serverApi.go 31 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000
  1. /*
  2. * Copyright (c) 2015, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/base64"
  24. "encoding/hex"
  25. "encoding/json"
  26. "errors"
  27. "fmt"
  28. "io"
  29. "io/ioutil"
  30. "net"
  31. "net/http"
  32. "net/url"
  33. "regexp"
  34. "strconv"
  35. "strings"
  36. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  37. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  38. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  39. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  40. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/tactics"
  41. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/transferstats"
  42. )
  43. // ServerContext is a utility struct which holds all of the data associated
  44. // with a Psiphon server connection. In addition to the established tunnel, this
  45. // includes data and transport mechanisms for Psiphon API requests. Legacy servers
  46. // offer the Psiphon API through a web service; newer servers offer the Psiphon
  47. // API through SSH requests made directly through the tunnel's SSH client.
  48. type ServerContext struct {
  49. tunnel *Tunnel
  50. psiphonHttpsClient *http.Client
  51. statsRegexps *transferstats.Regexps
  52. clientRegion string
  53. clientUpgradeVersion string
  54. serverHandshakeTimestamp string
  55. paddingPRNG *prng.PRNG
  56. }
  57. // MakeSessionId creates a new session ID. The same session ID is used across
  58. // multi-tunnel controller runs, where each tunnel has its own ServerContext
  59. // instance.
  60. // In server-side stats, we now consider a "session" to be the lifetime of the
  61. // Controller (e.g., the user's commanded start and stop) and we measure this
  62. // duration as well as the duration of each tunnel within the session.
  63. func MakeSessionId() (string, error) {
  64. randomId, err := common.MakeSecureRandomBytes(protocol.PSIPHON_API_CLIENT_SESSION_ID_LENGTH)
  65. if err != nil {
  66. return "", common.ContextError(err)
  67. }
  68. return hex.EncodeToString(randomId), nil
  69. }
  70. // NewServerContext makes the tunneled handshake request to the Psiphon server
  71. // and returns a ServerContext struct for use with subsequent Psiphon server API
  72. // requests (e.g., periodic connected and status requests).
  73. func NewServerContext(tunnel *Tunnel) (*ServerContext, error) {
  74. // For legacy servers, set up psiphonHttpsClient for
  75. // accessing the Psiphon API via the web service.
  76. var psiphonHttpsClient *http.Client
  77. if !tunnel.dialParams.ServerEntry.SupportsSSHAPIRequests() ||
  78. tunnel.config.TargetApiProtocol == protocol.PSIPHON_WEB_API_PROTOCOL {
  79. var err error
  80. psiphonHttpsClient, err = makePsiphonHttpsClient(tunnel)
  81. if err != nil {
  82. return nil, common.ContextError(err)
  83. }
  84. }
  85. serverContext := &ServerContext{
  86. tunnel: tunnel,
  87. psiphonHttpsClient: psiphonHttpsClient,
  88. paddingPRNG: prng.NewPRNGWithSeed(tunnel.dialParams.APIRequestPaddingSeed),
  89. }
  90. ignoreRegexps := tunnel.config.clientParameters.Get().Bool(parameters.IgnoreHandshakeStatsRegexps)
  91. err := serverContext.doHandshakeRequest(ignoreRegexps)
  92. if err != nil {
  93. return nil, common.ContextError(err)
  94. }
  95. return serverContext, nil
  96. }
  97. // doHandshakeRequest performs the "handshake" API request. The handshake
  98. // returns upgrade info, newly discovered server entries -- which are
  99. // stored -- and sponsor info (home pages, stat regexes).
  100. func (serverContext *ServerContext) doHandshakeRequest(
  101. ignoreStatsRegexps bool) error {
  102. params := serverContext.getBaseAPIParameters()
  103. doTactics := !serverContext.tunnel.config.DisableTactics
  104. networkID := ""
  105. if doTactics {
  106. // Limitation: it is assumed that the network ID obtained here is the
  107. // one that is active when the handshake request is received by the
  108. // server. However, it is remotely possible to switch networks
  109. // immediately after invoking the GetNetworkID callback and initiating
  110. // the handshake, if the tunnel protocol is meek.
  111. //
  112. // The response handling code below calls GetNetworkID again and ignores
  113. // any tactics payload if the network ID is not the same. While this
  114. // doesn't detect all cases of changing networks, it reduces the already
  115. // narrow window.
