server.go 31 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027
  1. package quic
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "crypto/tls"
  6. "errors"
  7. "fmt"
  8. "net"
  9. "sync"
  10. "sync/atomic"
  11. "time"
  12. "github.com/Psiphon-Labs/quic-go/internal/handshake"
  13. "github.com/Psiphon-Labs/quic-go/internal/protocol"
  14. "github.com/Psiphon-Labs/quic-go/internal/qerr"
  15. "github.com/Psiphon-Labs/quic-go/internal/qtls"
  16. "github.com/Psiphon-Labs/quic-go/internal/utils"
  17. "github.com/Psiphon-Labs/quic-go/internal/wire"
  18. "github.com/Psiphon-Labs/quic-go/logging"
  19. )
  20. // ErrServerClosed is returned by the Listener or EarlyListener's Accept method after a call to Close.
  21. var ErrServerClosed = errors.New("quic: server closed")
  22. // packetHandler handles packets
  23. type packetHandler interface {
  24. handlePacket(*receivedPacket)
  25. shutdown()
  26. destroy(error)
  27. getPerspective() protocol.Perspective
  28. }
  29. type packetHandlerManager interface {
  30. Get(protocol.ConnectionID) (packetHandler, bool)
  31. GetByResetToken(protocol.StatelessResetToken) (packetHandler, bool)
  32. AddWithConnID(protocol.ConnectionID, protocol.ConnectionID, func() (packetHandler, bool)) bool
  33. Close(error)
  34. CloseServer()
  35. connRunner
  36. }
  37. type quicConn interface {
  38. EarlyConnection
  39. earlyConnReady() <-chan struct{}
  40. handlePacket(*receivedPacket)
  41. GetVersion() protocol.VersionNumber
  42. getPerspective() protocol.Perspective
  43. run() error
  44. destroy(error)
  45. shutdown()
  46. }
  47. type zeroRTTQueue struct {
  48. packets []*receivedPacket
  49. expiration time.Time
  50. }
  51. // A Listener of QUIC
  52. type baseServer struct {
  53. mutex sync.Mutex
  54. acceptEarlyConns bool
  55. tlsConf *tls.Config
  56. config *Config
  57. conn rawConn
  58. tokenGenerator *handshake.TokenGenerator
  59. connIDGenerator ConnectionIDGenerator
  60. connHandler packetHandlerManager
  61. onClose func()
  62. receivedPackets chan *receivedPacket
  63. nextZeroRTTCleanup time.Time
  64. zeroRTTQueues map[protocol.ConnectionID]*zeroRTTQueue // only initialized if acceptEarlyConns == true
  65. // set as a member, so they can be set in the tests
  66. newConn func(
  67. sendConn,
  68. connRunner,
  69. protocol.ConnectionID, /* original dest connection ID */
  70. *protocol.ConnectionID, /* retry src connection ID */
  71. protocol.ConnectionID, /* client dest connection ID */
  72. protocol.ConnectionID, /* destination connection ID */
  73. protocol.ConnectionID, /* source connection ID */
  74. ConnectionIDGenerator,
  75. protocol.StatelessResetToken,
  76. *Config,
  77. *tls.Config,
  78. *handshake.TokenGenerator,
  79. bool, /* client address validated by an address validation token */
  80. logging.ConnectionTracer,
  81. uint64,
  82. utils.Logger,
  83. protocol.VersionNumber,
  84. ) quicConn
  85. serverError error
  86. errorChan chan struct{}
  87. closed bool
  88. running chan struct{} // closed as soon as run() returns
  89. versionNegotiationQueue chan *receivedPacket
  90. invalidTokenQueue chan *receivedPacket
  91. connQueue chan quicConn
  92. connQueueLen int32 // to be used as an atomic
  93. tracer logging.Tracer
  94. logger utils.Logger
  95. }
  96. // A Listener listens for incoming QUIC connections.
  97. // It returns connections once the handshake has completed.
  98. type Listener struct {
  99. baseServer *baseServer
  100. }
  101. // Accept returns new connections. It should be called in a loop.
  102. func (l *Listener) Accept(ctx context.Context) (Connection, error) {
  103. return l.baseServer.Accept(ctx)
  104. }
  105. // Close the server. All active connections will be closed.
  106. func (l *Listener) Close() error {
  107. return l.baseServer.Close()
  108. }
  109. // Addr returns the local network address that the server is listening on.
  110. func (l *Listener) Addr() net.Addr {
  111. return l.baseServer.Addr()
  112. }
  113. // An EarlyListener listens for incoming QUIC connections, and returns them before the handshake completes.
  114. // For connections that don't use 0-RTT, this allows the server to send 0.5-RTT data.
  115. // This data is encrypted with forward-secure keys, however, the client's identity has not yet been verified.
  116. // For connection using 0-RTT, this allows the server to accept and respond to streams that the client opened in the
  117. // 0-RTT data it sent. Note that at this point during the handshake, the live-ness of the
  118. // client has not yet been confirmed, and the 0-RTT data could have been replayed by an attacker.
  119. type EarlyListener struct {
  120. baseServer *baseServer
  121. }
  122. // Accept returns a new connections. It should be called in a loop.
