don't negotiate the idle timeout

The idle timeout doesn't need to be negotiated, simply announcing it to
the peer is sufficient. We now close the session if there's no incoming
network activity for the duration of the local idle timeout, and we
send a PING frame after half the remote idle timeout (if keep alives are
enabled).
This commit is contained in:
Marten Seemann 2017-10-02 18:16:27 -07:00
parent 52ed5579f7
commit a8b603b7bf
7 changed files with 53 additions and 90 deletions

View file

@ -62,8 +62,7 @@ func (h *paramsNegotiator) SetFromTransportParameters(params []transportParamete
if len(p.Value) != 2 { if len(p.Value) != 2 {
return fmt.Errorf("wrong length for idle_timeout: %d (expected 2)", len(p.Value)) return fmt.Errorf("wrong length for idle_timeout: %d (expected 2)", len(p.Value))
} }
val := time.Duration(binary.BigEndian.Uint16(p.Value)) * time.Second h.remoteIdleTimeout = time.Duration(binary.BigEndian.Uint16(p.Value)) * time.Second
h.idleConnectionStateLifetime = h.negotiateIdleConnectionStateLifetime(val)
case omitConnectionIDParameterID: case omitConnectionIDParameterID:
if len(p.Value) != 0 { if len(p.Value) != 0 {
return fmt.Errorf("wrong length for omit_connection_id: %d (expected empty)", len(p.Value)) return fmt.Errorf("wrong length for omit_connection_id: %d (expected empty)", len(p.Value))
@ -87,7 +86,7 @@ func (h *paramsNegotiator) GetTransportParameters() []transportParameter {
// TODO: use a reasonable value here // TODO: use a reasonable value here
binary.BigEndian.PutUint32(initialMaxStreamID, math.MaxUint32) binary.BigEndian.PutUint32(initialMaxStreamID, math.MaxUint32)
idleTimeout := make([]byte, 2) idleTimeout := make([]byte, 2)
binary.BigEndian.PutUint16(idleTimeout, uint16(h.GetIdleConnectionStateLifetime().Seconds())) binary.BigEndian.PutUint16(idleTimeout, uint16(h.idleTimeout))
maxPacketSize := make([]byte, 2) maxPacketSize := make([]byte, 2)
binary.BigEndian.PutUint16(maxPacketSize, uint16(protocol.MaxReceivePacketSize)) binary.BigEndian.PutUint16(maxPacketSize, uint16(protocol.MaxReceivePacketSize))
params := []transportParameter{ params := []transportParameter{

