serverApi.go 36 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156
  1. /*
  2. * Copyright (c) 2015, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/base64"
  24. "encoding/hex"
  25. "encoding/json"
  26. "fmt"
  27. "io"
  28. "io/ioutil"
  29. "net"
  30. "net/http"
  31. "net/url"
  32. "strconv"
  33. "strings"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/buildinfo"
  36. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
  37. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/fragmentor"
  38. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  39. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  40. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  41. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/tactics"
  42. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/transferstats"
  43. )
  44. // ServerContext is a utility struct which holds all of the data associated
  45. // with a Psiphon server connection. In addition to the established tunnel, this
  46. // includes data and transport mechanisms for Psiphon API requests. Legacy servers
  47. // offer the Psiphon API through a web service; newer servers offer the Psiphon
  48. // API through SSH requests made directly through the tunnel's SSH client.
  49. type ServerContext struct {
  50. tunnel *Tunnel
  51. psiphonHttpsClient *http.Client
  52. statsRegexps *transferstats.Regexps
  53. clientRegion string
  54. clientUpgradeVersion string
  55. serverHandshakeTimestamp string
  56. paddingPRNG *prng.PRNG
  57. }
  58. // MakeSessionId creates a new session ID. The same session ID is used across
  59. // multi-tunnel controller runs, where each tunnel has its own ServerContext
  60. // instance.
  61. // In server-side stats, we now consider a "session" to be the lifetime of the
  62. // Controller (e.g., the user's commanded start and stop) and we measure this
  63. // duration as well as the duration of each tunnel within the session.
  64. func MakeSessionId() (string, error) {
  65. randomId, err := common.MakeSecureRandomBytes(protocol.PSIPHON_API_CLIENT_SESSION_ID_LENGTH)
  66. if err != nil {
  67. return "", errors.Trace(err)
  68. }
  69. return hex.EncodeToString(randomId), nil
  70. }
  71. // NewServerContext makes the tunneled handshake request to the Psiphon server
  72. // and returns a ServerContext struct for use with subsequent Psiphon server API
  73. // requests (e.g., periodic connected and status requests).
  74. func NewServerContext(tunnel *Tunnel) (*ServerContext, error) {
  75. // For legacy servers, set up psiphonHttpsClient for
  76. // accessing the Psiphon API via the web service.
  77. var psiphonHttpsClient *http.Client
  78. if !tunnel.dialParams.ServerEntry.SupportsSSHAPIRequests() ||
  79. tunnel.config.TargetApiProtocol == protocol.PSIPHON_WEB_API_PROTOCOL {
  80. var err error
  81. psiphonHttpsClient, err = makePsiphonHttpsClient(tunnel)
  82. if err != nil {
  83. return nil, errors.Trace(err)
  84. }
  85. }
  86. serverContext := &ServerContext{
  87. tunnel: tunnel,
  88. psiphonHttpsClient: psiphonHttpsClient,
  89. paddingPRNG: prng.NewPRNGWithSeed(tunnel.dialParams.APIRequestPaddingSeed),
  90. }
  91. ignoreRegexps := tunnel.config.GetClientParameters().Get().Bool(
  92. parameters.IgnoreHandshakeStatsRegexps)
  93. err := serverContext.doHandshakeRequest(ignoreRegexps)
  94. if err != nil {
  95. return nil, errors.Trace(err)
  96. }
  97. return serverContext, nil
  98. }
  99. // doHandshakeRequest performs the "handshake" API request. The handshake
  100. // returns upgrade info, newly discovered server entries -- which are
  101. // stored -- and sponsor info (home pages, stat regexes).
  102. func (serverContext *ServerContext) doHandshakeRequest(
  103. ignoreStatsRegexps bool) error {
  104. params := serverContext.getBaseAPIParameters(baseParametersAll)
  105. // The server will return a signed copy of its own server entry when the
  106. // client specifies this 'missing_server_entry_signature' parameter.
  107. //
  108. // The purpose of this mechanism is to rapidly upgrade client local storage
  109. // from unsigned to signed server entries, and to ensure that the client has
  110. // a signed server entry for its currently connected server as required for
  111. // the client-to-client exchange feature.
  112. //
  113. // The server entry will be included in handshakeResponse.EncodedServerList,
  114. // along side discovery servers.
  115. requestedMissingSignature := false
  116. if !serverContext.tunnel.dialParams.ServerEntry.HasSignature() {
  117. requestedMissingSignature = true
  118. params["missing_server_entry_signature"] =
  119. serverContext.tunnel.dialParams.ServerEntry.Tag
  120. }
  121. doTactics := !serverContext.tunnel.config.DisableTactics
  122. networkID := ""
  123. if doTactics {
  124. // Limitation: it is assumed that the network ID obtained here is the
  125. // one that is active when the handshake request is received by the
  126. // server. However, it is remotely possible to switch networks
  127. // immediately after invoking the GetNetworkID callback and initiating
  128. // the handshake, if the tunnel protocol is meek.
  129. //
  130. // The response handling code below calls GetNetworkID again and ignores
  131. // any tactics payload if the network ID is not the same. While this
  132. // doesn't detect all cases of changing networks, it reduces the already
  133. // narrow window.
