forked from quic-go/quic-go
The server shouldn't receive any Public Resets. There is no need to attempt parsing them, since they are ignored anyway.
434 lines
13 KiB
Go
434 lines
13 KiB
Go
package quic
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/lucas-clemente/quic-go/internal/crypto"
|
|
"github.com/lucas-clemente/quic-go/internal/handshake"
|
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
|
"github.com/lucas-clemente/quic-go/internal/utils"
|
|
"github.com/lucas-clemente/quic-go/internal/wire"
|
|
"github.com/lucas-clemente/quic-go/qerr"
|
|
)
|
|
|
|
// packetHandler handles packets
|
|
type packetHandler interface {
|
|
Session
|
|
getCryptoStream() cryptoStreamI
|
|
handshakeStatus() <-chan error
|
|
handlePacket(*receivedPacket)
|
|
GetVersion() protocol.VersionNumber
|
|
run() error
|
|
closeRemote(error)
|
|
}
|
|
|
|
// A Listener of QUIC
|
|
type server struct {
|
|
tlsConf *tls.Config
|
|
config *Config
|
|
|
|
conn net.PacketConn
|
|
|
|
supportsTLS bool
|
|
serverTLS *serverTLS
|
|
|
|
certChain crypto.CertChain
|
|
scfg *handshake.ServerConfig
|
|
|
|
sessionsMutex sync.RWMutex
|
|
sessions map[string] /* string(ConnectionID)*/ packetHandler
|
|
closed bool
|
|
|
|
serverError error
|
|
sessionQueue chan Session
|
|
errorChan chan struct{}
|
|
|
|
// set as members, so they can be set in the tests
|
|
newSession func(conn connection, v protocol.VersionNumber, connectionID protocol.ConnectionID, sCfg *handshake.ServerConfig, tlsConf *tls.Config, config *Config, logger utils.Logger) (packetHandler, error)
|
|
deleteClosedSessionsAfter time.Duration
|
|
|
|
logger utils.Logger
|
|
}
|
|
|
|
var _ Listener = &server{}
|
|
|
|
// ListenAddr creates a QUIC server listening on a given address.
|
|
// The listener is not active until Serve() is called.
|
|
// The tls.Config must not be nil, the quic.Config may be nil.
|
|
func ListenAddr(addr string, tlsConf *tls.Config, config *Config) (Listener, error) {
|
|
udpAddr, err := net.ResolveUDPAddr("udp", addr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
conn, err := net.ListenUDP("udp", udpAddr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return Listen(conn, tlsConf, config)
|
|
}
|
|
|
|
// Listen listens for QUIC connections on a given net.PacketConn.
|
|
// The listener is not active until Serve() is called.
|
|
// The tls.Config must not be nil, the quic.Config may be nil.
|
|
func Listen(conn net.PacketConn, tlsConf *tls.Config, config *Config) (Listener, error) {
|
|
certChain := crypto.NewCertChain(tlsConf)
|
|
kex, err := crypto.NewCurve25519KEX()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
scfg, err := handshake.NewServerConfig(kex, certChain)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config = populateServerConfig(config)
|
|
|
|
var supportsTLS bool
|
|
for _, v := range config.Versions {
|
|
if !protocol.IsValidVersion(v) {
|
|
return nil, fmt.Errorf("%s is not a valid QUIC version", v)
|
|
}
|
|
// check if any of the supported versions supports TLS
|
|
if v.UsesTLS() {
|
|
supportsTLS = true
|
|
break
|
|
}
|
|
}
|
|
|
|
s := &server{
|
|
conn: conn,
|
|
tlsConf: tlsConf,
|
|
config: config,
|
|
certChain: certChain,
|
|
scfg: scfg,
|
|
sessions: map[string]packetHandler{},
|
|
newSession: newSession,
|
|
deleteClosedSessionsAfter: protocol.ClosedSessionDeleteTimeout,
|
|
sessionQueue: make(chan Session, 5),
|
|
errorChan: make(chan struct{}),
|
|
supportsTLS: supportsTLS,
|
|
logger: utils.DefaultLogger,
|
|
