412 lines
12 KiB
Go
412 lines
12 KiB
Go
package quic
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"errors"
|
|
"net"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/lucas-clemente/quic-go/internal/crypto"
|
|
"github.com/lucas-clemente/quic-go/internal/handshake"
|
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
|
"github.com/lucas-clemente/quic-go/internal/utils"
|
|
"github.com/lucas-clemente/quic-go/internal/wire"
|
|
"github.com/lucas-clemente/quic-go/qerr"
|
|
)
|
|
|
|
// packetHandler handles packets
|
|
type packetHandler interface {
|
|
Session
|
|
getCryptoStream() cryptoStreamI
|
|
handshakeStatus() <-chan error
|
|
handlePacket(*receivedPacket)
|
|
GetVersion() protocol.VersionNumber
|
|
run() error
|
|
closeRemote(error)
|
|
}
|
|
|
|
// A Listener of QUIC
|
|
type server struct {
|
|
tlsConf *tls.Config
|
|
config *Config
|
|
|
|
conn net.PacketConn
|
|
|
|
supportsTLS bool
|
|
serverTLS *serverTLS
|
|
|
|
certChain crypto.CertChain
|
|
scfg *handshake.ServerConfig
|
|
|
|
sessionsMutex sync.RWMutex
|
|
sessions map[protocol.ConnectionID]packetHandler
|
|
closed bool
|
|
|
|
serverError error
|
|
sessionQueue chan Session
|
|
errorChan chan struct{}
|
|
|
|
// set as members, so they can be set in the tests
|
|
newSession func(conn connection, v protocol.VersionNumber, connectionID protocol.ConnectionID, sCfg *handshake.ServerConfig, tlsConf *tls.Config, config *Config) (packetHandler, error)
|
|
deleteClosedSessionsAfter time.Duration
|
|
}
|
|
|
|
var _ Listener = &server{}
|
|
|
|
// ListenAddr creates a QUIC server listening on a given address.
|
|
// The listener is not active until Serve() is called.
|
|
// The tls.Config must not be nil, the quic.Config may be nil.
|
|
func ListenAddr(addr string, tlsConf *tls.Config, config *Config) (Listener, error) {
|
|
udpAddr, err := net.ResolveUDPAddr("udp", addr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
conn, err := net.ListenUDP("udp", udpAddr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return Listen(conn, tlsConf, config)
|
|
}
|
|
|
|
// Listen listens for QUIC connections on a given net.PacketConn.
|
|
// The listener is not active until Serve() is called.
|
|
// The tls.Config must not be nil, the quic.Config may be nil.
|
|
func Listen(conn net.PacketConn, tlsConf *tls.Config, config *Config) (Listener, error) {
|
|
certChain := crypto.NewCertChain(tlsConf)
|
|
kex, err := crypto.NewCurve25519KEX()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
scfg, err := handshake.NewServerConfig(kex, certChain)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config = populateServerConfig(config)
|
|
|
|
// check if any of the supported versions supports TLS
|
|
var supportsTLS bool
|
|
for _, v := range config.Versions {
|
|
if v.UsesTLS() {
|
|
supportsTLS = true
|
|
break
|
|
}
|
|
}
|
|
|
|
s := &server{
|
|
conn: conn,
|
|
tlsConf: tlsConf,
|
|
config: config,
|
|
certChain: certChain,
|
|
scfg: scfg,
|
|
sessions: map[protocol.ConnectionID]packetHandler{},
|
|
newSession: newSession,
|
|
deleteClosedSessionsAfter: protocol.ClosedSessionDeleteTimeout,
|
|
sessionQueue: make(chan Session, 5),
|
|
errorChan: make(chan struct{}),
|
