mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-05 05:07:36 +03:00
drop 0-RTT keys when the server rejects 0-RTT
This commit is contained in:
parent
2473eb0895
commit
d7948d627a
5 changed files with 47 additions and 19 deletions
2
go.mod
2
go.mod
|
@ -9,7 +9,7 @@ require (
|
||||||
github.com/golang/protobuf v1.3.0
|
github.com/golang/protobuf v1.3.0
|
||||||
github.com/marten-seemann/chacha20 v0.2.0
|
github.com/marten-seemann/chacha20 v0.2.0
|
||||||
github.com/marten-seemann/qpack v0.1.0
|
github.com/marten-seemann/qpack v0.1.0
|
||||||
github.com/marten-seemann/qtls v0.5.0
|
github.com/marten-seemann/qtls v0.6.0
|
||||||
github.com/onsi/ginkgo v1.11.0
|
github.com/onsi/ginkgo v1.11.0
|
||||||
github.com/onsi/gomega v1.8.1
|
github.com/onsi/gomega v1.8.1
|
||||||
golang.org/x/crypto v0.0.0-20190829043050-9756ffdc2472
|
golang.org/x/crypto v0.0.0-20190829043050-9756ffdc2472
|
||||||
|
|
4
go.sum
4
go.sum
|
@ -15,8 +15,8 @@ github.com/marten-seemann/chacha20 v0.2.0 h1:f40vqzzx+3GdOmzQoItkLX5WLvHgPgyYqFF
|
||||||
github.com/marten-seemann/chacha20 v0.2.0/go.mod h1:HSdjFau7GzYRj+ahFNwsO3ouVJr1HFkWoEwNDb4TMtE=
|
github.com/marten-seemann/chacha20 v0.2.0/go.mod h1:HSdjFau7GzYRj+ahFNwsO3ouVJr1HFkWoEwNDb4TMtE=
|
||||||
github.com/marten-seemann/qpack v0.1.0 h1:/0M7lkda/6mus9B8u34Asqm8ZhHAAt9Ho0vniNuVSVg=
|
github.com/marten-seemann/qpack v0.1.0 h1:/0M7lkda/6mus9B8u34Asqm8ZhHAAt9Ho0vniNuVSVg=
|
||||||
github.com/marten-seemann/qpack v0.1.0/go.mod h1:LFt1NU/Ptjip0C2CPkhimBz5CGE3WGDAUWqna+CNTrI=
|
github.com/marten-seemann/qpack v0.1.0/go.mod h1:LFt1NU/Ptjip0C2CPkhimBz5CGE3WGDAUWqna+CNTrI=
|
||||||
github.com/marten-seemann/qtls v0.5.0 h1:psje4bHl6372lku0pTIt2PZ9HcVJyBIuW9pZn+u2vhY=
|
github.com/marten-seemann/qtls v0.6.0 h1:iCN+BD2aSP23uY5Gb3COVlQeOIWmKTOgD2FPIE2KjQ4=
|
||||||
github.com/marten-seemann/qtls v0.5.0/go.mod h1:pxVXcHHw1pNIt8Qo0pwSYQEoZ8yYOOPXTCZLQQunvRc=
|
github.com/marten-seemann/qtls v0.6.0/go.mod h1:pxVXcHHw1pNIt8Qo0pwSYQEoZ8yYOOPXTCZLQQunvRc=
|
||||||
github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
||||||
github.com/onsi/ginkgo v1.7.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
github.com/onsi/ginkgo v1.7.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
||||||
github.com/onsi/ginkgo v1.11.0 h1:JAKSXpt1YjtLA7YpPiqO9ss6sNXEsPfSGdwN0UHqzrw=
|
github.com/onsi/ginkgo v1.11.0 h1:JAKSXpt1YjtLA7YpPiqO9ss6sNXEsPfSGdwN0UHqzrw=
|
||||||
|
|
|
@ -221,7 +221,7 @@ func newCryptoSetup(
|
||||||
writeRecord: make(chan struct{}, 1),
|
writeRecord: make(chan struct{}, 1),
|
||||||
closeChan: make(chan struct{}),
|
closeChan: make(chan struct{}),
|
||||||
}
|
}
|
||||||
qtlsConf := tlsConfigToQtlsConfig(tlsConf, cs, extHandler, cs.marshalPeerParamsForSessionState, cs.handlePeerParamsFromSessionState, cs.accept0RTT, enable0RTT)
|
qtlsConf := tlsConfigToQtlsConfig(tlsConf, cs, extHandler, cs.marshalPeerParamsForSessionState, cs.handlePeerParamsFromSessionState, cs.accept0RTT, cs.rejected0RTT, enable0RTT)
|
||||||
cs.tlsConf = qtlsConf
|
cs.tlsConf = qtlsConf
|
||||||
return cs, cs.clientHelloWrittenChan
|
return cs, cs.clientHelloWrittenChan
|
||||||
}
|
}
|
||||||
|
@ -490,6 +490,8 @@ func (h *cryptoSetup) maybeSendSessionTicket() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// accept0RTT is called for the server when receiving the client's session ticket.
