#include #include #include #include #include #include #include "netbase.h" #include "protocol.h" #include "util.h" #define MIN_RETRY 1000 std::string static inline ToString(const CIPPort &ip) { std::string str = ip.ToString(); while (str.size() < 22) str += ' '; return str; } class CAddrStat { private: float weight; float count; float reliability; public: CAddrStat() : weight(0), count(0), reliability(0) {} void Update(bool good, int64 age, double tau) { double f = exp(-age/tau); reliability = reliability * f + (good ? (1.0-f) : 0); count = count * f + 1; weight = weight * f + (1.0-f); } IMPLEMENT_SERIALIZE ( READWRITE(weight); READWRITE(count); READWRITE(reliability); ) friend class CAddrInfo; }; class CAddrReport { public: CIPPort ip; int clientVersion; double uptime[5]; std::string clientSubVersion; }; class CAddrInfo { private: CIPPort ip; uint64_t services; int64 lastTry; int64 ourLastTry; int64 ignoreTill; CAddrStat stat2H; CAddrStat stat8H; CAddrStat stat1D; CAddrStat stat1W; CAddrStat stat1M; int clientVersion; int total; int success; std::string clientSubVersion; public: CAddrInfo() : services(0), lastTry(0), ourLastTry(0), ignoreTill(0), clientVersion(0), total(0), success(0) {} CAddrReport GetReport() const { CAddrReport ret; ret.ip = ip; ret.clientVersion = clientVersion; ret.clientSubVersion = clientSubVersion; ret.uptime[0] = stat2H.reliability; ret.uptime[1] = stat8H.reliability; ret.uptime[2] = stat1D.reliability; ret.uptime[3] = stat1W.reliability; ret.uptime[4] = stat1M.reliability; return ret; } bool IsGood() const { if (ip.GetPort() != 8333) return false; if (!(services & NODE_NETWORK)) return false; if (!ip.IsRoutable()) return false; if (!ip.IsIPv4()) return false; if (clientVersion && clientVersion < 32400) return false; if (total <= 3 && success * 2 >= total) return true; if (stat2H.reliability > 0.7 && stat2H.count > 1) return true; if (stat8H.reliability > 0.6 && stat8H.count > 2) return true; if (stat1D.reliability > 0.5 && stat1D.count > 4) return true; if (stat1W.reliability > 0.4 && stat1W.count > 8) return true; return false; } int GetBanTime() const { if (IsGood()) return 0; if (clientVersion && clientVersion < 31900) { return 1000000; } if (stat1D.reliability < 0.01 && stat1D.count > 5) { return 500000; } if (stat1W.reliability - stat1W.weight + 1.0 < 0.10 && stat1W.count > 4) { return 240*3600; } return 0; } int GetIgnoreTime() const { if (IsGood()) return 0; if (stat2H.reliability - stat2H.weight + 1.0 < 0.2 && stat2H.count > 3) { return 3*3600; } if (stat8H.reliability - stat8H.weight + 1.0 < 0.2 && stat8H.count > 6) { return 12*3600; } if (stat1D.reliability - stat1D.weight + 1.0 < 0.2 && stat1D.count > 9) { return 36*3600; } return 0; } void Update(bool good); friend class CAddrDb; IMPLEMENT_SERIALIZE ( unsigned char version = 2; READWRITE(version); READWRITE(ip); READWRITE(services); READWRITE(lastTry); unsigned char tried = ourLastTry != 0; READWRITE(tried); if (tried) { READWRITE(ourLastTry); READWRITE(ignoreTill); READWRITE(stat2H); READWRITE(stat8H); READWRITE(stat1D); READWRITE(stat1W); if (version >= 1) READWRITE(stat1M); else if (!fWrite) *((CAddrStat*)(&stat1M)) = stat1W; READWRITE(total); READWRITE(success); READWRITE(clientVersion); if (version >= 2) READWRITE(clientSubVersion); } ) }; class CAddrDbStats { public: int nBanned; int nAvail; int nTracked; int nNew; int