  123. func (l *EarlyListener) Accept(ctx context.Context) (EarlyConnection, error) {
  124. return l.baseServer.accept(ctx)
  125. }
  126. // Close the server. All active connections will be closed.
  127. func (l *EarlyListener) Close() error {
  128. return l.baseServer.Close()
  129. }
  130. // Addr returns the local network addr that the server is listening on.
  131. func (l *EarlyListener) Addr() net.Addr {
  132. return l.baseServer.Addr()
  133. }
  134. // ListenAddr creates a QUIC server listening on a given address.
  135. // The tls.Config must not be nil and must contain a certificate configuration.
  136. // The quic.Config may be nil, in that case the default values will be used.
  137. func ListenAddr(addr string, tlsConf *tls.Config, config *Config) (*Listener, error) {
  138. conn, err := listenUDP(addr)
  139. if err != nil {
  140. return nil, err
  141. }
  142. return (&Transport{
  143. Conn: conn,
  144. createdConn: true,
  145. isSingleUse: true,
  146. }).Listen(tlsConf, config)
  147. }
  148. // ListenAddrEarly works like ListenAddr, but it returns connections before the handshake completes.
  149. func ListenAddrEarly(addr string, tlsConf *tls.Config, config *Config) (*EarlyListener, error) {
  150. conn, err := listenUDP(addr)
  151. if err != nil {
  152. return nil, err
  153. }
  154. return (&Transport{
  155. Conn: conn,
  156. createdConn: true,
  157. isSingleUse: true,
  158. }).ListenEarly(tlsConf, config)
  159. }
  160. func listenUDP(addr string) (*net.UDPConn, error) {
  161. udpAddr, err := net.ResolveUDPAddr("udp", addr)
  162. if err != nil {
  163. return nil, err
  164. }
  165. return net.ListenUDP("udp", udpAddr)
  166. }
  167. // Listen listens for QUIC connections on a given net.PacketConn. If the
  168. // PacketConn satisfies the OOBCapablePacketConn interface (as a net.UDPConn
  169. // does), ECN and packet info support will be enabled. In this case, ReadMsgUDP
  170. // and WriteMsgUDP will be used instead of ReadFrom and WriteTo to read/write
  171. // packets. A single net.PacketConn only be used for a single call to Listen.
  172. // The PacketConn can be used for simultaneous calls to Dial. QUIC connection
  173. // IDs are used for demultiplexing the different connections.
  174. // The tls.Config must not be nil and must contain a certificate configuration.
  175. // Furthermore, it must define an application control (using NextProtos).
  176. // The quic.Config may be nil, in that case the default values will be used.
  177. func Listen(conn net.PacketConn, tlsConf *tls.Config, config *Config) (*Listener, error) {
  178. tr := &Transport{Conn: conn, isSingleUse: true}
  179. return tr.Listen(tlsConf, config)
  180. }
  181. // ListenEarly works like Listen, but it returns connections before the handshake completes.
  182. func ListenEarly(conn net.PacketConn, tlsConf *tls.Config, config *Config) (*EarlyListener, error) {
  183. tr := &Transport{Conn: conn, isSingleUse: true}
  184. return tr.ListenEarly(tlsConf, config)
  185. }
  186. func newServer(
  187. conn rawConn,
  188. connHandler packetHandlerManager,
  189. connIDGenerator ConnectionIDGenerator,
  190. tlsConf *tls.Config,
  191. config *Config,
  192. tracer logging.Tracer,
  193. onClose func(),
  194. acceptEarly bool,
  195. ) (*baseServer, error) {
  196. tokenGenerator, err := handshake.NewTokenGenerator(rand.Reader)
  197. if err != nil {
  198. return nil, err
  199. }
  200. s := &baseServer{
  201. conn: conn,
  202. tlsConf: tlsConf,
  203. config: config,
  204. tokenGenerator: tokenGenerator,
  205. connIDGenerator: connIDGenerator,
  206. connHandler: connHandler,
  207. connQueue: make(chan quicConn),
  208. errorChan: make(chan struct{}),
  209. running: make(chan struct{}),
  210. receivedPackets: make(chan *receivedPacket, protocol.MaxServerUnprocessedPackets),
  211. versionNegotiationQueue: make(chan *receivedPacket, 4),
  212. invalidTokenQueue: make(chan *receivedPacket, 4),
  213. newConn: newConnection,
  214. tracer: tracer,
  215. logger: utils.DefaultLogger.WithPrefix("server"),
  216. acceptEarlyConns: acceptEarly,
  217. onClose: onClose,
  218. }
  219. if acceptEarly {
  220. s.zeroRTTQueues = map[protocol.ConnectionID]*zeroRTTQueue{}
  221. }
  222. go s.run()
  223. go s.runSendQueue()
  224. s.logger.Debugf("Listening for %s connections on %s", conn.LocalAddr().Network(), conn.LocalAddr().String())
  225. return s, nil
  226. }
  227. func (s *baseServer) run() {
  228. defer close(s.running)
  229. for {
  230. select {
  231. case <-s.errorChan:
  232. return
  233. default:
  234. }
  235. select {
  236. case <-s.errorChan:
  237. return
  238. case p := <-s.receivedPackets:
  239. if bufferStillInUse := s.handlePacketImpl(p); !bufferStillInUse {
  240. p.buffer.Release()
  241. }
  242. }
  243. }
  244. }
  245. func (s *baseServer) runSendQueue() {
  246. for {
  247. select {
  248. case <-s.running:
  249. return
  250. case p := <-s.versionNegotiationQueue:
  251. s.maybeSendVersionNegotiationPacket(p)
  252. case p := <-s.invalidTokenQueue:
  253. s.maybeSendInvalidToken(p)
  254. }
  255. }
  256. }
  257. // Accept returns connections that already completed the handshake.
