it whenever we signal NODE_P2P_V2.
1834
1.00k
    ServiceFlags local_services = GetLocalServices();
1835
1.00k
    const bool use_v2transport(local_services & NODE_P2P_V2);
1836
1837
1.00k
    uint64_t network_id = GetDeterministicRandomizer(RANDOMIZER_ID_NETWORKKEY)
1838
1.00k
                        .Write(inbound_onion ? NET_ONION : addr.GetNetClass())
1839
1.00k
                        .Write(addr_bind.GetAddrBytes())
1840
1.00k
                        .Write(addr_bind.GetPort()) // inbound connections use bind port
1841
1.00k
                        .Finalize();
1842
1.00k
    CNode* pnode = new CNode(id,
1843
1.00k
                             std::move(sock),
1844
1.00k
                             CAddress{addr, NODE_NONE},
1845
1.00k
                             CalculateKeyedNetGroup(addr),
1846
1.00k
                             nonce,
1847
1.00k
                             addr_bind,
1848
1.00k
                             /*addrNameIn=*/"",
1849
1.00k
                             ConnectionType::INBOUND,
1850
1.00k
                             inbound_onion,
1851
1.00k
                             network_id,
1852
1.00k
                             CNodeOptions{
1853
1.00k
                                 .permission_flags = permission_flags,
1854
1.00k
                                 .prefer_evict = discouraged,
1855
1.00k
                                 .recv_flood_size = nReceiveFloodSize,
1856
1.00k
                                 .use_v2transport = use_v2transport,
1857
1.00k
                             });
1858
1.00k
    pnode->AddRef();
1859
1.00k
    m_msgproc->InitializeNode(*pnode, local_services);
1860
1.00k
    {
1861
1.00k
        LOCK(m_nodes_mutex);
1862
1.00k
        m_nodes.push_back(pnode);
1863
1.00k
    }
1864
1.00k
    LogDebug(BCLog::NET, "connection from %s accepted\n", addr.ToStringAddrPort());
1865
1.00k
    TRACEPOINT(net, inbound_connection,
1866
1.00k
        pnode->GetId(),
1867
1.00k
        pnode->m_addr_name.c_str(),
1868
1.00k
        pnode->ConnectionTypeAsString().c_str(),
1869
1.00k
        pnode->ConnectedThroughNetwork(),
1870
1.00k
        GetNodeCount(ConnectionDirection::In));
1871
1872
    // We received a new connection, harvest entropy from the time (and our peer count)
1873
1.00k
    RandAddEvent((uint32_t)id);
1874
1.00k
}
1875
1876
bool CConnman::AddConnection(const std::string& address, ConnectionType conn_type, bool use_v2transport = false)
1877
150
{
1878
150
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
1879
150
    std::optional<int> max_connections;
1880
150
    switch (conn_type) {
1881
0
    case ConnectionType::INBOUND:
1882
0
    case ConnectionType::MANUAL:
1883
0
    case ConnectionType::PRIVATE_BROADCAST:
1884
0
        return false;
1885
96
    case ConnectionType::OUTBOUND_FULL_RELAY:
1886
96
        max_connections = m_max_outbound_full_relay;
1887
96
        break;
1888
35
    case ConnectionType::BLOCK_RELAY:
1889
35
        max_connections = m_max_outbound_block_relay;
1890
35
        break;
1891
    // no limit for ADDR_FETCH because -seednode has no limit either
1892
15
    case ConnectionType::ADDR_FETCH:
1893
15
        break;
1894
    // no limit for FEELER connections since they're short-lived
1895
4
    case ConnectionType::FEELER:
1896
4
        break;
1897
150
    } // no default case, so the compiler can warn about missing cases
1898
1899
    // Count existing connections
1900
150
    int existing_connections = WITH_LOCK(m_nodes_mutex,
1901
150
                                         return std::count_if(m_nodes.begin(), m_nodes.end(), [conn_type](CNode* node) { return node->m_conn_type == conn_type; }););
1902
1903
    // Max connections of specified type already exist
1904
150
    if (max_connections != std::nullopt && existing_connections >= max_connections) return false;
1905
1906
    // Max total outbound connections already exist
1907
150
    CountingSemaphoreGrant<> grant(*semOutbound, true);
1908
150
    if (!grant) return false;
1909
1910
150
    OpenNetworkConnection(CAddress(), false, std::move(grant), address.c_str(), conn_type, /*use_v2transport=*/use_v2transport);
1911
150
    return true;
1912
150
}
1913
1914
void CConnman::DisconnectNodes()
1915
314k
{
1916
314k
    AssertLockNotHeld(m_nodes_mutex);
1917
314k
    AssertLockNotHeld(m_reconnections_mutex);
1918
1919
    // Use a temporary variable to accumulate desired reconnections, so we don't need
1920
    // m_reconnections_mutex while holding m_nodes_mutex.
1921
314k
    decltype(m_reconnections) reconnections_to_add;
1922
1923
314k
    {
1924
314k
        LOCK(m_nodes_mutex);
1925
1926
314k
        const bool network_active{fNetworkActive};
1927
314k
        if (!network_active) {
1928
            // Disconnect any connected nodes
1929
197
            for (CNode* pnode : m_nodes) {
1930
7
                if (!pnode->fDisconnect) {
1931
7
                    LogDebug(BCLog::NET, "Network not active, %s", pnode->DisconnectMsg());
1932
7
                    pnode->fDisconnect = true;
1933
7
                }
1934
7
            }
1935
197
        }
1936
1937
        // Disconnect unused nodes
1938
314k
        std::vector<CNode*> nodes_copy = m_nodes;
1939
314k
        for (CNode* pnode : nodes_copy)
1940
500k
        {
1941
500k
            if (pnode->fDisconnect)
1942
856
            {
1943
                // remove from m_nodes
1944
856
                m_nodes.erase(remove(m_nodes.begin(), m_nodes.end(), pnode), m_nodes.end());
1945
1946
                // Add to reconnection list if appropriate. We don't reconnect right here, because
1947
                // the creation of a connection is a blocking operation (up to several seconds),
1948
                // and we don't want to hold up the socket handler thread for that long.
1949
856
                if (network_active && pnode->m_transport->ShouldReconnectV1()) {
1950
3
                    reconnections_to_add.push_back({
1951
3
                        .addr_connect = pnode->addr,
1952
3
                        .grant = std::move(pnode->grantOutbound),
1953
3
                        .destination = pnode->m_dest,
1954
3
                        .conn_type = pnode->m_conn_type,
1955
3
                        .use_v2transport = false});
1956
3
                    LogDebug(BCLog::NET, "retrying with v1 transport protocol for peer=%d\n", pnode->GetId());
1957
3
                }
1958
1959
                // release outbound grant (if any)
1960
856
                pnode->grantOutbound.Release();
1961
1962
                // close socket and cleanup
1963
856
                pnode->CloseSocketDisconnect();
1964
1965
                // update connection count by network
1966
856
                if (pnode->IsManualOrFullOutboundConn()) --m_network_conn_counts[pnode->addr.GetNetwork()];
1967
1968
                // hold in disconnected pool until all refs are released
1969
856
                pnode->Release();
1970
856
                m_nodes_disconnected.push_back(pnode);
1971
856
            }
1972
500k
        }
1973
314k
    }
1974
314k
    {
1975
        // Delete disconnected nodes
1976
314k
        std::list<CNode*> nodes_disconnected_copy = m_nodes_disconnected;
1977
314k
        for (CNode* pnode : nodes_disconnected_copy)
1978
885
        {
1979
            // Destroy the object only after other threads have stopped using it.
1980
885
            if (pnode->GetRefCount() <= 0) {
1981
856
                m_nodes_disconnected.remove(pnode);
1982
856
                DeleteNode(pnode);
1983
856
            }
1984
885
        }
1985
314k
    }
1986
314k
    {
1987
        // Move entries from reconnections_to_add to m_reconnections.
1988
314k
        LOCK(m_reconnections_mutex);
1989
314k
        m_reconnections.splice(m_reconnections.end(), std::move(reconnections_to_add));
1990
314k
    }
1991
314k
}
1992
1993
void CConnman::NotifyNumConnectionsChanged()
1994
314k
{
1995
314k
    size_t nodes_size;
1996
314k
    {
1997
314k
        LOCK(m_nodes_mutex);
1998
314k
        nodes_size = m_nodes.size();
1999
314k
    }
2000
314k
    if(nodes_size != nPrevNodeCount) {
2001
2.21k
        nPrevNodeCount = nodes_size;
2002
2.21k
        if (m_client_interface) {
2003
2.21k
            m_client_interface->NotifyNumConnectionsChanged(nodes_size);
2004
2.21k
        }
2005
2.21k
    }
2006
314k
}
2007
2008
bool CConnman::ShouldRunInactivityChecks(const CNode& node, NodeClock::time_point now) const
2009
872k
{
2010
872k
    return node.m_connected + m_peer_connect_timeout < now;
2011
872k
}
2012
2013
bool CConnman::InactivityCheck(const CNode& node, NodeClock::time_point now) const
2014
499k
{
2015
    // Tests that see disconnects after using mocktime can start nodes with a
2016
    // large timeout. For example, -peertimeout=999999999.
2017
499k
    const auto last_send{node.m_last_send.load()};
2018
499k
    const auto last_recv{node.m_last_recv.load()};
2019
2020
499k
    if (!ShouldRunInactivityChecks(node, now)) return false;
2021
2022
90
    bool has_received{last_recv > NodeClock::epoch};
2023
90
    bool has_sent{last_send > NodeClock::epoch};
2024
2025
90
    if (!has_received || !has_sent) {
2026
3
        std::string has_never;
2027
3
        if (!has_received) has_never += ", never received from peer";
2028
3
        if (!has_sent) has_never += ", never sent to peer";
2029
3
        LogDebug(BCLog::NET,
2030
3
            "socket no message in first %i seconds%s, %s",
2031
3
            count_seconds(m_peer_connect_timeout),
2032
3
            has_never,
2033
3
            node.DisconnectMsg()
2034
3
        );
2035
3
        return true;
2036
3
    }
2037
2038
87
    if (now > last_send + TIMEOUT_INTERVAL) {
2039
0
        LogDebug(BCLog::NET,
2040
0
            "socket sending timeout: %is, %s", Ticks<std::chrono::seconds>(now - last_send),
2041
0
            node.DisconnectMsg()
2042
0
        );
2043
0
        return true;
2044
0
    }
2045
2046
87
    if (now > last_recv + TIMEOUT_INTERVAL) {
2047
0
        LogDebug(BCLog::NET,
2048
0
            "socket receive timeout: %is, %s", Ticks<std::chrono::seconds>(now - last_recv),
2049
0
            node.DisconnectMsg()
2050
0
        );
2051
0
        return true;
2052
0
    }
2053
2054
87
    if (!node.fSuccessfullyConnected) {
2055
8
        if (node.m_transport->GetInfo().transport_type == TransportProtocolType::DETECTING) {
2056
2
            LogDebug(BCLog::NET, "V2 handshake timeout, %s", node.DisconnectMsg());
2057
6
        } else {
2058
6
            LogDebug(BCLog::NET, "version handshake timeout, %s", node.DisconnectMsg());
2059
6
        }
2060
8
        return true;
2061
8
    }
2062
2063
79
    return false;
2064
87
}
2065
2066
Sock::EventsPerSock CConnman::GenerateWaitSockets(std::span<CNode* const> nodes)
2067
314k
{
2068
314k
    Sock::EventsPerSock events_per_sock;
2069
2070
315k
    for (const ListenSocket& hListenSocket : vhListenSocket) {
2071
315k
        events_per_sock.emplace(hListenSocket.sock, Sock::Events{Sock::RECV});
2072
315k
    }
2073
2074
499k
    for (CNode* pnode : nodes) {
2075
499k
        bool select_recv = !pnode->fPauseRecv;
2076
499k
        bool select_send;
2077
499k
        {
2078
499k
            LOCK(pnode->cs_vSend);
2079
            // Sending is possible if either there are bytes to send right now, or if there will be
2080
            // once a potential message from vSendMsg is handed to the transport. GetBytesToSend
2081
            // determines both of these in a single call.
2082
499k
            const auto& [to_send, more, _msg_type] = pnode->m_transport->GetBytesToSend(!pnode->vSendMsg.empty());
2083
499k
            select_send = !to_send.empty() || more;
2084
499k
        }
2085
499k
        if (!select_recv && !select_send) continue;
2086
2087
499k
        LOCK(pnode->m_sock_mutex);
2088
499k
        if (pnode->m_sock) {
2089
499k
            Sock::Event event = (select_send ? Sock::SEND : 0) | (select_recv ? Sock::RECV : 0);
2090
499k
            events_per_sock.emplace(pnode->m_sock, Sock::Events{event});
2091
499k
        }
2092
499k
    }
2093
2094
314k
    return events_per_sock;
2095
314k
}
2096
2097
void CConnman::SocketHandler()
2098
314k
{
2099
314k
    AssertLockNotHeld(m_total_bytes_sent_mutex);
2100
2101
314k
    Sock::EventsPerSock events_per_sock;
2102
2103
314k
    {
2104
314k
        const NodesSnapshot snap{*this, /*shuffle=*/false};
2105
2106
314k
        const auto timeout = std::chrono::milliseconds(SELECT_TIMEOUT_MILLISECONDS);
2107
2108
        // Check for the readiness of the already connected sockets and the
2109
        // listening sockets in one call ("readiness" as in poll(2) or
2110
        // select(2)). If none are ready, wait for a short while and return
2111
        // empty sets.
2112
314k
        events_per_sock = GenerateWaitSockets(snap.Nodes());
2113
314k
        if (events_per_sock.empty() || !events_per_sock.begin()->first->WaitMany(timeout, events_per_sock)) {
2114
29
            m_interrupt_net->sleep_for(timeout);
2115
29
        }
2116
2117
        // Service (send/receive) each of the already connected nodes.
2118
314k
        SocketHandlerConnected(snap.Nodes(), events_per_sock);
2119
314k
    }
2120
2121
    // Accept new connections from listening sockets.