View file

@ -19,6 +19,7 @@ type ParamsNegotiator interface {
GetMaxReceiveConnectionFlowControlWindow() protocol.ByteCount GetMaxReceiveConnectionFlowControlWindow() protocol.ByteCount
GetMaxOutgoingStreams() uint32 GetMaxOutgoingStreams() uint32
GetMaxIncomingStreams() uint32 GetMaxIncomingStreams() uint32
// get the idle timeout that was sent by the peer
GetIdleConnectionStateLifetime() time.Duration GetIdleConnectionStateLifetime() time.Duration
// determines if the client requests omission of connection IDs. // determines if the client requests omission of connection IDs.
OmitConnectionID() bool OmitConnectionID() bool
@ -43,7 +44,8 @@ type paramsNegotiatorBase struct {
maxStreamsPerConnection uint32 maxStreamsPerConnection uint32
maxIncomingDynamicStreamsPerConnection uint32 maxIncomingDynamicStreamsPerConnection uint32
idleConnectionStateLifetime time.Duration idleTimeout time.Duration
remoteIdleTimeout time.Duration
sendStreamFlowControlWindow protocol.ByteCount sendStreamFlowControlWindow protocol.ByteCount
sendConnectionFlowControlWindow protocol.ByteCount sendConnectionFlowControlWindow protocol.ByteCount
receiveStreamFlowControlWindow protocol.ByteCount receiveStreamFlowControlWindow protocol.ByteCount
@ -61,7 +63,7 @@ func (h *paramsNegotiatorBase) init(params *TransportParameters) {
h.maxReceiveConnectionFlowControlWindow = params.MaxReceiveConnectionFlowControlWindow h.maxReceiveConnectionFlowControlWindow = params.MaxReceiveConnectionFlowControlWindow
h.requestConnectionIDOmission = params.RequestConnectionIDOmission h.requestConnectionIDOmission = params.RequestConnectionIDOmission
h.idleConnectionStateLifetime = params.IdleTimeout h.idleTimeout = params.IdleTimeout
if h.perspective == protocol.PerspectiveServer { if h.perspective == protocol.PerspectiveServer {
h.maxStreamsPerConnection = protocol.MaxStreamsPerConnection // this is the value negotiated based on what the client sent h.maxStreamsPerConnection = protocol.MaxStreamsPerConnection // this is the value negotiated based on what the client sent
h.maxIncomingDynamicStreamsPerConnection = protocol.MaxStreamsPerConnection // "incoming" seen from the client's perspective h.maxIncomingDynamicStreamsPerConnection = protocol.MaxStreamsPerConnection // "incoming" seen from the client's perspective
@ -79,10 +81,6 @@ func (h *paramsNegotiatorBase) negotiateMaxIncomingDynamicStreamsPerConnection(c
return utils.MinUint32(clientValue, protocol.MaxIncomingDynamicStreamsPerConnection) return utils.MinUint32(clientValue, protocol.MaxIncomingDynamicStreamsPerConnection)
} }
func (h *paramsNegotiatorBase) negotiateIdleConnectionStateLifetime(clientValue time.Duration) time.Duration {
return utils.MinDuration(clientValue, h.idleConnectionStateLifetime)
}
// GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data // GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data
func (h *paramsNegotiatorBase) GetSendStreamFlowControlWindow() protocol.ByteCount { func (h *paramsNegotiatorBase) GetSendStreamFlowControlWindow() protocol.ByteCount {
h.mutex.RLock() h.mutex.RLock()
@ -137,5 +135,5 @@ func (h *paramsNegotiatorBase) GetMaxIncomingStreams() uint32 {
func (h *paramsNegotiatorBase) GetIdleConnectionStateLifetime() time.Duration { func (h *paramsNegotiatorBase) GetIdleConnectionStateLifetime() time.Duration {
h.mutex.RLock() h.mutex.RLock()
defer h.mutex.RUnlock() defer h.mutex.RUnlock()
return h.idleConnectionStateLifetime return h.remoteIdleTimeout
} }

View file

@ -61,7 +61,7 @@ func (h *paramsNegotiatorGQUIC) SetFromMap(params map[Tag][]byte) error {
if err != nil { if err != nil {
return errMalformedTag return errMalformedTag
} }
h.idleConnectionStateLifetime = h.negotiateIdleConnectionStateLifetime(time.Duration(clientValue) * time.Second) h.remoteIdleTimeout = time.Duration(clientValue) * time.Second
} }
if value, ok := params[TagSFCW]; ok { if value, ok := params[TagSFCW]; ok {
if h.flowControlNegotiated { if h.flowControlNegotiated {
@ -104,7 +104,7 @@ func (h *paramsNegotiatorGQUIC) GetHelloMap() (map[Tag][]byte, error) {
mids := bytes.NewBuffer([]byte{}) mids := bytes.NewBuffer([]byte{})
utils.LittleEndian.WriteUint32(mids, protocol.MaxIncomingDynamicStreamsPerConnection) utils.LittleEndian.WriteUint32(mids, protocol.MaxIncomingDynamicStreamsPerConnection)
icsl := bytes.NewBuffer([]byte{}) icsl := bytes.NewBuffer([]byte{})
utils.LittleEndian.WriteUint32(icsl, uint32(h.GetIdleConnectionStateLifetime()/time.Second)) utils.LittleEndian.WriteUint32(icsl, uint32(h.idleTimeout/time.Second))
return map[Tag][]byte{ return map[Tag][]byte{
TagICSL: icsl.Bytes(), TagICSL: icsl.Bytes(),