  134. networkID = serverContext.tunnel.config.GetNetworkID()
  135. err := tactics.SetTacticsAPIParameters(
  136. serverContext.tunnel.config.clientParameters, GetTacticsStorer(), networkID, params)
  137. if err != nil {
  138. return errors.Trace(err)
  139. }
  140. }
  141. var response []byte
  142. if serverContext.psiphonHttpsClient == nil {
  143. params[protocol.PSIPHON_API_HANDSHAKE_AUTHORIZATIONS] =
  144. serverContext.tunnel.config.GetAuthorizations()
  145. request, err := serverContext.makeSSHAPIRequestPayload(params)
  146. if err != nil {
  147. return errors.Trace(err)
  148. }
  149. response, err = serverContext.tunnel.SendAPIRequest(
  150. protocol.PSIPHON_API_HANDSHAKE_REQUEST_NAME, request)
  151. if err != nil {
  152. return errors.Trace(err)
  153. }
  154. } else {
  155. // Legacy web service API request
  156. responseBody, err := serverContext.doGetRequest(
  157. makeRequestUrl(serverContext.tunnel, "", "handshake", params))
  158. if err != nil {
  159. return errors.Trace(err)
  160. }
  161. // Skip legacy format lines and just parse the JSON config line
  162. configLinePrefix := []byte("Config: ")
  163. for _, line := range bytes.Split(responseBody, []byte("\n")) {
  164. if bytes.HasPrefix(line, configLinePrefix) {
  165. response = line[len(configLinePrefix):]
  166. break
  167. }
  168. }
  169. if len(response) == 0 {
  170. return errors.TraceNew("no config line found")
  171. }
  172. }
  173. // Legacy fields:
  174. // - 'preemptive_reconnect_lifetime_milliseconds' is unused and ignored
  175. // - 'ssh_session_id' is ignored; client session ID is used instead
  176. var handshakeResponse protocol.HandshakeResponse
  177. // Initialize these fields to distinguish between psiphond omitting values in
  178. // the response and the zero value, which means unlimited rate.
  179. handshakeResponse.UpstreamBytesPerSecond = -1
  180. handshakeResponse.DownstreamBytesPerSecond = -1
  181. err := json.Unmarshal(response, &handshakeResponse)
  182. if err != nil {
  183. return errors.Trace(err)
  184. }
  185. serverContext.clientRegion = handshakeResponse.ClientRegion
  186. NoticeClientRegion(serverContext.clientRegion)
  187. var serverEntries []protocol.ServerEntryFields
  188. // Store discovered server entries
  189. // We use the server's time, as it's available here, for the server entry
  190. // timestamp since this is more reliable than the client time.
  191. for _, encodedServerEntry := range handshakeResponse.EncodedServerList {
  192. serverEntryFields, err := protocol.DecodeServerEntryFields(
  193. encodedServerEntry,
  194. common.TruncateTimestampToHour(handshakeResponse.ServerTimestamp),
  195. protocol.SERVER_ENTRY_SOURCE_DISCOVERY)
  196. if err != nil {
  197. return errors.Trace(err)
  198. }
  199. // Retain the original timestamp and source in the requestedMissingSignature
  200. // case, as this server entry was not discovered here.
  201. //
  202. // Limitation: there is a transient edge case where
  203. // requestedMissingSignature will be set for a discovery server entry that
  204. // _is_ also discovered here.
  205. if requestedMissingSignature &&
  206. serverEntryFields.GetIPAddress() == serverContext.tunnel.dialParams.ServerEntry.IpAddress {
  207. serverEntryFields.SetLocalTimestamp(serverContext.tunnel.dialParams.ServerEntry.LocalTimestamp)
  208. serverEntryFields.SetLocalSource(serverContext.tunnel.dialParams.ServerEntry.LocalSource)
  209. }
  210. err = protocol.ValidateServerEntryFields(serverEntryFields)
  211. if err != nil {
  212. // Skip this entry and continue with the next one
  213. NoticeWarning("invalid handshake server entry: %s", err)
  214. continue
  215. }
  216. serverEntries = append(serverEntries, serverEntryFields)
  217. }
  218. err = StoreServerEntries(
  219. serverContext.tunnel.config,
  220. serverEntries,
  221. true)
  222. if err != nil {
  223. return errors.Trace(err)
  224. }
  225. NoticeHomepages(handshakeResponse.Homepages)
  226. serverContext.clientUpgradeVersion = handshakeResponse.UpgradeClientVersion
  227. if handshakeResponse.UpgradeClientVersion != "" {
  228. NoticeClientUpgradeAvailable(handshakeResponse.UpgradeClientVersion)
  229. } else {
  230. NoticeClientIsLatestVersion("")
  231. }
  232. if !ignoreStatsRegexps {
  233. var regexpsNotices []string
  234. serverContext.statsRegexps, regexpsNotices = transferstats.MakeRegexps(
  235. handshakeResponse.PageViewRegexes,
  236. handshakeResponse.HttpsRequestRegexes)
  237. for _, notice := range regexpsNotices {
  238. NoticeWarning(notice)
  239. }
  240. }
  241. serverContext.serverHandshakeTimestamp = handshakeResponse.ServerTimestamp
  242. NoticeServerTimestamp(serverContext.serverHandshakeTimestamp)
  243. NoticeActiveAuthorizationIDs(handshakeResponse.ActiveAuthorizationIDs)
  244. NoticeTrafficRateLimits(
  245. handshakeResponse.UpstreamBytesPerSecond, handshakeResponse.DownstreamBytesPerSecond)
  246. if doTactics && handshakeResponse.TacticsPayload != nil &&
  247. networkID == serverContext.tunnel.config.GetNetworkID() {
  248. var payload *tactics.Payload
  249. err := json.Unmarshal(handshakeResponse.TacticsPayload, &payload)
  250. if err != nil {
  251. return errors.Trace(err)
  252. }
  253. // handshakeResponse.TacticsPayload may be "null", and payload
  254. // will successfully unmarshal as nil. As a result, the previous
  255. // handshakeResponse.TacticsPayload != nil test is insufficient.
