Commit graph

277 commits

Author SHA1 Message Date
Kim Alvefur
c769eae82b net.server_epoll: Improve readability of DANE noise
Serialized Lua is not the most readable form of TLSA records.
2025-02-27 21:36:43 +01:00
Martijn van Duren
e7f77807c9 net.server_epoll: Call :shutdown() on TLS sockets when supported
Comment from Matthew:

This fixes a potential issue where the Prosody process gets blocked on sockets
waiting for them to close. Unlike non-TLS sockets, closing a TLS socket sends
layer 7 data, and this can cause problems for sockets which are in the process
of being cleaned up.

This depends on LuaSec changes which are not yet upstream.

From Martijn's original email:

So first my analysis of luasec. in ssl.c the socket is put into blocking
mode right before calling SSL_shutdown() inside meth_destroy(). My best
guess to why this is is because meth_destroy is linked to the __close
and __gc methods, which can't exactly be called multiple times and
luasec does want to make sure that a tls session is shutdown as clean
as possible.
I can't say I disagree with this reasoning and don't want to change this
behaviour. My solution to this without changing the current behaviour is
to introduce a shutdown() method. I am aware that this overlaps in a
conflicting way with tcp's shutdown method, but it stays close to the
OpenSSL name. This method calls SSL_shutdown() in the current
(non)blocking mode of the underlying socket and returns a boolean
whether or not the shutdown is completed (matching SSL_shutdown()'s 0
or 1 return values), and returns the familiar ssl_ioerror() strings on
error with a false for completion. This error can then be used to
determine if we have wantread/wantwrite to finalize things. Once
meth_shutdown() has been called once a shutdown flag will be set, which
indicates to meth_destroy() that the SSL_shutdown() has been handled
by the application and it shouldn't be needed to set the socket to
blocking mode. I've left the SSL_shutdown() call in the
LSEC_STATE_CONNECTED to prevent TOCTOU if the application reaches a
timeout for the shutdown code, which might allow SSL_shutdown() to
clean up anyway at the last possible moment.
Another thing I've changed to luasec is the call to socket_setblocking()
right before calling close(2) in socket_destroy() in usocket.c.
According to the latest POSIX[0]:
  Note that the requirement for close() on a socket to block for up to
  the current linger interval is not conditional on the O_NONBLOCK
  setting.
Which I read to mean that removing O_NONBLOCK on the socket before close
doesn't impact the behaviour and only causes noise in system call
tracers. I didn't touch the windows bits of this, since I don't do
windows.

For the prosody side of things I've made the TLS shutdown bits resemble
interface:onwritable(), and put it under a combined guard of self._tls
and self.conn.shutdown. The self._tls bit is there to prevent getting
stuck on this condition, and self.conn.shutdown is there to prevent the
code being called by instances where the patched luasec isn't deployed.
The destroy() method can be called from various places and is read by
me as the "we give up" error path. To accommodate for these unexpected
entrypoints I've added a single call to self.conn:shutdown() to prevent
the socket being put into blocking mode. I have no expectations that
there is any other use here. Same as previous, the self.conn.shutdown
check is there to make sure it's not called on unpatched luasec
deployments and self._tls is there to make sure we don't call shutdown()
on tcp sockets.
I wouldn't recommend logging of the conn:shutdown() error inside
close(), since a lot of clients simply close the connection before
SSL_shutdown() is done.
2025-02-06 15:04:38 +00:00
Kim Alvefur
61b0c0cd3a net.server_epoll: Don't try to flush buffer on closed connections
Attempt to fix a bug where connections are somehow closed twice, leading
to bad things happening elsewhere.

With LuaSec, closed connections are generally already too closed to
write anything to anyway since it does not support unidirectional
shutdown.
2024-11-19 00:41:02 +01:00
Kim Alvefur
ff00c6707f net.server_epoll: Revert opportunistic_writes tweak
Added in f0b2c026e542 and not sure why
2024-11-19 00:31:21 +01:00
Kim Alvefur
52178d7430 net.server_epoll: Make running out of buffer space a fatal error
Prevent Bad Things from happening when the buffer gets full.
This of course opens up the possibility of intentionally killing
connections by sending much stuff, which need to be mitigated with rate
limits elsewhere.
2024-11-09 15:42:31 +01:00
Kim Alvefur
693079c619 net.server_epoll: Improve efficiency of sending much buffered data
Problem: The string slice operations when a lot of data gets buffered
ends up being expensive and memory-consuming. We have util.dbuffer for
precisely this kind of thing.

