2017-12-12 02:51:45 +00:00
package quic
import (
"bytes"
2018-01-03 19:19:49 +00:00
"crypto/tls"
2017-12-12 02:51:45 +00:00
"errors"
2018-01-03 19:19:49 +00:00
"fmt"
2017-12-12 02:51:45 +00:00
"net"
"strings"
"sync"
"time"
2018-01-03 19:19:49 +00:00
"github.com/lucas-clemente/quic-go/internal/handshake"
"github.com/lucas-clemente/quic-go/internal/protocol"
"github.com/lucas-clemente/quic-go/internal/utils"
"github.com/lucas-clemente/quic-go/internal/wire"
2017-12-12 02:51:45 +00:00
"github.com/lucas-clemente/quic-go/qerr"
)
type client struct {
2018-01-03 19:19:49 +00:00
mutex sync . Mutex
2017-12-12 02:51:45 +00:00
conn connection
hostname string
2018-01-03 19:19:49 +00:00
versionNegotiationChan chan struct { } // the versionNegotiationChan is closed as soon as the server accepted the suggested version
versionNegotiated bool // has the server accepted our version
receivedVersionNegotiationPacket bool
negotiatedVersions [ ] protocol . VersionNumber // the list of versions from the version negotiation packet
tlsConf * tls . Config
config * Config
tls handshake . MintTLS // only used when using TLS
2017-12-12 02:51:45 +00:00
connectionID protocol . ConnectionID
2018-01-03 19:19:49 +00:00
initialVersion protocol . VersionNumber
version protocol . VersionNumber
2017-12-12 02:51:45 +00:00
session packetHandler
}
var (
2018-01-03 19:19:49 +00:00
// make it possible to mock connection ID generation in the tests
generateConnectionID = utils . GenerateConnectionID
2017-12-12 02:51:45 +00:00
errCloseSessionForNewVersion = errors . New ( "closing session in order to recreate it with a new version" )
)
2018-01-03 19:19:49 +00:00
// DialAddr establishes a new QUIC connection to a server.
// The hostname for SNI is taken from the given address.
func DialAddr ( addr string , tlsConf * tls . Config , config * Config ) ( Session , error ) {
udpAddr , err := net . ResolveUDPAddr ( "udp" , addr )
2017-12-12 02:51:45 +00:00
if err != nil {
return nil , err
}
2018-01-03 19:19:49 +00:00
udpConn , err := net . ListenUDP ( "udp" , & net . UDPAddr { IP : net . IPv4zero , Port : 0 } )
2017-12-12 02:51:45 +00:00
if err != nil {
return nil , err
}
2018-01-03 19:19:49 +00:00
return Dial ( udpConn , udpAddr , addr , tlsConf , config )
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
// DialAddrNonFWSecure establishes a new QUIC connection to a server.
// The hostname for SNI is taken from the given address.
func DialAddrNonFWSecure (
addr string ,
tlsConf * tls . Config ,
config * Config ,
) ( NonFWSession , error ) {
udpAddr , err := net . ResolveUDPAddr ( "udp" , addr )
if err != nil {
return nil , err
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
udpConn , err := net . ListenUDP ( "udp" , & net . UDPAddr { IP : net . IPv4zero , Port : 0 } )
if err != nil {
return nil , err
}
return DialNonFWSecure ( udpConn , udpAddr , addr , tlsConf , config )
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
// DialNonFWSecure establishes a new non-forward-secure QUIC connection to a server using a net.PacketConn.
// The host parameter is used for SNI.
func DialNonFWSecure (
pconn net . PacketConn ,
remoteAddr net . Addr ,
host string ,
tlsConf * tls . Config ,
config * Config ,
) ( NonFWSession , error ) {
connID , err := generateConnectionID ( )
2017-12-12 02:51:45 +00:00
if err != nil {
return nil , err
}
2018-01-03 19:19:49 +00:00
var hostname string
if tlsConf != nil {
hostname = tlsConf . ServerName
}
if hostname == "" {
hostname , _ , err = net . SplitHostPort ( host )
if err != nil {
return nil , err
}
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
clientConfig := populateClientConfig ( config )
c := & client {
conn : & conn { pconn : pconn , currentAddr : remoteAddr } ,
connectionID : connID ,
hostname : hostname ,
tlsConf : tlsConf ,
config : clientConfig ,
version : clientConfig . Versions [ 0 ] ,
versionNegotiationChan : make ( chan struct { } ) ,
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
utils . Infof ( "Starting new connection to %s (%s -> %s), connectionID %x, version %s" , hostname , c . conn . LocalAddr ( ) . String ( ) , c . conn . RemoteAddr ( ) . String ( ) , c . connectionID , c . version )
go c . listen ( )
if err := c . dial ( ) ; err != nil {
2017-12-12 02:51:45 +00:00
return nil , err
}
2018-01-03 19:19:49 +00:00
return c . session . ( NonFWSession ) , nil
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
// Dial establishes a new QUIC connection to a server using a net.PacketConn.