}
|
|
if supportsTLS {
|
|
if err := s.setupTLS(); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
go s.serve()
|
|
s.logger.Debugf("Listening for %s connections on %s", conn.LocalAddr().Network(), conn.LocalAddr().String())
|
|
return s, nil
|
|
}
|
|
|
|
func (s *server) setupTLS() error {
|
|
cookieHandler, err := handshake.NewCookieHandler(s.config.AcceptCookie, s.logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
serverTLS, sessionChan, err := newServerTLS(s.conn, s.config, cookieHandler, s.tlsConf, s.logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.serverTLS = serverTLS
|
|
// handle TLS connection establishment statelessly
|
|
go func() {
|
|
for {
|
|
select {
|
|
case <-s.errorChan:
|
|
return
|
|
case tlsSession := <-sessionChan:
|
|
connID := tlsSession.connID
|
|
sess := tlsSession.sess
|
|
s.sessionsMutex.Lock()
|
|
if _, ok := s.sessions[string(connID)]; ok { // drop this session if it already exists
|
|
s.sessionsMutex.Unlock()
|
|
continue
|
|
}
|
|
s.sessions[string(connID)] = sess
|
|
s.sessionsMutex.Unlock()
|
|
s.runHandshakeAndSession(sess, connID)
|
|
}
|
|
}
|
|
}()
|
|
return nil
|
|
}
|
|
|
|
var defaultAcceptCookie = func(clientAddr net.Addr, cookie *Cookie) bool {
|
|
if cookie == nil {
|
|
return false
|
|
}
|
|
if time.Now().After(cookie.SentTime.Add(protocol.CookieExpiryTime)) {
|
|
return false
|
|
}
|
|
var sourceAddr string
|
|
if udpAddr, ok := clientAddr.(*net.UDPAddr); ok {
|
|
sourceAddr = udpAddr.IP.String()
|
|
} else {
|
|
sourceAddr = clientAddr.String()
|
|
}
|
|
return sourceAddr == cookie.RemoteAddr
|
|
}
|
|
|
|
// populateServerConfig populates fields in the quic.Config with their default values, if none are set
|
|
// it may be called with nil
|
|
func populateServerConfig(config *Config) *Config {
|
|
if config == nil {
|
|
config = &Config{}
|
|
}
|
|
versions := config.Versions
|
|
if len(versions) == 0 {
|
|
versions = protocol.SupportedVersions
|
|
}
|
|
|
|
vsa := defaultAcceptCookie
|
|
if config.AcceptCookie != nil {
|
|
vsa = config.AcceptCookie
|
|
}
|
|
|
|
handshakeTimeout := protocol.DefaultHandshakeTimeout
|
|
if config.HandshakeTimeout != 0 {
|
|
handshakeTimeout = config.HandshakeTimeout
|
|
}
|
|
idleTimeout := protocol.DefaultIdleTimeout
|
|
if config.IdleTimeout != 0 {
|
|
idleTimeout = config.IdleTimeout
|
|
}
|
|
|
|
maxReceiveStreamFlowControlWindow := config.MaxReceiveStreamFlowControlWindow
|
|
if maxReceiveStreamFlowControlWindow == 0 {
|
|
maxReceiveStreamFlowControlWindow = protocol.DefaultMaxReceiveStreamFlowControlWindowServer
|
|
}
|
|
maxReceiveConnectionFlowControlWindow := config.MaxReceiveConnectionFlowControlWindow
|
|
if maxReceiveConnectionFlowControlWindow == 0 {
|
|
maxReceiveConnectionFlowControlWindow = protocol.DefaultMaxReceiveConnectionFlowControlWindowServer
|
|
}
|
|
maxIncomingStreams := config.MaxIncomingStreams
|
|
if maxIncomingStreams == 0 {
|
|
maxIncomingStreams = protocol.DefaultMaxIncomingStreams
|
|
} else if maxIncomingStreams < 0 {
|
|
maxIncomingStreams = 0
|
|
}
|
|
maxIncomingUniStreams := config.MaxIncomingUniStreams
|
|
if maxIncomingUniStreams == 0 {
|
|
maxIncomingUniStreams = protocol.DefaultMaxIncomingUniStreams
|
|
} else if maxIncomingUniStreams < 0 {
|
|
maxIncomingUniStreams = 0
|
|
}
|
|
|
|
return &Config{
|
|
Versions: versions,
|
|
HandshakeTimeout: handshakeTimeout,
|
|
IdleTimeout: idleTimeout,
|
|
AcceptCookie: vsa,
|
|
KeepAlive: config.KeepAlive,
|
|
