Files

471 lines
16 KiB
C++
Raw Permalink Normal View History

2017-08-17 18:11:52 +02:00
/*
2017-11-13 23:09:33 +01:00
* This file is part of the Flowee project
2017-08-17 18:11:52 +02:00
* Copyright (c) 2012 Pieter Wuille
* Copyright (c) 2012-2015 The Bitcoin Core developers
2021-06-20 22:44:44 +02:00
* Copyright (c) 2017 Tom Zander <tom@flowee.org>
2017-08-17 18:11:52 +02:00
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2013-04-13 00:13:08 -05:00
2018-01-16 10:47:52 +00:00
#ifndef FLOWEE_ADDRMAN_H
#define FLOWEE_ADDRMAN_H
2012-01-04 23:39:45 +01:00
#include "netbase.h"
#include "protocol.h"
#include "timedata.h"
2012-01-04 23:39:45 +01:00
2017-10-06 16:35:48 +02:00
#include <mutex>
2012-01-04 23:39:45 +01:00
2015-04-28 14:48:28 +00:00
/**
* Extended statistics about a CAddress
*/
2012-01-04 23:39:45 +01:00
class CAddrInfo : public CAddress
{
2015-04-19 11:10:13 -07:00
public:
//! last try whatsoever by us (memory only)
int64_t nLastTry;
2012-01-04 23:39:45 +01:00
private:
//! where knowledge about this address first came from
2012-01-04 23:39:45 +01:00
CNetAddr source;
//! last successful connection by us
2013-04-13 00:13:08 -05:00
int64_t nLastSuccess;
2012-01-04 23:39:45 +01:00
//! connection attempts since last successful attempt
2012-01-04 23:39:45 +01:00
int nAttempts;
//! reference count in new sets (memory only)
2012-01-04 23:39:45 +01:00
int nRefCount;
//! position in vRandom
2012-01-04 23:39:45 +01:00
int nRandomPos;
//! in tried set? (memory only)
bool fInTried;
2017-10-06 16:34:20 +02:00
//! remote node knew xthin last time we connected
bool fKnowsXThin;
2017-10-06 16:34:20 +02:00
int uselessness; //< Higher scrores means we should try to avoid connecting to it. Goes up for banned nodes.
2012-01-04 23:39:45 +01:00
friend class CAddrMan;
public:
2017-01-19 21:40:34 +01:00
ADD_SERIALIZE_METHODS
2014-08-20 08:42:31 +02:00
template <typename Stream, typename Operation>
inline void SerializationOp(Stream& s, Operation ser_action, int nType, int nVersion) {
READWRITE(*(CAddress*)this);
2012-01-04 23:39:45 +01:00
READWRITE(source);
READWRITE(nLastSuccess);
READWRITE(nAttempts);
2017-10-06 16:34:20 +02:00
if (nVersion >= 3) {
READWRITE(fKnowsXThin);
READWRITE(uselessness);
}
2014-08-20 08:42:31 +02:00
}
2012-01-04 23:39:45 +01:00
2017-08-17 18:11:52 +02:00
void Init();
2012-01-04 23:39:45 +01:00
std::string toString() const {
return source.ToString();
}
2012-05-05 21:27:52 +02:00
CAddrInfo(const CAddress &addrIn, const CNetAddr &addrSource) : CAddress(addrIn), source(addrSource)
2012-01-04 23:39:45 +01:00
{
Init();
}
CAddrInfo() : CAddress(), source()
{
Init();
}
//! Calculate in which "tried" bucket this entry belongs
2015-03-08 06:30:05 -07:00
int GetTriedBucket(const uint256 &nKey) const;
2012-01-04 23:39:45 +01:00
//! Calculate in which "new" bucket this entry belongs, given a certain source
2015-03-08 06:30:05 -07:00
int GetNewBucket(const uint256 &nKey, const CNetAddr& src) const;
2012-01-04 23:39:45 +01:00
//! Calculate in which "new" bucket this entry belongs, using its default source
2015-03-08 06:30:05 -07:00
int GetNewBucket(const uint256 &nKey) const
2012-01-04 23:39:45 +01:00
{
return GetNewBucket(nKey, source);
}
//! Calculate in which position of a bucket to store this entry.
