serverApi.go 32 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028
  1. /*
  2. * Copyright (c) 2015, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/base64"
  24. "encoding/hex"
  25. "encoding/json"
  26. "errors"
  27. "fmt"
  28. "io"
  29. "io/ioutil"
  30. "net"
  31. "net/http"
  32. "net/url"
  33. "regexp"
  34. "strconv"
  35. "strings"
  36. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  37. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  38. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  39. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  40. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/tactics"
  41. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/transferstats"
  42. )
  43. // ServerContext is a utility struct which holds all of the data associated
  44. // with a Psiphon server connection. In addition to the established tunnel, this
  45. // includes data and transport mechanisms for Psiphon API requests. Legacy servers
  46. // offer the Psiphon API through a web service; newer servers offer the Psiphon
  47. // API through SSH requests made directly through the tunnel's SSH client.
  48. type ServerContext struct {
  49. tunnel *Tunnel
  50. psiphonHttpsClient *http.Client
  51. statsRegexps *transferstats.Regexps
  52. clientRegion string
  53. clientUpgradeVersion string
  54. serverHandshakeTimestamp string
  55. paddingPRNG *prng.PRNG
  56. }
  57. // MakeSessionId creates a new session ID. The same session ID is used across
  58. // multi-tunnel controller runs, where each tunnel has its own ServerContext
  59. // instance.
  60. // In server-side stats, we now consider a "session" to be the lifetime of the
  61. // Controller (e.g., the user's commanded start and stop) and we measure this
  62. // duration as well as the duration of each tunnel within the session.
  63. func MakeSessionId() (string, error) {
  64. randomId, err := common.MakeSecureRandomBytes(protocol.PSIPHON_API_CLIENT_SESSION_ID_LENGTH)
  65. if err != nil {
  66. return "", common.ContextError(err)
  67. }
  68. return hex.EncodeToString(randomId), nil
  69. }
  70. // NewServerContext makes the tunneled handshake request to the Psiphon server
  71. // and returns a ServerContext struct for use with subsequent Psiphon server API
  72. // requests (e.g., periodic connected and status requests).
  73. func NewServerContext(tunnel *Tunnel) (*ServerContext, error) {
  74. // For legacy servers, set up psiphonHttpsClient for
  75. // accessing the Psiphon API via the web service.
  76. var psiphonHttpsClient *http.Client
  77. if !tunnel.dialParams.ServerEntry.SupportsSSHAPIRequests() ||
  78. tunnel.config.TargetApiProtocol == protocol.PSIPHON_WEB_API_PROTOCOL {
  79. var err error
  80. psiphonHttpsClient, err = makePsiphonHttpsClient(tunnel)
  81. if err != nil {
  82. return nil, common.ContextError(err)
  83. }
  84. }
  85. serverContext := &ServerContext{
  86. tunnel: tunnel,
  87. psiphonHttpsClient: psiphonHttpsClient,
  88. paddingPRNG: prng.NewPRNGWithSeed(tunnel.dialParams.APIRequestPaddingSeed),
  89. }
  90. ignoreRegexps := tunnel.config.GetClientParametersSnapshot().Bool(
  91. parameters.IgnoreHandshakeStatsRegexps)
  92. err := serverContext.doHandshakeRequest(ignoreRegexps)
  93. if err != nil {
  94. return nil, common.ContextError(err)
  95. }
  96. return serverContext, nil
  97. }
  98. // doHandshakeRequest performs the "handshake" API request. The handshake
  99. // returns upgrade info, newly discovered server entries -- which are
  100. // stored -- and sponsor info (home pages, stat regexes).
  101. func (serverContext *ServerContext) doHandshakeRequest(
  102. ignoreStatsRegexps bool) error {
  103. params := serverContext.getBaseAPIParameters()
  104. // The server will return a signed copy of its own server entry when the
  105. // client specifies this 'missing_server_entry_signature' parameter.
  106. //
  107. // The purpose of this mechanism is to rapidly upgrade client local storage
  108. // from unsigned to signed server entries, and to ensure that the client has
  109. // a signed server entry for its currently connected server as required for
  110. // the client-to-client exchange feature.
  111. //
  112. // The server entry will be included in handshakeResponse.EncodedServerList,
  113. // along side discovery servers.
  114. if !serverContext.tunnel.dialParams.ServerEntry.HasSignature() {
  115. params["missing_server_entry_signature"] =
  116. serverContext.tunnel.dialParams.ServerEntry.Tag
  117. }
  118. doTactics := !serverContext.tunnel.config.DisableTactics
  119. networkID := ""
  120. if doTactics {
  121. // Limitation: it is assumed that the network ID obtained here is the
  122. // one that is active when the handshake request is received by the
  123. // server. However, it is remotely possible to switch networks
  124. // immediately after invoking the GetNetworkID callback and initiating
  125. // the handshake, if the tunnel protocol is meek.