  258. // It is only valid if acceptEarlyConns is false.
  259. func (s *baseServer) Accept(ctx context.Context) (Connection, error) {
  260. return s.accept(ctx)
  261. }
  262. func (s *baseServer) accept(ctx context.Context) (quicConn, error) {
  263. select {
  264. case <-ctx.Done():
  265. return nil, ctx.Err()
  266. case conn := <-s.connQueue:
  267. atomic.AddInt32(&s.connQueueLen, -1)
  268. return conn, nil
  269. case <-s.errorChan:
  270. return nil, s.serverError
  271. }
  272. }
  273. // Close the server
  274. func (s *baseServer) Close() error {
  275. s.mutex.Lock()
  276. if s.closed {
  277. s.mutex.Unlock()
  278. return nil
  279. }
  280. if s.serverError == nil {
  281. s.serverError = ErrServerClosed
  282. }
  283. s.closed = true
  284. close(s.errorChan)
  285. s.mutex.Unlock()
  286. <-s.running
  287. s.onClose()
  288. return nil
  289. }
  290. func (s *baseServer) setCloseError(e error) {
  291. s.mutex.Lock()
  292. defer s.mutex.Unlock()
  293. if s.closed {
  294. return
  295. }
  296. s.closed = true
  297. s.serverError = e
  298. close(s.errorChan)
  299. }
  300. // Addr returns the server's network address
  301. func (s *baseServer) Addr() net.Addr {
  302. return s.conn.LocalAddr()
  303. }
  304. func (s *baseServer) handlePacket(p *receivedPacket) {
  305. select {
  306. case s.receivedPackets <- p:
  307. default:
  308. s.logger.Debugf("Dropping packet from %s (%d bytes). Server receive queue full.", p.remoteAddr, p.Size())
  309. if s.tracer != nil {
  310. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeNotDetermined, p.Size(), logging.PacketDropDOSPrevention)
  311. }
  312. }
  313. }
  314. func (s *baseServer) handlePacketImpl(p *receivedPacket) bool /* is the buffer still in use? */ {
  315. if !s.nextZeroRTTCleanup.IsZero() && p.rcvTime.After(s.nextZeroRTTCleanup) {
  316. defer s.cleanupZeroRTTQueues(p.rcvTime)
  317. }
  318. if wire.IsVersionNegotiationPacket(p.data) {
  319. s.logger.Debugf("Dropping Version Negotiation packet.")
  320. if s.tracer != nil {
  321. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeVersionNegotiation, p.Size(), logging.PacketDropUnexpectedPacket)
  322. }
  323. return false
  324. }
  325. // Short header packets should never end up here in the first place
  326. if !wire.IsLongHeaderPacket(p.data[0]) {
  327. panic(fmt.Sprintf("misrouted packet: %#v", p.data))
  328. }
  329. v, err := wire.ParseVersion(p.data)
  330. // drop the packet if we failed to parse the protocol version
  331. if err != nil {
  332. s.logger.Debugf("Dropping a packet with an unknown version")
  333. if s.tracer != nil {
  334. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeNotDetermined, p.Size(), logging.PacketDropUnexpectedPacket)
  335. }
  336. return false
  337. }
  338. // send a Version Negotiation Packet if the client is speaking a different protocol version
  339. if !protocol.IsSupportedVersion(s.config.Versions, v) {
  340. if s.config.DisableVersionNegotiationPackets {
  341. return false
  342. }
  343. if p.Size() < protocol.MinUnknownVersionPacketSize {
  344. s.logger.Debugf("Dropping a packet with an unsupported version number %d that is too small (%d bytes)", v, p.Size())
  345. if s.tracer != nil {
  346. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeNotDetermined, p.Size(), logging.PacketDropUnexpectedPacket)
  347. }
  348. return false
  349. }
  350. return s.enqueueVersionNegotiationPacket(p)
  351. }
  352. if wire.Is0RTTPacket(p.data) {
  353. if !s.acceptEarlyConns {
  354. if s.tracer != nil {
  355. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketType0RTT, p.Size(), logging.PacketDropUnexpectedPacket)
  356. }
  357. return false
  358. }
  359. return s.handle0RTTPacket(p)
  360. }
  361. // If we're creating a new connection, the packet will be passed to the connection.
  362. // The header will then be parsed again.
