serverApi.go 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047
  1. /*
  2. * Copyright (c) 2015, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/base64"
  24. "encoding/hex"
  25. "encoding/json"
  26. "fmt"
  27. "io"
  28. "io/ioutil"
  29. "net"
  30. "net/http"
  31. "net/url"
  32. "strconv"
  33. "strings"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/buildinfo"
  36. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
  37. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  38. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  39. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  40. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/tactics"
  41. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/transferstats"
  42. )
  43. // ServerContext is a utility struct which holds all of the data associated
  44. // with a Psiphon server connection. In addition to the established tunnel, this
  45. // includes data and transport mechanisms for Psiphon API requests. Legacy servers
  46. // offer the Psiphon API through a web service; newer servers offer the Psiphon
  47. // API through SSH requests made directly through the tunnel's SSH client.
  48. type ServerContext struct {
  49. tunnel *Tunnel
  50. psiphonHttpsClient *http.Client
  51. statsRegexps *transferstats.Regexps
  52. clientRegion string
  53. clientUpgradeVersion string
  54. serverHandshakeTimestamp string
  55. paddingPRNG *prng.PRNG
  56. }
  57. // MakeSessionId creates a new session ID. The same session ID is used across
  58. // multi-tunnel controller runs, where each tunnel has its own ServerContext
  59. // instance.
  60. // In server-side stats, we now consider a "session" to be the lifetime of the
  61. // Controller (e.g., the user's commanded start and stop) and we measure this
  62. // duration as well as the duration of each tunnel within the session.
  63. func MakeSessionId() (string, error) {
  64. randomId, err := common.MakeSecureRandomBytes(protocol.PSIPHON_API_CLIENT_SESSION_ID_LENGTH)
  65. if err != nil {
  66. return "", errors.Trace(err)
  67. }
  68. return hex.EncodeToString(randomId), nil
  69. }
  70. // NewServerContext makes the tunneled handshake request to the Psiphon server
  71. // and returns a ServerContext struct for use with subsequent Psiphon server API
  72. // requests (e.g., periodic connected and status requests).
  73. func NewServerContext(tunnel *Tunnel) (*ServerContext, error) {
  74. // For legacy servers, set up psiphonHttpsClient for
  75. // accessing the Psiphon API via the web service.
  76. var psiphonHttpsClient *http.Client
  77. if !tunnel.dialParams.ServerEntry.SupportsSSHAPIRequests() ||
  78. tunnel.config.TargetApiProtocol == protocol.PSIPHON_WEB_API_PROTOCOL {
  79. var err error
  80. psiphonHttpsClient, err = makePsiphonHttpsClient(tunnel)
  81. if err != nil {
  82. return nil, errors.Trace(err)
  83. }
  84. }
  85. serverContext := &ServerContext{
  86. tunnel: tunnel,
  87. psiphonHttpsClient: psiphonHttpsClient,
  88. paddingPRNG: prng.NewPRNGWithSeed(tunnel.dialParams.APIRequestPaddingSeed),
  89. }
  90. ignoreRegexps := tunnel.config.GetClientParameters().Get().Bool(
  91. parameters.IgnoreHandshakeStatsRegexps)
  92. err := serverContext.doHandshakeRequest(ignoreRegexps)
  93. if err != nil {
  94. return nil, errors.Trace(err)
  95. }
  96. return serverContext, nil
  97. }
  98. // doHandshakeRequest performs the "handshake" API request. The handshake
  99. // returns upgrade info, newly discovered server entries -- which are
  100. // stored -- and sponsor info (home pages, stat regexes).
  101. func (serverContext *ServerContext) doHandshakeRequest(
  102. ignoreStatsRegexps bool) error {
  103. params := serverContext.getBaseAPIParameters()
  104. // The server will return a signed copy of its own server entry when the
  105. // client specifies this 'missing_server_entry_signature' parameter.
  106. //
  107. // The purpose of this mechanism is to rapidly upgrade client local storage
  108. // from unsigned to signed server entries, and to ensure that the client has
  109. // a signed server entry for its currently connected server as required for
  110. // the client-to-client exchange feature.
  111. //
  112. // The server entry will be included in handshakeResponse.EncodedServerList,
  113. // along side discovery servers.
  114. requestedMissingSignature := false
  115. if !serverContext.tunnel.dialParams.ServerEntry.HasSignature() {
  116. requestedMissingSignature = true
  117. params["missing_server_entry_signature"] =
  118. serverContext.tunnel.dialParams.ServerEntry.Tag
  119. }
  120. doTactics := !serverContext.tunnel.config.DisableTactics
  121. networkID := ""
  122. if doTactics {
  123. // Limitation: it is assumed that the network ID obtained here is the
  124. // one that is active when the handshake request is received by the
  125. // server. However, it is remotely possible to switch networks
  126. // immediately after invoking the GetNetworkID callback and initiating
  127. // the handshake, if the tunnel protocol is meek.
