Remove obsolete files
This commit is contained in:
parent
0da0c10995
commit
7938eab454
|
@ -1,54 +0,0 @@
|
|||
# objectHashHolder is a timer-driven thread. One objectHashHolder thread is used
|
||||
# by each sendDataThread. The sendDataThread uses it whenever it needs to
|
||||
# advertise an object to peers in an inv message, or advertise a peer to other
|
||||
# peers in an addr message. Instead of sending them out immediately, it must
|
||||
# wait a random number of seconds for each connection so that different peers
|
||||
# get different objects at different times. Thus an attacker who is
|
||||
# connecting to many network nodes who receives a message first from Alice
|
||||
# cannot be sure if Alice is the node who originated the message.
|
||||
|
||||
import random
|
||||
import time
|
||||
import threading
|
||||
|
||||
class objectHashHolder(threading.Thread):
|
||||
size = 10
|
||||
def __init__(self, sendDataThreadMailbox):
|
||||
threading.Thread.__init__(self, name="objectHashHolder")
|
||||
self.shutdown = False
|
||||
self.sendDataThreadMailbox = sendDataThreadMailbox # This queue is used to submit data back to our associated sendDataThread.
|
||||
self.collectionOfHashLists = []
|
||||
self.collectionOfPeerLists = []
|
||||
for i in range(objectHashHolder.size):
|
||||
self.collectionOfHashLists.append([])
|
||||
self.collectionOfPeerLists.append([])
|
||||
|
||||
def run(self):
|
||||
iterator = 0
|
||||
while not self.shutdown:
|
||||
if len(self.collectionOfHashLists[iterator]) > 0:
|
||||
self.sendDataThreadMailbox.put((0, 'sendinv', self.collectionOfHashLists[iterator]))
|
||||
self.collectionOfHashLists[iterator] = []
|
||||
if len(self.collectionOfPeerLists[iterator]) > 0:
|
||||
self.sendDataThreadMailbox.put((0, 'sendaddr', self.collectionOfPeerLists[iterator]))
|
||||
self.collectionOfPeerLists[iterator] = []
|
||||
iterator += 1
|
||||
iterator %= objectHashHolder.size
|
||||
time.sleep(1)
|
||||
|
||||
def holdHash(self,hash):
|
||||
self.collectionOfHashLists[random.randrange(0, objectHashHolder.size)].append(hash)
|
||||
|
||||
def hasHash(self, hash):
|
||||
if hash in (hashlist for hashlist in self.collectionOfHashLists):
|
||||
return True
|
||||
return False
|
||||
|
||||
def holdPeer(self,peerDetails):
|
||||
self.collectionOfPeerLists[random.randrange(0, objectHashHolder.size)].append(peerDetails)
|
||||
|
||||
def hashCount(self):
|
||||
return sum([len(x) for x in self.collectionOfHashLists if type(x) is list])
|
||||
|
||||
def close(self):
|
||||
self.shutdown = True
|
|
@ -1,283 +0,0 @@
|
|||
import errno
|
||||
import threading
|
||||
import time
|
||||
import random
|
||||
import shared
|
||||
import select
|
||||
import socks
|
||||
import socket
|
||||
import sys
|
||||
import tr
|
||||
|
||||
from class_sendDataThread import *
|
||||
from class_receiveDataThread import *
|
||||
from bmconfigparser import BMConfigParser
|
||||
from helper_threading import *
|
||||
import knownnodes
|
||||
import queues
|
||||
import state
|
||||
|
||||
# For each stream to which we connect, several outgoingSynSender threads
|
||||
# will exist and will collectively create 8 connections with peers.
|
||||
|
||||
class outgoingSynSender(threading.Thread, StoppableThread):
|
||||
|
||||
def __init__(self):
|
||||
threading.Thread.__init__(self, name="outgoingSynSender")
|
||||
self.initStop()
|
||||
random.seed()
|
||||
|
||||
def setup(self, streamNumber, selfInitiatedConnections):
|
||||
self.streamNumber = streamNumber
|
||||
self.selfInitiatedConnections = selfInitiatedConnections
|
||||
|
||||
def _getPeer(self):
|
||||
# If the user has specified a trusted peer then we'll only
|
||||
# ever connect to that. Otherwise we'll pick a random one from
|
||||
# the known nodes
|
||||
if state.trustedPeer:
|
||||
with knownnodes.knownNodesLock:
|
||||
peer = state.trustedPeer
|
||||
knownnodes.knownNodes[self.streamNumber][peer] = time.time()
|
||||
else:
|
||||
while not self._stopped:
|
||||
try:
|
||||
with knownnodes.knownNodesLock:
|
||||
peer, = random.sample(knownnodes.knownNodes[self.streamNumber], 1)
|
||||
priority = (183600 - (time.time() - knownnodes.knownNodes[self.streamNumber][peer])) / 183600 # 2 days and 3 hours
|
||||
except ValueError: # no known nodes
|
||||
self.stop.wait(1)
|
||||
continue
|
||||
if BMConfigParser().get('bitmessagesettings', 'socksproxytype') != 'none':
|
||||
if peer.host.find(".onion") == -1:
|
||||
priority /= 10 # hidden services have 10x priority over plain net
|
||||
else:
|
||||
# don't connect to self
|
||||
if peer.host == BMConfigParser().get('bitmessagesettings', 'onionhostname') and peer.port == BMConfigParser().getint("bitmessagesettings", "onionport"):
|
||||
continue
|
||||
elif peer.host.find(".onion") != -1: # onion address and so proxy
|
||||
continue
|
||||
if priority <= 0.001: # everyone has at least this much priority
|
||||
priority = 0.001
|
||||
if (random.random() <= priority):
|
||||
break
|
||||
self.stop.wait(0.01) # prevent CPU hogging if something is broken
|
||||
try:
|
||||
return peer
|
||||
except NameError:
|
||||
return state.Peer('127.0.0.1', 8444)
|
||||
|
||||
def stopThread(self):
|
||||
super(outgoingSynSender, self).stopThread()
|
||||
try:
|
||||
self.sock.shutdown(socket.SHUT_RDWR)
|
||||
except:
|
||||
pass
|
||||
|
||||
def run(self):
|
||||
while BMConfigParser().safeGetBoolean('bitmessagesettings', 'dontconnect') and not self._stopped:
|
||||
self.stop.wait(2)
|
||||
while BMConfigParser().safeGetBoolean('bitmessagesettings', 'sendoutgoingconnections') and not self._stopped:
|
||||
self.name = "outgoingSynSender"
|
||||
maximumConnections = 1 if state.trustedPeer else BMConfigParser().safeGetInt('bitmessagesettings', 'maxoutboundconnections')
|
||||
while len(self.selfInitiatedConnections[self.streamNumber]) >= maximumConnections and not self._stopped:
|
||||
self.stop.wait(10)
|
||||
if state.shutdown:
|
||||
break
|
||||
peer = self._getPeer()
|
||||
while peer in shared.alreadyAttemptedConnectionsList or peer.host in shared.connectedHostsList:
|
||||
# print 'choosing new sample'
|
||||
peer = self._getPeer()
|
||||
self.stop.wait(1)
|
||||
if self._stopped:
|
||||
break
|
||||
# Clear out the shared.alreadyAttemptedConnectionsList every half
|
||||
# hour so that this program will again attempt a connection
|
||||
# to any nodes, even ones it has already tried.
|
||||
with shared.alreadyAttemptedConnectionsListLock:
|
||||
if (time.time() - shared.alreadyAttemptedConnectionsListResetTime) > 1800:
|
||||
shared.alreadyAttemptedConnectionsList.clear()
|
||||
shared.alreadyAttemptedConnectionsListResetTime = int(
|
||||
time.time())
|
||||
shared.alreadyAttemptedConnectionsList[peer] = 0
|
||||
if self._stopped:
|
||||
break
|
||||
self.name = "outgoingSynSender-" + peer.host.replace(":", ".") # log parser field separator
|
||||
address_family = socket.AF_INET
|
||||
# Proxy IP is IPv6. Unlikely but possible
|
||||
if BMConfigParser().get('bitmessagesettings', 'socksproxytype') != 'none':
|
||||
if ":" in BMConfigParser().get('bitmessagesettings', 'sockshostname'):
|
||||
address_family = socket.AF_INET6
|
||||
# No proxy, and destination is IPv6
|
||||
elif peer.host.find(':') >= 0 :
|
||||
address_family = socket.AF_INET6
|
||||
try:
|
||||
self.sock = socks.socksocket(address_family, socket.SOCK_STREAM)
|
||||
except:
|
||||
"""
|
||||
The line can fail on Windows systems which aren't
|
||||
64-bit compatiable:
|
||||
File "C:\Python27\lib\socket.py", line 187, in __init__
|
||||
_sock = _realsocket(family, type, proto)
|
||||
error: [Errno 10047] An address incompatible with the requested protocol was used
|
||||
|
||||
So let us remove the offending address from our knownNodes file.
|
||||
"""
|
||||
with knownnodes.knownNodesLock:
|
||||
try:
|
||||
del knownnodes.knownNodes[self.streamNumber][peer]
|
||||
except KeyError:
|
||||
pass
|
||||
logger.debug('deleting ' + str(peer) + ' from knownnodes.knownNodes because it caused a socks.socksocket exception. We must not be 64-bit compatible.')
|
||||
continue
|
||||
# This option apparently avoids the TIME_WAIT state so that we
|
||||
# can rebind faster
|
||||
self.sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
||||
self.sock.settimeout(20)
|
||||
if BMConfigParser().get('bitmessagesettings', 'socksproxytype') == 'none' and shared.verbose >= 2:
|
||||
logger.debug('Trying an outgoing connection to ' + str(peer))
|
||||
|
||||
# sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
elif BMConfigParser().get('bitmessagesettings', 'socksproxytype') == 'SOCKS4a':
|
||||
if shared.verbose >= 2:
|
||||
logger.debug ('(Using SOCKS4a) Trying an outgoing connection to ' + str(peer))
|
||||
|
||||
proxytype = socks.PROXY_TYPE_SOCKS4
|
||||
sockshostname = BMConfigParser().get(
|
||||
'bitmessagesettings', 'sockshostname')
|
||||
socksport = BMConfigParser().getint(
|
||||
'bitmessagesettings', 'socksport')
|
||||
rdns = True # Do domain name lookups through the proxy; though this setting doesn't really matter since we won't be doing any domain name lookups anyway.
|
||||
if BMConfigParser().getboolean('bitmessagesettings', 'socksauthentication'):
|
||||
socksusername = BMConfigParser().get(
|
||||
'bitmessagesettings', 'socksusername')
|
||||
sockspassword = BMConfigParser().get(
|
||||
'bitmessagesettings', 'sockspassword')
|
||||
self.sock.setproxy(
|
||||
proxytype, sockshostname, socksport, rdns, socksusername, sockspassword)
|
||||
else:
|
||||
self.sock.setproxy(
|
||||
proxytype, sockshostname, socksport, rdns)
|
||||
elif BMConfigParser().get('bitmessagesettings', 'socksproxytype') == 'SOCKS5':
|
||||
if shared.verbose >= 2:
|
||||
logger.debug ('(Using SOCKS5) Trying an outgoing connection to ' + str(peer))
|
||||
|
||||
proxytype = socks.PROXY_TYPE_SOCKS5
|
||||
sockshostname = BMConfigParser().get(
|
||||
'bitmessagesettings', 'sockshostname')
|
||||
socksport = BMConfigParser().getint(
|
||||
'bitmessagesettings', 'socksport')
|
||||
rdns = True # Do domain name lookups through the proxy; though this setting doesn't really matter since we won't be doing any domain name lookups anyway.
