2021-12-01 10:40:44 +00:00
|
|
|
from .vendor.platformutils import get_platform
|
|
|
|
|
|
|
|
if get_platform() == "android":
|
2022-01-12 11:02:00 +00:00
|
|
|
from .Interfaces import Interface
|
|
|
|
from .Interfaces import LocalInterface
|
|
|
|
from .Interfaces import AutoInterface
|
|
|
|
from .Interfaces import TCPInterface
|
|
|
|
from .Interfaces import UDPInterface
|
2022-02-23 16:40:31 +00:00
|
|
|
from .Interfaces import I2PInterface
|
2021-12-01 10:40:44 +00:00
|
|
|
else:
|
|
|
|
from .Interfaces import *
|
|
|
|
|
2020-04-22 10:07:13 +00:00
|
|
|
from .vendor.configobj import ConfigObj
|
2021-09-24 18:10:04 +00:00
|
|
|
import configparser
|
|
|
|
import multiprocessing.connection
|
2021-09-24 14:09:07 +00:00
|
|
|
import signal
|
2021-09-24 18:10:04 +00:00
|
|
|
import threading
|
2018-04-04 12:14:22 +00:00
|
|
|
import atexit
|
|
|
|
import struct
|
|
|
|
import array
|
|
|
|
import os.path
|
|
|
|
import os
|
|
|
|
import RNS
|
|
|
|
|
|
|
|
class Reticulum:
|
2021-05-16 10:55:50 +00:00
|
|
|
"""
|
|
|
|
This class is used to initialise access to Reticulum within a
|
|
|
|
program. You must create exactly one instance of this class before
|
|
|
|
carrying out any other RNS operations, such as creating destinations
|
|
|
|
or sending traffic. Every independently executed program must create
|
|
|
|
their own instance of the Reticulum class, but Reticulum will
|
|
|
|
automatically handle inter-program communication on the same system,
|
|
|
|
and expose all connected programs to external interfaces as well.
|
|
|
|
|
|
|
|
As soon as an instance of this class is created, Reticulum will start
|
|
|
|
opening and configuring any hardware devices specified in the supplied
|
|
|
|
configuration.
|
|
|
|
|
|
|
|
Currently the first running instance must be kept running while other
|
|
|
|
local instances are connected, as the first created instance will
|
|
|
|
act as a master instance that directly communicates with external
|
|
|
|
hardware such as modems, TNCs and radios. If a master instance is
|
|
|
|
asked to exit, it will not exit until all client processes have
|
|
|
|
terminated (unless killed forcibly).
|
|
|
|
|
|
|
|
If you are running Reticulum on a system with several different
|
|
|
|
programs that use RNS starting and terminating at different times,
|
|
|
|
it will be advantageous to run a master RNS instance as a daemon for
|
|
|
|
other programs to use on demand.
|
|
|
|
"""
|
|
|
|
|
2021-09-02 18:35:42 +00:00
|
|
|
# Future minimum will probably be locked in at 244 bytes to support
|
|
|
|
# networks with segments of different MTUs. Absolute minimum is 211.
|
2020-08-13 10:15:56 +00:00
|
|
|
MTU = 500
|
2021-09-02 16:00:03 +00:00
|
|
|
"""
|
|
|
|
The MTU that Reticulum adheres to, and will expect other peers to
|
|
|
|
adhere to. By default, the MTU is 500 bytes. In custom RNS network
|
|
|
|
implementations, it is possible to change this value, but doing so will
|
|
|
|
completely break compatibility with all other RNS networks. An identical
|
|
|
|
MTU is a prerequisite for peers to communicate in the same network.
|
|
|
|
|
2021-09-02 18:35:42 +00:00
|
|
|
Unless you really know what you are doing, the MTU should be left at
|
|
|
|
the default value.
|
2021-09-02 16:00:03 +00:00
|
|
|
"""
|
|
|
|
|
2021-12-05 10:45:13 +00:00
|
|
|
# TODO: To reach the 300bps level without unreasonably impacting
|
|
|
|
# performance on faster links, we need a mechanism for setting
|
|
|
|
# this value more intelligently. One option could be inferring it
|
|
|
|
# from interface speed, but a better general approach would most
|
|
|
|
# probably be to let Reticulum somehow continously build a map of
|
|
|
|
# per-hop latencies and use this map for the timeout calculation.
|
|
|
|
DEFAULT_PER_HOP_TIMEOUT = 5
|
|
|
|
|
2021-09-02 16:00:03 +00:00
|
|
|
# Length of truncated hashes in bits.
|
|
|
|
TRUNCATED_HASHLENGTH = 80
|
|
|
|
|
|
|
|
HEADER_MINSIZE = 2+1+(TRUNCATED_HASHLENGTH//8)*1
|
|
|
|
HEADER_MAXSIZE = 2+1+(TRUNCATED_HASHLENGTH//8)*2
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
MDU = MTU - HEADER_MAXSIZE
|
|
|
|
|
|
|
|
router = None
|
|
|
|
config = None
|
|
|
|
|
2021-05-16 11:02:46 +00:00
|
|
|
# The default configuration path will be expanded to a directory
|
|
|
|
# named ".reticulum" inside the current users home directory
|
2020-08-13 10:15:56 +00:00
|
|
|
configdir = os.path.expanduser("~")+"/.reticulum"
|
|
|
|
configpath = ""
|
|
|
|
storagepath = ""
|
|
|
|
cachepath = ""
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def exit_handler():
|
2021-05-16 13:52:45 +00:00
|
|
|
# This exit handler is called whenever Reticulum is asked to
|
|
|
|
# shut down, and will in turn call exit handlers in other
|
|
|
|
# classes, saving necessary information to disk and carrying
|
|
|
|
# out cleanup operations.
|
|
|
|
|
2021-05-16 11:02:46 +00:00
|
|
|
RNS.Transport.exit_handler()
|
|
|
|
RNS.Identity.exit_handler()
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2021-09-24 14:09:07 +00:00
|
|
|
@staticmethod
|
|
|
|
def sigint_handler(signal, frame):
|
|
|
|
RNS.Transport.detach_interfaces()
|
|
|
|
RNS.exit()
|
|
|
|
|
|
|
|
|
2021-12-05 15:05:43 +00:00
|
|
|
@staticmethod
|
|
|
|
def sigterm_handler(signal, frame):
|
|
|
|
RNS.Transport.detach_interfaces()
|
|
|
|
RNS.exit()
|
|
|
|
|
|
|
|
|
2021-09-24 13:18:06 +00:00
|
|
|
def __init__(self,configdir=None, loglevel=None):
|
2021-05-16 10:55:50 +00:00
|
|
|
"""
|
|
|
|
Initialises and starts a Reticulum instance. This must be
|
|
|
|
done before any other operations, and Reticulum will not
|
|
|
|
pass any traffic before being instantiated.