// The host parameter is used for SNI.
func Dial (
pconn net . PacketConn ,
remoteAddr net . Addr ,
host string ,
tlsConf * tls . Config ,
config * Config ,
) ( Session , error ) {
sess , err := DialNonFWSecure ( pconn , remoteAddr , host , tlsConf , config )
2017-12-12 02:51:45 +00:00
if err != nil {
return nil , err
}
2018-01-03 19:19:49 +00:00
if err := sess . WaitUntilHandshakeComplete ( ) ; err != nil {
return nil , err
}
return sess , nil
}
// populateClientConfig populates fields in the quic.Config with their default values, if none are set
// it may be called with nil
func populateClientConfig ( config * Config ) * Config {
if config == nil {
config = & Config { }
}
versions := config . Versions
if len ( versions ) == 0 {
versions = protocol . SupportedVersions
}
handshakeTimeout := protocol . DefaultHandshakeTimeout
if config . HandshakeTimeout != 0 {
handshakeTimeout = config . HandshakeTimeout
}
idleTimeout := protocol . DefaultIdleTimeout
if config . IdleTimeout != 0 {
idleTimeout = config . IdleTimeout
}
maxReceiveStreamFlowControlWindow := config . MaxReceiveStreamFlowControlWindow
if maxReceiveStreamFlowControlWindow == 0 {
maxReceiveStreamFlowControlWindow = protocol . DefaultMaxReceiveStreamFlowControlWindowClient
}
maxReceiveConnectionFlowControlWindow := config . MaxReceiveConnectionFlowControlWindow
if maxReceiveConnectionFlowControlWindow == 0 {
maxReceiveConnectionFlowControlWindow = protocol . DefaultMaxReceiveConnectionFlowControlWindowClient
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
return & Config {
Versions : versions ,
HandshakeTimeout : handshakeTimeout ,
IdleTimeout : idleTimeout ,
RequestConnectionIDOmission : config . RequestConnectionIDOmission ,
MaxReceiveStreamFlowControlWindow : maxReceiveStreamFlowControlWindow ,
MaxReceiveConnectionFlowControlWindow : maxReceiveConnectionFlowControlWindow ,
KeepAlive : config . KeepAlive ,
}
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
func ( c * client ) dial ( ) error {
var err error
if c . version . UsesTLS ( ) {
err = c . dialTLS ( )
} else {
err = c . dialGQUIC ( )
}
if err == errCloseSessionForNewVersion {
return c . dial ( )
}
return err
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
func ( c * client ) dialGQUIC ( ) error {
if err := c . createNewGQUICSession ( ) ; err != nil {
return err
}
return c . establishSecureConnection ( )
}
2017-12-12 02:51:45 +00:00
2018-01-03 19:19:49 +00:00
func ( c * client ) dialTLS ( ) error {
csc := handshake . NewCryptoStreamConn ( nil )
mintConf , err := tlsToMintConfig ( c . tlsConf , protocol . PerspectiveClient )
if err != nil {
return err
}
mintConf . ServerName = c . hostname
c . tls = newMintController ( csc , mintConf , protocol . PerspectiveClient )
params := & handshake . TransportParameters {
StreamFlowControlWindow : protocol . ReceiveStreamFlowControlWindow ,
ConnectionFlowControlWindow : protocol . ReceiveConnectionFlowControlWindow ,
MaxStreams : protocol . MaxIncomingStreams ,
IdleTimeout : c . config . IdleTimeout ,
OmitConnectionID : c . config . RequestConnectionIDOmission ,
}
eh := handshake . NewExtensionHandlerClient ( params , c . initialVersion , c . config . Versions , c . version )
if err := c . tls . SetExtensionHandler ( eh ) ; err != nil {
return err
}
if err := c . createNewTLSSession ( eh . GetPeerParams ( ) , c . version ) ; err != nil {
return err
}
if err := c . establishSecureConnection ( ) ; err != nil {
if err != handshake . ErrCloseSessionForRetry {
return err
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
utils . Infof ( "Received a Retry packet. Recreating session." )
if err := c . createNewTLSSession ( eh . GetPeerParams ( ) , c . version ) ; err != nil {
return err
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
