feat: ignoreClientBandwidth

This commit is contained in:
Toby 2023-08-07 16:34:35 -07:00
parent f95a31120d
commit cc0d0181e1
8 changed files with 156 additions and 84 deletions

View file

@ -33,18 +33,19 @@ func init() {
} }
type serverConfig struct { type serverConfig struct {
Listen string `mapstructure:"listen"` Listen string `mapstructure:"listen"`
Obfs serverConfigObfs `mapstructure:"obfs"` Obfs serverConfigObfs `mapstructure:"obfs"`
TLS *serverConfigTLS `mapstructure:"tls"` TLS *serverConfigTLS `mapstructure:"tls"`
ACME *serverConfigACME `mapstructure:"acme"` ACME *serverConfigACME `mapstructure:"acme"`
QUIC serverConfigQUIC `mapstructure:"quic"` QUIC serverConfigQUIC `mapstructure:"quic"`
Bandwidth serverConfigBandwidth `mapstructure:"bandwidth"` Bandwidth serverConfigBandwidth `mapstructure:"bandwidth"`
DisableUDP bool `mapstructure:"disableUDP"` IgnoreClientBandwidth bool `mapstructure:"ignoreClientBandwidth"`
UDPIdleTimeout time.Duration `mapstructure:"udpIdleTimeout"` DisableUDP bool `mapstructure:"disableUDP"`
Auth serverConfigAuth `mapstructure:"auth"` UDPIdleTimeout time.Duration `mapstructure:"udpIdleTimeout"`
Resolver serverConfigResolver `mapstructure:"resolver"` Auth serverConfigAuth `mapstructure:"auth"`
Outbounds []serverConfigOutboundEntry `mapstructure:"outbounds"` Resolver serverConfigResolver `mapstructure:"resolver"`
Masquerade serverConfigMasquerade `mapstructure:"masquerade"` Outbounds []serverConfigOutboundEntry `mapstructure:"outbounds"`
Masquerade serverConfigMasquerade `mapstructure:"masquerade"`
} }
type serverConfigObfsSalamander struct { type serverConfigObfsSalamander struct {
@ -360,6 +361,11 @@ func (c *serverConfig) fillBandwidthConfig(hyConfig *server.Config) error {
return nil return nil
} }
func (c *serverConfig) fillIgnoreClientBandwidth(hyConfig *server.Config) error {
hyConfig.IgnoreClientBandwidth = c.IgnoreClientBandwidth
return nil
}
func (c *serverConfig) fillDisableUDP(hyConfig *server.Config) error { func (c *serverConfig) fillDisableUDP(hyConfig *server.Config) error {
hyConfig.DisableUDP = c.DisableUDP hyConfig.DisableUDP = c.DisableUDP
return nil return nil
@ -445,6 +451,7 @@ func (c *serverConfig) Config() (*server.Config, error) {
c.fillQUICConfig, c.fillQUICConfig,
c.fillOutboundConfig, c.fillOutboundConfig,
c.fillBandwidthConfig, c.fillBandwidthConfig,
c.fillIgnoreClientBandwidth,
c.fillDisableUDP, c.fillDisableUDP,
c.fillUDPIdleTimeout, c.fillUDPIdleTimeout,
c.fillAuthenticator, c.fillAuthenticator,

View file

@ -55,8 +55,9 @@ func TestServerConfig(t *testing.T) {
Up: "500 mbps", Up: "500 mbps",
Down: "100 mbps", Down: "100 mbps",
}, },
DisableUDP: true, IgnoreClientBandwidth: true,
UDPIdleTimeout: 120 * time.Second, DisableUDP: true,
UDPIdleTimeout: 120 * time.Second,
Auth: serverConfigAuth{ Auth: serverConfigAuth{
Type: "password", Type: "password",
Password: "goofy_ahh_password", Password: "goofy_ahh_password",

View file

@ -34,6 +34,8 @@ bandwidth:
up: 500 mbps up: 500 mbps
down: 100 mbps down: 100 mbps
ignoreClientBandwidth: true
disableUDP: true disableUDP: true
udpIdleTimeout: 120s udpIdleTimeout: 120s