|
|
|
|
|
|
|
|
:param configdir: Full path to a Reticulum configuration directory.
|
|
|
|
"""
|
|
|
|
|
2022-01-12 09:07:44 +00:00
|
|
|
RNS.vendor.platformutils.platform_checks()
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
if configdir != None:
|
|
|
|
Reticulum.configdir = configdir
|
|
|
|
|
|
|
|
Reticulum.configpath = Reticulum.configdir+"/config"
|
|
|
|
Reticulum.storagepath = Reticulum.configdir+"/storage"
|
|
|
|
Reticulum.cachepath = Reticulum.configdir+"/storage/cache"
|
|
|
|
Reticulum.resourcepath = Reticulum.configdir+"/storage/resources"
|
|
|
|
|
|
|
|
Reticulum.__transport_enabled = False
|
|
|
|
Reticulum.__use_implicit_proof = True
|
|
|
|
|
2021-09-18 20:49:04 +00:00
|
|
|
Reticulum.panic_on_interface_error = False
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
self.local_interface_port = 37428
|
2021-09-24 18:10:04 +00:00
|
|
|
self.local_control_port = 37429
|
|
|
|
self.share_instance = True
|
|
|
|
self.rpc_listener = None
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2021-09-24 13:18:06 +00:00
|
|
|
self.requested_loglevel = loglevel
|
2021-09-24 13:34:03 +00:00
|
|
|
if self.requested_loglevel != None:
|
|
|
|
if self.requested_loglevel > RNS.LOG_EXTREME:
|
|
|
|
self.requested_loglevel = RNS.LOG_EXTREME
|
|
|
|
if self.requested_loglevel < RNS.LOG_CRITICAL:
|
|
|
|
self.requested_loglevel = RNS.LOG_CRITICAL
|
2021-09-24 14:09:07 +00:00
|
|
|
|
2021-09-24 13:34:03 +00:00
|
|
|
RNS.loglevel = self.requested_loglevel
|
2021-09-24 13:18:06 +00:00
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
self.is_shared_instance = False
|
|
|
|
self.is_connected_to_shared_instance = False
|
|
|
|
self.is_standalone_instance = False
|
|
|
|
|
|
|
|
if not os.path.isdir(Reticulum.storagepath):
|
|
|
|
os.makedirs(Reticulum.storagepath)
|
|
|
|
|
|
|
|
if not os.path.isdir(Reticulum.cachepath):
|
|
|
|
os.makedirs(Reticulum.cachepath)
|
|
|
|
|
|
|
|
if not os.path.isdir(Reticulum.resourcepath):
|
|
|
|
os.makedirs(Reticulum.resourcepath)
|
|
|
|
|
|
|
|
if os.path.isfile(self.configpath):
|
|
|
|
try:
|
|
|
|
self.config = ConfigObj(self.configpath)
|
|
|
|
except Exception as e:
|
|
|
|
RNS.log("Could not parse the configuration at "+self.configpath, RNS.LOG_ERROR)
|
|
|
|
RNS.log("Check your configuration file for errors!", RNS.LOG_ERROR)
|
|
|
|
RNS.panic()
|
|
|
|
else:
|
|
|
|
RNS.log("Could not load config file, creating default configuration file...")
|
2021-05-16 10:55:50 +00:00
|
|
|
self.__create_default_config()
|
2021-12-09 15:07:36 +00:00
|
|
|
RNS.log("Default config file created. Make any necessary changes in "+Reticulum.configdir+"/config and restart Reticulum if needed.")
|
|
|
|
import time
|
|
|
|
time.sleep(1.5)
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2021-05-16 10:55:50 +00:00
|
|
|
self.__apply_config()
|
2021-09-24 12:13:31 +00:00
|
|
|
RNS.log("Configuration loaded from "+self.configpath, RNS.LOG_VERBOSE)
|
|
|
|
|
2021-05-16 14:15:57 +00:00
|
|
|
RNS.Identity.load_known_destinations()
|
2020-08-13 10:15:56 +00:00
|
|
|
|
|
|
|
RNS.Transport.start(self)
|
|
|
|
|
2021-09-24 18:10:04 +00:00
|
|
|
self.rpc_addr = ("127.0.0.1", self.local_control_port)
|
|
|
|
self.rpc_key = RNS.Identity.full_hash(RNS.Transport.identity.get_private_key())
|
|
|
|
|
|
|
|
if self.is_shared_instance:
|
|
|
|
self.rpc_listener = multiprocessing.connection.Listener(self.rpc_addr, authkey=self.rpc_key)
|
|
|
|
thread = threading.Thread(target=self.rpc_loop)
|
|
|
|
thread.setDaemon(True)
|
|
|
|
thread.start()
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
atexit.register(Reticulum.exit_handler)
|
2021-09-24 14:09:07 +00:00
|
|
|
signal.signal(signal.SIGINT, Reticulum.sigint_handler)
|
2021-12-05 15:05:43 +00:00
|
|
|
signal.signal(signal.SIGTERM, Reticulum.sigterm_handler)
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2021-05-16 10:55:50 +00:00
|
|
|
def __start_local_interface(self):
|
2020-08-13 10:15:56 +00:00
|
|
|
if self.share_instance:
|
|
|
|
try:
|
|
|
|
interface = LocalInterface.LocalServerInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
self.local_interface_port
|
|
|
|
)
|
|
|
|
interface.OUT = True
|
|
|
|
RNS.Transport.interfaces.append(interface)
|
2021-09-24 18:10:04 +00:00
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
self.is_shared_instance = True
|
|
|
|
RNS.log("Started shared instance interface: "+str(interface), RNS.LOG_DEBUG)
|
|
|
|
except Exception as e:
|
|
|
|
try:
|
|
|
|
interface = LocalInterface.LocalClientInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
"Local shared instance",
|
|
|
|
self.local_interface_port)
|
|
|
|
interface.target_port = self.local_interface_port
|
|
|
|
interface.OUT = True
|
|
|
|
RNS.Transport.interfaces.append(interface)
|
|
|
|
self.is_shared_instance = False
|
|
|
|
self.is_standalone_instance = False
|
|
|
|
self.is_connected_to_shared_instance = True
|
2021-10-03 13:23:12 +00:00
|
|
|
Reticulum.__transport_enabled = False
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.log("Connected to local shared instance via: "+str(interface), RNS.LOG_DEBUG)