2122
314k
    SocketHandlerListening(events_per_sock);
2123
314k
}
2124
2125
void CConnman::SocketHandlerConnected(const std::vector<CNode*>& nodes,
2126
                                      const Sock::EventsPerSock& events_per_sock)
2127
314k
{
2128
314k
    AssertLockNotHeld(m_total_bytes_sent_mutex);
2129
2130
314k
    const auto now{NodeClock::now()};
2131
2132
499k
    for (CNode* pnode : nodes) {
2133
499k
        if (m_interrupt_net->interrupted()) {
2134
399
            return;
2135
399
        }
2136
2137
        //
2138
        // Receive
2139
        //
2140
499k
        bool recvSet = false;
2141
499k
        bool sendSet = false;
2142
499k
        bool errorSet = false;
2143
499k
        {
2144
499k
            LOCK(pnode->m_sock_mutex);
2145
499k
            if (!pnode->m_sock) {
2146
0
                continue;
2147
0
            }
2148
499k
            const auto it = events_per_sock.find(pnode->m_sock);
2149
499k
            if (it != events_per_sock.end()) {
2150
499k
                recvSet = it->second.occurred & Sock::RECV;
2151
499k
                sendSet = it->second.occurred & Sock::SEND;
2152
499k
                errorSet = it->second.occurred & Sock::ERR;
2153
499k
            }
2154
499k
        }
2155
2156
499k
        if (sendSet) {
2157
            // Send data
2158
258
            auto [bytes_sent, data_left] = WITH_LOCK(pnode->cs_vSend, return SocketSendData(*pnode));
2159
258
            if (bytes_sent) {
2160
256
                RecordBytesSent(bytes_sent);
2161
2162
                // If both receiving and (non-optimistic) sending were possible, we first attempt
2163
                // sending. If that succeeds, but does not fully drain the send queue, do not
2164
                // attempt to receive. This avoids needlessly queueing data if the remote peer
2165
                // is slow at receiving data, by means of TCP flow control. We only do this when
2166
                // sending actually succeeded to make sure progress is always made; otherwise a
2167
                // deadlock would be possible when both sides have data to send, but neither is
2168
                // receiving.
2169
256
                if (data_left) recvSet = false;
2170
256
            }
2171
258
        }
2172
2173
499k
        if (recvSet || errorSet)
2174
159k
        {
2175
            // typical socket buffer is 8K-64K
2176
159k
            uint8_t pchBuf[0x10000];
2177
159k
            int nBytes = 0;
2178
159k
            {
2179
159k
                LOCK(pnode->m_sock_mutex);
2180
159k
                if (!pnode->m_sock) {
2181
3
                    continue;
2182
3
                }
2183
159k
                nBytes = pnode->m_sock->Recv(pchBuf, sizeof(pchBuf), MSG_DONTWAIT);
2184
159k
            }
2185
159k
            if (nBytes > 0)
2186
158k
            {
2187
158k
                bool notify = false;
2188
158k
                if (!pnode->ReceiveMsgBytes({pchBuf, (size_t)nBytes}, notify)) {
2189
10
                    LogDebug(BCLog::NET,
2190
10
                        "receiving message bytes failed, %s",
2191
10
                        pnode->DisconnectMsg()
2192
10
                    );
2193
10
                    pnode->CloseSocketDisconnect();
2194
10
                }
2195
158k
                RecordBytesRecv(nBytes);
2196
158k
                if (notify) {
2197
136k
                    pnode->MarkReceivedMsgsForProcessing();
2198
136k
                    WakeMessageHandler();
2199
136k
                }
2200
158k
            }
2201
545
            else if (nBytes == 0)
2202
544
            {
2203
                // socket closed gracefully
2204
544
                if (!pnode->fDisconnect) {
2205
544
                    LogDebug(BCLog::NET, "socket closed, %s", pnode->DisconnectMsg());
2206
544
                }
2207
544
                pnode->CloseSocketDisconnect();
2208
544
            }
2209
1
            else if (nBytes < 0)
2210
1
            {
2211
                // error
2212
1
                int nErr = WSAGetLastError();
2213
1
                if (nErr != WSAEWOULDBLOCK && nErr != WSAEMSGSIZE && nErr != WSAEINTR && nErr != WSAEINPROGRESS)
2214
1
                {
2215
1
                    if (!pnode->fDisconnect) {
2216
1
                        LogDebug(BCLog::NET, "socket recv error, %s: %s", pnode->DisconnectMsg(), NetworkErrorString(nErr));
2217
1
                    }
2218
1
                    pnode->CloseSocketDisconnect();
2219
1
                }
2220
1
            }
2221
159k
        }
2222
2223
499k
        if (InactivityCheck(*pnode, now)) pnode->fDisconnect = true;
2224
499k
    }
2225
314k
}
2226
2227
void CConnman::SocketHandlerListening(const Sock::EventsPerSock& events_per_sock)
2228
314k
{
2229
315k
    for (const ListenSocket& listen_socket : vhListenSocket) {
2230
315k
        if (m_interrupt_net->interrupted()) {
2231
963
            return;
2232
963
        }
2233
314k
        const auto it = events_per_sock.find(listen_socket.sock);
2234
314k
        if (it != events_per_sock.end() && it->second.occurred & Sock::RECV) {
2235
1.01k
            AcceptConnection(listen_socket);
2236
1.01k
        }
2237
314k
    }
2238
314k
}
2239
2240
void CConnman::ThreadSocketHandler()
2241
984
{
2242
984
    AssertLockNotHeld(m_total_bytes_sent_mutex);
2243
2244
315k
    while (!m_interrupt_net->interrupted()) {
2245
314k
        DisconnectNodes();
2246
314k
        NotifyNumConnectionsChanged();
2247
314k
        SocketHandler();
2248
314k
    }
2249
984
}
2250
2251
void CConnman::WakeMessageHandler()
2252
208k
{
2253
208k
    {
2254
208k
        LOCK(mutexMsgProc);
2255
208k
        fMsgProcWake = true;
2256
208k
    }
2257
208k
    condMsgProc.notify_one();
2258
208k
}
2259
2260
void CConnman::ThreadDNSAddressSeed()
2261
14
{
2262
14
    int outbound_connection_count = 0;
2263
2264
14
    if (!gArgs.GetArgs("-seednode").empty()) {
2265
0
        auto start = NodeClock::now();
2266
0
        constexpr std::chrono::seconds SEEDNODE_TIMEOUT = 30s;
2267
0
        LogInfo("-seednode enabled. Trying the provided seeds for %d seconds before defaulting to the dnsseeds.\n", SEEDNODE_TIMEOUT.count());
2268
0
        while (!m_interrupt_net->interrupted()) {
2269
0
            if (!m_interrupt_net->sleep_for(500ms)) {
2270
0
                return;
2271
0
            }
2272
2273
            // Abort if we have spent enough time without reaching our target.
2274
            // Giving seed nodes 30 seconds so this does not become a race against fixedseeds (which triggers after 1 min)
2275
0
            if (NodeClock::now() > start + SEEDNODE_TIMEOUT) {
2276
0
                LogInfo("Couldn't connect to enough peers via seed nodes. Handing fetch logic to the DNS seeds.\n");
2277
0
                break;
2278
0
            }
2279
2280
0
            outbound_connection_count = GetFullOutboundConnCount();
2281
0
            if (outbound_connection_count >= SEED_OUTBOUND_CONNECTION_THRESHOLD) {
2282
0
                LogInfo("P2P peers available. Finished fetching data from seed nodes.\n");
2283
0
                break;
2284
0
            }
2285
0
        }
2286
0
    }
2287
2288
14
    FastRandomContext rng;
2289
14
    std::vector<std::string> seeds = m_params.DNSSeeds();
2290
14
    std::shuffle(seeds.begin(), seeds.end(), rng);
2291
14
    int seeds_right_now = 0; // Number of seeds left before testing if we have enough connections
2292
2293
14
    if (gArgs.GetBoolArg("-forcednsseed", DEFAULT_FORCEDNSSEED)) {
2294
        // When -forcednsseed is provided, query all.
2295
1
        seeds_right_now = seeds.size();
2296
13
    } else if (addrman.get().Size() == 0) {
2297
        // If we have no known peers, query all.
2298
        // This will occur on the first run, or if peers.dat has been
2299
        // deleted.
2300
8
        seeds_right_now = seeds.size();
2301
8
    }
2302
2303
    // Proceed with dnsseeds if seednodes hasn't reached the target or if forcednsseed is set
2304
14
    if (outbound_connection_count < SEED_OUTBOUND_CONNECTION_THRESHOLD || seeds_right_now) {
2305
        // goal: only query DNS seed if address need is acute
2306
        // * If we have a reasonable number of peers in addrman, spend
2307
        //   some time trying them first. This improves user privacy by
2308
        //   creating fewer identifying DNS requests, reduces trust by
2309
        //   giving seeds less influence on the network topology, and
2310
        //   reduces traffic to the seeds.
2311
        // * When querying DNS seeds query a few at once, this ensures
2312
        //   that we don't give DNS seeds the ability to eclipse nodes
2313
        //   that query them.
2314
        // * If we continue having problems, eventually query all the
2315
        //   DNS seeds, and if that fails too, also try the fixed seeds.
2316
        //   (done in ThreadOpenConnections)
2317
14
        int found = 0;
2318
14
        const std::chrono::seconds seeds_wait_time = (addrman.get().Size() >= DNSSEEDS_DELAY_PEER_THRESHOLD ? DNSSEEDS_DELAY_MANY_PEERS : DNSSEEDS_DELAY_FEW_PEERS);
2319
2320
14
        for (const std::string& seed : seeds) {
2321
14
            if (seeds_right_now == 0) {
2322
5
                seeds_right_now += DNSSEEDS_TO_QUERY_AT_ONCE;
2323
2324
5
                if (addrman.get().Size() > 0) {
2325
5
                    LogInfo("Waiting %d seconds before querying DNS seeds.\n", seeds_wait_time.count());
2326
5
                    std::chrono::seconds to_wait = seeds_wait_time;
2327
6
                    while (to_wait.count() > 0) {
2328
                        // if sleeping for the MANY_PEERS interval, wake up
2329
                        // early to see if we have enough peers and can stop
2330
                        // this thread entirely freeing up its resources
2331
5
                        std::chrono::seconds w = std::min(DNSSEEDS_DELAY_FEW_PEERS, to_wait);
2332
5
                        if (!m_interrupt_net->sleep_for(w)) return;
2333
2
                        to_wait -= w;
2334
2335
2
                        if (GetFullOutboundConnCount() >= SEED_OUTBOUND_CONNECTION_THRESHOLD) {
2336
1
                            if (found > 0) {
2337
0
                                LogInfo("%d addresses found from DNS seeds\n", found);
2338
0
                                LogInfo("P2P peers available. Finished DNS seeding.\n");
2339
1
                            } else {
2340
1
                                LogInfo("P2P peers available. Skipped DNS seeding.\n");
2341
1
                            }
2342
1
                            return;
2343
1
                        }
2344
2
                    }
2345
5
                }
2346
5
            }
2347
2348
10
            if (m_interrupt_net->interrupted()) return;
2349
2350
            // hold off on querying seeds if P2P network deactivated
2351
9
            if (!fNetworkActive) {
2352
0
                LogInfo("Waiting for network to be reactivated before querying DNS seeds.\n");
2353
0
                do {
2354
0
                    if (!m_interrupt_net->sleep_for(1s)) return;
2355
0
                } while (!fNetworkActive);
2356
0
            }
2357
2358
9
            LogInfo("Loading addresses from DNS seed %s\n", seed);
2359
            // If -proxy is in use, we make an ADDR_FETCH connection to the DNS resolved peer address
2360
            // for the base dns seed domain in chainparams
2361
9
            if (HaveNameProxy()) {
2362
9
                AddAddrFetch(seed);
2363
9
            } else {
2364
0
                std::vector<CAddress> vAdd;
2365
0
                constexpr ServiceFlags requiredServiceBits{SeedsServiceFlags()};
2366
0
                std::string host = strprintf("x%x.%s", requiredServiceBits, seed);
2367
0
                CNetAddr resolveSource;
2368
0
                if (!resolveSource.SetInternal(host)) {
2369
0
                    continue;
2370
0
                }
2371
                // Limit number of IPs learned from a single DNS seed. This limit exists to prevent the results from
2372
                // one DNS seed from dominating AddrMan. Note that the number of results from a UDP DNS query is
2373
                // bounded to 33 already, but it is possible for it to use TCP where a larger number of results can be
2374
                // returned.
2375
0
                unsigned int nMaxIPs = 32;
2376
0
                const auto addresses{LookupHost(host, nMaxIPs, true)};
2377
0
                if (!addresses.empty()) {
2378
0
                    for (const CNetAddr& ip : addresses) {
2379
0
                        CAddress addr = CAddress(CService(ip, m_params.GetDefaultPort()), requiredServiceBits);
2380
0
                        addr.nTime = rng.rand_uniform_delay(Now<NodeSeconds>() - 3 * 24h, -4 * 24h); // use a random age between 3 and 7 days old
2381
0
                        vAdd.push_back(addr);
2382
0
                        found++;
2383
0
                    }
2384
0
                    addrman.get().Add(vAdd, resolveSource);
2385
0
                } else {
2386
                    // If the seed does not support a subdomain with our desired service bits,
2387
                    // we make an ADDR_FETCH connection to the DNS resolved peer address for the
2388
                    // base dns seed domain in chainparams
2389
0
                    AddAddrFetch(seed);
2390
0
                }
2391
0
            }
2392
9
            --seeds_right_now;
2393
9
        }
2394
9
        LogInfo("%d addresses found from DNS seeds\n", found);
2395
9
    } else {
2396
0
        LogInfo("Skipping DNS seeds. Enough peers have been found\n");
2397
0
    }
2398
14
}
2399
2400
void CConnman::DumpAddresses()
2401
993
{
2402
993
    const auto start{SteadyClock::now()};
2403
2404
993
    DumpPeerAddresses(::gArgs, addrman);
2405
2406
993
    LogDebug(BCLog::NET, "Flushed %d addresses to peers.dat %dms",
2407
993
             addrman.get().Size(), Ticks<std::chrono::milliseconds>(SteadyClock::now() - start));
2408
993
}
2409
2410
void CConnman::ProcessAddrFetch()
2411
62
{
2412
62
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
2413
62
    std::string strDest;
2414
62
    {
2415
62
        LOCK(m_addr_fetches_mutex);
2416
62
        if (m_addr_fetches.empty())
2417
59
            return;
2418
3
        strDest = m_addr_fetches.front();
2419
3
        m_addr_fetches.pop_front();
2420
3
    }
2421
    // Attempt v2 connection if we support v2 - we'll reconnect with v1 if our
2422
    // peer doesn't support it or immediately disconnects us for another reason.