  128. //
  129. // The response handling code below calls GetNetworkID again and ignores
  130. // any tactics payload if the network ID is not the same. While this
  131. // doesn't detect all cases of changing networks, it reduces the already
  132. // narrow window.
  133. networkID = serverContext.tunnel.config.GetNetworkID()
  134. err := tactics.SetTacticsAPIParameters(
  135. serverContext.tunnel.config.clientParameters, GetTacticsStorer(), networkID, params)
  136. if err != nil {
  137. return errors.Trace(err)
  138. }
  139. }
  140. var response []byte
  141. if serverContext.psiphonHttpsClient == nil {
  142. params[protocol.PSIPHON_API_HANDSHAKE_AUTHORIZATIONS] =
  143. serverContext.tunnel.config.GetAuthorizations()
  144. request, err := serverContext.makeSSHAPIRequestPayload(params)
  145. if err != nil {
  146. return errors.Trace(err)
  147. }
  148. response, err = serverContext.tunnel.SendAPIRequest(
  149. protocol.PSIPHON_API_HANDSHAKE_REQUEST_NAME, request)
  150. if err != nil {
  151. return errors.Trace(err)
  152. }
  153. } else {
  154. // Legacy web service API request
  155. responseBody, err := serverContext.doGetRequest(
  156. makeRequestUrl(serverContext.tunnel, "", "handshake", params))
  157. if err != nil {
  158. return errors.Trace(err)
  159. }
  160. // Skip legacy format lines and just parse the JSON config line
  161. configLinePrefix := []byte("Config: ")
  162. for _, line := range bytes.Split(responseBody, []byte("\n")) {
  163. if bytes.HasPrefix(line, configLinePrefix) {
  164. response = line[len(configLinePrefix):]
  165. break
  166. }
  167. }
  168. if len(response) == 0 {
  169. return errors.TraceNew("no config line found")
  170. }
  171. }
  172. // Legacy fields:
  173. // - 'preemptive_reconnect_lifetime_milliseconds' is unused and ignored
  174. // - 'ssh_session_id' is ignored; client session ID is used instead
  175. var handshakeResponse protocol.HandshakeResponse
  176. err := json.Unmarshal(response, &handshakeResponse)
  177. if err != nil {
  178. return errors.Trace(err)
  179. }
  180. serverContext.clientRegion = handshakeResponse.ClientRegion
  181. NoticeClientRegion(serverContext.clientRegion)
  182. var serverEntries []protocol.ServerEntryFields
  183. // Store discovered server entries
  184. // We use the server's time, as it's available here, for the server entry
  185. // timestamp since this is more reliable than the client time.
  186. for _, encodedServerEntry := range handshakeResponse.EncodedServerList {
  187. serverEntryFields, err := protocol.DecodeServerEntryFields(
  188. encodedServerEntry,
  189. common.TruncateTimestampToHour(handshakeResponse.ServerTimestamp),
  190. protocol.SERVER_ENTRY_SOURCE_DISCOVERY)
  191. if err != nil {
  192. return errors.Trace(err)
  193. }
  194. // Retain the original timestamp and source in the requestedMissingSignature
  195. // case, as this server entry was not discovered here.
  196. //
  197. // Limitation: there is a transient edge case where
  198. // requestedMissingSignature will be set for a discovery server entry that
  199. // _is_ also discovered here.
