Commit graph

1526 commits

Author SHA1 Message Date
Kim Alvefur
93830ecf40 various: Update IETF RFC URLs for tools.ietf.org transition
See https://www.ietf.org/blog/finalizing-ietf-tools-transition/

Already done in various other places.
2022-08-05 16:54:15 +02:00
Kim Alvefur
79f4868b63 net.resolvers.basic: Add opt-out argument for DNSSEC security status
This makes explicit which lookups can accept an unsigned response.

Insecure (unsigned, as before DNSSEC) A and AAAA records can be used as
security would come from TLS, but an insecure TLSA record is worthless.
2022-08-02 16:08:43 +02:00
Kim Alvefur
8db7cdc713 mod_saslauth: Implement RFC 9266 'tls-exporter' channel binding (#1760)
Brings back SCRAM-SHA-*-PLUS from its hiatus brought on by the earlier
channel binding method being undefined for TLS 1.3, and the increasing
deployment of TLS 1.3.

See 1bfd238e05ad and #1542

Requires future version of LuaSec, once support for this key material
export method is merged.

See https://github.com/brunoos/luasec/pull/187
2022-06-01 15:06:59 +02:00
Kim Alvefur
5251c9b686 compat: Remove handling of Lua 5.1 location of 'unpack' function 2022-07-11 19:07:38 +02:00
Kim Alvefur
34d0431440 Merge 0.12->trunk 2022-06-19 19:58:12 +02:00
Kim Alvefur
4f3ba05b4d net.unbound: Merge luaunbound and prosody defaults in absence of user config (fixes #1763) (thanks rgd)
add_defaults() is supposed to merge 3 tables, the defaults in
luaunbound, the defaults from prosody and any config from the prosody
config file.  In the case where no `unbound={}` has been in the config,
it skips over the merge and returns only the prosody built-in defaults.

This results in libunbound skipping reading resolv.conf and uses its
default behavior of full recursive resolution.

Prior to #1737 there were only two tables, the luaunbound defaults and
the prosody config, where bypassing the merge and returning the former
did the right thing.
2022-06-19 19:49:32 +02:00
Kim Alvefur
76da7a7387 net.http.codes: Refresh from registry, many refs now point to RFC9110 2022-06-13 18:41:13 +02:00
Kim Alvefur
88a2c1ffe0 net.server: Fix multiple return values
return foo and foo() crops multiple return values to a single one, so
any second return values etc were last, mostly error details.

Introduced in 7e9ebdc75ce4
2022-06-03 17:51:42 +02:00
Kim Alvefur
24288146ae net.unbound: Adjust log level of error to error to error
This error is an error, therefore it should be at the error level
2022-05-16 14:51:01 +02:00
Kim Alvefur
5e95ed633a net.unbound: Disable use of hosts file by default (fixes #1737)
This mirrors the behaviour with net.dns and avoids the initialization
issue in #1737
2022-05-16 12:45:51 +02:00
Kim Alvefur
43351d2b54 Spelling: Fix various spelling mistakes (thanks timeless)
Words, sometimes I wonder how they even work

Maybe I missed something.
2022-03-07 00:13:56 +01:00
Kim Alvefur
ece896d253 net.websocket.frames: Replace bit fiddling code with util.struct
Fallback code for not having either the string.pack and string.unpack
functions available in Lua 5.4 or the struct lib is no longer needed
since the struct lib was imported as util.struct in 3ce3633527af
2022-03-06 15:13:50 +01:00
Matthew Wild
fa68985f24 net.stun: Support for xor-relayed-address attribute 2022-03-05 11:30:55 +00:00
Matthew Wild
d405c11918 net.stun: Add xor-peer-address helper 2022-03-05 11:04:25 +00:00
Matthew Wild
ac06bd8c97 net.stun: Factor out address unpack, an operation common to multiple attributes 2022-03-05 11:03:44 +00:00
Matthew Wild
6e9d71259c net.stun: Name some more attributes from TURN 2022-03-05 11:00:08 +00:00
Matthew Wild
ab77f7fcdb net.stun: Add lookup table generation helper, reduces code duplication 2022-03-05 10:59:19 +00:00
Matthew Wild
572bff0087 net.stun: Hyphenate method names for consistency 2022-03-05 10:57:47 +00:00
Kim Alvefur
7579bee6bb net.stun: Use util.bitcompat to deal with bit module variances across Lua versions 2022-03-04 16:58:28 +01:00
Kim Alvefur
1f257ecbb4 net.stun: Use util.strbitop
Improves performance since the whole procedure is done in C
2022-03-04 16:55:32 +01:00
Matthew Wild
5cfe0d220d net.stun: New library that implements STUN/TURN parsing/serialization 2022-03-04 15:23:32 +00:00
Kim Alvefur
9fbf5bf7ad net.server_epoll: Disable verbose mode by default 2022-02-12 18:47:22 +01:00
Kim Alvefur
d33b858436 net.server_epoll: Add option to defer accept() until data available
This is a Linux(?) socket option that delays the accept signal until
there is data available to read. E.g. with HTTP this might mean that a
whole request can be handled without going back trough another turn of
the main loop, and an initial client <stream> can be responded to.

