230 lines
6.6 KiB
C++
230 lines
6.6 KiB
C++
/*
|
|
|
|
Copyright (c) 2015, Arvid Norberg
|
|
All rights reserved.
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
modification, are permitted provided that the following conditions
|
|
are met:
|
|
|
|
* Redistributions of source code must retain the above copyright
|
|
notice, this list of conditions and the following disclaimer.
|
|
* Redistributions in binary form must reproduce the above copyright
|
|
notice, this list of conditions and the following disclaimer in
|
|
the documentation and/or other materials provided with the distribution.
|
|
* Neither the name of the author nor the names of its
|
|
contributors may be used to endorse or promote products derived
|
|
from this software without specific prior written permission.
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
#include "test.hpp"
|
|
#include "libtorrent/ip_voter.hpp"
|
|
#include "libtorrent/address.hpp"
|
|
#include "libtorrent/socket.hpp"
|
|
#include "libtorrent/random.hpp"
|
|
#include "libtorrent/socket_io.hpp"
|
|
#include "libtorrent/aux_/session_interface.hpp"
|
|
#include "libtorrent/broadcast_socket.hpp" // for supports_ipv6()
|
|
#include "setup_transfer.hpp" // for rand_v4
|
|
|
|
using namespace lt;
|
|
|
|
namespace {
|
|
|
|
bool cast_vote(ip_voter& ipv, address ext_ip, address voter)
|
|
{
|
|
bool new_ip = ipv.cast_vote(ext_ip, aux::session_interface::source_dht, voter);
|
|
std::printf("%15s -> %-15s\n"
|
|
, print_address(voter).c_str()
|
|
, print_address(ext_ip).c_str());
|
|
if (new_ip)
|
|
{
|
|
std::printf(" \x1b[1mnew external IP: %s\x1b[0m\n"
|
|
, print_address(ipv.external_address()).c_str());
|
|
}
|
|
return new_ip;
|
|
}
|
|
|
|
} // anonymous namespace
|
|
|
|
// test the case where every time we get a new IP. Make sure
|
|
// we don't flap
|
|
TORRENT_TEST(test_random)
|
|
{
|
|
init_rand_address();
|
|
|
|
ip_voter ipv;
|
|
|
|
address_v4 addr1(address_v4::from_string("51.41.61.132"));
|
|
|
|
bool new_ip = cast_vote(ipv, addr1, rand_v4());
|
|
TEST_CHECK(new_ip);
|
|
TEST_CHECK(ipv.external_address() == addr1);
|
|
for (int i = 0; i < 1000; ++i)
|
|
{
|
|
new_ip = cast_vote(ipv, rand_v4(), rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
}
|
|
TEST_CHECK(ipv.external_address() == addr1);
|
|
}
|
|
|
|
TORRENT_TEST(two_ips)
|
|
{
|
|
init_rand_address();
|
|
|
|
ip_voter ipv;
|
|
|
|
address_v4 addr1(address_v4::from_string("51.1.1.1"));
|
|
address_v4 addr2(address_v4::from_string("53.3.3.3"));
|
|
|
|
// addr1 is the first address we see, which is the one we pick. Even though
|
|
// we'll have as many votes for addr2, we shouldn't flap, since addr2 never
|
|
// gets an overwhelming majority.