  200. if requestedMissingSignature &&
  201. serverEntryFields.GetIPAddress() == serverContext.tunnel.dialParams.ServerEntry.IpAddress {
  202. serverEntryFields.SetLocalTimestamp(serverContext.tunnel.dialParams.ServerEntry.LocalTimestamp)
  203. serverEntryFields.SetLocalSource(serverContext.tunnel.dialParams.ServerEntry.LocalSource)
  204. }
  205. err = protocol.ValidateServerEntryFields(serverEntryFields)
  206. if err != nil {
  207. // Skip this entry and continue with the next one
  208. NoticeAlert("invalid handshake server entry: %s", err)
  209. continue
  210. }
  211. serverEntries = append(serverEntries, serverEntryFields)
  212. }
  213. err = StoreServerEntries(
  214. serverContext.tunnel.config,
  215. serverEntries,
  216. true)
  217. if err != nil {
  218. return errors.Trace(err)
  219. }
  220. NoticeHomepages(handshakeResponse.Homepages)
  221. serverContext.clientUpgradeVersion = handshakeResponse.UpgradeClientVersion
  222. if handshakeResponse.UpgradeClientVersion != "" {
  223. NoticeClientUpgradeAvailable(handshakeResponse.UpgradeClientVersion)
  224. } else {
  225. NoticeClientIsLatestVersion("")
  226. }
  227. if !ignoreStatsRegexps {
  228. var regexpsNotices []string
  229. serverContext.statsRegexps, regexpsNotices = transferstats.MakeRegexps(
  230. handshakeResponse.PageViewRegexes,
  231. handshakeResponse.HttpsRequestRegexes)
  232. for _, notice := range regexpsNotices {
  233. NoticeAlert(notice)
  234. }
  235. }
  236. serverContext.serverHandshakeTimestamp = handshakeResponse.ServerTimestamp
  237. NoticeServerTimestamp(serverContext.serverHandshakeTimestamp)
  238. NoticeActiveAuthorizationIDs(handshakeResponse.ActiveAuthorizationIDs)
  239. if doTactics && handshakeResponse.TacticsPayload != nil &&
  240. networkID == serverContext.tunnel.config.GetNetworkID() {
  241. var payload *tactics.Payload
  242. err := json.Unmarshal(handshakeResponse.TacticsPayload, &payload)
  243. if err != nil {
  244. return errors.Trace(err)
  245. }
  246. // handshakeResponse.TacticsPayload may be "null", and payload
  247. // will successfully unmarshal as nil. As a result, the previous
  248. // handshakeResponse.TacticsPayload != nil test is insufficient.
  249. if payload != nil {
  250. tacticsRecord, err := tactics.HandleTacticsPayload(
  251. GetTacticsStorer(),
  252. networkID,
  253. payload)
  254. if err != nil {
  255. return errors.Trace(err)
  256. }
  257. if tacticsRecord != nil &&
  258. prng.FlipWeightedCoin(tacticsRecord.Tactics.Probability) {
  259. err := serverContext.tunnel.config.SetClientParameters(
  260. tacticsRecord.Tag, true, tacticsRecord.Tactics.Parameters)
  261. if err != nil {
  262. NoticeInfo("apply handshake tactics failed: %s", err)
  263. }
  264. // The error will be due to invalid tactics values from
  265. // the server. When ApplyClientParameters fails, all
  266. // previous tactics values are left in place.
  267. }
  268. }
  269. }
  270. return nil
  271. }
  272. // DoConnectedRequest performs the "connected" API request. This request is
  273. // used for statistics. The server returns a last_connected token for
  274. // the client to store and send next time it connects. This token is
  275. // a timestamp (using the server clock, and should be rounded to the
  276. // nearest hour) which is used to determine when a connection represents
  277. // a unique user for a time period.
  278. func (serverContext *ServerContext) DoConnectedRequest() error {
  279. params := serverContext.getBaseAPIParameters()
  280. lastConnected, err := getLastConnected()
  281. if err != nil {
  282. return errors.Trace(err)
  283. }
  284. params["last_connected"] = lastConnected
  285. // serverContext.tunnel.establishDuration is nanoseconds; divide to get to milliseconds
  286. params["establishment_duration"] =
  287. fmt.Sprintf("%d", serverContext.tunnel.establishDuration/1000000)
  288. var response []byte
  289. if serverContext.psiphonHttpsClient == nil {
  290. request, err := serverContext.makeSSHAPIRequestPayload(params)
  291. if err != nil {
  292. return errors.Trace(err)
  293. }
  294. response, err = serverContext.tunnel.SendAPIRequest(
  295. protocol.PSIPHON_API_CONNECTED_REQUEST_NAME, request)
  296. if err != nil {
  297. return errors.Trace(err)
  298. }
  299. } else {
  300. // Legacy web service API request
  301. response, err = serverContext.doGetRequest(
  302. makeRequestUrl(serverContext.tunnel, "", "connected", params))
  303. if err != nil {
  304. return errors.Trace(err)
  305. }
  306. }
  307. var connectedResponse protocol.ConnectedResponse
  308. err = json.Unmarshal(response, &connectedResponse)
  309. if err != nil {
  310. return errors.Trace(err)
  311. }
  312. err = SetKeyValue(
  313. datastoreLastConnectedKey, connectedResponse.ConnectedTimestamp)
  314. if err != nil {
  315. return errors.Trace(err)
  316. }
  317. return nil
  318. }
  319. func getLastConnected() (string, error) {
  320. lastConnected, err := GetKeyValue(datastoreLastConnectedKey)
  321. if err != nil {
  322. return "", errors.Trace(err)
  323. }
  324. if lastConnected == "" {
  325. lastConnected = "None"
  326. }
  327. return lastConnected, nil
  328. }
  329. // StatsRegexps gets the Regexps used for the statistics for this tunnel.
  330. func (serverContext *ServerContext) StatsRegexps() *transferstats.Regexps {
  331. return serverContext.statsRegexps
  332. }
  333. // DoStatusRequest makes a "status" API request to the server, sending session stats.