|
supportsTLS: supportsTLS,
|
|
}
|
|
if supportsTLS {
|
|
if err := s.setupTLS(); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
go s.serve()
|
|
utils.Debugf("Listening for %s connections on %s", conn.LocalAddr().Network(), conn.LocalAddr().String())
|
|
return s, nil
|
|
}
|
|
|
|
func (s *server) setupTLS() error {
|
|
cookieHandler, err := handshake.NewCookieHandler(s.config.AcceptCookie)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
serverTLS, sessionChan, err := newServerTLS(s.conn, s.config, cookieHandler, s.tlsConf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.serverTLS = serverTLS
|
|
// handle TLS connection establishment statelessly
|
|
go func() {
|
|
for {
|
|
select {
|
|
case <-s.errorChan:
|
|
return
|
|
case sess := <-sessionChan:
|
|
// TODO: think about what to do with connection ID collisions
|
|
connID := sess.(*session).connectionID
|
|
s.sessionsMutex.Lock()
|
|
s.sessions[connID] = sess
|
|
s.sessionsMutex.Unlock()
|
|
s.runHandshakeAndSession(sess, connID)
|
|
}
|
|
}
|
|
}()
|
|
return nil
|
|
}
|
|
|
|
var defaultAcceptCookie = func(clientAddr net.Addr, cookie *Cookie) bool {
|
|
if cookie == nil {
|
|
return false
|
|
}
|
|
if time.Now().After(cookie.SentTime.Add(protocol.CookieExpiryTime)) {
|
|
return false
|
|
}
|
|
var sourceAddr string
|
|
if udpAddr, ok := clientAddr.(*net.UDPAddr); ok {
|
|
sourceAddr = udpAddr.IP.String()
|
|
} else {
|
|
sourceAddr = clientAddr.String()
|
|
}
|
|
return sourceAddr == cookie.RemoteAddr
|
|
}
|
|
|
|
// populateServerConfig populates fields in the quic.Config with their default values, if none are set
|
|
// it may be called with nil
|
|
func populateServerConfig(config *Config) *Config {
|
|
if config == nil {
|
|
config = &Config{}
|
|
}
|
|
versions := config.Versions
|
|
if len(versions) == 0 {
|
|
versions = protocol.SupportedVersions
|
|
}
|
|
|
|
vsa := defaultAcceptCookie
|
|
if config.AcceptCookie != nil {
|
|
vsa = config.AcceptCookie
|
|
}
|
|
|
|
handshakeTimeout := protocol.DefaultHandshakeTimeout
|
|
if config.HandshakeTimeout != 0 {
|
|
handshakeTimeout = config.HandshakeTimeout
|
|
}
|
|
idleTimeout := protocol.DefaultIdleTimeout
|
|
if config.IdleTimeout != 0 {
|
|
idleTimeout = config.IdleTimeout
|
|
}
|
|
|
|
maxReceiveStreamFlowControlWindow := config.MaxReceiveStreamFlowControlWindow
|
|
if maxReceiveStreamFlowControlWindow == 0 {
|
|
maxReceiveStreamFlowControlWindow = protocol.DefaultMaxReceiveStreamFlowControlWindowServer
|
|
}
|
|
maxReceiveConnectionFlowControlWindow := config.MaxReceiveConnectionFlowControlWindow
|
|
if maxReceiveConnectionFlowControlWindow == 0 {
|
|
maxReceiveConnectionFlowControlWindow = protocol.DefaultMaxReceiveConnectionFlowControlWindowServer
|
|
}
|
|
|
|
return &Config{
|
|
Versions: versions,
|
|
HandshakeTimeout: handshakeTimeout,
|
|
IdleTimeout: idleTimeout,
|
|
AcceptCookie: vsa,
|
|
KeepAlive: config.KeepAlive,
|
|
MaxReceiveStreamFlowControlWindow: maxReceiveStreamFlowControlWindow,
|
|
MaxReceiveConnectionFlowControlWindow: maxReceiveConnectionFlowControlWindow,
|
|
}
|
|
}
|
|
|
|
// serve listens on an existing PacketConn
|
|
func (s *server) serve() {
|
|
for {
|
|
data := getPacketBuffer()