if err := c . establishSecureConnection ( ) ; err != nil {
return err
}
}
return nil
}
// establishSecureConnection runs the session, and tries to establish a secure connection
// It returns:
// - errCloseSessionForNewVersion when the server sends a version negotiation packet
// - handshake.ErrCloseSessionForRetry when the server performs a stateless retry (for IETF QUIC)
// - any other error that might occur
// - when the connection is secure (for gQUIC), or forward-secure (for IETF QUIC)
func ( c * client ) establishSecureConnection ( ) error {
var runErr error
errorChan := make ( chan struct { } )
go func ( ) {
runErr = c . session . run ( ) // returns as soon as the session is closed
close ( errorChan )
utils . Infof ( "Connection %x closed." , c . connectionID )
if runErr != handshake . ErrCloseSessionForRetry && runErr != errCloseSessionForNewVersion {
c . conn . Close ( )
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
} ( )
// wait until the server accepts the QUIC version (or an error occurs)
select {
case <- errorChan :
return runErr
case <- c . versionNegotiationChan :
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
select {
case <- errorChan :
return runErr
case ev := <- c . session . handshakeStatus ( ) :
if ev . err != nil {
return ev . err
}
if ! c . version . UsesTLS ( ) && ev . encLevel != protocol . EncryptionSecure {
return fmt . Errorf ( "Client BUG: Expected encryption level to be secure, was %s" , ev . encLevel )
}
return nil
}
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
// Listen listens on the underlying connection and passes packets on for handling.
// It returns when the connection is closed.
2017-12-12 02:51:45 +00:00
func ( c * client ) listen ( ) {
var err error
for {
var n int
var addr net . Addr
data := getPacketBuffer ( )
data = data [ : protocol . MaxReceivePacketSize ]
// The packet size should not exceed protocol.MaxReceivePacketSize bytes
// If it does, we only read a truncated packet, which will then end up undecryptable
n , addr , err = c . conn . Read ( data )
if err != nil {
if ! strings . HasSuffix ( err . Error ( ) , "use of closed network connection" ) {
2018-01-03 19:19:49 +00:00
c . mutex . Lock ( )
if c . session != nil {
c . session . Close ( err )
}
c . mutex . Unlock ( )
2017-12-12 02:51:45 +00:00
}
break
}
2018-01-03 19:19:49 +00:00
c . handlePacket ( addr , data [ : n ] )
2017-12-12 02:51:45 +00:00
}
}
2018-01-03 19:19:49 +00:00
func ( c * client ) handlePacket ( remoteAddr net . Addr , packet [ ] byte ) {
2017-12-12 02:51:45 +00:00
rcvTime := time . Now ( )
r := bytes . NewReader ( packet )
2018-01-03 19:19:49 +00:00
hdr , err := wire . ParseHeaderSentByServer ( r , c . version )
2017-12-12 02:51:45 +00:00
if err != nil {
2018-01-03 19:19:49 +00:00
utils . Errorf ( "error parsing packet from %s: %s" , remoteAddr . String ( ) , err . Error ( ) )
// drop this packet if we can't parse the header
return
}
// reject packets with truncated connection id if we didn't request truncation
if hdr . OmitConnectionID && ! c . config . RequestConnectionIDOmission {
return
2017-12-12 02:51:45 +00:00
}
hdr . Raw = packet [ : len ( packet ) - r . Len ( ) ]
c . mutex . Lock ( )
defer c . mutex . Unlock ( )
2018-01-03 19:19:49 +00:00
// reject packets with the wrong connection ID
if ! hdr . OmitConnectionID && hdr . ConnectionID != c . connectionID {
return
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
if hdr . ResetFlag {
cr := c . conn . RemoteAddr ( )
// check if the remote address and the connection ID match
// otherwise this might be an attacker trying to inject a PUBLIC_RESET to kill the connection
if cr . Network ( ) != remoteAddr . Network ( ) || cr . String ( ) != remoteAddr . String ( ) || hdr . ConnectionID != c . connectionID {
utils . Infof ( "Received a spoofed Public Reset. Ignoring." )
