Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(new-RPC): connection healthcheck implementation for peers #2194

Merged
merged 38 commits into from
Oct 3, 2024
Merged
Changes from 1 commit
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
4c23204
create bare RPC structure
onur-ozkan Aug 19, 2024
ad1cdb9
implement `PeerConnectionHealth` p2p command
onur-ozkan Aug 20, 2024
838b5a5
add new p2p message topic "hcheck"
onur-ozkan Aug 26, 2024
886d13e
fix p2p race condition
onur-ozkan Aug 26, 2024
9ee8485
WIP: `HealtCheckMsg`
onur-ozkan Aug 26, 2024
db49d0d
implement signing and verification logic
onur-ozkan Aug 27, 2024
a5d7f81
simulate request-response behaviour
onur-ozkan Aug 27, 2024
90e5599
improve the performance and logging
onur-ozkan Aug 28, 2024
ecf9cea
remove redundant crates
onur-ozkan Aug 28, 2024
1d9d874
add debug logs for invalid messages
onur-ozkan Aug 28, 2024
493585a
improve response status, error logs and types
onur-ozkan Aug 28, 2024
f5c98da
inline various functions
onur-ozkan Aug 28, 2024
0aaa011
prevent brute-force attacks
onur-ozkan Aug 28, 2024
b73a0f2
handle panics
onur-ozkan Sep 2, 2024
e6f29c7
add unit test coverage for healthcheck implementation
onur-ozkan Sep 2, 2024
8a20b8c
extend healthcheck coverage to WASM
onur-ozkan Sep 2, 2024
f550550
add integration test coverage for `peer_connection_healthcheck` RPC
onur-ozkan Sep 2, 2024
9774f15
add global configuration interface for healthchecks
onur-ozkan Sep 2, 2024
6286299
add doc-comments
onur-ozkan Sep 3, 2024
14eeaee
handle our address
onur-ozkan Sep 4, 2024
b5275d1
update time related logics
onur-ozkan Sep 18, 2024
5b39e75
remove manual default value handling
onur-ozkan Sep 18, 2024
7fccb15
pack healthcheck related `Ctx` fields
onur-ozkan Sep 18, 2024
1777559
make safer ser and deser functions for bytes and peer addresses
onur-ozkan Sep 18, 2024
13fe925
separate the healthcheck processing logic and improve the performance
onur-ozkan Sep 19, 2024
1a3bb84
rename `bruteforce_shield` into `ddos_shield`
onur-ozkan Sep 19, 2024
5605a00
keep `init_p2p_context` private
onur-ozkan Sep 24, 2024
0d46b36
Merge branch 'dev' of github.com:KomodoPlatform/komodo-defi-framework…
onur-ozkan Sep 24, 2024
74c8bea
nit fixes
onur-ozkan Sep 25, 2024
de61cc2
switch to sync `Mutex`
onur-ozkan Sep 25, 2024
93efaa2
set max limit for expiration time logic
onur-ozkan Sep 25, 2024
9b08695
fix WASM lint
onur-ozkan Sep 25, 2024
ad61f31
run ddos protection logic after message verification
onur-ozkan Sep 25, 2024
b4d63f6
create `PeerAddress` as a wrapper of `libp2p::PeerId`
onur-ozkan Sep 26, 2024
8727e52
switch back to async mutexa again
onur-ozkan Sep 26, 2024
d2d9fff
implement reusable messages
onur-ozkan Sep 30, 2024
b98832c
reduce the healthcheck overhead
onur-ozkan Sep 30, 2024
3169081
use more precise error type and remove sender_peer from hc message
onur-ozkan Oct 2, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
145 changes: 83 additions & 62 deletions mm2src/mm2_main/src/lp_healthcheck.rs
Original file line number Diff line number Diff line change
Expand Up @@ -102,17 +102,37 @@ impl<'de> Deserialize<'de> for PeerAddress {
}
}