View file

@ -71,11 +71,11 @@ var _ = Describe("Params Negotiator (for gQUIC)", func() {
}) })
It("sets the connection-level flow control windows in SHLO", func() { It("sets the connection-level flow control windows in SHLO", func() {
pn.idleConnectionStateLifetime = 0xDECAFBAD * time.Second pn.idleTimeout = 0xdecafbad * time.Second
entryMap, err := pn.GetHelloMap() entryMap, err := pn.GetHelloMap()
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
Expect(entryMap).To(HaveKey(TagICSL)) Expect(entryMap).To(HaveKey(TagICSL))
Expect(entryMap[TagICSL]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE})) Expect(entryMap[TagICSL]).To(Equal([]byte{0xad, 0xfb, 0xca, 0xde}))
}) })
It("sets the negotiated value for maximum streams in the SHLO", func() { It("sets the negotiated value for maximum streams in the SHLO", func() {
@ -211,21 +211,8 @@ var _ = Describe("Params Negotiator (for gQUIC)", func() {
}) })
}) })
Context("idle connection state lifetime", func() { Context("idle timeout", func() {
It("has initial idle connection state lifetime", func() {
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(idleTimeout))
})
It("negotiates correctly when the peer wants a longer lifetime", func() {
Expect(pn.negotiateIdleConnectionStateLifetime(idleTimeout + 10*time.Second)).To(Equal(idleTimeout))
})
It("negotiates correctly when the peer wants a shorter lifetime", func() {
Expect(pn.negotiateIdleConnectionStateLifetime(idleTimeout - 3*time.Second)).To(Equal(idleTimeout - 3*time.Second))
})
It("sets the negotiated lifetime", func() { It("sets the negotiated lifetime", func() {
// this test only works if the value given here is smaller than protocol.MaxIdleConnectionStateLifetime
values := map[Tag][]byte{ values := map[Tag][]byte{
TagICSL: {10, 0, 0, 0}, TagICSL: {10, 0, 0, 0},
} }
@ -234,21 +221,6 @@ var _ = Describe("Params Negotiator (for gQUIC)", func() {
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(10 * time.Second)) Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(10 * time.Second))
}) })
It("does not change the idle connection state lifetime when given an invalid value", func() {
values := map[Tag][]byte{
TagSFCW: {0xDE, 0xAD, 0xBE}, // 1 byte too short
}
err := pn.SetFromMap(values)
Expect(err).To(MatchError(errMalformedTag))
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(idleTimeout))
})
It("gets idle connection state lifetime", func() {
value := 0xDECAFBAD * time.Second
pn.idleConnectionStateLifetime = value
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(value))
})
It("errors when given an invalid value", func() { It("errors when given an invalid value", func() {
values := map[Tag][]byte{TagICSL: {2, 0, 0}} // 1 byte too short values := map[Tag][]byte{TagICSL: {2, 0, 0}} // 1 byte too short
err := pn.SetFromMap(values) err := pn.SetFromMap(values)

View file

@ -33,9 +33,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
pn = newParamsNegotiator( pn = newParamsNegotiator(
protocol.PerspectiveServer, protocol.PerspectiveServer,
protocol.VersionWhatever, protocol.VersionWhatever,
&TransportParameters{ &TransportParameters{},
IdleTimeout: 0x5000 * time.Second,
},
) )
params = map[transportParameterID][]byte{ params = map[transportParameterID][]byte{
initialMaxStreamDataParameterID: []byte{0x11, 0x22, 0x33, 0x44}, initialMaxStreamDataParameterID: []byte{0x11, 0x22, 0x33, 0x44},
@ -47,6 +45,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
Context("getting", func() { Context("getting", func() {
It("creates the parameters list", func() { It("creates the parameters list", func() {
pn.idleTimeout = 0xcafe
buf := make([]byte, 4) buf := make([]byte, 4)
values := paramsListToMap(pn.GetTransportParameters()) values := paramsListToMap(pn.GetTransportParameters())
Expect(values).To(HaveLen(5)) Expect(values).To(HaveLen(5))
@ -55,7 +54,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
binary.BigEndian.PutUint32(buf, uint32(protocol.ReceiveConnectionFlowControlWindow)) binary.BigEndian.PutUint32(buf, uint32(protocol.ReceiveConnectionFlowControlWindow))
Expect(values).To(HaveKeyWithValue(initialMaxDataParameterID, buf)) Expect(values).To(HaveKeyWithValue(initialMaxDataParameterID, buf))
Expect(values).To(HaveKeyWithValue(initialMaxStreamIDParameterID, []byte{0xff, 0xff, 0xff, 0xff})) Expect(values).To(HaveKeyWithValue(initialMaxStreamIDParameterID, []byte{0xff, 0xff, 0xff, 0xff}))
Expect(values).To(HaveKeyWithValue(idleTimeoutParameterID, []byte{0x50, 0x0})) Expect(values).To(HaveKeyWithValue(idleTimeoutParameterID, []byte{0xca, 0xfe}))
Expect(values).To(HaveKeyWithValue(maxPacketSizeParameterID, []byte{0x5, 0xac})) // 1452 = 0x5ac Expect(values).To(HaveKeyWithValue(maxPacketSizeParameterID, []byte{0x5, 0xac})) // 1452 = 0x5ac
}) })
@ -76,13 +75,6 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
Expect(pn.OmitConnectionID()).To(BeFalse()) Expect(pn.OmitConnectionID()).To(BeFalse())
}) })
It("negotiates a smaller idle timeout, if the peer suggest a higher value than configured", func() {
params[idleTimeoutParameterID] = []byte{0xff, 0xff}
err := pn.SetFromTransportParameters(paramsMapToList(params))
Expect(err).ToNot(HaveOccurred())
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(0x5000 * time.Second))
})
It("saves if it should omit the connection ID", func() { It("saves if it should omit the connection ID", func() {
params[omitConnectionIDParameterID] = []byte{} params[omitConnectionIDParameterID] = []byte{}
err := pn.SetFromTransportParameters(paramsMapToList(params)) err := pn.SetFromTransportParameters(paramsMapToList(params))

