blob: 8a7a56f4b3f7179d9f26dde86da6c250465353f5 [file] [log] [blame]
akmhoque3d06e792014-05-27 16:23:20 -05001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -04002/*
Davide Pesaventoe28d8752022-03-19 03:55:25 -04003 * Copyright (c) 2014-2022, The University of Memphis,
Nick Gordonf8b5bcd2016-08-11 15:06:50 -05004 * Regents of the University of California
akmhoque3d06e792014-05-27 16:23:20 -05005 *
6 * This file is part of NLSR (Named-data Link State Routing).
7 * See AUTHORS.md for complete list of NLSR authors and contributors.
8 *
9 * NLSR is free software: you can redistribute it and/or modify it under the terms
10 * of the GNU General Public License as published by the Free Software Foundation,
11 * either version 3 of the License, or (at your option) any later version.
12 *
13 * NLSR is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
14 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
15 * PURPOSE. See the GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along with
18 * NLSR, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040019 */
Muktadir R Chowdhurybfa27602014-10-31 10:57:41 -050020
akmhoque674b0b12014-05-20 14:33:28 -050021#include "conf-parameter.hpp"
22#include "logger.hpp"
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -040023
Junxiao Shib032fcb2022-04-28 01:28:50 +000024#include <ndn-cxx/security/signing-helpers.hpp>
akmhoque674b0b12014-05-20 14:33:28 -050025
26namespace nlsr {
27
dmcoomescf8d0ed2017-02-21 11:39:01 -060028INIT_LOGGER(ConfParameter);
akmhoque674b0b12014-05-20 14:33:28 -050029
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040030static std::unique_ptr<ndn::security::CertificateFetcherDirectFetch>
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050031makeCertificateFetcher(ndn::Face& face)
32{
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040033 auto fetcher = std::make_unique<ndn::security::CertificateFetcherDirectFetch>(face);
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050034 fetcher->setSendDirectInterestOnly(true);
35 return fetcher;
36}
37
Saurab Dulal427e0122019-11-28 11:58:02 -060038ConfParameter::ConfParameter(ndn::Face& face, ndn::KeyChain& keyChain,
39 const std::string& confFileName)
Ashlesh Gawande85998a12017-12-07 22:22:13 -060040 : m_confFileName(confFileName)
41 , m_lsaRefreshTime(LSA_REFRESH_TIME_DEFAULT)
42 , m_adjLsaBuildInterval(ADJ_LSA_BUILD_INTERVAL_DEFAULT)
Ashlesh Gawande85998a12017-12-07 22:22:13 -060043 , m_routingCalcInterval(ROUTING_CALC_INTERVAL_DEFAULT)
44 , m_faceDatasetFetchInterval(ndn::time::seconds(static_cast<int>(FACE_DATASET_FETCH_INTERVAL_DEFAULT)))
45 , m_lsaInterestLifetime(ndn::time::seconds(static_cast<int>(LSA_INTEREST_LIFETIME_DEFAULT)))
46 , m_routerDeadInterval(2 * LSA_REFRESH_TIME_DEFAULT)
47 , m_interestRetryNumber(HELLO_RETRIES_DEFAULT)
48 , m_interestResendTime(HELLO_TIMEOUT_DEFAULT)
49 , m_infoInterestInterval(HELLO_INTERVAL_DEFAULT)
50 , m_hyperbolicState(HYPERBOLIC_STATE_OFF)
51 , m_corR(0)
52 , m_maxFacesPerPrefix(MAX_FACES_PER_PREFIX_MIN)
53 , m_syncInterestLifetime(ndn::time::milliseconds(SYNC_INTEREST_LIFETIME_DEFAULT))
Ashlesh Gawande30d96e42021-03-21 19:15:33 -070054 , m_syncProtocol(SYNC_PROTOCOL_PSYNC)