int GetBucketPosition(const uint256 &nKey, bool fNew, int nBucket) const;
//! Determine whether the statistics about this entry are bad enough so that it can just be deleted
2013-04-13 00:13:08 -05:00
bool IsTerrible(int64_t nNow = GetAdjustedTime()) const;
2012-01-04 23:39:45 +01:00
//! Calculate the relative chance this entry should be given when selecting nodes to connect to
2013-04-13 00:13:08 -05:00
double GetChance(int64_t nNow = GetAdjustedTime()) const;
2012-01-04 23:39:45 +01:00
bool getKnowsXThin() const;
void setKnowsXThin(bool value);
2017-10-06 16:34:20 +02:00
int getUselessness() const;
void setUselessness(int value);
int64_t getLastSuccess() const;
2012-01-04 23:39:45 +01:00
};
/** Stochastic address manager
*
* Design goals:
2015-04-28 14:47:17 +00:00
* * Keep the address tables in-memory, and asynchronously dump the entire table to peers.dat.
* * Make sure no (localized) attacker can fill the entire table with his nodes/addresses.
*
* To that end:
* * Addresses are organized into buckets.
2015-04-22 09:02:01 -04:00
* * Addresses that have not yet been tried go into 1024 "new" buckets.
* * Based on the address range (/16 for IPv4) of the source of information, 64 buckets are selected at random.
2015-04-28 14:48:28 +00:00
* * The actual bucket is chosen from one of these, based on the range in which the address itself is located.
2015-04-22 09:02:01 -04:00
* * One single address can occur in up to 8 different buckets to increase selection chances for addresses that
* are seen frequently. The chance for increasing this multiplicity decreases exponentially.
* * When adding a new address to a full bucket, a randomly chosen entry (with a bias favoring less recently seen
* ones) is removed from it first.
2015-03-19 10:01:57 -07:00
* * Addresses of nodes that are known to be accessible go into 256 "tried" buckets.
* * Each address range selects at random 8 of these buckets.
* * The actual bucket is chosen from one of these, based on the full address.
* * When adding a new good address to a full bucket, a randomly chosen entry (with a bias favoring less recently
* tried ones) is evicted from it, back to the "new" buckets.
* * Bucket selection is based on cryptographic hashing, using a randomly-generated 256-bit key, which should not
* be observable by adversaries.
* * Several indexes are kept for high performance. Defining DEBUG_ADDRMAN will introduce frequent (and expensive)
* consistency checks for the entire data structure.
*/
2012-01-04 23:39:45 +01:00
//! total number of buckets for tried addresses
2015-03-19 10:01:57 -07:00
#define ADDRMAN_TRIED_BUCKET_COUNT 256
2012-01-04 23:39:45 +01:00
//! total number of buckets for new addresses
2015-03-19 10:01:57 -07:00
#define ADDRMAN_NEW_BUCKET_COUNT 1024
2012-01-04 23:39:45 +01:00
//! maximum allowed number of entries in buckets for new and tried addresses
#define ADDRMAN_BUCKET_SIZE 64
2012-01-04 23:39:45 +01:00
//! over how many buckets entries with tried addresses from a single group (/16 for IPv4) are spread
2015-03-19 10:01:57 -07:00
#define ADDRMAN_TRIED_BUCKETS_PER_GROUP 8
2012-01-04 23:39:45 +01:00
//! over how many buckets entries with new addresses originating from a single group are spread
2015-03-19 10:01:57 -07:00
#define ADDRMAN_NEW_BUCKETS_PER_SOURCE_GROUP 64
2012-01-04 23:39:45 +01:00
//! in how many buckets for entries with new addresses a single address may occur
2015-03-19 10:01:57 -07:00
#define ADDRMAN_NEW_BUCKETS_PER_ADDRESS 8
2012-01-04 23:39:45 +01:00
//! how old addresses can maximally be
2012-01-04 23:39:45 +01:00
#define ADDRMAN_HORIZON_DAYS 30
//! after how many failed attempts we give up on a new node
2012-01-04 23:39:45 +01:00
#define ADDRMAN_RETRIES 3
//! how many successive failures are allowed ...
