mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 12:47:36 +03:00
handle Retry packets in the session
This commit is contained in:
parent
7a7e7ca6eb
commit
17f4ebad64
11 changed files with 199 additions and 194 deletions
42
client.go
42
client.go
|
@ -24,8 +24,6 @@ type client struct {
|
||||||
|
|
||||||
packetHandlers packetHandlerManager
|
packetHandlers packetHandlerManager
|
||||||
|
|
||||||
token []byte
|
|
||||||
|
|
||||||
versionNegotiated utils.AtomicBool // has the server accepted our version
|
versionNegotiated utils.AtomicBool // has the server accepted our version
|
||||||
receivedVersionNegotiationPacket bool
|
receivedVersionNegotiationPacket bool
|
||||||
negotiatedVersions []protocol.VersionNumber // the list of versions from the version negotiation packet
|
negotiatedVersions []protocol.VersionNumber // the list of versions from the version negotiation packet
|
||||||
|
@ -33,9 +31,8 @@ type client struct {
|
||||||
tlsConf *tls.Config
|
tlsConf *tls.Config
|
||||||
config *Config
|
config *Config
|
||||||
|
|
||||||
srcConnID protocol.ConnectionID
|
srcConnID protocol.ConnectionID
|
||||||
destConnID protocol.ConnectionID
|
destConnID protocol.ConnectionID
|
||||||
origDestConnID protocol.ConnectionID // the destination conn ID used on the first Initial (before a Retry)
|
|
||||||
|
|
||||||
initialPacketNumber protocol.PacketNumber
|
initialPacketNumber protocol.PacketNumber
|
||||||
|
|
||||||
|
@ -262,7 +259,7 @@ func (c *client) dial(ctx context.Context) error {
|
||||||
|
|
||||||
// establishSecureConnection runs the session, and tries to establish a secure connection
|
// establishSecureConnection runs the session, and tries to establish a secure connection
|
||||||
// It returns:
|
// It returns:
|
||||||
// - errCloseSessionRecreating when the server sends a version negotiation packet, or a stateless retry is performed
|
// - errCloseForRecreating when the server sends a version negotiation packet
|
||||||
// - any other error that might occur
|
// - any other error that might occur
|
||||||
// - when the connection is forward-secure
|
// - when the connection is forward-secure
|
||||||
func (c *client) establishSecureConnection(ctx context.Context) error {
|
func (c *client) establishSecureConnection(ctx context.Context) error {
|
||||||
|
@ -295,11 +292,6 @@ func (c *client) handlePacket(p *receivedPacket) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if p.hdr.Type == protocol.PacketTypeRetry {
|
|
||||||
go c.handleRetryPacket(p.hdr)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// this is the first packet we are receiving
|
// this is the first packet we are receiving
|
||||||
// since it is not a Version Negotiation Packet, this means the server supports the suggested version
|
// since it is not a Version Negotiation Packet, this means the server supports the suggested version
|
||||||
if !c.versionNegotiated.Get() {
|
if !c.versionNegotiated.Get() {
|
||||||
|
@ -345,32 +337,6 @@ func (c *client) handleVersionNegotiationPacket(hdr *wire.Header) {
|
||||||
c.initialPacketNumber = c.session.closeForRecreating()
|
c.initialPacketNumber = c.session.closeForRecreating()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) handleRetryPacket(hdr *wire.Header) {
|
|
||||||
c.mutex.Lock()
|
|
||||||
defer c.mutex.Unlock()
|
|
||||||
|
|
||||||
c.logger.Debugf("<- Received Retry")
|
|
||||||
(&wire.ExtendedHeader{Header: *hdr}).Log(c.logger)
|
|
||||||
if !hdr.OrigDestConnectionID.Equal(c.destConnID) {
|
|
||||||
c.logger.Debugf("Ignoring spoofed Retry. Original Destination Connection ID: %s, expected: %s", hdr.OrigDestConnectionID, c.destConnID)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
if hdr.SrcConnectionID.Equal(c.destConnID) {
|
|
||||||
c.logger.Debugf("Ignoring Retry, since the server didn't change the Source Connection ID.")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
// If a token is already set, this means that we already received a Retry from the server.
|
|
||||||
// Ignore this Retry packet.