return
}
pr , err := wire . ParsePublicReset ( r )
if err != nil {
utils . Infof ( "Received a Public Reset. An error occurred parsing the packet: %s" , err )
return
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
utils . Infof ( "Received Public Reset, rejected packet number: %#x." , pr . RejectedPacketNumber )
c . session . closeRemote ( qerr . Error ( qerr . PublicReset , fmt . Sprintf ( "Received a Public Reset for packet number %#x" , pr . RejectedPacketNumber ) ) )
return
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
// handle Version Negotiation Packets
if hdr . IsVersionNegotiation {
// ignore delayed / duplicated version negotiation packets
if c . receivedVersionNegotiationPacket || c . versionNegotiated {
return
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
// version negotiation packets have no payload
if err := c . handleVersionNegotiationPacket ( hdr ) ; err != nil {
c . session . Close ( err )
}
return
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
// this is the first packet we are receiving
// since it is not a Version Negotiation Packet, this means the server supports the suggested version
if ! c . versionNegotiated {
c . versionNegotiated = true
close ( c . versionNegotiationChan )
}
// TODO: validate packet number and connection ID on Retry packets (for IETF QUIC)
2017-12-12 02:51:45 +00:00
c . session . handlePacket ( & receivedPacket {
2018-01-03 19:19:49 +00:00
remoteAddr : remoteAddr ,
header : hdr ,
data : packet [ len ( packet ) - r . Len ( ) : ] ,
rcvTime : rcvTime ,
2017-12-12 02:51:45 +00:00
} )
}
2018-01-03 19:19:49 +00:00
func ( c * client ) handleVersionNegotiationPacket ( hdr * wire . Header ) error {
2017-12-12 02:51:45 +00:00
for _ , v := range hdr . SupportedVersions {
if v == c . version {
2018-01-03 19:19:49 +00:00
// the version negotiation packet contains the version that we offered
// this might be a packet sent by an attacker (or by a terribly broken server implementation)
// ignore it
return nil
2017-12-12 02:51:45 +00:00
}
}
2018-01-03 19:19:49 +00:00
newVersion , ok := protocol . ChooseSupportedVersion ( c . config . Versions , hdr . SupportedVersions )
2017-12-12 02:51:45 +00:00
if ! ok {
return qerr . InvalidVersion
}
2018-01-03 19:19:49 +00:00
c . receivedVersionNegotiationPacket = true
c . negotiatedVersions = hdr . SupportedVersions
2017-12-12 02:51:45 +00:00
// switch to negotiated version
2018-01-03 19:19:49 +00:00
c . initialVersion = c . version
c . version = newVersion
2017-12-12 02:51:45 +00:00
var err error
c . connectionID , err = utils . GenerateConnectionID ( )
if err != nil {
return err
}
2018-01-03 19:19:49 +00:00
utils . Infof ( "Switching to QUIC version %s. New connection ID: %x" , newVersion , c . connectionID )
2017-12-12 02:51:45 +00:00
c . session . Close ( errCloseSessionForNewVersion )
2018-01-03 19:19:49 +00:00
return nil
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
func ( c * client ) createNewGQUICSession ( ) ( err error ) {
2017-12-12 02:51:45 +00:00
c . mutex . Lock ( )
2018-01-03 19:19:49 +00:00
defer c . mutex . Unlock ( )
2017-12-12 02:51:45 +00:00
c . session , err = newClientSession (
c . conn ,
c . hostname ,
c . version ,
c . connectionID ,
2018-01-03 19:19:49 +00:00
c . tlsConf ,
c . config ,
c . initialVersion ,
c . negotiatedVersions ,
)
return err
2017-12-12 02:51:45 +00:00
}
2018-01-03 19:19:49 +00:00
func ( c * client ) createNewTLSSession (
paramsChan <- chan handshake . TransportParameters ,
version protocol . VersionNumber ,
) ( err error ) {
c . mutex . Lock ( )
defer c . mutex . Unlock ( )
c . session , err = newTLSClientSession (
c . conn ,
c . hostname ,
c . version ,
c . connectionID ,
c . config ,
c . tls ,
paramsChan ,
1 ,
)
return err
2017-12-12 02:51:45 +00:00
}