2019-12-09 10:06:04 +00:00
|
|
|
package whisper
|
2019-11-18 10:22:23 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2019-12-16 19:38:50 +00:00
|
|
|
"errors"
|
2019-11-18 10:22:23 +00:00
|
|
|
"fmt"
|
|
|
|
"time"
|
|
|
|
|
2020-01-02 09:10:19 +00:00
|
|
|
"github.com/tsenart/tb"
|
|
|
|
|
2019-11-18 10:22:23 +00:00
|
|
|
"github.com/ethereum/go-ethereum/p2p"
|
2019-12-16 19:38:50 +00:00
|
|
|
"github.com/ethereum/go-ethereum/p2p/enode"
|
2019-11-18 10:22:23 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type runLoop func(p *Peer, rw p2p.MsgReadWriter) error
|
|
|
|
|
|
|
|
type RateLimiterHandler interface {
|
2019-12-11 13:11:29 +00:00
|
|
|
ExceedPeerLimit() error
|
|
|
|
ExceedIPLimit() error
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type MetricsRateLimiterHandler struct{}
|
|
|
|
|
2019-12-20 09:40:50 +00:00
|
|
|
func (MetricsRateLimiterHandler) ExceedPeerLimit() error {
|
|
|
|
rateLimitsExceeded.WithLabelValues("peer_id").Inc()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
func (MetricsRateLimiterHandler) ExceedIPLimit() error {
|
|
|
|
rateLimitsExceeded.WithLabelValues("ip").Inc()
|
|
|
|
return nil
|
|
|
|
}
|
2019-11-18 10:22:23 +00:00
|
|
|
|
2020-04-23 19:54:24 +00:00
|
|
|
// RateLimits contains information about rate limit settings.
|
|
|
|
// It is exchanged using rateLimitingCode packet or in the handshake.
|
|
|
|
type RateLimits struct {
|
|
|
|
IPLimits uint64 // messages per second from a single IP (default 0, no limits)
|
|
|
|
PeerIDLimits uint64 // messages per second from a single peer ID (default 0, no limits)
|
|
|
|
TopicLimits uint64 // messages per second from a single topic (default 0, no limits)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r RateLimits) IsZero() bool {
|
|
|
|
return r == (RateLimits{})
|
|
|
|
}
|
|
|
|
|
2019-12-16 19:38:50 +00:00
|
|
|
var ErrRateLimitExceeded = errors.New("rate limit has been exceeded")
|
|
|
|
|
|
|
|
type DropPeerRateLimiterHandler struct {
|
|
|
|
// Tolerance is a number of how many a limit must be exceeded
|
|
|
|
// in order to drop a peer.
|
|
|
|
Tolerance int64
|
|
|
|
|
|
|
|
peerLimitExceeds int64
|
|
|
|
ipLimitExceeds int64
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *DropPeerRateLimiterHandler) ExceedPeerLimit() error {
|
|
|
|
h.peerLimitExceeds++
|
|
|
|
if h.Tolerance > 0 && h.peerLimitExceeds >= h.Tolerance {
|
|
|
|
return ErrRateLimitExceeded
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *DropPeerRateLimiterHandler) ExceedIPLimit() error {
|
|
|
|
h.ipLimitExceeds++
|
|
|
|
if h.Tolerance > 0 && h.ipLimitExceeds >= h.Tolerance {
|
|
|
|
return ErrRateLimitExceeded
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-11-18 10:22:23 +00:00
|
|
|
type PeerRateLimiterConfig struct {
|
|
|
|
LimitPerSecIP int64
|
|
|
|
LimitPerSecPeerID int64
|
|
|
|
WhitelistedIPs []string
|
|
|
|
WhitelistedPeerIDs []enode.ID
|
|
|
|
}
|
|
|
|
|
2019-12-09 10:06:04 +00:00
|
|
|
var defaultPeerRateLimiterConfig = PeerRateLimiterConfig{
|
2019-11-18 10:22:23 +00:00
|
|
|
LimitPerSecIP: 10,
|
|
|
|
LimitPerSecPeerID: 5,
|
|
|
|
WhitelistedIPs: nil,
|
|
|
|
WhitelistedPeerIDs: nil,
|
|
|
|
}
|
|
|
|
|
|
|
|
type PeerRateLimiter struct {
|
|
|
|
peerIDThrottler *tb.Throttler
|
|
|
|
ipThrottler *tb.Throttler
|
|
|
|
|
|
|
|
limitPerSecIP int64
|
|
|
|
limitPerSecPeerID int64
|
|
|
|
|
|
|
|
whitelistedPeerIDs []enode.ID
|
|
|
|
whitelistedIPs []string
|
|
|
|
|
2019-12-16 19:38:50 +00:00
|
|
|
handlers []RateLimiterHandler
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
|
2019-12-16 19:38:50 +00:00
|
|
|
func NewPeerRateLimiter(cfg *PeerRateLimiterConfig, handlers ...RateLimiterHandler) *PeerRateLimiter {
|
2019-11-18 10:22:23 +00:00
|
|
|
if cfg == nil {
|
2019-12-09 10:06:04 +00:00
|
|
|
copy := defaultPeerRateLimiterConfig
|
2019-11-18 10:22:23 +00:00
|
|
|
cfg = ©
|
|
|
|
}
|
|
|
|
|
|
|
|
return &PeerRateLimiter{
|
|
|
|
peerIDThrottler: tb.NewThrottler(time.Millisecond * 100),
|
|
|
|
ipThrottler: tb.NewThrottler(time.Millisecond * 100),
|
|
|
|
limitPerSecIP: cfg.LimitPerSecIP,
|
|
|
|
limitPerSecPeerID: cfg.LimitPerSecPeerID,
|
|
|
|
whitelistedPeerIDs: cfg.WhitelistedPeerIDs,
|
|
|
|
whitelistedIPs: cfg.WhitelistedIPs,
|
2019-12-16 19:38:50 +00:00
|
|
|
handlers: handlers,
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *PeerRateLimiter) decorate(p *Peer, rw p2p.MsgReadWriter, runLoop runLoop) error {
|
|
|
|
in, out := p2p.MsgPipe()
|
|
|
|
defer in.Close()
|
|
|
|
defer out.Close()
|
|
|
|
errC := make(chan error, 1)
|
|
|
|
|
|
|
|
// Read from the original reader and write to the message pipe.