MaxReceiveStreamFlowControlWindow: maxReceiveStreamFlowControlWindow,
|
|
MaxReceiveConnectionFlowControlWindow: maxReceiveConnectionFlowControlWindow,
|
|
MaxIncomingStreams: maxIncomingStreams,
|
|
MaxIncomingUniStreams: maxIncomingUniStreams,
|
|
}
|
|
}
|
|
|
|
// serve listens on an existing PacketConn
|
|
func (s *server) serve() {
|
|
for {
|
|
data := *getPacketBuffer()
|
|
data = data[:protocol.MaxReceivePacketSize]
|
|
// The packet size should not exceed protocol.MaxReceivePacketSize bytes
|
|
// If it does, we only read a truncated packet, which will then end up undecryptable
|
|
n, remoteAddr, err := s.conn.ReadFrom(data)
|
|
if err != nil {
|
|
s.serverError = err
|
|
close(s.errorChan)
|
|
_ = s.Close()
|
|
return
|
|
}
|
|
data = data[:n]
|
|
if err := s.handlePacket(s.conn, remoteAddr, data); err != nil {
|
|
s.logger.Errorf("error handling packet: %s", err.Error())
|
|
}
|
|
}
|
|
}
|
|
|
|
// Accept returns newly openend sessions
|
|
func (s *server) Accept() (Session, error) {
|
|
var sess Session
|
|
select {
|
|
case sess = <-s.sessionQueue:
|
|
return sess, nil
|
|
case <-s.errorChan:
|
|
return nil, s.serverError
|
|
}
|
|
}
|
|
|
|
// Close the server
|
|
func (s *server) Close() error {
|
|
s.sessionsMutex.Lock()
|
|
if s.closed {
|
|
s.sessionsMutex.Unlock()
|
|
return nil
|
|
}
|
|
s.closed = true
|
|
|
|
var wg sync.WaitGroup
|
|
for _, session := range s.sessions {
|
|
if session != nil {
|
|
wg.Add(1)
|
|
go func(sess packetHandler) {
|
|
// session.Close() blocks until the CONNECTION_CLOSE has been sent and the run-loop has stopped
|
|
_ = sess.Close(nil)
|
|
wg.Done()
|
|
}(session)
|
|
}
|
|
}
|
|
s.sessionsMutex.Unlock()
|
|
wg.Wait()
|
|
|
|
err := s.conn.Close()
|
|
<-s.errorChan // wait for serve() to return
|
|
return err
|
|
}
|
|
|
|
// Addr returns the server's network address
|
|
func (s *server) Addr() net.Addr {
|
|
return s.conn.LocalAddr()
|
|
}
|
|
|
|
func (s *server) handlePacket(pconn net.PacketConn, remoteAddr net.Addr, packet []byte) error {
|
|
rcvTime := time.Now()
|
|
|
|
r := bytes.NewReader(packet)
|
|
hdr, err := wire.ParseHeaderSentByClient(r)
|
|
if err != nil {
|
|
return qerr.Error(qerr.InvalidPacketHeader, err.Error())
|
|
}
|
|
hdr.Raw = packet[:len(packet)-r.Len()]
|
|
packetData := packet[len(packet)-r.Len():]
|
|
|
|
if hdr.IsLongHeader {
|
|
if protocol.ByteCount(len(packetData)) < hdr.PayloadLen {
|
|
return fmt.Errorf("packet payload (%d bytes) is smaller than the expected payload length (%d bytes)", len(packetData), hdr.PayloadLen)
|
|
}
|
|
packetData = packetData[:int(hdr.PayloadLen)]
|
|
// TODO(#1312): implement parsing of compound packets
|
|
}
|
|
|
|
if hdr.Type == protocol.PacketTypeInitial {
|
|
if s.supportsTLS {
|
|
go s.serverTLS.HandleInitial(remoteAddr, hdr, packetData)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
s.sessionsMutex.RLock()
|
|
session, sessionKnown := s.sessions[string(hdr.DestConnectionID)]
|
|
s.sessionsMutex.RUnlock()
|
|
|
|
if sessionKnown && session == nil {
|
|
// Late packet for closed session
|
|
return nil
|
|
}
|
|
|
|
// ignore all Public Reset packets
|
|
if hdr.ResetFlag {
|
|
s.logger.Infof("Received unexpected Public Reset for connection %s.", hdr.DestConnectionID)
|
|
return nil
|
|
}
|
|
|
|
// If we don't have a session for this connection, and this packet cannot open a new connection, send a Public Reset
|
|
// This should only happen after a server restart, when we still receive packets for connections that we lost the state for.