  334. func (serverContext *ServerContext) DoStatusRequest(tunnel *Tunnel) error {
  335. params := serverContext.getStatusParams(true)
  336. // Note: ensure putBackStatusRequestPayload is called, to replace
  337. // payload for future attempt, in all failure cases.
  338. statusPayload, statusPayloadInfo, err := makeStatusRequestPayload(
  339. serverContext.tunnel.config,
  340. tunnel.dialParams.ServerEntry.IpAddress)
  341. if err != nil {
  342. return errors.Trace(err)
  343. }
  344. // Skip the request when there's no payload to send.
  345. if len(statusPayload) == 0 {
  346. return nil
  347. }
  348. var response []byte
  349. if serverContext.psiphonHttpsClient == nil {
  350. rawMessage := json.RawMessage(statusPayload)
  351. params["statusData"] = &rawMessage
  352. var request []byte
  353. request, err = serverContext.makeSSHAPIRequestPayload(params)
  354. if err == nil {
  355. response, err = serverContext.tunnel.SendAPIRequest(
  356. protocol.PSIPHON_API_STATUS_REQUEST_NAME, request)
  357. }
  358. } else {
  359. // Legacy web service API request
  360. response, err = serverContext.doPostRequest(
  361. makeRequestUrl(serverContext.tunnel, "", "status", params),
  362. "application/json",
  363. bytes.NewReader(statusPayload))
  364. }
  365. if err != nil {
  366. // Resend the transfer stats and tunnel stats later
  367. // Note: potential duplicate reports if the server received and processed
  368. // the request but the client failed to receive the response.
  369. putBackStatusRequestPayload(statusPayloadInfo)
  370. return errors.Trace(err)
  371. }
  372. confirmStatusRequestPayload(statusPayloadInfo)
  373. var statusResponse protocol.StatusResponse
  374. err = json.Unmarshal(response, &statusResponse)
  375. if err != nil {
  376. return errors.Trace(err)
  377. }
  378. for _, serverEntryTag := range statusResponse.InvalidServerEntryTags {
  379. PruneServerEntry(serverContext.tunnel.config, serverEntryTag)
  380. }
  381. return nil
  382. }
  383. func (serverContext *ServerContext) getStatusParams(
  384. isTunneled bool) common.APIParameters {
  385. params := serverContext.getBaseAPIParameters()
  386. // Legacy clients set "connected" to "0" when disconnecting, and this value
  387. // is used to calculate session duration estimates. This is now superseded
  388. // by explicit tunnel stats duration reporting.
  389. // The legacy method of reconstructing session durations is not compatible
  390. // with this client's connected request retries and asynchronous final
  391. // status request attempts. So we simply set this "connected" flag to reflect
  392. // whether the request is sent tunneled or not.
  393. connected := "1"
  394. if !isTunneled {
  395. connected = "0"
  396. }
  397. params["connected"] = connected
  398. return params
  399. }
  400. // statusRequestPayloadInfo is a temporary structure for data used to
  401. // either "clear" or "put back" status request payload data depending
  402. // on whether or not the request succeeded.
  403. type statusRequestPayloadInfo struct {
  404. serverId string
  405. transferStats *transferstats.AccumulatedStats
  406. persistentStats map[string][][]byte
  407. }
  408. func makeStatusRequestPayload(
  409. config *Config,
  410. serverId string) ([]byte, *statusRequestPayloadInfo, error) {
  411. transferStats := transferstats.TakeOutStatsForServer(serverId)
  412. hostBytes := transferStats.GetStatsForStatusRequest()
  413. persistentStats, err := TakeOutUnreportedPersistentStats(config)
  414. if err != nil {
  415. NoticeAlert(
  416. "TakeOutUnreportedPersistentStats failed: %s", errors.Trace(err))
  417. persistentStats = nil
  418. // Proceed with transferStats only
  419. }
  420. if len(hostBytes) == 0 && len(persistentStats) == 0 {
  421. // There is no payload to send.
  422. return nil, nil, nil
  423. }
  424. payloadInfo := &statusRequestPayloadInfo{
  425. serverId, transferStats, persistentStats}
  426. payload := make(map[string]interface{})
  427. payload["host_bytes"] = hostBytes
  428. // We're not recording these fields, but legacy servers require them.