|
||||
if BMConfigParser().getboolean('bitmessagesettings', 'socksauthentication'):
|
||||
socksusername = BMConfigParser().get(
|
||||
'bitmessagesettings', 'socksusername')
|
||||
sockspassword = BMConfigParser().get(
|
||||
'bitmessagesettings', 'sockspassword')
|
||||
self.sock.setproxy(
|
||||
proxytype, sockshostname, socksport, rdns, socksusername, sockspassword)
|
||||
else:
|
||||
self.sock.setproxy(
|
||||
proxytype, sockshostname, socksport, rdns)
|
||||
|
||||
try:
|
||||
self.sock.connect((peer.host, peer.port))
|
||||
if self._stopped:
|
||||
self.sock.shutdown(socket.SHUT_RDWR)
|
||||
self.sock.close()
|
||||
return
|
||||
sendDataThreadQueue = Queue.Queue() # Used to submit information to the send data thread for this connection.
|
||||
|
||||
sd = sendDataThread(sendDataThreadQueue)
|
||||
sd.setup(self.sock, peer.host, peer.port, self.streamNumber)
|
||||
sd.start()
|
||||
|
||||
rd = receiveDataThread()
|
||||
rd.daemon = True # close the main program even if there are threads left
|
||||
rd.setup(self.sock,
|
||||
peer.host,
|
||||
peer.port,
|
||||
self.streamNumber,
|
||||
self.selfInitiatedConnections,
|
||||
sendDataThreadQueue,
|
||||
sd.objectHashHolderInstance)
|
||||
rd.start()
|
||||
|
||||
sd.sendVersionMessage()
|
||||
|
||||
logger.debug(str(self) + ' connected to ' + str(peer) + ' during an outgoing attempt.')
|
||||
except socks.GeneralProxyError as err:
|
||||
if err[0][0] in [7, 8, 9]:
|
||||
logger.error('Error communicating with proxy: %s', str(err))
|
||||
queues.UISignalQueue.put((
|
||||
'updateStatusBar',
|
||||
tr._translate(
|
||||
"MainWindow", "Problem communicating with proxy: %1. Please check your network settings.").arg(str(err[0][1]))
|
||||
))
|
||||
self.stop.wait(1)
|
||||
continue
|
||||
elif shared.verbose >= 2:
|
||||
logger.debug('Could NOT connect to ' + str(peer) + ' during outgoing attempt. ' + str(err))
|
||||
|
||||
deletedPeer = None
|
||||
with knownnodes.knownNodesLock:
|
||||
"""
|
||||
It is remotely possible that peer is no longer in knownnodes.knownNodes.
|
||||
This could happen if two outgoingSynSender threads both try to
|
||||
connect to the same peer, both fail, and then both try to remove
|
||||
it from knownnodes.knownNodes. This is unlikely because of the
|
||||
alreadyAttemptedConnectionsList but because we clear that list once
|
||||
every half hour, it can happen.
|
||||
"""
|
||||
if peer in knownnodes.knownNodes[self.streamNumber]:
|
||||
timeLastSeen = knownnodes.knownNodes[self.streamNumber][peer]
|
||||
if (int(time.time()) - timeLastSeen) > 172800 and len(knownnodes.knownNodes[self.streamNumber]) > 1000: # for nodes older than 48 hours old if we have more than 1000 hosts in our list, delete from the knownnodes.knownNodes data-structure.
|
||||
del knownnodes.knownNodes[self.streamNumber][peer]
|
||||
deletedPeer = peer
|
||||
if deletedPeer:
|
||||
str ('deleting ' + str(peer) + ' from knownnodes.knownNodes because it is more than 48 hours old and we could not connect to it.')
|
||||
|
||||
except socks.Socks5AuthError as err:
|
||||
queues.UISignalQueue.put((
|
||||
'updateStatusBar', tr._translate(
|
||||
"MainWindow", "SOCKS5 Authentication problem: %1. Please check your SOCKS5 settings.").arg(str(err))))
|
||||
except socks.Socks5Error as err:
|
||||
if err[0][0] in [3, 4, 5, 6]:
|
||||
# this is a more bening "error": host unreachable, network unreachable, connection refused, TTL expired
|
||||
logger.debug('SOCKS5 error: %s', str(err))
|
||||
else:
|
||||
logger.error('SOCKS5 error: %s', str(err))
|
||||
if err[0][0] == 4 or err[0][0] == 2:
|
||||
state.networkProtocolAvailability[protocol.networkType(peer.host)] = False
|
||||
except socks.Socks4Error as err:
|
||||
logger.error('Socks4Error: ' + str(err))
|
||||
except socket.error as err:
|
||||
if BMConfigParser().get('bitmessagesettings', 'socksproxytype')[0:5] == 'SOCKS':
|
||||
logger.error('Bitmessage MIGHT be having trouble connecting to the SOCKS server. ' + str(err))
|
||||
else:
|
||||
if err[0] == errno.ENETUNREACH:
|
||||
state.networkProtocolAvailability[protocol.networkType(peer.host)] = False
|
||||
if shared.verbose >= 1:
|
||||
logger.debug('Could NOT connect to ' + str(peer) + 'during outgoing attempt. ' + str(err))
|
||||
|
||||
deletedPeer = None
|
||||
with knownnodes.knownNodesLock:
|
||||
"""
|
||||
It is remotely possible that peer is no longer in knownnodes.knownNodes.
|
||||
This could happen if two outgoingSynSender threads both try to
|
||||
connect to the same peer, both fail, and then both try to remove
|
||||
it from knownnodes.knownNodes. This is unlikely because of the
|
||||
alreadyAttemptedConnectionsList but because we clear that list once
|
||||
every half hour, it can happen.
|
||||
"""
|
||||
if peer in knownnodes.knownNodes[self.streamNumber]:
|
||||
timeLastSeen = knownnodes.knownNodes[self.streamNumber][peer]
|
||||
if (int(time.time()) - timeLastSeen) > 172800 and len(knownnodes.knownNodes[self.streamNumber]) > 1000: # for nodes older than 48 hours old if we have more than 1000 hosts in our list, delete from the knownnodes.knownNodes data-structure.
|
||||
del knownnodes.knownNodes[self.streamNumber][peer]
|
||||
deletedPeer = peer
|
||||
if deletedPeer:
|
||||
logger.debug('deleting ' + str(peer) + ' from knownnodes.knownNodes because it is more than 48 hours old and we could not connect to it.')
|
||||
|
||||
except Exception as err:
|
||||
import traceback
|
||||
logger.exception('An exception has occurred in the outgoingSynSender thread that was not caught by other exception types:')
|
||||
self.stop.wait(0.1)
|
|
@ -1,879 +0,0 @@
|
|||
doTimingAttackMitigation = False
|
||||
|
||||
import base64
|
||||
import datetime
|
||||
import errno
|
||||
import math
|
||||
import time
|
||||
import threading
|
||||
import shared
|
||||
import hashlib
|
||||
import os
|
||||
import Queue
|
||||
import select
|
||||
import socket
|
||||
import random
|
||||
import ssl
|
||||
from struct import unpack, pack
|
||||
import sys
|
||||
import traceback
|
||||
from binascii import hexlify
|
||||
#import string
|
||||
#from subprocess import call # used when the API must execute an outside program
|
||||
#from pyelliptic.openssl import OpenSSL
|
||||
|
||||
#import highlevelcrypto
|
||||
from addresses import *
|
||||
from bmconfigparser import BMConfigParser
|
||||
from class_objectHashHolder import objectHashHolder
|
||||
from helper_generic import addDataPadding, isHostInPrivateIPRange
|
||||
from helper_sql import sqlQuery
|
||||
import knownnodes
|
||||
from debug import logger
|
||||
import paths
|
||||
import protocol
|
||||
from inventory import Inventory, PendingDownloadQueue, PendingUpload
|
||||
import queues
|
||||
import state
|
||||
import throttle
|
||||
import tr
|
||||
from version import softwareVersion
|
||||
|
||||
# This thread is created either by the synSenderThread(for outgoing
|
||||
# connections) or the singleListenerThread(for incoming connections).
|
||||
|
||||
class receiveDataThread(threading.Thread):
|
||||
|
||||
def __init__(self):
|
||||
threading.Thread.__init__(self, name="receiveData")
|
||||
self.data = ''
|
||||
self.verackSent = False
|
||||
self.verackReceived = False
|
||||
|
||||
def setup(
|
||||
self,
|
||||
sock,
|
||||
HOST,
|
||||
port,
|
||||
streamNumber,
|
||||
selfInitiatedConnections,
|
||||
sendDataThreadQueue,
|
||||
objectHashHolderInstance):
|
||||
|
||||
self.sock = sock
|
||||
self.peer = state.Peer(HOST, port)
|
||||
self.name = "receiveData-" + self.peer.host.replace(":", ".") # ":" log parser field separator
|
||||
self.streamNumber = state.streamsInWhichIAmParticipating
|
||||
self.remoteStreams = []
|
||||
self.selfInitiatedConnections = selfInitiatedConnections
|
||||
self.sendDataThreadQueue = sendDataThreadQueue # used to send commands and data to the sendDataThread
|
||||
self.hostIdent = self.peer.port if ".onion" in BMConfigParser().get('bitmessagesettings', 'onionhostname') and protocol.checkSocksIP(self.peer.host) else self.peer.host
|
||||
shared.connectedHostsList[
|
||||
self.hostIdent] = 0 # The very fact that this receiveData thread exists shows that we are connected to the remote host. Let's add it to this list so that an outgoingSynSender thread doesn't try to connect to it.
|
||||
self.connectionIsOrWasFullyEstablished = False # set to true after the remote node and I accept each other's version messages. This is needed to allow the user interface to accurately reflect the current number of connections.
|
||||
self.services = 0
|
||||
if streamNumber == -1: # This was an incoming connection. Send out a version message if we accept the other node's version message.
|
||||
self.initiatedConnection = False
|
||||
else:
|
||||
self.initiatedConnection = True
|
||||
for stream in self.streamNumber:
|
||||
self.selfInitiatedConnections[stream][self] = 0
|
||||
self.objectHashHolderInstance = objectHashHolderInstance
|
||||
self.downloadQueue = PendingDownloadQueue()
|
||||
self.startTime = time.time()
|
||||
|
||||
def run(self):
|
||||
logger.debug('receiveDataThread starting. ID ' + str(id(self)) + '. The size of the shared.connectedHostsList is now ' + str(len(shared.connectedHostsList)))
|
||||
|
||||
while state.shutdown == 0:
|
||||
dataLen = len(self.data)
|
||||
try:
|
||||
isSSL = False
|
||||
if ((self.services & protocol.NODE_SSL == protocol.NODE_SSL) and
|
||||
self.connectionIsOrWasFullyEstablished and
|
||||
protocol.haveSSL(not self.initiatedConnection)):
|
||||
isSSL = True
|
||||
dataRecv = self.sslSock.recv(throttle.ReceiveThrottle().chunkSize)
|
||||
else:
|
||||
dataRecv = self.sock.recv(throttle.ReceiveThrottle().chunkSize)
|
||||
self.data += dataRecv
|
||||
throttle.ReceiveThrottle().wait(len(dataRecv))
|
||||
except socket.timeout:
|
||||
if self.connectionIsOrWasFullyEstablished:
|
||||
self.sendping("Still around!")