  116. networkID = serverContext.tunnel.config.GetNetworkID()
  117. err := tactics.SetTacticsAPIParameters(
  118. serverContext.tunnel.config.clientParameters, GetTacticsStorer(), networkID, params)
  119. if err != nil {
  120. return common.ContextError(err)
  121. }
  122. }
  123. var response []byte
  124. if serverContext.psiphonHttpsClient == nil {
  125. params[protocol.PSIPHON_API_HANDSHAKE_AUTHORIZATIONS] =
  126. serverContext.tunnel.config.GetAuthorizations()
  127. request, err := serverContext.makeSSHAPIRequestPayload(params)
  128. if err != nil {
  129. return common.ContextError(err)
  130. }
  131. response, err = serverContext.tunnel.SendAPIRequest(
  132. protocol.PSIPHON_API_HANDSHAKE_REQUEST_NAME, request)
  133. if err != nil {
  134. return common.ContextError(err)
  135. }
  136. } else {
  137. // Legacy web service API request
  138. responseBody, err := serverContext.doGetRequest(
  139. makeRequestUrl(serverContext.tunnel, "", "handshake", params))
  140. if err != nil {
  141. return common.ContextError(err)
  142. }
  143. // Skip legacy format lines and just parse the JSON config line
  144. configLinePrefix := []byte("Config: ")
  145. for _, line := range bytes.Split(responseBody, []byte("\n")) {
  146. if bytes.HasPrefix(line, configLinePrefix) {
  147. response = line[len(configLinePrefix):]
  148. break
  149. }
  150. }
  151. if len(response) == 0 {
  152. return common.ContextError(errors.New("no config line found"))
  153. }
  154. }
  155. // Legacy fields:
  156. // - 'preemptive_reconnect_lifetime_milliseconds' is unused and ignored
  157. // - 'ssh_session_id' is ignored; client session ID is used instead
  158. var handshakeResponse protocol.HandshakeResponse
  159. err := json.Unmarshal(response, &handshakeResponse)
  160. if err != nil {
  161. return common.ContextError(err)
  162. }
  163. serverContext.clientRegion = handshakeResponse.ClientRegion
  164. NoticeClientRegion(serverContext.clientRegion)
  165. var serverEntries []protocol.ServerEntryFields
  166. // Store discovered server entries
  167. // We use the server's time, as it's available here, for the server entry
  168. // timestamp since this is more reliable than the client time.
  169. for _, encodedServerEntry := range handshakeResponse.EncodedServerList {
  170. serverEntryFields, err := protocol.DecodeServerEntryFields(
  171. encodedServerEntry,
  172. common.TruncateTimestampToHour(handshakeResponse.ServerTimestamp),
  173. protocol.SERVER_ENTRY_SOURCE_DISCOVERY)
  174. if err != nil {
  175. return common.ContextError(err)
  176. }
  177. err = protocol.ValidateServerEntryFields(serverEntryFields)
  178. if err != nil {
  179. // Skip this entry and continue with the next one
  180. NoticeAlert("invalid handshake server entry: %s", err)
  181. continue
  182. }
  183. serverEntries = append(serverEntries, serverEntryFields)
  184. }
  185. // The reason we are storing the entire array of server entries at once rather
  186. // than one at a time is that some desirable side-effects get triggered by
  187. // StoreServerEntries that don't get triggered by StoreServerEntry.
  188. err = StoreServerEntries(
  189. serverContext.tunnel.config,
  190. serverEntries,
  191. true)
  192. if err != nil {
  193. return common.ContextError(err)
  194. }
  195. NoticeHomepages(handshakeResponse.Homepages)
  196. serverContext.clientUpgradeVersion = handshakeResponse.UpgradeClientVersion
  197. if handshakeResponse.UpgradeClientVersion != "" {
  198. NoticeClientUpgradeAvailable(handshakeResponse.UpgradeClientVersion)
  199. } else {
  200. NoticeClientIsLatestVersion("")
  201. }
  202. if !ignoreStatsRegexps {
  203. var regexpsNotices []string
  204. serverContext.statsRegexps, regexpsNotices = transferstats.MakeRegexps(
  205. handshakeResponse.PageViewRegexes,
  206. handshakeResponse.HttpsRequestRegexes)
  207. for _, notice := range regexpsNotices {
  208. NoticeAlert(notice)
  209. }
  210. }
  211. serverContext.serverHandshakeTimestamp = handshakeResponse.ServerTimestamp
  212. NoticeServerTimestamp(serverContext.serverHandshakeTimestamp)
  213. NoticeActiveAuthorizationIDs(handshakeResponse.ActiveAuthorizationIDs)
  214. if doTactics && handshakeResponse.TacticsPayload != nil &&
  215. networkID == serverContext.tunnel.config.GetNetworkID() {
  216. var payload *tactics.Payload
  217. err := json.Unmarshal(handshakeResponse.TacticsPayload, &payload)
  218. if err != nil {
  219. return common.ContextError(err)
  220. }
  221. // handshakeResponse.TacticsPayload may be "null", and payload
  222. // will successfully unmarshal as nil. As a result, the previous
  223. // handshakeResponse.TacticsPayload != nil test is insufficient.