View file

@ -329,7 +329,7 @@ runLoop:
s.sentPacketHandler.OnAlarm() s.sentPacketHandler.OnAlarm()
} }
if s.config.KeepAlive && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.idleTimeout()/2 { if s.config.KeepAlive && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.connParams.GetIdleConnectionStateLifetime()/2 {
// send the PING frame since there is no activity in the session // send the PING frame since there is no activity in the session
s.packer.QueueControlFrame(&wire.PingFrame{}) s.packer.QueueControlFrame(&wire.PingFrame{})
s.keepAlivePingSent = true s.keepAlivePingSent = true
@ -344,7 +344,7 @@ runLoop:
if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout { if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time.")) s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time."))
} }
if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.idleTimeout() { if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.config.IdleTimeout {
s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity.")) s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
} }
s.garbageCollectStreams() s.garbageCollectStreams()
@ -368,9 +368,9 @@ func (s *session) Context() context.Context {
func (s *session) maybeResetTimer() { func (s *session) maybeResetTimer() {
var deadline time.Time var deadline time.Time
if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent { if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
deadline = s.lastNetworkActivityTime.Add(s.idleTimeout() / 2) deadline = s.lastNetworkActivityTime.Add(s.connParams.GetIdleConnectionStateLifetime() / 2)
} else { } else {
deadline = s.lastNetworkActivityTime.Add(s.idleTimeout()) deadline = s.lastNetworkActivityTime.Add(s.config.IdleTimeout)
} }
if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() { if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() {
@ -390,10 +390,6 @@ func (s *session) maybeResetTimer() {
s.timer.Reset(deadline) s.timer.Reset(deadline)
} }
func (s *session) idleTimeout() time.Duration {
return s.connParams.GetIdleConnectionStateLifetime()
}
func (s *session) handlePacketImpl(p *receivedPacket) error { func (s *session) handlePacketImpl(p *receivedPacket) error {
if s.perspective == protocol.PerspectiveClient { if s.perspective == protocol.PerspectiveClient {
diversificationNonce := p.publicHeader.DiversificationNonce diversificationNonce := p.publicHeader.DiversificationNonce