  126. //
  127. // The response handling code below calls GetNetworkID again and ignores
  128. // any tactics payload if the network ID is not the same. While this
  129. // doesn't detect all cases of changing networks, it reduces the already
  130. // narrow window.
  131. networkID = serverContext.tunnel.config.GetNetworkID()
  132. err := tactics.SetTacticsAPIParameters(
  133. serverContext.tunnel.config.clientParameters, GetTacticsStorer(), networkID, params)
  134. if err != nil {
  135. return common.ContextError(err)
  136. }
  137. }
  138. var response []byte
  139. if serverContext.psiphonHttpsClient == nil {
  140. params[protocol.PSIPHON_API_HANDSHAKE_AUTHORIZATIONS] =
  141. serverContext.tunnel.config.GetAuthorizations()
  142. request, err := serverContext.makeSSHAPIRequestPayload(params)
  143. if err != nil {
  144. return common.ContextError(err)
  145. }
  146. response, err = serverContext.tunnel.SendAPIRequest(
  147. protocol.PSIPHON_API_HANDSHAKE_REQUEST_NAME, request)
  148. if err != nil {
  149. return common.ContextError(err)
  150. }
  151. } else {
  152. // Legacy web service API request
  153. responseBody, err := serverContext.doGetRequest(
  154. makeRequestUrl(serverContext.tunnel, "", "handshake", params))
  155. if err != nil {
  156. return common.ContextError(err)
  157. }
  158. // Skip legacy format lines and just parse the JSON config line
  159. configLinePrefix := []byte("Config: ")
  160. for _, line := range bytes.Split(responseBody, []byte("\n")) {
  161. if bytes.HasPrefix(line, configLinePrefix) {
  162. response = line[len(configLinePrefix):]
  163. break
  164. }
  165. }
  166. if len(response) == 0 {
  167. return common.ContextError(errors.New("no config line found"))
  168. }
  169. }
  170. // Legacy fields:
  171. // - 'preemptive_reconnect_lifetime_milliseconds' is unused and ignored
  172. // - 'ssh_session_id' is ignored; client session ID is used instead
  173. var handshakeResponse protocol.HandshakeResponse
  174. err := json.Unmarshal(response, &handshakeResponse)
  175. if err != nil {
  176. return common.ContextError(err)
  177. }
  178. serverContext.clientRegion = handshakeResponse.ClientRegion
  179. NoticeClientRegion(serverContext.clientRegion)
  180. var serverEntries []protocol.ServerEntryFields
  181. // Store discovered server entries
  182. // We use the server's time, as it's available here, for the server entry
  183. // timestamp since this is more reliable than the client time.
  184. for _, encodedServerEntry := range handshakeResponse.EncodedServerList {
  185. serverEntryFields, err := protocol.DecodeServerEntryFields(
  186. encodedServerEntry,
  187. common.TruncateTimestampToHour(handshakeResponse.ServerTimestamp),
  188. protocol.SERVER_ENTRY_SOURCE_DISCOVERY)
  189. if err != nil {
  190. return common.ContextError(err)
  191. }
  192. err = protocol.ValidateServerEntryFields(serverEntryFields)
  193. if err != nil {
  194. // Skip this entry and continue with the next one
  195. NoticeAlert("invalid handshake server entry: %s", err)
  196. continue
  197. }
  198. serverEntries = append(serverEntries, serverEntryFields)
  199. }
  200. err = StoreServerEntries(
  201. serverContext.tunnel.config,
  202. serverEntries,
  203. true)
  204. if err != nil {
  205. return common.ContextError(err)
  206. }
  207. NoticeHomepages(handshakeResponse.Homepages)
  208. serverContext.clientUpgradeVersion = handshakeResponse.UpgradeClientVersion
  209. if handshakeResponse.UpgradeClientVersion != "" {
  210. NoticeClientUpgradeAvailable(handshakeResponse.UpgradeClientVersion)
  211. } else {
  212. NoticeClientIsLatestVersion("")
  213. }
  214. if !ignoreStatsRegexps {
  215. var regexpsNotices []string
  216. serverContext.statsRegexps, regexpsNotices = transferstats.MakeRegexps(
  217. handshakeResponse.PageViewRegexes,
  218. handshakeResponse.HttpsRequestRegexes)
  219. for _, notice := range regexpsNotices {
  220. NoticeAlert(notice)
  221. }
  222. }
  223. serverContext.serverHandshakeTimestamp = handshakeResponse.ServerTimestamp
  224. NoticeServerTimestamp(serverContext.serverHandshakeTimestamp)
  225. NoticeActiveAuthorizationIDs(handshakeResponse.ActiveAuthorizationIDs)
  226. if doTactics && handshakeResponse.TacticsPayload != nil &&
  227. networkID == serverContext.tunnel.config.GetNetworkID() {
  228. var payload *tactics.Payload
  229. err := json.Unmarshal(handshakeResponse.TacticsPayload, &payload)
  230. if err != nil {
  231. return common.ContextError(err)
  232. }
  233. // handshakeResponse.TacticsPayload may be "null", and payload
  234. // will successfully unmarshal as nil. As a result, the previous
  235. // handshakeResponse.TacticsPayload != nil test is insufficient.