|
||||
continue
|
||||
logger.error("Timeout during protocol initialisation")
|
||||
break
|
||||
except ssl.SSLError as err:
|
||||
if err.errno == ssl.SSL_ERROR_WANT_READ:
|
||||
select.select([self.sslSock], [], [], 10)
|
||||
logger.debug('sock.recv retriable SSL error')
|
||||
continue
|
||||
if err.errno is None and 'timed out' in str(err):
|
||||
if self.connectionIsOrWasFullyEstablished:
|
||||
self.sendping("Still around!")
|
||||
continue
|
||||
logger.error ('SSL error: %i/%s', err.errno if err.errno else 0, str(err))
|
||||
break
|
||||
except socket.error as err:
|
||||
if err.errno in (errno.EAGAIN, errno.EWOULDBLOCK) or \
|
||||
(sys.platform.startswith('win') and \
|
||||
err.errno == errno.WSAEWOULDBLOCK):
|
||||
select.select([self.sslSock if isSSL else self.sock], [], [], 10)
|
||||
logger.debug('sock.recv retriable error')
|
||||
continue
|
||||
logger.error('sock.recv error. Closing receiveData thread, %s', str(err))
|
||||
break
|
||||
# print 'Received', repr(self.data)
|
||||
if len(self.data) == dataLen: # If self.sock.recv returned no data:
|
||||
logger.debug('Connection to ' + str(self.peer) + ' closed. Closing receiveData thread')
|
||||
break
|
||||
else:
|
||||
self.processData()
|
||||
|
||||
try:
|
||||
for stream in self.streamNumber:
|
||||
try:
|
||||
del self.selfInitiatedConnections[stream][self]
|
||||
except KeyError:
|
||||
pass
|
||||
logger.debug('removed self (a receiveDataThread) from selfInitiatedConnections')
|
||||
except:
|
||||
pass
|
||||
self.sendDataThreadQueue.put((0, 'shutdown','no data')) # commands the corresponding sendDataThread to shut itself down.
|
||||
try:
|
||||
del shared.connectedHostsList[self.hostIdent]
|
||||
except Exception as err:
|
||||
logger.error('Could not delete ' + str(self.hostIdent) + ' from shared.connectedHostsList.' + str(err))
|
||||
|
||||
queues.UISignalQueue.put(('updateNetworkStatusTab', 'no data'))
|
||||
self.checkTimeOffsetNotification()
|
||||
logger.debug('receiveDataThread ending. ID ' + str(id(self)) + '. The size of the shared.connectedHostsList is now ' + str(len(shared.connectedHostsList)))
|
||||
|
||||
def antiIntersectionDelay(self, initial = False):
|
||||
# estimated time for a small object to propagate across the whole network
|
||||
delay = math.ceil(math.log(max(len(knownnodes.knownNodes[x]) for x in knownnodes.knownNodes) + 2, 20)) * (0.2 + objectHashHolder.size/2)
|
||||
# take the stream with maximum amount of nodes
|
||||
# +2 is to avoid problems with log(0) and log(1)
|
||||
# 20 is avg connected nodes count
|
||||
# 0.2 is avg message transmission time
|
||||
now = time.time()
|
||||
if initial and now - delay < self.startTime:
|
||||
logger.debug("Initial sleeping for %.2fs", delay - (now - self.startTime))
|
||||
time.sleep(delay - (now - self.startTime))
|
||||
elif not initial:
|
||||
logger.debug("Sleeping due to missing object for %.2fs", delay)
|
||||
time.sleep(delay)
|
||||
|
||||
def checkTimeOffsetNotification(self):
|
||||
if shared.timeOffsetWrongCount >= 4 and not self.connectionIsOrWasFullyEstablished:
|
||||
queues.UISignalQueue.put(('updateStatusBar', tr._translate("MainWindow", "The time on your computer, %1, may be wrong. Please verify your settings.").arg(datetime.datetime.now().strftime("%H:%M:%S"))))
|
||||
|
||||
def processData(self):
|
||||
if len(self.data) < protocol.Header.size: # if so little of the data has arrived that we can't even read the checksum then wait for more data.
|
||||
return
|
||||
|
||||
magic,command,payloadLength,checksum = protocol.Header.unpack(self.data[:protocol.Header.size])
|
||||
if magic != 0xE9BEB4D9:
|
||||
self.data = ""
|
||||
return
|
||||
if payloadLength > 1600100: # ~1.6 MB which is the maximum possible size of an inv message.
|
||||
logger.info('The incoming message, which we have not yet download, is too large. Ignoring it. (unfortunately there is no way to tell the other node to stop sending it except to disconnect.) Message size: %s' % payloadLength)
|
||||
self.data = self.data[payloadLength + protocol.Header.size:]
|
||||
del magic,command,payloadLength,checksum # we don't need these anymore and better to clean them now before the recursive call rather than after
|
||||
self.processData()
|
||||
return
|
||||
if len(self.data) < payloadLength + protocol.Header.size: # check if the whole message has arrived yet.
|
||||
return
|
||||
payload = self.data[protocol.Header.size:payloadLength + protocol.Header.size]
|
||||
if checksum != hashlib.sha512(payload).digest()[0:4]: # test the checksum in the message.
|
||||
logger.error('Checksum incorrect. Clearing this message.')
|
||||
self.data = self.data[payloadLength + protocol.Header.size:]
|
||||
del magic,command,payloadLength,checksum,payload # better to clean up before the recursive call
|
||||
self.processData()
|
||||
return
|
||||
|
||||
# The time we've last seen this node is obviously right now since we
|
||||
# just received valid data from it. So update the knownNodes list so
|
||||
# that other peers can be made aware of its existance.
|
||||
if self.initiatedConnection and self.connectionIsOrWasFullyEstablished: # The remote port is only something we should share with others if it is the remote node's incoming port (rather than some random operating-system-assigned outgoing port).
|
||||
with knownnodes.knownNodesLock:
|
||||
for stream in self.streamNumber:
|
||||
knownnodes.knownNodes[stream][self.peer] = int(time.time())
|
||||
|
||||
#Strip the nulls
|
||||
command = command.rstrip('\x00')
|
||||
logger.debug('remoteCommand ' + repr(command) + ' from ' + str(self.peer))
|
||||
|
||||
try:
|
||||
#TODO: Use a dispatcher here
|
||||
if command == 'error':
|
||||
self.recerror(payload)
|
||||
elif not self.connectionIsOrWasFullyEstablished:
|
||||
if command == 'version':
|
||||
self.recversion(payload)
|
||||
elif command == 'verack':
|
||||
self.recverack()
|
||||
else:
|
||||
if command == 'addr':
|
||||
self.recaddr(payload)
|
||||
elif command == 'inv':
|
||||
self.recinv(payload)
|
||||
elif command == 'getdata':
|
||||
self.recgetdata(payload)
|
||||
elif command == 'object':
|
||||
self.recobject(payload)
|
||||
elif command == 'ping':
|
||||
self.sendpong(payload)
|
||||
elif command == 'pong':
|
||||
pass
|
||||
else:
|
||||
logger.info("Unknown command %s, ignoring", command)
|
||||
except varintDecodeError as e:
|
||||
logger.debug("There was a problem with a varint while processing a message from the wire. Some details: %s" % e)
|
||||
except Exception as e:
|
||||
logger.critical("Critical error in a receiveDataThread: \n%s" % traceback.format_exc())
|
||||
|
||||
del payload
|
||||
self.data = self.data[payloadLength + protocol.Header.size:] # take this message out and then process the next message
|
||||
|
||||
if self.data == '': # if there are no more messages
|
||||
toRequest = []
|
||||
try:
|
||||
for i in range(len(self.downloadQueue.pending), 100):
|
||||
while True:
|
||||
hashId = self.downloadQueue.get(False)
|
||||
if not hashId in Inventory():
|
||||
toRequest.append(hashId)
|
||||
break
|
||||
# don't track download for duplicates
|
||||
self.downloadQueue.task_done(hashId)
|
||||
except Queue.Empty:
|
||||
pass
|
||||
if len(toRequest) > 0:
|
||||
self.sendgetdata(toRequest)
|
||||
self.processData()
|
||||
|
||||
def sendpong(self, payload):
|
||||
logger.debug('Sending pong')
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.CreatePacket('pong', payload)))
|
||||
|
||||
def sendping(self, payload):
|
||||
logger.debug('Sending ping')
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.CreatePacket('ping', payload)))
|
||||
|
||||
def recverack(self):
|
||||
logger.debug('verack received')
|
||||
self.verackReceived = True
|
||||
if self.verackSent:
|
||||
# We have thus both sent and received a verack.
|
||||
self.connectionFullyEstablished()
|
||||
|
||||
def sslHandshake(self):
|
||||
self.sslSock = self.sock
|
||||
if ((self.services & protocol.NODE_SSL == protocol.NODE_SSL) and
|
||||
protocol.haveSSL(not self.initiatedConnection)):
|
||||
logger.debug("Initialising TLS")
|
||||
if sys.version_info >= (2,7,9):
|
||||
context = ssl.SSLContext(protocol.sslProtocolVersion)
|
||||
context.set_ciphers(protocol.sslProtocolCiphers)
|
||||
context.set_ecdh_curve("secp256k1")
|
||||
context.check_hostname = False
|
||||
context.verify_mode = ssl.CERT_NONE
|
||||
# also exclude TLSv1 and TLSv1.1 in the future
|
||||
context.options = ssl.OP_ALL | ssl.OP_NO_SSLv2 | ssl.OP_NO_SSLv3 | ssl.OP_SINGLE_ECDH_USE | ssl.OP_CIPHER_SERVER_PREFERENCE
|
||||
self.sslSock = context.wrap_socket(self.sock, server_side = not self.initiatedConnection, do_handshake_on_connect=False)
|
||||
else:
|
||||
self.sslSock = ssl.wrap_socket(self.sock, keyfile = os.path.join(paths.codePath(), 'sslkeys', 'key.pem'), certfile = os.path.join(paths.codePath(), 'sslkeys', 'cert.pem'), server_side = not self.initiatedConnection, ssl_version=protocol.sslProtocolVersion, do_handshake_on_connect=False, ciphers=protocol.sslProtocolCiphers)
|
||||
self.sendDataThreadQueue.join()
|
||||
while True:
|
||||
try:
|
||||
self.sslSock.do_handshake()
|
||||
logger.debug("TLS handshake success")
|
||||
if sys.version_info >= (2, 7, 9):
|
||||
logger.debug("TLS protocol version: %s", self.sslSock.version())
|
||||
break
|
||||
except ssl.SSLError as e:
|
||||
if sys.hexversion >= 0x02070900:
|
||||
if isinstance (e, ssl.SSLWantReadError):
|
||||
logger.debug("Waiting for SSL socket handhake read")
|
||||
select.select([self.sslSock], [], [], 10)
|
||||
continue
|
||||
elif isinstance (e, ssl.SSLWantWriteError):
|
||||
logger.debug("Waiting for SSL socket handhake write")
|
||||
select.select([], [self.sslSock], [], 10)
|
||||
continue
|
||||
else:
|
||||
if e.args[0] == ssl.SSL_ERROR_WANT_READ:
|
||||
logger.debug("Waiting for SSL socket handhake read")
|
||||
select.select([self.sslSock], [], [], 10)
|
||||
continue
|
||||
elif e.args[0] == ssl.SSL_ERROR_WANT_WRITE:
|
||||
logger.debug("Waiting for SSL socket handhake write")
|
||||
select.select([], [self.sslSock], [], 10)
|
||||
continue
|
||||
logger.error("SSL socket handhake failed: shutting down connection, %s", str(e))
|
||||
self.sendDataThreadQueue.put((0, 'shutdown','tls handshake fail %s' % (str(e))))
|
||||
return False
|
||||
except socket.error as err:
|
||||
logger.debug('SSL socket handshake failed, shutting down connection, %s', str(err))
|
||||
self.sendDataThreadQueue.put((0, 'shutdown','tls handshake fail'))
|
||||
return False
|
||||
except Exception:
|
||||
logger.error("SSL socket handhake failed, shutting down connection", exc_info=True)
|
||||
self.sendDataThreadQueue.put((0, 'shutdown','tls handshake fail'))
|
||||
return False
|
||||
# SSL in the background should be blocking, otherwise the error handling is difficult
|
||||
self.sslSock.settimeout(None)
|
||||
return True
|
||||
# no SSL
|
||||
return True
|
||||
|
||||
def peerValidityChecks(self):
|
||||
if self.remoteProtocolVersion < 3:
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData',protocol.assembleErrorMessage(
|
||||
fatal=2, errorText="Your is using an old protocol. Closing connection.")))