2423
0
    const bool use_v2transport(GetLocalServices() & NODE_P2P_V2);
2424
3
    CAddress addr;
2425
3
    CountingSemaphoreGrant<> grant(*semOutbound, /*fTry=*/true);
2426
3
    if (grant) {
2427
3
        OpenNetworkConnection(addr, false, std::move(grant), strDest.c_str(), ConnectionType::ADDR_FETCH, use_v2transport);
2428
3
    }
2429
3
}
2430
2431
bool CConnman::GetTryNewOutboundPeer() const
2432
66
{
2433
66
    return m_try_another_outbound_peer;
2434
66
}
2435
2436
void CConnman::SetTryNewOutboundPeer(bool flag)
2437
1.21k
{
2438
1.21k
    m_try_another_outbound_peer = flag;
2439
1.21k
    LogDebug(BCLog::NET, "setting try another outbound peer=%s\n", flag ? "true" : "false");
2440
1.21k
}
2441
2442
void CConnman::StartExtraBlockRelayPeers()
2443
40
{
2444
40
    LogDebug(BCLog::NET, "enabling extra block-relay-only peers\n");
2445
40
    m_start_extra_block_relay_peers = true;
2446
40
}
2447
2448
// Return the number of outbound connections that are full relay (not blocks only)
2449
int CConnman::GetFullOutboundConnCount() const
2450
2
{
2451
2
    int nRelevant = 0;
2452
2
    {
2453
2
        LOCK(m_nodes_mutex);
2454
4
        for (const CNode* pnode : m_nodes) {
2455
4
            if (pnode->fSuccessfullyConnected && pnode->IsFullOutboundConn()) ++nRelevant;
2456
4
        }
2457
2
    }
2458
2
    return nRelevant;
2459
2
}
2460
2461
// Return the number of peers we have over our outbound connection limit
2462
// Exclude peers that are marked for disconnect, or are going to be
2463
// disconnected soon (eg ADDR_FETCH and FEELER)
2464
// Also exclude peers that haven't finished initial connection handshake yet
2465
// (so that we don't decide we're over our desired connection limit, and then
2466
// evict some peer that has finished the handshake)
2467
int CConnman::GetExtraFullOutboundCount() const
2468
119
{
2469
119
    int full_outbound_peers = 0;
2470
119
    {
2471
119
        LOCK(m_nodes_mutex);
2472
250
        for (const CNode* pnode : m_nodes) {
2473
250
            if (pnode->fSuccessfullyConnected && !pnode->fDisconnect && pnode->IsFullOutboundConn()) {
2474
62
                ++full_outbound_peers;
2475
62
            }
2476
250
        }
2477
119
    }
2478
119
    return std::max(full_outbound_peers - m_max_outbound_full_relay, 0);
2479
119
}
2480
2481
int CConnman::GetExtraBlockRelayCount() const
2482
119
{
2483
119
    int block_relay_peers = 0;
2484
119
    {
2485
119
        LOCK(m_nodes_mutex);
2486
250
        for (const CNode* pnode : m_nodes) {
2487
250
            if (pnode->fSuccessfullyConnected && !pnode->fDisconnect && pnode->IsBlockOnlyConn()) {
2488
13
                ++block_relay_peers;
2489
13
            }
2490
250
        }
2491
119
    }
2492
119
    return std::max(block_relay_peers - m_max_outbound_block_relay, 0);
2493
119
}
2494
2495
std::unordered_set<Network> CConnman::GetReachableEmptyNetworks() const
2496
32
{
2497
32
    std::unordered_set<Network> networks{};
2498
256
    for (int n = 0; n < NET_MAX; n++) {
2499
224
        enum Network net = (enum Network)n;
2500
224
        if (net == NET_UNROUTABLE || net == NET_INTERNAL) continue;
2501
160
        if (g_reachable_nets.Contains(net) && addrman.get().Size(net, std::nullopt) == 0) {
2502
17
            networks.insert(net);
2503
17
        }
2504
160
    }
2505
32
    return networks;
2506
32
}
2507
2508
bool CConnman::MultipleManualOrFullOutboundConns(Network net) const
2509
38
{
2510
38
    AssertLockHeld(m_nodes_mutex);
2511
38
    return m_network_conn_counts[net] > 1;
2512
38
}
2513
2514
bool CConnman::MaybePickPreferredNetwork(std::optional<Network>& network)
2515
0
{
2516
0
    std::array<Network, 5> nets{NET_IPV4, NET_IPV6, NET_ONION, NET_I2P, NET_CJDNS};
2517
0
    std::shuffle(nets.begin(), nets.end(), FastRandomContext());
2518
2519
0
    LOCK(m_nodes_mutex);
2520
0
    for (const auto net : nets) {
2521
0
        if (g_reachable_nets.Contains(net) && m_network_conn_counts[net] == 0 && addrman.get().Size(net) != 0) {
2522
0
            network = net;
2523
0
            return true;
2524
0
        }
2525
0
    }
2526
2527
0
    return false;
2528
0
}
2529
2530
void CConnman::ThreadOpenConnections(const std::vector<std::string> connect, std::span<const std::string> seed_nodes)
2531
36
{
2532
36
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
2533
36
    AssertLockNotHeld(m_reconnections_mutex);
2534
36
    FastRandomContext rng;
2535
    // Connect to specific addresses
2536
36
    if (!connect.empty())
2537
5
    {
2538
        // Attempt v2 connection if we support v2 - we'll reconnect with v1 if our
2539
        // peer doesn't support it or immediately disconnects us for another reason.
2540
5
        const bool use_v2transport(GetLocalServices() & NODE_P2P_V2);
2541
5
        for (int64_t nLoop = 0;; nLoop++)
2542
5
        {
2543
5
            for (const std::string& strAddr : connect)
2544
7
            {
2545
7
                CAddress addr(CService(), NODE_NONE);
2546
7
                OpenNetworkConnection(addr, false, {}, strAddr.c_str(), ConnectionType::MANUAL, /*use_v2transport=*/use_v2transport);
2547
7
                for (int i = 0; i < 10 && i < nLoop; i++)
2548
0
                {
2549
0
                    if (!m_interrupt_net->sleep_for(500ms)) {
2550
0
                        return;
2551
0
                    }
2552
0
                }
2553
7
            }
2554
5
            if (!m_interrupt_net->sleep_for(500ms)) {
2555
5
                return;
2556
5
            }
2557
0
            PerformReconnections();
2558
0
        }
2559
5
    }
2560
2561
    // Initiate network connections
2562
31
    auto start = GetTime<std::chrono::microseconds>();
2563
2564
    // Minimum time before next feeler connection (in microseconds).
2565
31
    auto next_feeler = start + rng.rand_exp_duration(FEELER_INTERVAL);
2566
31
    auto next_extra_block_relay = start + rng.rand_exp_duration(EXTRA_BLOCK_RELAY_ONLY_PEER_INTERVAL);
2567
31
    auto next_extra_network_peer{start + rng.rand_exp_duration(EXTRA_NETWORK_PEER_INTERVAL)};
2568
31
    const bool dnsseed = gArgs.GetBoolArg("-dnsseed", DEFAULT_DNSSEED);
2569
31
    bool add_fixed_seeds = gArgs.GetBoolArg("-fixedseeds", DEFAULT_FIXEDSEEDS);
2570
31
    const bool use_seednodes{!gArgs.GetArgs("-seednode").empty()};
2571
2572
31
    auto seed_node_timer = NodeClock::now();
2573
31
    bool add_addr_fetch{addrman.get().Size() == 0 && !seed_nodes.empty()};
2574
31
    constexpr std::chrono::seconds ADD_NEXT_SEEDNODE = 10s;
2575
2576
31
    if (!add_fixed_seeds) {
2577
27
        LogInfo("Fixed seeds are disabled\n");
2578
27
    }
2579
2580
63
    while (!m_interrupt_net->interrupted()) {
2581
62
        if (add_addr_fetch) {
2582
2
            add_addr_fetch = false;
2583
2
            const auto& seed{SpanPopBack(seed_nodes)};
2584
2
            AddAddrFetch(seed);
2585
2586
2
            if (addrman.get().Size() == 0) {
2587
1
                LogInfo("Empty addrman, adding seednode (%s) to addrfetch\n", seed);
2588
1
            } else {
2589
1
                LogInfo("Couldn't connect to peers from addrman after %d seconds. Adding seednode (%s) to addrfetch\n", ADD_NEXT_SEEDNODE.count(), seed);
2590
1
            }
2591
2
        }
2592
2593
62
        ProcessAddrFetch();
2594
2595
62
        if (!m_interrupt_net->sleep_for(500ms)) {
2596
30
            return;
2597
30
        }
2598
2599
32
        PerformReconnections();
2600
2601
32
        CountingSemaphoreGrant<> grant(*semOutbound);
2602
32
        if (m_interrupt_net->interrupted()) {
2603
0
            return;
2604
0
        }
2605
2606
32
        const std::unordered_set<Network> fixed_seed_networks{GetReachableEmptyNetworks()};
2607
32
        if (add_fixed_seeds && !fixed_seed_networks.empty()) {
2608
            // When the node starts with an empty peers.dat, there are a few other sources of peers before
2609
            // we fallback on to fixed seeds: -dnsseed, -seednode, -addnode
2610
            // If none of those are available, we fallback on to fixed seeds immediately, else we allow
2611
            // 60 seconds for any of those sources to populate addrman.
2612
3
            bool add_fixed_seeds_now = false;
2613
            // It is cheapest to check if enough time has passed first.
2614
3
            if (GetTime<std::chrono::seconds>() > start + std::chrono::minutes{1}) {
2615
2
                add_fixed_seeds_now = true;
2616
2
                LogInfo("Adding fixed seeds as 60 seconds have passed and addrman is empty for at least one reachable network\n");
2617
2
            }
2618
2619
            // Perform cheap checks before locking a mutex.
2620
1
            else if (!dnsseed && !use_seednodes) {
2621
1
                LOCK(m_added_nodes_mutex);
2622
1
                if (m_added_node_params.empty()) {
2623
1
                    add_fixed_seeds_now = true;
2624
1
                    LogInfo("Adding fixed seeds as -dnsseed=0 (or IPv4/IPv6 connections are disabled via -onlynet) and neither -addnode nor -seednode are provided\n");
2625
1
                }
2626
1
            }
2627
2628
3
            if (add_fixed_seeds_now) {
2629
3
                std::vector<CAddress> seed_addrs{ConvertSeeds(m_params.FixedSeeds())};
2630
                // We will not make outgoing connections to peers that are unreachable
2631
                // (e.g. because of -onlynet configuration).
2632
                // Therefore, we do not add them to addrman in the first place.
2633
                // In case previously unreachable networks become reachable
2634
                // (e.g. in case of -onlynet changes by the user), fixed seeds will
2635
                // be loaded only for networks for which we have no addresses.
2636
3
                seed_addrs.erase(std::remove_if(seed_addrs.begin(), seed_addrs.end(),
2637
3
                                                [&fixed_seed_networks](const CAddress& addr) { return !fixed_seed_networks.contains(addr.GetNetwork()); }),
2638
3
                                 seed_addrs.end());
2639
3
                CNetAddr local;
2640
3
                local.SetInternal("fixedseeds");
2641
3
                addrman.get().Add(seed_addrs, local);
2642
3
                add_fixed_seeds = false;
2643
3
                LogInfo("Added %d fixed seeds from reachable networks.\n", seed_addrs.size());
2644
3
            }
2645
3
        }
2646
2647
        //
2648
        // Choose an address to connect to based on most recently seen
2649
        //
2650
32
        CAddress addrConnect;
2651
2652
        // Only connect out to one peer per ipv4/ipv6 network group (/16 for IPv4).
2653
32
        int nOutboundFullRelay = 0;
2654
32
        int nOutboundBlockRelay = 0;
2655
32
        int outbound_privacy_network_peers = 0;
2656
32
        std::set<std::vector<unsigned char>> outbound_ipv46_peer_netgroups;
2657
2658
32
        {
2659
32
            LOCK(m_nodes_mutex);
2660
210
            for (const CNode* pnode : m_nodes) {
2661
210
                if (pnode->IsFullOutboundConn()) nOutboundFullRelay++;
2662
210
                if (pnode->IsBlockOnlyConn()) nOutboundBlockRelay++;
2663
2664
                // Make sure our persistent outbound slots to ipv4/ipv6 peers belong to different netgroups.
2665
210
                switch (pnode->m_conn_type) {
2666
                    // We currently don't take inbound connections into account. Since they are
2667
                    // free to make, an attacker could make them to prevent us from connecting to
2668
                    // certain peers.
2669
2
                    case ConnectionType::INBOUND:
2670
                    // Short-lived outbound connections should not affect how we select outbound
2671
                    // peers from addrman.
2672
2
                    case ConnectionType::ADDR_FETCH:
2673
2
                    case ConnectionType::FEELER:
2674
13
                    case ConnectionType::PRIVATE_BROADCAST:
2675
13
                        break;
2676
0
                    case ConnectionType::MANUAL:
2677
164
                    case ConnectionType::OUTBOUND_FULL_RELAY:
2678
197
                    case ConnectionType::BLOCK_RELAY:
2679
197
                        const CAddress address{pnode->addr};
2680
197
                        if (address.IsTor() || address.IsI2P() || address.IsCJDNS()) {
2681
                            // Since our addrman-groups for these networks are
2682
                            // random, without relation to the route we
2683
                            // take to connect to these peers or to the
2684
                            // difficulty in obtaining addresses with diverse
2685
                            // groups, we don't worry about diversity with
2686
                            // respect to our addrman groups when connecting to
2687
                            // these networks.
2688
0
                            ++outbound_privacy_network_peers;
2689
197
                        } else {
2690
197
                            outbound_ipv46_peer_netgroups.insert(m_netgroupman.GetGroup(address));
2691
197
                        }
2692
210
                } // no default case, so the compiler can warn about missing cases
2693
210
            }
2694
32
        }
2695
2696
32
        if (!seed_nodes.empty() && nOutboundFullRelay < SEED_OUTBOUND_CONNECTION_THRESHOLD) {
2697
2
            if (NodeClock::now() > seed_node_timer + ADD_NEXT_SEEDNODE) {
2698
1
                seed_node_timer = NodeClock::now();
2699
1
                add_addr_fetch = true;
2700
1
            }
2701
2
        }
2702
2703
32
        ConnectionType conn_type = ConnectionType::OUTBOUND_FULL_RELAY;
2704
32
        auto now = GetTime<std::chrono::microseconds>();
2705
32
        bool anchor = false;
2706
32
        bool fFeeler = false;
2707
32
        std::optional<Network> preferred_net;
2708
2709
        // Determine what type of connection to open. Opening
2710
        // BLOCK_RELAY connections to addresses from anchors.dat gets the highest
2711
        // priority. Then we open OUTBOUND_FULL_RELAY priority until we
2712
        // meet our full-relay capacity. Then we open BLOCK_RELAY connection
2713
        // until we hit our block-relay-only peer limit.
2714
        // GetTryNewOutboundPeer() gets set when a stale tip is detected, so we
2715
        // try opening an additional OUTBOUND_FULL_RELAY connection. If none of
2716
        // these conditions are met, check to see if it's time to try an extra
2717
        // block-relay-only peer (to confirm our tip is current, see below) or the next_feeler
2718
        // timer to decide if we should open a FEELER.
2719
2720
32
        if (!m_anchors.empty() && (nOutboundBlockRelay < m_max_outbound_block_relay)) {
2721
1
            conn_type = ConnectionType::BLOCK_RELAY;
2722
1
            anchor = true;
2723
31
        } else if (nOutboundFullRelay < m_max_outbound_full_relay) {
2724
            // OUTBOUND_FULL_RELAY
2725
17
        } else if (nOutboundBlockRelay < m_max_outbound_block_relay) {
2726
2
            conn_type = ConnectionType::BLOCK_RELAY;
2727
15
        } else if (GetTryNewOutboundPeer()) {
2728
            // OUTBOUND_FULL_RELAY
2729
15
        } else if (now > next_extra_block_relay && m_start_extra_block_relay_peers) {
2730
            // Periodically connect to a peer (using regular outbound selection
2731
            // methodology from addrman) and stay connected long enough to sync
2732
            // headers, but not much else.
2733
            //
2734
            // Then disconnect the peer, if we haven't learned anything new.