|
|
||||||
if len(c.token) > 0 {
|
|
||||||
c.logger.Debugf("Ignoring Retry, since a Retry was already received.")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
c.origDestConnID = c.destConnID
|
|
||||||
c.destConnID = hdr.SrcConnectionID
|
|
||||||
c.token = hdr.Token
|
|
||||||
c.initialPacketNumber = c.session.closeForRecreating()
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *client) createNewTLSSession(version protocol.VersionNumber) error {
|
func (c *client) createNewTLSSession(version protocol.VersionNumber) error {
|
||||||
params := &handshake.TransportParameters{
|
params := &handshake.TransportParameters{
|
||||||
InitialMaxStreamDataBidiRemote: protocol.InitialMaxStreamData,
|
InitialMaxStreamDataBidiRemote: protocol.InitialMaxStreamData,
|
||||||
|
@ -394,8 +360,6 @@ func (c *client) createNewTLSSession(version protocol.VersionNumber) error {
|
||||||
sess, err := newClientSession(
|
sess, err := newClientSession(
|
||||||
c.conn,
|
c.conn,
|
||||||
runner,
|
runner,
|
||||||
c.token,
|
|
||||||
c.origDestConnID,
|
|
||||||
c.destConnID,
|
c.destConnID,
|
||||||
c.srcConnID,
|
c.srcConnID,
|
||||||
c.config,
|
c.config,
|
||||||
|
|
146
client_test.go
146
client_test.go
|
@ -32,8 +32,6 @@ var _ = Describe("Client", func() {
|
||||||
originalClientSessConstructor func(
|
originalClientSessConstructor func(
|
||||||
conn connection,
|
conn connection,
|
||||||
runner sessionRunner,
|
runner sessionRunner,
|
||||||
token []byte,
|
|
||||||
origDestConnID protocol.ConnectionID,
|
|
||||||
destConnID protocol.ConnectionID,
|
destConnID protocol.ConnectionID,
|
||||||
srcConnID protocol.ConnectionID,
|
srcConnID protocol.ConnectionID,
|
||||||
conf *Config,
|
conf *Config,
|
||||||
|
@ -138,8 +136,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
conn connection,
|
conn connection,
|
||||||
_ sessionRunner,
|
_ sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
@ -170,8 +166,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
_ connection,
|
_ connection,
|
||||||
_ sessionRunner,
|
_ sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
@ -201,8 +195,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
_ connection,
|
_ connection,
|
||||||
runner sessionRunner,
|
runner sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
@ -239,8 +231,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
_ connection,
|
_ connection,
|
||||||
_ sessionRunner,
|
_ sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
@ -280,8 +270,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
_ connection,
|
_ connection,
|
||||||
_ sessionRunner,
|
_ sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
@ -326,8 +314,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
_ connection,
|
_ connection,
|
||||||
runnerP sessionRunner,
|
runnerP sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
@ -372,8 +358,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
connP connection,
|
connP connection,
|
||||||
_ sessionRunner,
|
_ sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
@ -485,8 +469,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
connP connection,
|
connP connection,
|
||||||
_ sessionRunner,
|
_ sessionRunner,
|
||||||
tokenP []byte,
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
configP *Config,
|
configP *Config,
|
||||||
|
@ -514,132 +496,6 @@ var _ = Describe("Client", func() {
|
||||||
Expect(conf.Versions).To(Equal(config.Versions))
|
Expect(conf.Versions).To(Equal(config.Versions))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("creates a new session when the server performs a retry", func() {
|
|
||||||
manager := NewMockPacketHandlerManager(mockCtrl)
|
|
||||||
manager.EXPECT().Add(gomock.Any(), gomock.Any()).Do(func(id protocol.ConnectionID, handler packetHandler) {
|
|
||||||
go handler.handlePacket(&receivedPacket{
|
|
||||||
hdr: &wire.Header{
|
|
||||||
IsLongHeader: true,