  429. payload["bytes_transferred"] = 0
  430. payload["page_views"] = make([]string, 0)
  431. payload["https_requests"] = make([]string, 0)
  432. persistentStatPayloadNames := make(map[string]string)
  433. persistentStatPayloadNames[datastorePersistentStatTypeRemoteServerList] = "remote_server_list_stats"
  434. persistentStatPayloadNames[datastorePersistentStatTypeFailedTunnel] = "failed_tunnel_stats"
  435. for statType, stats := range persistentStats {
  436. // Persistent stats records are already in JSON format
  437. jsonStats := make([]json.RawMessage, len(stats))
  438. for i, stat := range stats {
  439. jsonStats[i] = json.RawMessage(stat)
  440. }
  441. payload[persistentStatPayloadNames[statType]] = jsonStats
  442. }
  443. jsonPayload, err := json.Marshal(payload)
  444. if err != nil {
  445. // Send the transfer stats and tunnel stats later
  446. putBackStatusRequestPayload(payloadInfo)
  447. return nil, nil, errors.Trace(err)
  448. }
  449. return jsonPayload, payloadInfo, nil
  450. }
  451. func putBackStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  452. transferstats.PutBackStatsForServer(
  453. payloadInfo.serverId, payloadInfo.transferStats)
  454. err := PutBackUnreportedPersistentStats(payloadInfo.persistentStats)
  455. if err != nil {
  456. // These persistent stats records won't be resent until after a
  457. // datastore re-initialization.
  458. NoticeAlert(
  459. "PutBackUnreportedPersistentStats failed: %s", errors.Trace(err))
  460. }
  461. }
  462. func confirmStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  463. err := ClearReportedPersistentStats(payloadInfo.persistentStats)
  464. if err != nil {
  465. // These persistent stats records may be resent.
  466. NoticeAlert(
  467. "ClearReportedPersistentStats failed: %s", errors.Trace(err))
  468. }
  469. }
  470. // RecordRemoteServerListStat records a completed common or OSL
  471. // remote server list resource download.
  472. //
  473. // The RSL download event could occur when the client is unable
  474. // to immediately send a status request to a server, so these
  475. // records are stored in the persistent datastore and reported
  476. // via subsequent status requests sent to any Psiphon server.
  477. //
  478. // Note that some common event field values may change between the
  479. // stat recording and reporting, including client geolocation and
  480. // host_id.
  481. //
  482. // Multiple "status" requests may be in flight at once (due
  483. // to multi-tunnel, asynchronous final status retry, and
  484. // aggressive status requests for pre-registered tunnels),
  485. // To avoid duplicate reporting, persistent stats records are
  486. // "taken-out" by a status request and then "put back" in
  487. // case the request fails.
  488. //
  489. // Duplicate reporting may also occur when a server receives and
  490. // processes a status request but the client fails to receive
  491. // the response.
  492. func RecordRemoteServerListStat(
  493. config *Config, url, etag string) error {
  494. if !config.GetClientParameters().Get().WeightedCoinFlip(
  495. parameters.RecordRemoteServerListPersistentStatsProbability) {
  496. return nil
  497. }
  498. params := make(common.APIParameters)
  499. params["session_id"] = config.SessionID
  500. params["propagation_channel_id"] = config.PropagationChannelId
  501. params["sponsor_id"] = config.GetSponsorID()
  502. params["client_version"] = config.ClientVersion
  503. params["client_platform"] = config.ClientPlatform
  504. params["client_build_rev"] = buildinfo.GetBuildInfo().BuildRev
  505. params["client_download_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  506. params["url"] = url
  507. params["etag"] = etag
  508. remoteServerListStatJson, err := json.Marshal(params)
  509. if err != nil {
  510. return errors.Trace(err)
  511. }
  512. return StorePersistentStat(
  513. config, datastorePersistentStatTypeRemoteServerList, remoteServerListStatJson)
  514. }
  515. // RecordFailedTunnelStat records metrics for a failed tunnel dial, including
  516. // dial parameters and error condition (tunnelErr).
  517. //
  518. // This uses the same reporting facility, with the same caveats, as
  519. // RecordRemoteServerListStat.
  520. func RecordFailedTunnelStat(
  521. config *Config, dialParams *DialParameters, tunnelErr error) error {
  522. if !config.GetClientParameters().Get().WeightedCoinFlip(
  523. parameters.RecordFailedTunnelPersistentStatsProbability) {
  524. return nil
  525. }
  526. lastConnected, err := getLastConnected()
  527. if err != nil {
  528. return errors.Trace(err)
  529. }
  530. params := getBaseAPIParameters(config, dialParams)
  531. delete(params, "server_secret")
  532. params["server_entry_tag"] = dialParams.ServerEntry.Tag
  533. params["last_connected"] = lastConnected
  534. params["client_failed_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  535. // Ensure direct server IPs are not exposed in logs. The "net" package, and
  536. // possibly other 3rd party packages, will include destination addresses in
  537. // I/O error messages.
