Commit graph

82 commits

Author SHA1 Message Date
Kim Alvefur
5dbd3b15e4 mod_s2s: Handle single message from chain validation
Setting ssl.verifyext enables a callback that collects all errors from
every layer of the certificate chain. Otherwise a single string is
returned, which we did not handle before.
2025-04-01 20:42:53 +02:00
Kim Alvefur
7976f21e3e mod_s2s: Deal with OpenSSL changing spelling in strings
ade08735f9
2025-04-01 18:15:34 +02:00
Kim Alvefur
346f58c9d9 core.certmanager: Move LuaSec verification tweaks to mod_s2s
These two settings are only really needed for XMPP server-to-server
connections.
2025-02-15 00:19:01 +01:00
Matthew Wild
6bbfcd801a mod_c2s, mod_s2s: Support for queuing callbacks to run in session thread
This allows certain session-specific code that needs to run in the async
context, but is itself triggered outside of that context (e.g. timers), to
be queued.

An example of this is the session destruction code of mod_smacks, when the
hibernation timeout is reached.
2024-11-21 17:02:07 +00:00
Kim Alvefur
cc34f41086 mod_s2s: Really fix logging of outgoing stanza queue counts
Some confusion happened in 42b98ee73ca8, possibly because .count()
returns the items?
2024-11-11 08:49:57 +01:00
Kim Alvefur
e097713883 mod_s2s: Clone queued outgoing stanzas to prevent changes
This clone call was lost in 902d25cd0557

Affects e.g. presence broadcasts, where the same stanza is sent many
times while mutating the 'to' attribute.
2024-11-10 15:10:26 +01:00
Kim Alvefur
b126efdd1c mod_s2s: Fix counting items in outgoing stanza queue (in logs) 2024-11-10 15:06:00 +01:00
Kim Alvefur
1b68565d70 mod_s2s: Limit size of outgoing stanza queue
This queue is used to buffer stanzas while waiting for an outgoing s2s
connection to be established.

Limit it to prevent excessive memory usage.

Default chosen to approximate how many average stanzas fits in the
server_epoll default max_send_buffer_size of 32 MiB

Returns a custom error instead of the default core.stanza_router
"Communication with remote domains is not enabled" from is sent back,
which does not describe what is happening here.

Closes #1106
2024-11-09 16:47:14 +01:00
Kim Alvefur
73b512d3a6 util.error: Use is_error() instead of is_err() everywhere
Continuation of 4b39691a274e
2024-10-29 14:10:02 +01:00
Kim Alvefur
8362c4824e mod_s2s: Fix traceback due to type confusion (Thanks Menel)
The code assumed a 2-d sparse array but it could also be a string.
2024-08-26 19:21:03 +02:00
Kim Alvefur
73aed09475 mod_c2s,mod_s2s: Advertise idle-seconds per XEP-0478
This is the time after liveness checks are performed via the respective
read-timeout event, which by default involves sending a space character
but could be overridden e.g. as is done by mod_smacks.

Only advertised, unsure what we would do with it.
2024-08-03 16:28:59 +02:00
Kim Alvefur
18813c2ffa mod_s2s: Comment on why we avoid hostnames in stanza bounce messages 2024-02-24 17:45:50 +01:00
Kim Alvefur
e5aa2c3385 mod_s2s: Close connection on smacks timeout
This merges the mod_s2s_smacks_timeout behavior from prosody-modules

This event is fired by mod_smacks when the connection has not responded
to an ack-request for a period of time defaulting to 30 seconds,
indicating that the connection has become stuck or non-responsive.
Closing it prevents routing further messages via this connection and
frees resources. A stuck connection may otherwise remain until for a
time determined by the OS TCP subsystem, which can be quite long.
2023-12-02 20:20:05 +01:00
Kim Alvefur
dc6ac6fe4e mod_s2s: Automagically enable DANE for s2sin if 'use_dane' is enabled
Simplifies configuration, only one already existing boolean to flip.
2023-11-02 09:39:03 +01:00
Kim Alvefur
b5d791c8bf mod_s2s: Fix reporting of DANE mismatch
Thought it was a case mismatch at first, fixed that, but it changed
nothing because the error was in the leaf part of the errors, not the
chain part.
2023-08-05 20:41:24 +02:00
Kim Alvefur
71ad48095d plugins: Use integer config API with interval specification where sensible
Many of these fall into a few categories:
- util.cache size, must be >= 1
- byte or item counts that logically can't be negative
- port numbers that should be in 1..0xffff
2023-07-17 01:38:54 +02:00
Kim Alvefur
1987a7411f plugins: Switch to :get_option_period() for time range options
Improves readability ("1 day" vs 86400) and centralizes validation.
2023-07-16 20:49:33 +02:00
Kim Alvefur
dd2e84271f Merge 0.12->trunk 2023-05-24 15:35:28 +02:00
Kim Alvefur
4d2ecf1d51 mod_c2s,mod_s2s: Fix tag name for SLA (thanks mjk)
The (still not published) XEP-xxxx: Stream Limits Advertisement uses the
element <max-bytes/> to advertise the maximum octet size of top level
stream elements. "size" was probably a leftover of an even earlier
version of the (Proto)XEP.
2023-05-03 18:02:11 +02:00
Kim Alvefur
20afe7d20d mod_s2s: Add event where resolver for s2sout can be tweaked
Could be used to implement custom connection methods (c.f. mod_onions)
without needing to duplicate the rest of route_to_new_session().