|
|
||||||
Type: protocol.PacketTypeRetry,
|
|
||||||
Version: cl.version,
|
|
||||||
Token: []byte("foobar"),
|
|
||||||
OrigDestConnectionID: connID,
|
|
||||||
DestConnectionID: id,
|
|
||||||
},
|
|
||||||
})
|
|
||||||
})
|
|
||||||
manager.EXPECT().Add(gomock.Any(), gomock.Any())
|
|
||||||
mockMultiplexer.EXPECT().AddConn(packetConn, gomock.Any()).Return(manager, nil)
|
|
||||||
|
|
||||||
config := &Config{Versions: []protocol.VersionNumber{protocol.VersionTLS}}
|
|
||||||
cl.config = config
|
|
||||||
run1 := make(chan error)
|
|
||||||
sess1 := NewMockQuicSession(mockCtrl)
|
|
||||||
sess1.EXPECT().run().DoAndReturn(func() error {
|
|
||||||
return <-run1
|
|
||||||
})
|
|
||||||
sess1.EXPECT().closeForRecreating().DoAndReturn(func() protocol.PacketNumber {
|
|
||||||
run1 <- errCloseForRecreating
|
|
||||||
return 42
|
|
||||||
})
|
|
||||||
sess2 := NewMockQuicSession(mockCtrl)
|
|
||||||
sess2.EXPECT().run()
|
|
||||||
sessions := make(chan quicSession, 2)
|
|
||||||
sessions <- sess1
|
|
||||||
sessions <- sess2
|
|
||||||
newClientSession = func(
|
|
||||||
conn connection,
|
|
||||||
_ sessionRunner,
|
|
||||||
_ []byte, // token
|
|
||||||
origDestConnID protocol.ConnectionID,
|
|
||||||
destConnID protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ *Config,
|
|
||||||
_ *tls.Config,
|
|
||||||
initialPacketNumber protocol.PacketNumber,
|
|
||||||
_ *handshake.TransportParameters,
|
|
||||||
_ protocol.VersionNumber,
|
|
||||||
_ utils.Logger,
|
|
||||||
_ protocol.VersionNumber,
|
|
||||||
) (quicSession, error) {
|
|
||||||
switch len(sessions) {
|
|
||||||
case 2: // for the first session
|
|
||||||
Expect(initialPacketNumber).To(BeZero())
|
|
||||||
Expect(origDestConnID).To(BeNil())
|
|
||||||
Expect(destConnID).ToNot(BeNil())
|
|
||||||
case 1: // for the second session
|
|
||||||
Expect(initialPacketNumber).To(Equal(protocol.PacketNumber(42)))
|
|
||||||
Expect(origDestConnID).To(Equal(connID))
|
|
||||||
Expect(destConnID).ToNot(Equal(connID))
|
|
||||||
}
|
|
||||||
return <-sessions, nil
|
|
||||||
}
|
|
||||||
_, err := Dial(packetConn, addr, "localhost:1337", nil, config)
|
|
||||||
Expect(err).ToNot(HaveOccurred())
|
|
||||||
Expect(sessions).To(BeEmpty())
|
|
||||||
})
|
|
||||||
|
|
||||||
It("only accepts a single retry", func() {
|
|
||||||
manager := NewMockPacketHandlerManager(mockCtrl)
|
|
||||||
manager.EXPECT().Add(gomock.Any(), gomock.Any()).Do(func(id protocol.ConnectionID, handler packetHandler) {
|
|
||||||
go handler.handlePacket(&receivedPacket{
|
|
||||||
hdr: &wire.Header{
|
|
||||||
IsLongHeader: true,
|
|
||||||
Type: protocol.PacketTypeRetry,
|
|
||||||
SrcConnectionID: protocol.ConnectionID{1, 2, 3, 4},
|
|
||||||
DestConnectionID: id,
|
|
||||||
OrigDestConnectionID: connID,
|
|
||||||
Token: []byte("foobar"),
|
|
||||||
Version: cl.version,
|
|
||||||
},
|
|
||||||
})
|
|
||||||
}).AnyTimes()
|
|
||||||
manager.EXPECT().Add(gomock.Any(), gomock.Any()).AnyTimes()
|
|
||||||
mockMultiplexer.EXPECT().AddConn(packetConn, gomock.Any()).Return(manager, nil)
|
|
||||||
|
|
||||||
config := &Config{Versions: []protocol.VersionNumber{protocol.VersionTLS}}
|
|
||||||
cl.config = config
|
|
||||||
|
|
||||||
sessions := make(chan quicSession, 2)
|
|
||||||
run := make(chan error)
|
|
||||||
sess := NewMockQuicSession(mockCtrl)
|
|
||||||
sess.EXPECT().run().DoAndReturn(func() error {
|
|
||||||
defer GinkgoRecover()
|
|
||||||
var err error
|
|
||||||
Eventually(run).Should(Receive(&err))
|
|
||||||
return err
|
|
||||||
})
|
|
||||||
sess.EXPECT().closeForRecreating().Do(func() {
|
|
||||||
run <- errCloseForRecreating
|
|
||||||
})
|
|
||||||
sessions <- sess
|
|
||||||
doneErr := errors.New("nothing to do")
|
|
||||||
sess = NewMockQuicSession(mockCtrl)
|
|
||||||
sess.EXPECT().run().Return(doneErr)
|
|
||||||
sessions <- sess
|
|
||||||
|
|
||||||
newClientSession = func(