2012-01-04 23:39:45 +01:00
#define ADDRMAN_MAX_FAILURES 10
//! ... in at least this many days
2012-01-04 23:39:45 +01:00
#define ADDRMAN_MIN_FAIL_DAYS 7
//! the maximum percentage of nodes to return in a getaddr call
2012-01-04 23:39:45 +01:00
#define ADDRMAN_GETADDR_MAX_PCT 23
//! the maximum number of nodes to return in a getaddr call
2012-01-04 23:39:45 +01:00
#define ADDRMAN_GETADDR_MAX 2500
2017-10-06 16:34:20 +02:00
/**
* Stochastical (IP) address manager
*/
2012-01-04 23:39:45 +01:00
class CAddrMan
{
private:
2017-10-06 16:35:48 +02:00
mutable std::mutex lock;
2012-01-04 23:39:45 +01:00
//! last used nId
2012-01-04 23:39:45 +01:00
int nIdCount;
//! table with information about all nIds
2012-01-04 23:39:45 +01:00
std::map<int, CAddrInfo> mapInfo;
//! find an nId based on its network address
2012-01-04 23:39:45 +01:00
std::map<CNetAddr, int> mapAddr;
//! randomly-ordered vector of all nIds
2012-01-04 23:39:45 +01:00
std::vector<int> vRandom;
// number of "tried" entries
int nTried;
//! list of "tried" buckets
int vvTried[ADDRMAN_TRIED_BUCKET_COUNT][ADDRMAN_BUCKET_SIZE];
2012-01-04 23:39:45 +01:00
//! number of (unique) "new" entries
2012-01-04 23:39:45 +01:00
int nNew;
//! list of "new" buckets
int vvNew[ADDRMAN_NEW_BUCKET_COUNT][ADDRMAN_BUCKET_SIZE];
2012-01-04 23:39:45 +01:00
protected:
2017-05-03 11:25:23 +02:00
//! secret key to randomize bucket select with
uint256 nKey;
//! Find an entry.
CAddrInfo* Find_(const CNetAddr& addr, int *pnId = NULL);
2012-01-04 23:39:45 +01:00
//! find an entry, creating it if necessary.
//! nTime and nServices of the found node are updated, if necessary.
2012-01-04 23:39:45 +01:00
CAddrInfo* Create(const CAddress &addr, const CNetAddr &addrSource, int *pnId = NULL);
//! Swap two elements in vRandom.
2012-05-09 03:48:14 +02:00
void SwapRandom(unsigned int nRandomPos1, unsigned int nRandomPos2);
2012-01-04 23:39:45 +01:00
//! Move an entry from the "new" table(s) to the "tried" table
void MarkTried(CAddrInfo& info, int nId);
//! Delete an entry. It must not be in tried, and have refcount 0.
void Delete(int nId);
//! Clear a position in a "new" table. This is the only place where entries are actually deleted.
void ClearNew(int nUBucket, int nUBucketPos);
2012-01-04 23:39:45 +01:00
//! Add an entry to the "new" table.
2013-04-13 00:13:08 -05:00
bool Add_(const CAddress &addr, const CNetAddr& source, int64_t nTimePenalty);
2012-01-04 23:39:45 +01:00
public:
/**
* serialized format:
* * version byte (currently 1)
* * 0x20 + nKey (serialized as if it were a vector, for backward compatibility)
* * nNew
* * nTried
* * number of "new" buckets XOR 2**30
* * all nNew addrinfos in vvNew
* * all nTried addrinfos in vvTried
* * for each bucket:
* * number of elements
* * for each element: index
*
* 2**30 is xorred with the number of buckets to make addrman deserializer v0 detect it
* as incompatible. This is necessary because it did not check the version number on
* deserialization.
*
* Notice that vvTried, mapAddr and vVector are never encoded explicitly;
* they are instead reconstructed from the other information.
*
2015-08-09 00:17:27 +01:00
* vvNew is serialized, but only used if ADDRMAN_UNKNOWN_BUCKET_COUNT didn't change,
* otherwise it is reconstructed as well.
*
* This format is more complex, but significantly smaller (at most 1.5 MiB), and supports
* changes to the ADDRMAN_ parameters without breaking the on-disk structure.
*
* We don't use ADD_SERIALIZE_METHODS since the serialization and deserialization code has
* very little in common.