  236. if payload != nil {
  237. tacticsRecord, err := tactics.HandleTacticsPayload(
  238. GetTacticsStorer(),
  239. networkID,
  240. payload)
  241. if err != nil {
  242. return common.ContextError(err)
  243. }
  244. if tacticsRecord != nil &&
  245. prng.FlipWeightedCoin(tacticsRecord.Tactics.Probability) {
  246. err := serverContext.tunnel.config.SetClientParameters(
  247. tacticsRecord.Tag, true, tacticsRecord.Tactics.Parameters)
  248. if err != nil {
  249. NoticeInfo("apply handshake tactics failed: %s", err)
  250. }
  251. // The error will be due to invalid tactics values from
  252. // the server. When ApplyClientParameters fails, all
  253. // previous tactics values are left in place.
  254. }
  255. }
  256. }
  257. return nil
  258. }
  259. // DoConnectedRequest performs the "connected" API request. This request is
  260. // used for statistics. The server returns a last_connected token for
  261. // the client to store and send next time it connects. This token is
  262. // a timestamp (using the server clock, and should be rounded to the
  263. // nearest hour) which is used to determine when a connection represents
  264. // a unique user for a time period.
  265. func (serverContext *ServerContext) DoConnectedRequest() error {
  266. params := serverContext.getBaseAPIParameters()
  267. lastConnected, err := getLastConnected()
  268. if err != nil {
  269. return common.ContextError(err)
  270. }
  271. params["last_connected"] = lastConnected
  272. // serverContext.tunnel.establishDuration is nanoseconds; divide to get to milliseconds
  273. params["establishment_duration"] =
  274. fmt.Sprintf("%d", serverContext.tunnel.establishDuration/1000000)
  275. var response []byte
  276. if serverContext.psiphonHttpsClient == nil {
  277. request, err := serverContext.makeSSHAPIRequestPayload(params)
  278. if err != nil {
  279. return common.ContextError(err)
  280. }
  281. response, err = serverContext.tunnel.SendAPIRequest(
  282. protocol.PSIPHON_API_CONNECTED_REQUEST_NAME, request)
  283. if err != nil {
  284. return common.ContextError(err)
  285. }
  286. } else {
  287. // Legacy web service API request
  288. response, err = serverContext.doGetRequest(
  289. makeRequestUrl(serverContext.tunnel, "", "connected", params))
  290. if err != nil {
  291. return common.ContextError(err)
  292. }
  293. }
  294. var connectedResponse protocol.ConnectedResponse
  295. err = json.Unmarshal(response, &connectedResponse)
  296. if err != nil {
  297. return common.ContextError(err)
  298. }
  299. err = SetKeyValue(
  300. datastoreLastConnectedKey, connectedResponse.ConnectedTimestamp)
  301. if err != nil {
  302. return common.ContextError(err)
  303. }
  304. return nil
  305. }
  306. func getLastConnected() (string, error) {
  307. lastConnected, err := GetKeyValue(datastoreLastConnectedKey)
  308. if err != nil {
  309. return "", common.ContextError(err)
  310. }
  311. if lastConnected == "" {
  312. lastConnected = "None"
  313. }
  314. return lastConnected, nil
  315. }
  316. // StatsRegexps gets the Regexps used for the statistics for this tunnel.
  317. func (serverContext *ServerContext) StatsRegexps() *transferstats.Regexps {
  318. return serverContext.statsRegexps
  319. }
  320. // DoStatusRequest makes a "status" API request to the server, sending session stats.
  321. func (serverContext *ServerContext) DoStatusRequest(tunnel *Tunnel) error {
  322. params := serverContext.getStatusParams(true)
  323. // Note: ensure putBackStatusRequestPayload is called, to replace
  324. // payload for future attempt, in all failure cases.
  325. statusPayload, statusPayloadInfo, err := makeStatusRequestPayload(
  326. serverContext.tunnel.config,
  327. tunnel.dialParams.ServerEntry.IpAddress)
  328. if err != nil {
  329. return common.ContextError(err)
  330. }
  331. // Skip the request when there's no payload to send.