I want to keep the behavior of writebuffer being upgraded from nil to a
string to full buffer since the last step involves three table
allocations, where the previous buffer method only used one. Avoiding
those allocations for simple writes like white space keep alive feels
like it would keep memory churn down.

This work was started in 2020
2024-11-09 00:37:15 +01:00
Kim Alvefur
2647c56106 net.server_epoll: Add support for systemd socket activation
Allows creating listening sockets and accepting client connections
before Prosody starts.
This is unlike normal Prosody dynamic resource management, where ports
may added and removed at any time, and the ports defined by the config.

Weird things happen if these are closed (e.g. due to reload) so here we
prevent closing and ensure sockets are reused when opened again.
2024-05-14 17:07:47 +02:00
Kim Alvefur
865df3d373 net.server_epoll: Log creation of signalfd handles at noise level
To aid in tracking down signalfd-related problems
2024-03-01 19:20:45 +01:00
Kim Alvefur
f1e07782ed net.server_epoll: Log failure to hook signals
To make any such failures noticeable
2024-02-28 22:24:09 +01:00
Kim Alvefur
761643abcc util.signal: Wrap signalfd in an userdatum for gc handling etc 2024-02-24 01:00:44 +01:00
Kim Alvefur
49c296360d net.server_epoll: Support hooking signals via signalfd
Handling signal events the same way as all other events makes sense and
seems safer than the signal handling just jumping around in C and
messing with Lua states.
2024-02-24 00:20:35 +01:00
Kim Alvefur
5764e73a65 net.server_epoll: Prevent traceback when checking TLS after connection gone
Unclear why this would be done, but an error is not great.
2024-01-21 22:59:50 +01:00
Kim Alvefur
07d2f9f2e8 net.server_epoll: Avoid call to update socket watch flags when nothing changed
Should skip a syscall for each write when using epoll.
2023-11-21 22:06:28 +01:00
Kim Alvefur
869581384d net: Prefix module imports with prosody namespace 2023-03-17 16:23:12 +01:00
Kim Alvefur
f5006b1202 net.server_epoll: Remove delay on last main loop iteration when quitting
Main difference is that timers are not checked unconditionally before
each poll, only when running out of previous poll results (hidden by
util.poll).  This removes a final poll at shutdown that usually delays
the 'not quitting' condition check by one second.
2023-01-06 04:38:39 +01:00
Kim Alvefur
5acb354989 net.server_epoll: Factor out single main loop step into its own function
This isn't actually used in Prosody, so no value in complicating the
real main loop because of it
2023-01-06 02:31:21 +01:00
Kim Alvefur
8db7cdc713 mod_saslauth: Implement RFC 9266 'tls-exporter' channel binding (#1760)
Brings back SCRAM-SHA-*-PLUS from its hiatus brought on by the earlier
channel binding method being undefined for TLS 1.3, and the increasing
deployment of TLS 1.3.

See 1bfd238e05ad and #1542

Requires future version of LuaSec, once support for this key material
export method is merged.

See https://github.com/brunoos/luasec/pull/187
2022-06-01 15:06:59 +02:00
Kim Alvefur
88a2c1ffe0 net.server: Fix multiple return values
return foo and foo() crops multiple return values to a single one, so
any second return values etc were last, mostly error details.

Introduced in 7e9ebdc75ce4
2022-06-03 17:51:42 +02:00
Kim Alvefur
d33b858436 net.server_epoll: Add option to defer accept() until data available
This is a Linux(?) socket option that delays the accept signal until
there is data available to read. E.g. with HTTP this might mean that a
whole request can be handled without going back trough another turn of
the main loop, and an initial client <stream> can be responded to.

This may have effects on latency and resource use, as the server does
not need to allocate resources until really needed.
2022-05-15 22:41:17 +02:00
Kim Alvefur
3b6565c77b net.server_epoll: Wrap LuaSocket object earlier to reuse option setting method
Since it provides some protection and error handling in the form of
logging.
2021-07-16 00:57:42 +02:00
Kim Alvefur
269acd6847 net.server_epoll: Move call to refresh remote IP address out of wrapper
Reduces the side effects of wrapsocket()
2021-07-16 00:56:45 +02:00
Kim Alvefur
575b997d1d net.server_epoll: Add support for TCP Fast Open
Requires a patch to LuaSocket adding this socket option,
https://github.com/lunarmodules/luasocket/pull/378

sysctl tweaks
net.ipv4.tcp_fastopen=3
net.ipv4.tcp_fastopen_blackhole_timeout_sec = 0
net.ipv4.tcp_fastopen_key=$(</proc/sys/kernel/random/uuid)

Disabled by default since it an advanced performance tweak unlikely to
be needed by most servers.
2021-07-08 12:29:50 +02:00
Jonas Schäfer
9f7c3b9ba6 net: refactor sslconfig to not depend on LuaSec
This now requires that the network backend exposes a tls_builder
function, which essentially wraps the former util.sslconfig.new()
function, passing a factory to create the eventual SSL context.