This may have effects on latency and resource use, as the server does
not need to allocate resources until really needed.
2022-05-15 22:41:17 +02:00
Kim Alvefur
3b6565c77b net.server_epoll: Wrap LuaSocket object earlier to reuse option setting method
Since it provides some protection and error handling in the form of
logging.
2021-07-16 00:57:42 +02:00
Kim Alvefur
269acd6847 net.server_epoll: Move call to refresh remote IP address out of wrapper
Reduces the side effects of wrapsocket()
2021-07-16 00:56:45 +02:00
Kim Alvefur
575b997d1d net.server_epoll: Add support for TCP Fast Open
Requires a patch to LuaSocket adding this socket option,
https://github.com/lunarmodules/luasocket/pull/378

sysctl tweaks
net.ipv4.tcp_fastopen=3
net.ipv4.tcp_fastopen_blackhole_timeout_sec = 0
net.ipv4.tcp_fastopen_key=$(</proc/sys/kernel/random/uuid)

Disabled by default since it an advanced performance tweak unlikely to
be needed by most servers.
2021-07-08 12:29:50 +02:00
Kim Alvefur
11017d1130 Merge 0.12->trunk 2022-05-16 14:51:58 +02:00
Kim Alvefur
75a15e67f6 net.server_select: Restore dependency on LuaSec to soft for tests
server_select is used in e.g. storagemanager tests, and some of the CI
runners are lacking LuaSec, which resulted in failures.
2022-04-27 21:45:36 +02:00
Kim Alvefur
c90b2eca9d net.tls_luasec: Harden dependency on LuaSec
We at some point decided that it was okay to have a hard dependency the
TLS library. Especially here since this module is meant to contain all
LuaSec specifics.
2022-04-27 21:34:35 +02:00
Jonas Schäfer
9f7c3b9ba6 net: refactor sslconfig to not depend on LuaSec
This now requires that the network backend exposes a tls_builder
function, which essentially wraps the former util.sslconfig.new()
function, passing a factory to create the eventual SSL context.

That allows a net.server backend to pick whatever it likes as SSL
context factory, as long as it understands the config table passed by
the SSL config builder. Heck, a backend could even mock and replace the
entire SSL config builder API.
2022-04-02 11:15:33 +02:00
Jonas Schäfer
38346dd6f1 net: isolate LuaSec-specifics
For this, various accessor functions are now provided directly on the
sockets, which reach down into the LuaSec implementation to obtain the
information.

While this may seem of little gain at first, it hides the implementation
detail of the LuaSec+LuaSocket combination that the actual socket and
the TLS layer are separate objects.

The net gain here is that an alternative implementation does not have to
emulate that specific implementation detail and "only" has to expose
LuaSec-compatible data structures on the new functions.
2022-04-27 17:44:14 +02:00
Kim Alvefur
9e8e910f1e net.connect: Fix accumulation of connection attempt references
Connection attempts that failed the Happy Eyeballs race were not
unreferenced and would accumulate.

Tested by inspecting the 'pending_connections_map' after establishing
s2s with a s2s target where the IPv6 port has a -j DROP rule causing it
to time out and the IPv4 attempt wins the race.