  538. tunnelError := StripIPAddressesString(tunnelErr.Error())
  539. params["tunnel_error"] = tunnelError
  540. failedTunnelStatJson, err := json.Marshal(params)
  541. if err != nil {
  542. return errors.Trace(err)
  543. }
  544. return StorePersistentStat(
  545. config, datastorePersistentStatTypeFailedTunnel, failedTunnelStatJson)
  546. }
  547. // doGetRequest makes a tunneled HTTPS request and returns the response body.
  548. func (serverContext *ServerContext) doGetRequest(
  549. requestUrl string) (responseBody []byte, err error) {
  550. request, err := http.NewRequest("GET", requestUrl, nil)
  551. if err != nil {
  552. return nil, errors.Trace(err)
  553. }
  554. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  555. response, err := serverContext.psiphonHttpsClient.Do(request)
  556. if err == nil && response.StatusCode != http.StatusOK {
  557. response.Body.Close()
  558. err = fmt.Errorf("HTTP GET request failed with response code: %d", response.StatusCode)
  559. }
  560. if err != nil {
  561. // Trim this error since it may include long URLs
  562. return nil, errors.Trace(TrimError(err))
  563. }
  564. defer response.Body.Close()
  565. body, err := ioutil.ReadAll(response.Body)
  566. if err != nil {
  567. return nil, errors.Trace(err)
  568. }
  569. return body, nil
  570. }
  571. // doPostRequest makes a tunneled HTTPS POST request.
  572. func (serverContext *ServerContext) doPostRequest(
  573. requestUrl string, bodyType string, body io.Reader) (responseBody []byte, err error) {
  574. request, err := http.NewRequest("POST", requestUrl, body)
  575. if err != nil {
  576. return nil, errors.Trace(err)
  577. }
  578. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  579. request.Header.Set("Content-Type", bodyType)
  580. response, err := serverContext.psiphonHttpsClient.Do(request)
  581. if err == nil && response.StatusCode != http.StatusOK {
  582. response.Body.Close()
  583. err = fmt.Errorf("HTTP POST request failed with response code: %d", response.StatusCode)
  584. }
  585. if err != nil {
  586. // Trim this error since it may include long URLs
  587. return nil, errors.Trace(TrimError(err))
  588. }
  589. defer response.Body.Close()
  590. responseBody, err = ioutil.ReadAll(response.Body)
  591. if err != nil {
  592. return nil, errors.Trace(err)
  593. }
  594. return responseBody, nil
  595. }
  596. // makeSSHAPIRequestPayload makes a JSON payload for an SSH API request.
  597. func (serverContext *ServerContext) makeSSHAPIRequestPayload(
  598. params common.APIParameters) ([]byte, error) {
  599. jsonPayload, err := json.Marshal(params)
  600. if err != nil {
  601. return nil, errors.Trace(err)
  602. }
  603. return jsonPayload, nil
  604. }
  605. func (serverContext *ServerContext) getBaseAPIParameters() common.APIParameters {
  606. params := getBaseAPIParameters(
  607. serverContext.tunnel.config,
  608. serverContext.tunnel.dialParams)
  609. // Add a random amount of padding to defend against API call traffic size
  610. // fingerprints. The "pad_response" field instructs the server to pad its
  611. // response accordingly.
  612. p := serverContext.tunnel.config.GetClientParameters().Get()
  613. minUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMinBytes)
  614. maxUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMaxBytes)
  615. minDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMinBytes)
  616. maxDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMaxBytes)
  617. if maxUpstreamPadding > 0 {
  618. size := serverContext.paddingPRNG.Range(minUpstreamPadding, maxUpstreamPadding)
  619. params["padding"] = strings.Repeat(" ", size)
  620. }
  621. if maxDownstreamPadding > 0 {
  622. size := serverContext.paddingPRNG.Range(minDownstreamPadding, maxDownstreamPadding)
  623. params["pad_response"] = strconv.Itoa(size)
  624. }
  625. return params
  626. }
  627. // getBaseAPIParameters returns all the common API parameters that are
  628. // included with each Psiphon API request. These common parameters are used
  629. // for metrics.
  630. func getBaseAPIParameters(
  631. config *Config,
  632. dialParams *DialParameters) common.APIParameters {
  633. params := make(common.APIParameters)
  634. params["session_id"] = config.SessionID
  635. params["client_session_id"] = config.SessionID
  636. params["server_secret"] = dialParams.ServerEntry.WebServerSecret
  637. params["propagation_channel_id"] = config.PropagationChannelId
  638. params["sponsor_id"] = config.GetSponsorID()
  639. params["client_version"] = config.ClientVersion
  640. params["relay_protocol"] = dialParams.TunnelProtocol
  641. params["client_platform"] = config.ClientPlatform
  642. params["client_build_rev"] = buildinfo.GetBuildInfo().BuildRev
  643. params["tunnel_whole_device"] = strconv.Itoa(config.TunnelWholeDevice)
  644. // The following parameters may be blank and must
  645. // not be sent to the server if blank.