  332. if len(statusPayload) == 0 {
  333. return nil
  334. }
  335. var response []byte
  336. if serverContext.psiphonHttpsClient == nil {
  337. rawMessage := json.RawMessage(statusPayload)
  338. params["statusData"] = &rawMessage
  339. var request []byte
  340. request, err = serverContext.makeSSHAPIRequestPayload(params)
  341. if err == nil {
  342. response, err = serverContext.tunnel.SendAPIRequest(
  343. protocol.PSIPHON_API_STATUS_REQUEST_NAME, request)
  344. }
  345. } else {
  346. // Legacy web service API request
  347. response, err = serverContext.doPostRequest(
  348. makeRequestUrl(serverContext.tunnel, "", "status", params),
  349. "application/json",
  350. bytes.NewReader(statusPayload))
  351. }
  352. if err != nil {
  353. // Resend the transfer stats and tunnel stats later
  354. // Note: potential duplicate reports if the server received and processed
  355. // the request but the client failed to receive the response.
  356. putBackStatusRequestPayload(statusPayloadInfo)
  357. return common.ContextError(err)
  358. }
  359. confirmStatusRequestPayload(statusPayloadInfo)
  360. var statusResponse protocol.StatusResponse
  361. err = json.Unmarshal(response, &statusResponse)
  362. if err != nil {
  363. return common.ContextError(err)
  364. }
  365. for _, serverEntryTag := range statusResponse.InvalidServerEntryTags {
  366. PruneServerEntry(serverContext.tunnel.config, serverEntryTag)
  367. }
  368. return nil
  369. }
  370. func (serverContext *ServerContext) getStatusParams(
  371. isTunneled bool) common.APIParameters {
  372. params := serverContext.getBaseAPIParameters()
  373. // Legacy clients set "connected" to "0" when disconnecting, and this value
  374. // is used to calculate session duration estimates. This is now superseded
  375. // by explicit tunnel stats duration reporting.
  376. // The legacy method of reconstructing session durations is not compatible
  377. // with this client's connected request retries and asynchronous final
  378. // status request attempts. So we simply set this "connected" flag to reflect
  379. // whether the request is sent tunneled or not.
  380. connected := "1"
  381. if !isTunneled {
  382. connected = "0"
  383. }
  384. params["connected"] = connected
  385. return params
  386. }
  387. // statusRequestPayloadInfo is a temporary structure for data used to
  388. // either "clear" or "put back" status request payload data depending
  389. // on whether or not the request succeeded.
  390. type statusRequestPayloadInfo struct {
  391. serverId string
  392. transferStats *transferstats.AccumulatedStats
  393. persistentStats map[string][][]byte
  394. }
  395. func makeStatusRequestPayload(
  396. config *Config,
  397. serverId string) ([]byte, *statusRequestPayloadInfo, error) {
  398. transferStats := transferstats.TakeOutStatsForServer(serverId)
  399. hostBytes := transferStats.GetStatsForStatusRequest()
  400. persistentStats, err := TakeOutUnreportedPersistentStats(config)
  401. if err != nil {
  402. NoticeAlert(
  403. "TakeOutUnreportedPersistentStats failed: %s", common.ContextError(err))
  404. persistentStats = nil
  405. // Proceed with transferStats only
  406. }
  407. if len(hostBytes) == 0 && len(persistentStats) == 0 {
  408. // There is no payload to send.
  409. return nil, nil, nil
  410. }
  411. payloadInfo := &statusRequestPayloadInfo{
  412. serverId, transferStats, persistentStats}
  413. payload := make(map[string]interface{})
  414. payload["host_bytes"] = hostBytes
  415. // We're not recording these fields, but legacy servers require them.
  416. payload["bytes_transferred"] = 0
  417. payload["page_views"] = make([]string, 0)
  418. payload["https_requests"] = make([]string, 0)
  419. persistentStatPayloadNames := make(map[string]string)
  420. persistentStatPayloadNames[datastorePersistentStatTypeRemoteServerList] = "remote_server_list_stats"
  421. persistentStatPayloadNames[datastorePersistentStatTypeFailedTunnel] = "failed_tunnel_stats"
  422. for statType, stats := range persistentStats {
  423. // Persistent stats records are already in JSON format
  424. jsonStats := make([]json.RawMessage, len(stats))
  425. for i, stat := range stats {
  426. jsonStats[i] = json.RawMessage(stat)
  427. }
  428. payload[persistentStatPayloadNames[statType]] = jsonStats
  429. }
  430. jsonPayload, err := json.Marshal(payload)
  431. if err != nil {
  432. // Send the transfer stats and tunnel stats later
  433. putBackStatusRequestPayload(payloadInfo)
  434. return nil, nil, common.ContextError(err)
  435. }
  436. return jsonPayload, payloadInfo, nil
  437. }
  438. func putBackStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  439. transferstats.PutBackStatsForServer(
  440. payloadInfo.serverId, payloadInfo.transferStats)
  441. err := PutBackUnreportedPersistentStats(payloadInfo.persistentStats)
  442. if err != nil {
  443. // These persistent stats records won't be resent until after a
  444. // datastore re-initialization.