Adds a feature to enable detection since it can be difficult to detect
support for an event otherwise.
2022-08-18 03:26:32 +02:00
Kim Alvefur
e38e915ef5 mod_s2s: Fix firing buffer drain events
Fixes the same kind of issue as in 65563530375b but once and for all,
while improving similarity between incoming and outgoing connections.
2022-08-26 18:53:00 +02:00
Matthew Wild
f86d1517ce mod_s2s: Improve robustness of outgoing s2s certificate verification
This change ensures we have positively verified the certificates of the server
we are connecting to before marking the session as authenticated. It protects
against situations where the verify-or-close stage of the connection was
interrupted (e.g. due to an uncaught error).

Thanks to Zash for discovery and testing.
2022-04-25 15:07:49 +01:00
Kim Alvefur
98922d54b1 plugins: Prefix module imports with prosody namespace 2023-03-24 13:15:28 +01:00
Matthew Wild
b47c7951d5 Merge config-updates+check-turn from timber 2022-03-04 16:33:41 +00:00
Kim Alvefur
36512eca29 mod_c2s,mod_s2s: Fix error on shutdown (Thanks Martin)
Since there are two calls to done() that can happen, if the timing is
right (or wrong) both can happen, which previously triggered an error.
2022-02-22 14:17:27 +01:00
Kim Alvefur
1d20ec63e6 mod_c2s,mod_s2s: Wrap callback to improve tracebacks
Should make traces point here instead of timer dispatch, making
debugging easier
2022-02-22 12:35:31 +01:00
Kim Alvefur
a8f4892fe3 mod_c2s,mod_s2s: Wait for sessions to close before proceeding with shutdown steps
Ensures unavailable presence and other outgoing stanzas are sent.

Waiting for c2s sessions to close first before proceeding to disable and
close s2s ensures that unavailable presence can go out, even if it
requires dialback to complete first.
2022-02-17 03:49:47 +01:00
Kim Alvefur
14a7fdb2a8 mod_s2s: Disable creation of new outgoing connections during shutdown 2022-02-11 21:41:04 +01:00
Kim Alvefur
f56aaf1ba1 mod_c2s,mod_s2s: Disable and close port listeners before closing sessions
This ensures no new clients can start connecting during shutdown
2022-02-11 21:36:53 +01:00
Kim Alvefur
e3d771baf9 mod_s2s: Retrieve stanza size limit from peer for bidi connections
Having mod_s2s know about the bidi namespace is perhaps a bit awkward
but putting this in mod_s2s_bidi would be more awkward as it has nothing
to do with limits.  Some indirection event could be added in the future.
2022-11-09 19:10:16 +01:00
Kim Alvefur
96fb9a4a32 mod_s2s: Advertise stream features on bidi connections 2022-10-20 14:22:36 +02:00
Kim Alvefur
a46ae8cb89 mod_c2s,mod_s2s: Adapt to XEP-xxxx: Stream Limits Advertisement
Thanks MattJ
2022-10-20 14:04:56 +02:00
Kim Alvefur
73d1bb1218 various: Require encryption by default for real
These options have been specified (and enabled) in the default config file for
a long time. However if unspecified in the config, they were not enabled. Now
they are.

This may result in a change of behaviour for people using very old config
files that lack the require_encryption options. But that's what we want.
2021-12-25 16:23:40 +01:00
Kim Alvefur
d4f4f76c3c mod_s2s: Avoid sending too large stanzas
Just dropping them isn't great but hopefully something more sensible can
be done in the future.