|
|
||||||
conn connection,
|
|
||||||
_ sessionRunner,
|
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ *Config,
|
|
||||||
_ *tls.Config,
|
|
||||||
_ protocol.PacketNumber,
|
|
||||||
_ *handshake.TransportParameters,
|
|
||||||
_ protocol.VersionNumber,
|
|
||||||
_ utils.Logger,
|
|
||||||
_ protocol.VersionNumber,
|
|
||||||
) (quicSession, error) {
|
|
||||||
return <-sessions, nil
|
|
||||||
}
|
|
||||||
_, err := Dial(packetConn, addr, "localhost:1337", nil, config)
|
|
||||||
Expect(err).To(MatchError(doneErr))
|
|
||||||
Expect(sessions).To(BeEmpty())
|
|
||||||
})
|
|
||||||
|
|
||||||
Context("version negotiation", func() {
|
Context("version negotiation", func() {
|
||||||
var origSupportedVersions []protocol.VersionNumber
|
var origSupportedVersions []protocol.VersionNumber
|
||||||
|
|
||||||
|
@ -661,8 +517,6 @@ var _ = Describe("Client", func() {
|
||||||
newClientSession = func(
|
newClientSession = func(
|
||||||
conn connection,
|
conn connection,
|
||||||
_ sessionRunner,
|
_ sessionRunner,
|
||||||
_ []byte, // token
|
|
||||||
_ protocol.ConnectionID,
|
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ protocol.ConnectionID,
|
_ protocol.ConnectionID,
|
||||||
_ *Config,
|
_ *Config,
|
||||||
|
|
|
@ -14,6 +14,7 @@ type SentPacketHandler interface {
|
||||||
SentPacketsAsRetransmission(packets []*Packet, retransmissionOf protocol.PacketNumber)
|
SentPacketsAsRetransmission(packets []*Packet, retransmissionOf protocol.PacketNumber)
|
||||||
ReceivedAck(ackFrame *wire.AckFrame, withPacketNumber protocol.PacketNumber, encLevel protocol.EncryptionLevel, recvTime time.Time) error
|
ReceivedAck(ackFrame *wire.AckFrame, withPacketNumber protocol.PacketNumber, encLevel protocol.EncryptionLevel, recvTime time.Time) error
|
||||||
SetHandshakeComplete()
|
SetHandshakeComplete()
|
||||||
|
ResetForRetry() error
|
||||||
|
|
||||||
// The SendMode determines if and what kind of packets can be sent.
|
// The SendMode determines if and what kind of packets can be sent.
|
||||||
SendMode() SendMode
|
SendMode() SendMode
|
||||||
|
|
|
@ -578,3 +578,22 @@ func (h *sentPacketHandler) computePTOTimeout() time.Duration {
|
||||||
duration := utils.MaxDuration(h.rttStats.SmoothedOrInitialRTT()+4*h.rttStats.MeanDeviation(), granularity)
|
duration := utils.MaxDuration(h.rttStats.SmoothedOrInitialRTT()+4*h.rttStats.MeanDeviation(), granularity)
|
||||||
return duration << h.ptoCount
|
return duration << h.ptoCount
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (h *sentPacketHandler) ResetForRetry() error {
|
||||||
|
h.cryptoCount = 0
|
||||||
|
h.bytesInFlight = 0
|
||||||
|
var packets []*Packet
|
||||||
|
h.packetHistory.Iterate(func(p *Packet) (bool, error) {
|
||||||
|
if p.canBeRetransmitted {
|
||||||
|
packets = append(packets, p)
|
||||||
|
}
|
||||||
|
return true, nil
|
||||||
|
})
|
||||||
|
for _, p := range packets {
|
||||||
|
h.logger.Debugf("Queueing packet %#x for retransmission.", p.PacketNumber)
|
||||||
|
h.retransmissionQueue = append(h.retransmissionQueue, p)
|
||||||
|
}
|
||||||
|
h.packetHistory = newSentPacketHistory()
|
||||||
|
h.updateLossDetectionAlarm()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
|
@ -873,4 +873,28 @@ var _ = Describe("SentPacketHandler", func() {
|
||||||
Expect(handler.PopPacketNumber()).To(BeNumerically(">", 42))
|
Expect(handler.PopPacketNumber()).To(BeNumerically(">", 42))
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
Context("resetting for retry", func() {
|
||||||
|
It("queues outstanding packets for retransmission and cancels alarms", func() {
|
||||||
|
packet := &Packet{
|
||||||
|
PacketNumber: 42,
|
||||||
|
EncryptionLevel: protocol.EncryptionInitial,
|
||||||
|
Frames: []wire.Frame{&wire.CryptoFrame{Data: []byte("foobar")}},
|
||||||
|
Length: 100,
|
||||||
|
}
|
||||||
|
handler.SentPacket(packet)
|
||||||
|