  445. NoticeAlert(
  446. "PutBackUnreportedPersistentStats failed: %s", common.ContextError(err))
  447. }
  448. }
  449. func confirmStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  450. err := ClearReportedPersistentStats(payloadInfo.persistentStats)
  451. if err != nil {
  452. // These persistent stats records may be resent.
  453. NoticeAlert(
  454. "ClearReportedPersistentStats failed: %s", common.ContextError(err))
  455. }
  456. }
  457. // RecordRemoteServerListStat records a completed common or OSL
  458. // remote server list resource download.
  459. //
  460. // The RSL download event could occur when the client is unable
  461. // to immediately send a status request to a server, so these
  462. // records are stored in the persistent datastore and reported
  463. // via subsequent status requests sent to any Psiphon server.
  464. //
  465. // Note that some common event field values may change between the
  466. // stat recording and reporting, including client geolocation and
  467. // host_id.
  468. //
  469. // Multiple "status" requests may be in flight at once (due
  470. // to multi-tunnel, asynchronous final status retry, and
  471. // aggressive status requests for pre-registered tunnels),
  472. // To avoid duplicate reporting, persistent stats records are
  473. // "taken-out" by a status request and then "put back" in
  474. // case the request fails.
  475. //
  476. // Duplicate reporting may also occur when a server receives and
  477. // processes a status request but the client fails to receive
  478. // the response.
  479. func RecordRemoteServerListStat(
  480. config *Config, url, etag string) error {
  481. if !config.GetClientParametersSnapshot().WeightedCoinFlip(
  482. parameters.RecordRemoteServerListPersistentStatsProbability) {
  483. return nil
  484. }
  485. params := make(common.APIParameters)
  486. params["session_id"] = config.SessionID
  487. params["propagation_channel_id"] = config.PropagationChannelId
  488. params["sponsor_id"] = config.GetSponsorID()
  489. params["client_version"] = config.ClientVersion
  490. params["client_platform"] = config.ClientPlatform
  491. params["client_build_rev"] = common.GetBuildInfo().BuildRev
  492. params["client_download_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  493. params["url"] = url
  494. params["etag"] = etag
  495. remoteServerListStatJson, err := json.Marshal(params)
  496. if err != nil {
  497. return common.ContextError(err)
  498. }
  499. return StorePersistentStat(
  500. config, datastorePersistentStatTypeRemoteServerList, remoteServerListStatJson)
  501. }
  502. // failedTunnelErrStripAddressRegex strips IPv4 address [and optional port]
  503. // strings from "net" package I/O error messages. This is to avoid
  504. // inadvertently recording direct server IPs via error message logs, and to
  505. // reduce the error space due to superfluous source port data.
  506. var failedTunnelErrStripAddressRegex = regexp.MustCompile(
  507. `(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)){3}(:(6553[0-5]|655[0-2][0-9]\d|65[0-4](\d){2}|6[0-4](\d){3}|[1-5](\d){4}|[1-9](\d){0,3}))?`)
  508. // RecordFailedTunnelStat records metrics for a failed tunnel dial, including
  509. // dial parameters and error condition (tunnelErr).
  510. //
  511. // This uses the same reporting facility, with the same caveats, as
  512. // RecordRemoteServerListStat.
  513. func RecordFailedTunnelStat(
  514. config *Config, dialParams *DialParameters, tunnelErr error) error {
  515. if !config.GetClientParametersSnapshot().WeightedCoinFlip(
  516. parameters.RecordFailedTunnelPersistentStatsProbability) {
  517. return nil
  518. }
  519. lastConnected, err := getLastConnected()
  520. if err != nil {
  521. return common.ContextError(err)
  522. }
  523. params := getBaseAPIParameters(config, dialParams)
  524. delete(params, "server_secret")
  525. params["server_entry_tag"] = dialParams.ServerEntry.Tag
  526. params["last_connected"] = lastConnected
  527. params["client_failed_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  528. params["tunnel_error"] = failedTunnelErrStripAddressRegex.ReplaceAllString(tunnelErr.Error(), "<address>")
  529. failedTunnelStatJson, err := json.Marshal(params)
  530. if err != nil {
  531. return common.ContextError(err)
  532. }
  533. return StorePersistentStat(
  534. config, datastorePersistentStatTypeFailedTunnel, failedTunnelStatJson)
  535. }
  536. // doGetRequest makes a tunneled HTTPS request and returns the response body.