|
|
|
|
except Exception as e:
|
|
|
|
RNS.log("Local shared instance appears to be running, but it could not be connected", RNS.LOG_ERROR)
|
|
|
|
RNS.log("The contained exception was: "+str(e), RNS.LOG_ERROR)
|
|
|
|
self.is_shared_instance = False
|
|
|
|
self.is_standalone_instance = True
|
|
|
|
self.is_connected_to_shared_instance = False
|
|
|
|
else:
|
|
|
|
self.is_shared_instance = False
|
|
|
|
self.is_standalone_instance = True
|
|
|
|
self.is_connected_to_shared_instance = False
|
|
|
|
|
2021-05-16 10:55:50 +00:00
|
|
|
def __apply_config(self):
|
2020-08-13 10:15:56 +00:00
|
|
|
if "logging" in self.config:
|
|
|
|
for option in self.config["logging"]:
|
|
|
|
value = self.config["logging"][option]
|
2021-09-24 13:18:06 +00:00
|
|
|
if option == "loglevel" and self.requested_loglevel == None:
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.loglevel = int(value)
|
|
|
|
if RNS.loglevel < 0:
|
|
|
|
RNS.loglevel = 0
|
|
|
|
if RNS.loglevel > 7:
|
|
|
|
RNS.loglevel = 7
|
|
|
|
|
|
|
|
if "reticulum" in self.config:
|
|
|
|
for option in self.config["reticulum"]:
|
|
|
|
value = self.config["reticulum"][option]
|
|
|
|
if option == "share_instance":
|
|
|
|
value = self.config["reticulum"].as_bool(option)
|
|
|
|
self.share_instance = value
|
|
|
|
if option == "shared_instance_port":
|
|
|
|
value = int(self.config["reticulum"][option])
|
|
|
|
self.local_interface_port = value
|
2021-09-24 18:10:04 +00:00
|
|
|
if option == "instance_control_port":
|
|
|
|
value = int(self.config["reticulum"][option])
|
|
|
|
self.local_control_port = value
|
2020-08-13 10:15:56 +00:00
|
|
|
if option == "enable_transport":
|
|
|
|
v = self.config["reticulum"].as_bool(option)
|
|
|
|
if v == True:
|
|
|
|
Reticulum.__transport_enabled = True
|
2021-09-18 20:49:04 +00:00
|
|
|
if option == "panic_on_interface_error":
|
|
|
|
v = self.config["reticulum"].as_bool(option)
|
|
|
|
if v == True:
|
|
|
|
Reticulum.panic_on_interface_error = True
|
2020-08-13 10:15:56 +00:00
|
|
|
if option == "use_implicit_proof":
|
|
|
|
v = self.config["reticulum"].as_bool(option)
|
|
|
|
if v == True:
|
|
|
|
Reticulum.__use_implicit_proof = True
|
|
|
|
if v == False:
|
|
|
|
Reticulum.__use_implicit_proof = False
|
|
|
|
|
2021-05-16 10:55:50 +00:00
|
|
|
self.__start_local_interface()
|
2020-08-13 10:15:56 +00:00
|
|
|
|
|
|
|
if self.is_shared_instance or self.is_standalone_instance:
|
2022-02-22 13:43:14 +00:00
|
|
|
RNS.log("Bringing up system interfaces...", RNS.LOG_DEBUG)
|
2020-08-13 10:15:56 +00:00
|
|
|
interface_names = []
|
|
|
|
for name in self.config["interfaces"]:
|
|
|
|
if not name in interface_names:
|
|
|
|
c = self.config["interfaces"][name]
|
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface_mode = Interface.Interface.MODE_FULL
|
|
|
|
|
|
|
|
if "mode" in c:
|
|
|
|
if c["mode"] == "full":
|
|
|
|
interface_mode = Interface.Interface.MODE_FULL
|
|
|
|
elif c["mode"] == "accesspoint" or c["mode"] == "ap":
|
|
|
|
interface_mode = Interface.Interface.MODE_ACCESS_POINT
|
|
|
|
elif c["mode"] == "pointtopoint" or c["mode"] == "ptp":
|
|
|
|
interface_mode = Interface.Interface.MODE_POINT_TO_POINT
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
try:
|
|
|
|
if ("interface_enabled" in c) and c.as_bool("interface_enabled") == True:
|
2021-12-09 15:07:36 +00:00
|
|
|
if c["type"] == "AutoInterface":
|
2022-01-12 11:12:04 +00:00
|
|
|
if not RNS.vendor.platformutils.is_windows():
|
|
|
|
group_id = c["group_id"] if "group_id" in c else None
|
|
|
|
discovery_scope = c["discovery_scope"] if "discovery_scope" in c else None
|
|
|
|
discovery_port = int(c["discovery_port"]) if "discovery_port" in c else None
|
|
|
|
data_port = int(c["data_port"]) if "data_port" in c else None
|
|
|
|
allowed_interfaces = c.as_list("devices") if "devices" in c else None
|
|
|
|
ignored_interfaces = c.as_list("ignored_devices") if "ignored_devices" in c else None
|
|
|
|
|
|
|
|
interface = AutoInterface.AutoInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
|
|
|
group_id,
|
|
|
|
discovery_scope,
|
|
|
|
discovery_port,
|
|
|
|
data_port,
|
|
|
|
allowed_interfaces,
|
|
|
|
ignored_interfaces
|
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2022-01-12 11:12:04 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2022-01-12 11:12:04 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2022-01-12 11:12:04 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
2021-12-09 15:07:36 +00:00
|
|
|
else:
|
2022-01-12 11:12:04 +00:00
|
|
|
RNS.log("AutoInterface is not currently supported on Windows, disabling interface.", RNS.LOG_ERROR);
|
|
|
|
RNS.log("Please remove this AutoInterface instance from your configuration file.", RNS.LOG_ERROR);
|
|
|
|
RNS.log("You will have to manually configure other interfaces for connectivity.", RNS.LOG_ERROR);
|
2021-12-09 15:07:36 +00:00
|
|
|
|
|
|
|
|
2020-08-13 10:37:54 +00:00
|
|
|
if c["type"] == "UDPInterface":
|
2021-08-19 17:56:35 +00:00
|
|
|
device = c["device"] if "device" in c else None
|
|
|
|
port = int(c["port"]) if "port" in c else None