Expect(handler.GetAlarmTimeout()).ToNot(BeZero())
|
||||||
|
Expect(handler.bytesInFlight).ToNot(BeZero())
|
||||||
|
Expect(handler.DequeuePacketForRetransmission()).To(BeNil())
|
||||||
|
Expect(handler.SendMode()).To(Equal(SendAny))
|
||||||
|
// now receive a Retry
|
||||||
|
Expect(handler.ResetForRetry()).To(Succeed())
|
||||||
|
Expect(handler.bytesInFlight).To(BeZero())
|
||||||
|
Expect(handler.GetAlarmTimeout()).To(BeZero())
|
||||||
|
Expect(handler.SendMode()).To(Equal(SendRetransmission))
|
||||||
|
p := handler.DequeuePacketForRetransmission()
|
||||||
|
Expect(p.PacketNumber).To(Equal(packet.PacketNumber))
|
||||||
|
Expect(p.Frames).To(Equal(packet.Frames))
|
||||||
|
})
|
||||||
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -199,6 +199,16 @@ func newCryptoSetup(
|
||||||
return cs, cs.clientHelloWrittenChan, nil
|
return cs, cs.clientHelloWrittenChan, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (h *cryptoSetup) ChangeConnectionID(id protocol.ConnectionID) error {
|
||||||
|
initialSealer, initialOpener, err := NewInitialAEAD(id, h.perspective)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
h.initialSealer = initialSealer
|
||||||
|
h.initialOpener = initialOpener
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func (h *cryptoSetup) RunHandshake() error {
|
func (h *cryptoSetup) RunHandshake() error {
|
||||||
// Handle errors that might occur when HandleData() is called.
|
// Handle errors that might occur when HandleData() is called.
|
||||||
handshakeErrChan := make(chan error, 1)
|
handshakeErrChan := make(chan error, 1)
|
||||||
|
|
|
@ -32,6 +32,7 @@ type tlsExtensionHandler interface {
|
||||||
type CryptoSetup interface {
|
type CryptoSetup interface {
|
||||||
RunHandshake() error
|
RunHandshake() error
|
||||||
io.Closer
|
io.Closer
|
||||||
|
ChangeConnectionID(protocol.ConnectionID) error
|
||||||
|
|
||||||
HandleMessage([]byte, protocol.EncryptionLevel) bool
|
HandleMessage([]byte, protocol.EncryptionLevel) bool
|
||||||
ConnectionState() ConnectionState
|
ConnectionState() ConnectionState
|
||||||
|
|
|
@ -135,6 +135,18 @@ func (mr *MockSentPacketHandlerMockRecorder) ReceivedAck(arg0, arg1, arg2, arg3
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReceivedAck", reflect.TypeOf((*MockSentPacketHandler)(nil).ReceivedAck), arg0, arg1, arg2, arg3)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReceivedAck", reflect.TypeOf((*MockSentPacketHandler)(nil).ReceivedAck), arg0, arg1, arg2, arg3)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ResetForRetry mocks base method
|
||||||
|
func (m *MockSentPacketHandler) ResetForRetry() error {
|
||||||
|
ret := m.ctrl.Call(m, "ResetForRetry")
|
||||||
|
ret0, _ := ret[0].(error)
|
||||||
|
return ret0
|
||||||
|
}
|
||||||
|
|
||||||
|
// ResetForRetry indicates an expected call of ResetForRetry
|
||||||
|
func (mr *MockSentPacketHandlerMockRecorder) ResetForRetry() *gomock.Call {
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResetForRetry", reflect.TypeOf((*MockSentPacketHandler)(nil).ResetForRetry))
|
||||||
|
}
|
||||||
|
|
||||||
// SendMode mocks base method
|
// SendMode mocks base method
|
||||||
func (m *MockSentPacketHandler) SendMode() ackhandler.SendMode {
|
func (m *MockSentPacketHandler) SendMode() ackhandler.SendMode {
|
||||||
ret := m.ctrl.Call(m, "SendMode")
|
ret := m.ctrl.Call(m, "SendMode")
|
||||||
|
|
|
@ -35,6 +35,18 @@ func (m *MockCryptoSetup) EXPECT() *MockCryptoSetupMockRecorder {
|
||||||
return m.recorder
|
return m.recorder
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ChangeConnectionID mocks base method
|
||||||
|
func (m *MockCryptoSetup) ChangeConnectionID(arg0 protocol.ConnectionID) error {
|
||||||
|
ret := m.ctrl.Call(m, "ChangeConnectionID", arg0)
|
||||||
|
ret0, _ := ret[0].(error)
|
||||||
|
return ret0
|
||||||
|
}
|
||||||
|
|
||||||
|
// ChangeConnectionID indicates an expected call of ChangeConnectionID