  537. func (serverContext *ServerContext) doGetRequest(
  538. requestUrl string) (responseBody []byte, err error) {
  539. request, err := http.NewRequest("GET", requestUrl, nil)
  540. if err != nil {
  541. return nil, common.ContextError(err)
  542. }
  543. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  544. response, err := serverContext.psiphonHttpsClient.Do(request)
  545. if err == nil && response.StatusCode != http.StatusOK {
  546. response.Body.Close()
  547. err = fmt.Errorf("HTTP GET request failed with response code: %d", response.StatusCode)
  548. }
  549. if err != nil {
  550. // Trim this error since it may include long URLs
  551. return nil, common.ContextError(TrimError(err))
  552. }
  553. defer response.Body.Close()
  554. body, err := ioutil.ReadAll(response.Body)
  555. if err != nil {
  556. return nil, common.ContextError(err)
  557. }
  558. return body, nil
  559. }
  560. // doPostRequest makes a tunneled HTTPS POST request.
  561. func (serverContext *ServerContext) doPostRequest(
  562. requestUrl string, bodyType string, body io.Reader) (responseBody []byte, err error) {
  563. request, err := http.NewRequest("POST", requestUrl, body)
  564. if err != nil {
  565. return nil, common.ContextError(err)
  566. }
  567. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  568. request.Header.Set("Content-Type", bodyType)
  569. response, err := serverContext.psiphonHttpsClient.Do(request)
  570. if err == nil && response.StatusCode != http.StatusOK {
  571. response.Body.Close()
  572. err = fmt.Errorf("HTTP POST request failed with response code: %d", response.StatusCode)
  573. }
  574. if err != nil {
  575. // Trim this error since it may include long URLs
  576. return nil, common.ContextError(TrimError(err))
  577. }
  578. defer response.Body.Close()
  579. responseBody, err = ioutil.ReadAll(response.Body)
  580. if err != nil {
  581. return nil, common.ContextError(err)
  582. }
  583. return responseBody, nil
  584. }
  585. // makeSSHAPIRequestPayload makes a JSON payload for an SSH API request.
  586. func (serverContext *ServerContext) makeSSHAPIRequestPayload(
  587. params common.APIParameters) ([]byte, error) {
  588. jsonPayload, err := json.Marshal(params)
  589. if err != nil {
  590. return nil, common.ContextError(err)
  591. }
  592. return jsonPayload, nil
  593. }
  594. func (serverContext *ServerContext) getBaseAPIParameters() common.APIParameters {
  595. params := getBaseAPIParameters(
  596. serverContext.tunnel.config,
  597. serverContext.tunnel.dialParams)
  598. // Add a random amount of padding to defend against API call traffic size
  599. // fingerprints. The "pad_response" field instructs the server to pad its
  600. // response accordingly.
  601. p := serverContext.tunnel.config.GetClientParametersSnapshot()
  602. minUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMinBytes)
  603. maxUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMaxBytes)
  604. minDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMinBytes)
  605. maxDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMaxBytes)
  606. if maxUpstreamPadding > 0 {
  607. size := serverContext.paddingPRNG.Range(minUpstreamPadding, maxUpstreamPadding)
  608. params["padding"] = strings.Repeat(" ", size)
  609. }
  610. if maxDownstreamPadding > 0 {
  611. size := serverContext.paddingPRNG.Range(minDownstreamPadding, maxDownstreamPadding)
  612. params["pad_response"] = strconv.Itoa(size)
  613. }
  614. return params
  615. }
  616. // getBaseAPIParameters returns all the common API parameters that are
  617. // included with each Psiphon API request. These common parameters are used
  618. // for metrics.
  619. func getBaseAPIParameters(
  620. config *Config,
  621. dialParams *DialParameters) common.APIParameters {
  622. params := make(common.APIParameters)
  623. params["session_id"] = config.SessionID
  624. params["client_session_id"] = config.SessionID
  625. params["server_secret"] = dialParams.ServerEntry.WebServerSecret
  626. params["propagation_channel_id"] = config.PropagationChannelId
  627. params["sponsor_id"] = config.GetSponsorID()
  628. params["client_version"] = config.ClientVersion
  629. params["relay_protocol"] = dialParams.TunnelProtocol
  630. params["client_platform"] = config.ClientPlatform
  631. params["client_build_rev"] = common.GetBuildInfo().BuildRev
  632. params["tunnel_whole_device"] = strconv.Itoa(config.TunnelWholeDevice)
  633. // The following parameters may be blank and must
  634. // not be sent to the server if blank.