#[derive(Debug, Display)]
enum SignValidationError {
#[display(
fmt = "Healthcheck message is expired. Current time in UTC: {now_secs}, healthcheck `expires_at` in UTC: {expires_at_secs}"
)]
Expired { now_secs: u64, expires_at_secs: u64 },
#[display(
fmt = "Healthcheck message have too high expiration time. Max allowed expiration seconds: {max_allowed_expiration_secs}, received message expiration seconds: {remaining_expiration_secs}"
)]
LifetimeOverflow {
max_allowed_expiration_secs: u64,
remaining_expiration_secs: u64,
},
#[display(fmt = "Public key is not valid.")]
InvalidPublicKey,
#[display(fmt = "Signature integrity doesn't match with the public key.")]
FakeSignature,
#[display(fmt = "Process failed unexpectedly due to this reason: {reason}")]
Internal { reason: String },
}

impl HealthcheckMessage {
pub(crate) fn generate_message(ctx: &MmArc, is_a_reply: bool) -> Result<Self, String> {
let p2p_ctx = P2PContext::fetch_from_mm_arc(ctx);
let sender_peer = p2p_ctx.peer_id().into();
let keypair = p2p_ctx.keypair();
let sender_public_key = keypair.public().encode_protobuf();

let data = HealthcheckData {
sender_peer,
sender_public_key,
expires_at: Utc::now().timestamp() + healthcheck_message_exp_secs() as i64,
expires_at_secs: u64::try_from(Utc::now().timestamp()).map_err(|e| e.to_string())?
+ healthcheck_message_exp_secs(),
is_a_reply,
};

Expand All @@ -131,9 +151,8 @@ impl HealthcheckMessage {
HealthcheckMessage {
signature: vec![],
data: HealthcheckData {
sender_peer: create_test_peer_address(),
sender_public_key: vec![],
expires_at: 0,
expires_at_secs: 0,
is_a_reply: false,
},
},
Expand All @@ -157,49 +176,40 @@ impl HealthcheckMessage {
}
}

pub(crate) fn is_received_message_valid(&self) -> bool {
let now = Utc::now().timestamp();
let remaining_expiration_seconds = u64::try_from(self.data.expires_at - now).unwrap_or(0);

if remaining_expiration_seconds == 0 {
log::debug!(
"Healthcheck message is expired. Current time in UTC: {now}, healthcheck `expires_at` in UTC: {}",
self.data.expires_at
);
return false;
} else if remaining_expiration_seconds > healthcheck_message_exp_secs() {
log::debug!(
"Healthcheck message have too high expiration time.\nMax allowed expiration seconds: {}\nReceived message expiration seconds: {}",
self.data.expires_at,
remaining_expiration_seconds,
);
return false;
fn is_received_message_valid(&self) -> Result<PeerAddress, SignValidationError> {
let now_secs = u64::try_from(Utc::now().timestamp())
.map_err(|e| SignValidationError::Internal { reason: e.to_string() })?;

let remaining_expiration_secs = self.data.expires_at_secs - now_secs;

if remaining_expiration_secs == 0 {
return Err(SignValidationError::Expired {
now_secs,
expires_at_secs: self.data.expires_at_secs,
});
} else if remaining_expiration_secs > healthcheck_message_exp_secs() {
return Err(SignValidationError::LifetimeOverflow {
max_allowed_expiration_secs: healthcheck_message_exp_secs(),
remaining_expiration_secs,
});
}

let Ok(public_key) = Libp2pPublic::try_decode_protobuf(&self.data.sender_public_key) else {
log::debug!("Couldn't decode public key from the healthcheck message.");

return false
return Err(SignValidationError::InvalidPublicKey);
};

if self.data.sender_peer != public_key.to_peer_id().into() {
log::debug!("`sender_peer` and `sender_public_key` doesn't belong each other.");

return false;
}

let Ok(encoded_message) = self.data.encode() else {
log::debug!("Couldn't encode healthcheck data.");
return false
};
let encoded_message = self
.data
.encode()
.map_err(|e| SignValidationError::Internal { reason: e.to_string() })?;

let res = public_key.verify(&encoded_message, &self.signature);

if !res {
log::debug!("Healthcheck isn't signed correctly.");
if public_key.verify(&encoded_message, &self.signature) {
Ok(public_key.to_peer_id().into())
} else {
Err(SignValidationError::FakeSignature)
}

res
}

#[inline]
Expand All @@ -210,18 +220,14 @@ impl HealthcheckMessage {

#[inline]
pub(crate) fn should_reply(&self) -> bool { !self.data.is_a_reply }

#[inline]
pub(crate) fn sender_peer(&self) -> PeerAddress { self.data.sender_peer }
}