|
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
packet, err := rw.ReadMsg()
|
|
|
|
if err != nil {
|
2021-01-26 15:15:26 +00:00
|
|
|
// We don't block as that might leak goroutines
|
|
|
|
select {
|
|
|
|
case errC <- fmt.Errorf("failed to read packet: %v", err):
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
|
2019-12-20 09:40:50 +00:00
|
|
|
rateLimitsProcessed.Inc()
|
2019-11-18 10:22:23 +00:00
|
|
|
|
|
|
|
var ip string
|
|
|
|
if p != nil && p.peer != nil {
|
|
|
|
ip = p.peer.Node().IP().String()
|
|
|
|
}
|
|
|
|
if halted := r.throttleIP(ip); halted {
|
2019-12-16 19:38:50 +00:00
|
|
|
for _, h := range r.handlers {
|
|
|
|
if err := h.ExceedIPLimit(); err != nil {
|
2021-01-26 15:15:26 +00:00
|
|
|
// We don't block as that might leak goroutines
|
|
|
|
select {
|
|
|
|
case errC <- fmt.Errorf("exceed rate limit by IP: %v", err):
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
2019-12-16 19:38:50 +00:00
|
|
|
}
|
2019-12-11 13:11:29 +00:00
|
|
|
}
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var peerID []byte
|
|
|
|
if p != nil {
|
|
|
|
peerID = p.ID()
|
|
|
|
}
|
|
|
|
if halted := r.throttlePeer(peerID); halted {
|
2019-12-16 19:38:50 +00:00
|
|
|
for _, h := range r.handlers {
|
|
|
|
if err := h.ExceedPeerLimit(); err != nil {
|
2021-01-26 15:15:26 +00:00
|
|
|
// We don't block as that might leak goroutines
|
|
|
|
select {
|
|
|
|
case errC <- fmt.Errorf("exceeded rate limit by peer: %v", err):
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
2019-12-16 19:38:50 +00:00
|
|
|
}
|
2019-12-11 13:11:29 +00:00
|
|
|
}
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := in.WriteMsg(packet); err != nil {
|
2021-01-26 15:15:26 +00:00
|
|
|
// We don't block as that might leak goroutines
|
|
|
|
select {
|
|
|
|
case errC <- fmt.Errorf("failed to write packet to pipe: %v", err):
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Read from the message pipe and write to the original writer.
|
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
packet, err := in.ReadMsg()
|
|
|
|
if err != nil {
|
2021-01-26 15:15:26 +00:00
|
|
|
// We don't block as that might leak goroutines
|
|
|
|
select {
|
|
|
|
case errC <- fmt.Errorf("failed to read packet from pipe: %v", err):
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
if err := rw.WriteMsg(packet); err != nil {
|
2021-01-26 15:15:26 +00:00
|
|
|
// We don't block as that might leak goroutines
|
|
|
|
select {
|
|
|
|
case errC <- fmt.Errorf("failed to write packet: %v", err):
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
2019-11-18 10:22:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
go func() {
|
2021-01-26 15:15:26 +00:00
|
|
|
// We don't block as that might leak goroutines
|
|
|
|
select {
|
|
|
|
case errC <- runLoop(p, out):
|
|
|
|
return
|
|
|
|
default:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-11-18 10:22:23 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
return <-errC
|
|
|
|
}
|
|
|
|
|
|
|
|
// throttleIP throttles a number of messages incoming from a given IP.
|
|
|
|
// It allows 10 packets per second.
|
|
|
|
func (r *PeerRateLimiter) throttleIP(ip string) bool {
|
|
|
|
if r.limitPerSecIP == 0 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if stringSliceContains(r.whitelistedIPs, ip) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return r.ipThrottler.Halt(ip, 1, r.limitPerSecIP)
|
|
|
|
}
|
|
|
|
|
|
|
|
// throttlePeer throttles a number of messages incoming from a peer.
|
|
|
|
// It allows 3 packets per second.
|
|
|
|
func (r *PeerRateLimiter) throttlePeer(peerID []byte) bool {
|
|
|
|
if r.limitPerSecIP == 0 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
var id enode.ID
|
|
|
|
copy(id[:], peerID)
|
|
|
|
if enodeIDSliceContains(r.whitelistedPeerIDs, id) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return r.peerIDThrottler.Halt(id.String(), 1, r.limitPerSecPeerID)
|
|
|
|
}
|
|
|
|
|
|
|
|
func stringSliceContains(s []string, searched string) bool {
|
|
|
|
for _, item := range s {
|
|
|
|
if item == searched {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func enodeIDSliceContains(s []enode.ID, searched enode.ID) bool {
|
|
|
|
for _, item := range s {
|
|
|
|
if bytes.Equal(item.Bytes(), searched.Bytes()) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|