  363. hdr, _, _, err := wire.ParsePacket(p.data)
  364. if err != nil {
  365. if s.tracer != nil {
  366. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeNotDetermined, p.Size(), logging.PacketDropHeaderParseError)
  367. }
  368. s.logger.Debugf("Error parsing packet: %s", err)
  369. return false
  370. }
  371. // [Psiphon]
  372. // To accomodate additional messages, obfuscated QUIC packets may reserve
  373. // significant space in the Initial packet and send less that 1200 QUIC
  374. // bytes. In this configuration, the obfuscation layer enforces the
  375. // anti-amplification 1200 byte rule, but it must be disabled here.
  376. isObfuscated := s.config.ServerMaxPacketSizeAdjustment != nil && s.config.ServerMaxPacketSizeAdjustment(p.remoteAddr) > 0
  377. if !isObfuscated &&
  378. hdr.Type == protocol.PacketTypeInitial && p.Size() < protocol.MinInitialPacketSize {
  379. s.logger.Debugf("Dropping a packet that is too small to be a valid Initial (%d bytes)", p.Size())
  380. if s.tracer != nil {
  381. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeInitial, p.Size(), logging.PacketDropUnexpectedPacket)
  382. }
  383. return false
  384. }
  385. if hdr.Type != protocol.PacketTypeInitial {
  386. // Drop long header packets.
  387. // There's little point in sending a Stateless Reset, since the client
  388. // might not have received the token yet.
  389. s.logger.Debugf("Dropping long header packet of type %s (%d bytes)", hdr.Type, len(p.data))
  390. if s.tracer != nil {
  391. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeFromHeader(hdr), p.Size(), logging.PacketDropUnexpectedPacket)
  392. }
  393. return false
  394. }
  395. s.logger.Debugf("<- Received Initial packet.")
  396. if err := s.handleInitialImpl(p, hdr); err != nil {
  397. s.logger.Errorf("Error occurred handling initial packet: %s", err)
  398. }
  399. // Don't put the packet buffer back.
  400. // handleInitialImpl deals with the buffer.
  401. return true
  402. }
  403. func (s *baseServer) handle0RTTPacket(p *receivedPacket) bool {
  404. connID, err := wire.ParseConnectionID(p.data, 0)
  405. if err != nil {
  406. if s.tracer != nil {
  407. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketType0RTT, p.Size(), logging.PacketDropHeaderParseError)
  408. }
  409. return false
  410. }
  411. // check again if we might have a connection now
  412. if handler, ok := s.connHandler.Get(connID); ok {
  413. handler.handlePacket(p)
  414. return true
  415. }
  416. if q, ok := s.zeroRTTQueues[connID]; ok {
  417. if len(q.packets) >= protocol.Max0RTTQueueLen {
  418. if s.tracer != nil {
  419. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketType0RTT, p.Size(), logging.PacketDropDOSPrevention)
  420. }
  421. return false
  422. }
  423. q.packets = append(q.packets, p)
  424. return true
  425. }
  426. if len(s.zeroRTTQueues) >= protocol.Max0RTTQueues {
  427. if s.tracer != nil {
  428. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketType0RTT, p.Size(), logging.PacketDropDOSPrevention)
  429. }
  430. return false
  431. }
  432. queue := &zeroRTTQueue{packets: make([]*receivedPacket, 1, 8)}
  433. queue.packets[0] = p
  434. expiration := p.rcvTime.Add(protocol.Max0RTTQueueingDuration)
  435. queue.expiration = expiration
  436. if s.nextZeroRTTCleanup.IsZero() || s.nextZeroRTTCleanup.After(expiration) {
  437. s.nextZeroRTTCleanup = expiration
  438. }
  439. s.zeroRTTQueues[connID] = queue
  440. return true
  441. }
  442. func (s *baseServer) cleanupZeroRTTQueues(now time.Time) {
  443. // Iterate over all queues to find those that are expired.
  444. // This is ok since we're placing a pretty low limit on the number of queues.