|
|
|
|
listen_ip = c["listen_ip"] if "listen_ip" in c else None
|
|
|
|
listen_port = int(c["listen_port"]) if "listen_port" in c else None
|
|
|
|
forward_ip = c["forward_ip"] if "forward_ip" in c else None
|
|
|
|
forward_port = int(c["forward_port"]) if "forward_port" in c else None
|
|
|
|
|
|
|
|
if port != None:
|
|
|
|
if listen_port == None:
|
|
|
|
listen_port = port
|
|
|
|
if forward_port == None:
|
|
|
|
forward_port = port
|
|
|
|
|
2020-08-13 10:37:54 +00:00
|
|
|
interface = UDPInterface.UDPInterface(
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport,
|
|
|
|
name,
|
2021-08-19 17:56:35 +00:00
|
|
|
device,
|
|
|
|
listen_ip,
|
|
|
|
listen_port,
|
|
|
|
forward_ip,
|
|
|
|
forward_port
|
2020-08-13 10:15:56 +00:00
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2020-08-13 10:15:56 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
|
|
|
|
|
|
|
|
|
|
|
if c["type"] == "TCPServerInterface":
|
2021-08-19 18:13:53 +00:00
|
|
|
device = c["device"] if "device" in c else None
|
|
|
|
port = int(c["port"]) if "port" in c else None
|
|
|
|
listen_ip = c["listen_ip"] if "listen_ip" in c else None
|
|
|
|
listen_port = int(c["listen_port"]) if "listen_port" in c else None
|
2022-01-31 22:31:29 +00:00
|
|
|
i2p_tunneled = c.as_bool("i2p_tunneled") if "i2p_tunneled" in c else False
|
2021-08-19 18:13:53 +00:00
|
|
|
|
|
|
|
if port != None:
|
|
|
|
listen_port = port
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
interface = TCPInterface.TCPServerInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
2021-08-19 18:13:53 +00:00
|
|
|
device,
|
|
|
|
listen_ip,
|
2022-01-31 22:31:29 +00:00
|
|
|
listen_port,
|
|
|
|
i2p_tunneled
|
2020-08-13 10:15:56 +00:00
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2020-08-13 10:15:56 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
|
|
|
|
|
|
|
|
|
|
|
if c["type"] == "TCPClientInterface":
|
2021-12-06 12:07:12 +00:00
|
|
|
kiss_framing = False
|
|
|
|
if "kiss_framing" in c and c.as_bool("kiss_framing") == True:
|
|
|
|
kiss_framing = True
|
2022-01-31 22:31:29 +00:00
|
|
|
i2p_tunneled = c.as_bool("i2p_tunneled") if "i2p_tunneled" in c else False
|
|
|
|
|
2021-12-06 12:07:12 +00:00
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
interface = TCPInterface.TCPClientInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
|
|
|
c["target_host"],
|
2021-12-06 12:07:12 +00:00
|
|
|
int(c["target_port"]),
|
2022-01-31 22:31:29 +00:00
|
|
|
kiss_framing = kiss_framing,
|
2022-02-22 13:45:36 +00:00
|
|
|
i2p_tunneled = i2p_tunneled
|
2020-08-13 10:15:56 +00:00
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2020-08-13 10:15:56 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
2022-02-23 16:40:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
if c["type"] == "I2PInterface":
|
|
|
|
i2p_peers = c.as_list("peers") if "peers" in c else None
|
2022-02-24 00:30:10 +00:00
|
|
|
connectable = c.as_bool("connectable") if "connectable" in c else False
|
2022-02-23 16:40:31 +00:00
|
|
|
|
|
|
|
interface = I2PInterface.I2PInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
|
|
|
Reticulum.storagepath,
|
2022-02-24 00:30:10 +00:00
|
|
|
i2p_peers,
|
|
|
|
connectable = connectable,
|
2022-02-23 16:40:31 +00:00
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2022-02-23 16:40:31 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2022-02-23 16:40:31 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2022-02-23 16:40:31 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
2020-08-13 10:15:56 +00:00
|
|
|
|
|
|
|
|
|
|
|
if c["type"] == "SerialInterface":
|
|
|
|
port = c["port"] if "port" in c else None
|
|
|
|
speed = int(c["speed"]) if "speed" in c else 9600
|
|
|
|
databits = int(c["databits"]) if "databits" in c else 8
|
|
|
|
parity = c["parity"] if "parity" in c else "N"
|
|
|
|
stopbits = int(c["stopbits"]) if "stopbits" in c else 1
|
|
|
|
|
|
|
|
if port == None:
|
|
|
|
raise ValueError("No port specified for serial interface")
|
|
|
|
|
|
|
|
interface = SerialInterface.SerialInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
|
|
|
port,
|
|
|
|
speed,
|
|
|
|
databits,
|
|
|
|
parity,
|
|
|
|
stopbits
|
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2020-08-13 10:15:56 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
|
|
|
|
|
|
|
if c["type"] == "KISSInterface":
|
|
|
|
preamble = int(c["preamble"]) if "preamble" in c else None
|
|
|
|
txtail = int(c["txtail"]) if "txtail" in c else None
|
|
|
|
persistence = int(c["persistence"]) if "persistence" in c else None
|
|
|
|
slottime = int(c["slottime"]) if "slottime" in c else None
|
|
|
|
flow_control = c.as_bool("flow_control") if "flow_control" in c else False
|
|
|
|
port = c["port"] if "port" in c else None
|
|
|
|
speed = int(c["speed"]) if "speed" in c else 9600
|
|
|
|
databits = int(c["databits"]) if "databits" in c else 8
|
|
|
|
parity = c["parity"] if "parity" in c else "N"
|
|
|
|
stopbits = int(c["stopbits"]) if "stopbits" in c else 1
|
2020-08-13 13:06:39 +00:00
|
|
|