  224. if payload != nil {
  225. tacticsRecord, err := tactics.HandleTacticsPayload(
  226. GetTacticsStorer(),
  227. networkID,
  228. payload)
  229. if err != nil {
  230. return common.ContextError(err)
  231. }
  232. if tacticsRecord != nil &&
  233. prng.FlipWeightedCoin(tacticsRecord.Tactics.Probability) {
  234. err := serverContext.tunnel.config.SetClientParameters(
  235. tacticsRecord.Tag, true, tacticsRecord.Tactics.Parameters)
  236. if err != nil {
  237. NoticeInfo("apply handshake tactics failed: %s", err)
  238. }
  239. // The error will be due to invalid tactics values from
  240. // the server. When ApplyClientParameters fails, all
  241. // previous tactics values are left in place.
  242. }
  243. }
  244. }
  245. return nil
  246. }
  247. // DoConnectedRequest performs the "connected" API request. This request is
  248. // used for statistics. The server returns a last_connected token for
  249. // the client to store and send next time it connects. This token is
  250. // a timestamp (using the server clock, and should be rounded to the
  251. // nearest hour) which is used to determine when a connection represents
  252. // a unique user for a time period.
  253. func (serverContext *ServerContext) DoConnectedRequest() error {
  254. params := serverContext.getBaseAPIParameters()
  255. lastConnected, err := getLastConnected()
  256. if err != nil {
  257. return common.ContextError(err)
  258. }
  259. params["last_connected"] = lastConnected
  260. // serverContext.tunnel.establishDuration is nanoseconds; divide to get to milliseconds
  261. params["establishment_duration"] =
  262. fmt.Sprintf("%d", serverContext.tunnel.establishDuration/1000000)
  263. var response []byte
  264. if serverContext.psiphonHttpsClient == nil {
  265. request, err := serverContext.makeSSHAPIRequestPayload(params)
  266. if err != nil {
  267. return common.ContextError(err)
  268. }
  269. response, err = serverContext.tunnel.SendAPIRequest(
  270. protocol.PSIPHON_API_CONNECTED_REQUEST_NAME, request)
  271. if err != nil {
  272. return common.ContextError(err)
  273. }
  274. } else {
  275. // Legacy web service API request
  276. response, err = serverContext.doGetRequest(
  277. makeRequestUrl(serverContext.tunnel, "", "connected", params))
  278. if err != nil {
  279. return common.ContextError(err)
  280. }
  281. }
  282. var connectedResponse protocol.ConnectedResponse
  283. err = json.Unmarshal(response, &connectedResponse)
  284. if err != nil {
  285. return common.ContextError(err)
  286. }
  287. err = SetKeyValue(
  288. datastoreLastConnectedKey, connectedResponse.ConnectedTimestamp)
  289. if err != nil {
  290. return common.ContextError(err)
  291. }
  292. return nil
  293. }
  294. func getLastConnected() (string, error) {
  295. lastConnected, err := GetKeyValue(datastoreLastConnectedKey)
  296. if err != nil {
  297. return "", common.ContextError(err)
  298. }
  299. if lastConnected == "" {
  300. lastConnected = "None"
  301. }
  302. return lastConnected, nil
  303. }
  304. // StatsRegexps gets the Regexps used for the statistics for this tunnel.
  305. func (serverContext *ServerContext) StatsRegexps() *transferstats.Regexps {
  306. return serverContext.statsRegexps
  307. }
  308. // DoStatusRequest makes a "status" API request to the server, sending session stats.
  309. func (serverContext *ServerContext) DoStatusRequest(tunnel *Tunnel) error {
  310. params := serverContext.getStatusParams(true)
  311. // Note: ensure putBackStatusRequestPayload is called, to replace
  312. // payload for future attempt, in all failure cases.
  313. statusPayload, statusPayloadInfo, err := makeStatusRequestPayload(
  314. serverContext.tunnel.config,
  315. tunnel.dialParams.ServerEntry.IpAddress)
  316. if err != nil {
  317. return common.ContextError(err)
  318. }
  319. // Skip the request when there's no payload to send.