Will need work to ensure that this signal is handled correctly in
sending modules etc.
2021-03-16 18:30:54 +01:00
Kim Alvefur
6d0298961d mod_s2s: Record stanza size limit advertised by other servers
For future use, i.e. canceling sending of stanzas that exceed the limit
2021-03-16 18:30:34 +01:00
Kim Alvefur
f6c3c1dd95 mod_s2s: Advertise stanza size limit to other servers
So they can, like, not send big stanzas.
2021-03-16 18:25:05 +01:00
Kim Alvefur
a018497a27 mod_s2s: Simplify conditionals since all sessions should have .host now 2022-08-26 19:10:15 +02:00
Kim Alvefur
de4b0b6de2 Merge 0.12->trunk 2022-08-26 19:03:23 +02:00
Kim Alvefur
a2f8218a63 mod_tls: Record STARTTLS state so it can be shown in Shell
This field can be viewed using s2s:show(nil, "... starttls") even
without any special support in mod_admin_shell, which can be added later
to make it nicer. One can then assume that a TLS connection with an
empty / nil starttls field means Direct TLS.
2022-08-02 19:26:26 +02:00
Kim Alvefur
71dc755f0f mod_s2s: Log queued stanzas for which no error reply is produced
This would mainly be error stanzas.

Good to have some trace of when handling of them are finished.
2022-05-07 13:10:27 +02:00
Kim Alvefur
3c35d94011 mod_s2s: Don't bounce queued error stanzas (thanks Martin)
The check for the type attr was lost in 11765f0605ec leading to attempts
to create error replies for error stanzas, which util.stanza rejects.

Tested by sending
	<message to="reject.badxmpp.eu" type="error"><error/></message>
which produced a traceback previously.
2022-05-07 13:01:49 +02:00
Jonas Schäfer
38346dd6f1 net: isolate LuaSec-specifics
For this, various accessor functions are now provided directly on the
sockets, which reach down into the LuaSec implementation to obtain the
information.

While this may seem of little gain at first, it hides the implementation
detail of the LuaSec+LuaSocket combination that the actual socket and
the TLS layer are separate objects.

The net gain here is that an alternative implementation does not have to
emulate that specific implementation detail and "only" has to expose
LuaSec-compatible data structures on the new functions.
2022-04-27 17:44:14 +02:00
Matthew Wild
fc5a8d7f4a Merge 0.12->trunk 2022-04-25 15:09:53 +01:00
Kim Alvefur
f40337890e mod_s2s: Distinguish DANE TLSA errors from generic cert chain errors
Otherwise it would just report "is not trusted" unless you inspect the
logs. This message is sent to to the remote server, and will hopefully
show up in their logs, allowing the admin to fix their DANE setup.
2022-04-25 14:41:54 +02:00
Kim Alvefur
192e0081ce mod_s2s: Recognise and report errors with CA or intermediate certs
Should be invoked for cases such as when the Let's Encrypt intermediate
certificate expired not too long ago.
2022-04-25 14:36:56 +02:00
Matthew Wild
259df23ffb mod_s2s: Store real stanzas in session.sendq, rather than strings
This is the "right" thing to do. Strings were more memory-efficient, but
e.g. bypassed stanza filters at reconnection time. Also not being stanzas
prevents us from potential future work, such as merging sendq with mod_smacks.

Regarding performance: we should counter the probable negative effect of this
change with other positive changes that are desired anyway - e.g. a limit on
the size of the sendq, improved in-memory representation of stanzas, s2s
backoff (e.g. if a remote server is persistently unreachable, cache this
failure for a while and don't just keep forever queuing stanzas for it).
2022-03-23 15:25:22 +00:00
Kim Alvefur
d274fa9a7e mod_s2s: Add new early s2s-connected events
Allows doing things based on connections rather than sessions, which may
have been created before or after.
2022-02-06 14:31:27 +01:00
Kim Alvefur
90215f635b mod_s2s: Retrieve TLS context for outgoing Direct TLS connections from mod_tls
So that the same TLS context is used for both Direct TLS and starttls,
since they are supposed to be functionally identical apart from the few
extra round trips.

A new event is added because the 's2s-created' event fires much later,
after a connection has already been established, where we need the TLS
context before that.
2022-01-21 18:42:38 +01:00
Kim Alvefur
268dfa38c0 mod_s2s: Enable outgoing Direct TLS connections
Makes it faster by cutting out the roundtrips involved in <starttls/>,
at the cost of making an additional SRV lookup.

Since we already ignore a missing <starttls/> offer and try anyway there
is not much difference in security. The fact that XMPP is used and the
hostnames involved might still be visible until the future Encrypted
ClientHello extension allows hiding those too.
2022-01-21 17:59:19 +01:00
Kim Alvefur
94d9ba7ce1 mod_s2s: Fix logging of <stream:error> consistency with other mods
`reason` was often a table, so the log said "table: 0xptr" or such.
mod_c2s, mod_bosh etc logs the stream error stanza object, so better do
the same.  It would be nicer if this was an util.error object, but that
will have to be a future change.
2021-10-24 15:11:01 +02:00