  445. var nextCleanup time.Time
  446. for connID, q := range s.zeroRTTQueues {
  447. if q.expiration.After(now) {
  448. if nextCleanup.IsZero() || nextCleanup.After(q.expiration) {
  449. nextCleanup = q.expiration
  450. }
  451. continue
  452. }
  453. for _, p := range q.packets {
  454. if s.tracer != nil {
  455. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketType0RTT, p.Size(), logging.PacketDropDOSPrevention)
  456. }
  457. p.buffer.Release()
  458. }
  459. delete(s.zeroRTTQueues, connID)
  460. if s.logger.Debug() {
  461. s.logger.Debugf("Removing 0-RTT queue for %s.", connID)
  462. }
  463. }
  464. s.nextZeroRTTCleanup = nextCleanup
  465. }
  466. // [Psiphon]
  467. type stubCryptoSetup struct {
  468. initialOpener handshake.LongHeaderOpener
  469. }
  470. var notSupported = errors.New("not supported")
  471. func (s *stubCryptoSetup) RunHandshake() {
  472. }
  473. func (s *stubCryptoSetup) Close() error {
  474. return notSupported
  475. }
  476. func (s *stubCryptoSetup) ChangeConnectionID(protocol.ConnectionID) {
  477. }
  478. func (s *stubCryptoSetup) GetSessionTicket() ([]byte, error) {
  479. return nil, notSupported
  480. }
  481. func (s *stubCryptoSetup) HandleMessage([]byte, protocol.EncryptionLevel) bool {
  482. return false
  483. }
  484. func (s *stubCryptoSetup) SetLargest1RTTAcked(protocol.PacketNumber) error {
  485. return notSupported
  486. }
  487. func (s *stubCryptoSetup) SetHandshakeConfirmed() {
  488. }
  489. func (s *stubCryptoSetup) ConnectionState() handshake.ConnectionState {
  490. return handshake.ConnectionState{}
  491. }
  492. func (s *stubCryptoSetup) GetInitialOpener() (handshake.LongHeaderOpener, error) {
  493. return s.initialOpener, nil
  494. }
  495. func (s *stubCryptoSetup) GetHandshakeOpener() (handshake.LongHeaderOpener, error) {
  496. return nil, notSupported
  497. }
  498. func (s *stubCryptoSetup) Get0RTTOpener() (handshake.LongHeaderOpener, error) {
  499. return nil, notSupported
  500. }
  501. func (s *stubCryptoSetup) Get1RTTOpener() (handshake.ShortHeaderOpener, error) {
  502. return nil, notSupported
  503. }
  504. func (s *stubCryptoSetup) GetInitialSealer() (handshake.LongHeaderSealer, error) {
  505. return nil, notSupported
  506. }
  507. func (s *stubCryptoSetup) GetHandshakeSealer() (handshake.LongHeaderSealer, error) {
  508. return nil, notSupported
  509. }
  510. func (s *stubCryptoSetup) Get0RTTSealer() (handshake.LongHeaderSealer, error) {
  511. return nil, notSupported
  512. }
  513. func (s *stubCryptoSetup) Get1RTTSealer() (handshake.ShortHeaderSealer, error) {
  514. return nil, notSupported
  515. }
  516. // [Psiphon]
  517. // verifyClientHelloRandom unpacks an Initial packet, extracts the CRYPTO
  518. // frame, and calls Config.VerifyClientHelloRandom.
  519. func (s *baseServer) verifyClientHelloRandom(p *receivedPacket, hdr *wire.Header) error {
  520. // TODO: support QUICv2
  521. versionNumber := protocol.Version1
  522. _, initialOpener := handshake.NewInitialAEAD(
  523. hdr.DestConnectionID, protocol.PerspectiveServer, versionNumber)
  524. cs := &stubCryptoSetup{
  525. initialOpener: initialOpener,
  526. }
  527. // Make a copy of the packet data since this unpacking modifies it and the
  528. // original packet data must be retained for subsequent processing.
  529. data := append([]byte(nil), p.data...)
  530. unpacker := newPacketUnpacker(cs, 0)
  531. unpacked, err := unpacker.UnpackLongHeader(hdr, p.rcvTime, data, versionNumber)
  532. if err != nil {
  533. return fmt.Errorf("verifyClientHelloRandom: UnpackLongHeader: %w", err)
  534. }
  535. parser := wire.NewFrameParser(s.config.EnableDatagrams)
  536. d := unpacked.data
  537. for len(d) > 0 {
  538. l, frame, err := parser.ParseNext(d, protocol.EncryptionInitial, versionNumber)
  539. if err != nil {
  540. return fmt.Errorf("verifyClientHelloRandom: ParseNext: %w", err)
  541. }
  542. if frame == nil {
  543. return errors.New("verifyClientHelloRandom: missing CRYPTO frame")
  544. }
  545. d = d[l:]
  546. cryptoFrame, ok := frame.(*wire.CryptoFrame)
  547. if !ok {
  548. continue
  549. }
  550. if cryptoFrame.Offset != 0 {
  551. return errors.New("verifyClientHelloRandom: unexpected CRYPTO frame offset")
  552. }
  553. random, err := qtls.ReadClientHelloRandom(cryptoFrame.Data)
  554. if err != nil {
  555. return fmt.Errorf("verifyClientHelloRandom: ReadClientHelloRandom: %w", err)
  556. }
  557. if !s.config.VerifyClientHelloRandom(p.remoteAddr, random) {
  558. return fmt.Errorf("verifyClientHelloRandom: VerifyClientHelloRandom failed")
  559. }
  560. break
  561. }
  562. return nil
  563. }
  564. // validateToken returns false if:
  565. // - address is invalid
  566. // - token is expired
  567. // - token is null
  568. func (s *baseServer) validateToken(token *handshake.Token, addr net.Addr) bool {
  569. if token == nil {
  570. return false
  571. }
  572. if !token.ValidateRemoteAddr(addr) {
  573. return false
  574. }
  575. if !token.IsRetryToken && time.Since(token.SentTime) > s.config.MaxTokenAge {
  576. return false
  577. }
  578. if token.IsRetryToken && time.Since(token.SentTime) > s.config.MaxRetryTokenAge {
  579. return false
  580. }
  581. return true
  582. }
  583. func (s *baseServer) handleInitialImpl(p *receivedPacket, hdr *wire.Header) error {
  584. if len(hdr.Token) == 0 && hdr.DestConnectionID.Len() < protocol.MinConnectionIDLenInitial {
  585. p.buffer.Release()
  586. if s.tracer != nil {
  587. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeInitial, p.Size(), logging.PacketDropUnexpectedPacket)
  588. }
  589. return errors.New("too short connection ID")
  590. }
  591. // [Psiphon]
  592. // Drop any Initial packet that fails verifyClientHelloRandom.