|
||||||
|
func (mr *MockCryptoSetupMockRecorder) ChangeConnectionID(arg0 interface{}) *gomock.Call {
|
||||||
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeConnectionID", reflect.TypeOf((*MockCryptoSetup)(nil).ChangeConnectionID), arg0)
|
||||||
|
}
|
||||||
|
|
||||||
// Close mocks base method
|
// Close mocks base method
|
||||||
func (m *MockCryptoSetup) Close() error {
|
func (m *MockCryptoSetup) Close() error {
|
||||||
ret := m.ctrl.Call(m, "Close")
|
ret := m.ctrl.Call(m, "Close")
|
||||||
|
|
51
session.go
51
session.go
|
@ -48,6 +48,7 @@ type streamManager interface {
|
||||||
|
|
||||||
type cryptoStreamHandler interface {
|
type cryptoStreamHandler interface {
|
||||||
RunHandshake() error
|
RunHandshake() error
|
||||||
|
ChangeConnectionID(protocol.ConnectionID) error
|
||||||
io.Closer
|
io.Closer
|
||||||
ConnectionState() handshake.ConnectionState
|
ConnectionState() handshake.ConnectionState
|
||||||
}
|
}
|
||||||
|
@ -120,6 +121,7 @@ type session struct {
|
||||||
handshakeCompleteChan chan struct{} // is closed when the handshake completes
|
handshakeCompleteChan chan struct{} // is closed when the handshake completes
|
||||||
handshakeComplete bool
|
handshakeComplete bool
|
||||||
|
|
||||||
|
receivedRetry bool
|
||||||
receivedFirstPacket bool
|
receivedFirstPacket bool
|
||||||
receivedFirstForwardSecurePacket bool
|
receivedFirstForwardSecurePacket bool
|
||||||
|
|
||||||
|
@ -221,8 +223,6 @@ var newSession = func(
|
||||||
var newClientSession = func(
|
var newClientSession = func(
|
||||||
conn connection,
|
conn connection,
|
||||||
runner sessionRunner,
|
runner sessionRunner,
|
||||||
token []byte,
|
|
||||||
origDestConnID protocol.ConnectionID,
|
|
||||||
destConnID protocol.ConnectionID,
|
destConnID protocol.ConnectionID,
|
||||||
srcConnID protocol.ConnectionID,
|
srcConnID protocol.ConnectionID,
|
||||||
conf *Config,
|
conf *Config,
|
||||||
|
@ -239,7 +239,6 @@ var newClientSession = func(
|
||||||
config: conf,
|
config: conf,
|
||||||
srcConnID: srcConnID,
|
srcConnID: srcConnID,
|
||||||
destConnID: destConnID,
|
destConnID: destConnID,
|
||||||
origDestConnID: origDestConnID,
|
|
||||||
perspective: protocol.PerspectiveClient,
|
perspective: protocol.PerspectiveClient,
|
||||||
handshakeCompleteChan: make(chan struct{}),
|
handshakeCompleteChan: make(chan struct{}),
|
||||||
logger: logger,
|
logger: logger,
|
||||||
|
@ -292,7 +291,6 @@ var newClientSession = func(
|
||||||
s.perspective,
|
s.perspective,
|
||||||
s.version,
|
s.version,
|
||||||
)
|
)
|
||||||
s.packer.SetToken(token)
|
|
||||||
return s, s.postSetup()
|
return s, s.postSetup()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -491,6 +489,10 @@ func (s *session) handlePacketImpl(p *receivedPacket) bool /* was the packet suc
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
if p.hdr.Type == protocol.PacketTypeRetry {
|
||||||
|
return s.handleRetryPacket(p)
|
||||||
|
}
|
||||||
|
|
||||||
// The server can change the source connection ID with the first Handshake packet.
|
// The server can change the source connection ID with the first Handshake packet.
|
||||||
// After this, all packets with a different source connection have to be ignored.
|
// After this, all packets with a different source connection have to be ignored.
|
||||||
if s.receivedFirstPacket && p.hdr.IsLongHeader && !p.hdr.SrcConnectionID.Equal(s.destConnID) {
|
if s.receivedFirstPacket && p.hdr.IsLongHeader && !p.hdr.SrcConnectionID.Equal(s.destConnID) {
|
||||||
|
@ -529,6 +531,47 @@ func (s *session) handlePacketImpl(p *receivedPacket) bool /* was the packet suc
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s *session) handleRetryPacket(p *receivedPacket) bool /* was this a valid Retry */ {
|
||||||
|
if s.perspective == protocol.PerspectiveServer {
|
||||||
|
s.logger.Debugf("Ignoring Retry.")