That allows a net.server backend to pick whatever it likes as SSL
context factory, as long as it understands the config table passed by
the SSL config builder. Heck, a backend could even mock and replace the
entire SSL config builder API.
2022-04-02 11:15:33 +02:00
Jonas Schäfer
38346dd6f1 net: isolate LuaSec-specifics
For this, various accessor functions are now provided directly on the
sockets, which reach down into the LuaSec implementation to obtain the
information.

While this may seem of little gain at first, it hides the implementation
detail of the LuaSec+LuaSocket combination that the actual socket and
the TLS layer are separate objects.

The net gain here is that an alternative implementation does not have to
emulate that specific implementation detail and "only" has to expose
LuaSec-compatible data structures on the new functions.
2022-04-27 17:44:14 +02:00
Kim Alvefur
9fbf5bf7ad net.server_epoll: Disable verbose mode by default 2022-02-12 18:47:22 +01:00
Kim Alvefur
a3ea469ed9 util.id: Adjust entropy levels, with rationales
Modules using ids for logging should not need the now pretty large
medium one.
2021-12-02 01:14:55 +01:00
Kim Alvefur
05a9010c85 net.server_epoll: Ensure calls to :write() return something
With opportunistic writes enabled, writes can return what :onwritable()
returns, thus :onwritable() should return something sensible at each
spot.

Should prevent whatever caused
> Error writing to connection: (nil)
Tho this was probably harmless
2021-12-06 10:59:14 +01:00
Kim Alvefur
61348c0a7d net.server_epoll: Prevent loop attempting to send last data after close
If the connection is closed by the peer, any buffered data is given a
last chance to be sent (see f27b9319e0da). If the connection is Really
closed, no attempt to write will occur, instead epoll will raise the
error flag and :onreadable() will be invoked again, where it will try to
:close() again for the same reason, thus looping until the connection
somehow gets destroyed.

By clearing the _connected flag, the second time it passes :onreadable()
it should go directly to :destroy(), breaking the loop.

Thanks Link Mauve for reporting
2021-11-30 18:19:40 +01:00
Kim Alvefur
8ac98af8b8 net.server_epoll: Fix streaming downloads (thanks Menel)
ff4e34c448a4 broke the way net.http.server streams downloads from disk
because it made writes from the ondrain callback no longer reset the
want-write flag, causing the download to halt.

Writes from the predrain handler still must not trigger anything but
additions to the buffer, since it is about to do all the socket writing
already.
2021-11-19 15:45:01 +01:00
Kim Alvefur
4704104049 net.server_epoll: Try harder to avoid reentrant opportunistic writes
Opportunistic writes sure do complicate things. This is especially
intended to avoid opportunistic_writes from within the onpredrain
callback.
2021-11-18 16:21:43 +01:00
Kim Alvefur
2408c299f0 net.server_epoll: Process all queued events from epoll before timers
Should call timers less frequently when many sockets are waiting for
processing. May help under heavy load.

Requested by Ge0rG
2021-10-21 15:59:16 +02:00
Kim Alvefur
14c6c3dbf0 net.server_epoll: Prevent starttls on direct TLS connections
This is not a pretty way to signal this... but it is the current API

interface:inittls() is a new code path which did not go past the point
in interface:starttls() where it set starttls to false, leading mod_tls
to offer starttls on direct TLS connections

Thanks Martin for discovering.
2021-10-05 19:56:36 +02:00
Kim Alvefur
d22a31530a net.server_epoll: Separate handling of "closed" from other errors
The intent is to ensure 'ondisconnect' only gets called once, while
giving buffered outgoing data a last chance to be delivered via the
:close() path in case the connection was only shutdown in one direction.
2021-09-22 13:29:47 +02:00
Kim Alvefur
7e8a3af45f net.server_epoll: Skip attempt to flush write buffer when not connected
Before 22825cb5dcd8 connection attempts that failed (e.g. connection
refused) would be immediately destroyed.  After, it would schedule
another write cycle and then report 'ondisconnect' again when failing.