|
||||
logger.debug ('Closing connection to old protocol version ' + str(self.remoteProtocolVersion) + ' node: ' + str(self.peer))
|
||||
return False
|
||||
if self.timeOffset > 3600:
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.assembleErrorMessage(
|
||||
fatal=2, errorText="Your time is too far in the future compared to mine. Closing connection.")))
|
||||
logger.info("%s's time is too far in the future (%s seconds). Closing connection to it.", self.peer, self.timeOffset)
|
||||
shared.timeOffsetWrongCount += 1
|
||||
time.sleep(2)
|
||||
return False
|
||||
elif self.timeOffset < -3600:
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.assembleErrorMessage(
|
||||
fatal=2, errorText="Your time is too far in the past compared to mine. Closing connection.")))
|
||||
logger.info("%s's time is too far in the past (timeOffset %s seconds). Closing connection to it.", self.peer, self.timeOffset)
|
||||
shared.timeOffsetWrongCount += 1
|
||||
return False
|
||||
else:
|
||||
shared.timeOffsetWrongCount = 0
|
||||
if len(self.streamNumber) == 0:
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.assembleErrorMessage(
|
||||
fatal=2, errorText="We don't have shared stream interests. Closing connection.")))
|
||||
logger.debug ('Closed connection to ' + str(self.peer) + ' because there is no overlapping interest in streams.')
|
||||
return False
|
||||
return True
|
||||
|
||||
def connectionFullyEstablished(self):
|
||||
if self.connectionIsOrWasFullyEstablished:
|
||||
# there is no reason to run this function a second time
|
||||
return
|
||||
|
||||
if not self.sslHandshake():
|
||||
return
|
||||
|
||||
if self.peerValidityChecks() == False:
|
||||
time.sleep(2)
|
||||
self.sendDataThreadQueue.put((0, 'shutdown','no data'))
|
||||
self.checkTimeOffsetNotification()
|
||||
return
|
||||
|
||||
self.connectionIsOrWasFullyEstablished = True
|
||||
shared.timeOffsetWrongCount = 0
|
||||
|
||||
# Command the corresponding sendDataThread to set its own connectionIsOrWasFullyEstablished variable to True also
|
||||
self.sendDataThreadQueue.put((0, 'connectionIsOrWasFullyEstablished', (self.services, self.sslSock)))
|
||||
|
||||
if not self.initiatedConnection:
|
||||
shared.clientHasReceivedIncomingConnections = True
|
||||
queues.UISignalQueue.put(('setStatusIcon', 'green'))
|
||||
self.sock.settimeout(
|
||||
600) # We'll send out a ping every 5 minutes to make sure the connection stays alive if there has been no other traffic to send lately.
|
||||
queues.UISignalQueue.put(('updateNetworkStatusTab', 'no data'))
|
||||
logger.debug('Connection fully established with ' + str(self.peer) + "\n" + \
|
||||
'The size of the connectedHostsList is now ' + str(len(shared.connectedHostsList)) + "\n" + \
|
||||
'The length of sendDataQueues is now: ' + str(len(state.sendDataQueues)) + "\n" + \
|
||||
'broadcasting addr from within connectionFullyEstablished function.')
|
||||
|
||||
if self.initiatedConnection:
|
||||
state.networkProtocolAvailability[protocol.networkType(self.peer.host)] = True
|
||||
|
||||
# we need to send our own objects to this node
|
||||
PendingUpload().add()
|
||||
|
||||
# Let all of our peers know about this new node.
|
||||
for stream in self.remoteStreams:
|
||||
dataToSend = (int(time.time()), stream, self.services, self.peer.host, self.remoteNodeIncomingPort)
|
||||
protocol.broadcastToSendDataQueues((
|
||||
stream, 'advertisepeer', dataToSend))
|
||||
|
||||
self.sendaddr() # This is one large addr message to this one peer.
|
||||
if len(shared.connectedHostsList) > \
|
||||
BMConfigParser().safeGetInt("bitmessagesettings", "maxtotalconnections", 200):
|
||||
logger.info ('We are connected to too many people. Closing connection.')
|
||||
if self.initiatedConnection:
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.assembleErrorMessage(fatal=2, errorText="Thank you for providing a listening node.")))
|
||||
else:
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.assembleErrorMessage(fatal=2, errorText="Server full, please try again later.")))
|
||||
self.sendDataThreadQueue.put((0, 'shutdown','no data'))
|
||||
return
|
||||
self.sendBigInv()
|
||||
|
||||
def sendBigInv(self):
|
||||
# Select all hashes for objects in this stream.
|
||||
bigInvList = {}
|
||||
for stream in self.streamNumber:
|
||||
for hash in Inventory().unexpired_hashes_by_stream(stream):
|
||||
if not self.objectHashHolderInstance.hasHash(hash):
|
||||
bigInvList[hash] = 0
|
||||
numberOfObjectsInInvMessage = 0
|
||||
payload = ''
|
||||
# Now let us start appending all of these hashes together. They will be
|
||||
# sent out in a big inv message to our new peer.
|
||||
for hash, storedValue in bigInvList.items():
|
||||
payload += hash
|
||||
numberOfObjectsInInvMessage += 1
|
||||
if numberOfObjectsInInvMessage == 50000: # We can only send a max of 50000 items per inv message but we may have more objects to advertise. They must be split up into multiple inv messages.
|
||||
self.sendinvMessageToJustThisOnePeer(
|
||||
numberOfObjectsInInvMessage, payload)
|
||||
payload = ''
|
||||
numberOfObjectsInInvMessage = 0
|
||||
if numberOfObjectsInInvMessage > 0:
|
||||
self.sendinvMessageToJustThisOnePeer(
|
||||
numberOfObjectsInInvMessage, payload)
|
||||
|
||||
# Used to send a big inv message when the connection with a node is
|
||||
# first fully established. Notice that there is also a broadcastinv
|
||||
# function for broadcasting invs to everyone in our stream.
|
||||
def sendinvMessageToJustThisOnePeer(self, numberOfObjects, payload):
|
||||
payload = encodeVarint(numberOfObjects) + payload
|
||||
logger.debug('Sending huge inv message with ' + str(numberOfObjects) + ' objects to just this one peer')
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.CreatePacket('inv', payload)))
|
||||
|
||||
def _sleepForTimingAttackMitigation(self, sleepTime):
|
||||
# We don't need to do the timing attack mitigation if we are
|
||||
# only connected to the trusted peer because we can trust the
|
||||
# peer not to attack
|
||||
if sleepTime > 0 and doTimingAttackMitigation and state.trustedPeer == None:
|
||||
logger.debug('Timing attack mitigation: Sleeping for ' + str(sleepTime) + ' seconds.')
|
||||
time.sleep(sleepTime)
|
||||
|
||||
def recerror(self, data):
|
||||
"""
|
||||
The remote node has been polite enough to send you an error message.
|
||||
"""
|
||||
fatalStatus, readPosition = decodeVarint(data[:10])
|
||||
banTime, banTimeLength = decodeVarint(data[readPosition:readPosition+10])
|
||||
readPosition += banTimeLength
|
||||
inventoryVectorLength, inventoryVectorLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
||||
if inventoryVectorLength > 100:
|
||||
return
|
||||
readPosition += inventoryVectorLengthLength
|
||||
inventoryVector = data[readPosition:readPosition+inventoryVectorLength]
|
||||
readPosition += inventoryVectorLength
|
||||
errorTextLength, errorTextLengthLength = decodeVarint(data[readPosition:readPosition+10])
|
||||
if errorTextLength > 1000:
|
||||
return
|
||||
readPosition += errorTextLengthLength
|
||||
errorText = data[readPosition:readPosition+errorTextLength]
|
||||
if fatalStatus == 0:
|
||||
fatalHumanFriendly = 'Warning'
|
||||
elif fatalStatus == 1:
|
||||
fatalHumanFriendly = 'Error'
|
||||
elif fatalStatus == 2:
|
||||
fatalHumanFriendly = 'Fatal'
|
||||
message = '%s message received from %s: %s.' % (fatalHumanFriendly, self.peer, errorText)
|
||||
if inventoryVector:
|
||||
message += " This concerns object %s" % hexlify(inventoryVector)
|
||||
if banTime > 0:
|
||||
message += " Remote node says that the ban time is %s" % banTime
|
||||
logger.error(message)
|
||||
|
||||
|
||||
def recobject(self, data):
|
||||
self.messageProcessingStartTime = time.time()
|
||||
lengthOfTimeWeShouldUseToProcessThisMessage = shared.checkAndShareObjectWithPeers(data)
|
||||
self.downloadQueue.task_done(calculateInventoryHash(data))
|
||||
|
||||
"""
|
||||
Sleeping will help guarantee that we can process messages faster than a
|
||||
remote node can send them. If we fall behind, the attacker could observe
|
||||
that we are are slowing down the rate at which we request objects from the
|
||||
network which would indicate that we own a particular address (whichever
|
||||
one to which they are sending all of their attack messages). Note
|
||||
that if an attacker connects to a target with many connections, this
|
||||
mitigation mechanism might not be sufficient.
|
||||
"""
|
||||
sleepTime = lengthOfTimeWeShouldUseToProcessThisMessage - (time.time() - self.messageProcessingStartTime)
|
||||
self._sleepForTimingAttackMitigation(sleepTime)
|
||||
|
||||
|
||||
# We have received an inv message
|
||||
def recinv(self, data):
|
||||
numberOfItemsInInv, lengthOfVarint = decodeVarint(data[:10])
|
||||
if numberOfItemsInInv > 50000:
|
||||
sys.stderr.write('Too many items in inv message!')
|
||||
return
|
||||
if len(data) < lengthOfVarint + (numberOfItemsInInv * 32):
|
||||
logger.info('inv message doesn\'t contain enough data. Ignoring.')