  320. if len(statusPayload) == 0 {
  321. return nil
  322. }
  323. if serverContext.psiphonHttpsClient == nil {
  324. rawMessage := json.RawMessage(statusPayload)
  325. params["statusData"] = &rawMessage
  326. var request []byte
  327. request, err = serverContext.makeSSHAPIRequestPayload(params)
  328. if err == nil {
  329. _, err = serverContext.tunnel.SendAPIRequest(
  330. protocol.PSIPHON_API_STATUS_REQUEST_NAME, request)
  331. }
  332. } else {
  333. // Legacy web service API request
  334. _, err = serverContext.doPostRequest(
  335. makeRequestUrl(serverContext.tunnel, "", "status", params),
  336. "application/json",
  337. bytes.NewReader(statusPayload))
  338. }
  339. if err != nil {
  340. // Resend the transfer stats and tunnel stats later
  341. // Note: potential duplicate reports if the server received and processed
  342. // the request but the client failed to receive the response.
  343. putBackStatusRequestPayload(statusPayloadInfo)
  344. return common.ContextError(err)
  345. }
  346. confirmStatusRequestPayload(statusPayloadInfo)
  347. return nil
  348. }
  349. func (serverContext *ServerContext) getStatusParams(
  350. isTunneled bool) common.APIParameters {
  351. params := serverContext.getBaseAPIParameters()
  352. // Legacy clients set "connected" to "0" when disconnecting, and this value
  353. // is used to calculate session duration estimates. This is now superseded
  354. // by explicit tunnel stats duration reporting.
  355. // The legacy method of reconstructing session durations is not compatible
  356. // with this client's connected request retries and asynchronous final
  357. // status request attempts. So we simply set this "connected" flag to reflect
  358. // whether the request is sent tunneled or not.
  359. connected := "1"
  360. if !isTunneled {
  361. connected = "0"
  362. }
  363. params["connected"] = connected
  364. return params
  365. }
  366. // statusRequestPayloadInfo is a temporary structure for data used to
  367. // either "clear" or "put back" status request payload data depending
  368. // on whether or not the request succeeded.
  369. type statusRequestPayloadInfo struct {
  370. serverId string
  371. transferStats *transferstats.AccumulatedStats
  372. persistentStats map[string][][]byte
  373. }
  374. func makeStatusRequestPayload(
  375. config *Config,
  376. serverId string) ([]byte, *statusRequestPayloadInfo, error) {
  377. transferStats := transferstats.TakeOutStatsForServer(serverId)
  378. hostBytes := transferStats.GetStatsForStatusRequest()
  379. persistentStats, err := TakeOutUnreportedPersistentStats(config)
  380. if err != nil {
  381. NoticeAlert(
  382. "TakeOutUnreportedPersistentStats failed: %s", common.ContextError(err))
  383. persistentStats = nil
  384. // Proceed with transferStats only
  385. }
  386. if len(hostBytes) == 0 && len(persistentStats) == 0 {
  387. // There is no payload to send.
  388. return nil, nil, nil
  389. }
  390. payloadInfo := &statusRequestPayloadInfo{
  391. serverId, transferStats, persistentStats}
  392. payload := make(map[string]interface{})
  393. payload["host_bytes"] = hostBytes
  394. // We're not recording these fields, but legacy servers require them.
  395. payload["bytes_transferred"] = 0
  396. payload["page_views"] = make([]string, 0)
  397. payload["https_requests"] = make([]string, 0)
  398. persistentStatPayloadNames := make(map[string]string)
  399. persistentStatPayloadNames[datastorePersistentStatTypeRemoteServerList] = "remote_server_list_stats"
  400. persistentStatPayloadNames[datastorePersistentStatTypeFailedTunnel] = "failed_tunnel_stats"
  401. for statType, stats := range persistentStats {
  402. // Persistent stats records are already in JSON format
  403. jsonStats := make([]json.RawMessage, len(stats))
  404. for i, stat := range stats {
  405. jsonStats[i] = json.RawMessage(stat)
  406. }
  407. payload[persistentStatPayloadNames[statType]] = jsonStats
  408. }
  409. jsonPayload, err := json.Marshal(payload)
  410. if err != nil {
  411. // Send the transfer stats and tunnel stats later
  412. putBackStatusRequestPayload(payloadInfo)
  413. return nil, nil, common.ContextError(err)
  414. }
  415. return jsonPayload, payloadInfo, nil
  416. }
  417. func putBackStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  418. transferstats.PutBackStatsForServer(
  419. payloadInfo.serverId, payloadInfo.transferStats)
  420. err := PutBackUnreportedPersistentStats(payloadInfo.persistentStats)
  421. if err != nil {
  422. // These persistent stats records won't be resent until after a
  423. // datastore re-initialization.