2735
            //
2736
            // The idea is to make eclipse attacks very difficult to pull off,
2737
            // because every few minutes we're finding a new peer to learn headers
2738
            // from.
2739
            //
2740
            // This is similar to the logic for trying extra outbound (full-relay)
2741
            // peers, except:
2742
            // - we do this all the time on an exponential timer, rather than just when
2743
            //   our tip is stale
2744
            // - we potentially disconnect our next-youngest block-relay-only peer, if our
2745
            //   newest block-relay-only peer delivers a block more recently.
2746
            //   See the eviction logic in net_processing.cpp.
2747
            //
2748
            // Because we can promote these connections to block-relay-only
2749
            // connections, they do not get their own ConnectionType enum
2750
            // (similar to how we deal with extra outbound peers).
2751
0
            next_extra_block_relay = now + rng.rand_exp_duration(EXTRA_BLOCK_RELAY_ONLY_PEER_INTERVAL);
2752
0
            conn_type = ConnectionType::BLOCK_RELAY;
2753
15
        } else if (now > next_feeler) {
2754
0
            next_feeler = now + rng.rand_exp_duration(FEELER_INTERVAL);
2755
0
            conn_type = ConnectionType::FEELER;
2756
0
            fFeeler = true;
2757
15
        } else if (nOutboundFullRelay == m_max_outbound_full_relay &&
2758
15
                   m_max_outbound_full_relay == MAX_OUTBOUND_FULL_RELAY_CONNECTIONS &&
2759
15
                   now > next_extra_network_peer &&
2760
15
                   MaybePickPreferredNetwork(preferred_net)) {
2761
            // Full outbound connection management: Attempt to get at least one
2762
            // outbound peer from each reachable network by making extra connections
2763
            // and then protecting "only" peers from a network during outbound eviction.
2764
            // This is not attempted if the user changed -maxconnections to a value
2765
            // so low that less than MAX_OUTBOUND_FULL_RELAY_CONNECTIONS are made,
2766
            // to prevent interactions with otherwise protected outbound peers.
2767
0
            next_extra_network_peer = now + rng.rand_exp_duration(EXTRA_NETWORK_PEER_INTERVAL);
2768
15
        } else {
2769
            // skip to next iteration of while loop
2770
15
            continue;
2771
15
        }
2772
2773
17
        addrman.get().ResolveCollisions();
2774
2775
17
        const auto current_time{NodeClock::now()};
2776
17
        int nTries = 0;
2777
17
        const auto reachable_nets{g_reachable_nets.All()};
2778
2779
127
        while (!m_interrupt_net->interrupted()) {
2780
127
            if (anchor && !m_anchors.empty()) {
2781
1
                const CAddress addr = m_anchors.back();
2782
1
                m_anchors.pop_back();
2783
1
                if (!addr.IsValid() || IsLocal(addr) || !g_reachable_nets.Contains(addr) ||
2784
1
                    !m_msgproc->HasAllDesirableServiceFlags(addr.nServices) ||
2785
1
                    outbound_ipv46_peer_netgroups.contains(m_netgroupman.GetGroup(addr))) continue;
2786
1
                addrConnect = addr;
2787
1
                LogDebug(BCLog::NET, "Trying to make an anchor connection to %s\n", addrConnect.ToStringAddrPort());
2788
1
                break;
2789
1
            }
2790
2791
            // If we didn't find an appropriate destination after trying 100 addresses fetched from addrman,
2792
            // stop this loop, and let the outer loop run again (which sleeps, adds seed nodes, recalculates
2793
            // already-connected network ranges, ...) before trying new addrman addresses.
2794
126
            nTries++;
2795
126
            if (nTries > 100)
2796
1
                break;
2797
2798
125
            CAddress addr;
2799
125
            NodeSeconds addr_last_try{0s};
2800
2801
125
            if (fFeeler) {
2802
                // First, try to get a tried table collision address. This returns
2803
                // an empty (invalid) address if there are no collisions to try.
2804
0
                std::tie(addr, addr_last_try) = addrman.get().SelectTriedCollision();
2805
2806
0
                if (!addr.IsValid()) {
2807
                    // No tried table collisions. Select a new table address
2808
                    // for our feeler.
2809
0
                    std::tie(addr, addr_last_try) = addrman.get().Select(true, reachable_nets);
2810
0
                } else if (AlreadyConnectedToAddress(addr)) {
2811
                    // If test-before-evict logic would have us connect to a
2812
                    // peer that we're already connected to, just mark that
2813
                    // address as Good(). We won't be able to initiate the
2814
                    // connection anyway, so this avoids inadvertently evicting
2815
                    // a currently-connected peer.
2816
0
                    addrman.get().Good(addr);
2817
                    // Select a new table address for our feeler instead.
2818
0
                    std::tie(addr, addr_last_try) = addrman.get().Select(true, reachable_nets);
2819
0
                }
2820
125
            } else {
2821
                // Not a feeler
2822
                // If preferred_net has a value set, pick an extra outbound
2823
                // peer from that network. The eviction logic in net_processing
2824
                // ensures that a peer from another network will be evicted.
2825
125
                std::tie(addr, addr_last_try) = preferred_net.has_value()
2826
125
                    ? addrman.get().Select(false, {*preferred_net})
2827
125
                    : addrman.get().Select(false, reachable_nets);
2828
125
            }
2829
2830
            // Require outbound IPv4/IPv6 connections, other than feelers, to be to distinct network groups
2831
125
            if (!fFeeler && outbound_ipv46_peer_netgroups.contains(m_netgroupman.GetGroup(addr))) {
2832
110
                continue;
2833
110
            }
2834
2835
            // if we selected an invalid or local address, restart
2836
15
            if (!addr.IsValid() || IsLocal(addr)) {
2837
3
                break;
2838
3
            }
2839
2840
12
            if (!g_reachable_nets.Contains(addr)) {
2841
0
                continue;
2842
0
            }
2843
2844
            // only consider very recently tried nodes after 30 failed attempts
2845
12
            if (current_time - addr_last_try < 10min && nTries < 30) {
2846
0
                continue;
2847
0
            }
2848
2849
            // for non-feelers, require all the services we'll want,
2850
            // for feelers, only require they be a full node (only because most
2851
            // SPV clients don't have a good address DB available)
2852
12
            if (!fFeeler && !m_msgproc->HasAllDesirableServiceFlags(addr.nServices)) {
2853
0
                continue;
2854
12
            } else if (fFeeler && !MayHaveUsefulAddressDB(addr.nServices)) {
2855
0
                continue;
2856
0
            }
2857
2858
            // Do not connect to bad ports, unless 50 invalid addresses have been selected already.
2859
12
            if (nTries < 50 && (addr.IsIPv4() || addr.IsIPv6()) && IsBadPort(addr.GetPort())) {
2860
0
                continue;
2861
0
            }
2862
2863
            // Do not make automatic outbound connections to addnode peers, to
2864
            // not use our limited outbound slots for them and to ensure
2865
            // addnode connections benefit from their intended protections.
2866
12
            if (AddedNodesContain(addr)) {
2867
0
                LogDebug(BCLog::NET, "Not making automatic %s%s connection to %s peer selected for manual (addnode) connection%s\n",
2868
0
                              preferred_net.has_value() ? "network-specific " : "",
2869
0
                              ConnectionTypeAsString(conn_type), GetNetworkName(addr.GetNetwork()),
2870
0
                              fLogIPs ? strprintf(": %s", addr.ToStringAddrPort()) : "");
2871
0
                continue;
2872
0
            }
2873
2874
12
            addrConnect = addr;
2875
12
            break;
2876
12
        }
2877
2878
17
        if (addrConnect.IsValid()) {
2879
13
            if (fFeeler) {
2880
                // Add small amount of random noise before connection to avoid synchronization.
2881
0
                if (!m_interrupt_net->sleep_for(rng.rand_uniform_duration<CThreadInterrupt::Clock>(FEELER_SLEEP_WINDOW))) {
2882
0
                    return;
2883
0
                }
2884
0
                LogDebug(BCLog::NET, "Making feeler connection to %s\n", addrConnect.ToStringAddrPort());
2885
0
            }
2886
2887
13
            if (preferred_net != std::nullopt) LogDebug(BCLog::NET, "Making network specific connection to %s on %s.\n", addrConnect.ToStringAddrPort(), GetNetworkName(preferred_net.value()));
2888
2889
            // Record addrman failure attempts when node has at least 2 persistent outbound connections to peers with
2890
            // different netgroups in ipv4/ipv6 networks + all peers in Tor/I2P/CJDNS networks.
2891
            // Don't record addrman failure attempts when node is offline. This can be identified since all local
2892
            // network connections (if any) belong in the same netgroup, and the size of `outbound_ipv46_peer_netgroups` would only be 1.
2893
13
            const bool count_failures{((int)outbound_ipv46_peer_netgroups.size() + outbound_privacy_network_peers) >= std::min(m_max_automatic_connections - 1, 2)};
2894
            // Use BIP324 transport when both us and them have NODE_V2_P2P set.
2895
13
            const bool use_v2transport(addrConnect.nServices & GetLocalServices() & NODE_P2P_V2);
2896
13
            OpenNetworkConnection(addrConnect, count_failures, std::move(grant), /*pszDest=*/nullptr, conn_type, use_v2transport);
2897
13
        }
2898
17
    }
2899
31
}
2900
2901
std::vector<CAddress> CConnman::GetCurrentBlockRelayOnlyConns() const
2902
31
{
2903
31
    std::vector<CAddress> ret;
2904
31
    LOCK(m_nodes_mutex);
2905
31
    for (const CNode* pnode : m_nodes) {
2906
13
        if (pnode->IsBlockOnlyConn()) {
2907
5
            ret.push_back(pnode->addr);
2908
5
        }
2909
13
    }
2910
2911
31
    return ret;
2912
31
}
2913
2914
std::vector<AddedNodeInfo> CConnman::GetAddedNodeInfo(bool include_connected) const
2915
5.24k
{
2916
5.24k
    std::vector<AddedNodeInfo> ret;
2917
2918
5.24k
    std::list<AddedNodeParams> lAddresses(0);
2919
5.24k
    {
2920
5.24k
        LOCK(m_added_nodes_mutex);
2921
5.24k
        ret.reserve(m_added_node_params.size());
2922
5.24k
        std::copy(m_added_node_params.cbegin(), m_added_node_params.cend(), std::back_inserter(lAddresses));
2923
5.24k
    }
2924
2925
2926
    // Build a map of all already connected addresses (by IP:port and by name) to inbound/outbound and resolved CService
2927
5.24k
    std::map<CService, bool> mapConnected;
2928
5.24k
    std::map<std::string, std::pair<bool, CService>> mapConnectedByName;
2929
5.24k
    {
2930
5.24k
        LOCK(m_nodes_mutex);
2931
5.84k
        for (const CNode* pnode : m_nodes) {
2932
5.84k
            if (pnode->addr.IsValid()) {
2933
5.84k
                mapConnected[pnode->addr] = pnode->IsInboundConn();
2934
5.84k
            }
2935
5.84k
            std::string addrName{pnode->m_addr_name};
2936
5.84k
            if (!addrName.empty()) {
2937
5.84k
                mapConnectedByName[std::move(addrName)] = std::make_pair(pnode->IsInboundConn(), static_cast<const CService&>(pnode->addr));
2938
5.84k
            }
2939
5.84k
        }
2940
5.24k
    }
2941
2942
5.24k
    for (const auto& addr : lAddresses) {
2943
33
        CService service{MaybeFlipIPv6toCJDNS(LookupNumeric(addr.m_added_node, GetDefaultPort(addr.m_added_node)))};
2944
33
        AddedNodeInfo addedNode{addr, CService(), false, false};
2945
33
        if (service.IsValid()) {
2946
            // strAddNode is an IP:port
2947
31
            auto it = mapConnected.find(service);
2948
31
            if (it != mapConnected.end()) {
2949
15
                if (!include_connected) {
2950
5
                    continue;
2951
5
                }
2952
10
                addedNode.resolvedAddress = service;
2953
10
                addedNode.fConnected = true;
2954
10
                addedNode.fInbound = it->second;
2955
10
            }
2956
31
        } else {
2957
            // strAddNode is a name
2958
2
            auto it = mapConnectedByName.find(addr.m_added_node);
2959
2
            if (it != mapConnectedByName.end()) {
2960
0
                if (!include_connected) {
2961
0
                    continue;
2962
0
                }
2963
0
                addedNode.resolvedAddress = it->second.second;
2964
0
                addedNode.fConnected = true;
2965
0
                addedNode.fInbound = it->second.first;
2966
0
            }
2967
2
        }
2968
28
        ret.emplace_back(std::move(addedNode));
2969
28
    }
2970
2971
5.24k
    return ret;
2972
5.24k
}
2973
2974
void CConnman::ThreadOpenAddedConnections()
2975
984
{
2976
984
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
2977
984
    AssertLockNotHeld(m_reconnections_mutex);
2978
5.22k
    while (true)
2979
5.22k
    {
2980
5.22k
        CountingSemaphoreGrant<> grant(*semAddnode);
2981
5.22k
        std::vector<AddedNodeInfo> vInfo = GetAddedNodeInfo(/*include_connected=*/false);
2982
5.22k
        bool tried = false;
2983
5.22k
        for (const AddedNodeInfo& info : vInfo) {
2984
4
            if (!grant) {
2985
                // If we've used up our semaphore and need a new one, let's not wait here since while we are waiting
2986
                // the addednodeinfo state might change.
2987
0
                break;
2988
0
            }
2989
4
            tried = true;
2990
4
            CAddress addr(CService(), NODE_NONE);
2991
4
            OpenNetworkConnection(addr, false, std::move(grant), info.m_params.m_added_node.c_str(), ConnectionType::MANUAL, info.m_params.m_use_v2transport);
2992
4
            if (!m_interrupt_net->sleep_for(500ms)) return;
2993
3
            grant = CountingSemaphoreGrant<>(*semAddnode, /*fTry=*/true);
2994
3
        }
2995
        // See if any reconnections are desired.