  635. if config.DeviceRegion != "" {
  636. params["device_region"] = config.DeviceRegion
  637. }
  638. if dialParams.SelectedSSHClientVersion {
  639. params["ssh_client_version"] = dialParams.SSHClientVersion
  640. }
  641. if dialParams.UpstreamProxyType != "" {
  642. params["upstream_proxy_type"] = dialParams.UpstreamProxyType
  643. }
  644. if dialParams.UpstreamProxyCustomHeaderNames != nil {
  645. params["upstream_proxy_custom_header_names"] = dialParams.UpstreamProxyCustomHeaderNames
  646. }
  647. if dialParams.MeekDialAddress != "" {
  648. params["meek_dial_address"] = dialParams.MeekDialAddress
  649. }
  650. meekResolvedIPAddress := dialParams.MeekResolvedIPAddress.Load().(string)
  651. if meekResolvedIPAddress != "" {
  652. params["meek_resolved_ip_address"] = meekResolvedIPAddress
  653. }
  654. if dialParams.MeekSNIServerName != "" {
  655. params["meek_sni_server_name"] = dialParams.MeekSNIServerName
  656. }
  657. if dialParams.MeekHostHeader != "" {
  658. params["meek_host_header"] = dialParams.MeekHostHeader
  659. }
  660. // MeekTransformedHostName is meaningful when meek is used, which is when MeekDialAddress != ""
  661. if dialParams.MeekDialAddress != "" {
  662. transformedHostName := "0"
  663. if dialParams.MeekTransformedHostName {
  664. transformedHostName = "1"
  665. }
  666. params["meek_transformed_host_name"] = transformedHostName
  667. }
  668. if dialParams.SelectedUserAgent {
  669. params["user_agent"] = dialParams.UserAgent
  670. }
  671. if dialParams.SelectedTLSProfile {
  672. params["tls_profile"] = dialParams.TLSProfile
  673. params["tls_version"] = dialParams.TLSVersion
  674. }
  675. if dialParams.ServerEntry.Region != "" {
  676. params["server_entry_region"] = dialParams.ServerEntry.Region
  677. }
  678. if dialParams.ServerEntry.LocalSource != "" {
  679. params["server_entry_source"] = dialParams.ServerEntry.LocalSource
  680. }
  681. // As with last_connected, this timestamp stat, which may be
  682. // a precise handshake request server timestamp, is truncated
  683. // to hour granularity to avoid introducing a reconstructable
  684. // cross-session user trace into server logs.
  685. localServerEntryTimestamp := common.TruncateTimestampToHour(
  686. dialParams.ServerEntry.LocalTimestamp)
  687. if localServerEntryTimestamp != "" {
  688. params["server_entry_timestamp"] = localServerEntryTimestamp
  689. }
  690. params[tactics.APPLIED_TACTICS_TAG_PARAMETER_NAME] =
  691. config.GetClientParametersSnapshot().Tag()
  692. if dialParams.DialPortNumber != "" {
  693. params["dial_port_number"] = dialParams.DialPortNumber
  694. }
  695. if dialParams.QUICVersion != "" {
  696. params["quic_version"] = dialParams.QUICVersion
  697. }
  698. if dialParams.QUICDialSNIAddress != "" {
  699. params["quic_dial_sni_address"] = dialParams.QUICDialSNIAddress
  700. }
  701. isReplay := "0"
  702. if dialParams.IsReplay {
  703. isReplay = "1"
  704. }
  705. params["is_replay"] = isReplay
  706. if config.EgressRegion != "" {
  707. params["egress_region"] = config.EgressRegion
  708. }
  709. // dialParams.DialDuration is nanoseconds; divide to get to milliseconds
  710. params["dial_duration"] = fmt.Sprintf("%d", dialParams.DialDuration/1000000)
  711. params["candidate_number"] = strconv.Itoa(dialParams.CandidateNumber)
  712. if dialParams.DialConnMetrics != nil {
  713. metrics := dialParams.DialConnMetrics.GetMetrics()
  714. for name, value := range metrics {
  715. params[name] = fmt.Sprintf("%v", value)
  716. }
  717. }
  718. if dialParams.ObfuscatedSSHConnMetrics != nil {
  719. metrics := dialParams.ObfuscatedSSHConnMetrics.GetMetrics()
  720. for name, value := range metrics {
  721. params[name] = fmt.Sprintf("%v", value)
  722. }
  723. }
  724. return params
  725. }
  726. // makeRequestUrl makes a URL for a web service API request.