Ashlesh Gawande85998a12017-12-07 22:22:13 -060055 , m_adjl()
56 , m_npl()
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050057 , m_validator(makeCertificateFetcher(face))
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -040058 , m_prefixUpdateValidator(std::make_unique<ndn::security::CertificateFetcherDirectFetch>(face))
Saurab Dulal427e0122019-11-28 11:58:02 -060059 , m_keyChain(keyChain)
Ashlesh Gawandedec85d22019-03-21 21:39:39 -050060{
61}
Ashlesh Gawande85998a12017-12-07 22:22:13 -060062
akmhoque674b0b12014-05-20 14:33:28 -050063void
64ConfParameter::writeLog()
65{
dmcoomes5bcb39e2017-10-31 15:07:55 -050066 NLSR_LOG_INFO("Router Name: " << m_routerName);
67 NLSR_LOG_INFO("Site Name: " << m_siteName);
68 NLSR_LOG_INFO("Network: " << m_network);
69 NLSR_LOG_INFO("Router Prefix: " << m_routerPrefix);
Ashlesh Gawande85998a12017-12-07 22:22:13 -060070 NLSR_LOG_INFO("Sync Prefix: " << m_syncPrefix);
71 NLSR_LOG_INFO("Sync LSA prefix: " << m_lsaPrefix);
dmcoomes5bcb39e2017-10-31 15:07:55 -050072 NLSR_LOG_INFO("Hello Interest retry number: " << m_interestRetryNumber);
73 NLSR_LOG_INFO("Hello Interest resend second: " << m_interestResendTime);
74 NLSR_LOG_INFO("Info Interest interval: " << m_infoInterestInterval);
75 NLSR_LOG_INFO("LSA refresh time: " << m_lsaRefreshTime);
76 NLSR_LOG_INFO("FIB Entry refresh time: " << m_lsaRefreshTime * 2);
77 NLSR_LOG_INFO("LSA Interest lifetime: " << getLsaInterestLifetime());
78 NLSR_LOG_INFO("Router dead interval: " << getRouterDeadInterval());
79 NLSR_LOG_INFO("Max Faces Per Prefix: " << m_maxFacesPerPrefix);
Ashlesh Gawande6b388fc2019-09-30 10:14:41 -050080 if (m_hyperbolicState == HYPERBOLIC_STATE_ON || m_hyperbolicState == HYPERBOLIC_STATE_DRY_RUN) {
81 NLSR_LOG_INFO("Hyperbolic Routing: " << m_hyperbolicState);
82 NLSR_LOG_INFO("Hyp R: " << m_corR);
83 int i=0;
84 for (auto const& value: m_corTheta) {
85 NLSR_LOG_INFO("Hyp Angle " << i++ << ": "<< value);
86 }
Muktadir R Chowdhuryb00dc2a2016-11-05 10:48:58 -060087 }
dulalsaurab82a34c22019-02-04 17:31:21 +000088 NLSR_LOG_INFO("State Directory: " << m_stateFileDir);
Vince Lehman7b616582014-10-17 16:25:39 -050089
90 // Event Intervals
dmcoomes5bcb39e2017-10-31 15:07:55 -050091 NLSR_LOG_INFO("Adjacency LSA build interval: " << m_adjLsaBuildInterval);
dmcoomes5bcb39e2017-10-31 15:07:55 -050092 NLSR_LOG_INFO("Routing calculation interval: " << m_routingCalcInterval);
akmhoque674b0b12014-05-20 14:33:28 -050093}
94
Ashlesh Gawande982a58f2018-02-14 17:39:12 -060095void
96ConfParameter::setNetwork(const ndn::Name& networkName)
97{
98 m_network = networkName;
99
Ashlesh Gawande85998a12017-12-07 22:22:13 -0600100 m_syncPrefix.append("localhop");
101 m_syncPrefix.append(m_network);
102 m_syncPrefix.append("nlsr");
103 m_syncPrefix.append("sync");
104 m_syncPrefix.appendVersion(SYNC_VERSION);
Ashlesh Gawande982a58f2018-02-14 17:39:12 -0600105
106 m_lsaPrefix.append("localhop");
107 m_lsaPrefix.append(m_network);
Ashlesh Gawandecba0ae22018-03-27 17:57:56 -0500108 m_lsaPrefix.append("nlsr");
Ashlesh Gawande982a58f2018-02-14 17:39:12 -0600109 m_lsaPrefix.append("LSA");
110}
111
Saurab Dulal427e0122019-11-28 11:58:02 -0600112void
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -0400113ConfParameter::loadCertToValidator(const ndn::security::Certificate& cert)