View file

@ -9,9 +9,7 @@ import (
"time" "time"
coreErrs "github.com/apernet/hysteria/core/errors" coreErrs "github.com/apernet/hysteria/core/errors"
"github.com/apernet/hysteria/core/internal/congestion/bbr" "github.com/apernet/hysteria/core/internal/congestion"
"github.com/apernet/hysteria/core/internal/congestion/brutal"
"github.com/apernet/hysteria/core/internal/congestion/common"
"github.com/apernet/hysteria/core/internal/protocol" "github.com/apernet/hysteria/core/internal/protocol"
"github.com/apernet/hysteria/core/internal/utils" "github.com/apernet/hysteria/core/internal/utils"
@ -104,7 +102,10 @@ func (c *clientImpl) connect() error {
}, },
Header: make(http.Header), Header: make(http.Header),
} }
protocol.AuthRequestDataToHeader(req.Header, c.config.Auth, c.config.BandwidthConfig.MaxRx) protocol.AuthRequestToHeader(req.Header, protocol.AuthRequest{
Auth: c.config.Auth,
Rx: c.config.BandwidthConfig.MaxRx,
})
resp, err := rt.RoundTrip(req) resp, err := rt.RoundTrip(req)
if err != nil { if err != nil {
if conn != nil { if conn != nil {
@ -119,28 +120,30 @@ func (c *clientImpl) connect() error {
return coreErrs.AuthError{StatusCode: resp.StatusCode} return coreErrs.AuthError{StatusCode: resp.StatusCode}
} }
// Auth OK // Auth OK
udpEnabled, serverRx := protocol.AuthResponseDataFromHeader(resp.Header) authResp := protocol.AuthResponseFromHeader(resp.Header)
// actualTx = min(serverRx, clientTx) if authResp.RxAuto {
actualTx := serverRx // Server asks client to use bandwidth detection,
if actualTx == 0 || actualTx > c.config.BandwidthConfig.MaxTx { // ignore local bandwidth config and use BBR
actualTx = c.config.BandwidthConfig.MaxTx congestion.UseBBR(conn)
}
// Use Brutal CC if actualTx > 0, otherwise use BBR
if actualTx > 0 {
conn.SetCongestionControl(brutal.NewBrutalSender(actualTx))
} else { } else {
conn.SetCongestionControl(bbr.NewBBRSender( // actualTx = min(serverRx, clientTx)
bbr.DefaultClock{}, actualTx := authResp.Rx
bbr.GetInitialPacketSize(conn.RemoteAddr()), if actualTx == 0 || actualTx > c.config.BandwidthConfig.MaxTx {
bbr.InitialCongestionWindow*common.InitMaxDatagramSize, // Server doesn't have a limit, or our clientTx is smaller than serverRx
bbr.DefaultBBRMaxCongestionWindow*common.InitMaxDatagramSize, actualTx = c.config.BandwidthConfig.MaxTx
)) }
if actualTx > 0 {
congestion.UseBrutal(conn, actualTx)
} else {
// We don't know our own bandwidth either, use BBR
congestion.UseBBR(conn)
}
} }
_ = resp.Body.Close() _ = resp.Body.Close()
c.pktConn = pktConn c.pktConn = pktConn
c.conn = conn c.conn = conn
if udpEnabled { if authResp.UDPEnabled {
c.udpSM = newUDPSessionManager(&udpIOImpl{Conn: conn}) c.udpSM = newUDPSessionManager(&udpIOImpl{Conn: conn})
} }
return nil return nil

View file

@ -0,0 +1,21 @@
package congestion
import (
"github.com/apernet/hysteria/core/internal/congestion/bbr"
"github.com/apernet/hysteria/core/internal/congestion/brutal"
"github.com/apernet/hysteria/core/internal/congestion/common"
"github.com/apernet/quic-go"
)
func UseBBR(conn quic.Connection) {
conn.SetCongestionControl(bbr.NewBBRSender(
bbr.DefaultClock{},
bbr.GetInitialPacketSize(conn.RemoteAddr()),
bbr.InitialCongestionWindow*common.InitMaxDatagramSize,
bbr.DefaultBBRMaxCongestionWindow*common.InitMaxDatagramSize,
))
}
func UseBrutal(conn quic.Connection, tx uint64) {
conn.SetCongestionControl(brutal.NewBrutalSender(tx))
}