  593. if s.config.VerifyClientHelloRandom != nil {
  594. err := s.verifyClientHelloRandom(p, hdr)
  595. if err != nil {
  596. p.buffer.Release()
  597. return err
  598. }
  599. }
  600. // The server queues packets for a while, and we might already have established a connection by now.
  601. // This results in a second check in the connection map.
  602. // That's ok since it's not the hot path (it's only taken by some Initial and 0-RTT packets).
  603. if handler, ok := s.connHandler.Get(hdr.DestConnectionID); ok {
  604. handler.handlePacket(p)
  605. return nil
  606. }
  607. var (
  608. token *handshake.Token
  609. retrySrcConnID *protocol.ConnectionID
  610. )
  611. origDestConnID := hdr.DestConnectionID
  612. if len(hdr.Token) > 0 {
  613. tok, err := s.tokenGenerator.DecodeToken(hdr.Token)
  614. if err == nil {
  615. if tok.IsRetryToken {
  616. origDestConnID = tok.OriginalDestConnectionID
  617. retrySrcConnID = &tok.RetrySrcConnectionID
  618. }
  619. token = tok
  620. }
  621. }
  622. clientAddrIsValid := s.validateToken(token, p.remoteAddr)
  623. if token != nil && !clientAddrIsValid {
  624. // For invalid and expired non-retry tokens, we don't send an INVALID_TOKEN error.
  625. // We just ignore them, and act as if there was no token on this packet at all.
  626. // This also means we might send a Retry later.
  627. if !token.IsRetryToken {
  628. token = nil
  629. } else {
  630. // For Retry tokens, we send an INVALID_ERROR if
  631. // * the token is too old, or
  632. // * the token is invalid, in case of a retry token.
  633. s.enqueueInvalidToken(p)
  634. return nil
  635. }
  636. }
  637. if token == nil && s.config.RequireAddressValidation(p.remoteAddr) {
  638. // Retry invalidates all 0-RTT packets sent.
  639. delete(s.zeroRTTQueues, hdr.DestConnectionID)
  640. go func() {
  641. defer p.buffer.Release()
  642. if err := s.sendRetry(p.remoteAddr, hdr, p.info); err != nil {
  643. s.logger.Debugf("Error sending Retry: %s", err)
  644. }
  645. }()
  646. return nil
  647. }
  648. if queueLen := atomic.LoadInt32(&s.connQueueLen); queueLen >= protocol.MaxAcceptQueueSize {
  649. s.logger.Debugf("Rejecting new connection. Server currently busy. Accept queue length: %d (max %d)", queueLen, protocol.MaxAcceptQueueSize)
  650. go func() {
  651. defer p.buffer.Release()
  652. if err := s.sendConnectionRefused(p.remoteAddr, hdr, p.info); err != nil {
  653. s.logger.Debugf("Error rejecting connection: %s", err)
  654. }
  655. }()
  656. return nil
  657. }
  658. connID, err := s.connIDGenerator.GenerateConnectionID()
  659. if err != nil {
  660. return err
  661. }
  662. s.logger.Debugf("Changing connection ID to %s.", connID)
  663. var conn quicConn
  664. tracingID := nextConnTracingID()
  665. if added := s.connHandler.AddWithConnID(hdr.DestConnectionID, connID, func() (packetHandler, bool) {
  666. config := s.config
  667. if s.config.GetConfigForClient != nil {
  668. conf, err := s.config.GetConfigForClient(&ClientHelloInfo{RemoteAddr: p.remoteAddr})
  669. if err != nil {
  670. s.logger.Debugf("Rejecting new connection due to GetConfigForClient callback")
  671. return nil, false
  672. }
  673. config = populateConfig(conf)
  674. }
  675. var tracer logging.ConnectionTracer
  676. if config.Tracer != nil {
  677. // Use the same connection ID that is passed to the client's GetLogWriter callback.