*/
2014-07-10 20:16:58 +02:00
template<typename Stream>
void Serialize(Stream &s, int nType, int nVersionDummy) const
{
2017-10-06 16:35:48 +02:00
std::lock_guard<std::mutex> guard(lock);
2012-01-04 23:39:45 +01:00
2017-10-06 16:34:20 +02:00
unsigned char nVersion = 3;
2014-07-10 20:16:58 +02:00
s << nVersion;
2015-03-08 06:30:05 -07:00
s << ((unsigned char)32);
2014-07-10 20:16:58 +02:00
s << nKey;
s << nNew;
s << nTried;
2012-01-04 23:39:45 +01:00
int nUBuckets = ADDRMAN_NEW_BUCKET_COUNT ^ (1 << 30);
2014-07-10 20:16:58 +02:00
s << nUBuckets;
std::map<int, int> mapUnkIds;
int nIds = 0;
for (std::map<int, CAddrInfo>::const_iterator it = mapInfo.begin(); it != mapInfo.end(); ++it) {
2014-07-10 20:16:58 +02:00
mapUnkIds[(*it).first] = nIds;
const CAddrInfo &info = (*it).second;
if (info.nRefCount) {
assert(nIds != nNew); // this means nNew was wrong, oh ow
2014-07-10 20:16:58 +02:00
s << info;
nIds++;
}
}
nIds = 0;
for (std::map<int, CAddrInfo>::const_iterator it = mapInfo.begin(); it != mapInfo.end(); ++it) {
2014-07-10 20:16:58 +02:00
const CAddrInfo &info = (*it).second;
if (info.fInTried) {
assert(nIds != nTried); // this means nTried was wrong, oh ow
2014-07-10 20:16:58 +02:00
s << info;
nIds++;
}
}
for (int bucket = 0; bucket < ADDRMAN_NEW_BUCKET_COUNT; bucket++) {
int nSize = 0;
for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) {
if (vvNew[bucket][i] != -1)
nSize++;
}
2014-07-10 20:16:58 +02:00
s << nSize;
for (int i = 0; i < ADDRMAN_BUCKET_SIZE; i++) {
if (vvNew[bucket][i] != -1) {
int nIndex = mapUnkIds[vvNew[bucket][i]];
s << nIndex;
}
2014-07-10 20:16:58 +02:00
}
}
}
template<typename Stream>
void Unserialize(Stream& s, int nType, int nVersionDummy)
{
2017-10-06 16:35:48 +02:00
std::lock_guard<std::mutex> guard(lock);
2014-07-10 20:16:58 +02:00
Clear();
2014-07-10 20:16:58 +02:00
unsigned char nVersion;
s >> nVersion;
2015-03-08 06:30:05 -07:00
unsigned char nKeySize;
s >> nKeySize;
if (nKeySize != 32) throw std::ios_base::failure("Incorrect keysize in addrman deserialization");
2014-07-10 20:16:58 +02:00
s >> nKey;
s >> nNew;
s >> nTried;
int nUBuckets = 0;
s >> nUBuckets;
nUBuckets ^= (1 << 30);
// Deserialize entries from the new table.
2014-07-10 20:16:58 +02:00
for (int n = 0; n < nNew; n++) {
CAddrInfo &info = mapInfo[n];
2017-10-06 16:34:20 +02:00
info.Unserialize(s, nType, nVersion);
2014-07-10 20:16:58 +02:00
mapAddr[info] = n;
2017-09-21 02:57:07 -06:00
info.nRandomPos = static_cast<int>(vRandom.size());
2014-07-10 20:16:58 +02:00
vRandom.push_back(n);
2017-10-06 16:34:20 +02:00
if (nUBuckets != ADDRMAN_NEW_BUCKET_COUNT) {
// In case the new table data cannot be used (bucket count wrong),
// immediately try to give them a reference based on their primary source address.
int nUBucket = info.GetNewBucket(nKey);
int nUBucketPos = info.GetBucketPosition(nKey, true, nUBucket);
if (vvNew[nUBucket][nUBucketPos] == -1) {
vvNew[nUBucket][nUBucketPos] = n;
info.nRefCount++;
}
2014-07-10 20:16:58 +02:00
}
}
nIdCount = nNew;
// Deserialize entries from the tried table.
2014-07-10 20:16:58 +02:00
int nLost = 0;
for (int n = 0; n < nTried; n++) {
CAddrInfo info;
2017-10-06 16:34:20 +02:00
info.Unserialize(s, nType, nVersion);
int nKBucket = info.GetTriedBucket(nKey);
int nKBucketPos = info.GetBucketPosition(nKey, false, nKBucket);
if (vvTried[nKBucket][nKBucketPos] == -1) {
2017-09-21 02:57:07 -06:00
info.nRandomPos = static_cast<int>(vRandom.size());
2014-07-10 20:16:58 +02:00
info.fInTried = true;
vRandom.push_back(nIdCount);
mapInfo[nIdCount] = info;
mapAddr[info] = nIdCount;
vvTried[nKBucket][nKBucketPos] = nIdCount;
2014-07-10 20:16:58 +02:00
nIdCount++;
2012-01-04 23:39:45 +01:00
} else {
2014-07-10 20:16:58 +02:00
nLost++;
}
}
nTried -= nLost;
// Deserialize positions in the new table (if possible).