  424. NoticeAlert(
  425. "PutBackUnreportedPersistentStats failed: %s", common.ContextError(err))
  426. }
  427. }
  428. func confirmStatusRequestPayload(payloadInfo *statusRequestPayloadInfo) {
  429. err := ClearReportedPersistentStats(payloadInfo.persistentStats)
  430. if err != nil {
  431. // These persistent stats records may be resent.
  432. NoticeAlert(
  433. "ClearReportedPersistentStats failed: %s", common.ContextError(err))
  434. }
  435. }
  436. // RecordRemoteServerListStat records a completed common or OSL
  437. // remote server list resource download.
  438. //
  439. // The RSL download event could occur when the client is unable
  440. // to immediately send a status request to a server, so these
  441. // records are stored in the persistent datastore and reported
  442. // via subsequent status requests sent to any Psiphon server.
  443. //
  444. // Note that some common event field values may change between the
  445. // stat recording and reporting, including client geolocation and
  446. // host_id.
  447. //
  448. // Multiple "status" requests may be in flight at once (due
  449. // to multi-tunnel, asynchronous final status retry, and
  450. // aggressive status requests for pre-registered tunnels),
  451. // To avoid duplicate reporting, persistent stats records are
  452. // "taken-out" by a status request and then "put back" in
  453. // case the request fails.
  454. //
  455. // Duplicate reporting may also occur when a server receives and
  456. // processes a status request but the client fails to receive
  457. // the response.
  458. func RecordRemoteServerListStat(
  459. config *Config, url, etag string) error {
  460. if !config.GetClientParameters().WeightedCoinFlip(
  461. parameters.RecordRemoteServerListPersistentStatsProbability) {
  462. return nil
  463. }
  464. params := make(common.APIParameters)
  465. params["session_id"] = config.SessionID
  466. params["propagation_channel_id"] = config.PropagationChannelId
  467. params["sponsor_id"] = config.GetSponsorID()
  468. params["client_version"] = config.ClientVersion
  469. params["client_platform"] = config.ClientPlatform
  470. params["client_build_rev"] = common.GetBuildInfo().BuildRev
  471. params["client_download_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  472. params["url"] = url
  473. params["etag"] = etag
  474. remoteServerListStatJson, err := json.Marshal(params)
  475. if err != nil {
  476. return common.ContextError(err)
  477. }
  478. return StorePersistentStat(
  479. config, datastorePersistentStatTypeRemoteServerList, remoteServerListStatJson)
  480. }
  481. // failedTunnelErrStripAddressRegex strips IPv4 address [and optional port]
  482. // strings from "net" package I/O error messages. This is to avoid
  483. // inadvertently recording direct server IPs via error message logs, and to
  484. // reduce the error space due to superfluous source port data.
  485. var failedTunnelErrStripAddressRegex = regexp.MustCompile(
  486. `(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)){3}(:(6553[0-5]|655[0-2][0-9]\d|65[0-4](\d){2}|6[0-4](\d){3}|[1-5](\d){4}|[1-9](\d){0,3}))?`)
  487. // RecordFailedTunnelStat records metrics for a failed tunnel dial, including
  488. // dial parameters and error condition (tunnelErr).
  489. //
  490. // This uses the same reporting facility, with the same caveats, as
  491. // RecordRemoteServerListStat.
  492. func RecordFailedTunnelStat(
  493. config *Config, dialParams *DialParameters, tunnelErr error) error {
  494. if !config.GetClientParameters().WeightedCoinFlip(
  495. parameters.RecordFailedTunnelPersistentStatsProbability) {
  496. return nil
  497. }
  498. lastConnected, err := getLastConnected()
  499. if err != nil {
  500. return common.ContextError(err)
  501. }
  502. params := getBaseAPIParameters(config, dialParams)
  503. params["server_entry_ip_address"] = dialParams.ServerEntry.IpAddress
  504. params["last_connected"] = lastConnected
  505. params["client_failed_timestamp"] = common.TruncateTimestampToHour(common.GetCurrentTimestamp())
  506. params["tunnel_error"] = failedTunnelErrStripAddressRegex.ReplaceAllString(tunnelErr.Error(), "<address>")
  507. failedTunnelStatJson, err := json.Marshal(params)
  508. if err != nil {
  509. return common.ContextError(err)
  510. }
  511. return StorePersistentStat(
  512. config, datastorePersistentStatTypeFailedTunnel, failedTunnelStatJson)
  513. }
  514. // doGetRequest makes a tunneled HTTPS request and returns the response body.