  256. if payload != nil {
  257. tacticsRecord, err := tactics.HandleTacticsPayload(
  258. GetTacticsStorer(),
  259. networkID,
  260. payload)
  261. if err != nil {
  262. return errors.Trace(err)
  263. }
  264. if tacticsRecord != nil &&
  265. prng.FlipWeightedCoin(tacticsRecord.Tactics.Probability) {
  266. err := serverContext.tunnel.config.SetClientParameters(
  267. tacticsRecord.Tag, true, tacticsRecord.Tactics.Parameters)
  268. if err != nil {
  269. NoticeInfo("apply handshake tactics failed: %s", err)
  270. }
  271. // The error will be due to invalid tactics values from
  272. // the server. When ApplyClientParameters fails, all
  273. // previous tactics values are left in place.
  274. }
  275. }
  276. }
  277. return nil
  278. }
  279. // DoConnectedRequest performs the "connected" API request. This request is
  280. // used for statistics, including unique user counting; reporting the full
  281. // tunnel establishment duration including the handshake request; and updated
  282. // fragmentor metrics.
  283. //
  284. // Users are not assigned identifiers. Instead, daily unique users are
  285. // calculated by having clients submit their last connected timestamp
  286. // (truncated to an hour, as a privacy measure). As client clocks are
  287. // unreliable, the server returns new last_connected values for the client to
  288. // store and send next time it connects.
  289. func (serverContext *ServerContext) DoConnectedRequest() error {
  290. // Limitation: as currently implemented, the last_connected exchange isn't a
  291. // distributed, atomic operation. When clients send the connected request,
  292. // the server may receive the request, count a unique user based on the
  293. // client's last_connected, and then the tunnel fails before the client
  294. // receives the response, so the client will not update its last_connected
  295. // value and submit the same one again, resulting in an inflated unique user
  296. // count.
  297. //
  298. // The SetInFlightConnectedRequest mechanism mitigates one class of connected
  299. // request interruption, a commanded shutdown in the middle of a connected
  300. // request, by allowing some time for the request to complete before
  301. // terminating the tunnel.
  302. //
  303. // TODO: consider extending the connected request protocol with additional
  304. // "acknowledgment" messages so that the server does not commit its unique
  305. // user count until after the client has acknowledged receipt and durable
  306. // storage of the new last_connected value.
  307. requestDone := make(chan struct{})
  308. defer close(requestDone)
  309. if !serverContext.tunnel.SetInFlightConnectedRequest(requestDone) {
  310. return errors.TraceNew("tunnel is closing")
  311. }
  312. defer serverContext.tunnel.SetInFlightConnectedRequest(nil)
  313. params := serverContext.getBaseAPIParameters(
  314. baseParametersOnlyUpstreamFragmentorDialParameters)
  315. lastConnected, err := getLastConnected()
  316. if err != nil {
  317. return errors.Trace(err)
  318. }
  319. params["last_connected"] = lastConnected
  320. // serverContext.tunnel.establishDuration is nanoseconds; divide to get to milliseconds
  321. params["establishment_duration"] =
  322. fmt.Sprintf("%d", serverContext.tunnel.establishDuration/1000000)
  323. var response []byte
  324. if serverContext.psiphonHttpsClient == nil {
  325. request, err := serverContext.makeSSHAPIRequestPayload(params)
  326. if err != nil {
  327. return errors.Trace(err)
  328. }
  329. response, err = serverContext.tunnel.SendAPIRequest(
  330. protocol.PSIPHON_API_CONNECTED_REQUEST_NAME, request)
  331. if err != nil {
  332. return errors.Trace(err)
  333. }
  334. } else {
  335. // Legacy web service API request
  336. response, err = serverContext.doGetRequest(
  337. makeRequestUrl(serverContext.tunnel, "", "connected", params))
  338. if err != nil {
  339. return errors.Trace(err)
  340. }
  341. }
  342. var connectedResponse protocol.ConnectedResponse
  343. err = json.Unmarshal(response, &connectedResponse)
  344. if err != nil {
  345. return errors.Trace(err)
  346. }
  347. err = SetKeyValue(
  348. datastoreLastConnectedKey, connectedResponse.ConnectedTimestamp)
  349. if err != nil {
  350. return errors.Trace(err)
  351. }
  352. return nil
  353. }
  354. func getLastConnected() (string, error) {
  355. lastConnected, err := GetKeyValue(datastoreLastConnectedKey)
  356. if err != nil {
  357. return "", errors.Trace(err)
  358. }
  359. if lastConnected == "" {
  360. lastConnected = "None"
  361. }
  362. return lastConnected, nil
  363. }
  364. // StatsRegexps gets the Regexps used for the statistics for this tunnel.