  646. if config.DeviceRegion != "" {
  647. params["device_region"] = config.DeviceRegion
  648. }
  649. if dialParams.SelectedSSHClientVersion {
  650. params["ssh_client_version"] = dialParams.SSHClientVersion
  651. }
  652. if dialParams.UpstreamProxyType != "" {
  653. params["upstream_proxy_type"] = dialParams.UpstreamProxyType
  654. }
  655. if dialParams.UpstreamProxyCustomHeaderNames != nil {
  656. params["upstream_proxy_custom_header_names"] = dialParams.UpstreamProxyCustomHeaderNames
  657. }
  658. if dialParams.MeekDialAddress != "" {
  659. params["meek_dial_address"] = dialParams.MeekDialAddress
  660. }
  661. meekResolvedIPAddress := dialParams.MeekResolvedIPAddress.Load().(string)
  662. if meekResolvedIPAddress != "" {
  663. params["meek_resolved_ip_address"] = meekResolvedIPAddress
  664. }
  665. if dialParams.MeekSNIServerName != "" {
  666. params["meek_sni_server_name"] = dialParams.MeekSNIServerName
  667. }
  668. if dialParams.MeekHostHeader != "" {
  669. params["meek_host_header"] = dialParams.MeekHostHeader
  670. }
  671. // MeekTransformedHostName is meaningful when meek is used, which is when MeekDialAddress != ""
  672. if dialParams.MeekDialAddress != "" {
  673. transformedHostName := "0"
  674. if dialParams.MeekTransformedHostName {
  675. transformedHostName = "1"
  676. }
  677. params["meek_transformed_host_name"] = transformedHostName
  678. }
  679. if dialParams.SelectedUserAgent {
  680. params["user_agent"] = dialParams.UserAgent
  681. }
  682. if dialParams.SelectedTLSProfile {
  683. params["tls_profile"] = dialParams.TLSProfile
  684. params["tls_version"] = dialParams.GetTLSVersionForMetrics()
  685. }
  686. if dialParams.ServerEntry.Region != "" {
  687. params["server_entry_region"] = dialParams.ServerEntry.Region
  688. }
  689. if dialParams.ServerEntry.LocalSource != "" {
  690. params["server_entry_source"] = dialParams.ServerEntry.LocalSource
  691. }
  692. // As with last_connected, this timestamp stat, which may be
  693. // a precise handshake request server timestamp, is truncated
  694. // to hour granularity to avoid introducing a reconstructable
  695. // cross-session user trace into server logs.
  696. localServerEntryTimestamp := common.TruncateTimestampToHour(
  697. dialParams.ServerEntry.LocalTimestamp)
  698. if localServerEntryTimestamp != "" {
  699. params["server_entry_timestamp"] = localServerEntryTimestamp
  700. }
  701. params[tactics.APPLIED_TACTICS_TAG_PARAMETER_NAME] =
  702. config.GetClientParameters().Get().Tag()
  703. if dialParams.DialPortNumber != "" {
  704. params["dial_port_number"] = dialParams.DialPortNumber
  705. }
  706. if dialParams.QUICVersion != "" {
  707. params["quic_version"] = dialParams.QUICVersion
  708. }
  709. if dialParams.QUICDialSNIAddress != "" {
  710. params["quic_dial_sni_address"] = dialParams.QUICDialSNIAddress
  711. }
  712. isReplay := "0"
  713. if dialParams.IsReplay {
  714. isReplay = "1"
  715. }
  716. params["is_replay"] = isReplay
  717. if config.EgressRegion != "" {
  718. params["egress_region"] = config.EgressRegion
  719. }
  720. // dialParams.DialDuration is nanoseconds; divide to get to milliseconds
  721. params["dial_duration"] = fmt.Sprintf("%d", dialParams.DialDuration/1000000)
  722. params["candidate_number"] = strconv.Itoa(dialParams.CandidateNumber)
  723. if dialParams.NetworkLatencyMultiplier != 0.0 {
  724. params["network_latency_multiplier"] =
  725. fmt.Sprintf("%f", dialParams.NetworkLatencyMultiplier)
  726. }
  727. if dialParams.DialConnMetrics != nil {
  728. metrics := dialParams.DialConnMetrics.GetMetrics()
  729. for name, value := range metrics {
  730. params[name] = fmt.Sprintf("%v", value)
  731. }
  732. }
  733. if dialParams.ObfuscatedSSHConnMetrics != nil {
  734. metrics := dialParams.ObfuscatedSSHConnMetrics.GetMetrics()
  735. for name, value := range metrics {
  736. params[name] = fmt.Sprintf("%v", value)
  737. }
  738. }
  739. return params
  740. }
  741. // makeRequestUrl makes a URL for a web service API request.