#[derive(Clone, Debug, Deserialize, Serialize)]
#[cfg_attr(any(test, target_arch = "wasm32"), derive(PartialEq))]
struct HealthcheckData {
sender_peer: PeerAddress,
#[serde(deserialize_with = "deserialize_bytes")]
sender_public_key: Vec<u8>,
onur-ozkan marked this conversation as resolved.
Show resolved Hide resolved
expires_at: i64,
expires_at_secs: u64,
is_a_reply: bool,
}

Expand Down Expand Up @@ -358,17 +364,17 @@ pub(crate) async fn process_p2p_healthcheck_message(ctx: &MmArc, message: mm2_li
"Couldn't decode healthcheck message"
);

let sender_peer = data.sender_peer();

let ctx = ctx.clone();

// Pass the remaining work to another thread to free up this one as soon as possible,
// so KDF can handle a high amount of healthcheck messages more efficiently.
ctx.spawner().spawn(async move {
if !data.is_received_message_valid() {
log::error!("Received an invalid healthcheck message.");
log::debug!("Message context: {:?}", data);
return;
let sender_peer = match data.is_received_message_valid() {
Ok(t) => t,
Err(e) => {
log::error!("Received an invalid healthcheck message. Error: {e}");
return;
},
};

if data.should_reply() {
Expand Down Expand Up @@ -400,13 +406,10 @@ pub(crate) async fn process_p2p_healthcheck_message(ctx: &MmArc, message: mm2_li
});
}

fn create_test_peer_address() -> PeerAddress {
let keypair = mm2_libp2p::Keypair::generate_ed25519();
mm2_libp2p::PeerId::from(keypair.public()).into()
}

#[cfg(any(test, target_arch = "wasm32"))]
mod tests {
use std::mem::discriminant;

use super::*;
use common::cross_test;
use crypto::CryptoCtx;
Expand Down Expand Up @@ -453,30 +456,48 @@ mod tests {
cross_test!(test_valid_message, {
let ctx = ctx();
let message = HealthcheckMessage::generate_message(&ctx, false).unwrap();
assert!(message.is_received_message_valid());
message.is_received_message_valid().unwrap();
});

cross_test!(test_corrupted_messages, {
let ctx = ctx();

let mut message = HealthcheckMessage::generate_message(&ctx, false).unwrap();
message.data.expires_at += 1;
assert!(!message.is_received_message_valid());
message.data.expires_at_secs += healthcheck_message_exp_secs() * 3;
assert_eq!(
discriminant(&message.is_received_message_valid().err().unwrap()),
discriminant(&SignValidationError::LifetimeOverflow {
max_allowed_expiration_secs: 0,
remaining_expiration_secs: 0
})
);
mariocynicys marked this conversation as resolved.
Show resolved Hide resolved

let mut message = HealthcheckMessage::generate_message(&ctx, false).unwrap();
message.data.is_a_reply = !message.data.is_a_reply;
assert!(!message.is_received_message_valid());
assert_eq!(
discriminant(&message.is_received_message_valid().err().unwrap()),
discriminant(&SignValidationError::FakeSignature)
);

let mut message = HealthcheckMessage::generate_message(&ctx, false).unwrap();
message.data.sender_peer = create_test_peer_address();
assert!(!message.is_received_message_valid());
message.data.sender_public_key.push(0);
assert_eq!(
discriminant(&message.is_received_message_valid().err().unwrap()),
discriminant(&SignValidationError::InvalidPublicKey)
);
});

cross_test!(test_expired_message, {
let ctx = ctx();
let message = HealthcheckMessage::generate_message(&ctx, false).unwrap();
common::executor::Timer::sleep(3.).await;
assert!(!message.is_received_message_valid());
assert_eq!(
discriminant(&message.is_received_message_valid().err().unwrap()),
discriminant(&SignValidationError::Expired {
now_secs: 0,
expires_at_secs: 0
})
);
});

cross_test!(test_encode_decode, {
Expand Down
Loading