  678. connID := hdr.DestConnectionID
  679. if origDestConnID.Len() > 0 {
  680. connID = origDestConnID
  681. }
  682. tracer = config.Tracer(context.WithValue(context.Background(), ConnectionTracingKey, tracingID), protocol.PerspectiveServer, connID)
  683. }
  684. conn = s.newConn(
  685. newSendConn(s.conn, p.remoteAddr, p.info),
  686. s.connHandler,
  687. origDestConnID,
  688. retrySrcConnID,
  689. hdr.DestConnectionID,
  690. hdr.SrcConnectionID,
  691. connID,
  692. s.connIDGenerator,
  693. s.connHandler.GetStatelessResetToken(connID),
  694. config,
  695. s.tlsConf,
  696. s.tokenGenerator,
  697. clientAddrIsValid,
  698. tracer,
  699. tracingID,
  700. s.logger,
  701. hdr.Version,
  702. )
  703. conn.handlePacket(p)
  704. if q, ok := s.zeroRTTQueues[hdr.DestConnectionID]; ok {
  705. for _, p := range q.packets {
  706. conn.handlePacket(p)
  707. }
  708. delete(s.zeroRTTQueues, hdr.DestConnectionID)
  709. }
  710. return conn, true
  711. }); !added {
  712. go func() {
  713. defer p.buffer.Release()
  714. if err := s.sendConnectionRefused(p.remoteAddr, hdr, p.info); err != nil {
  715. s.logger.Debugf("Error rejecting connection: %s", err)
  716. }
  717. }()
  718. return nil
  719. }
  720. go conn.run()
  721. go s.handleNewConn(conn)
  722. if conn == nil {
  723. p.buffer.Release()
  724. return nil
  725. }
  726. return nil
  727. }
  728. func (s *baseServer) handleNewConn(conn quicConn) {
  729. connCtx := conn.Context()
  730. if s.acceptEarlyConns {
  731. // wait until the early connection is ready (or the handshake fails)
  732. select {
  733. case <-conn.earlyConnReady():
  734. case <-connCtx.Done():
  735. return
  736. }
  737. } else {
  738. // wait until the handshake is complete (or fails)
  739. select {
  740. case <-conn.HandshakeComplete():
  741. case <-connCtx.Done():
  742. return
  743. }
  744. }
  745. atomic.AddInt32(&s.connQueueLen, 1)
  746. select {
  747. case s.connQueue <- conn:
  748. // blocks until the connection is accepted
  749. case <-connCtx.Done():
  750. atomic.AddInt32(&s.connQueueLen, -1)
  751. // don't pass connections that were already closed to Accept()
  752. }
  753. }
  754. func (s *baseServer) sendRetry(remoteAddr net.Addr, hdr *wire.Header, info *packetInfo) error {
  755. // Log the Initial packet now.
  756. // If no Retry is sent, the packet will be logged by the connection.
  757. (&wire.ExtendedHeader{Header: *hdr}).Log(s.logger)
  758. srcConnID, err := s.connIDGenerator.GenerateConnectionID()
  759. if err != nil {
  760. return err
  761. }
  762. token, err := s.tokenGenerator.NewRetryToken(remoteAddr, hdr.DestConnectionID, srcConnID)
  763. if err != nil {
  764. return err
  765. }
  766. replyHdr := &wire.ExtendedHeader{}
  767. replyHdr.Type = protocol.PacketTypeRetry
  768. replyHdr.Version = hdr.Version
  769. replyHdr.SrcConnectionID = srcConnID
  770. replyHdr.DestConnectionID = hdr.SrcConnectionID
  771. replyHdr.Token = token
  772. if s.logger.Debug() {
  773. s.logger.Debugf("Changing connection ID to %s.", srcConnID)
  774. s.logger.Debugf("-> Sending Retry")
  775. replyHdr.Log(s.logger)
  776. }
  777. buf := getPacketBuffer()
  778. defer buf.Release()
  779. buf.Data, err = replyHdr.Append(buf.Data, hdr.Version)
  780. if err != nil {
  781. return err
  782. }
  783. // append the Retry integrity tag
  784. tag := handshake.GetRetryIntegrityTag(buf.Data, hdr.DestConnectionID, hdr.Version)
  785. buf.Data = append(buf.Data, tag[:]...)
  786. if s.tracer != nil {
  787. s.tracer.SentPacket(remoteAddr, &replyHdr.Header, protocol.ByteCount(len(buf.Data)), nil)
  788. }
  789. _, err = s.conn.WritePacket(buf.Data, remoteAddr, info.OOB())
  790. return err
  791. }
  792. func (s *baseServer) enqueueInvalidToken(p *receivedPacket) {
  793. select {
  794. case s.invalidTokenQueue <- p:
  795. default:
  796. // it's fine to drop INVALID_TOKEN packets when we are busy
  797. p.buffer.Release()
  798. }
  799. }
  800. func (s *baseServer) maybeSendInvalidToken(p *receivedPacket) {
  801. defer p.buffer.Release()
  802. hdr, _, _, err := wire.ParsePacket(p.data)
  803. if err != nil {
  804. if s.tracer != nil {
  805. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeNotDetermined, p.Size(), logging.PacketDropHeaderParseError)
  806. }
  807. s.logger.Debugf("Error parsing packet: %s", err)
  808. return
  809. }
  810. // Only send INVALID_TOKEN if we can unprotect the packet.
  811. // This makes sure that we won't send it for packets that were corrupted.