|
|
data = data[:protocol.MaxReceivePacketSize]
|
|
// The packet size should not exceed protocol.MaxReceivePacketSize bytes
|
|
// If it does, we only read a truncated packet, which will then end up undecryptable
|
|
n, remoteAddr, err := s.conn.ReadFrom(data)
|
|
if err != nil {
|
|
s.serverError = err
|
|
close(s.errorChan)
|
|
_ = s.Close()
|
|
return
|
|
}
|
|
data = data[:n]
|
|
if err := s.handlePacket(s.conn, remoteAddr, data); err != nil {
|
|
utils.Errorf("error handling packet: %s", err.Error())
|
|
}
|
|
}
|
|
}
|
|
|
|
// Accept returns newly openend sessions
|
|
func (s *server) Accept() (Session, error) {
|
|
var sess Session
|
|
select {
|
|
case sess = <-s.sessionQueue:
|
|
return sess, nil
|
|
case <-s.errorChan:
|
|
return nil, s.serverError
|
|
}
|
|
}
|
|
|
|
// Close the server
|
|
func (s *server) Close() error {
|
|
s.sessionsMutex.Lock()
|
|
if s.closed {
|
|
s.sessionsMutex.Unlock()
|
|
return nil
|
|
}
|
|
s.closed = true
|
|
|
|
var wg sync.WaitGroup
|
|
for _, session := range s.sessions {
|
|
if session != nil {
|
|
wg.Add(1)
|
|
go func(sess packetHandler) {
|
|
// session.Close() blocks until the CONNECTION_CLOSE has been sent and the run-loop has stopped
|
|
_ = sess.Close(nil)
|
|
wg.Done()
|
|
}(session)
|
|
}
|
|
}
|
|
s.sessionsMutex.Unlock()
|
|
wg.Wait()
|
|
|
|
err := s.conn.Close()
|
|
<-s.errorChan // wait for serve() to return
|
|
return err
|
|
}
|
|
|
|
// Addr returns the server's network address
|
|
func (s *server) Addr() net.Addr {
|
|
return s.conn.LocalAddr()
|
|
}
|
|
|
|
func (s *server) handlePacket(pconn net.PacketConn, remoteAddr net.Addr, packet []byte) error {
|
|
rcvTime := time.Now()
|
|
|
|
r := bytes.NewReader(packet)
|
|
hdr, err := wire.ParseHeaderSentByClient(r)
|
|
if err != nil {
|
|
return qerr.Error(qerr.InvalidPacketHeader, err.Error())
|
|
}
|
|
hdr.Raw = packet[:len(packet)-r.Len()]
|
|
packetData := packet[len(packet)-r.Len():]
|
|
connID := hdr.ConnectionID
|
|
|
|
if hdr.Type == protocol.PacketTypeInitial {
|
|
if s.supportsTLS {
|
|
go s.serverTLS.HandleInitial(remoteAddr, hdr, packetData)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
s.sessionsMutex.RLock()
|
|
session, sessionKnown := s.sessions[connID]
|
|
s.sessionsMutex.RUnlock()
|
|
|
|
if sessionKnown && session == nil {
|
|
// Late packet for closed session
|
|
return nil
|
|
}
|
|
|
|
// ignore all Public Reset packets
|
|
if hdr.ResetFlag {
|
|
if sessionKnown {
|
|
var pr *wire.PublicReset
|
|
pr, err = wire.ParsePublicReset(r)
|
|
if err != nil {
|
|
utils.Infof("Received a Public Reset for connection %x. An error occurred parsing the packet.")
|
|
} else {
|
|
utils.Infof("Received a Public Reset for connection %x, rejected packet number: 0x%x.", hdr.ConnectionID, pr.RejectedPacketNumber)
|
|
}
|
|
} else {
|
|
utils.Infof("Received Public Reset for unknown connection %x.", hdr.ConnectionID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// If we don't have a session for this connection, and this packet cannot open a new connection, send a Public Reset
|
|
// This should only happen after a server restart, when we still receive packets for connections that we lost the state for.
