add a quic.Config option to set the handshake timeout

This commit is contained in:
Marten Seemann 2017-06-01 19:30:38 +02:00
parent a025e89f03
commit 9040fd25e7
No known key found for this signature in database
GPG key ID: 3603F40B121FCDEA
9 changed files with 47 additions and 13 deletions

View file

@ -5,4 +5,5 @@
- Add a `quic.Config` option for QUIC versions - Add a `quic.Config` option for QUIC versions
- Add a `quic.Config` option to request truncation of the connection ID from a server - Add a `quic.Config` option to request truncation of the connection ID from a server
- Add a `quic.Config` option to configure the source address validation - Add a `quic.Config` option to configure the source address validation
- Add a `quic.Config` option to configure the handshake timeout
- Various bugfixes - Various bugfixes

View file

@ -118,9 +118,15 @@ func populateClientConfig(config *Config) *Config {
versions = protocol.SupportedVersions versions = protocol.SupportedVersions
} }
handshakeTimeout := protocol.DefaultHandshakeTimeout
if config.HandshakeTimeout != 0 {
handshakeTimeout = config.HandshakeTimeout
}
return &Config{ return &Config{
TLSConfig: config.TLSConfig, TLSConfig: config.TLSConfig,
Versions: versions, Versions: versions,
HandshakeTimeout: handshakeTimeout,
RequestConnectionIDTruncation: config.RequestConnectionIDTruncation, RequestConnectionIDTruncation: config.RequestConnectionIDTruncation,
} }
} }

View file

@ -4,6 +4,7 @@ import (
"bytes" "bytes"
"errors" "errors"
"net" "net"
"time"
"github.com/lucas-clemente/quic-go/protocol" "github.com/lucas-clemente/quic-go/protocol"
"github.com/lucas-clemente/quic-go/qerr" "github.com/lucas-clemente/quic-go/qerr"
@ -153,9 +154,21 @@ var _ = Describe("Client", func() {
close(done) close(done)
}) })
It("uses all supported versions, if none are specified in the quic.Config", func() { It("setups with the right values", func() {
config := &Config{
HandshakeTimeout: 1337 * time.Minute,
RequestConnectionIDTruncation: true,
}
c := populateClientConfig(config)
Expect(c.HandshakeTimeout).To(Equal(1337 * time.Minute))
Expect(c.RequestConnectionIDTruncation).To(BeTrue())
})
It("fills in default values if options are not set in the Config", func() {
c := populateClientConfig(&Config{}) c := populateClientConfig(&Config{})
Expect(c.Versions).To(Equal(protocol.SupportedVersions)) Expect(c.Versions).To(Equal(protocol.SupportedVersions))
Expect(c.HandshakeTimeout).To(Equal(protocol.DefaultHandshakeTimeout))
Expect(c.RequestConnectionIDTruncation).To(BeFalse())
}) })
It("errors when receiving an invalid first packet from the server", func(done Done) { It("errors when receiving an invalid first packet from the server", func(done Done) {
@ -310,7 +323,7 @@ var _ = Describe("Client", func() {
Expect(cconn.(*conn).pconn).To(Equal(packetConn)) Expect(cconn.(*conn).pconn).To(Equal(packetConn))
Expect(hostname).To(Equal("quic.clemente.io")) Expect(hostname).To(Equal("quic.clemente.io"))
Expect(version).To(Equal(cl.version)) Expect(version).To(Equal(cl.version))
Expect(conf).To(Equal(config)) Expect(conf.Versions).To(Equal(config.Versions))
close(done) close(done)
}) })

View file

@ -71,6 +71,10 @@ type Config struct {
// This saves 8 bytes in the Public Header in every packet. However, if the IP address of the server changes, the connection cannot be migrated. // This saves 8 bytes in the Public Header in every packet. However, if the IP address of the server changes, the connection cannot be migrated.
// Currently only valid for the client. // Currently only valid for the client.
RequestConnectionIDTruncation bool RequestConnectionIDTruncation bool
// HandshakeTimeout is the maximum duration that the cryptographic handshake may take.
// If the timeout is exceeded, the connection is closed.
// If this value is zero, the timeout is set to 10 seconds.
HandshakeTimeout time.Duration
// AcceptSTK determines if an STK is accepted. // AcceptSTK determines if an STK is accepted.
// It is called with stk = nil if the client didn't send an STK. // It is called with stk = nil if the client didn't send an STK.
// If not set, it verifies that the address matches, and that the STK was issued within the last 24 hours // If not set, it verifies that the address matches, and that the STK was issued within the last 24 hours

View file

@ -128,8 +128,8 @@ const MaxIdleTimeoutServer = 1 * time.Minute
// MaxIdleTimeoutClient is the idle timeout that the client suggests to the server // MaxIdleTimeoutClient is the idle timeout that the client suggests to the server
const MaxIdleTimeoutClient = 2 * time.Minute const MaxIdleTimeoutClient = 2 * time.Minute
// MaxTimeForCryptoHandshake is the default timeout for a connection until the crypto handshake succeeds. // DefaultHandshakeTimeout is the default timeout for a connection until the crypto handshake succeeds.
const MaxTimeForCryptoHandshake = 10 * time.Second const DefaultHandshakeTimeout = 10 * time.Second
// ClosedSessionDeleteTimeout the server ignores packets arriving on a connection that is already closed // ClosedSessionDeleteTimeout the server ignores packets arriving on a connection that is already closed
// after this time all information about the old connection will be deleted // after this time all information about the old connection will be deleted