2996
5.22k
        PerformReconnections();
2997
        // Retry every 60 seconds if a connection was attempted, otherwise two seconds
2998
5.22k
        if (!m_interrupt_net->sleep_for(tried ? 60s : 2s)) {
2999
983
            return;
3000
983
        }
3001
5.22k
    }
3002
984
}
3003
3004
// if successful, this moves the passed grant to the constructed node
3005
bool CConnman::OpenNetworkConnection(const CAddress& addrConnect,
3006
                                     bool fCountFailure,
3007
                                     CountingSemaphoreGrant<>&& grant_outbound,
3008
                                     const char* pszDest,
3009
                                     ConnectionType conn_type,
3010
                                     bool use_v2transport,
3011
                                     const std::optional<Proxy>& proxy_override)
3012
610
{
3013
610
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
3014
610
    assert(conn_type != ConnectionType::INBOUND);
3015
3016
    //
3017
    // Initiate outbound network connection
3018
    //
3019
610
    if (m_interrupt_net->interrupted()) {
3020
1
        return false;
3021
1
    }
3022
609
    if (!fNetworkActive) {
3023
0
        return false;
3024
0
    }
3025
609
    if (!pszDest) {
3026
25
        bool banned_or_discouraged = m_banman && (m_banman->IsDiscouraged(addrConnect) || m_banman->IsBanned(addrConnect));
3027
25
        if (IsLocal(addrConnect) || banned_or_discouraged || AlreadyConnectedToAddress(addrConnect)) {
3028
1
            return false;
3029
1
        }
3030
584
    } else if (AlreadyConnectedToHost(pszDest)) {
3031
0
        return false;
3032
0
    }
3033
3034
608
    CNode* pnode = ConnectNode(addrConnect, pszDest, fCountFailure, conn_type, use_v2transport, proxy_override);
3035
3036
608
    if (!pnode)
3037
22
        return false;
3038
586
    pnode->grantOutbound = std::move(grant_outbound);
3039
3040
586
    m_msgproc->InitializeNode(*pnode, m_local_services);
3041
586
    {
3042
586
        LOCK(m_nodes_mutex);
3043
586
        m_nodes.push_back(pnode);
3044
3045
        // update connection count by network
3046
586
        if (pnode->IsManualOrFullOutboundConn()) ++m_network_conn_counts[pnode->addr.GetNetwork()];
3047
586
    }
3048
3049
586
    TRACEPOINT(net, outbound_connection,
3050
586
        pnode->GetId(),
3051
586
        pnode->m_addr_name.c_str(),
3052
586
        pnode->ConnectionTypeAsString().c_str(),
3053
586
        pnode->ConnectedThroughNetwork(),
3054
586
        GetNodeCount(ConnectionDirection::Out));
3055
3056
586
    return true;
3057
608
}
3058
3059
std::optional<Network> CConnman::PrivateBroadcast::PickNetwork(std::optional<Proxy>& proxy) const
3060
13
{
3061
13
    prevector<4, Network> nets;
3062
13
    std::optional<Proxy> clearnet_proxy;
3063
13
    proxy.reset();
3064
13
    if (g_reachable_nets.Contains(NET_ONION)) {
3065
13
        nets.push_back(NET_ONION);
3066
3067
13
        clearnet_proxy = ProxyForIPv4or6();
3068
13
        if (clearnet_proxy.has_value()) {
3069
11
            if (g_reachable_nets.Contains(NET_IPV4)) {
3070
11
                nets.push_back(NET_IPV4);
3071
11
            }
3072
11
            if (g_reachable_nets.Contains(NET_IPV6)) {
3073
11
                nets.push_back(NET_IPV6);
3074
11
            }
3075
11
        }
3076
13
    }
3077
13
    if (g_reachable_nets.Contains(NET_I2P)) {
3078
13
        nets.push_back(NET_I2P);
3079
13
    }
3080
3081
13
    if (nets.empty()) {
3082
0
        return std::nullopt;
3083
0
    }
3084
3085
13
    const Network net{nets[FastRandomContext{}.randrange(nets.size())]};
3086
13
    if (net == NET_IPV4 || net == NET_IPV6) {
3087
3
        proxy = clearnet_proxy;
3088
3
    }
3089
13
    return net;
3090
13
}
3091
3092
size_t CConnman::PrivateBroadcast::NumToOpen() const
3093
3
{
3094
3
    return m_num_to_open;
3095
3
}
3096
3097
void CConnman::PrivateBroadcast::NumToOpenAdd(size_t n)
3098
2.26k
{
3099
2.26k
    m_num_to_open += n;
3100
2.26k
    m_num_to_open.notify_all();
3101
2.26k
}
3102
3103
size_t CConnman::PrivateBroadcast::NumToOpenSub(size_t n)
3104
12
{
3105
12
    size_t current_value{m_num_to_open.load()};
3106
12
    size_t new_value;
3107
12
    do {
3108
12
        new_value = current_value > n ? current_value - n : 0;
3109
12
    } while (!m_num_to_open.compare_exchange_strong(current_value, new_value));
3110
12
    return new_value;
3111
12
}
3112
3113
void CConnman::PrivateBroadcast::NumToOpenWait() const
3114
15
{
3115
15
    m_num_to_open.wait(0);
3116
15
}
3117
3118
std::optional<Proxy> CConnman::PrivateBroadcast::ProxyForIPv4or6() const
3119
13
{
3120
13
    if (m_outbound_tor_ok_at_least_once.load()) {
3121
11
        if (const auto tor_proxy = GetProxy(NET_ONION)) {
3122
11
            return tor_proxy;
3123
11
        }
3124
11
    }
3125
2
    return std::nullopt;
3126
13
}
3127
3128
Mutex NetEventsInterface::g_msgproc_mutex;
3129
3130
void CConnman::ThreadMessageHandler()
3131
984
{
3132
984
    LOCK(NetEventsInterface::g_msgproc_mutex);
3133
3134
244k
    while (!flagInterruptMsgProc)
3135
243k
    {
3136
243k
        bool fMoreWork = false;
3137
3138
243k
        {
3139
            // Randomize the order in which we process messages from/to our peers.
3140
            // This prevents attacks in which an attacker exploits having multiple
3141
            // consecutive connections in the m_nodes list.
3142
243k
            const NodesSnapshot snap{*this, /*shuffle=*/true};
3143
3144
378k
            for (CNode* pnode : snap.Nodes()) {
3145
378k
                if (pnode->fDisconnect)
3146
46
                    continue;
3147
3148
                // Receive messages
3149
378k
                bool fMoreNodeWork{m_msgproc->ProcessMessages(*pnode, flagInterruptMsgProc)};
3150
378k
                fMoreWork |= (fMoreNodeWork && !pnode->fPauseSend);
3151
378k
                if (flagInterruptMsgProc)
3152
7
                    return;
3153
                // Send messages
3154
378k
                m_msgproc->SendMessages(*pnode);
3155
3156
378k
                if (flagInterruptMsgProc)
3157
1
                    return;
3158
378k
            }
3159
243k
        }
3160
3161
243k
        WAIT_LOCK(mutexMsgProc, lock);
3162
243k
        if (!fMoreWork) {
3163
324k
            condMsgProc.wait_until(lock, std::chrono::steady_clock::now() + std::chrono::milliseconds(100), [this]() EXCLUSIVE_LOCKS_REQUIRED(mutexMsgProc) { return fMsgProcWake; });
3164
167k
        }
3165
243k
        fMsgProcWake = false;
3166
243k
    }
3167
984
}
3168
3169
void CConnman::ThreadI2PAcceptIncoming()
3170
4
{
3171
4
    static constexpr auto err_wait_begin = 1s;
3172
4
    static constexpr auto err_wait_cap = 5min;
3173
4
    auto err_wait = err_wait_begin;
3174
3175
4
    bool advertising_listen_addr = false;
3176
4
    i2p::Connection conn;
3177
3178
8
    auto SleepOnFailure = [&]() {
3179
8
        m_interrupt_net->sleep_for(err_wait);
3180
8
        if (err_wait < err_wait_cap) {
3181
8
            err_wait += 1s;
3182
8
        }
3183
8
    };
3184
3185
12
    while (!m_interrupt_net->interrupted()) {
3186
3187
8
        if (!m_i2p_sam_session->Listen(conn)) {
3188
8
            if (advertising_listen_addr && conn.me.IsValid()) {
3189
0
                RemoveLocal(conn.me);
3190
0
                advertising_listen_addr = false;
3191
0
            }
3192
8
            SleepOnFailure();
3193
8
            continue;
3194
8
        }
3195
3196
0
        if (!advertising_listen_addr) {
3197
0
            AddLocal(conn.me, LOCAL_MANUAL);
3198
0
            advertising_listen_addr = true;
3199
0
        }
3200
3201
0
        if (!m_i2p_sam_session->Accept(conn)) {
3202
0
            SleepOnFailure();
3203
0
            continue;
3204
0
        }
3205
3206
0
        CreateNodeFromAcceptedSocket(std::move(conn.sock), NetPermissionFlags::None, conn.me, conn.peer);
3207
3208
0
        err_wait = err_wait_begin;
3209
0
    }
3210
4
}
3211
3212
void CConnman::ThreadPrivateBroadcast()
3213
3
{
3214
3
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
3215
3216
3
    size_t addrman_num_bad_addresses{0};
3217
16
    while (!m_interrupt_net->interrupted()) {
3218
3219
15
        if (!fNetworkActive) {
3220
0
            m_interrupt_net->sleep_for(5s);
3221
0
            continue;
3222
0
        }
3223
3224
15
        CountingSemaphoreGrant<> conn_max_grant{m_private_broadcast.m_sem_conn_max}; // Would block if too many are opened.
3225
3226
15
        m_private_broadcast.NumToOpenWait();
3227
3228
15
        if (m_interrupt_net->interrupted()) {
3229
2
            break;
3230
2
        }
3231
3232
13
        std::optional<Proxy> proxy;
3233
13
        const std::optional<Network> net{m_private_broadcast.PickNetwork(proxy)};
3234
13
        if (!net.has_value()) {
3235
0
            LogWarning("Unable to open -privatebroadcast connections: neither Tor nor I2P is reachable");
3236
0
            m_interrupt_net->sleep_for(5s);
3237
0
            continue;
3238
0
        }
3239
3240
13
        const auto [addr, _] = addrman.get().Select(/*new_only=*/false, {net.value()});
3241
3242
13
        if (!addr.IsValid() || IsLocal(addr)) {
3243
0
            ++addrman_num_bad_addresses;
3244
0
            if (addrman_num_bad_addresses > 100) {
3245
0
                LogDebug(BCLog::PRIVBROADCAST, "Connections needed but addrman keeps returning bad addresses, will retry");
3246
0
                m_interrupt_net->sleep_for(500ms);
3247
0
            }
3248
0
            continue;
3249
0
        }
3250
13
        addrman_num_bad_addresses = 0;
3251
3252
13
        auto target_str{addr.ToStringAddrPort()};
3253
13
        if (proxy.has_value()) {
3254
3
            target_str += " through the proxy at " + proxy->ToString();
3255
3
        }
3256
3257
13
        const bool use_v2transport(addr.nServices & GetLocalServices() & NODE_P2P_V2);
3258
3259
13
        if (OpenNetworkConnection(addr,
3260
13
                                  /*fCountFailure=*/true,
3261
13
                                  std::move(conn_max_grant),
3262
13
                                  /*pszDest=*/nullptr,
3263
13
                                  ConnectionType::PRIVATE_BROADCAST,
3264
13
                                  use_v2transport,
3265
13
                                  proxy)) {
3266
10
            const size_t remaining{m_private_broadcast.NumToOpenSub(1)};
3267
10
            LogDebug(BCLog::PRIVBROADCAST, "Socket connected to %s; remaining connections to open: %d", target_str, remaining);
3268
10
        } else {
3269
3
            const size_t remaining{m_private_broadcast.NumToOpen()};
3270
3
            if (remaining == 0) {
3271
0
                LogDebug(BCLog::PRIVBROADCAST, "Failed to connect to %s, will not retry, no more connections needed", target_str);
3272
3
            } else {
3273
3
                LogDebug(BCLog::PRIVBROADCAST, "Failed to connect to %s, will retry to a different address; remaining connections to open: %d", target_str, remaining);
3274
3
                m_interrupt_net->sleep_for(100ms); // Prevent busy loop if OpenNetworkConnection() fails fast repeatedly.
3275
3
            }
3276
3
        }
3277
13
    }
3278
3
}
3279
3280
bool CConnman::BindListenPort(const CService& addrBind, bilingual_str& strError, NetPermissionFlags permissions)
3281
984
{
3282
984
    int nOne = 1;
3283
3284
    // Create socket for listening for incoming connections
3285
984
    struct sockaddr_storage sockaddr;
3286
984
    socklen_t len = sizeof(sockaddr);
3287
984
    if (!addrBind.GetSockAddr((struct sockaddr*)&sockaddr, &len))
3288
0
    {
3289
0
        strError = Untranslated(strprintf("Bind address family for %s not supported", addrBind.ToStringAddrPort()));
3290
0
        LogError("%s\n", strError.original);
3291
0
        return false;
3292
0
    }
3293
3294
984
    std::unique_ptr<Sock> sock = CreateSock(addrBind.GetSAFamily(), SOCK_STREAM, IPPROTO_TCP);
3295
984
    if (!sock) {
3296
0
        strError = Untranslated(strprintf("Couldn't open socket for incoming connections (socket returned error %s)", NetworkErrorString(WSAGetLastError())));
3297
0
        LogError("%s\n", strError.original);
3298
0
        return false;
3299
0
    }
3300
3301
    // Allow binding if the port is still in TIME_WAIT state after
3302
    // the program was closed and restarted.
3303
984
    if (sock->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &nOne, sizeof(int)) == SOCKET_ERROR) {
3304
0
        strError = Untranslated(strprintf("Error setting SO_REUSEADDR on socket: %s, continuing anyway", NetworkErrorString(WSAGetLastError())));
3305
0
        LogInfo("%s\n", strError.original);
3306
0
    }
3307
3308
    // some systems don't have IPV6_V6ONLY but are always v6only; others do have the option
3309
    // and enable it by default or not. Try to enable it, if possible.