nGood; int nAge; }; // seen nodes // / \ // (a) banned nodes available nodes-------------- // / | \ // tracked nodes (b) unknown nodes (e) active nodes // / \ // (d) good nodes (c) non-good nodes class CAddrDb { private: mutable CCriticalSection cs; int nId; // number of address id's std::map idToInfo; // map address id to address info (b,c,d,e) std::map ipToId; // map ip to id (b,c,d,e) std::deque ourId; // sequence of tried nodes, in order we have tried connecting to them (c,d) std::set unkId; // set of nodes not yet tried (b) std::set goodId; // set of good nodes (d, good e) int nDirty; protected: // internal routines that assume proper locks are acquired void Add_(const CAddress &addr, bool force); // add an address bool Get_(CIPPort &ip, int& wait); // get an IP to test (must call Good_, Bad_, or Skipped_ on result afterwards) void Good_(const CIPPort &ip, int clientV, std::string clientSV); // mark an IP as good (must have been returned by Get_) void Bad_(const CIPPort &ip, int ban); // mark an IP as bad (and optionally ban it) (must have been returned by Get_) void Skipped_(const CIPPort &ip); // mark an IP as skipped (must have been returned by Get_) int Lookup_(const CIPPort &ip); // look up id of an IP void GetIPs_(std::set& ips, int max, bool fOnlyIPv4); // get a random set of IPs (shared lock only) public: std::map banned; // nodes that are banned, with their unban time (a) void GetStats(CAddrDbStats &stats) { SHARED_CRITICAL_BLOCK(cs) { stats.nBanned = banned.size(); stats.nAvail = idToInfo.size(); stats.nTracked = ourId.size(); stats.nGood = goodId.size(); stats.nNew = unkId.size(); stats.nAge = time(NULL) - idToInfo[ourId[0]].ourLastTry; } } std::vector GetAll() { std::vector ret; SHARED_CRITICAL_BLOCK(cs) { for (std::deque::const_iterator it = ourId.begin(); it != ourId.end(); it++) { const CAddrInfo &info = idToInfo[*it]; if (info.success > 0) { ret.push_back(info.GetReport()); } } } return ret; } // serialization code // format: // nVersion (0 for now) // n (number of ips in (b,c,d)) // CAddrInfo[n] // banned // acquires a shared lock (this does not suffice for read mode, but we assume that only happens at startup, single-threaded) // this way, dumping does not interfere with GetIPs_, which is called from the DNS thread IMPLEMENT_SERIALIZE (({ int nVersion = 0; READWRITE(nVersion); SHARED_CRITICAL_BLOCK(cs) { if (fWrite) { CAddrDb *db = const_cast(this); int n = ourId.size() + unkId.size(); READWRITE(n); for (std::deque::const_iterator it = ourId.begin(); it != ourId.end(); it++) { std::map::iterator ci = db->idToInfo.find(*it); READWRITE((*ci).second); } for (std::set::const_iterator it = unkId.begin(); it != unkId.end(); it++) { std::map::iterator ci = db->idToInfo.find(*it); READWRITE((*ci).second); } } else { CAddrDb *db = const_cast(this); db->nId = 0; int n; READWRITE(n); for (int i=0; inId++; db->idToInfo[id] = info; db->ipToId[info.ip] = id; if (info.ourLastTry) { db->ourId.push_back(id); if (info.IsGood()) db->goodId.insert(id); } else { db->unkId.insert(id); } } } db->nDirty++; } READWRITE(banned); } });) void Add(const CAddress &addr, bool fForce = false) { CRITICAL_BLOCK(cs) Add_(addr, fForce); } void Add(const std::vector &vAddr, bool fForce = false) { CRITICAL_BLOCK(cs) for (int i=0; i& ips, int max, bool fOnlyIPv4 = true) { SHARED_CRITICAL_BLOCK(cs) GetIPs_(ips, max, fOnlyIPv4); } };