beacon_interval = int(c["id_interval"]) if "id_interval" in c else None
|
|
|
|
beacon_data = c["id_callsign"] if "id_callsign" in c else None
|
2020-08-13 10:15:56 +00:00
|
|
|
|
|
|
|
if port == None:
|
|
|
|
raise ValueError("No port specified for serial interface")
|
|
|
|
|
|
|
|
interface = KISSInterface.KISSInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
|
|
|
port,
|
|
|
|
speed,
|
|
|
|
databits,
|
|
|
|
parity,
|
|
|
|
stopbits,
|
|
|
|
preamble,
|
|
|
|
txtail,
|
|
|
|
persistence,
|
|
|
|
slottime,
|
2020-08-13 13:06:39 +00:00
|
|
|
flow_control,
|
|
|
|
beacon_interval,
|
|
|
|
beacon_data
|
2020-08-13 10:15:56 +00:00
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2020-08-13 10:15:56 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
|
|
|
|
|
|
|
if c["type"] == "AX25KISSInterface":
|
|
|
|
preamble = int(c["preamble"]) if "preamble" in c else None
|
|
|
|
txtail = int(c["txtail"]) if "txtail" in c else None
|
|
|
|
persistence = int(c["persistence"]) if "persistence" in c else None
|
|
|
|
slottime = int(c["slottime"]) if "slottime" in c else None
|
|
|
|
flow_control = c.as_bool("flow_control") if "flow_control" in c else False
|
|
|
|
port = c["port"] if "port" in c else None
|
|
|
|
speed = int(c["speed"]) if "speed" in c else 9600
|
|
|
|
databits = int(c["databits"]) if "databits" in c else 8
|
|
|
|
parity = c["parity"] if "parity" in c else "N"
|
|
|
|
stopbits = int(c["stopbits"]) if "stopbits" in c else 1
|
|
|
|
|
|
|
|
callsign = c["callsign"] if "callsign" in c else ""
|
|
|
|
ssid = int(c["ssid"]) if "ssid" in c else -1
|
|
|
|
|
|
|
|
if port == None:
|
|
|
|
raise ValueError("No port specified for serial interface")
|
|
|
|
|
|
|
|
interface = AX25KISSInterface.AX25KISSInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
|
|
|
callsign,
|
|
|
|
ssid,
|
|
|
|
port,
|
|
|
|
speed,
|
|
|
|
databits,
|
|
|
|
parity,
|
|
|
|
stopbits,
|
|
|
|
preamble,
|
|
|
|
txtail,
|
|
|
|
persistence,
|
|
|
|
slottime,
|
|
|
|
flow_control
|
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2020-08-13 10:15:56 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
|
|
|
|
|
|
|
if c["type"] == "RNodeInterface":
|
|
|
|
frequency = int(c["frequency"]) if "frequency" in c else None
|
|
|
|
bandwidth = int(c["bandwidth"]) if "bandwidth" in c else None
|
|
|
|
txpower = int(c["txpower"]) if "txpower" in c else None
|
|
|
|
spreadingfactor = int(c["spreadingfactor"]) if "spreadingfactor" in c else None
|
|
|
|
codingrate = int(c["codingrate"]) if "codingrate" in c else None
|
|
|
|
flow_control = c.as_bool("flow_control") if "flow_control" in c else False
|
|
|
|
id_interval = int(c["id_interval"]) if "id_interval" in c else None
|
|
|
|
id_callsign = c["id_callsign"] if "id_callsign" in c else None
|
|
|
|
|
|
|
|
port = c["port"] if "port" in c else None
|
|
|
|
|
|
|
|
if port == None:
|
|
|
|
raise ValueError("No port specified for RNode interface")
|
|
|
|
|
|
|
|
interface = RNodeInterface.RNodeInterface(
|
|
|
|
RNS.Transport,
|
|
|
|
name,
|
|
|
|
port,
|
|
|
|
frequency = frequency,
|
|
|
|
bandwidth = bandwidth,
|
|
|
|
txpower = txpower,
|
|
|
|
sf = spreadingfactor,
|
|
|
|
cr = codingrate,
|
|
|
|
flow_control = flow_control,
|
|
|
|
id_interval = id_interval,
|
|
|
|
id_callsign = id_callsign
|
|
|
|
)
|
|
|
|
|
2022-02-25 12:31:52 +00:00
|
|
|
if "outgoing" in c and c.as_bool("outgoing") == False:
|
2020-08-13 10:15:56 +00:00
|
|
|
interface.OUT = False
|
2022-02-25 12:31:52 +00:00
|
|
|
else:
|
|
|
|
interface.OUT = True
|
2020-08-13 10:15:56 +00:00
|
|
|
|
2022-02-25 17:47:55 +00:00
|
|
|
interface.mode = interface_mode
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
RNS.Transport.interfaces.append(interface)
|
|
|
|
else:
|
2021-12-10 08:48:57 +00:00
|
|
|
RNS.log("Skipping disabled interface \""+name+"\"", RNS.LOG_DEBUG)
|
2020-08-13 10:15:56 +00:00
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
RNS.log("The interface \""+name+"\" could not be created. Check your configuration file for errors!", RNS.LOG_ERROR)
|
|
|
|
RNS.log("The contained exception was: "+str(e), RNS.LOG_ERROR)
|
|
|
|
RNS.panic()
|
|
|
|
else:
|
|
|
|
RNS.log("The interface name \""+name+"\" was already used. Check your configuration file for errors!", RNS.LOG_ERROR)
|
|
|
|
RNS.panic()
|
2022-02-22 13:43:14 +00:00
|
|
|
|
|
|
|
RNS.log("System interfaces are ready", RNS.LOG_DEBUG)
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
|
|
|
|
|
2021-05-16 10:55:50 +00:00
|
|
|
def __create_default_config(self):
|
2020-08-13 10:15:56 +00:00
|
|
|
self.config = ConfigObj(__default_rns_config__)
|
|
|
|
self.config.filename = Reticulum.configpath
|
|
|
|
|
|
|
|
if not os.path.isdir(Reticulum.configdir):
|
|
|
|
os.makedirs(Reticulum.configdir)
|
|
|
|
self.config.write()
|
|
|
|
|
2021-09-24 18:10:04 +00:00
|
|
|
def rpc_loop(self):
|
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
rpc_connection = self.rpc_listener.accept()
|
|
|
|
call = rpc_connection.recv()
|
|
|
|
|
|
|
|
if "get" in call:
|
|
|
|
path = call["get"]
|
|
|
|
|
|
|
|
if path == "interface_stats":
|
|
|
|