  515. func (serverContext *ServerContext) doGetRequest(
  516. requestUrl string) (responseBody []byte, err error) {
  517. request, err := http.NewRequest("GET", requestUrl, nil)
  518. if err != nil {
  519. return nil, common.ContextError(err)
  520. }
  521. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  522. response, err := serverContext.psiphonHttpsClient.Do(request)
  523. if err == nil && response.StatusCode != http.StatusOK {
  524. response.Body.Close()
  525. err = fmt.Errorf("HTTP GET request failed with response code: %d", response.StatusCode)
  526. }
  527. if err != nil {
  528. // Trim this error since it may include long URLs
  529. return nil, common.ContextError(TrimError(err))
  530. }
  531. defer response.Body.Close()
  532. body, err := ioutil.ReadAll(response.Body)
  533. if err != nil {
  534. return nil, common.ContextError(err)
  535. }
  536. return body, nil
  537. }
  538. // doPostRequest makes a tunneled HTTPS POST request.
  539. func (serverContext *ServerContext) doPostRequest(
  540. requestUrl string, bodyType string, body io.Reader) (responseBody []byte, err error) {
  541. request, err := http.NewRequest("POST", requestUrl, body)
  542. if err != nil {
  543. return nil, common.ContextError(err)
  544. }
  545. request.Header.Set("User-Agent", MakePsiphonUserAgent(serverContext.tunnel.config))
  546. request.Header.Set("Content-Type", bodyType)
  547. response, err := serverContext.psiphonHttpsClient.Do(request)
  548. if err == nil && response.StatusCode != http.StatusOK {
  549. response.Body.Close()
  550. err = fmt.Errorf("HTTP POST request failed with response code: %d", response.StatusCode)
  551. }
  552. if err != nil {
  553. // Trim this error since it may include long URLs
  554. return nil, common.ContextError(TrimError(err))
  555. }
  556. defer response.Body.Close()
  557. responseBody, err = ioutil.ReadAll(response.Body)
  558. if err != nil {
  559. return nil, common.ContextError(err)
  560. }
  561. return responseBody, nil
  562. }
  563. // makeSSHAPIRequestPayload makes a JSON payload for an SSH API request.
  564. func (serverContext *ServerContext) makeSSHAPIRequestPayload(
  565. params common.APIParameters) ([]byte, error) {
  566. jsonPayload, err := json.Marshal(params)
  567. if err != nil {
  568. return nil, common.ContextError(err)
  569. }
  570. return jsonPayload, nil
  571. }
  572. func (serverContext *ServerContext) getBaseAPIParameters() common.APIParameters {
  573. params := getBaseAPIParameters(
  574. serverContext.tunnel.config,
  575. serverContext.tunnel.dialParams)
  576. // Add a random amount of padding to defend against API call traffic size
  577. // fingerprints. The "pad_response" field instructs the server to pad its
  578. // response accordingly.
  579. p := serverContext.tunnel.config.GetClientParameters()
  580. minUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMinBytes)
  581. maxUpstreamPadding := p.Int(parameters.APIRequestUpstreamPaddingMaxBytes)
  582. minDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMinBytes)
  583. maxDownstreamPadding := p.Int(parameters.APIRequestDownstreamPaddingMaxBytes)
  584. if maxUpstreamPadding > 0 {
  585. size := serverContext.paddingPRNG.Range(minUpstreamPadding, maxUpstreamPadding)
  586. params["padding"] = strings.Repeat(" ", size)
  587. }
  588. if maxDownstreamPadding > 0 {
  589. size := serverContext.paddingPRNG.Range(minDownstreamPadding, maxDownstreamPadding)
  590. params["pad_response"] = strconv.Itoa(size)
  591. }
  592. return params
  593. }
  594. // getBaseAPIParameters returns all the common API parameters that are
  595. // included with each Psiphon API request. These common parameters are used
  596. // for metrics.
  597. func getBaseAPIParameters(
  598. config *Config,
  599. dialParams *DialParameters) common.APIParameters {
  600. params := make(common.APIParameters)
  601. params["session_id"] = config.SessionID
  602. params["client_session_id"] = config.SessionID
  603. params["server_secret"] = dialParams.ServerEntry.WebServerSecret
  604. params["propagation_channel_id"] = config.PropagationChannelId
  605. params["sponsor_id"] = config.GetSponsorID()
  606. params["client_version"] = config.ClientVersion
  607. params["relay_protocol"] = dialParams.TunnelProtocol
  608. params["client_platform"] = config.ClientPlatform
  609. params["client_build_rev"] = common.GetBuildInfo().BuildRev
  610. params["tunnel_whole_device"] = strconv.Itoa(config.TunnelWholeDevice)
  611. // The following parameters may be blank and must
  612. // not be sent to the server if blank.