View file

@ -17,26 +17,52 @@ const (
StatusAuthOK = 233 StatusAuthOK = 233
) )
func AuthRequestDataFromHeader(h http.Header) (auth string, rx uint64) { // AuthRequest is what client sends to server for authentication.
auth = h.Get(RequestHeaderAuth) type AuthRequest struct {
rx, _ = strconv.ParseUint(h.Get(CommonHeaderCCRX), 10, 64) Auth string
return Rx uint64 // 0 = unknown, client asks server to use bandwidth detection
} }
func AuthRequestDataToHeader(h http.Header, auth string, rx uint64) { // AuthResponse is what server sends to client when authentication is passed.
h.Set(RequestHeaderAuth, auth) type AuthResponse struct {
h.Set(CommonHeaderCCRX, strconv.FormatUint(rx, 10)) UDPEnabled bool
Rx uint64 // 0 = unlimited
RxAuto bool // true = server asks client to use bandwidth detection
}
func AuthRequestFromHeader(h http.Header) AuthRequest {
rx, _ := strconv.ParseUint(h.Get(CommonHeaderCCRX), 10, 64)
return AuthRequest{
Auth: h.Get(RequestHeaderAuth),
Rx: rx,
}
}
func AuthRequestToHeader(h http.Header, req AuthRequest) {
h.Set(RequestHeaderAuth, req.Auth)
h.Set(CommonHeaderCCRX, strconv.FormatUint(req.Rx, 10))
h.Set(CommonHeaderPadding, authRequestPadding.String()) h.Set(CommonHeaderPadding, authRequestPadding.String())
} }
func AuthResponseDataFromHeader(h http.Header) (udp bool, rx uint64) { func AuthResponseFromHeader(h http.Header) AuthResponse {
udp, _ = strconv.ParseBool(h.Get(ResponseHeaderUDPEnabled)) resp := AuthResponse{}
rx, _ = strconv.ParseUint(h.Get(CommonHeaderCCRX), 10, 64) resp.UDPEnabled, _ = strconv.ParseBool(h.Get(ResponseHeaderUDPEnabled))
return rxStr := h.Get(CommonHeaderCCRX)
if rxStr == "auto" {
// Special case for server requesting client to use bandwidth detection
resp.RxAuto = true
} else {
resp.Rx, _ = strconv.ParseUint(rxStr, 10, 64)
}
return resp
} }
func AuthResponseDataToHeader(h http.Header, udp bool, rx uint64) { func AuthResponseToHeader(h http.Header, resp AuthResponse) {
h.Set(ResponseHeaderUDPEnabled, strconv.FormatBool(udp)) h.Set(ResponseHeaderUDPEnabled, strconv.FormatBool(resp.UDPEnabled))
h.Set(CommonHeaderCCRX, strconv.FormatUint(rx, 10)) if resp.RxAuto {
h.Set(CommonHeaderCCRX, "auto")
} else {
h.Set(CommonHeaderCCRX, strconv.FormatUint(resp.Rx, 10))
}
h.Set(CommonHeaderPadding, authResponsePadding.String()) h.Set(CommonHeaderPadding, authResponsePadding.String())
} }

View file

@ -19,17 +19,18 @@ const (
) )
type Config struct { type Config struct {
TLSConfig TLSConfig TLSConfig TLSConfig
QUICConfig QUICConfig QUICConfig QUICConfig
Conn net.PacketConn Conn net.PacketConn
Outbound Outbound Outbound Outbound
BandwidthConfig BandwidthConfig BandwidthConfig BandwidthConfig
DisableUDP bool IgnoreClientBandwidth bool
UDPIdleTimeout time.Duration DisableUDP bool
Authenticator Authenticator UDPIdleTimeout time.Duration
EventLogger EventLogger Authenticator Authenticator
TrafficLogger TrafficLogger EventLogger EventLogger
MasqHandler http.Handler TrafficLogger TrafficLogger
MasqHandler http.Handler
} }
// fill fills the fields that are not set by the user with default values when possible, // fill fills the fields that are not set by the user with default values when possible,