for (int bucket = 0; bucket < nUBuckets; bucket++) {
2014-07-10 20:16:58 +02:00
int nSize = 0;
s >> nSize;
for (int n = 0; n < nSize; n++) {
int nIndex = 0;
s >> nIndex;
if (nIndex >= 0 && nIndex < nNew) {
CAddrInfo &info = mapInfo[nIndex];
int nUBucketPos = info.GetBucketPosition(nKey, true, bucket);
2017-10-06 16:34:20 +02:00
if (nVersion >= 1 && nUBuckets == ADDRMAN_NEW_BUCKET_COUNT && vvNew[bucket][nUBucketPos] == -1 && info.nRefCount < ADDRMAN_NEW_BUCKETS_PER_ADDRESS) {
info.nRefCount++;
vvNew[bucket][nUBucketPos] = nIndex;
}
2012-01-04 23:39:45 +01:00
}
}
}
// Prune new entries with refcount 0 (as a result of collisions).
int nLostUnk = 0;
for (std::map<int, CAddrInfo>::const_iterator it = mapInfo.begin(); it != mapInfo.end(); ) {
if (it->second.fInTried == false && it->second.nRefCount == 0) {
std::map<int, CAddrInfo>::const_iterator itCopy = it++;
Delete(itCopy->first);
nLostUnk++;
} else {
it++;
}
}
2019-08-24 13:20:37 +02:00
if (nLost + nLostUnk > 0)
logDebug(Log::Addrman) << "addrman lost" << nLostUnk << "new and" << nLost << "tried addresses due to collisions";
2017-10-06 16:35:48 +02:00
validateInteral();
2014-07-10 20:16:58 +02:00
}
unsigned int GetSerializeSize(int nType, int nVersion) const
{
2017-09-21 02:57:07 -06:00
return static_cast<unsigned int>((CSizeComputer(nType, nVersion) << *this).size());
2014-07-10 20:16:58 +02:00
}
2012-01-04 23:39:45 +01:00
2017-08-17 18:11:52 +02:00
void Clear();
2012-01-04 23:39:45 +01:00
2017-08-17 18:11:52 +02:00
CAddrMan();
2017-08-17 18:11:52 +02:00
~CAddrMan();
2015-03-08 06:30:05 -07:00
2017-10-06 16:35:48 +02:00
//! \internal Consistency check
int validateInteral();
//! Return the number of (unique) addresses in all tables.
2017-08-17 18:11:52 +02:00
inline size_t size() const
2012-01-04 23:39:45 +01:00
{
return vRandom.size();
}
//! Add a single address.
2017-08-17 18:11:52 +02:00
bool Add(const CAddress &addr, const CNetAddr& source, int64_t nTimePenalty = 0);
2012-01-04 23:39:45 +01:00
//! Add multiple addresses.
2017-08-17 18:11:52 +02:00
bool Add(const std::vector<CAddress> &vAddr, const CNetAddr& source, int64_t nTimePenalty = 0);
2012-01-04 23:39:45 +01:00
2017-10-06 16:35:48 +02:00
//! Mark an entry "good", possibly moving it from "new" to "tried".
2017-08-17 18:11:52 +02:00
void Good(const CService &addr, int64_t nTime = GetAdjustedTime());
2012-01-04 23:39:45 +01:00
2017-10-06 16:35:48 +02:00
//! Mark an entry as attempted to connect.
2017-08-17 18:11:52 +02:00
void Attempt(const CService &addr, int64_t nTime = GetAdjustedTime());
2012-01-04 23:39:45 +01:00
2017-10-06 16:35:48 +02:00
//! Select an address to connect to, if newOnly is set to true, only the new table is selected from.
2017-08-17 18:11:52 +02:00
CAddrInfo Select(bool newOnly = false);
2012-01-04 23:39:45 +01:00
//! Return a bunch of addresses, selected at random.
2017-08-17 18:11:52 +02:00
std::vector<CAddress> GetAddr();
2012-01-04 23:39:45 +01:00
//! Mark an entry as currently-connected-to.
2017-08-17 18:11:52 +02:00
void Connected(const CService &addr, int64_t nTime = GetAdjustedTime());
2017-10-06 16:34:20 +02:00
//! Mark an address as useless. For instance if its misbehaving
void increaseUselessness(const CNetAddr &addr, int count = 1);
CAddrInfo* Find(const CNetAddr& addr);
2012-01-04 23:39:45 +01:00
};
2018-01-16 10:47:52 +00:00
#endif