View file

@ -1501,36 +1501,45 @@ var _ = Describe("Session", func() {
}) })
Context("keep-alives", func() { Context("keep-alives", func() {
var mockPn *mocks.MockParamsNegotiator
// should be shorter than the local timeout for these tests
// otherwise we'd send a CONNECTION_CLOSE in the tests where we're testing that no PING is sent
remoteIdleTimeout := 20 * time.Second
BeforeEach(func() {
mockPn = mocks.NewMockParamsNegotiator(mockCtrl)
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(remoteIdleTimeout).AnyTimes()
sess.connParams = mockPn
})
It("sends a PING", func() { It("sends a PING", func() {
sess.handshakeComplete = true sess.handshakeComplete = true
sess.config.KeepAlive = true sess.config.KeepAlive = true
sess.lastNetworkActivityTime = time.Now().Add(-(sess.idleTimeout() / 2)) sess.lastNetworkActivityTime = time.Now().Add(-remoteIdleTimeout / 2)
go sess.run() go sess.run()
defer sess.Close(nil) defer sess.Close(nil)
time.Sleep(60 * time.Millisecond) var data []byte
Eventually(mconn.written).ShouldNot(BeEmpty()) Eventually(mconn.written).Should(Receive(&data))
Eventually(func() byte { // -12 because of the crypto tag. This should be 7 (the frame id for a ping frame).
// -12 because of the crypto tag. This should be 7 (the frame id for a ping frame). Expect(data[len(data)-12-1 : len(data)-12]).To(Equal([]byte{0x07}))
s := <-mconn.written
return s[len(s)-12-1]
}).Should(Equal(byte(0x07)))
}) })
It("doesn't send a PING packet if keep-alive is disabled", func() { It("doesn't send a PING packet if keep-alive is disabled", func() {
sess.handshakeComplete = true sess.handshakeComplete = true
sess.lastNetworkActivityTime = time.Now().Add(-(sess.idleTimeout() / 2)) sess.config.KeepAlive = false
sess.lastNetworkActivityTime = time.Now().Add(-remoteIdleTimeout / 2)
go sess.run() go sess.run()
defer sess.Close(nil) defer sess.Close(nil)
Consistently(mconn.written).Should(BeEmpty()) Consistently(mconn.written).ShouldNot(Receive())
}) })
It("doesn't send a PING if the handshake isn't completed yet", func() { It("doesn't send a PING if the handshake isn't completed yet", func() {
sess.handshakeComplete = false sess.handshakeComplete = false
sess.config.KeepAlive = true sess.config.KeepAlive = true
sess.lastNetworkActivityTime = time.Now().Add(-(sess.idleTimeout() / 2)) sess.lastNetworkActivityTime = time.Now().Add(-remoteIdleTimeout / 2)
go sess.run() go sess.run()
defer sess.Close(nil) defer sess.Close(nil)
Consistently(mconn.written).Should(BeEmpty()) Consistently(mconn.written).ShouldNot(Receive())
}) })
}) })
@ -1545,7 +1554,7 @@ var _ = Describe("Session", func() {
close(done) close(done)
}) })
It("times out due to non-completed crypto handshake", func(done Done) { It("times out due to non-completed handshake", func(done Done) {
sess.sessionCreationTime = time.Now().Add(-protocol.DefaultHandshakeTimeout).Add(-time.Second) sess.sessionCreationTime = time.Now().Add(-protocol.DefaultHandshakeTimeout).Add(-time.Second)
err := sess.run() // Would normally not return err := sess.run() // Would normally not return
Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.HandshakeTimeout)) Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.HandshakeTimeout))
@ -1554,37 +1563,34 @@ var _ = Describe("Session", func() {
close(done) close(done)
}) })
It("does not use ICSL before handshake", func() { It("does not use the idle timeout before the handshake complete", func() {
sess.config.IdleTimeout = 9999 * time.Second
defer sess.Close(nil) defer sess.Close(nil)
sess.lastNetworkActivityTime = time.Now().Add(-time.Minute) sess.lastNetworkActivityTime = time.Now().Add(-time.Minute)
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(9999 * time.Second).AnyTimes()
mockPn.EXPECT().OmitConnectionID().Return(false).AnyTimes()
sess.connParams = mockPn
sess.packer.connParams = mockPn
// the handshake timeout is irrelevant here, since it depends on the time the session was created, // the handshake timeout is irrelevant here, since it depends on the time the session was created,
// and not on the last network activity // and not on the last network activity
done := make(chan struct{}) done := make(chan struct{})
go func() { go func() {
defer GinkgoRecover()
_ = sess.run() _ = sess.run()
close(done) close(done)
}() }()
Consistently(done).ShouldNot(BeClosed()) Consistently(done).ShouldNot(BeClosed())
}) })
It("uses ICSL after handshake", func(done Done) { It("closes the session due to the idle timeout after handshake", func() {
sess.config.IdleTimeout = 0
close(aeadChanged) close(aeadChanged)
mockPn := mocks.NewMockParamsNegotiator(mockCtrl) errChan := make(chan error)
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second) go func() {
mockPn.EXPECT().OmitConnectionID().Return(false).AnyTimes() defer GinkgoRecover()
sess.connParams = mockPn errChan <- sess.run() // Would normally not return
sess.packer.connParams = mockPn }()
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second).AnyTimes() var err error
err := sess.run() // Would normally not return Eventually(errChan).Should(Receive(&err))
Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.NetworkIdleTimeout)) Expect(err.(*qerr.QuicError).ErrorCode).To(Equal(qerr.NetworkIdleTimeout))
Expect(mconn.written).To(Receive(ContainSubstring("No recent network activity."))) Expect(mconn.written).To(Receive(ContainSubstring("No recent network activity.")))
Expect(sess.Context().Done()).To(BeClosed()) Expect(sess.Context().Done()).To(BeClosed())
close(done)
}) })
}) })