|
|
bool new_ip = cast_vote(ipv, addr1, rand_v4());
|
|
TEST_CHECK(new_ip);
|
|
for (int i = 0; i < 1000; ++i)
|
|
{
|
|
new_ip = cast_vote(ipv, addr2, rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
new_ip = cast_vote(ipv, rand_v4(), rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
new_ip = cast_vote(ipv, addr1, rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
|
|
TEST_CHECK(ipv.external_address() == addr1);
|
|
}
|
|
}
|
|
|
|
TORRENT_TEST(one_ip)
|
|
{
|
|
init_rand_address();
|
|
|
|
ip_voter ipv;
|
|
|
|
address_v4 start_addr(address_v4::from_string("93.12.63.174"));
|
|
address_v4 addr1(address_v4::from_string("51.1.1.1"));
|
|
address_v4 addr2(address_v4::from_string("53.3.3.3"));
|
|
|
|
bool new_ip = cast_vote(ipv, start_addr, rand_v4());
|
|
TEST_CHECK(new_ip);
|
|
TEST_CHECK(ipv.external_address() != addr1);
|
|
TEST_CHECK(ipv.external_address() == start_addr);
|
|
for (int i = 0; i < 30; ++i)
|
|
{
|
|
new_ip = cast_vote(ipv, addr2, rand_v4());
|
|
if (new_ip) break;
|
|
new_ip = cast_vote(ipv, rand_v4(), rand_v4());
|
|
if (new_ip) break;
|
|
new_ip = cast_vote(ipv, addr1, rand_v4());
|
|
if (new_ip) break;
|
|
new_ip = cast_vote(ipv, addr1, rand_v4());
|
|
if (new_ip) break;
|
|
|
|
}
|
|
|
|
TEST_CHECK(ipv.external_address() == addr1);
|
|
|
|
for (int i = 0; i < 500; ++i)
|
|
{
|
|
new_ip = cast_vote(ipv, addr2, rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
new_ip = cast_vote(ipv, rand_v4(), rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
new_ip = cast_vote(ipv, addr1, rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
new_ip = cast_vote(ipv, addr1, rand_v4());
|
|
TEST_CHECK(!new_ip);
|
|
}
|
|
|
|
TEST_CHECK(ipv.external_address() == addr1);
|
|
}
|
|
|
|
TORRENT_TEST(ip_voter_1)
|
|
{
|
|
init_rand_address();
|
|
|
|
// test external ip voting
|
|
ip_voter ipv1;
|
|
|
|
// test a single malicious node
|
|
// adds 50 legitimate responses from different peers
|
|
// and 50 malicious responses from the same peer
|
|
error_code ec;
|
|
address real_external = address_v4::from_string("5.5.5.5", ec);
|
|
TEST_CHECK(!ec);
|
|
address malicious = address_v4::from_string("4.4.4.4", ec);
|
|
TEST_CHECK(!ec);
|
|
for (int i = 0; i < 50; ++i)
|
|
{
|
|
ipv1.cast_vote(real_external, aux::session_interface::source_dht, rand_v4());
|
|
ipv1.cast_vote(rand_v4(), aux::session_interface::source_dht, malicious);
|
|
}
|
|
TEST_CHECK(ipv1.external_address() == real_external);
|
|
}
|
|
|
|
TORRENT_TEST(ip_voter_2)
|
|
{
|
|
init_rand_address();
|
|
|
|
ip_voter ipv2,ipv6;
|
|
|
|
// test a single malicious node
|
|
// adds 50 legitimate responses from different peers
|
|
// and 50 consistent malicious responses from the same peer
|
|
error_code ec;
|
|
address malicious = address_v4::from_string("4.4.4.4", ec);
|
|
TEST_CHECK(!ec);
|
|
address real_external1 = address_v4::from_string("5.5.5.5", ec);
|
|
TEST_CHECK(!ec);
|
|
address malicious_external = address_v4::from_string("3.3.3.3", ec);
|
|
TEST_CHECK(!ec);
|
|
|
|
address malicious2;
|
|
address real_external2;
|
|
address malicious_external2;
|
|
#if TORRENT_USE_IPV6
|
|
if (supports_ipv6())
|
|
{
|
|
malicious2 = address_v6::from_string("2f90::", ec);
|
|
TEST_CHECK(!ec);
|
|
real_external2 = address_v6::from_string("2f80::", ec);
|
|
TEST_CHECK(!ec);
|
|
malicious_external2 = address_v6::from_string("2f70::", ec);
|
|
TEST_CHECK(!ec);
|
|
}
|
|
#endif
|
|
|
|
for (int i = 0; i < 50; ++i)
|
|
{
|
|
ipv2.cast_vote(real_external1, aux::session_interface::source_dht, rand_v4());
|
|
ipv2.cast_vote(malicious_external, aux::session_interface::source_dht, malicious);
|
|
#if TORRENT_USE_IPV6
|
|
if (supports_ipv6())
|
|
{
|
|
ipv6.cast_vote(real_external2, aux::session_interface::source_dht, rand_v6());
|
|
ipv6.cast_vote(malicious_external2, aux::session_interface::source_dht, malicious2);
|
|
}
|
|
#endif
|
|
}
|
|
TEST_CHECK(ipv2.external_address() == real_external1);
|
|
#if TORRENT_USE_IPV6
|
|
if (supports_ipv6())
|
|
TEST_CHECK(ipv6.external_address() == real_external2);
|
|
#endif
|
|
|
|
}
|
|
|