rpc_connection.send(self.get_interface_stats())
|
|
|
|
|
2021-09-25 09:27:43 +00:00
|
|
|
if path == "next_hop_if_name":
|
|
|
|
rpc_connection.send(self.get_next_hop_if_name(call["destination_hash"]))
|
|
|
|
|
|
|
|
if path == "next_hop":
|
|
|
|
rpc_connection.send(self.get_next_hop(call["destination_hash"]))
|
|
|
|
|
2021-10-12 14:34:17 +00:00
|
|
|
if path == "packet_rssi":
|
|
|
|
rpc_connection.send(self.get_packet_rssi(call["packet_hash"]))
|
|
|
|
|
|
|
|
if path == "packet_snr":
|
|
|
|
rpc_connection.send(self.get_packet_snr(call["packet_hash"]))
|
|
|
|
|
2021-09-24 18:10:04 +00:00
|
|
|
rpc_connection.close()
|
|
|
|
except Exception as e:
|
|
|
|
RNS.log("An error ocurred while handling RPC call from local client: "+str(e), RNS.LOG_ERROR)
|
|
|
|
|
|
|
|
def get_interface_stats(self):
|
|
|
|
if self.is_connected_to_shared_instance:
|
|
|
|
rpc_connection = multiprocessing.connection.Client(self.rpc_addr, authkey=self.rpc_key)
|
|
|
|
rpc_connection.send({"get": "interface_stats"})
|
|
|
|
response = rpc_connection.recv()
|
|
|
|
return response
|
|
|
|
else:
|
|
|
|
stats = []
|
|
|
|
for interface in RNS.Transport.interfaces:
|
|
|
|
ifstats = {}
|
|
|
|
|
|
|
|
if hasattr(interface, "clients"):
|
|
|
|
ifstats["clients"] = interface.clients
|
|
|
|
else:
|
|
|
|
ifstats["clients"] = None
|
|
|
|
|
|
|
|
ifstats["name"] = str(interface)
|
|
|
|
ifstats["rxb"] = interface.rxb
|
|
|
|
ifstats["txb"] = interface.txb
|
|
|
|
ifstats["status"] = interface.online
|
|
|
|
stats.append(ifstats)
|
|
|
|
|
|
|
|
return stats
|
|
|
|
|
2021-09-25 09:27:43 +00:00
|
|
|
def get_next_hop_if_name(self, destination):
|
|
|
|
if self.is_connected_to_shared_instance:
|
|
|
|
rpc_connection = multiprocessing.connection.Client(self.rpc_addr, authkey=self.rpc_key)
|
|
|
|
rpc_connection.send({"get": "next_hop_if_name", "destination_hash": destination})
|
|
|
|
response = rpc_connection.recv()
|
|
|
|
return response
|
2021-10-12 14:34:17 +00:00
|
|
|
|
2021-09-25 09:27:43 +00:00
|
|
|
else:
|
|
|
|
return str(RNS.Transport.next_hop_interface(destination))
|
|
|
|
|
|
|
|
def get_next_hop(self, destination):
|
|
|
|
if self.is_connected_to_shared_instance:
|
|
|
|
rpc_connection = multiprocessing.connection.Client(self.rpc_addr, authkey=self.rpc_key)
|
|
|
|
rpc_connection.send({"get": "next_hop", "destination_hash": destination})
|
|
|
|
response = rpc_connection.recv()
|
|
|
|
return response
|
2021-10-12 14:34:17 +00:00
|
|
|
|
2021-09-25 09:27:43 +00:00
|
|
|
else:
|
|
|
|
return RNS.Transport.next_hop(destination)
|
|
|
|
|
2021-10-12 14:34:17 +00:00
|
|
|
def get_packet_rssi(self, packet_hash):
|
|
|
|
if self.is_connected_to_shared_instance:
|
|
|
|
rpc_connection = multiprocessing.connection.Client(self.rpc_addr, authkey=self.rpc_key)
|
|
|
|
rpc_connection.send({"get": "packet_rssi", "packet_hash": packet_hash})
|
|
|
|
response = rpc_connection.recv()
|
|
|
|
return response
|
|
|
|
|
|
|
|
else:
|
|
|
|
for entry in RNS.Transport.local_client_rssi_cache:
|
|
|
|
if entry[0] == packet_hash:
|
|
|
|
return entry[1]
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
def get_packet_snr(self, packet_hash):
|
|
|
|
if self.is_connected_to_shared_instance:
|
|
|
|
rpc_connection = multiprocessing.connection.Client(self.rpc_addr, authkey=self.rpc_key)
|
|
|
|
rpc_connection.send({"get": "packet_snr", "packet_hash": packet_hash})
|
|
|
|
response = rpc_connection.recv()
|
|
|
|
return response
|
|
|
|
|
|
|
|
else:
|
|
|
|
for entry in RNS.Transport.local_client_snr_cache:
|
|
|
|
if entry[0] == packet_hash:
|
|
|
|
return entry[1]
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
2021-09-24 18:10:04 +00:00
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
@staticmethod
|
|
|
|
def should_use_implicit_proof():
|
2021-05-16 10:55:50 +00:00
|
|
|
"""
|
2021-05-16 13:52:45 +00:00
|
|
|
Returns whether proofs sent are explicit or implicit.
|
2021-05-16 10:55:50 +00:00
|
|
|
|
2021-05-16 13:52:45 +00:00
|
|
|
:returns: True if the current running configuration specifies to use implicit proofs. False if not.
|
2021-05-16 10:55:50 +00:00
|
|
|
"""
|
2020-08-13 10:15:56 +00:00
|
|
|
return Reticulum.__use_implicit_proof
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def transport_enabled():
|
2021-05-16 10:55:50 +00:00
|
|
|
"""
|
2021-05-16 13:52:45 +00:00
|
|
|
Returns whether Transport is enabled for the running
|
2021-05-16 10:55:50 +00:00
|
|
|
instance.
|
|
|
|
|
|
|
|
When Transport is enabled, Reticulum will
|
|
|
|
route traffic for other peers, respond to path requests
|
|
|
|
and pass announces over the network.
|
|
|
|
|
|
|
|
:returns: True if Transport is enabled, False if not.
|
|
|
|
"""
|
2020-08-13 10:15:56 +00:00
|
|
|
return Reticulum.__transport_enabled
|
2020-04-27 10:04:14 +00:00
|
|
|
|
2020-04-27 08:19:49 +00:00
|
|
|
# Default configuration file:
|
|
|
|
__default_rns_config__ = '''# This is the default Reticulum config file.
|
|
|
|
# You should probably edit it to include any additional,
|
|
|
|
# interfaces and settings you might need.
|
|
|
|
|
|
|
|
[reticulum]