  365. func (serverContext *ServerContext) StatsRegexps() *transferstats.Regexps {
  366. return serverContext.statsRegexps
  367. }
  368. // DoStatusRequest makes a "status" API request to the server, sending session stats.
  369. func (serverContext *ServerContext) DoStatusRequest(tunnel *Tunnel) error {
  370. params := serverContext.getBaseAPIParameters(baseParametersNoDialParameters)
  371. // Note: ensure putBackStatusRequestPayload is called, to replace
  372. // payload for future attempt, in all failure cases.
  373. statusPayload, statusPayloadInfo, err := makeStatusRequestPayload(
  374. serverContext.tunnel.config,
  375. tunnel.dialParams.ServerEntry.IpAddress)
  376. if err != nil {
  377. return errors.Trace(err)
  378. }
  379. // Skip the request when there's no payload to send.
  380. if len(statusPayload) == 0 {
  381. return nil
  382. }
  383. var response []byte
  384. if serverContext.psiphonHttpsClient == nil {
  385. rawMessage := json.RawMessage(statusPayload)
  386. params["statusData"] = &rawMessage
  387. var request []byte
  388. request, err = serverContext.makeSSHAPIRequestPayload(params)
  389. if err == nil {
  390. response, err = serverContext.tunnel.SendAPIRequest(
  391. protocol.PSIPHON_API_STATUS_REQUEST_NAME, request)
  392. }
  393. } else {
  394. // Legacy web service API request
  395. response, err = serverContext.doPostRequest(
  396. makeRequestUrl(serverContext.tunnel, "", "status", params),
  397. "application/json",
  398. bytes.NewReader(statusPayload))
  399. }
  400. if err != nil {
  401. // Resend the transfer stats and tunnel stats later
  402. // Note: potential duplicate reports if the server received and processed
  403. // the request but the client failed to receive the response.
  404. putBackStatusRequestPayload(statusPayloadInfo)
  405. return errors.Trace(err)
  406. }
  407. confirmStatusRequestPayload(statusPayloadInfo)
  408. var statusResponse protocol.StatusResponse
  409. err = json.Unmarshal(response, &statusResponse)
  410. if err != nil {
  411. return errors.Trace(err)
  412. }
  413. for _, serverEntryTag := range statusResponse.InvalidServerEntryTags {
  414. PruneServerEntry(serverContext.tunnel.config, serverEntryTag)
  415. }
  416. return nil
  417. }
  418. // statusRequestPayloadInfo is a temporary structure for data used to
  419. // either "clear" or "put back" status request payload data depending
  420. // on whether or not the request succeeded.
  421. type statusRequestPayloadInfo struct {
  422. serverId string
  423. transferStats *transferstats.AccumulatedStats
  424. persistentStats map[string][][]byte
  425. }
  426. func makeStatusRequestPayload(
  427. config *Config,
  428. serverId string) ([]byte, *statusRequestPayloadInfo, error) {
  429. transferStats := transferstats.TakeOutStatsForServer(serverId)
  430. hostBytes := transferStats.GetStatsForStatusRequest()
  431. persistentStats, err := TakeOutUnreportedPersistentStats(config)
  432. if err != nil {
  433. NoticeWarning(
  434. "TakeOutUnreportedPersistentStats failed: %s", errors.Trace(err))
  435. persistentStats = nil
  436. // Proceed with transferStats only
  437. }
  438. if len(hostBytes) == 0 && len(persistentStats) == 0 {
  439. // There is no payload to send.
  440. return nil, nil, nil
  441. }
  442. payloadInfo := &statusRequestPayloadInfo{
  443. serverId, transferStats, persistentStats}
  444. payload := make(map[string]interface{})
  445. payload["host_bytes"] = hostBytes
  446. // We're not recording these fields, but legacy servers require them.
  447. payload["bytes_transferred"] = 0
  448. payload["page_views"] = make([]string, 0)
  449. payload["https_requests"] = make([]string, 0)
  450. persistentStatPayloadNames := make(map[string]string)
  451. persistentStatPayloadNames[datastorePersistentStatTypeRemoteServerList] = "remote_server_list_stats"
  452. persistentStatPayloadNames[datastorePersistentStatTypeFailedTunnel] = "failed_tunnel_stats"
  453. for statType, stats := range persistentStats {
  454. // Persistent stats records are already in JSON format
  455. jsonStats := make([]json.RawMessage, len(stats))
  456. for i, stat := range stats {
  457. jsonStats[i] = json.RawMessage(stat)
  458. }
  459. payload[persistentStatPayloadNames[statType]] = jsonStats
  460. }
  461. jsonPayload, err := json.Marshal(payload)
  462. if err != nil {
  463. // Send the transfer stats and tunnel stats later
  464. putBackStatusRequestPayload(payloadInfo)
  465. return nil, nil, errors.Trace(err)
  466. }
  467. return jsonPayload, payloadInfo, nil
  468. }
  469. func putBackStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  470. transferstats.PutBackStatsForServer(
  471. payloadInfo.serverId, payloadInfo.transferStats)
  472. err := PutBackUnreportedPersistentStats(payloadInfo.persistentStats)
  473. if err != nil {
  474. // These persistent stats records won't be resent until after a
  475. // datastore re-initialization.