Thanks Martin for reporting
2021-09-22 11:27:55 +02:00
Kim Alvefur
da8329037d Merge 0.11->trunk 2021-09-20 15:51:43 +02:00
Kim Alvefur
24111569bb net.server_epoll: Add a hard deadline on shutdown to extra-fix #1670
Should ensure shutdown even if sockets somehow take a very long to get closed.
2021-09-20 14:38:08 +02:00
Kim Alvefur
6d5ff6d2be net.server_epoll: Close sockets added after shutdown signal (fixes #1670)
This should ensure that sockets get closed even if they are added after
the quit signal. Otherwise they may keep the server alive.
2021-09-20 14:42:18 +02:00
Kim Alvefur
b97b295d03 net.server_epoll: Fix indentation messed up in last merge
Seems to have happened in 6427e2642976, probably because of Meld
2021-09-17 12:42:04 +02:00
Kim Alvefur
c85afe7827 net.server_epoll: Don't immediately destroy upon getting closed on read
Instead try to write any remaining buffered data. If the write attempt
also fails with "closed" then there's nothing we can do and the socket
is gone.

This reverts what appears to be a mistakenly included part of c8aa66595072

Thanks jonas’ for noticing
2021-09-15 18:39:37 +02:00
Kim Alvefur
db40eba655 net.server_epoll: Try to make port number related methods sane
Previously it was unclear whether "client port" was the port that the
client connected to, or from. I hereby declare that the client port is
the source port and the server port is the destination port.

Incoming and outgoing connections can be distinguished by looking at
the_server reference, which only incoming connections have.
2021-09-12 15:47:06 +02:00
Kim Alvefur
6be7cf935f net.server_epoll: Fix to preserve ids of readded timers
Likely affected rescheduling but have no reports of this.

After readding a timer, it would have been issued a new id. Rescheduling
would use the previous id, thus not working.
2021-08-31 12:58:38 +02:00
Kim Alvefur
307e58cc75 net.server_epoll: Prevent removed timers from being readded
In a case like this the timer would not be readded:

addtimer(1, function(t, id)
	stop(id)
	return 1
end);
2021-08-31 13:34:08 +02:00
Kim Alvefur
4ddf47aaf0 Merge 0.11->trunk 2021-08-31 13:03:44 +02:00
Kim Alvefur
76189039ae net.server_epoll: Split, attempt to clarify dirty noise message
Only relevant because a "dirty" connection (with incoming data in
LuaSocket's buffer) does not count as "readable" according to epoll, so
special care needs to be taken to keep on processing it.
2021-08-16 20:15:38 +02:00
Kim Alvefur
d06ae16295 net.server: Add a predrain callaback just before writes
Allows sneaking in things in the write buffer just before it's sent to
the network stack. For example ack requests, compression flushes or
other things that make sense to send after stanzas or other things.
This ensures any additional trailing data sent is included in the same
write, and possibly the same TCP packet. Other methods used such as
timers or nextTick might not have the same effect as it depends on
scheduling.
2021-08-16 12:34:52 +02:00
Kim Alvefur
d4b9f814fe net.server_epoll: Improve efficiency of opportunistic writes
Should prevent further opportunistic write attempts after the kernel
buffers are full and stops accepting writes.

When combined with `keep_buffers = false` it should stop it from
repeatedly recreating the buffer table and concatenating it back into a
string when there's a lot to write.
2021-08-14 13:07:29 +02:00
Kim Alvefur
5cf3eea245 net.server_epoll: Fix off-by-one in 2c559953ad41
Thanks tmolitor
2021-01-10 14:54:03 +01:00
Kim Alvefur
861e5125c7 net.server_epoll: Ensure timers can't run more than once per tick
This makes sure that a timer that returns 0 (or less) does not prevent
runtimers() from completing, as well as making sure a timer added with
zero timeout from within a timer does not run until the next tick.

Thanks tmolitor
2021-01-08 21:57:19 +01:00
Kim Alvefur
93d0d13fbb net.server: Backport client parts of SNI support from trunk (#409)
Partial backports of the following commits from trunk:

6c804b6b2ca2 net.http: Pass server name along for SNI (fixes #1408)
75d2874502c3 net.server_select: SNI support (#409)
9a905888b96c net.server_event: Add SNI support (#409)
adc0672b700e net.server_epoll: Add support for SNI (#409)
d4390c427a66 net.server: Handle server name (SNI) as extra argument
2020-08-17 23:01:14 +02:00
Kim Alvefur
e59b70638c net.server_epoll: Fix indentation
Some lines seem to have gotten the wrong indentation, possibly caused by
Meld which often ignores lines with only whitespace changes and leaves
their previous indentation.
2020-03-11 18:07:03 +01:00