aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJon Atack <jon@atack.com>2023-11-16 09:56:03 -0600
committerfanquake <fanquake@gmail.com>2023-11-22 11:53:27 +0000
commit55af112565aefc9167877076d6ee4dae991dcd6d (patch)
tree91fb560ea4e611f553cbc31029f7775901edfeeb
parent5e0bcc1977ea1efe3888c8fcd0991f3116ab1125 (diff)
p2p: do not make automatic outbound connections to addnode peers
to allocate our limited outbound slots correctly, and to ensure addnode connections benefit from their intended protections. Our addnode logic usually connects the addnode peers before the automatic outbound logic does, but not always, as a connection race can occur. If an addnode peer disconnects us and if it was the only one from its network, there can be a race between reconnecting to it with the addnode thread, and it being picked as automatic network-specific outbound peer. Or our internet connection or router, or the addnode peer, could be temporarily offline, and then return online during the automatic outbound thread. Or we could add a new manual peer using the addnode RPC at that time. The race can be more apparent when our node doesn't know many peers, or with networks like cjdns that currently have few bitcoin peers. When an addnode peer is connected as an automatic outbound peer and is the only connection we have to a network, it can be protected by our new outbound eviction logic and persist in the "wrong role". Examples on mainnet using logging added in the same pull request: 2023-08-12T14:51:05.681743Z [opencon] [net.cpp:1949] [ThreadOpenConnections] [net:debug] Not making automatic network-specific outbound-full-relay connection to i2p peer selected for manual (addnode) connection: [geh...odq.b32.i2p]:0 2023-08-13T03:59:28.050853Z [opencon] [net.cpp:1949] [ThreadOpenConnections] [net:debug] Not making automatic block-relay-only connection to onion peer selected for manual (addnode) connection: kpg...aid.onion:8333 2023-08-13T16:21:26.979052Z [opencon] [net.cpp:1949] [ThreadOpenConnections] [net:debug] Not making automatic network-specific outbound-full-relay connection to cjdns peer selected for manual (addnode) connection: [fcc...8ce]:8333 2023-08-14T20:43:53.401271Z [opencon] [net.cpp:1949] [ThreadOpenConnections] [net:debug] Not making automatic network-specific outbound-full-relay connection to cjdns peer selected for manual (addnode) connection: [fc7...59e]:8333 2023-08-15T00:10:01.894147Z [opencon] [net.cpp:1949] [ThreadOpenConnections] [net:debug] Not making automatic feeler connection to i2p peer selected for manual (addnode) connection: geh...odq.b32.i2p:8333 Finally, there does not seem to be a reason to make block-relay or short-lived feeler connections to addnode peers, as the addnode logic will ensure we connect to them if they are up, within the addnode connection limit. Fix these issues by checking if the address is an addnode peer in our automatic outbound connection logic. Github-Pull: #28895 Rebased-From: cc627169206fe902157806d88fcaf2b05701c38d
-rw-r--r--src/net.cpp22
-rw-r--r--src/net.h1
2 files changed, 23 insertions, 0 deletions
diff --git a/src/net.cpp b/src/net.cpp
index 09a3d8617a..5305e1148a 100644
--- a/src/net.cpp
+++ b/src/net.cpp
@@ -2714,6 +2714,17 @@ void CConnman::ThreadOpenConnections(const std::vector<std::string> connect)
continue;
}
+ // Do not make automatic outbound connections to addnode peers, to
+ // not use our limited outbound slots for them and to ensure
+ // addnode connections benefit from their intended protections.
+ if (AddedNodesContain(addr)) {
+ LogPrintLevel(BCLog::NET, BCLog::Level::Debug, "Not making automatic %s%s connection to %s peer selected for manual (addnode) connection%s\n",
+ preferred_net.has_value() ? "network-specific " : "",
+ ConnectionTypeAsString(conn_type), GetNetworkName(addr.GetNetwork()),
+ fLogIPs ? strprintf(": %s", addr.ToStringAddrPort()) : "");
+ continue;
+ }
+
addrConnect = addr;
break;
}
@@ -3447,6 +3458,17 @@ bool CConnman::RemoveAddedNode(const std::string& strNode)
return false;
}
+bool CConnman::AddedNodesContain(const CAddress& addr) const
+{
+ AssertLockNotHeld(m_added_nodes_mutex);
+ const std::string addr_str{addr.ToStringAddr()};
+ const std::string addr_port_str{addr.ToStringAddrPort()};
+ LOCK(m_added_nodes_mutex);
+ return (m_added_node_params.size() < 24 // bound the query to a reasonable limit
+ && std::any_of(m_added_node_params.cbegin(), m_added_node_params.cend(),
+ [&](const auto& p) { return p.m_added_node == addr_str || p.m_added_node == addr_port_str; }));
+}
+
size_t CConnman::GetNodeCount(ConnectionDirection flags) const
{
LOCK(m_nodes_mutex);
diff --git a/src/net.h b/src/net.h
index ddee34168a..57426977fb 100644
--- a/src/net.h
+++ b/src/net.h
@@ -1189,6 +1189,7 @@ public:
bool AddNode(const AddedNodeParams& add) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex);
bool RemoveAddedNode(const std::string& node) EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex);
+ bool AddedNodesContain(const CAddress& addr) const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex);
std::vector<AddedNodeInfo> GetAddedNodeInfo() const EXCLUSIVE_LOCKS_REQUIRED(!m_added_nodes_mutex);
/**