  476. NoticeWarning(
  477. "PutBackUnreportedPersistentStats failed: %s", errors.Trace(err))
  478. }
  479. }
  480. func confirmStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  481. err := ClearReportedPersistentStats(payloadInfo.persistentStats)
  482. if err != nil {
  483. // These persistent stats records may be resent.
  484. NoticeWarning(
  485. "ClearReportedPersistentStats failed: %s", errors.Trace(err))
  486. }
  487. }
  488. // RecordRemoteServerListStat records a completed common or OSL
  489. // remote server list resource download.
  490. //
  491. // The RSL download event could occur when the client is unable
  492. // to immediately send a status request to a server, so these
  493. // records are stored in the persistent datastore and reported
  494. // via subsequent status requests sent to any Psiphon server.
  495. //
  496. // Note that some common event field values may change between the
  497. // stat recording and reporting, including client geolocation and
  498. // host_id.
  499. //
  500. // Multiple "status" requests may be in flight at once (due
  501. // to multi-tunnel, asynchronous final status retry, and
  502. // aggressive status requests for pre-registered tunnels),
  503. // To avoid duplicate reporting, persistent stats records are
  504. // "taken-out" by a status request and then "put back" in
  505. // case the request fails.
  506. //
  507. // Duplicate reporting may also occur when a server receives and
  508. // processes a status request but the client fails to receive
  509. // the response.
  510. func RecordRemoteServerListStat(
  511. config *Config,
  512. tunneled bool,
  513. url string,
  514. etag string,
  515. authenticated bool) error {
  516. if !config.GetClientParameters().Get().WeightedCoinFlip(
  517. parameters.RecordRemoteServerListPersistentStatsProbability) {
  518. return nil
  519. }
  520. params := make(common.APIParameters)
  521. params["session_id"] = config.SessionID
  522. params["propagation_channel_id"] = config.PropagationChannelId
  523. params["sponsor_id"] = config.GetSponsorID()
  524. params["client_version"] = config.ClientVersion
  525. params["client_platform"] = config.ClientPlatform
  526. params["client_build_rev"] = buildinfo.GetBuildInfo().BuildRev
  527. if config.DeviceRegion != "" {
  528. params["device_region"] = config.DeviceRegion
  529. }
  530. params["client_download_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  531. tunneledStr := "0"
  532. if tunneled {
  533. tunneledStr = "1"
  534. }
  535. params["tunneled"] = tunneledStr
  536. params["url"] = url
  537. params["etag"] = etag
  538. authenticatedStr := "0"
  539. if authenticated {
  540. authenticatedStr = "1"
  541. }
  542. params["authenticated"] = authenticatedStr
  543. remoteServerListStatJson, err := json.Marshal(params)
  544. if err != nil {
  545. return errors.Trace(err)
  546. }
  547. return StorePersistentStat(
  548. config, datastorePersistentStatTypeRemoteServerList, remoteServerListStatJson)
  549. }
  550. // RecordFailedTunnelStat records metrics for a failed tunnel dial, including
  551. // dial parameters and error condition (tunnelErr).
  552. //
  553. // This uses the same reporting facility, with the same caveats, as
  554. // RecordRemoteServerListStat.
  555. func RecordFailedTunnelStat(
  556. config *Config,
  557. dialParams *DialParameters,
  558. livenessTestMetrics *livenessTestMetrics,
  559. bytesUp int64,
  560. bytesDown int64,
  561. tunnelErr error) error {
  562. if !config.GetClientParameters().Get().WeightedCoinFlip(
  563. parameters.RecordFailedTunnelPersistentStatsProbability) {
  564. return nil
  565. }
  566. lastConnected, err := getLastConnected()
  567. if err != nil {
  568. return errors.Trace(err)
  569. }
  570. params := getBaseAPIParameters(baseParametersAll, config, dialParams)
  571. delete(params, "server_secret")
  572. params["server_entry_tag"] = dialParams.ServerEntry.Tag
  573. params["last_connected"] = lastConnected
  574. params["client_failed_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  575. if livenessTestMetrics != nil {
  576. params["liveness_test_upstream_bytes"] = strconv.Itoa(livenessTestMetrics.UpstreamBytes)
  577. params["liveness_test_sent_upstream_bytes"] = strconv.Itoa(livenessTestMetrics.SentUpstreamBytes)
  578. params["liveness_test_downstream_bytes"] = strconv.Itoa(livenessTestMetrics.DownstreamBytes)
  579. params["liveness_test_received_downstream_bytes"] = strconv.Itoa(livenessTestMetrics.ReceivedDownstreamBytes)
  580. }
  581. if bytesUp >= 0 {
  582. params["bytes_up"] = fmt.Sprintf("%d", bytesUp)
  583. }
  584. if bytesDown >= 0 {
  585. params["bytes_down"] = fmt.Sprintf("%d", bytesDown)
  586. }
  587. // Ensure direct server IPs are not exposed in logs. The "net" package, and
  588. // possibly other 3rd party packages, will include destination addresses in
  589. // I/O error messages.
  590. tunnelError := StripIPAddressesString(tunnelErr.Error())
  591. params["tunnel_error"] = tunnelError
  592. failedTunnelStatJson, err := json.Marshal(params)
  593. if err != nil {
  594. return errors.Trace(err)
  595. }
  596. return StorePersistentStat(
  597. config, datastorePersistentStatTypeFailedTunnel, failedTunnelStatJson)
  598. }
  599. // doGetRequest makes a tunneled HTTPS request and returns the response body.