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if s.receivedFirstPacket {
|
||||||
|
s.logger.Debugf("Ignoring Retry, since we already received a packet.")
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
hdr := p.hdr
|
||||||
|
(&wire.ExtendedHeader{Header: *hdr}).Log(s.logger)
|
||||||
|
if !hdr.OrigDestConnectionID.Equal(s.destConnID) {
|
||||||
|
s.logger.Debugf("Ignoring spoofed Retry. Original Destination Connection ID: %s, expected: %s", hdr.OrigDestConnectionID, s.destConnID)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if hdr.SrcConnectionID.Equal(s.destConnID) {
|
||||||
|
s.logger.Debugf("Ignoring Retry, since the server didn't change the Source Connection ID.")
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
// If a token is already set, this means that we already received a Retry from the server.
|
||||||
|
// Ignore this Retry packet.
|
||||||
|
if s.receivedRetry {
|
||||||
|
s.logger.Debugf("Ignoring Retry, since a Retry was already received.")
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
s.logger.Debugf("<- Received Retry")
|
||||||
|
s.logger.Debugf("Switching destination connection ID to: %s", hdr.SrcConnectionID)
|
||||||
|
s.origDestConnID = s.destConnID
|
||||||
|
s.destConnID = hdr.SrcConnectionID
|
||||||
|
s.receivedRetry = true
|
||||||
|
if err := s.sentPacketHandler.ResetForRetry(); err != nil {
|
||||||
|
s.closeLocal(err)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
s.cryptoStreamHandler.ChangeConnectionID(s.destConnID)
|
||||||
|
s.packer.SetToken(hdr.Token)
|
||||||
|
s.packer.ChangeDestConnectionID(s.destConnID)
|
||||||
|
s.scheduleSending()
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
func (s *session) handleUnpackedPacket(packet *unpackedPacket, rcvTime time.Time) error {
|
func (s *session) handleUnpackedPacket(packet *unpackedPacket, rcvTime time.Time) error {
|
||||||
if len(packet.data) == 0 {
|
if len(packet.data) == 0 {
|
||||||
return qerr.MissingPayload
|
return qerr.MissingPayload
|
||||||
|
|
|
@ -4,7 +4,6 @@ import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
|
||||||
"net"
|
"net"
|
||||||
"runtime/pprof"
|
"runtime/pprof"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -355,6 +354,20 @@ var _ = Describe("Session", func() {
|
||||||
Expect(str).To(Equal(mstr))
|
Expect(str).To(Equal(mstr))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("drops Retry packets", func() {
|
||||||
|
hdr := wire.Header{
|
||||||
|
IsLongHeader: true,
|
||||||
|
Type: protocol.PacketTypeRetry,
|
||||||
|
}
|
||||||
|
buf := &bytes.Buffer{}
|
||||||
|
(&wire.ExtendedHeader{Header: hdr}).Write(buf, sess.version)
|
||||||
|
Expect(sess.handlePacketImpl(&receivedPacket{
|
||||||
|
hdr: &hdr,
|
||||||
|
data: buf.Bytes(),
|
||||||
|
buffer: getPacketBuffer(),
|
||||||
|
})).To(BeFalse())
|
||||||
|
})
|
||||||
|
|
||||||
Context("closing", func() {
|
Context("closing", func() {
|
||||||
var (
|
var (
|
||||||
runErr error
|
runErr error
|
||||||
|
@ -1431,10 +1444,8 @@ var _ = Describe("Client Session", func() {
|
||||||
sessP, err := newClientSession(
|
sessP, err := newClientSession(
|
||||||
mconn,
|
mconn,
|
||||||
sessionRunner,
|
sessionRunner,
|
||||||
[]byte("token"),
|
|
||||||
protocol.ConnectionID{8, 7, 6, 5, 4, 3, 2, 1},
|
|
||||||
protocol.ConnectionID{8, 7, 6, 5, 4, 3, 2, 1},
|
|
||||||
protocol.ConnectionID{8, 7, 6, 5, 4, 3, 2, 1},
|
protocol.ConnectionID{8, 7, 6, 5, 4, 3, 2, 1},
|
||||||
|
protocol.ConnectionID{1, 2, 3, 4, 5, 6, 7, 8},
|
||||||
populateClientConfig(&Config{}, true),
|
populateClientConfig(&Config{}, true),
|
||||||
nil, // tls.Config
|
nil, // tls.Config
|
||||||
42, // initial packet number
|
42, // initial packet number
|
||||||
|