View file

@ -9,9 +9,7 @@ import (
"github.com/apernet/quic-go" "github.com/apernet/quic-go"
"github.com/apernet/quic-go/http3" "github.com/apernet/quic-go/http3"
"github.com/apernet/hysteria/core/internal/congestion/bbr" "github.com/apernet/hysteria/core/internal/congestion"
"github.com/apernet/hysteria/core/internal/congestion/brutal"
"github.com/apernet/hysteria/core/internal/congestion/common"
"github.com/apernet/hysteria/core/internal/protocol" "github.com/apernet/hysteria/core/internal/protocol"
"github.com/apernet/hysteria/core/internal/utils" "github.com/apernet/hysteria/core/internal/utils"
) )
@ -96,10 +94,10 @@ type h3sHandler struct {
conn quic.Connection conn quic.Connection
authenticated bool authenticated bool
authMutex sync.Mutex
authID string authID string
udpOnce sync.Once udpSM *udpSessionManager // Only set after authentication
udpSM *udpSessionManager // Only set after authentication
} }
func newH3sHandler(config *Config, conn quic.Connection) *h3sHandler { func newH3sHandler(config *Config, conn quic.Connection) *h3sHandler {
@ -111,36 +109,49 @@ func newH3sHandler(config *Config, conn quic.Connection) *h3sHandler {
func (h *h3sHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) { func (h *h3sHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
if r.Method == http.MethodPost && r.Host == protocol.URLHost && r.URL.Path == protocol.URLPath { if r.Method == http.MethodPost && r.Host == protocol.URLHost && r.URL.Path == protocol.URLPath {
h.authMutex.Lock()
defer h.authMutex.Unlock()
if h.authenticated { if h.authenticated {
// Already authenticated // Already authenticated
protocol.AuthResponseDataToHeader(w.Header(), !h.config.DisableUDP, h.config.BandwidthConfig.MaxRx) protocol.AuthResponseToHeader(w.Header(), protocol.AuthResponse{
UDPEnabled: !h.config.DisableUDP,
Rx: h.config.BandwidthConfig.MaxRx,
RxAuto: h.config.IgnoreClientBandwidth,
})
w.WriteHeader(protocol.StatusAuthOK) w.WriteHeader(protocol.StatusAuthOK)
return return
} }
auth, clientRx := protocol.AuthRequestDataFromHeader(r.Header) authReq := protocol.AuthRequestFromHeader(r.Header)
// actualTx = min(serverTx, clientRx) actualTx := authReq.Rx
actualTx := clientRx ok, id := h.config.Authenticator.Authenticate(h.conn.RemoteAddr(), authReq.Auth, actualTx)
if h.config.BandwidthConfig.MaxTx > 0 && actualTx > h.config.BandwidthConfig.MaxTx {
actualTx = h.config.BandwidthConfig.MaxTx
}
ok, id := h.config.Authenticator.Authenticate(h.conn.RemoteAddr(), auth, actualTx)
if ok { if ok {
// Set authenticated flag // Set authenticated flag
h.authenticated = true h.authenticated = true
h.authID = id h.authID = id
// Use Brutal CC if actualTx > 0, otherwise use BBR if h.config.IgnoreClientBandwidth {
if actualTx > 0 { // Ignore client bandwidth, always use BBR
h.conn.SetCongestionControl(brutal.NewBrutalSender(actualTx)) congestion.UseBBR(h.conn)
actualTx = 0
} else { } else {
h.conn.SetCongestionControl(bbr.NewBBRSender( // actualTx = min(serverTx, clientRx)
bbr.DefaultClock{}, if h.config.BandwidthConfig.MaxTx > 0 && actualTx > h.config.BandwidthConfig.MaxTx {
bbr.GetInitialPacketSize(h.conn.RemoteAddr()), // We have a maxTx limit and the client is asking for more than that,
bbr.InitialCongestionWindow*common.InitMaxDatagramSize, // return and use the limit instead
bbr.DefaultBBRMaxCongestionWindow*common.InitMaxDatagramSize, actualTx = h.config.BandwidthConfig.MaxTx
)) }
if actualTx > 0 {
congestion.UseBrutal(h.conn, actualTx)
} else {
// Client doesn't know its own bandwidth, use BBR
congestion.UseBBR(h.conn)
}
} }
// Auth OK, send response // Auth OK, send response
protocol.AuthResponseDataToHeader(w.Header(), !h.config.DisableUDP, h.config.BandwidthConfig.MaxRx) protocol.AuthResponseToHeader(w.Header(), protocol.AuthResponse{
UDPEnabled: !h.config.DisableUDP,
Rx: h.config.BandwidthConfig.MaxRx,
RxAuto: h.config.IgnoreClientBandwidth,
})
w.WriteHeader(protocol.StatusAuthOK) w.WriteHeader(protocol.StatusAuthOK)
// Call event logger // Call event logger
if h.config.EventLogger != nil { if h.config.EventLogger != nil {
@ -150,14 +161,14 @@ func (h *h3sHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
// We use sync.Once to make sure that only one goroutine is started, // We use sync.Once to make sure that only one goroutine is started,
// as ServeHTTP may be called by multiple goroutines simultaneously // as ServeHTTP may be called by multiple goroutines simultaneously
if !h.config.DisableUDP { if !h.config.DisableUDP {
h.udpOnce.Do(func() { go func() {
sm := newUDPSessionManager( sm := newUDPSessionManager(
&udpIOImpl{h.conn, id, h.config.TrafficLogger, h.config.Outbound}, &udpIOImpl{h.conn, id, h.config.TrafficLogger, h.config.Outbound},
&udpEventLoggerImpl{h.conn, id, h.config.EventLogger}, &udpEventLoggerImpl{h.conn, id, h.config.EventLogger},
h.config.UDPIdleTimeout) h.config.UDPIdleTimeout)
h.udpSM = sm h.udpSM = sm
go sm.Run() go sm.Run()
}) }()
} }
} else { } else {
// Auth failed, pretend to be a normal HTTP server // Auth failed, pretend to be a normal HTTP server