|
|
|
|
|
|
|
|
# If you enable Transport, your system will route traffic
|
|
|
|
# for other peers, pass announces and serve path requests.
|
2021-08-20 09:23:35 +00:00
|
|
|
# This should be done for systems that are suited to act
|
|
|
|
# as transport nodes, ie. if they are stationary and
|
|
|
|
# always-on. This directive is optional and can be removed
|
|
|
|
# for brevity.
|
2020-05-13 14:03:50 +00:00
|
|
|
|
2020-04-27 08:19:49 +00:00
|
|
|
enable_transport = False
|
|
|
|
|
|
|
|
|
2020-05-13 14:03:50 +00:00
|
|
|
# By default, the first program to launch the Reticulum
|
|
|
|
# Network Stack will create a shared instance, that other
|
|
|
|
# programs can communicate with. Only the shared instance
|
|
|
|
# opens all the configured interfaces directly, and other
|
|
|
|
# local programs communicate with the shared instance over
|
|
|
|
# a local socket. This is completely transparent to the
|
|
|
|
# user, and should generally be turned on. This directive
|
|
|
|
# is optional and can be removed for brevity.
|
|
|
|
|
|
|
|
share_instance = Yes
|
|
|
|
|
|
|
|
|
|
|
|
# If you want to run multiple *different* shared instances
|
2021-09-24 12:13:31 +00:00
|
|
|
# on the same system, you will need to specify different
|
|
|
|
# shared instance ports for each. The defaults are given
|
|
|
|
# below, and again, these options can be left out if you
|
|
|
|
# don't need them.
|
2020-05-13 14:03:50 +00:00
|
|
|
|
|
|
|
shared_instance_port = 37428
|
2021-09-24 12:13:31 +00:00
|
|
|
instance_control_port = 37429
|
2020-05-13 14:03:50 +00:00
|
|
|
|
2021-09-18 20:49:04 +00:00
|
|
|
# You can configure Reticulum to panic and forcibly close
|
|
|
|
# if an unrecoverable interface error occurs, such as the
|
|
|
|
# hardware device for an interface disappearing. This is
|
|
|
|
# an optional directive, and can be left out for brevity.
|
|
|
|
# This behaviour is disabled by default.
|
|
|
|
|
|
|
|
panic_on_interface_error = No
|
|
|
|
|
2020-05-13 14:03:50 +00:00
|
|
|
|
2020-04-27 08:19:49 +00:00
|
|
|
[logging]
|
|
|
|
# Valid log levels are 0 through 7:
|
|
|
|
# 0: Log only critical information
|
|
|
|
# 1: Log errors and lower log levels
|
|
|
|
# 2: Log warnings and lower log levels
|
|
|
|
# 3: Log notices and lower log levels
|
|
|
|
# 4: Log info and lower (this is the default)
|
|
|
|
# 5: Verbose logging
|
|
|
|
# 6: Debug logging
|
|
|
|
# 7: Extreme logging
|
|
|
|
|
|
|
|
loglevel = 4
|
|
|
|
|
|
|
|
|
|
|
|
# The interfaces section defines the physical and virtual
|
|
|
|
# interfaces Reticulum will use to communicate on. This
|
|
|
|
# section will contain examples for a variety of interface
|
|
|
|
# types. You can modify these or use them as a basis for
|
|
|
|
# your own config, or simply remove the unused ones.
|
|
|
|
|
|
|
|
[interfaces]
|
|
|
|
|
|
|
|
# This interface enables communication with other
|
2021-12-09 15:07:36 +00:00
|
|
|
# link-local Reticulum nodes over UDP. It does not
|
|
|
|
# need any functional IP infrastructure like routers
|
|
|
|
# or DHCP servers, but will require that at least link-
|
|
|
|
# local IPv6 is enabled in your operating system, which
|
|
|
|
# should be enabled by default in almost any OS. See
|
|
|
|
# the Reticulum Manual for more configuration options.
|
|
|
|
|
|
|
|
[[Default Interface]]
|
|
|
|
type = AutoInterface
|
|
|
|
interface_enabled = True
|
|
|
|
|
|
|
|
|
|
|
|
# The following example enables communication with other
|
|
|
|
# local Reticulum peers using UDP broadcasts.
|
2020-05-11 14:33:31 +00:00
|
|
|
|
2021-12-09 15:07:36 +00:00
|
|
|
[[UDP Interface]]
|
2020-08-13 10:37:54 +00:00
|
|
|
type = UDPInterface
|
2021-12-09 15:07:36 +00:00
|
|
|
interface_enabled = False
|
2021-08-29 11:48:12 +00:00
|
|
|
listen_ip = 0.0.0.0
|
|
|
|
listen_port = 4242
|
|
|
|
forward_ip = 255.255.255.255
|
|
|
|
forward_port = 4242
|
|
|
|
|
|
|
|
# The above configuration will allow communication
|
|
|
|
# within the local broadcast domains of all local
|
2021-12-09 15:07:36 +00:00
|
|
|
# IP interfaces.
|
2021-08-29 11:48:12 +00:00
|
|
|
|
|
|
|
# Instead of specifying listen_ip, listen_port,
|
|
|
|
# forward_ip and forward_port, you can also bind
|
|
|
|
# to a specific network device like below.
|
|
|
|
|
|
|
|
# device = eth0
|
|
|
|
# port = 4242
|
2021-08-20 09:23:35 +00:00
|
|
|
|
|
|
|
# Assuming the eth0 device has the address
|
|
|
|
# 10.55.0.72/24, the above configuration would
|
|
|
|
# be equivalent to the following manual setup.
|
2021-08-29 11:48:12 +00:00
|
|
|
# Note that we are both listening and forwarding to
|
|
|
|
# the broadcast address of the network segments.
|
|
|
|
|
2021-08-20 09:23:35 +00:00
|
|
|
# listen_ip = 10.55.0.255
|
|
|
|
# listen_port = 4242
|
|
|
|
# forward_ip = 10.55.0.255
|
|
|
|
# forward_port = 4242
|
|
|
|
|
|
|
|
# You can of course also communicate only with
|
|
|
|
# a single IP address
|
|
|
|
|
|
|
|
# listen_ip = 10.55.0.15
|
|
|
|
# listen_port = 4242
|
|
|
|
# forward_ip = 10.55.0.16
|
|
|
|
# forward_port = 4242
|
2020-05-11 14:33:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
# This example demonstrates a TCP server interface.
|
|
|
|
# It will listen for incoming connections on the
|
|
|
|
# specified IP address and port number.
|
|
|
|
|
|
|
|
[[TCP Server Interface]]
|
|
|
|
type = TCPServerInterface
|
|
|
|
interface_enabled = False
|
2021-08-20 09:23:35 +00:00
|
|
|
|
|
|
|
# This configuration will listen on all IP
|
|
|
|
# interfaces on port 4242
|
|
|
|
|
2020-05-11 14:33:31 +00:00
|
|
|
listen_ip = 0.0.0.0
|
|
|
|
listen_port = 4242
|
|
|
|
|
2021-08-20 09:23:35 +00:00
|
|
|
# Alternatively you can bind to a specific IP
|
|
|
|
|
|
|
|
# listen_ip = 10.0.0.88
|
|
|
|
# listen_port = 4242
|
|
|
|
|
|
|
|
# Or a specific network device
|
|
|
|
|
|
|
|
# device = eth0
|
|
|
|
# port = 4242
|
|
|
|
|
2020-05-11 14:33:31 +00:00
|
|
|
|
|
|
|
# To connect to a TCP server interface, you would
|
|
|
|
# naturally use the TCP client interface. Here's
|
|
|
|
# an example. The target_host can either be an IP
|
|
|
|
# address or a hostname
|
|
|
|
|
|
|
|
[[TCP Client Interface]]
|
|
|
|
type = TCPClientInterface
|
|
|
|
interface_enabled = False
|
|
|
|
target_host = 127.0.0.1
|
|
|
|
target_port = 4242
|
2020-04-27 08:19:49 +00:00
|
|
|
|
|
|
|
|
|
|
|
# Here's an example of how to add a LoRa interface
|
|
|
|
# using the RNode LoRa transceiver.
|
|
|
|
|
|
|
|
[[RNode LoRa Interface]]