3310
984
    if (addrBind.IsIPv6()) {
3311
2
#ifdef IPV6_V6ONLY
3312
2
        if (sock->SetSockOpt(IPPROTO_IPV6, IPV6_V6ONLY, &nOne, sizeof(int)) == SOCKET_ERROR) {
3313
0
            strError = Untranslated(strprintf("Error setting IPV6_V6ONLY on socket: %s, continuing anyway", NetworkErrorString(WSAGetLastError())));
3314
0
            LogInfo("%s\n", strError.original);
3315
0
        }
3316
2
#endif
3317
#ifdef WIN32
3318
        int nProtLevel = PROTECTION_LEVEL_UNRESTRICTED;
3319
        if (sock->SetSockOpt(IPPROTO_IPV6, IPV6_PROTECTION_LEVEL, &nProtLevel, sizeof(int)) == SOCKET_ERROR) {
3320
            strError = Untranslated(strprintf("Error setting IPV6_PROTECTION_LEVEL on socket: %s, continuing anyway", NetworkErrorString(WSAGetLastError())));
3321
            LogInfo("%s\n", strError.original);
3322
        }
3323
#endif
3324
2
    }
3325
3326
984
    if (sock->Bind(reinterpret_cast<struct sockaddr*>(&sockaddr), len) == SOCKET_ERROR) {
3327
0
        int nErr = WSAGetLastError();
3328
0
        if (nErr == WSAEADDRINUSE)
3329
0
            strError = strprintf(_("Unable to bind to %s on this computer. %s is probably already running."), addrBind.ToStringAddrPort(), CLIENT_NAME);
3330
0
        else
3331
0
            strError = strprintf(_("Unable to bind to %s on this computer (bind returned error %s)"), addrBind.ToStringAddrPort(), NetworkErrorString(nErr));
3332
0
        LogError("%s\n", strError.original);
3333
0
        return false;
3334
0
    }
3335
984
    LogInfo("Bound to %s\n", addrBind.ToStringAddrPort());
3336
3337
    // Listen for incoming connections
3338
984
    if (sock->Listen(SOMAXCONN) == SOCKET_ERROR)
3339
0
    {
3340
0
        strError = strprintf(_("Listening for incoming connections failed (listen returned error %s)"), NetworkErrorString(WSAGetLastError()));
3341
0
        LogError("%s\n", strError.original);
3342
0
        return false;
3343
0
    }
3344
3345
984
    vhListenSocket.emplace_back(std::move(sock), permissions);
3346
984
    return true;
3347
984
}
3348
3349
void Discover()
3350
32
{
3351
32
    if (!fDiscover)
3352
29
        return;
3353
3354
9
    for (const CNetAddr &addr: GetLocalAddresses()) {
3355
9
        if (AddLocal(addr, LOCAL_IF) && fLogIPs) {
3356
0
            LogInfo("%s: %s\n", __func__, addr.ToStringAddr());
3357
0
        }
3358
9
    }
3359
3
}
3360
3361
void CConnman::SetNetworkActive(bool active)
3362
1.21k
{
3363
1.21k
    LogInfo("%s: %s\n", __func__, active);
3364
3365
1.21k
    if (fNetworkActive == active) {
3366
1.20k
        return;
3367
1.20k
    }
3368
3369
14
    fNetworkActive = active;
3370
3371
14
    if (m_client_interface) {
3372
9
        m_client_interface->NotifyNetworkActiveChanged(fNetworkActive);
3373
9
    }
3374
14
}
3375
3376
CConnman::CConnman(uint64_t nSeed0In,
3377
                   uint64_t nSeed1In,
3378
                   AddrMan& addrman_in,
3379
                   const NetGroupManager& netgroupman,
3380
                   const CChainParams& params,
3381
                   bool network_active,
3382
                   std::shared_ptr<CThreadInterrupt> interrupt_net)
3383
1.20k
    : addrman(addrman_in)
3384
1.20k
    , m_netgroupman{netgroupman}
3385
1.20k
    , nSeed0(nSeed0In)
3386
1.20k
    , nSeed1(nSeed1In)
3387
1.20k
    , m_interrupt_net{interrupt_net}
3388
1.20k
    , m_params(params)
3389
1.20k
{
3390
1.20k
    SetTryNewOutboundPeer(false);
3391
3392
1.20k
    Options connOptions;
3393
1.20k
    Init(connOptions);
3394
1.20k
    SetNetworkActive(network_active);
3395
1.20k
}
3396
3397
NodeId CConnman::GetNewNodeId()
3398
1.59k
{
3399
1.59k
    return nLastNodeId.fetch_add(1, std::memory_order_relaxed);
3400
1.59k
}
3401
3402
uint16_t CConnman::GetDefaultPort(Network net) const
3403
2
{
3404
2
    return net == NET_I2P ? I2P_SAM31_PORT : m_params.GetDefaultPort();
3405
2
}
3406
3407
uint16_t CConnman::GetDefaultPort(const std::string& addr) const
3408
658
{
3409
658
    CNetAddr a;
3410
658
    return a.SetSpecial(addr) ? GetDefaultPort(a.GetNetwork()) : m_params.GetDefaultPort();
3411
658
}
3412
3413
bool CConnman::Bind(const CService& addr_, unsigned int flags, NetPermissionFlags permissions)
3414
984
{
3415
984
    const CService addr{MaybeFlipIPv6toCJDNS(addr_)};
3416
3417
984
    bilingual_str strError;
3418
984
    if (!BindListenPort(addr, strError, permissions)) {
3419
0
        if ((flags & BF_REPORT_ERROR) && m_client_interface) {
3420
0
            m_client_interface->ThreadSafeMessageBox(strError, CClientUIInterface::MSG_ERROR);
3421
0
        }
3422
0
        return false;
3423
0
    }
3424
3425
984
    if (addr.IsRoutable() && fDiscover && !(flags & BF_DONT_ADVERTISE) && !NetPermissions::HasFlag(permissions, NetPermissionFlags::NoBan)) {
3426
0
        AddLocal(addr, LOCAL_BIND);
3427
0
    }
3428
3429
984
    return true;
3430
984
}
3431
3432
bool CConnman::InitBinds(const Options& options)
3433
966
{
3434
966
    for (const auto& addrBind : options.vBinds) {
3435
961
        if (!Bind(addrBind, BF_REPORT_ERROR, NetPermissionFlags::None)) {
3436
0
            return false;
3437
0
        }
3438
961
    }
3439
966
    for (const auto& addrBind : options.vWhiteBinds) {
3440
1
        if (!Bind(addrBind.m_service, BF_REPORT_ERROR, addrBind.m_flags)) {
3441
0
            return false;
3442
0
        }
3443
1
    }
3444
966
    for (const auto& addr_bind : options.onion_binds) {
3445
18
        if (!Bind(addr_bind, BF_REPORT_ERROR | BF_DONT_ADVERTISE, NetPermissionFlags::None)) {
3446
0
            return false;
3447
0
        }
3448
18
    }
3449
966
    if (options.bind_on_any) {
3450
        // Don't consider errors to bind on IPv6 "::" fatal because the host OS
3451
        // may not have IPv6 support and the user did not explicitly ask us to
3452
        // bind on that.
3453
2
        const CService ipv6_any{in6_addr(COMPAT_IN6ADDR_ANY_INIT), GetListenPort()}; // ::
3454
2
        Bind(ipv6_any, BF_NONE, NetPermissionFlags::None);
3455
3456
2
        struct in_addr inaddr_any;
3457
2
        inaddr_any.s_addr = htonl(INADDR_ANY);
3458
2
        const CService ipv4_any{inaddr_any, GetListenPort()}; // 0.0.0.0
3459
2
        if (!Bind(ipv4_any, BF_REPORT_ERROR, NetPermissionFlags::None)) {
3460
0
            return false;
3461
0
        }
3462
2
    }
3463
966
    return true;
3464
966
}
3465
3466
bool CConnman::Start(CScheduler& scheduler, const Options& connOptions)
3467
984
{
3468
984
    AssertLockNotHeld(m_total_bytes_sent_mutex);
3469
984
    Init(connOptions);
3470
3471
984
    if (fListen && !InitBinds(connOptions)) {
3472
0
        if (m_client_interface) {
3473
0
            m_client_interface->ThreadSafeMessageBox(
3474
0
                _("Failed to listen on any port. Use -listen=0 if you want this."),
3475
0
                CClientUIInterface::MSG_ERROR);
3476
0
        }
3477
0
        return false;
3478
0
    }
3479
3480
984
    if (connOptions.m_i2p_accept_incoming) {
3481
965
        if (const auto i2p_sam = GetProxy(NET_I2P)) {
3482
4
            m_i2p_sam_session = std::make_unique<i2p::sam::Session>(gArgs.GetDataDirNet() / "i2p_private_key",
3483
4
                                                                    *i2p_sam, m_interrupt_net);
3484
4
        }
3485
965
    }
3486
3487
    // Randomize the order in which we may query seednode to potentially prevent connecting to the same one every restart (and signal that we have restarted)
3488
984
    std::vector<std::string> seed_nodes = connOptions.vSeedNodes;
3489
984
    if (!seed_nodes.empty()) {
3490
5
        std::shuffle(seed_nodes.begin(), seed_nodes.end(), FastRandomContext{});
3491
5
    }
3492
3493
984
    if (m_use_addrman_outgoing) {
3494
        // Load addresses from anchors.dat
3495
31
        m_anchors = ReadAnchors(gArgs.GetDataDirNet() / ANCHORS_DATABASE_FILENAME);
3496
31
        if (m_anchors.size() > MAX_BLOCK_RELAY_ONLY_ANCHORS) {
3497
0
            m_anchors.resize(MAX_BLOCK_RELAY_ONLY_ANCHORS);
3498
0
        }
3499
31
        LogInfo("%i block-relay-only anchors will be tried for connections.\n", m_anchors.size());
3500
31
    }
3501
3502
984
    if (m_client_interface) {
3503
984
        m_client_interface->InitMessage(_("Starting network threads…"));
3504
984
    }
3505
3506
984
    fAddressesInitialized = true;
3507
3508
984
    if (semOutbound == nullptr) {
3509
        // initialize semaphore
3510
984
        semOutbound = std::make_unique<std::counting_semaphore<>>(std::min(m_max_automatic_outbound, m_max_automatic_connections));
3511
984
    }
3512
984
    if (semAddnode == nullptr) {
3513
        // initialize semaphore
3514
984
        semAddnode = std::make_unique<std::counting_semaphore<>>(m_max_addnode);
3515
984
    }
3516
3517
    //
3518
    // Start threads
3519
    //
3520
984
    assert(m_msgproc);
3521
984
    m_interrupt_net->reset();
3522
984
    flagInterruptMsgProc = false;
3523
3524
984
    {
3525
984
        LOCK(mutexMsgProc);
3526
984
        fMsgProcWake = false;
3527
984
    }
3528
3529
    // Send and receive from sockets, accept connections
3530
984
    threadSocketHandler = std::thread(&util::TraceThread, "net", [this] { ThreadSocketHandler(); });
3531
3532
984
    if (!gArgs.GetBoolArg("-dnsseed", DEFAULT_DNSSEED))
3533
984
        LogInfo("DNS seeding disabled\n");
3534
14
    else
3535
14
        threadDNSAddressSeed = std::thread(&util::TraceThread, "dnsseed", [this] { ThreadDNSAddressSeed(); });
3536
3537
    // Initiate manual connections
3538
984
    threadOpenAddedConnections = std::thread(&util::TraceThread, "addcon", [this] { ThreadOpenAddedConnections(); });
3539
3540
984
    if (connOptions.m_use_addrman_outgoing && !connOptions.m_specified_outgoing.empty()) {
3541
0
        if (m_client_interface) {
3542
0
            m_client_interface->ThreadSafeMessageBox(
3543
0
                _("Cannot provide specific connections and have addrman find outgoing connections at the same time."),
3544
0
                CClientUIInterface::MSG_ERROR);
3545
0
        }
3546
0
        return false;
3547
0
    }
3548
984
    if (connOptions.m_use_addrman_outgoing || !connOptions.m_specified_outgoing.empty()) {
3549
36
        threadOpenConnections = std::thread(
3550
36
            &util::TraceThread, "opencon",
3551
36
            [this, connect = connOptions.m_specified_outgoing, seed_nodes = std::move(seed_nodes)] { ThreadOpenConnections(connect, seed_nodes); });
3552
36
    }
3553
3554
    // Process messages
3555
984
    threadMessageHandler = std::thread(&util::TraceThread, "msghand", [this] { ThreadMessageHandler(); });
3556
3557
984
    if (m_i2p_sam_session) {
3558
4
        threadI2PAcceptIncoming =
3559
4
            std::thread(&util::TraceThread, "i2paccept", [this] { ThreadI2PAcceptIncoming(); });
3560
4
    }
3561
3562
984
    if (gArgs.GetBoolArg("-privatebroadcast", DEFAULT_PRIVATE_BROADCAST)) {
3563
3
        threadPrivateBroadcast =
3564
3
            std::thread(&util::TraceThread, "privbcast", [this] { ThreadPrivateBroadcast(); });
3565
3
    }
3566
3567
    // Dump network addresses
3568
984
    scheduler.scheduleEvery([this] { DumpAddresses(); }, DUMP_PEERS_INTERVAL);
3569
3570
    // Run the ASMap Health check once and then schedule it to run every 24h.
3571
984
    if (m_netgroupman.UsingASMap()) {
3572
7
        ASMapHealthCheck();
3573
7
        scheduler.scheduleEvery([this] { ASMapHealthCheck(); }, ASMAP_HEALTH_CHECK_INTERVAL);
3574
7
    }
3575
3576
984
    return true;
3577
984
}
3578
3579
class CNetCleanup
3580
{
3581
public:
3582
    CNetCleanup() = default;
3583
3584
    ~CNetCleanup()
3585
0
    {
3586
#ifdef WIN32
3587
        // Shutdown Windows Sockets
3588
        WSACleanup();
3589
#endif
3590
0
    }
3591
};
3592
static CNetCleanup instance_of_cnetcleanup;
3593
3594
void CConnman::Interrupt()
3595
2.25k
{
3596
2.25k
    {
3597
2.25k
        LOCK(mutexMsgProc);
3598
2.25k
        flagInterruptMsgProc = true;
3599
2.25k
    }
3600
2.25k
    condMsgProc.notify_all();
3601
3602
2.25k
    (*m_interrupt_net)();
3603
2.25k
    g_socks5_interrupt();
3604
3605
2.25k
    if (semOutbound) {
3606
11.7k
        for (int i=0; i<m_max_automatic_outbound; i++) {
3607
10.8k
            semOutbound->release();
3608
10.8k
        }
3609
984
    }
3610
3611
2.25k
    if (semAddnode) {
3612
8.85k
        for (int i=0; i<m_max_addnode; i++) {
3613
7.87k
            semAddnode->release();
3614
7.87k
        }
3615
984
    }
3616
3617
2.25k
    m_private_broadcast.m_sem_conn_max.release();
3618
2.25k
    m_private_broadcast.NumToOpenAdd(1); // Just unblock NumToOpenWait() to be able to continue with shutdown.
3619
2.25k
}
3620
3621
void CConnman::StopThreads()
3622
2.25k
{
3623
2.25k
    if (threadPrivateBroadcast.joinable()) {
3624
3
        threadPrivateBroadcast.join();
3625
3
    }
3626
2.25k
    if (threadI2PAcceptIncoming.joinable()) {
3627
4
        threadI2PAcceptIncoming.join();
3628
4
    }
3629
2.25k
    if (threadMessageHandler.joinable())
3630
984
        threadMessageHandler.join();
3631
2.25k
    if (threadOpenConnections.joinable())
3632
36
        threadOpenConnections.join();
3633
2.25k
    if (threadOpenAddedConnections.joinable())
3634
984
        threadOpenAddedConnections.join();
3635
2.25k
    if (threadDNSAddressSeed.joinable())
3636
14
        threadDNSAddressSeed.join();
3637
2.25k
    if (threadSocketHandler.joinable())
3638
984
        threadSocketHandler.join();
3639
2.25k
}
3640
3641
void CConnman::StopNodes()
3642
2.25k
{
3643
2.25k
    AssertLockNotHeld(m_reconnections_mutex);
3644
3645
2.25k
    if (fAddressesInitialized) {
3646
984
        DumpAddresses();
3647
984
        fAddressesInitialized = false;
3648
3649
984
        if (m_use_addrman_outgoing) {
3650
            // Anchor connections are only dumped during clean shutdown.
3651
31
            std::vector<CAddress> anchors_to_dump = GetCurrentBlockRelayOnlyConns();
3652
31
            if (anchors_to_dump.size() > MAX_BLOCK_RELAY_ONLY_ANCHORS) {
3653
0
                anchors_to_dump.resize(MAX_BLOCK_RELAY_ONLY_ANCHORS);
3654
0
            }
3655
31
            DumpAnchors(gArgs.GetDataDirNet() / ANCHORS_DATABASE_FILENAME, anchors_to_dump);
3656
31
        }
3657
984
    }
3658
3659
    // Delete peer connections.