  613. if config.DeviceRegion != "" {
  614. params["device_region"] = config.DeviceRegion
  615. }
  616. if dialParams.SelectedSSHClientVersion {
  617. params["ssh_client_version"] = dialParams.SSHClientVersion
  618. }
  619. if dialParams.UpstreamProxyType != "" {
  620. params["upstream_proxy_type"] = dialParams.UpstreamProxyType
  621. }
  622. if dialParams.UpstreamProxyCustomHeaderNames != nil {
  623. params["upstream_proxy_custom_header_names"] = dialParams.UpstreamProxyCustomHeaderNames
  624. }
  625. if dialParams.MeekDialAddress != "" {
  626. params["meek_dial_address"] = dialParams.MeekDialAddress
  627. }
  628. meekResolvedIPAddress := dialParams.MeekResolvedIPAddress.Load().(string)
  629. if meekResolvedIPAddress != "" {
  630. params["meek_resolved_ip_address"] = meekResolvedIPAddress
  631. }
  632. if dialParams.MeekSNIServerName != "" {
  633. params["meek_sni_server_name"] = dialParams.MeekSNIServerName
  634. }
  635. if dialParams.MeekHostHeader != "" {
  636. params["meek_host_header"] = dialParams.MeekHostHeader
  637. }
  638. // MeekTransformedHostName is meaningful when meek is used, which is when MeekDialAddress != ""
  639. if dialParams.MeekDialAddress != "" {
  640. transformedHostName := "0"
  641. if dialParams.MeekTransformedHostName {
  642. transformedHostName = "1"
  643. }
  644. params["meek_transformed_host_name"] = transformedHostName
  645. }
  646. if dialParams.SelectedUserAgent {
  647. params["user_agent"] = dialParams.UserAgent
  648. }
  649. if dialParams.SelectedTLSProfile {
  650. params["tls_profile"] = dialParams.TLSProfile
  651. params["tls_version"] = dialParams.TLSVersion
  652. }
  653. if dialParams.ServerEntry.Region != "" {
  654. params["server_entry_region"] = dialParams.ServerEntry.Region
  655. }
  656. if dialParams.ServerEntry.LocalSource != "" {
  657. params["server_entry_source"] = dialParams.ServerEntry.LocalSource
  658. }
  659. // As with last_connected, this timestamp stat, which may be
  660. // a precise handshake request server timestamp, is truncated
  661. // to hour granularity to avoid introducing a reconstructable
  662. // cross-session user trace into server logs.
  663. localServerEntryTimestamp := common.TruncateTimestampToHour(
  664. dialParams.ServerEntry.LocalTimestamp)
  665. if localServerEntryTimestamp != "" {
  666. params["server_entry_timestamp"] = localServerEntryTimestamp
  667. }
  668. params[tactics.APPLIED_TACTICS_TAG_PARAMETER_NAME] = config.clientParameters.Get().Tag()
  669. if dialParams.DialPortNumber != "" {
  670. params["dial_port_number"] = dialParams.DialPortNumber
  671. }
  672. if dialParams.QUICVersion != "" {
  673. params["quic_version"] = dialParams.QUICVersion
  674. }
  675. if dialParams.QUICDialSNIAddress != "" {
  676. params["quic_dial_sni_address"] = dialParams.QUICDialSNIAddress
  677. }
  678. isReplay := "0"
  679. if dialParams.IsReplay {
  680. isReplay = "1"
  681. }
  682. params["is_replay"] = isReplay
  683. if config.EgressRegion != "" {
  684. params["egress_region"] = config.EgressRegion
  685. }
  686. // dialParams.DialDuration is nanoseconds; divide to get to milliseconds
  687. params["dial_duration"] = fmt.Sprintf("%d", dialParams.DialDuration/1000000)
  688. params["candidate_number"] = strconv.Itoa(dialParams.CandidateNumber)
  689. if dialParams.DialConnMetrics != nil {
  690. metrics := dialParams.DialConnMetrics.GetMetrics()
  691. for name, value := range metrics {
  692. params[name] = fmt.Sprintf("%v", value)
  693. }
  694. }
  695. if dialParams.ObfuscatedSSHConnMetrics != nil {
  696. metrics := dialParams.ObfuscatedSSHConnMetrics.GetMetrics()
  697. for name, value := range metrics {
  698. params[name] = fmt.Sprintf("%v", value)
  699. }
  700. }
  701. return params
  702. }
  703. // makeRequestUrl makes a URL for a web service API request.