  600. func (serverContext *ServerContext) doGetRequest(
  601. requestUrl string) (responseBody []byte, err error) {
  602. request, err := http.NewRequest("GET", requestUrl, nil)
  603. if err != nil {
  604. return nil, errors.Trace(err)
  605. }
  606. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  607. response, err := serverContext.psiphonHttpsClient.Do(request)
  608. if err == nil && response.StatusCode != http.StatusOK {
  609. response.Body.Close()
  610. err = fmt.Errorf("HTTP GET request failed with response code: %d", response.StatusCode)
  611. }
  612. if err != nil {
  613. // Trim this error since it may include long URLs
  614. return nil, errors.Trace(TrimError(err))
  615. }
  616. defer response.Body.Close()
  617. body, err := ioutil.ReadAll(response.Body)
  618. if err != nil {
  619. return nil, errors.Trace(err)
  620. }
  621. return body, nil
  622. }
  623. // doPostRequest makes a tunneled HTTPS POST request.
  624. func (serverContext *ServerContext) doPostRequest(
  625. requestUrl string, bodyType string, body io.Reader) (responseBody []byte, err error) {
  626. request, err := http.NewRequest("POST", requestUrl, body)
  627. if err != nil {
  628. return nil, errors.Trace(err)
  629. }
  630. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  631. request.Header.Set("Content-Type", bodyType)
  632. response, err := serverContext.psiphonHttpsClient.Do(request)
  633. if err == nil && response.StatusCode != http.StatusOK {
  634. response.Body.Close()
  635. err = fmt.Errorf("HTTP POST request failed with response code: %d", response.StatusCode)
  636. }
  637. if err != nil {
  638. // Trim this error since it may include long URLs
  639. return nil, errors.Trace(TrimError(err))
  640. }
  641. defer response.Body.Close()
  642. responseBody, err = ioutil.ReadAll(response.Body)
  643. if err != nil {
  644. return nil, errors.Trace(err)
  645. }
  646. return responseBody, nil
  647. }
  648. // makeSSHAPIRequestPayload makes a JSON payload for an SSH API request.
  649. func (serverContext *ServerContext) makeSSHAPIRequestPayload(
  650. params common.APIParameters) ([]byte, error) {
  651. jsonPayload, err := json.Marshal(params)
  652. if err != nil {
  653. return nil, errors.Trace(err)
  654. }
  655. return jsonPayload, nil
  656. }
  657. type baseParametersFilter int
  658. const (
  659. baseParametersAll baseParametersFilter = iota
  660. baseParametersOnlyUpstreamFragmentorDialParameters
  661. baseParametersNoDialParameters
  662. )
  663. func (serverContext *ServerContext) getBaseAPIParameters(
  664. filter baseParametersFilter) common.APIParameters {
  665. params := getBaseAPIParameters(
  666. filter,
  667. serverContext.tunnel.config,
  668. serverContext.tunnel.dialParams)
  669. // Add a random amount of padding to defend against API call traffic size
  670. // fingerprints. The "pad_response" field instructs the server to pad its
  671. // response accordingly.
  672. p := serverContext.tunnel.config.GetClientParameters().Get()
  673. minUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMinBytes)
  674. maxUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMaxBytes)
  675. minDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMinBytes)
  676. maxDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMaxBytes)
  677. if maxUpstreamPadding > 0 {
  678. size := serverContext.paddingPRNG.Range(minUpstreamPadding, maxUpstreamPadding)
  679. params["padding"] = strings.Repeat(" ", size)
  680. }
  681. if maxDownstreamPadding > 0 {
  682. size := serverContext.paddingPRNG.Range(minDownstreamPadding, maxDownstreamPadding)
  683. params["pad_response"] = strconv.Itoa(size)
  684. }
  685. return params
  686. }
  687. // getBaseAPIParameters returns all the common API parameters that are
  688. // included with each Psiphon API request. These common parameters are used
  689. // for metrics.
  690. func getBaseAPIParameters(
  691. filter baseParametersFilter,
  692. config *Config,
  693. dialParams *DialParameters) common.APIParameters {
  694. params := make(common.APIParameters)
  695. params["session_id"] = config.SessionID
  696. params["client_session_id"] = config.SessionID
  697. params["server_secret"] = dialParams.ServerEntry.WebServerSecret
  698. params["propagation_channel_id"] = config.PropagationChannelId
  699. params["sponsor_id"] = config.GetSponsorID()
  700. params["client_version"] = config.ClientVersion
  701. params["client_platform"] = config.ClientPlatform
  702. params["client_build_rev"] = buildinfo.GetBuildInfo().BuildRev
  703. params["tunnel_whole_device"] = strconv.Itoa(config.TunnelWholeDevice)
  704. // Blank parameters must be omitted.
