blob: d1c6412676e04d01802e366076f2e1e09c70ff60 [file] [log] [blame]
akmhoque3d06e792014-05-27 16:23:20 -05001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -04002/*
Davide Pesaventoe28d8752022-03-19 03:55:25 -04003 * Copyright (c) 2014-2022, The University of Memphis,
Nick Gordonf8b5bcd2016-08-11 15:06:50 -05004 * Regents of the University of California
akmhoque3d06e792014-05-27 16:23:20 -05005 *
6 * This file is part of NLSR (Named-data Link State Routing).
7 * See AUTHORS.md for complete list of NLSR authors and contributors.
8 *
9 * NLSR is free software: you can redistribute it and/or modify it under the terms
10 * of the GNU General Public License as published by the Free Software Foundation,
11 * either version 3 of the License, or (at your option) any later version.
12 *
13 * NLSR is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
14 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
15 * PURPOSE. See the GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along with
18 * NLSR, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040019 */
Muktadir R Chowdhurybfa27602014-10-31 10:57:41 -050020
akmhoque674b0b12014-05-20 14:33:28 -050021#include "conf-parameter.hpp"
22#include "logger.hpp"
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -040023
Junxiao Shib032fcb2022-04-28 01:28:50 +000024#include <ndn-cxx/security/signing-helpers.hpp>
akmhoque674b0b12014-05-20 14:33:28 -050025
26namespace nlsr {
27
dmcoomescf8d0ed2017-02-21 11:39:01 -060028INIT_LOGGER(ConfParameter);
akmhoque674b0b12014-05-20 14:33:28 -050029
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040030static std::unique_ptr<ndn::security::CertificateFetcherDirectFetch>
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050031makeCertificateFetcher(ndn::Face& face)
32{
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040033 auto fetcher = std::make_unique<ndn::security::CertificateFetcherDirectFetch>(face);
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050034 fetcher->setSendDirectInterestOnly(true);
35 return fetcher;
36}
37
Saurab Dulal427e0122019-11-28 11:58:02 -060038ConfParameter::ConfParameter(ndn::Face& face, ndn::KeyChain& keyChain,
39 const std::string& confFileName)
Ashlesh Gawande85998a12017-12-07 22:22:13 -060040 : m_confFileName(confFileName)
41 , m_lsaRefreshTime(LSA_REFRESH_TIME_DEFAULT)
42 , m_adjLsaBuildInterval(ADJ_LSA_BUILD_INTERVAL_DEFAULT)
Ashlesh Gawande85998a12017-12-07 22:22:13 -060043 , m_routingCalcInterval(ROUTING_CALC_INTERVAL_DEFAULT)
44 , m_faceDatasetFetchInterval(ndn::time::seconds(static_cast<int>(FACE_DATASET_FETCH_INTERVAL_DEFAULT)))
45 , m_lsaInterestLifetime(ndn::time::seconds(static_cast<int>(LSA_INTEREST_LIFETIME_DEFAULT)))
46 , m_routerDeadInterval(2 * LSA_REFRESH_TIME_DEFAULT)
47 , m_interestRetryNumber(HELLO_RETRIES_DEFAULT)
48 , m_interestResendTime(HELLO_TIMEOUT_DEFAULT)
49 , m_infoInterestInterval(HELLO_INTERVAL_DEFAULT)
50 , m_hyperbolicState(HYPERBOLIC_STATE_OFF)
51 , m_corR(0)
52 , m_maxFacesPerPrefix(MAX_FACES_PER_PREFIX_MIN)
53 , m_syncInterestLifetime(ndn::time::milliseconds(SYNC_INTEREST_LIFETIME_DEFAULT))
Ashlesh Gawande85998a12017-12-07 22:22:13 -060054 , m_adjl()
55 , m_npl()