View file

@ -106,15 +106,22 @@ func populateServerConfig(config *Config) *Config {
if len(versions) == 0 { if len(versions) == 0 {
versions = protocol.SupportedVersions versions = protocol.SupportedVersions
} }
vsa := defaultAcceptSTK vsa := defaultAcceptSTK
if config.AcceptSTK != nil { if config.AcceptSTK != nil {
vsa = config.AcceptSTK vsa = config.AcceptSTK
} }
handshakeTimeout := protocol.DefaultHandshakeTimeout
if config.HandshakeTimeout != 0 {
handshakeTimeout = config.HandshakeTimeout
}
return &Config{ return &Config{
TLSConfig: config.TLSConfig, TLSConfig: config.TLSConfig,
Versions: versions, Versions: versions,
AcceptSTK: vsa, HandshakeTimeout: handshakeTimeout,
AcceptSTK: vsa,
} }
} }

View file

@ -345,9 +345,10 @@ var _ = Describe("Server", func() {
supportedVersions := []protocol.VersionNumber{1, 3, 5} supportedVersions := []protocol.VersionNumber{1, 3, 5}
acceptSTK := func(_ net.Addr, _ *STK) bool { return true } acceptSTK := func(_ net.Addr, _ *STK) bool { return true }
config := Config{ config := Config{
TLSConfig: &tls.Config{}, TLSConfig: &tls.Config{},
Versions: supportedVersions, Versions: supportedVersions,
AcceptSTK: acceptSTK, AcceptSTK: acceptSTK,
HandshakeTimeout: 1337 * time.Hour,
} }
ln, err := Listen(conn, &config) ln, err := Listen(conn, &config)
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
@ -356,6 +357,7 @@ var _ = Describe("Server", func() {
Expect(server.sessions).ToNot(BeNil()) Expect(server.sessions).ToNot(BeNil())
Expect(server.scfg).ToNot(BeNil()) Expect(server.scfg).ToNot(BeNil())
Expect(server.config.Versions).To(Equal(supportedVersions)) Expect(server.config.Versions).To(Equal(supportedVersions))
Expect(server.config.HandshakeTimeout).To(Equal(1337 * time.Hour))
Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(acceptSTK))) Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(acceptSTK)))
}) })
@ -365,6 +367,7 @@ var _ = Describe("Server", func() {
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
server := ln.(*server) server := ln.(*server)
Expect(server.config.Versions).To(Equal(protocol.SupportedVersions)) Expect(server.config.Versions).To(Equal(protocol.SupportedVersions))
Expect(server.config.HandshakeTimeout).To(Equal(protocol.DefaultHandshakeTimeout))
Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(defaultAcceptSTK))) Expect(reflect.ValueOf(server.config.AcceptSTK)).To(Equal(reflect.ValueOf(defaultAcceptSTK)))
}) })

View file

@ -327,7 +327,7 @@ runLoop:
if now.Sub(s.lastNetworkActivityTime) >= s.idleTimeout() { if now.Sub(s.lastNetworkActivityTime) >= s.idleTimeout() {
s.close(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity.")) s.close(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
} }
if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= protocol.MaxTimeForCryptoHandshake { if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
s.close(qerr.Error(qerr.NetworkIdleTimeout, "Crypto handshake did not complete in time.")) s.close(qerr.Error(qerr.NetworkIdleTimeout, "Crypto handshake did not complete in time."))
} }
s.garbageCollectStreams() s.garbageCollectStreams()
@ -354,7 +354,7 @@ func (s *session) maybeResetTimer() {
nextDeadline = utils.MinTime(nextDeadline, lossTime) nextDeadline = utils.MinTime(nextDeadline, lossTime)
} }
if !s.handshakeComplete { if !s.handshakeComplete {
handshakeDeadline := s.sessionCreationTime.Add(protocol.MaxTimeForCryptoHandshake) handshakeDeadline := s.sessionCreationTime.Add(s.config.HandshakeTimeout)
nextDeadline = utils.MinTime(nextDeadline, handshakeDeadline) nextDeadline = utils.MinTime(nextDeadline, handshakeDeadline)
} }
if !s.receivedTooManyUndecrytablePacketsTime.IsZero() { if !s.receivedTooManyUndecrytablePacketsTime.IsZero() {

View file

@ -1403,7 +1403,7 @@ var _ = Describe("Session", func() {
}) })
It("times out due to non-completed crypto handshake", func(done Done) { It("times out due to non-completed crypto handshake", func(done Done) {
sess.sessionCreationTime = time.Now().Add(-time.Hour) sess.sessionCreationTime = time.Now().Add(-protocol.DefaultHandshakeTimeout).Add(-time.Second)
sess.run() // Would normally not return sess.run() // Would normally not return
Expect(mconn.written[0]).To(ContainSubstring("Crypto handshake did not complete in time.")) Expect(mconn.written[0]).To(ContainSubstring("Crypto handshake did not complete in time."))
Expect(sess.runClosed).To(BeClosed()) Expect(sess.runClosed).To(BeClosed())