  812. sealer, opener := handshake.NewInitialAEAD(hdr.DestConnectionID, protocol.PerspectiveServer, hdr.Version)
  813. data := p.data[:hdr.ParsedLen()+hdr.Length]
  814. extHdr, err := unpackLongHeader(opener, hdr, data, hdr.Version)
  815. if err != nil {
  816. if s.tracer != nil {
  817. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeInitial, p.Size(), logging.PacketDropHeaderParseError)
  818. }
  819. return
  820. }
  821. hdrLen := extHdr.ParsedLen()
  822. if _, err := opener.Open(data[hdrLen:hdrLen], data[hdrLen:], extHdr.PacketNumber, data[:hdrLen]); err != nil {
  823. if s.tracer != nil {
  824. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeInitial, p.Size(), logging.PacketDropPayloadDecryptError)
  825. }
  826. return
  827. }
  828. if s.logger.Debug() {
  829. s.logger.Debugf("Client sent an invalid retry token. Sending INVALID_TOKEN to %s.", p.remoteAddr)
  830. }
  831. if err := s.sendError(p.remoteAddr, hdr, sealer, qerr.InvalidToken, p.info); err != nil {
  832. s.logger.Debugf("Error sending INVALID_TOKEN error: %s", err)
  833. }
  834. }
  835. func (s *baseServer) sendConnectionRefused(remoteAddr net.Addr, hdr *wire.Header, info *packetInfo) error {
  836. sealer, _ := handshake.NewInitialAEAD(hdr.DestConnectionID, protocol.PerspectiveServer, hdr.Version)
  837. return s.sendError(remoteAddr, hdr, sealer, qerr.ConnectionRefused, info)
  838. }
  839. // sendError sends the error as a response to the packet received with header hdr
  840. func (s *baseServer) sendError(remoteAddr net.Addr, hdr *wire.Header, sealer handshake.LongHeaderSealer, errorCode qerr.TransportErrorCode, info *packetInfo) error {
  841. b := getPacketBuffer()
  842. defer b.Release()
  843. ccf := &wire.ConnectionCloseFrame{ErrorCode: uint64(errorCode)}
  844. replyHdr := &wire.ExtendedHeader{}
  845. replyHdr.Type = protocol.PacketTypeInitial
  846. replyHdr.Version = hdr.Version
  847. replyHdr.SrcConnectionID = hdr.DestConnectionID
  848. replyHdr.DestConnectionID = hdr.SrcConnectionID
  849. replyHdr.PacketNumberLen = protocol.PacketNumberLen4
  850. replyHdr.Length = 4 /* packet number len */ + ccf.Length(hdr.Version) + protocol.ByteCount(sealer.Overhead())
  851. var err error
  852. b.Data, err = replyHdr.Append(b.Data, hdr.Version)
  853. if err != nil {
  854. return err
  855. }
  856. payloadOffset := len(b.Data)
  857. b.Data, err = ccf.Append(b.Data, hdr.Version)
  858. if err != nil {
  859. return err
  860. }
  861. _ = sealer.Seal(b.Data[payloadOffset:payloadOffset], b.Data[payloadOffset:], replyHdr.PacketNumber, b.Data[:payloadOffset])
  862. b.Data = b.Data[0 : len(b.Data)+sealer.Overhead()]
  863. pnOffset := payloadOffset - int(replyHdr.PacketNumberLen)
  864. sealer.EncryptHeader(
  865. b.Data[pnOffset+4:pnOffset+4+16],
  866. &b.Data[0],
  867. b.Data[pnOffset:payloadOffset],
  868. )
  869. replyHdr.Log(s.logger)
  870. wire.LogFrame(s.logger, ccf, true)
  871. if s.tracer != nil {
  872. s.tracer.SentPacket(remoteAddr, &replyHdr.Header, protocol.ByteCount(len(b.Data)), []logging.Frame{ccf})
  873. }
  874. _, err = s.conn.WritePacket(b.Data, remoteAddr, info.OOB())
  875. return err
  876. }
  877. func (s *baseServer) enqueueVersionNegotiationPacket(p *receivedPacket) (bufferInUse bool) {
  878. select {
  879. case s.versionNegotiationQueue <- p:
  880. return true
  881. default:
  882. // it's fine to not send version negotiation packets when we are busy
  883. }
  884. return false
  885. }
  886. func (s *baseServer) maybeSendVersionNegotiationPacket(p *receivedPacket) {
  887. defer p.buffer.Release()
  888. v, err := wire.ParseVersion(p.data)
  889. if err != nil {
  890. s.logger.Debugf("failed to parse version for sending version negotiation packet: %s", err)
  891. return
  892. }
  893. _, src, dest, err := wire.ParseArbitraryLenConnectionIDs(p.data)
  894. if err != nil { // should never happen
  895. s.logger.Debugf("Dropping a packet with an unknown version for which we failed to parse connection IDs")
  896. if s.tracer != nil {
  897. s.tracer.DroppedPacket(p.remoteAddr, logging.PacketTypeNotDetermined, p.Size(), logging.PacketDropUnexpectedPacket)
  898. }
  899. return
  900. }
  901. s.logger.Debugf("Client offered version %s, sending Version Negotiation", v)
  902. data := wire.ComposeVersionNegotiation(dest, src, s.config.Versions)
  903. if s.tracer != nil {
  904. s.tracer.SentVersionNegotiationPacket(p.remoteAddr, src, dest, s.config.Versions)
  905. }
  906. if _, err := s.conn.WritePacket(data, p.remoteAddr, p.info.OOB()); err != nil {
  907. s.logger.Debugf("Error sending Version Negotiation: %s", err)
  908. }
  909. }