  742. func makeRequestUrl(tunnel *Tunnel, port, path string, params common.APIParameters) string {
  743. var requestUrl bytes.Buffer
  744. if port == "" {
  745. port = tunnel.dialParams.ServerEntry.WebServerPort
  746. }
  747. requestUrl.WriteString("https://")
  748. requestUrl.WriteString(tunnel.dialParams.ServerEntry.IpAddress)
  749. requestUrl.WriteString(":")
  750. requestUrl.WriteString(port)
  751. requestUrl.WriteString("/")
  752. requestUrl.WriteString(path)
  753. if len(params) > 0 {
  754. queryParams := url.Values{}
  755. for name, value := range params {
  756. // Note: this logic skips the tactics.SPEED_TEST_SAMPLES_PARAMETER_NAME
  757. // parameter, which has a different type. This parameter is not recognized
  758. // by legacy servers.
  759. switch v := value.(type) {
  760. case string:
  761. queryParams.Set(name, v)
  762. case []string:
  763. // String array param encoded as JSON
  764. jsonValue, err := json.Marshal(v)
  765. if err != nil {
  766. break
  767. }
  768. queryParams.Set(name, string(jsonValue))
  769. }
  770. }
  771. requestUrl.WriteString("?")
  772. requestUrl.WriteString(queryParams.Encode())
  773. }
  774. return requestUrl.String()
  775. }
  776. // makePsiphonHttpsClient creates a Psiphon HTTPS client that tunnels web service API
  777. // requests and which validates the web server using the Psiphon server entry web server
  778. // certificate.
  779. func makePsiphonHttpsClient(tunnel *Tunnel) (httpsClient *http.Client, err error) {
  780. certificate, err := DecodeCertificate(
  781. tunnel.dialParams.ServerEntry.WebServerCertificate)
  782. if err != nil {
  783. return nil, errors.Trace(err)
  784. }
  785. tunneledDialer := func(_ context.Context, _, addr string) (conn net.Conn, err error) {
  786. return tunnel.sshClient.Dial("tcp", addr)
  787. }
  788. // Note: as with SSH API requests, there no dial context here. SSH port forward dials
  789. // cannot be interrupted directly. Closing the tunnel will interrupt both the dial and
  790. // the request. While it's possible to add a timeout here, we leave it with no explicit
  791. // timeout which is the same as SSH API requests: if the tunnel has stalled then SSH keep
  792. // alives will cause the tunnel to close.
  793. dialer := NewCustomTLSDialer(
  794. &CustomTLSConfig{
  795. ClientParameters: tunnel.config.clientParameters,
  796. Dial: tunneledDialer,
  797. VerifyLegacyCertificate: certificate,
  798. })
  799. transport := &http.Transport{
  800. DialTLS: func(network, addr string) (net.Conn, error) {
  801. return dialer(context.Background(), network, addr)
  802. },
  803. Dial: func(network, addr string) (net.Conn, error) {
  804. return nil, errors.TraceNew("HTTP not supported")
  805. },
  806. }
  807. return &http.Client{
  808. Transport: transport,
  809. }, nil
  810. }
  811. func HandleServerRequest(
  812. tunnelOwner TunnelOwner, tunnel *Tunnel, name string, payload []byte) error {
  813. switch name {
  814. case protocol.PSIPHON_API_OSL_REQUEST_NAME:
  815. return HandleOSLRequest(tunnelOwner, tunnel, payload)
  816. }
  817. return errors.Tracef("invalid request name: %s", name)
  818. }
  819. func HandleOSLRequest(
  820. tunnelOwner TunnelOwner, tunnel *Tunnel, payload []byte) error {
  821. var oslRequest protocol.OSLRequest
  822. err := json.Unmarshal(payload, &oslRequest)
  823. if err != nil {
  824. return errors.Trace(err)
  825. }
  826. if oslRequest.ClearLocalSLOKs {
  827. DeleteSLOKs()
  828. }
  829. seededNewSLOK := false
  830. for _, slok := range oslRequest.SeedPayload.SLOKs {
  831. duplicate, err := SetSLOK(slok.ID, slok.Key)
  832. if err != nil {
  833. // TODO: return error to trigger retry?
  834. NoticeAlert("SetSLOK failed: %s", errors.Trace(err))
  835. } else if !duplicate {
  836. seededNewSLOK = true
  837. }
  838. if tunnel.config.EmitSLOKs {
  839. NoticeSLOKSeeded(base64.StdEncoding.EncodeToString(slok.ID), duplicate)
  840. }
  841. }
  842. if seededNewSLOK {
  843. tunnelOwner.SignalSeededNewSLOK()
  844. }
  845. return nil
  846. }