Saurab Dulal427e0122019-11-28 11:58:02 -0600114{
115 NLSR_LOG_TRACE("Loading Certificate Name: " << cert.getName());
Alexander Afanasyev0ad01f32020-06-03 14:12:58 -0400116 m_validator.loadAnchor("Authoritative-Certificate", ndn::security::Certificate(cert));
117 m_prefixUpdateValidator.loadAnchor("Authoritative-Certificate", ndn::security::Certificate(cert));
Saurab Dulal427e0122019-11-28 11:58:02 -0600118}
119
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -0400120std::optional<ndn::security::Certificate>
Saurab Dulal427e0122019-11-28 11:58:02 -0600121ConfParameter::initializeKey()
122{
Junxiao Shib032fcb2022-04-28 01:28:50 +0000123 using namespace ndn::security;
Saurab Dulal427e0122019-11-28 11:58:02 -0600124 NLSR_LOG_DEBUG("Initializing Key ...");
125
Junxiao Shib032fcb2022-04-28 01:28:50 +0000126 Identity routerIdentity;
Saurab Dulal427e0122019-11-28 11:58:02 -0600127 try {
Junxiao Shib032fcb2022-04-28 01:28:50 +0000128 routerIdentity = m_keyChain.getPib().getIdentity(m_routerPrefix);
Saurab Dulal427e0122019-11-28 11:58:02 -0600129 }
Junxiao Shib032fcb2022-04-28 01:28:50 +0000130 catch (const Pib::Error&) {
131 NLSR_LOG_ERROR("Router identity " << m_routerPrefix << " not found. "
132 "NLSR is running without security. "
Saurab Dulal427e0122019-11-28 11:58:02 -0600133 "If security is enabled in the configuration, NLSR will not converge.");
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -0400134 return std::nullopt;
Saurab Dulal427e0122019-11-28 11:58:02 -0600135 }
Dylanfabe9722022-05-16 12:47:39 -0500136 catch (const std::invalid_argument& e) {
137 // This is (probably) needed for the dummy keychain patch.
138 // https://github.com/named-data/mini-ndn/blob/master/util/patches/ndn-cxx-dummy-keychain.patch
139 NLSR_LOG_DEBUG(e.what());
140 }
Saurab Dulal427e0122019-11-28 11:58:02 -0600141
Junxiao Shib032fcb2022-04-28 01:28:50 +0000142 auto instanceName = ndn::Name(m_routerPrefix).append("nlsr");
143 try {
144 m_keyChain.deleteIdentity(m_keyChain.getPib().getIdentity(instanceName));
145 }
146 catch (const Pib::Error&) {
147 // old instance identity does not exist
148 }
Dylanfabe9722022-05-16 12:47:39 -0500149 catch (const std::invalid_argument& e) {
150 // This is needed for the dummy-keychain patch (ref above) to handle the error that it generates.
151 const std::string exceptionText = e.what();
152 if (exceptionText.find("does not match identity") == std::string::npos) {
153 NLSR_LOG_ERROR(exceptionText);
154 throw;
155 }
Davide Pesaventoc1d0e8e2022-06-15 14:26:02 -0400156 return std::nullopt;
Dylanfabe9722022-05-16 12:47:39 -0500157 }
Saurab Dulal427e0122019-11-28 11:58:02 -0600158
Junxiao Shib032fcb2022-04-28 01:28:50 +0000159 auto key = m_keyChain.createIdentity(instanceName).getDefaultKey();
160 auto cert = m_keyChain.makeCertificate(key, signingByIdentity(routerIdentity));
161 m_keyChain.setDefaultCertificate(key, cert);
Saurab Dulal427e0122019-11-28 11:58:02 -0600162
Junxiao Shib032fcb2022-04-28 01:28:50 +0000163 m_signingInfo = signingByCertificate(cert);
164 loadCertToValidator(cert);
165 return cert;
Saurab Dulal427e0122019-11-28 11:58:02 -0600166}
167
akmhoque674b0b12014-05-20 14:33:28 -0500168} // namespace nlsr