  704. func makeRequestUrl(tunnel *Tunnel, port, path string, params common.APIParameters) string {
  705. var requestUrl bytes.Buffer
  706. if port == "" {
  707. port = tunnel.dialParams.ServerEntry.WebServerPort
  708. }
  709. requestUrl.WriteString("https://")
  710. requestUrl.WriteString(tunnel.dialParams.ServerEntry.IpAddress)
  711. requestUrl.WriteString(":")
  712. requestUrl.WriteString(port)
  713. requestUrl.WriteString("/")
  714. requestUrl.WriteString(path)
  715. if len(params) > 0 {
  716. queryParams := url.Values{}
  717. for name, value := range params {
  718. // Note: this logic skips the tactics.SPEED_TEST_SAMPLES_PARAMETER_NAME
  719. // parameter, which has a different type. This parameter is not recognized
  720. // by legacy servers.
  721. switch v := value.(type) {
  722. case string:
  723. queryParams.Set(name, v)
  724. case []string:
  725. // String array param encoded as JSON
  726. jsonValue, err := json.Marshal(v)
  727. if err != nil {
  728. break
  729. }
  730. queryParams.Set(name, string(jsonValue))
  731. }
  732. }
  733. requestUrl.WriteString("?")
  734. requestUrl.WriteString(queryParams.Encode())
  735. }
  736. return requestUrl.String()
  737. }
  738. // makePsiphonHttpsClient creates a Psiphon HTTPS client that tunnels web service API
  739. // requests and which validates the web server using the Psiphon server entry web server
  740. // certificate.
  741. func makePsiphonHttpsClient(tunnel *Tunnel) (httpsClient *http.Client, err error) {
  742. certificate, err := DecodeCertificate(
  743. tunnel.dialParams.ServerEntry.WebServerCertificate)
  744. if err != nil {
  745. return nil, common.ContextError(err)
  746. }
  747. tunneledDialer := func(_ context.Context, _, addr string) (conn net.Conn, err error) {
  748. return tunnel.sshClient.Dial("tcp", addr)
  749. }
  750. // Note: as with SSH API requests, there no dial context here. SSH port forward dials
  751. // cannot be interrupted directly. Closing the tunnel will interrupt both the dial and
  752. // the request. While it's possible to add a timeout here, we leave it with no explicit
  753. // timeout which is the same as SSH API requests: if the tunnel has stalled then SSH keep
  754. // alives will cause the tunnel to close.
  755. dialer := NewCustomTLSDialer(
  756. &CustomTLSConfig{
  757. ClientParameters: tunnel.config.clientParameters,
  758. Dial: tunneledDialer,
  759. VerifyLegacyCertificate: certificate,
  760. })
  761. transport := &http.Transport{
  762. DialTLS: func(network, addr string) (net.Conn, error) {
  763. return dialer(context.Background(), network, addr)
  764. },
  765. Dial: func(network, addr string) (net.Conn, error) {
  766. return nil, errors.New("HTTP not supported")
  767. },
  768. }
  769. return &http.Client{
  770. Transport: transport,
  771. }, nil
  772. }
  773. func HandleServerRequest(
  774. tunnelOwner TunnelOwner, tunnel *Tunnel, name string, payload []byte) error {
  775. switch name {
  776. case protocol.PSIPHON_API_OSL_REQUEST_NAME:
  777. return HandleOSLRequest(tunnelOwner, tunnel, payload)
  778. }
  779. return common.ContextError(fmt.Errorf("invalid request name: %s", name))
  780. }
  781. func HandleOSLRequest(
  782. tunnelOwner TunnelOwner, tunnel *Tunnel, payload []byte) error {
  783. var oslRequest protocol.OSLRequest
  784. err := json.Unmarshal(payload, &oslRequest)
  785. if err != nil {
  786. return common.ContextError(err)
  787. }
  788. if oslRequest.ClearLocalSLOKs {
  789. DeleteSLOKs()
  790. }
  791. seededNewSLOK := false
  792. for _, slok := range oslRequest.SeedPayload.SLOKs {
  793. duplicate, err := SetSLOK(slok.ID, slok.Key)
  794. if err != nil {
  795. // TODO: return error to trigger retry?
  796. NoticeAlert("SetSLOK failed: %s", common.ContextError(err))
  797. } else if !duplicate {
  798. seededNewSLOK = true
  799. }
  800. if tunnel.config.EmitSLOKs {
  801. NoticeSLOKSeeded(base64.StdEncoding.EncodeToString(slok.ID), duplicate)
  802. }
  803. }
  804. if seededNewSLOK {
  805. tunnelOwner.SignalSeededNewSLOK()
  806. }
  807. return nil
  808. }