|
|
// TODO(#943): implement sending of IETF draft style stateless resets
|
|
if !sessionKnown && (!hdr.VersionFlag && hdr.Type != protocol.PacketTypeInitial) {
|
|
_, err = pconn.WriteTo(wire.WritePublicReset(connID, 0, 0), remoteAddr)
|
|
return err
|
|
}
|
|
|
|
// a session is only created once the client sent a supported version
|
|
// if we receive a packet for a connection that already has session, it's probably an old packet that was sent by the client before the version was negotiated
|
|
// it is safe to drop it
|
|
if sessionKnown && hdr.VersionFlag && !protocol.IsSupportedVersion(s.config.Versions, hdr.Version) {
|
|
return nil
|
|
}
|
|
|
|
// send a Version Negotiation Packet if the client is speaking a different protocol version
|
|
// since the client send a Public Header (only gQUIC has a Version Flag), we need to send a gQUIC Version Negotiation Packet
|
|
if hdr.VersionFlag && !protocol.IsSupportedVersion(s.config.Versions, hdr.Version) {
|
|
// drop packets that are too small to be valid first packets
|
|
if len(packet) < protocol.MinClientHelloSize+len(hdr.Raw) {
|
|
return errors.New("dropping small packet with unknown version")
|
|
}
|
|
utils.Infof("Client offered version %s, sending VersionNegotiationPacket", hdr.Version)
|
|
if _, err := pconn.WriteTo(wire.ComposeGQUICVersionNegotiation(hdr.ConnectionID, s.config.Versions), remoteAddr); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// This is (potentially) a Client Hello.
|
|
// Make sure it has the minimum required size before spending any more ressources on it.
|
|
if !sessionKnown && len(packet) < protocol.MinClientHelloSize+len(hdr.Raw) {
|
|
return errors.New("dropping small packet for unknown connection")
|
|
}
|
|
|
|
if !sessionKnown {
|
|
version := hdr.Version
|
|
if !protocol.IsSupportedVersion(s.config.Versions, version) {
|
|
return errors.New("Server BUG: negotiated version not supported")
|
|
}
|
|
|
|
utils.Infof("Serving new connection: %x, version %s from %v", hdr.ConnectionID, version, remoteAddr)
|
|
session, err = s.newSession(
|
|
&conn{pconn: pconn, currentAddr: remoteAddr},
|
|
version,
|
|
hdr.ConnectionID,
|
|
s.scfg,
|
|
s.tlsConf,
|
|
s.config,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.sessionsMutex.Lock()
|
|
s.sessions[connID] = session
|
|
s.sessionsMutex.Unlock()
|
|
|
|
s.runHandshakeAndSession(session, connID)
|
|
}
|
|
session.handlePacket(&receivedPacket{
|
|
remoteAddr: remoteAddr,
|
|
header: hdr,
|
|
data: packetData,
|
|
rcvTime: rcvTime,
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (s *server) runHandshakeAndSession(session packetHandler, connID protocol.ConnectionID) {
|
|
go func() {
|
|
_ = session.run()
|
|
// session.run() returns as soon as the session is closed
|
|
s.removeConnection(connID)
|
|
}()
|
|
|
|
go func() {
|
|
if err := <-session.handshakeStatus(); err != nil {
|
|
return
|
|
}
|
|
s.sessionQueue <- session
|
|
}()
|
|
}
|
|
|
|
func (s *server) removeConnection(id protocol.ConnectionID) {
|
|
s.sessionsMutex.Lock()
|
|
s.sessions[id] = nil
|
|
s.sessionsMutex.Unlock()
|
|
|
|
time.AfterFunc(s.deleteClosedSessionsAfter, func() {
|
|
s.sessionsMutex.Lock()
|
|
delete(s.sessions, id)
|
|
s.sessionsMutex.Unlock()
|
|
})
|
|
}
|