|
|
|
|
type = RNodeInterface
|
|
|
|
|
|
|
|
# Enable interface if you want use it!
|
|
|
|
interface_enabled = False
|
|
|
|
|
|
|
|
# Serial port for the device
|
|
|
|
port = /dev/ttyUSB0
|
|
|
|
|
|
|
|
# Set frequency to 867.2 MHz
|
|
|
|
frequency = 867200000
|
|
|
|
|
|
|
|
# Set LoRa bandwidth to 125 KHz
|
|
|
|
bandwidth = 125000
|
|
|
|
|
|
|
|
# Set TX power to 7 dBm (5 mW)
|
|
|
|
txpower = 7
|
|
|
|
|
|
|
|
# Select spreading factor 8. Valid
|
|
|
|
# range is 7 through 12, with 7
|
|
|
|
# being the fastest and 12 having
|
|
|
|
# the longest range.
|
|
|
|
spreadingfactor = 8
|
|
|
|
|
|
|
|
# Select coding rate 5. Valid range
|
|
|
|
# is 5 throough 8, with 5 being the
|
|
|
|
# fastest, and 8 the longest range.
|
|
|
|
codingrate = 5
|
|
|
|
|
2020-05-21 12:17:14 +00:00
|
|
|
# You can configure the RNode to send
|
|
|
|
# out identification on the channel with
|
|
|
|
# a set interval by configuring the
|
|
|
|
# following two parameters. The trans-
|
2020-08-13 13:06:39 +00:00
|
|
|
# ceiver will only ID if the set
|
2020-05-21 12:17:14 +00:00
|
|
|
# interval has elapsed since it's last
|
2020-08-13 13:06:39 +00:00
|
|
|
# actual transmission. The interval is
|
|
|
|
# configured in seconds.
|
2020-05-21 12:17:14 +00:00
|
|
|
# This option is commented out and not
|
|
|
|
# used by default.
|
|
|
|
# id_callsign = MYCALL-0
|
|
|
|
# id_interval = 600
|
|
|
|
|
2020-08-13 13:06:39 +00:00
|
|
|
# For certain homebrew RNode interfaces
|
|
|
|
# with low amounts of RAM, using packet
|
|
|
|
# flow control can be useful. By default
|
|
|
|
# it is disabled.
|
|
|
|
flow_control = False
|
|
|
|
|
|
|
|
|
2020-04-27 08:19:49 +00:00
|
|
|
# An example KISS modem interface. Useful for running
|
|
|
|
# Reticulum over packet radio hardware.
|
|
|
|
|
|
|
|
[[Packet Radio KISS Interface]]
|
|
|
|
type = KISSInterface
|
|
|
|
|
|
|
|
# Enable interface if you want use it!
|
|
|
|
interface_enabled = False
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
# Serial port for the device
|
2020-04-27 08:19:49 +00:00
|
|
|
port = /dev/ttyUSB1
|
|
|
|
|
|
|
|
# Set the serial baud-rate and other
|
|
|
|
# configuration parameters.
|
|
|
|
speed = 115200
|
|
|
|
databits = 8
|
|
|
|
parity = none
|
|
|
|
stopbits = 1
|
|
|
|
|
|
|
|
# Set the modem preamble. A 150ms
|
|
|
|
# preamble should be a reasonable
|
|
|
|
# default, but may need to be
|
|
|
|
# increased for radios with slow-
|
|
|
|
# opening squelch and long TX/RX
|
|
|
|
# turnaround
|
|
|
|
preamble = 150
|
|
|
|
|
|
|
|
# Set the modem TX tail. In most
|
|
|
|
# cases this should be kept as low
|
|
|
|
# as possible to not waste airtime.
|
|
|
|
txtail = 10
|
|
|
|
|
|
|
|
# Configure CDMA parameters. These
|
|
|
|
# settings are reasonable defaults.
|
|
|
|
persistence = 200
|
|
|
|
slottime = 20
|
|
|
|
|
2020-08-13 13:06:39 +00:00
|
|
|
# You can configure the interface to send
|
|
|
|
# out identification on the channel with
|
|
|
|
# a set interval by configuring the
|
|
|
|
# following two parameters. The KISS
|
|
|
|
# interface will only ID if the set
|
|
|
|
# interval has elapsed since it's last
|
|
|
|
# actual transmission. The interval is
|
|
|
|
# configured in seconds.
|
|
|
|
# This option is commented out and not
|
|
|
|
# used by default.
|
|
|
|
# id_callsign = MYCALL-0
|
|
|
|
# id_interval = 600
|
|
|
|
|
|
|
|
# Whether to use KISS flow-control.
|
|
|
|
# This is useful for modems that have
|
|
|
|
# a small internal packet buffer, but
|
|
|
|
# support packet flow control instead.
|
|
|
|
flow_control = false
|
|
|
|
|
2020-05-11 14:33:31 +00:00
|
|
|
|
2020-04-27 08:19:49 +00:00
|
|
|
# If you're using Reticulum on amateur radio spectrum,
|
|
|
|
# you might want to use the AX.25 KISS interface. This
|
|
|
|
# way, Reticulum will automatically encapsulate it's
|
|
|
|
# traffic in AX.25 and also identify your stations
|
|
|
|
# transmissions with your callsign and SSID.
|
|
|
|
#
|
|
|
|
# Only do this if you really need to! Reticulum doesn't
|
|
|
|
# need the AX.25 layer for anything, and it incurs extra
|
|
|
|
# overhead on every packet to encapsulate in AX.25.
|
2020-08-13 13:06:39 +00:00
|
|
|
#
|
|
|
|
# A more efficient way is to use the plain KISS interface
|
|
|
|
# with the beaconing functionality described above.
|
2020-04-27 08:19:49 +00:00
|
|
|
|
|
|
|
[[Packet Radio AX.25 KISS Interface]]
|
|
|
|
type = AX25KISSInterface
|
|
|
|
|
|
|
|
# Set the station callsign and SSID
|
|
|
|
callsign = NO1CLL
|
|
|
|
ssid = 0
|
|
|
|
|
|
|
|
# Enable interface if you want use it!
|
|
|
|
interface_enabled = False
|
|
|
|
|
2020-08-13 10:15:56 +00:00
|
|
|
# Serial port for the device
|
2020-04-27 08:19:49 +00:00
|
|
|
port = /dev/ttyUSB2
|
|
|
|
|
|
|
|
# Set the serial baud-rate and other
|
|
|
|
# configuration parameters.
|
|
|
|
speed = 115200
|
|
|
|
databits = 8
|
|
|
|
parity = none
|
|
|
|
stopbits = 1
|
|
|
|
|
|
|
|
# Whether to use KISS flow-control.
|
|
|
|
# This is useful for modems with a
|
|
|
|
# small internal packet buffer.
|
|
|
|
flow_control = false
|
|
|
|
|
|
|
|
# Set the modem preamble. A 150ms
|
|
|
|
# preamble should be a reasonable
|
|
|
|
# default, but may need to be
|
|
|
|
# increased for radios with slow-
|
|
|
|
# opening squelch and long TX/RX
|
|
|
|
# turnaround
|
|
|
|
preamble = 150
|
|
|
|
|
|
|
|
# Set the modem TX tail. In most
|
|
|
|
# cases this should be kept as low
|
|
|
|
# as possible to not waste airtime.
|
|
|
|
txtail = 10
|
|
|
|
|
|
|
|
# Configure CDMA parameters. These
|
|
|
|
# settings are reasonable defaults.
|
|
|
|
persistence = 200
|
|
|
|
slottime = 20
|
|
|
|
|
2021-12-09 15:07:36 +00:00
|
|
|
'''.splitlines()
|