@ -1486,6 +1497,60 @@ var _ = Describe("Client Session", func() {
|
||||||
Eventually(sess.Context().Done()).Should(BeClosed())
|
Eventually(sess.Context().Done()).Should(BeClosed())
|
||||||
})
|
})
|
||||||
|
|
||||||
|
Context("handling Retry", func() {
|
||||||
|
var validRetryHdr *wire.Header
|
||||||
|
|
||||||
|
BeforeEach(func() {
|
||||||
|
validRetryHdr = &wire.Header{
|
||||||
|
IsLongHeader: true,
|
||||||
|
Type: protocol.PacketTypeRetry,
|
||||||
|
SrcConnectionID: protocol.ConnectionID{0xde, 0xad, 0xbe, 0xef},
|
||||||
|
DestConnectionID: protocol.ConnectionID{1, 2, 3, 4, 5, 6, 7, 8},
|
||||||
|
OrigDestConnectionID: protocol.ConnectionID{8, 7, 6, 5, 4, 3, 2, 1},
|
||||||
|
Token: []byte("foobar"),
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
getPacket := func(hdr *wire.Header) *receivedPacket {
|
||||||
|
buf := &bytes.Buffer{}
|
||||||
|
(&wire.ExtendedHeader{Header: *hdr}).Write(buf, sess.version)
|
||||||
|
return &receivedPacket{
|
||||||
|
hdr: hdr,
|
||||||
|
data: buf.Bytes(),
|
||||||
|
buffer: getPacketBuffer(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
It("handles Retry packets", func() {
|
||||||
|
cryptoSetup.EXPECT().ChangeConnectionID(protocol.ConnectionID{0xde, 0xad, 0xbe, 0xef})
|
||||||
|
packer.EXPECT().SetToken([]byte("foobar"))
|
||||||
|
packer.EXPECT().ChangeDestConnectionID(protocol.ConnectionID{0xde, 0xad, 0xbe, 0xef})
|
||||||
|
Expect(sess.handlePacketImpl(getPacket(validRetryHdr))).To(BeTrue())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("ignores Retry packets after receiving a regular packet", func() {
|
||||||
|
sess.receivedFirstPacket = true
|
||||||
|
Expect(sess.handlePacketImpl(getPacket(validRetryHdr))).To(BeFalse())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("ignores Retry packets if the server didn't change the connection ID", func() {
|
||||||
|
validRetryHdr.SrcConnectionID = sess.destConnID
|
||||||
|
Expect(sess.handlePacketImpl(getPacket(validRetryHdr))).To(BeFalse())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("ignores Retry packets with the wrong original destination connection ID", func() {
|
||||||
|
hdr := &wire.Header{
|
||||||
|
IsLongHeader: true,
|
||||||
|
Type: protocol.PacketTypeRetry,
|
||||||
|
SrcConnectionID: protocol.ConnectionID{0xde, 0xad, 0xbe, 0xef},
|
||||||
|
DestConnectionID: protocol.ConnectionID{1, 2, 3, 4, 5, 6, 7, 8},
|
||||||
|
OrigDestConnectionID: protocol.ConnectionID{1, 2, 3, 4},
|
||||||
|
Token: []byte("foobar"),
|
||||||
|
}
|
||||||
|
Expect(sess.handlePacketImpl(getPacket(hdr))).To(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
Context("transport parameters", func() {
|
Context("transport parameters", func() {
|
||||||
It("errors if it can't unmarshal the TransportParameters", func() {
|
It("errors if it can't unmarshal the TransportParameters", func() {
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -1522,7 +1587,7 @@ var _ = Describe("Client Session", func() {
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
_, err := sess.processTransportParametersForClient(eetp.Marshal())
|
_, err := sess.processTransportParametersForClient(eetp.Marshal())
|
||||||
Expect(err).To(MatchError(fmt.Sprintf("expected original_connection_id to equal %s, is 0xdecafbad", sess.destConnID)))
|
Expect(err).To(MatchError("expected original_connection_id to equal (empty), is 0xdecafbad"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("errors if the TransportParameters contain an original_connection_id, although no Retry was performed", func() {
|
It("errors if the TransportParameters contain an original_connection_id, although no Retry was performed", func() {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue