| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
| use crate::config::ValidationMode; |
| use crate::handler::HandlerEvent; |
| use crate::rpc_proto::proto; |
| use crate::topic::TopicHash; |
| use crate::types::{ |
| ControlAction, MessageId, PeerInfo, PeerKind, RawMessage, Rpc, Subscription, SubscriptionAction, |
| }; |
| use crate::ValidationError; |
| use asynchronous_codec::{Decoder, Encoder, Framed}; |
| use byteorder::{BigEndian, ByteOrder}; |
| use bytes::BytesMut; |
| use futures::prelude::*; |
| use libp2p_core::{InboundUpgrade, OutboundUpgrade, UpgradeInfo}; |
| use libp2p_identity::{PeerId, PublicKey}; |
| use libp2p_swarm::StreamProtocol; |
| use quick_protobuf::Writer; |
| use std::pin::Pin; |
| use void::Void; |
|
|
| pub(crate) const SIGNING_PREFIX: &[u8] = b"libp2p-pubsub:"; |
|
|
| pub(crate) const GOSSIPSUB_1_1_0_PROTOCOL: ProtocolId = ProtocolId { |
| protocol: StreamProtocol::new("/meshsub/1.1.0"), |
| kind: PeerKind::Gossipsubv1_1, |
| }; |
| pub(crate) const GOSSIPSUB_1_0_0_PROTOCOL: ProtocolId = ProtocolId { |
| protocol: StreamProtocol::new("/meshsub/1.0.0"), |
| kind: PeerKind::Gossipsub, |
| }; |
| pub(crate) const FLOODSUB_PROTOCOL: ProtocolId = ProtocolId { |
| protocol: StreamProtocol::new("/floodsub/1.0.0"), |
| kind: PeerKind::Floodsub, |
| }; |
|
|
| |
| #[derive(Debug, Clone)] |
| pub struct ProtocolConfig { |
| |
| pub(crate) protocol_ids: Vec<ProtocolId>, |
| |
| pub(crate) max_transmit_size: usize, |
| |
| pub(crate) validation_mode: ValidationMode, |
| } |
|
|
| impl Default for ProtocolConfig { |
| fn default() -> Self { |
| Self { |
| max_transmit_size: 65536, |
| validation_mode: ValidationMode::Strict, |
| protocol_ids: vec![GOSSIPSUB_1_1_0_PROTOCOL, GOSSIPSUB_1_0_0_PROTOCOL], |
| } |
| } |
| } |
|
|
| |
| #[derive(Clone, Debug, PartialEq)] |
| pub struct ProtocolId { |
| |
| pub protocol: StreamProtocol, |
| |
| pub kind: PeerKind, |
| } |
|
|
| impl AsRef<str> for ProtocolId { |
| fn as_ref(&self) -> &str { |
| self.protocol.as_ref() |
| } |
| } |
|
|
| impl UpgradeInfo for ProtocolConfig { |
| type Info = ProtocolId; |
| type InfoIter = Vec<Self::Info>; |
|
|
| fn protocol_info(&self) -> Self::InfoIter { |
| self.protocol_ids.clone() |
| } |
| } |
|
|
| impl<TSocket> InboundUpgrade<TSocket> for ProtocolConfig |
| where |
| TSocket: AsyncRead + AsyncWrite + Unpin + Send + 'static, |
| { |
| type Output = (Framed<TSocket, GossipsubCodec>, PeerKind); |
| type Error = Void; |
| type Future = Pin<Box<dyn Future<Output = Result<Self::Output, Self::Error>> + Send>>; |
|
|
| fn upgrade_inbound(self, socket: TSocket, protocol_id: Self::Info) -> Self::Future { |
| Box::pin(future::ok(( |
| Framed::new( |
| socket, |
| GossipsubCodec::new(self.max_transmit_size, self.validation_mode), |
| ), |
| protocol_id.kind, |
| ))) |
| } |
| } |
|
|
| impl<TSocket> OutboundUpgrade<TSocket> for ProtocolConfig |
| where |
| TSocket: AsyncWrite + AsyncRead + Unpin + Send + 'static, |
| { |
| type Output = (Framed<TSocket, GossipsubCodec>, PeerKind); |
| type Error = Void; |
| type Future = Pin<Box<dyn Future<Output = Result<Self::Output, Self::Error>> + Send>>; |
|
|
| fn upgrade_outbound(self, socket: TSocket, protocol_id: Self::Info) -> Self::Future { |
| Box::pin(future::ok(( |
| Framed::new( |
| socket, |
| GossipsubCodec::new(self.max_transmit_size, self.validation_mode), |
| ), |
| protocol_id.kind, |
| ))) |
| } |
| } |
|
|
| |
|
|
| pub struct GossipsubCodec { |
| |
| validation_mode: ValidationMode, |
| |
| codec: quick_protobuf_codec::Codec<proto::RPC>, |
| } |
|
|
| impl GossipsubCodec { |
| pub fn new(max_length: usize, validation_mode: ValidationMode) -> GossipsubCodec { |
| let codec = quick_protobuf_codec::Codec::new(max_length); |
| GossipsubCodec { |
| validation_mode, |
| codec, |
| } |
| } |
|
|
| |
| |
| |
| fn verify_signature(message: &proto::Message) -> bool { |
| use quick_protobuf::MessageWrite; |
|
|
| let Some(from) = message.from.as_ref() else { |
| tracing::debug!("Signature verification failed: No source id given"); |
| return false; |
| }; |
|
|
| let Ok(source) = PeerId::from_bytes(from) else { |
| tracing::debug!("Signature verification failed: Invalid Peer Id"); |
| return false; |
| }; |
|
|
| let Some(signature) = message.signature.as_ref() else { |
| tracing::debug!("Signature verification failed: No signature provided"); |
| return false; |
| }; |
|
|
| |
| |
| let public_key = match message.key.as_deref().map(PublicKey::try_decode_protobuf) { |
| Some(Ok(key)) => key, |
| _ => match PublicKey::try_decode_protobuf(&source.to_bytes()[2..]) { |
| Ok(v) => v, |
| Err(_) => { |
| tracing::warn!("Signature verification failed: No valid public key supplied"); |
| return false; |
| } |
| }, |
| }; |
|
|
| |
| if source != public_key.to_peer_id() { |
| tracing::warn!( |
| "Signature verification failed: Public key doesn't match source peer id" |
| ); |
| return false; |
| } |
|
|
| |
| let mut message_sig = message.clone(); |
| message_sig.signature = None; |
| message_sig.key = None; |
| let mut buf = Vec::with_capacity(message_sig.get_size()); |
| let mut writer = Writer::new(&mut buf); |
| message_sig |
| .write_message(&mut writer) |
| .expect("Encoding to succeed"); |
| let mut signature_bytes = SIGNING_PREFIX.to_vec(); |
| signature_bytes.extend_from_slice(&buf); |
| public_key.verify(&signature_bytes, signature) |
| } |
| } |
|
|
| impl Encoder for GossipsubCodec { |
| type Item<'a> = proto::RPC; |
| type Error = quick_protobuf_codec::Error; |
|
|
| fn encode(&mut self, item: Self::Item<'_>, dst: &mut BytesMut) -> Result<(), Self::Error> { |
| self.codec.encode(item, dst) |
| } |
| } |
|
|
| impl Decoder for GossipsubCodec { |
| type Item = HandlerEvent; |
| type Error = quick_protobuf_codec::Error; |
|
|
| fn decode(&mut self, src: &mut BytesMut) -> Result<Option<Self::Item>, Self::Error> { |
| let Some(rpc) = self.codec.decode(src)? else { |
| return Ok(None); |
| }; |
| |
| let mut messages = Vec::with_capacity(rpc.publish.len()); |
| |
| let mut invalid_messages = Vec::new(); |
|
|
| for message in rpc.publish.into_iter() { |
| |
| let mut invalid_kind = None; |
| let mut verify_signature = false; |
| let mut verify_sequence_no = false; |
| let mut verify_source = false; |
|
|
| match self.validation_mode { |
| ValidationMode::Strict => { |
| |
| verify_signature = true; |
| verify_sequence_no = true; |
| verify_source = true; |
| } |
| ValidationMode::Permissive => { |
| |
| if message.signature.is_some() { |
| verify_signature = true; |
| } |
| if message.seqno.is_some() { |
| verify_sequence_no = true; |
| } |
| if message.from.is_some() { |
| verify_source = true; |
| } |
| } |
| ValidationMode::Anonymous => { |
| if message.signature.is_some() { |
| tracing::warn!( |
| "Signature field was non-empty and anonymous validation mode is set" |
| ); |
| invalid_kind = Some(ValidationError::SignaturePresent); |
| } else if message.seqno.is_some() { |
| tracing::warn!( |
| "Sequence number was non-empty and anonymous validation mode is set" |
| ); |
| invalid_kind = Some(ValidationError::SequenceNumberPresent); |
| } else if message.from.is_some() { |
| tracing::warn!("Message dropped. Message source was non-empty and anonymous validation mode is set"); |
| invalid_kind = Some(ValidationError::MessageSourcePresent); |
| } |
| } |
| ValidationMode::None => {} |
| } |
|
|
| |
| |
| if let Some(validation_error) = invalid_kind.take() { |
| let message = RawMessage { |
| source: None, |
| data: message.data.unwrap_or_default(), |
| sequence_number: None, |
| topic: TopicHash::from_raw(message.topic), |
| signature: None, |
| key: message.key, |
| validated: false, |
| }; |
| invalid_messages.push((message, validation_error)); |
| |
| continue; |
| } |
|
|
| |
| if verify_signature && !GossipsubCodec::verify_signature(&message) { |
| tracing::warn!("Invalid signature for received message"); |
|
|
| |
| |
| let message = RawMessage { |
| source: None, |
| data: message.data.unwrap_or_default(), |
| sequence_number: None, |
| topic: TopicHash::from_raw(message.topic), |
| signature: None, |
| key: message.key, |
| validated: false, |
| }; |
| invalid_messages.push((message, ValidationError::InvalidSignature)); |
| |
| continue; |
| } |
|
|
| |
| let sequence_number = if verify_sequence_no { |
| if let Some(seq_no) = message.seqno { |
| if seq_no.is_empty() { |
| None |
| } else if seq_no.len() != 8 { |
| tracing::debug!( |
| sequence_number=?seq_no, |
| sequence_length=%seq_no.len(), |
| "Invalid sequence number length for received message" |
| ); |
| let message = RawMessage { |
| source: None, |
| data: message.data.unwrap_or_default(), |
| sequence_number: None, |
| topic: TopicHash::from_raw(message.topic), |
| signature: message.signature, |
| key: message.key, |
| validated: false, |
| }; |
| invalid_messages.push((message, ValidationError::InvalidSequenceNumber)); |
| |
| continue; |
| } else { |
| |
| Some(BigEndian::read_u64(&seq_no)) |
| } |
| } else { |
| |
| tracing::debug!("Sequence number not present but expected"); |
| let message = RawMessage { |
| source: None, |
| data: message.data.unwrap_or_default(), |
| sequence_number: None, |
| topic: TopicHash::from_raw(message.topic), |
| signature: message.signature, |
| key: message.key, |
| validated: false, |
| }; |
| invalid_messages.push((message, ValidationError::EmptySequenceNumber)); |
| continue; |
| } |
| } else { |
| |
| None |
| }; |
|
|
| |
| let source = if verify_source { |
| if let Some(bytes) = message.from { |
| if !bytes.is_empty() { |
| match PeerId::from_bytes(&bytes) { |
| Ok(peer_id) => Some(peer_id), |
| Err(_) => { |
| |
| tracing::debug!("Message source has an invalid PeerId"); |
| let message = RawMessage { |
| source: None, |
| data: message.data.unwrap_or_default(), |
| sequence_number, |
| topic: TopicHash::from_raw(message.topic), |
| signature: message.signature, |
| key: message.key, |
| validated: false, |
| }; |
| invalid_messages.push((message, ValidationError::InvalidPeerId)); |
| continue; |
| } |
| } |
| } else { |
| None |
| } |
| } else { |
| None |
| } |
| } else { |
| None |
| }; |
|
|
| |
| messages.push(RawMessage { |
| source, |
| data: message.data.unwrap_or_default(), |
| sequence_number, |
| topic: TopicHash::from_raw(message.topic), |
| signature: message.signature, |
| key: message.key, |
| validated: false, |
| }); |
| } |
|
|
| let mut control_msgs = Vec::new(); |
|
|
| if let Some(rpc_control) = rpc.control { |
| |
| let ihave_msgs: Vec<ControlAction> = rpc_control |
| .ihave |
| .into_iter() |
| .map(|ihave| ControlAction::IHave { |
| topic_hash: TopicHash::from_raw(ihave.topic_id.unwrap_or_default()), |
| message_ids: ihave |
| .message_ids |
| .into_iter() |
| .map(MessageId::from) |
| .collect::<Vec<_>>(), |
| }) |
| .collect(); |
|
|
| let iwant_msgs: Vec<ControlAction> = rpc_control |
| .iwant |
| .into_iter() |
| .map(|iwant| ControlAction::IWant { |
| message_ids: iwant |
| .message_ids |
| .into_iter() |
| .map(MessageId::from) |
| .collect::<Vec<_>>(), |
| }) |
| .collect(); |
|
|
| let graft_msgs: Vec<ControlAction> = rpc_control |
| .graft |
| .into_iter() |
| .map(|graft| ControlAction::Graft { |
| topic_hash: TopicHash::from_raw(graft.topic_id.unwrap_or_default()), |
| }) |
| .collect(); |
|
|
| let mut prune_msgs = Vec::new(); |
|
|
| for prune in rpc_control.prune { |
| |
| let peers = prune |
| .peers |
| .into_iter() |
| .filter_map(|info| { |
| info.peer_id |
| .as_ref() |
| .and_then(|id| PeerId::from_bytes(id).ok()) |
| .map(|peer_id| |
| |
| PeerInfo { |
| peer_id: Some(peer_id), |
| }) |
| }) |
| .collect::<Vec<PeerInfo>>(); |
|
|
| let topic_hash = TopicHash::from_raw(prune.topic_id.unwrap_or_default()); |
| prune_msgs.push(ControlAction::Prune { |
| topic_hash, |
| peers, |
| backoff: prune.backoff, |
| }); |
| } |
|
|
| control_msgs.extend(ihave_msgs); |
| control_msgs.extend(iwant_msgs); |
| control_msgs.extend(graft_msgs); |
| control_msgs.extend(prune_msgs); |
| } |
|
|
| Ok(Some(HandlerEvent::Message { |
| rpc: Rpc { |
| messages, |
| subscriptions: rpc |
| .subscriptions |
| .into_iter() |
| .map(|sub| Subscription { |
| action: if Some(true) == sub.subscribe { |
| SubscriptionAction::Subscribe |
| } else { |
| SubscriptionAction::Unsubscribe |
| }, |
| topic_hash: TopicHash::from_raw(sub.topic_id.unwrap_or_default()), |
| }) |
| .collect(), |
| control_msgs, |
| }, |
| invalid_messages, |
| })) |
| } |
| } |
|
|
| #[cfg(test)] |
| mod tests { |
| use super::*; |
| use crate::config::Config; |
| use crate::{Behaviour, ConfigBuilder}; |
| use crate::{IdentTopic as Topic, Version}; |
| use libp2p_identity::Keypair; |
| use quickcheck::*; |
|
|
| #[derive(Clone, Debug)] |
| struct Message(RawMessage); |
|
|
| impl Arbitrary for Message { |
| fn arbitrary(g: &mut Gen) -> Self { |
| let keypair = TestKeypair::arbitrary(g); |
|
|
| |
| let config = Config::default(); |
| let mut gs: Behaviour = |
| Behaviour::new(crate::MessageAuthenticity::Signed(keypair.0), config).unwrap(); |
| let data = (0..g.gen_range(10..10024u32)) |
| .map(|_| u8::arbitrary(g)) |
| .collect::<Vec<_>>(); |
| let topic_id = TopicId::arbitrary(g).0; |
| Message(gs.build_raw_message(topic_id, data).unwrap()) |
| } |
| } |
|
|
| #[derive(Clone, Debug)] |
| struct TopicId(TopicHash); |
|
|
| impl Arbitrary for TopicId { |
| fn arbitrary(g: &mut Gen) -> Self { |
| let topic_string: String = (0..g.gen_range(20..1024u32)) |
| .map(|_| char::arbitrary(g)) |
| .collect::<String>(); |
| TopicId(Topic::new(topic_string).into()) |
| } |
| } |
|
|
| #[derive(Clone)] |
| struct TestKeypair(Keypair); |
|
|
| impl Arbitrary for TestKeypair { |
| fn arbitrary(_g: &mut Gen) -> Self { |
| |
| TestKeypair(Keypair::generate_ed25519()) |
| } |
| } |
|
|
| impl std::fmt::Debug for TestKeypair { |
| fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { |
| f.debug_struct("TestKeypair") |
| .field("public", &self.0.public()) |
| .finish() |
| } |
| } |
|
|
| #[test] |
| |
| fn encode_decode() { |
| fn prop(message: Message) { |
| let message = message.0; |
|
|
| let rpc = Rpc { |
| messages: vec![message.clone()], |
| subscriptions: vec![], |
| control_msgs: vec![], |
| }; |
|
|
| let mut codec = GossipsubCodec::new(u32::MAX as usize, ValidationMode::Strict); |
| let mut buf = BytesMut::new(); |
| codec.encode(rpc.into_protobuf(), &mut buf).unwrap(); |
| let decoded_rpc = codec.decode(&mut buf).unwrap().unwrap(); |
| |
| match decoded_rpc { |
| HandlerEvent::Message { mut rpc, .. } => { |
| rpc.messages[0].validated = true; |
|
|
| assert_eq!(vec![message], rpc.messages); |
| } |
| _ => panic!("Must decode a message"), |
| } |
| } |
|
|
| QuickCheck::new().quickcheck(prop as fn(_) -> _) |
| } |
|
|
| #[test] |
| fn support_floodsub_with_custom_protocol() { |
| let protocol_config = ConfigBuilder::default() |
| .protocol_id("/foosub", Version::V1_1) |
| .support_floodsub() |
| .build() |
| .unwrap() |
| .protocol_config(); |
|
|
| assert_eq!(protocol_config.protocol_ids[0].protocol, "/foosub"); |
| assert_eq!(protocol_config.protocol_ids[1].protocol, "/floodsub/1.0.0"); |
| } |
| } |
|
|