|
||||
return
|
||||
|
||||
startTime = time.time()
|
||||
advertisedSet = set()
|
||||
for i in range(numberOfItemsInInv):
|
||||
advertisedSet.add(data[lengthOfVarint + (32 * i):32 + lengthOfVarint + (32 * i)])
|
||||
objectsNewToMe = advertisedSet
|
||||
for stream in self.streamNumber:
|
||||
objectsNewToMe -= Inventory().hashes_by_stream(stream)
|
||||
logger.info('inv message lists %s objects. Of those %s are new to me. It took %s seconds to figure that out.', numberOfItemsInInv, len(objectsNewToMe), time.time()-startTime)
|
||||
for item in random.sample(objectsNewToMe, len(objectsNewToMe)):
|
||||
self.downloadQueue.put(item)
|
||||
|
||||
# Send a getdata message to our peer to request the object with the given
|
||||
# hash
|
||||
def sendgetdata(self, hashes):
|
||||
if len(hashes) == 0:
|
||||
return
|
||||
logger.debug('sending getdata to retrieve %i objects', len(hashes))
|
||||
payload = encodeVarint(len(hashes)) + ''.join(hashes)
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.CreatePacket('getdata', payload)), False)
|
||||
|
||||
|
||||
# We have received a getdata request from our peer
|
||||
def recgetdata(self, data):
|
||||
numberOfRequestedInventoryItems, lengthOfVarint = decodeVarint(
|
||||
data[:10])
|
||||
if len(data) < lengthOfVarint + (32 * numberOfRequestedInventoryItems):
|
||||
logger.debug('getdata message does not contain enough data. Ignoring.')
|
||||
return
|
||||
self.antiIntersectionDelay(True) # only handle getdata requests if we have been connected long enough
|
||||
for i in xrange(numberOfRequestedInventoryItems):
|
||||
hash = data[lengthOfVarint + (
|
||||
i * 32):32 + lengthOfVarint + (i * 32)]
|
||||
logger.debug('received getdata request for item:' + hexlify(hash))
|
||||
|
||||
if self.objectHashHolderInstance.hasHash(hash):
|
||||
self.antiIntersectionDelay()
|
||||
else:
|
||||
if hash in Inventory():
|
||||
self.sendObject(hash, Inventory()[hash].payload)
|
||||
else:
|
||||
self.antiIntersectionDelay()
|
||||
logger.warning('%s asked for an object with a getdata which is not in either our memory inventory or our SQL inventory. We probably cleaned it out after advertising it but before they got around to asking for it.' % (self.peer,))
|
||||
|
||||
# Our peer has requested (in a getdata message) that we send an object.
|
||||
def sendObject(self, hash, payload):
|
||||
logger.debug('sending an object.')
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', (hash, protocol.CreatePacket('object',payload))))
|
||||
|
||||
def _checkIPAddress(self, host):
|
||||
if host[0:12] == '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xFF\xFF':
|
||||
hostStandardFormat = socket.inet_ntop(socket.AF_INET, host[12:])
|
||||
return self._checkIPv4Address(host[12:], hostStandardFormat)
|
||||
elif host[0:6] == '\xfd\x87\xd8\x7e\xeb\x43':
|
||||
# Onion, based on BMD/bitcoind
|
||||
hostStandardFormat = base64.b32encode(host[6:]).lower() + ".onion"
|
||||
return hostStandardFormat
|
||||
else:
|
||||
hostStandardFormat = socket.inet_ntop(socket.AF_INET6, host)
|
||||
if hostStandardFormat == "":
|
||||
# This can happen on Windows systems which are not 64-bit compatible
|
||||
# so let us drop the IPv6 address.
|
||||
return False
|
||||
return self._checkIPv6Address(host, hostStandardFormat)
|
||||
|
||||
def _checkIPv4Address(self, host, hostStandardFormat):
|
||||
if host[0] == '\x7F': # 127/8
|
||||
logger.debug('Ignoring IP address in loopback range: ' + hostStandardFormat)
|
||||
return False
|
||||
if host[0] == '\x0A': # 10/8
|
||||
logger.debug('Ignoring IP address in private range: ' + hostStandardFormat)
|
||||
return False
|
||||
if host[0:2] == '\xC0\xA8': # 192.168/16
|
||||
logger.debug('Ignoring IP address in private range: ' + hostStandardFormat)
|
||||
return False
|
||||
if host[0:2] >= '\xAC\x10' and host[0:2] < '\xAC\x20': # 172.16/12
|
||||
logger.debug('Ignoring IP address in private range:' + hostStandardFormat)
|
||||
return False
|
||||
return hostStandardFormat
|
||||
|
||||
def _checkIPv6Address(self, host, hostStandardFormat):
|
||||
if host == ('\x00' * 15) + '\x01':
|
||||
logger.debug('Ignoring loopback address: ' + hostStandardFormat)
|
||||
return False
|
||||
if host[0] == '\xFE' and (ord(host[1]) & 0xc0) == 0x80:
|
||||
logger.debug ('Ignoring local address: ' + hostStandardFormat)
|
||||
return False
|
||||
if (ord(host[0]) & 0xfe) == 0xfc:
|
||||
logger.debug ('Ignoring unique local address: ' + hostStandardFormat)
|
||||
return False
|
||||
return hostStandardFormat
|
||||
|
||||
# We have received an addr message.
|
||||
def recaddr(self, data):
|
||||
numberOfAddressesIncluded, lengthOfNumberOfAddresses = decodeVarint(
|
||||
data[:10])
|
||||
|
||||
if shared.verbose >= 1:
|
||||
logger.debug('addr message contains ' + str(numberOfAddressesIncluded) + ' IP addresses.')
|
||||
|
||||
if numberOfAddressesIncluded > 1000 or numberOfAddressesIncluded == 0:
|
||||
return
|
||||
if len(data) != lengthOfNumberOfAddresses + (38 * numberOfAddressesIncluded):
|
||||
logger.debug('addr message does not contain the correct amount of data. Ignoring.')
|
||||
return
|
||||
|
||||
for i in range(0, numberOfAddressesIncluded):
|
||||
fullHost = data[20 + lengthOfNumberOfAddresses + (38 * i):36 + lengthOfNumberOfAddresses + (38 * i)]
|
||||
recaddrStream, = unpack('>I', data[8 + lengthOfNumberOfAddresses + (
|
||||
38 * i):12 + lengthOfNumberOfAddresses + (38 * i)])
|
||||
if recaddrStream == 0:
|
||||
continue
|
||||
if recaddrStream not in self.streamNumber and (recaddrStream / 2) not in self.streamNumber: # if the embedded stream number and its parent are not in my streams then ignore it. Someone might be trying funny business.
|
||||
continue
|
||||
recaddrServices, = unpack('>Q', data[12 + lengthOfNumberOfAddresses + (
|
||||
38 * i):20 + lengthOfNumberOfAddresses + (38 * i)])
|
||||
recaddrPort, = unpack('>H', data[36 + lengthOfNumberOfAddresses + (
|
||||
38 * i):38 + lengthOfNumberOfAddresses + (38 * i)])
|
||||
hostStandardFormat = self._checkIPAddress(fullHost)
|
||||
if hostStandardFormat is False:
|
||||
continue
|
||||
if recaddrPort == 0:
|
||||
continue
|
||||
timeSomeoneElseReceivedMessageFromThisNode, = unpack('>Q', data[lengthOfNumberOfAddresses + (
|
||||
38 * i):8 + lengthOfNumberOfAddresses + (38 * i)]) # This is the 'time' value in the received addr message. 64-bit.
|
||||
if recaddrStream not in knownnodes.knownNodes: # knownNodes is a dictionary of dictionaries with one outer dictionary for each stream. If the outer stream dictionary doesn't exist yet then we must make it.
|
||||
with knownnodes.knownNodesLock:
|
||||
knownnodes.knownNodes[recaddrStream] = {}
|
||||
peerFromAddrMessage = state.Peer(hostStandardFormat, recaddrPort)
|
||||
if peerFromAddrMessage not in knownnodes.knownNodes[recaddrStream]:
|
||||
# only if recent
|
||||
if timeSomeoneElseReceivedMessageFromThisNode > (int(time.time()) - 10800) and timeSomeoneElseReceivedMessageFromThisNode < (int(time.time()) + 10800):
|
||||
# bootstrap provider?
|
||||
if BMConfigParser().safeGetInt('bitmessagesettings', 'maxoutboundconnections') >= \
|
||||
BMConfigParser().safeGetInt('bitmessagesettings', 'maxtotalconnections', 200):
|
||||
knownnodes.trimKnownNodes(recaddrStream)
|
||||
with knownnodes.knownNodesLock:
|
||||
knownnodes.knownNodes[recaddrStream][peerFromAddrMessage] = int(time.time()) - 86400 # penalise initially by 1 day
|
||||
logger.debug('added new node ' + str(peerFromAddrMessage) + ' to knownNodes in stream ' + str(recaddrStream))
|
||||
shared.needToWriteKnownNodesToDisk = True
|
||||
# normal mode
|
||||
elif len(knownnodes.knownNodes[recaddrStream]) < 20000:
|
||||
with knownnodes.knownNodesLock:
|
||||
knownnodes.knownNodes[recaddrStream][peerFromAddrMessage] = timeSomeoneElseReceivedMessageFromThisNode
|
||||
hostDetails = (
|
||||
timeSomeoneElseReceivedMessageFromThisNode,
|
||||
recaddrStream, recaddrServices, hostStandardFormat, recaddrPort)
|
||||
protocol.broadcastToSendDataQueues((
|
||||
recaddrStream, 'advertisepeer', hostDetails))
|
||||
logger.debug('added new node ' + str(peerFromAddrMessage) + ' to knownNodes in stream ' + str(recaddrStream))
|
||||
shared.needToWriteKnownNodesToDisk = True
|
||||
# only update if normal mode
|
||||
elif BMConfigParser().safeGetInt('bitmessagesettings', 'maxoutboundconnections') < \
|
||||
BMConfigParser().safeGetInt('bitmessagesettings', 'maxtotalconnections', 200):
|
||||
timeLastReceivedMessageFromThisNode = knownnodes.knownNodes[recaddrStream][
|
||||
peerFromAddrMessage]
|
||||
if (timeLastReceivedMessageFromThisNode < timeSomeoneElseReceivedMessageFromThisNode) and (timeSomeoneElseReceivedMessageFromThisNode < int(time.time())+900): # 900 seconds for wiggle-room in case other nodes' clocks aren't quite right.