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050056 , m_validator(makeCertificateFetcher(face))
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040057 , m_prefixUpdateValidator(std::make_unique<ndn::security::CertificateFetcherDirectFetch>(face))
Saurab Dulal427e0122019-11-28 11:58:02 -060058 , m_keyChain(keyChain)
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050059{
60}
Ashlesh Gawande85998a12017-12-07 22:22:13 -060061
akmhoque674b0b12014-05-20 14:33:28 -050062void
63ConfParameter::writeLog()
64{
dmcoomes5bcb39e2017-10-31 15:07:55 -050065 NLSR_LOG_INFO("Router Name: " << m_routerName);
66 NLSR_LOG_INFO("Site Name: " << m_siteName);
67 NLSR_LOG_INFO("Network: " << m_network);
68 NLSR_LOG_INFO("Router Prefix: " << m_routerPrefix);
Ashlesh Gawande85998a12017-12-07 22:22:13 -060069 NLSR_LOG_INFO("Sync Prefix: " << m_syncPrefix);
70 NLSR_LOG_INFO("Sync LSA prefix: " << m_lsaPrefix);
dmcoomes5bcb39e2017-10-31 15:07:55 -050071 NLSR_LOG_INFO("Hello Interest retry number: " << m_interestRetryNumber);
72 NLSR_LOG_INFO("Hello Interest resend second: " << m_interestResendTime);
73 NLSR_LOG_INFO("Info Interest interval: " << m_infoInterestInterval);
74 NLSR_LOG_INFO("LSA refresh time: " << m_lsaRefreshTime);
75 NLSR_LOG_INFO("FIB Entry refresh time: " << m_lsaRefreshTime * 2);
76 NLSR_LOG_INFO("LSA Interest lifetime: " << getLsaInterestLifetime());
77 NLSR_LOG_INFO("Router dead interval: " << getRouterDeadInterval());
78 NLSR_LOG_INFO("Max Faces Per Prefix: " << m_maxFacesPerPrefix);
Ashlesh Gawande6b388fc2019-09-30 10:14:41 -050079 if (m_hyperbolicState == HYPERBOLIC_STATE_ON || m_hyperbolicState == HYPERBOLIC_STATE_DRY_RUN) {
80 NLSR_LOG_INFO("Hyperbolic Routing: " << m_hyperbolicState);
81 NLSR_LOG_INFO("Hyp R: " << m_corR);
82 int i=0;
83 for (auto const& value: m_corTheta) {
84 NLSR_LOG_INFO("Hyp Angle " << i++ << ": "<< value);
85 }
Muktadir R Chowdhuryb00dc2a2016-11-05 10:48:58 -060086 }
dulalsaurab82a34c22019-02-04 17:31:21 +000087 NLSR_LOG_INFO("State Directory: " << m_stateFileDir);
Vince Lehman7b616582014-10-17 16:25:39 -050088
89 // Event Intervals
dmcoomes5bcb39e2017-10-31 15:07:55 -050090 NLSR_LOG_INFO("Adjacency LSA build interval: " << m_adjLsaBuildInterval);
dmcoomes5bcb39e2017-10-31 15:07:55 -050091 NLSR_LOG_INFO("Routing calculation interval: " << m_routingCalcInterval);
akmhoque674b0b12014-05-20 14:33:28 -050092}
93
Ashlesh Gawande982a58f2018-02-14 17:39:12 -060094void
95ConfParameter::setNetwork(const ndn::Name& networkName)
96{
97 m_network = networkName;
98
Ashlesh Gawande85998a12017-12-07 22:22:13 -060099 m_syncPrefix.append("localhop");
100 m_syncPrefix.append(m_network);
101 m_syncPrefix.append("nlsr");
102 m_syncPrefix.append("sync");
103 m_syncPrefix.appendVersion(SYNC_VERSION);
Ashlesh Gawande982a58f2018-02-14 17:39:12 -0600104
105 m_lsaPrefix.append("localhop");
106 m_lsaPrefix.append(m_network);
Ashlesh Gawandecba0ae22018-03-27 17:57:56 -0500107 m_lsaPrefix.append("nlsr");
Ashlesh Gawande982a58f2018-02-14 17:39:12 -0600108 m_lsaPrefix.append("LSA");
109}
110
Saurab Dulal427e0122019-11-28 11:58:02 -0600111void
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -0400112ConfParameter::loadCertToValidator(const ndn::security::Certificate& cert)