3660
2.25k
    std::vector<CNode*> nodes;
3661
2.25k
    WITH_LOCK(m_nodes_mutex, nodes.swap(m_nodes));
3662
2.25k
    for (CNode* pnode : nodes) {
3663
737
        LogDebug(BCLog::NET, "Stopping node, %s", pnode->DisconnectMsg());
3664
737
        pnode->CloseSocketDisconnect();
3665
737
        DeleteNode(pnode);
3666
737
    }
3667
3668
2.25k
    for (CNode* pnode : m_nodes_disconnected) {
3669
0
        DeleteNode(pnode);
3670
0
    }
3671
2.25k
    m_nodes_disconnected.clear();
3672
2.25k
    WITH_LOCK(m_reconnections_mutex, m_reconnections.clear());
3673
2.25k
    vhListenSocket.clear();
3674
2.25k
    semOutbound.reset();
3675
2.25k
    semAddnode.reset();
3676
2.25k
}
3677
3678
void CConnman::DeleteNode(CNode* pnode)
3679
1.59k
{
3680
1.59k
    assert(pnode);
3681
1.59k
    m_msgproc->FinalizeNode(*pnode);
3682
1.59k
    delete pnode;
3683
1.59k
}
3684
3685
CConnman::~CConnman()
3686
1.20k
{
3687
1.20k
    Interrupt();
3688
1.20k
    Stop();
3689
1.20k
}
3690
3691
std::vector<CAddress> CConnman::GetAddressesUnsafe(size_t max_addresses, size_t max_pct, std::optional<Network> network, const bool filtered) const
3692
466
{
3693
466
    std::vector<CAddress> addresses = addrman.get().GetAddr(max_addresses, max_pct, network, filtered);
3694
466
    if (m_banman) {
3695
466
        addresses.erase(std::remove_if(addresses.begin(), addresses.end(),
3696
34.3k
                        [this](const CAddress& addr){return m_banman->IsDiscouraged(addr) || m_banman->IsBanned(addr);}),
3697
466
                        addresses.end());
3698
466
    }
3699
466
    return addresses;
3700
466
}
3701
3702
std::vector<CAddress> CConnman::GetAddresses(CNode& requestor, size_t max_addresses, size_t max_pct)
3703
938
{
3704
938
    uint64_t network_id = requestor.m_network_key;
3705
938
    const auto current_time = GetTime<std::chrono::microseconds>();
3706
938
    auto r = m_addr_response_caches.emplace(network_id, CachedAddrResponse{});
3707
938
    CachedAddrResponse& cache_entry = r.first->second;
3708
938
    if (cache_entry.m_cache_entry_expiration < current_time) { // If emplace() added new one it has expiration 0.
3709
383
        cache_entry.m_addrs_response_cache = GetAddressesUnsafe(max_addresses, max_pct, /*network=*/std::nullopt);
3710
        // Choosing a proper cache lifetime is a trade-off between the privacy leak minimization
3711
        // and the usefulness of ADDR responses to honest users.
3712
        //
3713
        // Longer cache lifetime makes it more difficult for an attacker to scrape
3714
        // enough AddrMan data to maliciously infer something useful.
3715
        // By the time an attacker scraped enough AddrMan records, most of
3716
        // the records should be old enough to not leak topology info by
3717
        // e.g. analyzing real-time changes in timestamps.
3718
        //
3719
        // It takes only several hundred requests to scrape everything from an AddrMan containing 100,000 nodes,
3720
        // so ~24 hours of cache lifetime indeed makes the data less inferable by the time
3721
        // most of it could be scraped (considering that timestamps are updated via
3722
        // ADDR self-announcements and when nodes communicate).
3723
        // We also should be robust to those attacks which may not require scraping *full* victim's AddrMan
3724
        // (because even several timestamps of the same handful of nodes may leak privacy).
3725
        //
3726
        // On the other hand, longer cache lifetime makes ADDR responses
3727
        // outdated and less useful for an honest requestor, e.g. if most nodes
3728
        // in the ADDR response are no longer active.
3729
        //
3730
        // However, the churn in the network is known to be rather low. Since we consider
3731
        // nodes to be "terrible" (see IsTerrible()) if the timestamps are older than 30 days,
3732
        // max. 24 hours of "penalty" due to cache shouldn't make any meaningful difference
3733
        // in terms of the freshness of the response.
3734
383
        cache_entry.m_cache_entry_expiration = current_time +
3735
383
            21h + FastRandomContext().randrange<std::chrono::microseconds>(6h);
3736
383
    }
3737
938
    return cache_entry.m_addrs_response_cache;
3738
938
}
3739
3740
bool CConnman::AddNode(const AddedNodeParams& add)
3741
15
{
3742
15
    const CService resolved(LookupNumeric(add.m_added_node, GetDefaultPort(add.m_added_node)));
3743
15
    const bool resolved_is_valid{resolved.IsValid()};
3744
3745
15
    LOCK(m_added_nodes_mutex);
3746
18
    for (const auto& it : m_added_node_params) {
3747
18
        if (add.m_added_node == it.m_added_node || (resolved_is_valid && resolved == LookupNumeric(it.m_added_node, GetDefaultPort(it.m_added_node)))) return false;
3748
18
    }
3749
3750
9
    m_added_node_params.push_back(add);
3751
9
    return true;
3752
15
}
3753
3754
bool CConnman::RemoveAddedNode(std::string_view node)
3755
4
{
3756
4
    LOCK(m_added_nodes_mutex);
3757
6
    for (auto it = m_added_node_params.begin(); it != m_added_node_params.end(); ++it) {
3758
4
        if (node == it->m_added_node) {
3759
2
            m_added_node_params.erase(it);
3760
2
            return true;
3761
2
        }
3762
4
    }
3763
2
    return false;
3764
4
}
3765
3766
bool CConnman::AddedNodesContain(const CAddress& addr) const
3767
18
{
3768
18
    AssertLockNotHeld(m_added_nodes_mutex);
3769
18
    const std::string addr_str{addr.ToStringAddr()};
3770
18
    const std::string addr_port_str{addr.ToStringAddrPort()};
3771
18
    LOCK(m_added_nodes_mutex);
3772
18
    return (m_added_node_params.size() < 24 // bound the query to a reasonable limit
3773
18
            && std::any_of(m_added_node_params.cbegin(), m_added_node_params.cend(),
3774
20
                           [&](const auto& p) { return p.m_added_node == addr_str || p.m_added_node == addr_port_str; }));
3775
18
}
3776
3777
size_t CConnman::GetNodeCount(ConnectionDirection flags) const
3778
2.72k
{
3779
2.72k
    LOCK(m_nodes_mutex);
3780
2.72k
    if (flags == ConnectionDirection::Both) // Shortcut if we want total
3781
913
        return m_nodes.size();
3782
3783
1.81k
    int nNum = 0;
3784
1.81k
    for (const auto& pnode : m_nodes) {
3785
1.01k
        if (flags & (pnode->IsInboundConn() ? ConnectionDirection::In : ConnectionDirection::Out)) {
3786
505
            nNum++;
3787
505
        }
3788
1.01k
    }
3789
3790
1.81k
    return nNum;
3791
2.72k
}
3792
3793
3794
std::map<CNetAddr, LocalServiceInfo> CConnman::getNetLocalAddresses() const
3795
0
{
3796
0
    LOCK(g_maplocalhost_mutex);
3797
0
    return mapLocalHost;
3798
0
}
3799
3800
uint32_t CConnman::GetMappedAS(const CNetAddr& addr) const
3801
17.1k
{
3802
17.1k
    return m_netgroupman.GetMappedAS(addr);
3803
17.1k
}
3804
3805
void CConnman::GetNodeStats(std::vector<CNodeStats>& vstats) const
3806
6.98k
{
3807
6.98k
    vstats.clear();
3808
6.98k
    LOCK(m_nodes_mutex);
3809
6.98k
    vstats.reserve(m_nodes.size());
3810
14.1k
    for (CNode* pnode : m_nodes) {
3811
14.1k
        vstats.emplace_back();
3812
14.1k
        pnode->CopyStats(vstats.back());
3813
14.1k
        vstats.back().m_mapped_as = GetMappedAS(pnode->addr);
3814
14.1k
    }
3815
6.98k
}
3816
3817
bool CConnman::DisconnectNode(std::string_view strNode)
3818
4
{
3819
4
    LOCK(m_nodes_mutex);
3820
6
    auto it = std::ranges::find_if(m_nodes, [&strNode](CNode* node) { return node->m_addr_name == strNode; });
3821
4
    if (it != m_nodes.end()) {
3822
2
        CNode* node{*it};
3823
2
        LogDebug(BCLog::NET, "disconnect by address%s match, %s", (fLogIPs ? strprintf("=%s", strNode) : ""), node->DisconnectMsg());
3824
2
        node->fDisconnect = true;
3825
2
        return true;
3826
2
    }
3827
2
    return false;
3828
4
}
3829
3830
bool CConnman::DisconnectNode(const CSubNet& subnet)
3831
33
{
3832
33
    bool disconnected = false;
3833
33
    LOCK(m_nodes_mutex);
3834
33
    for (CNode* pnode : m_nodes) {
3835
16
        if (subnet.Match(pnode->addr)) {
3836
11
            LogDebug(BCLog::NET, "disconnect by subnet%s match, %s", (fLogIPs ? strprintf("=%s", subnet.ToString()) : ""), pnode->DisconnectMsg());
3837
11
            pnode->fDisconnect = true;
3838
11
            disconnected = true;
3839
11
        }
3840
16
    }
3841
33
    return disconnected;
3842
33
}
3843
3844
bool CConnman::DisconnectNode(const CNetAddr& addr)
3845
20
{
3846
20
    return DisconnectNode(CSubNet(addr));
3847
20
}
3848
3849
bool CConnman::DisconnectNode(NodeId id)
3850
94
{
3851
94
    LOCK(m_nodes_mutex);
3852
155
    for(CNode* pnode : m_nodes) {
3853
155
        if (id == pnode->GetId()) {
3854
94
            LogDebug(BCLog::NET, "disconnect by id, %s", pnode->DisconnectMsg());
3855
94
            pnode->fDisconnect = true;
3856
94
            return true;
3857
94
        }
3858
155
    }
3859
0
    return false;
3860
94
}
3861
3862
void CConnman::RecordBytesRecv(uint64_t bytes)
3863
158k
{
3864
158k
    nTotalBytesRecv += bytes;
3865
158k
}
3866
3867
void CConnman::RecordBytesSent(uint64_t bytes)
3868
169k
{
3869
169k
    AssertLockNotHeld(m_total_bytes_sent_mutex);
3870
169k
    LOCK(m_total_bytes_sent_mutex);
3871
3872
169k
    nTotalBytesSent += bytes;
3873
3874
169k
    const auto now = GetTime<std::chrono::seconds>();
3875
169k
    if (nMaxOutboundCycleStartTime + MAX_UPLOAD_TIMEFRAME < now)
3876
534
    {
3877
        // timeframe expired, reset cycle
3878
534
        nMaxOutboundCycleStartTime = now;
3879
534
        nMaxOutboundTotalBytesSentInCycle = 0;
3880
534
    }
3881
3882
169k
    nMaxOutboundTotalBytesSentInCycle += bytes;
3883
169k
}
3884
3885
uint64_t CConnman::GetMaxOutboundTarget() const
3886
18
{
3887
18
    AssertLockNotHeld(m_total_bytes_sent_mutex);
3888
18
    LOCK(m_total_bytes_sent_mutex);
3889
18
    return nMaxOutboundLimit;
3890
18
}
3891
3892
std::chrono::seconds CConnman::GetMaxOutboundTimeframe() const
3893
18
{
3894
18
    return MAX_UPLOAD_TIMEFRAME;
3895
18
}
3896
3897
std::chrono::seconds CConnman::GetMaxOutboundTimeLeftInCycle() const
3898
18
{
3899
18
    AssertLockNotHeld(m_total_bytes_sent_mutex);
3900
18
    LOCK(m_total_bytes_sent_mutex);
3901
18
    return GetMaxOutboundTimeLeftInCycle_();
3902
18
}
3903
3904
std::chrono::seconds CConnman::GetMaxOutboundTimeLeftInCycle_() const
3905
1.12k
{
3906
1.12k
    AssertLockHeld(m_total_bytes_sent_mutex);
3907
3908
1.12k
    if (nMaxOutboundLimit == 0)
3909
12
        return 0s;
3910
3911
1.11k
    if (nMaxOutboundCycleStartTime.count() == 0)
3912
4
        return MAX_UPLOAD_TIMEFRAME;
3913
3914
1.11k
    const std::chrono::seconds cycleEndTime = nMaxOutboundCycleStartTime + MAX_UPLOAD_TIMEFRAME;
3915
1.11k
    const auto now = GetTime<std::chrono::seconds>();
3916
1.11k
    return (cycleEndTime < now) ? 0s : cycleEndTime - now;
3917
1.11k
}
3918
3919
bool CConnman::OutboundTargetReached(bool historicalBlockServingLimit) const
3920
36.7k
{
3921
36.7k
    AssertLockNotHeld(m_total_bytes_sent_mutex);
3922
36.7k
    LOCK(m_total_bytes_sent_mutex);
3923
36.7k
    if (nMaxOutboundLimit == 0)
3924
35.6k
        return false;
3925
3926
1.11k
    if (historicalBlockServingLimit)
3927
1.10k
    {
3928
        // keep a large enough buffer to at least relay each block once
3929
1.10k
        const std::chrono::seconds timeLeftInCycle = GetMaxOutboundTimeLeftInCycle_();
3930
1.10k
        const uint64_t buffer = timeLeftInCycle / std::chrono::minutes{10} * MAX_BLOCK_SERIALIZED_SIZE;
3931
1.10k
        if (buffer >= nMaxOutboundLimit || nMaxOutboundTotalBytesSentInCycle >= nMaxOutboundLimit - buffer)
3932
827
            return true;
3933
1.10k
    }
3934
8
    else if (nMaxOutboundTotalBytesSentInCycle >= nMaxOutboundLimit)
3935
3
        return true;
3936
3937
286
    return false;
3938
1.11k
}
3939
3940
uint64_t CConnman::GetOutboundTargetBytesLeft() const
3941
18
{
3942
18
    AssertLockNotHeld(m_total_bytes_sent_mutex);
3943
18
    LOCK(m_total_bytes_sent_mutex);
3944
18
    if (nMaxOutboundLimit == 0)
3945
12
        return 0;
3946
3947
6
    return (nMaxOutboundTotalBytesSentInCycle >= nMaxOutboundLimit) ? 0 : nMaxOutboundLimit - nMaxOutboundTotalBytesSentInCycle;
3948
18
}
3949
3950
uint64_t CConnman::GetTotalBytesRecv() const
3951
18
{
3952
18
    return nTotalBytesRecv;
3953
18
}
3954
3955
uint64_t CConnman::GetTotalBytesSent() const
3956
18
{
3957
18
    AssertLockNotHeld(m_total_bytes_sent_mutex);
3958
18
    LOCK(m_total_bytes_sent_mutex);
3959
18
    return nTotalBytesSent;
3960
18
}
3961
3962
ServiceFlags CConnman::GetLocalServices() const
3963
4.75k
{
3964
4.75k
    return m_local_services;
3965
4.75k
}
3966
3967