|
||||
with knownnodes.knownNodesLock:
|
||||
knownnodes.knownNodes[recaddrStream][peerFromAddrMessage] = timeSomeoneElseReceivedMessageFromThisNode
|
||||
|
||||
for stream in self.streamNumber:
|
||||
logger.debug('knownNodes currently has %i nodes for stream %i', len(knownnodes.knownNodes[stream]), stream)
|
||||
|
||||
|
||||
# Send a huge addr message to our peer. This is only used
|
||||
# when we fully establish a connection with a
|
||||
# peer (with the full exchange of version and verack
|
||||
# messages).
|
||||
def sendaddr(self):
|
||||
def sendChunk():
|
||||
if numberOfAddressesInAddrMessage == 0:
|
||||
return
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', \
|
||||
protocol.CreatePacket('addr', \
|
||||
encodeVarint(numberOfAddressesInAddrMessage) + payload)))
|
||||
|
||||
# We are going to share a maximum number of 1000 addrs (per overlapping
|
||||
# stream) with our peer. 500 from overlapping streams, 250 from the
|
||||
# left child stream, and 250 from the right child stream.
|
||||
maxAddrCount = BMConfigParser().safeGetInt("bitmessagesettings", "maxaddrperstreamsend", 500)
|
||||
|
||||
# protocol defines this as a maximum in one chunk
|
||||
protocolAddrLimit = 1000
|
||||
|
||||
# init
|
||||
numberOfAddressesInAddrMessage = 0
|
||||
payload = ''
|
||||
|
||||
for stream in self.streamNumber:
|
||||
addrsInMyStream = {}
|
||||
addrsInChildStreamLeft = {}
|
||||
addrsInChildStreamRight = {}
|
||||
|
||||
with knownnodes.knownNodesLock:
|
||||
if len(knownnodes.knownNodes[stream]) > 0:
|
||||
filtered = {k: v for k, v in knownnodes.knownNodes[stream].items()
|
||||
if v > (int(time.time()) - shared.maximumAgeOfNodesThatIAdvertiseToOthers)}
|
||||
elemCount = len(filtered)
|
||||
if elemCount > maxAddrCount:
|
||||
elemCount = maxAddrCount
|
||||
# only if more recent than 3 hours
|
||||
addrsInMyStream = random.sample(filtered.items(), elemCount)
|
||||
# sent 250 only if the remote isn't interested in it
|
||||
if len(knownnodes.knownNodes[stream * 2]) > 0 and stream not in self.streamNumber:
|
||||
filtered = {k: v for k, v in knownnodes.knownNodes[stream*2].items()
|
||||
if v > (int(time.time()) - shared.maximumAgeOfNodesThatIAdvertiseToOthers)}
|
||||
elemCount = len(filtered)
|
||||
if elemCount > maxAddrCount / 2:
|
||||
elemCount = int(maxAddrCount / 2)
|
||||
addrsInChildStreamLeft = random.sample(filtered.items(), elemCount)
|
||||
if len(knownnodes.knownNodes[(stream * 2) + 1]) > 0 and stream not in self.streamNumber:
|
||||
filtered = {k: v for k, v in knownnodes.knownNodes[stream*2+1].items()
|
||||
if v > (int(time.time()) - shared.maximumAgeOfNodesThatIAdvertiseToOthers)}
|
||||
elemCount = len(filtered)
|
||||
if elemCount > maxAddrCount / 2:
|
||||
elemCount = int(maxAddrCount / 2)
|
||||
addrsInChildStreamRight = random.sample(filtered.items(), elemCount)
|
||||
for (HOST, PORT), timeLastReceivedMessageFromThisNode in addrsInMyStream:
|
||||
numberOfAddressesInAddrMessage += 1
|
||||
payload += pack(
|
||||
'>Q', timeLastReceivedMessageFromThisNode) # 64-bit time
|
||||
payload += pack('>I', stream)
|
||||
payload += pack(
|
||||
'>q', 1) # service bit flags offered by this node
|
||||
payload += protocol.encodeHost(HOST)
|
||||
payload += pack('>H', PORT) # remote port
|
||||
if numberOfAddressesInAddrMessage >= protocolAddrLimit:
|
||||
sendChunk()
|
||||
payload = ''
|
||||
numberOfAddressesInAddrMessage = 0
|
||||
for (HOST, PORT), timeLastReceivedMessageFromThisNode in addrsInChildStreamLeft:
|
||||
numberOfAddressesInAddrMessage += 1
|
||||
payload += pack(
|
||||
'>Q', timeLastReceivedMessageFromThisNode) # 64-bit time
|
||||
payload += pack('>I', stream * 2)
|
||||
payload += pack(
|
||||
'>q', 1) # service bit flags offered by this node
|
||||
payload += protocol.encodeHost(HOST)
|
||||
payload += pack('>H', PORT) # remote port
|
||||
if numberOfAddressesInAddrMessage >= protocolAddrLimit:
|
||||
sendChunk()
|
||||
payload = ''
|
||||
numberOfAddressesInAddrMessage = 0
|
||||
for (HOST, PORT), timeLastReceivedMessageFromThisNode in addrsInChildStreamRight:
|
||||
numberOfAddressesInAddrMessage += 1
|
||||
payload += pack(
|
||||
'>Q', timeLastReceivedMessageFromThisNode) # 64-bit time
|
||||
payload += pack('>I', (stream * 2) + 1)
|
||||
payload += pack(
|
||||
'>q', 1) # service bit flags offered by this node
|
||||
payload += protocol.encodeHost(HOST)
|
||||
payload += pack('>H', PORT) # remote port
|
||||
if numberOfAddressesInAddrMessage >= protocolAddrLimit:
|
||||
sendChunk()
|
||||
payload = ''
|
||||
numberOfAddressesInAddrMessage = 0
|
||||
|
||||
# flush
|
||||
sendChunk()
|
||||
|
||||
# We have received a version message
|
||||
def recversion(self, data):
|
||||
if len(data) < 83:
|
||||
# This version message is unreasonably short. Forget it.
|
||||
return
|
||||
if self.verackSent:
|
||||
"""
|
||||
We must have already processed the remote node's version message.
|
||||
There might be a time in the future when we Do want to process
|
||||
a new version message, like if the remote node wants to update
|
||||
the streams in which they are interested. But for now we'll
|
||||
ignore this version message
|
||||
"""
|
||||
return
|
||||
|
||||
self.remoteProtocolVersion, = unpack('>L', data[:4])
|
||||
self.services, = unpack('>q', data[4:12])
|
||||
|
||||
timestamp, = unpack('>Q', data[12:20])
|
||||
self.timeOffset = timestamp - int(time.time())
|
||||
|
||||
self.myExternalIP = socket.inet_ntoa(data[40:44])
|
||||
# print 'myExternalIP', self.myExternalIP
|
||||
self.remoteNodeIncomingPort, = unpack('>H', data[70:72])
|
||||
# print 'remoteNodeIncomingPort', self.remoteNodeIncomingPort
|
||||
useragentLength, lengthOfUseragentVarint = decodeVarint(
|
||||
data[80:84])
|
||||
readPosition = 80 + lengthOfUseragentVarint
|
||||
self.userAgent = data[readPosition:readPosition + useragentLength]
|
||||
|
||||
# version check
|
||||
try:
|
||||
userAgentName, userAgentVersion = self.userAgent[1:-1].split(":", 2)
|
||||
except:
|
||||
userAgentName = self.userAgent
|
||||
userAgentVersion = "0.0.0"
|
||||
if userAgentName == "PyBitmessage":
|
||||
myVersion = [int(n) for n in softwareVersion.split(".")]
|
||||
try:
|
||||
remoteVersion = [int(n) for n in userAgentVersion.split(".")]
|
||||
except:
|
||||
remoteVersion = 0
|
||||
# remote is newer, but do not cross between stable and unstable
|
||||
try:
|
||||
if cmp(remoteVersion, myVersion) > 0 and \
|
||||
(myVersion[1] % 2 == remoteVersion[1] % 2):
|
||||
queues.UISignalQueue.put(('newVersionAvailable', remoteVersion))
|
||||
except:
|
||||
pass
|
||||
|
||||
readPosition += useragentLength
|
||||
numberOfStreamsInVersionMessage, lengthOfNumberOfStreamsInVersionMessage = decodeVarint(
|
||||
data[readPosition:])
|
||||
readPosition += lengthOfNumberOfStreamsInVersionMessage
|
||||
self.remoteStreams = []
|
||||
for i in range(numberOfStreamsInVersionMessage):
|
||||
newStreamNumber, lengthOfRemoteStreamNumber = decodeVarint(data[readPosition:])
|
||||
readPosition += lengthOfRemoteStreamNumber
|
||||
self.remoteStreams.append(newStreamNumber)
|
||||
logger.debug('Remote node useragent: %s, streams: (%s), time offset: %is.',
|
||||
self.userAgent, ', '.join(str(x) for x in self.remoteStreams), self.timeOffset)
|
||||
|
||||
# find shared streams
|
||||
self.streamNumber = sorted(set(state.streamsInWhichIAmParticipating).intersection(self.remoteStreams))
|
||||
|
||||
shared.connectedHostsList[
|
||||
self.hostIdent] = 1 # We use this data structure to not only keep track of what hosts we are connected to so that we don't try to connect to them again, but also to list the connections count on the Network Status tab.
|
||||
self.sendDataThreadQueue.put((0, 'setStreamNumber', self.remoteStreams))
|
||||
if data[72:80] == protocol.eightBytesOfRandomDataUsedToDetectConnectionsToSelf:
|
||||
self.sendDataThreadQueue.put((0, 'shutdown','no data'))
|
||||
logger.debug('Closing connection to myself: ' + str(self.peer))
|
||||
return
|
||||
|
||||
# The other peer's protocol version is of interest to the sendDataThread but we learn of it
|
||||
# in this version message. Let us inform the sendDataThread.
|
||||
self.sendDataThreadQueue.put((0, 'setRemoteProtocolVersion', self.remoteProtocolVersion))
|
||||
|
||||
if not isHostInPrivateIPRange(self.peer.host):
|
||||
with knownnodes.knownNodesLock:
|
||||
for stream in self.remoteStreams:
|
||||
knownnodes.knownNodes[stream][state.Peer(self.peer.host, self.remoteNodeIncomingPort)] = int(time.time())
|
||||
if not self.initiatedConnection:
|
||||
# bootstrap provider?
|
||||
if BMConfigParser().safeGetInt('bitmessagesettings', 'maxoutboundconnections') >= \
|
||||
BMConfigParser().safeGetInt('bitmessagesettings', 'maxtotalconnections', 200):
|
||||
knownnodes.knownNodes[stream][state.Peer(self.peer.host, self.remoteNodeIncomingPort)] -= 10800 # penalise inbound, 3 hours
|
||||
else:
|
||||
knownnodes.knownNodes[stream][state.Peer(self.peer.host, self.remoteNodeIncomingPort)] -= 7200 # penalise inbound, 2 hours
|
||||
shared.needToWriteKnownNodesToDisk = True
|
||||
|
||||
self.sendverack()
|
||||
if self.initiatedConnection == False:
|
||||
self.sendversion()
|
||||
|
||||
# Sends a version message
|
||||
def sendversion(self):
|
||||
logger.debug('Sending version message')
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.assembleVersionMessage(
|
||||
self.peer.host, self.peer.port, state.streamsInWhichIAmParticipating, not self.initiatedConnection)))
|
||||
|
||||
# Sends a verack message
|
||||
def sendverack(self):
|
||||
logger.debug('Sending verack')
|
||||
self.sendDataThreadQueue.put((0, 'sendRawData', protocol.CreatePacket('verack')))
|
||||
self.verackSent = True
|
||||
if self.verackReceived:
|
||||
self.connectionFullyEstablished()
|
|
@ -1,216 +0,0 @@
|
|||
import errno
|
||||
import time
|
||||
import threading
|
||||
import Queue
|
||||
from struct import unpack, pack
|
||||
import hashlib
|
||||
import random
|
||||
import select
|
||||
import socket
|
||||
from ssl import SSLError, SSL_ERROR_WANT_WRITE
|
||||
import sys
|
||||
|
||||
from helper_generic import addDataPadding
|
||||
from class_objectHashHolder import *
|
||||
from addresses import *
|
||||
from debug import logger
|
||||
from inventory import PendingUpload
|
||||
import protocol
|
||||
import state
|
||||
import throttle
|
||||
|
||||
# Every connection to a peer has a sendDataThread (and also a
|
||||
# receiveDataThread).
|
||||
class sendDataThread(threading.Thread):
|
||||
|
||||
def __init__(self, sendDataThreadQueue):
|
||||
threading.Thread.__init__(self, name="sendData")
|
||||
self.sendDataThreadQueue = sendDataThreadQueue
|
||||
state.sendDataQueues.append(self.sendDataThreadQueue)
|
||||
self.data = ''
|
||||
self.objectHashHolderInstance = objectHashHolder(self.sendDataThreadQueue)
|
||||
self.objectHashHolderInstance.daemon = True
|
||||
self.objectHashHolderInstance.start()
|
||||
self.connectionIsOrWasFullyEstablished = False
|
||||
|
||||
|
||||
def setup(
|
||||
self,
|
||||
sock,
|
||||
HOST,
|
||||
PORT,
|
||||
streamNumber
|
||||
):
|
||||
self.sock = sock
|
||||
self.peer = state.Peer(HOST, PORT)
|
||||
self.name = "sendData-" + self.peer.host.replace(":", ".") # log parser field separator
|
||||
self.streamNumber = []
|
||||
self.services = 0
|
||||
self.buffer = ""
|
||||
self.initiatedConnection = False
|
||||
self.remoteProtocolVersion = - \
|
||||
1 # This must be set using setRemoteProtocolVersion command which is sent through the self.sendDataThreadQueue queue.