Saurab Dulal427e0122019-11-28 11:58:02 -0600113{
114 NLSR_LOG_TRACE("Loading Certificate Name: " << cert.getName());
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -0400115 m_validator.loadAnchor("Authoritative-Certificate", ndn::security::Certificate(cert));
116 m_prefixUpdateValidator.loadAnchor("Authoritative-Certificate", ndn::security::Certificate(cert));
Saurab Dulal427e0122019-11-28 11:58:02 -0600117}
118
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -0400119std::optional<ndn::security::Certificate>
Saurab Dulal427e0122019-11-28 11:58:02 -0600120ConfParameter::initializeKey()
121{
Junxiao Shib032fcb2022-04-28 01:28:50 +0000122 using namespace ndn::security;
Saurab Dulal427e0122019-11-28 11:58:02 -0600123 NLSR_LOG_DEBUG("Initializing Key ...");
124
Junxiao Shib032fcb2022-04-28 01:28:50 +0000125 Identity routerIdentity;
Saurab Dulal427e0122019-11-28 11:58:02 -0600126 try {
Junxiao Shib032fcb2022-04-28 01:28:50 +0000127 routerIdentity = m_keyChain.getPib().getIdentity(m_routerPrefix);
Saurab Dulal427e0122019-11-28 11:58:02 -0600128 }
Junxiao Shib032fcb2022-04-28 01:28:50 +0000129 catch (const Pib::Error&) {
130 NLSR_LOG_ERROR("Router identity " << m_routerPrefix << " not found. "
131 "NLSR is running without security. "
Saurab Dulal427e0122019-11-28 11:58:02 -0600132 "If security is enabled in the configuration, NLSR will not converge.");
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -0400133 return std::nullopt;
Saurab Dulal427e0122019-11-28 11:58:02 -0600134 }
Dylanfabe9722022-05-16 12:47:39 -0500135 catch (const std::invalid_argument& e) {
136 // This is (probably) needed for the dummy keychain patch.
137 // https://github.com/named-data/mini-ndn/blob/master/util/patches/ndn-cxx-dummy-keychain.patch
138 NLSR_LOG_DEBUG(e.what());
139 }
Saurab Dulal427e0122019-11-28 11:58:02 -0600140
Junxiao Shib032fcb2022-04-28 01:28:50 +0000141 auto instanceName = ndn::Name(m_routerPrefix).append("nlsr");
142 try {
143 m_keyChain.deleteIdentity(m_keyChain.getPib().getIdentity(instanceName));
144 }
145 catch (const Pib::Error&) {
146 // old instance identity does not exist
147 }
Dylanfabe9722022-05-16 12:47:39 -0500148 catch (const std::invalid_argument& e) {
149 // This is needed for the dummy-keychain patch (ref above) to handle the error that it generates.
150 const std::string exceptionText = e.what();
151 if (exceptionText.find("does not match identity") == std::string::npos) {
152 NLSR_LOG_ERROR(exceptionText);
153 throw;
154 }
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -0400155 return std::nullopt;
Dylanfabe9722022-05-16 12:47:39 -0500156 }
Saurab Dulal427e0122019-11-28 11:58:02 -0600157
Junxiao Shib032fcb2022-04-28 01:28:50 +0000158 auto key = m_keyChain.createIdentity(instanceName).getDefaultKey();
159 auto cert = m_keyChain.makeCertificate(key, signingByIdentity(routerIdentity));
160 m_keyChain.setDefaultCertificate(key, cert);
Saurab Dulal427e0122019-11-28 11:58:02 -0600161
Junxiao Shib032fcb2022-04-28 01:28:50 +0000162 m_signingInfo = signingByCertificate(cert);
163 loadCertToValidator(cert);
164 return cert;
Saurab Dulal427e0122019-11-28 11:58:02 -0600165}
166
akmhoque674b0b12014-05-20 14:33:28 -0500167} // namespace nlsr