  727. func makeRequestUrl(tunnel *Tunnel, port, path string, params common.APIParameters) string {
  728. var requestUrl bytes.Buffer
  729. if port == "" {
  730. port = tunnel.dialParams.ServerEntry.WebServerPort
  731. }
  732. requestUrl.WriteString("https://")
  733. requestUrl.WriteString(tunnel.dialParams.ServerEntry.IpAddress)
  734. requestUrl.WriteString(":")
  735. requestUrl.WriteString(port)
  736. requestUrl.WriteString("/")
  737. requestUrl.WriteString(path)
  738. if len(params) > 0 {
  739. queryParams := url.Values{}
  740. for name, value := range params {
  741. // Note: this logic skips the tactics.SPEED_TEST_SAMPLES_PARAMETER_NAME
  742. // parameter, which has a different type. This parameter is not recognized
  743. // by legacy servers.
  744. switch v := value.(type) {
  745. case string:
  746. queryParams.Set(name, v)
  747. case []string:
  748. // String array param encoded as JSON
  749. jsonValue, err := json.Marshal(v)
  750. if err != nil {
  751. break
  752. }
  753. queryParams.Set(name, string(jsonValue))
  754. }
  755. }
  756. requestUrl.WriteString("?")
  757. requestUrl.WriteString(queryParams.Encode())
  758. }
  759. return requestUrl.String()
  760. }
  761. // makePsiphonHttpsClient creates a Psiphon HTTPS client that tunnels web service API
  762. // requests and which validates the web server using the Psiphon server entry web server
  763. // certificate.
  764. func makePsiphonHttpsClient(tunnel *Tunnel) (httpsClient *http.Client, err error) {
  765. certificate, err := DecodeCertificate(
  766. tunnel.dialParams.ServerEntry.WebServerCertificate)
  767. if err != nil {
  768. return nil, common.ContextError(err)
  769. }
  770. tunneledDialer := func(_ context.Context, _, addr string) (conn net.Conn, err error) {
  771. return tunnel.sshClient.Dial("tcp", addr)
  772. }
  773. // Note: as with SSH API requests, there no dial context here. SSH port forward dials
  774. // cannot be interrupted directly. Closing the tunnel will interrupt both the dial and
  775. // the request. While it's possible to add a timeout here, we leave it with no explicit
  776. // timeout which is the same as SSH API requests: if the tunnel has stalled then SSH keep
  777. // alives will cause the tunnel to close.
  778. dialer := NewCustomTLSDialer(
  779. &CustomTLSConfig{
  780. ClientParameters: tunnel.config.clientParameters,
  781. Dial: tunneledDialer,
  782. VerifyLegacyCertificate: certificate,
  783. })
  784. transport := &http.Transport{
  785. DialTLS: func(network, addr string) (net.Conn, error) {
  786. return dialer(context.Background(), network, addr)
  787. },
  788. Dial: func(network, addr string) (net.Conn, error) {
  789. return nil, errors.New("HTTP not supported")
  790. },
  791. }
  792. return &http.Client{
  793. Transport: transport,
  794. }, nil
  795. }
  796. func HandleServerRequest(
  797. tunnelOwner TunnelOwner, tunnel *Tunnel, name string, payload []byte) error {
  798. switch name {
  799. case protocol.PSIPHON_API_OSL_REQUEST_NAME:
  800. return HandleOSLRequest(tunnelOwner, tunnel, payload)
  801. }
  802. return common.ContextError(fmt.Errorf("invalid request name: %s", name))
  803. }
  804. func HandleOSLRequest(
  805. tunnelOwner TunnelOwner, tunnel *Tunnel, payload []byte) error {
  806. var oslRequest protocol.OSLRequest
  807. err := json.Unmarshal(payload, &oslRequest)
  808. if err != nil {
  809. return common.ContextError(err)
  810. }
  811. if oslRequest.ClearLocalSLOKs {
  812. DeleteSLOKs()
  813. }
  814. seededNewSLOK := false
  815. for _, slok := range oslRequest.SeedPayload.SLOKs {
  816. duplicate, err := SetSLOK(slok.ID, slok.Key)
  817. if err != nil {
  818. // TODO: return error to trigger retry?
  819. NoticeAlert("SetSLOK failed: %s", common.ContextError(err))
  820. } else if !duplicate {
  821. seededNewSLOK = true
  822. }
  823. if tunnel.config.EmitSLOKs {
  824. NoticeSLOKSeeded(base64.StdEncoding.EncodeToString(slok.ID), duplicate)
  825. }
  826. }
  827. if seededNewSLOK {
  828. tunnelOwner.SignalSeededNewSLOK()
  829. }
  830. return nil
  831. }