|
||||
self.lastTimeISentData = int(
|
||||
time.time()) # If this value increases beyond five minutes ago, we'll send a pong message to keep the connection alive.
|
||||
if streamNumber == -1: # This was an incoming connection.
|
||||
self.initiatedConnection = False
|
||||
else:
|
||||
self.initiatedConnection = True
|
||||
#logger.debug('The streamNumber of this sendDataThread (ID: ' + str(id(self)) + ') at setup() is' + str(self.streamNumber))
|
||||
|
||||
|
||||
def sendVersionMessage(self):
|
||||
datatosend = protocol.assembleVersionMessage(
|
||||
self.peer.host, self.peer.port, state.streamsInWhichIAmParticipating, not self.initiatedConnection) # the IP and port of the remote host, and my streamNumber.
|
||||
|
||||
logger.debug('Sending version packet: ' + repr(datatosend))
|
||||
|
||||
try:
|
||||
self.sendBytes(datatosend)
|
||||
except Exception as err:
|
||||
# if not 'Bad file descriptor' in err:
|
||||
logger.error('sock.sendall error: %s\n' % err)
|
||||
|
||||
self.versionSent = 1
|
||||
|
||||
def sendBytes(self, data = ""):
|
||||
self.buffer += data
|
||||
if len(self.buffer) < throttle.SendThrottle().chunkSize and self.sendDataThreadQueue.qsize() > 1:
|
||||
return True
|
||||
|
||||
while self.buffer and state.shutdown == 0:
|
||||
isSSL = False
|
||||
try:
|
||||
if ((self.services & protocol.NODE_SSL == protocol.NODE_SSL) and
|
||||
self.connectionIsOrWasFullyEstablished and
|
||||
protocol.haveSSL(not self.initiatedConnection)):
|
||||
isSSL = True
|
||||
amountSent = self.sslSock.send(self.buffer[:throttle.SendThrottle().chunkSize])
|
||||
else:
|
||||
amountSent = self.sock.send(self.buffer[:throttle.SendThrottle().chunkSize])
|
||||
except socket.timeout:
|
||||
continue
|
||||
except SSLError as e:
|
||||
if e.errno == SSL_ERROR_WANT_WRITE:
|
||||
select.select([], [self.sslSock], [], 10)
|
||||
logger.debug('sock.recv retriable SSL error')
|
||||
continue
|
||||
logger.debug('Connection error (SSL)')
|
||||
return False
|
||||
except socket.error as e:
|
||||
if e.errno in (errno.EAGAIN, errno.EWOULDBLOCK) or \
|
||||
(sys.platform.startswith('win') and \
|
||||
e.errno == errno.WSAEWOULDBLOCK):
|
||||
select.select([], [self.sslSock if isSSL else self.sock], [], 10)
|
||||
logger.debug('sock.recv retriable error')
|
||||
continue
|
||||
if e.errno in (errno.EPIPE, errno.ECONNRESET, errno.EHOSTUNREACH, errno.ETIMEDOUT, errno.ECONNREFUSED):
|
||||
logger.debug('Connection error: %s', str(e))
|
||||
return False
|
||||
raise
|
||||
throttle.SendThrottle().wait(amountSent)
|
||||
self.lastTimeISentData = int(time.time())
|
||||
self.buffer = self.buffer[amountSent:]
|
||||
return True
|
||||
|
||||
def run(self):
|
||||
logger.debug('sendDataThread starting. ID: ' + str(id(self)) + '. Number of queues in sendDataQueues: ' + str(len(state.sendDataQueues)))
|
||||
while self.sendBytes():
|
||||
deststream, command, data = self.sendDataThreadQueue.get()
|
||||
|
||||
if deststream == 0 or deststream in self.streamNumber:
|
||||
if command == 'shutdown':
|
||||
logger.debug('sendDataThread (associated with ' + str(self.peer) + ') ID: ' + str(id(self)) + ' shutting down now.')
|
||||
break
|
||||
# When you receive an incoming connection, a sendDataThread is
|
||||
# created even though you don't yet know what stream number the
|
||||
# remote peer is interested in. They will tell you in a version
|
||||
# message and if you too are interested in that stream then you
|
||||
# will continue on with the connection and will set the
|
||||
# streamNumber of this send data thread here:
|
||||
elif command == 'setStreamNumber':
|
||||
self.streamNumber = data
|
||||
logger.debug('setting the stream number to %s', ', '.join(str(x) for x in self.streamNumber))
|
||||
elif command == 'setRemoteProtocolVersion':
|
||||
specifiedRemoteProtocolVersion = data
|
||||
logger.debug('setting the remote node\'s protocol version in the sendDataThread (ID: ' + str(id(self)) + ') to ' + str(specifiedRemoteProtocolVersion))
|
||||
self.remoteProtocolVersion = specifiedRemoteProtocolVersion
|
||||
elif command == 'advertisepeer':
|
||||
self.objectHashHolderInstance.holdPeer(data)
|
||||
elif command == 'sendaddr':
|
||||
if self.connectionIsOrWasFullyEstablished: # only send addr messages if we have sent and heard a verack from the remote node
|
||||
numberOfAddressesInAddrMessage = len(data)
|
||||
payload = ''
|
||||
for hostDetails in data:
|
||||
timeLastReceivedMessageFromThisNode, streamNumber, services, host, port = hostDetails
|
||||
payload += pack(
|
||||
'>Q', timeLastReceivedMessageFromThisNode) # now uses 64-bit time
|
||||
payload += pack('>I', streamNumber)
|
||||
payload += pack(
|
||||
'>q', services) # service bit flags offered by this node
|
||||
payload += protocol.encodeHost(host)
|
||||
payload += pack('>H', port)
|
||||
|
||||
payload = encodeVarint(numberOfAddressesInAddrMessage) + payload
|
||||
packet = protocol.CreatePacket('addr', payload)
|
||||
try:
|
||||
self.sendBytes(packet)
|
||||
except:
|
||||
logger.error('sendaddr: self.sock.sendall failed')
|
||||
break
|
||||
elif command == 'advertiseobject':
|
||||
self.objectHashHolderInstance.holdHash(data)
|
||||
elif command == 'sendinv':
|
||||
if self.connectionIsOrWasFullyEstablished: # only send inv messages if we have send and heard a verack from the remote node
|
||||
payload = ''
|
||||
for hash in data:
|
||||
payload += hash
|
||||
if payload != '':
|
||||
payload = encodeVarint(len(payload)/32) + payload
|
||||
packet = protocol.CreatePacket('inv', payload)
|
||||
try:
|
||||
self.sendBytes(packet)
|
||||
except:
|
||||
logger.error('sendinv: self.sock.sendall failed')
|
||||
break
|
||||
elif command == 'pong':
|
||||
if self.lastTimeISentData < (int(time.time()) - 298):
|
||||
# Send out a pong message to keep the connection alive.
|
||||
logger.debug('Sending pong to ' + str(self.peer) + ' to keep connection alive.')
|
||||
packet = protocol.CreatePacket('pong')
|
||||
try:
|
||||
self.sendBytes(packet)
|
||||
except:
|
||||
logger.error('send pong failed')
|
||||
break
|
||||
elif command == 'sendRawData':
|
||||
objectHash = None
|
||||
if type(data) in [list, tuple]:
|
||||
objectHash, data = data
|
||||
try:
|
||||
self.sendBytes(data)
|
||||
PendingUpload().delete(objectHash)
|
||||
except:
|
||||
logger.error('Sending of data to ' + str(self.peer) + ' failed. sendDataThread thread ' + str(self) + ' ending now.', exc_info=True)
|
||||
break
|
||||
elif command == 'connectionIsOrWasFullyEstablished':
|
||||
self.connectionIsOrWasFullyEstablished = True
|
||||
self.services, self.sslSock = data
|
||||
elif self.connectionIsOrWasFullyEstablished:
|
||||
logger.error('sendDataThread ID: ' + str(id(self)) + ' ignoring command ' + command + ' because the thread is not in stream ' + str(deststream) + ' but in streams ' + ', '.join(str(x) for x in self.streamNumber))
|
||||
self.sendDataThreadQueue.task_done()
|
||||
# Flush if the cycle ended with break
|
||||
try:
|
||||
self.sendDataThreadQueue.task_done()
|
||||
except ValueError:
|
||||
pass
|
||||
|
||||
try:
|
||||
self.sock.shutdown(socket.SHUT_RDWR)
|
||||
self.sock.close()
|
||||
except:
|
||||
pass
|
||||
state.sendDataQueues.remove(self.sendDataThreadQueue)
|
||||
PendingUpload().threadEnd()
|
||||
logger.info('sendDataThread ending. ID: ' + str(id(self)) + '. Number of queues in sendDataQueues: ' + str(len(state.sendDataQueues)))
|
||||
self.objectHashHolderInstance.close()
