diff options
author | Péter Szilágyi <peterke@gmail.com> | 2017-09-26 21:54:49 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-09-26 21:54:49 +0800 |
commit | 2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f (patch) | |
tree | cfc7a35299a947e5c7c0361226744d71575e9ebe | |
parent | 2b4a5f2677fdf0d8a34a2d19fddc203b973dfe02 (diff) | |
download | dexon-2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f.tar dexon-2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f.tar.gz dexon-2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f.tar.bz2 dexon-2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f.tar.lz dexon-2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f.tar.xz dexon-2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f.tar.zst dexon-2ee885958b49f8a58c0a7fae8bc62f4561f8ab3f.zip |
p2p: snappy encoding for devp2p (version bump to 5) (#15106)
* p2p: snappy encoding for devp2p (version bump to 5)
* p2p: remove lazy decompression, enforce 16MB limit
-rw-r--r-- | p2p/peer.go | 4 | ||||
-rw-r--r-- | p2p/rlpx.go | 42 |
2 files changed, 45 insertions, 1 deletions
diff --git a/p2p/peer.go b/p2p/peer.go index ebf7490c6..1d2b726e8 100644 --- a/p2p/peer.go +++ b/p2p/peer.go @@ -32,10 +32,12 @@ import ( ) const ( - baseProtocolVersion = 4 + baseProtocolVersion = 5 baseProtocolLength = uint64(16) baseProtocolMaxMsgSize = 2 * 1024 + snappyProtocolVersion = 5 + pingInterval = 15 * time.Second ) diff --git a/p2p/rlpx.go b/p2p/rlpx.go index b2775cacd..24037ecc1 100644 --- a/p2p/rlpx.go +++ b/p2p/rlpx.go @@ -29,6 +29,7 @@ import ( "fmt" "hash" "io" + "io/ioutil" mrand "math/rand" "net" "sync" @@ -40,6 +41,7 @@ import ( "github.com/ethereum/go-ethereum/crypto/sha3" "github.com/ethereum/go-ethereum/p2p/discover" "github.com/ethereum/go-ethereum/rlp" + "github.com/golang/snappy" ) const ( @@ -68,6 +70,10 @@ const ( discWriteTimeout = 1 * time.Second ) +// errPlainMessageTooLarge is returned if a decompressed message length exceeds +// the allowed 24 bits (i.e. length >= 16MB). +var errPlainMessageTooLarge = errors.New("message length >= 16MB") + // rlpx is the transport protocol used by actual (non-test) connections. // It wraps the frame encoder with locks and read/write deadlines. type rlpx struct { @@ -127,6 +133,9 @@ func (t *rlpx) doProtoHandshake(our *protoHandshake) (their *protoHandshake, err if err := <-werr; err != nil { return nil, fmt.Errorf("write error: %v", err) } + // If the protocol version supports Snappy encoding, upgrade immediately + t.rw.snappy = their.Version >= snappyProtocolVersion + return their, nil } @@ -556,6 +565,8 @@ type rlpxFrameRW struct { macCipher cipher.Block egressMAC hash.Hash ingressMAC hash.Hash + + snappy bool } func newRLPXFrameRW(conn io.ReadWriter, s secrets) *rlpxFrameRW { @@ -583,6 +594,17 @@ func newRLPXFrameRW(conn io.ReadWriter, s secrets) *rlpxFrameRW { func (rw *rlpxFrameRW) WriteMsg(msg Msg) error { ptype, _ := rlp.EncodeToBytes(msg.Code) + // if snappy is enabled, compress message now + if rw.snappy { + if msg.Size > maxUint24 { + return errPlainMessageTooLarge + } + payload, _ := ioutil.ReadAll(msg.Payload) + payload = snappy.Encode(nil, payload) + + msg.Payload = bytes.NewReader(payload) + msg.Size = uint32(len(payload)) + } // write header headbuf := make([]byte, 32) fsize := uint32(len(ptype)) + msg.Size @@ -668,6 +690,26 @@ func (rw *rlpxFrameRW) ReadMsg() (msg Msg, err error) { } msg.Size = uint32(content.Len()) msg.Payload = content + + // if snappy is enabled, verify and decompress message + if rw.snappy { + payload, err := ioutil.ReadAll(msg.Payload) + if err != nil { + return msg, err + } + size, err := snappy.DecodedLen(payload) + if err != nil { + return msg, err + } + if size > int(maxUint24) { + return msg, errPlainMessageTooLarge + } + payload, err = snappy.Decode(nil, payload) + if err != nil { + return msg, err + } + msg.Size, msg.Payload = uint32(size), bytes.NewReader(payload) + } return msg, nil } |