Expected is that the losing connection stays around until net.server
timeouts kick in where it should be removed. The map table should tend
towards being empty during idle times.
2022-04-20 22:41:54 +02:00
Kim Alvefur
4441528b1f net.http: Allow using DANE via options or per request settings
Dare to enable by default?
2022-02-05 01:32:08 +01:00
Kim Alvefur
9f1af0be2e net.connect: Allow passing TLS context from resolver
Only allowing it to be passed directly makes it hard to combine plain
(i.e. starttls) and Direct TLS connections in the same connection
resolution procedure. But now we can, using chained resolvers!
2022-01-21 17:57:47 +01:00
Kim Alvefur
f31762a075 net.resolvers.chain: A resolver for combining other resolvers
Say if you wanted to try both _xmpp and _xmpps services
2022-01-21 17:56:20 +01:00
Kim Alvefur
e469d015af net.resolvers: Report DNSSEC validation errors instead of NoError
Thanks Martin bringing this case to attention
2021-12-28 14:58:09 +01:00
Kim Alvefur
a3ea469ed9 util.id: Adjust entropy levels, with rationales
Modules using ids for logging should not need the now pretty large
medium one.
2021-12-02 01:14:55 +01:00
Kim Alvefur
96b6f68b23 net.resolvers: Report when hostname fails IDNA
Not a particularly user-friendly error message, but better than "unable
to resolve service" and having no clue where it came from.
2021-12-07 21:43:36 +01:00
Kim Alvefur
05a9010c85 net.server_epoll: Ensure calls to :write() return something
With opportunistic writes enabled, writes can return what :onwritable()
returns, thus :onwritable() should return something sensible at each
spot.

Should prevent whatever caused
> Error writing to connection: (nil)
Tho this was probably harmless
2021-12-06 10:59:14 +01:00
Kim Alvefur
61348c0a7d net.server_epoll: Prevent loop attempting to send last data after close
If the connection is closed by the peer, any buffered data is given a
last chance to be sent (see f27b9319e0da). If the connection is Really
closed, no attempt to write will occur, instead epoll will raise the
error flag and :onreadable() will be invoked again, where it will try to
:close() again for the same reason, thus looping until the connection
somehow gets destroyed.

By clearing the _connected flag, the second time it passes :onreadable()
it should go directly to :destroy(), breaking the loop.

Thanks Link Mauve for reporting
2021-11-30 18:19:40 +01:00
Kim Alvefur
8ac98af8b8 net.server_epoll: Fix streaming downloads (thanks Menel)
ff4e34c448a4 broke the way net.http.server streams downloads from disk
because it made writes from the ondrain callback no longer reset the
want-write flag, causing the download to halt.

Writes from the predrain handler still must not trigger anything but
additions to the buffer, since it is about to do all the socket writing
already.
2021-11-19 15:45:01 +01:00
Kim Alvefur
4704104049 net.server_epoll: Try harder to avoid reentrant opportunistic writes
Opportunistic writes sure do complicate things. This is especially
intended to avoid opportunistic_writes from within the onpredrain
callback.
2021-11-18 16:21:43 +01:00
Kim Alvefur
068388d9c7 net.connect: Prefer last connection error over last resolver error
E.g. "connection refused" over one IP version instead of NoError for the
other IP version.
2021-11-13 13:32:43 +01:00
Kim Alvefur
93121127fa net.connect: Propagate last error message from resolvers
Previously it would only say "unable to resolve server" for all DNS
problems. While "NoError in A lookup" might not make much sense to
users, it should help in debugging more than the previous generic error.

Friendlier errors will be future work.
2021-11-12 16:52:55 +01:00
Kim Alvefur
2408c299f0 net.server_epoll: Process all queued events from epoll before timers
Should call timers less frequently when many sockets are waiting for
processing. May help under heavy load.

Requested by Ge0rG
2021-10-21 15:59:16 +02:00
Kim Alvefur
14c6c3dbf0 net.server_epoll: Prevent starttls on direct TLS connections
This is not a pretty way to signal this... but it is the current API

interface:inittls() is a new code path which did not go past the point
in interface:starttls() where it set starttls to false, leading mod_tls
to offer starttls on direct TLS connections

Thanks Martin for discovering.
2021-10-05 19:56:36 +02:00
Kim Alvefur
d22a31530a net.server_epoll: Separate handling of "closed" from other errors
The intent is to ensure 'ondisconnect' only gets called once, while
giving buffered outgoing data a last chance to be delivered via the
:close() path in case the connection was only shutdown in one direction.
2021-09-22 13:29:47 +02:00
Kim Alvefur
7e8a3af45f net.server_epoll: Skip attempt to flush write buffer when not connected
Before 22825cb5dcd8 connection attempts that failed (e.g. connection
refused) would be immediately destroyed.  After, it would schedule
another write cycle and then report 'ondisconnect' again when failing.

Thanks Martin for reporting
2021-09-22 11:27:55 +02:00
Kim Alvefur
da8329037d Merge 0.11->trunk 2021-09-20 15:51:43 +02:00
Kim Alvefur
24111569bb net.server_epoll: Add a hard deadline on shutdown to extra-fix #1670
Should ensure shutdown even if sockets somehow take a very long to get closed.
2021-09-20 14:38:08 +02:00