static std::unique_ptr<Transport> MakeTransport(NodeId id, bool use_v2transport, bool inbound) noexcept
3968
1.63k
{
3969
1.63k
    if (use_v2transport) {
3970
177
        return std::make_unique<V2Transport>(id, /*initiating=*/!inbound);
3971
1.45k
    } else {
3972
1.45k
        return std::make_unique<V1Transport>(id);
3973
1.45k
    }
3974
1.63k
}
3975
3976
CNode::CNode(NodeId idIn,
3977
             std::shared_ptr<Sock> sock,
3978
             const CAddress& addrIn,
3979
             uint64_t nKeyedNetGroupIn,
3980
             uint64_t nLocalHostNonceIn,
3981
             const CService& addrBindIn,
3982
             const std::string& addrNameIn,
3983
             ConnectionType conn_type_in,
3984
             bool inbound_onion,
3985
             uint64_t network_key,
3986
             CNodeOptions&& node_opts)
3987
1.63k
    : m_transport{MakeTransport(idIn, node_opts.use_v2transport, conn_type_in == ConnectionType::INBOUND)},
3988
1.63k
      m_permission_flags{node_opts.permission_flags},
3989
1.63k
      m_sock{sock},
3990
1.63k
      m_connected{NodeClock::now()},
3991
1.63k
      addr{addrIn},
3992
1.63k
      addrBind{addrBindIn},
3993
1.63k
      m_addr_name{addrNameIn.empty() ? addr.ToStringAddrPort() : addrNameIn},
3994
1.63k
      m_dest(addrNameIn),
3995
1.63k
      m_inbound_onion{inbound_onion},
3996
1.63k
      m_prefer_evict{node_opts.prefer_evict},
3997
1.63k
      nKeyedNetGroup{nKeyedNetGroupIn},
3998
1.63k
      m_network_key{network_key},
3999
1.63k
      m_conn_type{conn_type_in},
4000
1.63k
      id{idIn},
4001
1.63k
      nLocalHostNonce{nLocalHostNonceIn},
4002
1.63k
      m_recv_flood_size{node_opts.recv_flood_size},
4003
1.63k
      m_i2p_sam_session{std::move(node_opts.i2p_sam_session)}
4004
1.63k
{
4005
1.63k
    if (inbound_onion) assert(conn_type_in == ConnectionType::INBOUND);
4006
4007
57.1k
    for (const auto& msg : ALL_NET_MESSAGE_TYPES) {
4008
57.1k
        mapRecvBytesPerMsgType[msg] = 0;
4009
57.1k
    }
4010
1.63k
    mapRecvBytesPerMsgType[NET_MESSAGE_TYPE_OTHER] = 0;
4011
4012
1.63k
    if (fLogIPs) {
4013
9
        LogDebug(BCLog::NET, "Added connection to %s peer=%d\n", m_addr_name, id);
4014
1.62k
    } else {
4015
1.62k
        LogDebug(BCLog::NET, "Added connection peer=%d\n", id);
4016
1.62k
    }
4017
1.63k
}
4018
4019
void CNode::MarkReceivedMsgsForProcessing()
4020
136k
{
4021
136k
    AssertLockNotHeld(m_msg_process_queue_mutex);
4022
4023
136k
    size_t nSizeAdded = 0;
4024
160k
    for (const auto& msg : vRecvMsg) {
4025
        // vRecvMsg contains only completed CNetMessage
4026
        // the single possible partially deserialized message are held by TransportDeserializer
4027
160k
        nSizeAdded += msg.GetMemoryUsage();
4028
160k
    }
4029
4030
136k
    LOCK(m_msg_process_queue_mutex);
4031
136k
    m_msg_process_queue.splice(m_msg_process_queue.end(), vRecvMsg);
4032
136k
    m_msg_process_queue_size += nSizeAdded;
4033
136k
    fPauseRecv = m_msg_process_queue_size > m_recv_flood_size;
4034
136k
}
4035
4036
std::optional<std::pair<CNetMessage, bool>> CNode::PollMessage()
4037
376k
{
4038
376k
    LOCK(m_msg_process_queue_mutex);
4039
376k
    if (m_msg_process_queue.empty()) return std::nullopt;
4040
4041
160k
    std::list<CNetMessage> msgs;
4042
    // Just take one message
4043
160k
    msgs.splice(msgs.begin(), m_msg_process_queue, m_msg_process_queue.begin());
4044
160k
    m_msg_process_queue_size -= msgs.front().GetMemoryUsage();
4045
160k
    fPauseRecv = m_msg_process_queue_size > m_recv_flood_size;
4046
4047
160k
    return std::make_pair(std::move(msgs.front()), !m_msg_process_queue.empty());
4048
376k
}
4049
4050
bool CConnman::NodeFullyConnected(const CNode* pnode)
4051
70.7k
{
4052
70.7k
    return pnode && pnode->fSuccessfullyConnected && !pnode->fDisconnect;
4053
70.7k
}
4054
4055
/// Private broadcast connections only need to send certain message types.
4056
/// Other messages are not needed and may degrade privacy.
4057
static bool IsOutboundMessageAllowedInPrivateBroadcast(std::string_view type) noexcept
4058
51
{
4059
51
    return type == NetMsgType::VERSION ||
4060
51
           type == NetMsgType::VERACK ||
4061
51
           type == NetMsgType::INV ||
4062
51
           type == NetMsgType::TX ||
4063
51
           type == NetMsgType::PING;
4064
51
}
4065
4066
void CConnman::PushMessage(CNode* pnode, CSerializedNetMsg&& msg)
4067
168k
{
4068
168k
    AssertLockNotHeld(m_total_bytes_sent_mutex);
4069
4070
168k
    if (pnode->IsPrivateBroadcastConn() && !IsOutboundMessageAllowedInPrivateBroadcast(msg.m_type)) {
4071
0
        LogDebug(BCLog::PRIVBROADCAST, "Omitting send of message '%s', %s", msg.m_type, pnode->LogPeer());
4072
0
        return;
4073
0
    }
4074
4075
168k
    if (!m_private_broadcast.m_outbound_tor_ok_at_least_once.load() && !pnode->IsInboundConn() &&
4076
168k
        pnode->addr.IsTor() && msg.m_type == NetMsgType::VERACK) {
4077
        // If we are sending the peer VERACK that means we successfully sent
4078
        // and received another message to/from that peer (VERSION).
4079
1
        m_private_broadcast.m_outbound_tor_ok_at_least_once.store(true);
4080
1
    }
4081
4082
168k
    size_t nMessageSize = msg.data.size();
4083
168k
    LogDebug(BCLog::NET, "sending %s (%d bytes) peer=%d\n", msg.m_type, nMessageSize, pnode->GetId());
4084
168k
    if (m_capture_messages) {
4085
20
        CaptureMessage(pnode->addr, msg.m_type, msg.data, /*is_incoming=*/false);
4086
20
    }
4087
4088
168k
    TRACEPOINT(net, outbound_message,
4089
168k
        pnode->GetId(),
4090
168k
        pnode->m_addr_name.c_str(),
4091
168k
        pnode->ConnectionTypeAsString().c_str(),
4092
168k
        msg.m_type.c_str(),
4093
168k
        msg.data.size(),
4094
168k
        msg.data.data()
4095
168k
    );
4096
4097
168k
    size_t nBytesSent = 0;
4098
168k
    {
4099
168k
        LOCK(pnode->cs_vSend);
4100
        // Check if the transport still has unsent bytes, and indicate to it that we're about to
4101
        // give it a message to send.
4102
168k
        const auto& [to_send, more, _msg_type] =
4103
168k
            pnode->m_transport->GetBytesToSend(/*have_next_message=*/true);
4104
168k
        const bool queue_was_empty{to_send.empty() && pnode->vSendMsg.empty()};
4105
4106
        // Update memory usage of send buffer.
4107
168k
        pnode->m_send_memusage += msg.GetMemoryUsage();
4108
168k
        if (pnode->m_send_memusage + pnode->m_transport->GetSendMemoryUsage() > nSendBufferMaxSize) pnode->fPauseSend = true;
4109
        // Move message to vSendMsg queue.
4110
168k
        pnode->vSendMsg.push_back(std::move(msg));
4111
4112
        // If there was nothing to send before, and there is now (predicted by the "more" value
4113
        // returned by the GetBytesToSend call above), attempt "optimistic write":
4114
        // because the poll/select loop may pause for SELECT_TIMEOUT_MILLISECONDS before actually
4115
        // doing a send, try sending from the calling thread if the queue was empty before.
4116
        // With a V1Transport, more will always be true here, because adding a message always
4117
        // results in sendable bytes there, but with V2Transport this is not the case (it may
4118
        // still be in the handshake).
4119
168k
        if (queue_was_empty && more) {
4120
168k
            std::tie(nBytesSent, std::ignore) = SocketSendData(*pnode);
4121
168k
        }
4122
168k
    }
4123
168k
    if (nBytesSent) RecordBytesSent(nBytesSent);
4124
168k
}
4125
4126
bool CConnman::ForNode(NodeId id, std::function<bool(CNode* pnode)> func)
4127
376
{
4128
376
    CNode* found = nullptr;
4129
376
    LOCK(m_nodes_mutex);
4130
591
    for (auto&& pnode : m_nodes) {
4131
591
        if(pnode->GetId() == id) {
4132
346
            found = pnode;
4133
346
            break;
4134
346
        }
4135
591
    }
4136
376
    return found != nullptr && NodeFullyConnected(found) && func(found);
4137
376
}
4138
4139
CSipHasher CConnman::GetDeterministicRandomizer(uint64_t id) const
4140
4.83k
{
4141
4.83k
    return CSipHasher(nSeed0, nSeed1).Write(id);
4142
4.83k
}
4143
4144
uint64_t CConnman::CalculateKeyedNetGroup(const CNetAddr& address) const
4145
1.59k
{
4146
1.59k
    std::vector<unsigned char> vchNetGroup(m_netgroupman.GetGroup(address));
4147
4148
1.59k
    return GetDeterministicRandomizer(RANDOMIZER_ID_NETGROUP).Write(vchNetGroup).Finalize();
4149
1.59k
}
4150
4151
void CConnman::PerformReconnections()
4152
5.25k
{
4153
5.25k
    AssertLockNotHeld(m_reconnections_mutex);
4154
5.25k
    AssertLockNotHeld(m_unused_i2p_sessions_mutex);
4155
5.26k
    while (true) {
4156
        // Move first element of m_reconnections to todo (avoiding an allocation inside the lock).
4157
5.26k
        decltype(m_reconnections) todo;
4158
5.26k
        {
4159
5.26k
            LOCK(m_reconnections_mutex);
4160
5.26k
            if (m_reconnections.empty()) break;
4161
3
            todo.splice(todo.end(), m_reconnections, m_reconnections.begin());
4162
3
        }
4163
4164
0
        auto& item = *todo.begin();
4165
3
        OpenNetworkConnection(item.addr_connect,
4166
                              // We only reconnect if the first attempt to connect succeeded at
4167
                              // connection time, but then failed after the CNode object was
4168
                              // created. Since we already know connecting is possible, do not
4169
                              // count failure to reconnect.
4170
3
                              /*fCountFailure=*/false,
4171
3
                              std::move(item.grant),
4172
3
                              item.destination.empty() ? nullptr : item.destination.c_str(),
4173
3
                              item.conn_type,
4174
3
                              item.use_v2transport);
4175
3
    }
4176
5.25k
}
4177
4178
void CConnman::ASMapHealthCheck()
4179
7
{
4180
7
    const std::vector<CAddress> v4_addrs{GetAddressesUnsafe(/*max_addresses=*/0, /*max_pct=*/0, Network::NET_IPV4, /*filtered=*/false)};
4181
7
    const std::vector<CAddress> v6_addrs{GetAddressesUnsafe(/*max_addresses=*/0, /*max_pct=*/0, Network::NET_IPV6, /*filtered=*/false)};
4182
7
    std::vector<CNetAddr> clearnet_addrs;
4183
7
    clearnet_addrs.reserve(v4_addrs.size() + v6_addrs.size());
4184
7
    std::transform(v4_addrs.begin(), v4_addrs.end(), std::back_inserter(clearnet_addrs),
4185
8
        [](const CAddress& addr) { return static_cast<CNetAddr>(addr); });
4186
7
    std::transform(v6_addrs.begin(), v6_addrs.end(), std::back_inserter(clearnet_addrs),
4187
7
        [](const CAddress& addr) { return static_cast<CNetAddr>(addr); });
4188
7
    m_netgroupman.ASMapHealthCheck(clearnet_addrs);
4189
7
}
4190
4191
// Dump binary message to file, with timestamp.
4192
static void CaptureMessageToFile(const CAddress& addr,
4193
                                 const std::string& msg_type,
4194
                                 std::span<const unsigned char> data,
4195
                                 bool is_incoming)
4196
23
{
4197
    // Note: This function captures the message at the time of processing,
4198
    // not at socket receive/send time.
4199
    // This ensures that the messages are always in order from an application
4200
    // layer (processing) perspective.
4201
23
    auto now = GetTime<std::chrono::microseconds>();
4202
4203
    // Windows folder names cannot include a colon
4204
23
    std::string clean_addr = addr.ToStringAddrPort();
4205
23
    std::replace(clean_addr.begin(), clean_addr.end(), ':', '_');
4206
4207
23
    fs::path base_path = gArgs.GetDataDirNet() / "message_capture" / fs::u8path(clean_addr);
4208
23
    fs::create_directories(base_path);
4209
4210
23
    fs::path path = base_path / (is_incoming ? "msgs_recv.dat" : "msgs_sent.dat");
4211
23
    AutoFile f{fsbridge::fopen(path, "ab")};
4212
4213
23
    ser_writedata64(f, now.count());
4214
23
    f << std::span{msg_type};
4215
135
    for (auto i = msg_type.length(); i < CMessageHeader::MESSAGE_TYPE_SIZE; ++i) {
4216
112
        f << uint8_t{'\0'};
4217
112
    }
4218
23
    uint32_t size = data.size();
4219
23
    ser_writedata32(f, size);
4220
23
    f << data;
4221
4222
23
    if (f.fclose() != 0) {
4223
0
        throw std::ios_base::failure(
4224
0
            strprintf("Error closing %s after write, file contents are likely incomplete", fs::PathToString(path)));
4225
0
    }
4226
23
}
4227
4228
std::function<void(const CAddress& addr,
4229
                   const std::string& msg_type,
4230
                   std::span<const unsigned char> data,
4231
                   bool is_incoming)>
4232
    CaptureMessage = CaptureMessageToFile;