|
|
// TODO(#943): implement sending of IETF draft style stateless resets
|
|
if !sessionKnown && (!hdr.VersionFlag && hdr.Type != protocol.PacketTypeInitial) {
|
|
_, err = pconn.WriteTo(wire.WritePublicReset(hdr.DestConnectionID, 0, 0), remoteAddr)
|
|
return err
|
|
}
|
|
|
|
// a session is only created once the client sent a supported version
|
|
// if we receive a packet for a connection that already has session, it's probably an old packet that was sent by the client before the version was negotiated
|
|
// it is safe to drop it
|
|
if sessionKnown && hdr.VersionFlag && !protocol.IsSupportedVersion(s.config.Versions, hdr.Version) {
|
|
return nil
|
|
}
|
|
|
|
// send a Version Negotiation Packet if the client is speaking a different protocol version
|
|
// since the client send a Public Header (only gQUIC has a Version Flag), we need to send a gQUIC Version Negotiation Packet
|
|
if hdr.VersionFlag && !protocol.IsSupportedVersion(s.config.Versions, hdr.Version) {
|
|
// drop packets that are too small to be valid first packets
|
|
if len(packet) < protocol.MinClientHelloSize+len(hdr.Raw) {
|
|
return errors.New("dropping small packet with unknown version")
|
|
}
|
|
s.logger.Infof("Client offered version %s, sending Version Negotiation Packet", hdr.Version)
|
|
_, err := pconn.WriteTo(wire.ComposeGQUICVersionNegotiation(hdr.SrcConnectionID, s.config.Versions), remoteAddr)
|
|
return err
|
|
}
|
|
|
|
// This is (potentially) a Client Hello.
|
|
// Make sure it has the minimum required size before spending any more ressources on it.
|
|
if !sessionKnown && len(packet) < protocol.MinClientHelloSize+len(hdr.Raw) {
|
|
return errors.New("dropping small packet for unknown connection")
|
|
}
|
|
|
|
if !sessionKnown {
|
|
version := hdr.Version
|
|
if !protocol.IsSupportedVersion(s.config.Versions, version) {
|
|
return errors.New("Server BUG: negotiated version not supported")
|
|
}
|
|
|
|
s.logger.Infof("Serving new connection: %s, version %s from %v", hdr.DestConnectionID, version, remoteAddr)
|
|
session, err = s.newSession(
|
|
&conn{pconn: pconn, currentAddr: remoteAddr},
|
|
version,
|
|
hdr.DestConnectionID,
|
|
s.scfg,
|
|
s.tlsConf,
|
|
s.config,
|
|
s.logger,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.sessionsMutex.Lock()
|
|
s.sessions[string(hdr.DestConnectionID)] = session
|
|
s.sessionsMutex.Unlock()
|
|
|
|
s.runHandshakeAndSession(session, hdr.DestConnectionID)
|
|
}
|
|
session.handlePacket(&receivedPacket{
|
|
remoteAddr: remoteAddr,
|
|
header: hdr,
|
|
data: packetData,
|
|
rcvTime: rcvTime,
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (s *server) runHandshakeAndSession(session packetHandler, connID protocol.ConnectionID) {
|
|
go func() {
|
|
_ = session.run()
|
|
// session.run() returns as soon as the session is closed
|
|
s.removeConnection(connID)
|
|
}()
|
|
|
|
go func() {
|
|
if err := <-session.handshakeStatus(); err != nil {
|
|
return
|
|
}
|
|
s.sessionQueue <- session
|
|
}()
|
|
}
|
|
|
|
func (s *server) removeConnection(id protocol.ConnectionID) {
|
|
s.sessionsMutex.Lock()
|
|
s.sessions[string(id)] = nil
|
|
s.sessionsMutex.Unlock()
|
|
|
|
time.AfterFunc(s.deleteClosedSessionsAfter, func() {
|
|
s.sessionsMutex.Lock()
|
|
delete(s.sessions, string(id))
|
|
s.sessionsMutex.Unlock()
|
|
})
|
|
}
|