|
|
@ -1,168 +0,0 @@
|
|||
import threading
|
||||
import shared
|
||||
import socket
|
||||
from bmconfigparser import BMConfigParser
|
||||
from class_sendDataThread import *
|
||||
from class_receiveDataThread import *
|
||||
import helper_bootstrap
|
||||
from helper_threading import *
|
||||
import protocol
|
||||
import errno
|
||||
import re
|
||||
|
||||
import state
|
||||
|
||||
# Only one singleListener thread will ever exist. It creates the
|
||||
# receiveDataThread and sendDataThread for each incoming connection. Note
|
||||
# that it cannot set the stream number because it is not known yet- the
|
||||
# other node will have to tell us its stream number in a version message.
|
||||
# If we don't care about their stream, we will close the connection
|
||||
# (within the recversion function of the recieveData thread)
|
||||
|
||||
|
||||
class singleListener(threading.Thread, StoppableThread):
|
||||
|
||||
def __init__(self):
|
||||
threading.Thread.__init__(self, name="singleListener")
|
||||
self.initStop()
|
||||
|
||||
def setup(self, selfInitiatedConnections):
|
||||
self.selfInitiatedConnections = selfInitiatedConnections
|
||||
|
||||
def _createListenSocket(self, family):
|
||||
HOST = '' # Symbolic name meaning all available interfaces
|
||||
# If not sockslisten, but onionhostname defined, only listen on localhost
|
||||
if not BMConfigParser().safeGetBoolean('bitmessagesettings', 'sockslisten') and ".onion" in BMConfigParser().get('bitmessagesettings', 'onionhostname'):
|
||||
if family == socket.AF_INET6 and "." in BMConfigParser().get('bitmessagesettings', 'onionbindip'):
|
||||
raise socket.error(errno.EINVAL, "Invalid mix of IPv4 and IPv6")
|
||||
elif family == socket.AF_INET and ":" in BMConfigParser().get('bitmessagesettings', 'onionbindip'):
|
||||
raise socket.error(errno.EINVAL, "Invalid mix of IPv4 and IPv6")
|
||||
HOST = BMConfigParser().get('bitmessagesettings', 'onionbindip')
|
||||
PORT = BMConfigParser().getint('bitmessagesettings', 'port')
|
||||
sock = socket.socket(family, socket.SOCK_STREAM)
|
||||
if family == socket.AF_INET6:
|
||||
# Make sure we can accept both IPv4 and IPv6 connections.
|
||||
# This is the default on everything apart from Windows
|
||||
sock.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_V6ONLY, 0)
|
||||
# This option apparently avoids the TIME_WAIT state so that we can
|
||||
# rebind faster
|
||||
sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
||||
sock.bind((HOST, PORT))
|
||||
sock.listen(2)
|
||||
return sock
|
||||
|
||||
def stopThread(self):
|
||||
super(singleListener, self).stopThread()
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
for ip in ('127.0.0.1', BMConfigParser().get('bitmessagesettings', 'onionbindip')):
|
||||
try:
|
||||
s.connect((ip, BMConfigParser().getint('bitmessagesettings', 'port')))
|
||||
s.shutdown(socket.SHUT_RDWR)
|
||||
s.close()
|
||||
break
|
||||
except:
|
||||
pass
|
||||
|
||||
def run(self):
|
||||
# If there is a trusted peer then we don't want to accept
|
||||
# incoming connections so we'll just abandon the thread
|
||||
if state.trustedPeer:
|
||||
return
|
||||
|
||||
while BMConfigParser().safeGetBoolean('bitmessagesettings', 'dontconnect') and state.shutdown == 0:
|
||||
self.stop.wait(1)
|
||||
helper_bootstrap.dns()
|
||||
# We typically don't want to accept incoming connections if the user is using a
|
||||
# SOCKS proxy, unless they have configured otherwise. If they eventually select
|
||||
# proxy 'none' or configure SOCKS listening then this will start listening for
|
||||
# connections. But if on SOCKS and have an onionhostname, listen
|
||||
# (socket is then only opened for localhost)
|
||||
while BMConfigParser().get('bitmessagesettings', 'socksproxytype')[0:5] == 'SOCKS' and \
|
||||
(not BMConfigParser().getboolean('bitmessagesettings', 'sockslisten') and \
|
||||
".onion" not in BMConfigParser().get('bitmessagesettings', 'onionhostname')) and \
|
||||
state.shutdown == 0:
|
||||
self.stop.wait(5)
|
||||
|
||||
logger.info('Listening for incoming connections.')
|
||||
|
||||
# First try listening on an IPv6 socket. This should also be
|
||||
# able to accept connections on IPv4. If that's not available
|
||||
# we'll fall back to IPv4-only.
|
||||
try:
|
||||
sock = self._createListenSocket(socket.AF_INET6)
|
||||
except socket.error as e:
|
||||
if (isinstance(e.args, tuple) and
|
||||
e.args[0] in (errno.EAFNOSUPPORT,
|
||||
errno.EPFNOSUPPORT,
|
||||
errno.EADDRNOTAVAIL,
|
||||
errno.ENOPROTOOPT,
|
||||
errno.EINVAL)):
|
||||
sock = self._createListenSocket(socket.AF_INET)
|
||||
else:
|
||||
raise
|
||||
|
||||
# regexp to match an IPv4-mapped IPv6 address
|
||||
mappedAddressRegexp = re.compile(r'^::ffff:([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)$')
|
||||
|
||||
while state.shutdown == 0:
|
||||
# We typically don't want to accept incoming connections if the user is using a
|
||||
# SOCKS proxy, unless they have configured otherwise. If they eventually select
|
||||
# proxy 'none' or configure SOCKS listening then this will start listening for
|
||||
# connections.
|
||||
while BMConfigParser().get('bitmessagesettings', 'socksproxytype')[0:5] == 'SOCKS' and not BMConfigParser().getboolean('bitmessagesettings', 'sockslisten') and ".onion" not in BMConfigParser().get('bitmessagesettings', 'onionhostname') and state.shutdown == 0:
|
||||
self.stop.wait(10)
|
||||
while len(shared.connectedHostsList) > \
|
||||
BMConfigParser().safeGetInt("bitmessagesettings", "maxtotalconnections", 200) + \
|
||||
BMConfigParser().safeGetInt("bitmessagesettings", "maxbootstrapconnections", 20) \
|
||||
and state.shutdown == 0:
|
||||
logger.info('We are connected to too many people. Not accepting further incoming connections for ten seconds.')
|
||||
|
||||
self.stop.wait(10)
|
||||
|
||||
while state.shutdown == 0:
|
||||
try:
|
||||
socketObject, sockaddr = sock.accept()
|
||||
except socket.error as e:
|
||||
if isinstance(e.args, tuple) and \
|
||||
e.args[0] in (errno.EINTR,):
|
||||
continue
|
||||
time.wait(1)
|
||||
continue
|
||||
|
||||
(HOST, PORT) = sockaddr[0:2]
|
||||
|
||||
# If the address is an IPv4-mapped IPv6 address then
|
||||
# convert it to just the IPv4 representation
|
||||
md = mappedAddressRegexp.match(HOST)
|
||||
if md != None:
|
||||
HOST = md.group(1)
|
||||
|
||||
# The following code will, unfortunately, block an
|
||||
# incoming connection if someone else on the same LAN
|
||||
# is already connected because the two computers will
|
||||
# share the same external IP. This is here to prevent
|
||||
# connection flooding.
|
||||
# permit repeated connections from Tor
|
||||
if HOST in shared.connectedHostsList and \
|
||||
(".onion" not in BMConfigParser().get('bitmessagesettings', 'onionhostname') or not protocol.checkSocksIP(HOST)):
|
||||
socketObject.close()
|
||||
logger.info('We are already connected to ' + str(HOST) + '. Ignoring connection.')
|
||||
else:
|
||||
break
|
||||
|
||||
sendDataThreadQueue = Queue.Queue() # Used to submit information to the send data thread for this connection.
|
||||
socketObject.settimeout(20)
|
||||
|
||||
sd = sendDataThread(sendDataThreadQueue)
|
||||
sd.setup(
|
||||
socketObject, HOST, PORT, -1)
|
||||
sd.start()
|
||||
|
||||
rd = receiveDataThread()
|
||||
rd.daemon = True # close the main program even if there are threads left
|
||||
rd.setup(
|
||||
socketObject, HOST, PORT, -1, self.selfInitiatedConnections, sendDataThreadQueue, sd.objectHashHolderInstance)
|
||||
rd.start()
|
||||
|
||||
logger.info('connected to ' + HOST + ' during INCOMING request.')
|
||||
|
|
@ -1,81 +0,0 @@
|
|||
import math
|
||||
import threading
|
||||
import time
|
||||
|
||||
from bmconfigparser import BMConfigParser
|
||||
from singleton import Singleton
|
||||
import state
|
||||
|
||||
class Throttle(object):
|
||||
minChunkSize = 4096
|
||||
maxChunkSize = 131072
|
||||
|
||||
def __init__(self, limit=0):
|
||||
self.limit = limit
|
||||
self.speed = 0
|
||||
self.chunkSize = Throttle.maxChunkSize
|
||||
self.txTime = int(time.time())
|
||||
self.txLen = 0
|
||||
self.total = 0
|
||||
self.timer = threading.Event()
|
||||
self.lock = threading.RLock()
|
||||
self.resetChunkSize()
|
||||
|
||||
def recalculate(self):
|
||||
with self.lock:
|
||||
now = int(time.time())
|
||||
if now > self.txTime:
|
||||
self.speed = self.txLen / (now - self.txTime)
|
||||
self.txLen -= self.limit * (now - self.txTime)
|
||||
self.txTime = now
|
||||
if self.txLen < 0 or self.limit == 0:
|
||||
self.txLen = 0
|
||||
|
||||
def wait(self, dataLen):
|
||||
with self.lock:
|
||||
self.txLen += dataLen
|
||||
self.total += dataLen
|
||||
while state.shutdown == 0:
|
||||
self.recalculate()
|
||||
if self.limit == 0:
|
||||
break
|
||||
if self.txLen < self.limit:
|
||||
break
|
||||
self.timer.wait(0.2)
|
||||
|
||||
def getSpeed(self):
|
||||
self.recalculate()
|
||||
return self.speed
|
||||
|
||||
def resetChunkSize(self):
|
||||
with self.lock:
|
||||
# power of two smaller or equal to speed limit
|
||||
try:
|
||||
self.chunkSize = int(math.pow(2, int(math.log(self.limit,2))))
|
||||
except ValueError:
|
||||
self.chunkSize = Throttle.maxChunkSize
|
||||
# range check
|
||||
if self.chunkSize < Throttle.minChunkSize:
|
||||
self.chunkSize = Throttle.minChunkSize
|
||||
elif self.chunkSize > Throttle.maxChunkSize:
|
||||
self.chunkSize = Throttle.maxChunkSize
|
||||
|
||||
@Singleton
|
||||
class SendThrottle(Throttle):
|
||||
def __init__(self):
|
||||
Throttle.__init__(self, BMConfigParser().safeGetInt('bitmessagesettings', 'maxuploadrate')*1024)
|
||||
|
||||
def resetLimit(self):
|
||||
with self.lock:
|
||||
self.limit = BMConfigParser().safeGetInt('bitmessagesettings', 'maxuploadrate')*1024
|
||||
Throttle.resetChunkSize(self)
|
||||
|
||||
@Singleton
|
||||
class ReceiveThrottle(Throttle):
|
||||
def __init__(self):
|
||||
Throttle.__init__(self, BMConfigParser().safeGetInt('bitmessagesettings', 'maxdownloadrate')*1024)
|
||||
|
||||
def resetLimit(self):
|
||||
with self.lock:
|
||||
self.limit = BMConfigParser().safeGetInt('bitmessagesettings', 'maxdownloadrate')*1024
|
||||
Throttle.resetChunkSize(self)
|
|
@ -1,12 +1,8 @@
|
|||
SOURCES = ../addresses.py\
|
||||
../bitmessagemain.py\
|
||||
../class_addressGenerator.py\
|
||||
../class_outgoingSynSender.py\
|
||||
../class_objectProcessor.py\
|
||||
../class_receiveDataThread.py\
|
||||
../class_sendDataThread.py\
|
||||
../class_singleCleaner.py\
|
||||
../class_singleListener.py\
|
||||
../class_singleWorker.py\
|
||||
../class_sqlThread.py\
|
||||
../helper_bitcoin.py\
|
||||
|
|
Reference in New Issue
Block a user