  705. if config.DeviceRegion != "" {
  706. params["device_region"] = config.DeviceRegion
  707. }
  708. if filter == baseParametersAll {
  709. params["relay_protocol"] = dialParams.TunnelProtocol
  710. params["network_type"] = dialParams.GetNetworkType()
  711. if dialParams.BPFProgramName != "" {
  712. params["client_bpf"] = dialParams.BPFProgramName
  713. }
  714. if dialParams.SelectedSSHClientVersion {
  715. params["ssh_client_version"] = dialParams.SSHClientVersion
  716. }
  717. if dialParams.UpstreamProxyType != "" {
  718. params["upstream_proxy_type"] = dialParams.UpstreamProxyType
  719. }
  720. if dialParams.UpstreamProxyCustomHeaderNames != nil {
  721. params["upstream_proxy_custom_header_names"] = dialParams.UpstreamProxyCustomHeaderNames
  722. }
  723. if dialParams.FrontingProviderID != "" {
  724. params["fronting_provider_id"] = dialParams.FrontingProviderID
  725. }
  726. if dialParams.MeekDialAddress != "" {
  727. params["meek_dial_address"] = dialParams.MeekDialAddress
  728. }
  729. meekResolvedIPAddress := dialParams.MeekResolvedIPAddress.Load().(string)
  730. if meekResolvedIPAddress != "" {
  731. params["meek_resolved_ip_address"] = meekResolvedIPAddress
  732. }
  733. if dialParams.MeekSNIServerName != "" {
  734. params["meek_sni_server_name"] = dialParams.MeekSNIServerName
  735. }
  736. if dialParams.MeekHostHeader != "" {
  737. params["meek_host_header"] = dialParams.MeekHostHeader
  738. }
  739. // MeekTransformedHostName is meaningful when meek is used, which is when
  740. // MeekDialAddress != ""
  741. if dialParams.MeekDialAddress != "" {
  742. transformedHostName := "0"
  743. if dialParams.MeekTransformedHostName {
  744. transformedHostName = "1"
  745. }
  746. params["meek_transformed_host_name"] = transformedHostName
  747. }
  748. if dialParams.SelectedUserAgent {
  749. params["user_agent"] = dialParams.UserAgent
  750. }
  751. if dialParams.SelectedTLSProfile {
  752. params["tls_profile"] = dialParams.TLSProfile
  753. params["tls_version"] = dialParams.GetTLSVersionForMetrics()
  754. }
  755. if dialParams.ServerEntry.Region != "" {
  756. params["server_entry_region"] = dialParams.ServerEntry.Region
  757. }
  758. if dialParams.ServerEntry.LocalSource != "" {
  759. params["server_entry_source"] = dialParams.ServerEntry.LocalSource
  760. }
  761. // As with last_connected, this timestamp stat, which may be a precise
  762. // handshake request server timestamp, is truncated to hour granularity to
  763. // avoid introducing a reconstructable cross-session user trace into server
  764. // logs.
  765. localServerEntryTimestamp := common.TruncateTimestampToHour(
  766. dialParams.ServerEntry.LocalTimestamp)
  767. if localServerEntryTimestamp != "" {
  768. params["server_entry_timestamp"] = localServerEntryTimestamp
  769. }
  770. params[tactics.APPLIED_TACTICS_TAG_PARAMETER_NAME] =
  771. config.GetClientParameters().Get().Tag()
  772. if dialParams.DialPortNumber != "" {
  773. params["dial_port_number"] = dialParams.DialPortNumber
  774. }
  775. if dialParams.QUICVersion != "" {
  776. params["quic_version"] = dialParams.QUICVersion
  777. }
  778. if dialParams.QUICDialSNIAddress != "" {
  779. params["quic_dial_sni_address"] = dialParams.QUICDialSNIAddress
  780. }
  781. isReplay := "0"
  782. if dialParams.IsReplay {
  783. isReplay = "1"
  784. }
  785. params["is_replay"] = isReplay
  786. if config.EgressRegion != "" {
  787. params["egress_region"] = config.EgressRegion
  788. }
  789. // dialParams.DialDuration is nanoseconds; divide to get to milliseconds
  790. params["dial_duration"] = fmt.Sprintf("%d", dialParams.DialDuration/1000000)
  791. params["candidate_number"] = strconv.Itoa(dialParams.CandidateNumber)
  792. params["established_tunnels_count"] = strconv.Itoa(dialParams.EstablishedTunnelsCount)
  793. if dialParams.NetworkLatencyMultiplier != 0.0 {
  794. params["network_latency_multiplier"] =
  795. fmt.Sprintf("%f", dialParams.NetworkLatencyMultiplier)
  796. }
  797. if dialParams.DialConnMetrics != nil {
  798. metrics := dialParams.DialConnMetrics.GetMetrics()
  799. for name, value := range metrics {
  800. params[name] = fmt.Sprintf("%v", value)
  801. }
  802. }
  803. if dialParams.ObfuscatedSSHConnMetrics != nil {
  804. metrics := dialParams.ObfuscatedSSHConnMetrics.GetMetrics()
  805. for name, value := range metrics {
  806. params[name] = fmt.Sprintf("%v", value)
  807. }
  808. }
  809. } else if filter == baseParametersOnlyUpstreamFragmentorDialParameters {
  810. if dialParams.DialConnMetrics != nil {
  811. names := fragmentor.GetUpstreamMetricsNames()
  812. metrics := dialParams.DialConnMetrics.GetMetrics()
  813. for name, value := range metrics {
  814. if common.Contains(names, name) {
  815. params[name] = fmt.Sprintf("%v", value)
  816. }
  817. }
  818. }
  819. }
  820. return params
  821. }
  822. // makeRequestUrl makes a URL for a web service API request.
  823. func makeRequestUrl(tunnel *Tunnel, port, path string, params common.APIParameters) string {
  824. var requestUrl bytes.Buffer
  825. if port == "" {
  826. port = tunnel.dialParams.ServerEntry.WebServerPort
  827. }
  828. requestUrl.WriteString("https://")
  829. requestUrl.WriteString(tunnel.dialParams.ServerEntry.IpAddress)
  830. requestUrl.WriteString(":")
  831. requestUrl.WriteString(port)
  832. requestUrl.WriteString("/")
  833. requestUrl.WriteString(path)
  834. if len(params) > 0 {
  835. queryParams := url.Values{}
  836. for name, value := range params {
  837. // Note: this logic skips the tactics.SPEED_TEST_SAMPLES_PARAMETER_NAME
  838. // parameter, which has a different type. This parameter is not recognized
  839. // by legacy servers.
  840. switch v := value.(type) {
  841. case string:
  842. queryParams.Set(name, v)
  843. case []string:
  844. // String array param encoded as JSON
  845. jsonValue, err := json.Marshal(v)
  846. if err != nil {
  847. break
  848. }
  849. queryParams.Set(name, string(jsonValue))
  850. }
  851. }
  852. requestUrl.WriteString("?")
  853. requestUrl.WriteString(queryParams.Encode())
  854. }
  855. return requestUrl.String()
  856. }
  857. // makePsiphonHttpsClient creates a Psiphon HTTPS client that tunnels web service API
  858. // requests and which validates the web server using the Psiphon server entry web server
  859. // certificate.
  860. func makePsiphonHttpsClient(tunnel *Tunnel) (httpsClient *http.Client, err error) {
  861. certificate, err := DecodeCertificate(
  862. tunnel.dialParams.ServerEntry.WebServerCertificate)
  863. if err != nil {
  864. return nil, errors.Trace(err)
  865. }
  866. tunneledDialer := func(_ context.Context, _, addr string) (conn net.Conn, err error) {
  867. return tunnel.sshClient.Dial("tcp", addr)
  868. }
  869. // Note: as with SSH API requests, there no dial context here. SSH port forward dials
  870. // cannot be interrupted directly. Closing the tunnel will interrupt both the dial and
  871. // the request. While it's possible to add a timeout here, we leave it with no explicit
  872. // timeout which is the same as SSH API requests: if the tunnel has stalled then SSH keep
  873. // alives will cause the tunnel to close.
  874. dialer := NewCustomTLSDialer(
  875. &CustomTLSConfig{
  876. ClientParameters: tunnel.config.clientParameters,
  877. Dial: tunneledDialer,
  878. VerifyLegacyCertificate: certificate,
  879. })
  880. transport := &http.Transport{
  881. DialTLS: func(network, addr string) (net.Conn, error) {
  882. return dialer(context.Background(), network, addr)
  883. },
  884. Dial: func(network, addr string) (net.Conn, error) {
  885. return nil, errors.TraceNew("HTTP not supported")
  886. },
  887. }
  888. return &http.Client{
  889. Transport: transport,
  890. }, nil
  891. }
  892. func HandleServerRequest(
  893. tunnelOwner TunnelOwner, tunnel *Tunnel, name string, payload []byte) error {
  894. switch name {
  895. case protocol.PSIPHON_API_OSL_REQUEST_NAME:
  896. return HandleOSLRequest(tunnelOwner, tunnel, payload)
  897. case protocol.PSIPHON_API_ALERT_REQUEST_NAME:
  898. return HandleAlertRequest(tunnelOwner, tunnel, payload)
  899. }
  900. return errors.Tracef("invalid request name: %s", name)
  901. }
  902. func HandleOSLRequest(
  903. tunnelOwner TunnelOwner, tunnel *Tunnel, payload []byte) error {
  904. var oslRequest protocol.OSLRequest
  905. err := json.Unmarshal(payload, &oslRequest)
  906. if err != nil {
  907. return errors.Trace(err)
  908. }
  909. if oslRequest.ClearLocalSLOKs {
  910. DeleteSLOKs()
  911. }
  912. seededNewSLOK := false
  913. for _, slok := range oslRequest.SeedPayload.SLOKs {
  914. duplicate, err := SetSLOK(slok.ID, slok.Key)
  915. if err != nil {
  916. // TODO: return error to trigger retry?
  917. NoticeWarning("SetSLOK failed: %s", errors.Trace(err))
  918. } else if !duplicate {
  919. seededNewSLOK = true
  920. }
  921. if tunnel.config.EmitSLOKs {
  922. NoticeSLOKSeeded(base64.StdEncoding.EncodeToString(slok.ID), duplicate)
  923. }
  924. }
  925. if seededNewSLOK {
  926. tunnelOwner.SignalSeededNewSLOK()
  927. }
  928. return nil
  929. }
  930. func HandleAlertRequest(
  931. tunnelOwner TunnelOwner, tunnel *Tunnel, payload []byte) error {
  932. var alertRequest protocol.AlertRequest
  933. err := json.Unmarshal(payload, &alertRequest)
  934. if err != nil {
  935. return errors.Trace(err)
  936. }
  937. if tunnel.config.EmitServerAlerts {
  938. NoticeServerAlert(alertRequest)
  939. }
  940. return nil
  941. }