|
||||||
|
// It decides whether to accept 0-RTT.
|
||||||
func (h *cryptoSetup) accept0RTT(sessionTicketData []byte) bool {
|
func (h *cryptoSetup) accept0RTT(sessionTicketData []byte) bool {
|
||||||
var tp TransportParameters
|
var tp TransportParameters
|
||||||
if err := tp.UnmarshalFromSessionTicket(sessionTicketData); err != nil {
|
if err := tp.UnmarshalFromSessionTicket(sessionTicketData); err != nil {
|
||||||
|
@ -505,6 +507,20 @@ func (h *cryptoSetup) accept0RTT(sessionTicketData []byte) bool {
|
||||||
return valid
|
return valid
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// rejected0RTT is called for the client when the server rejects 0-RTT.
|
||||||
|
func (h *cryptoSetup) rejected0RTT() {
|
||||||
|
h.logger.Debugf("0-RTT was rejected. Dropping 0-RTT keys.")
|
||||||
|
|
||||||
|
h.mutex.Lock()
|
||||||
|
had0RTTKeys := h.zeroRTTSealer != nil
|
||||||
|
h.zeroRTTSealer = nil
|
||||||
|
h.mutex.Unlock()
|
||||||
|
|
||||||
|
if had0RTTKeys {
|
||||||
|
h.runner.DropKeys(protocol.Encryption0RTT)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func (h *cryptoSetup) handlePostHandshakeMessage() {
|
func (h *cryptoSetup) handlePostHandshakeMessage() {
|
||||||
// make sure the handshake has already completed
|
// make sure the handshake has already completed
|
||||||
<-h.handshakeDone
|
<-h.handshakeDone
|
||||||
|
|
|
@ -34,6 +34,7 @@ func tlsConfigToQtlsConfig(
|
||||||
getDataForSessionState func() []byte,
|
getDataForSessionState func() []byte,
|
||||||
setDataFromSessionState func([]byte),
|
setDataFromSessionState func([]byte),
|
||||||
accept0RTT func([]byte) bool,
|
accept0RTT func([]byte) bool,
|
||||||
|
rejected0RTT func(),
|
||||||
enable0RTT bool,
|
enable0RTT bool,
|
||||||
) *qtls.Config {
|
) *qtls.Config {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
|
@ -61,7 +62,7 @@ func tlsConfigToQtlsConfig(
|
||||||
if tlsConf == nil {
|
if tlsConf == nil {
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
return tlsConfigToQtlsConfig(tlsConf, recordLayer, extHandler, getDataForSessionState, setDataFromSessionState, accept0RTT, enable0RTT), nil
|
return tlsConfigToQtlsConfig(tlsConf, recordLayer, extHandler, getDataForSessionState, setDataFromSessionState, accept0RTT, rejected0RTT, enable0RTT), nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
var csc qtls.ClientSessionCache
|
var csc qtls.ClientSessionCache
|
||||||
|
@ -99,6 +100,7 @@ func tlsConfigToQtlsConfig(
|
||||||
GetExtensions: extHandler.GetExtensions,
|
GetExtensions: extHandler.GetExtensions,
|
||||||
ReceivedExtensions: extHandler.ReceivedExtensions,
|
ReceivedExtensions: extHandler.ReceivedExtensions,
|
||||||
Accept0RTT: accept0RTT,
|
Accept0RTT: accept0RTT,
|
||||||
|
Rejected0RTT: rejected0RTT,
|
||||||
}
|
}
|
||||||
if enable0RTT {
|
if enable0RTT {
|
||||||
conf.Enable0RTT = true
|
conf.Enable0RTT = true
|
||||||
|
|
|
@ -28,19 +28,19 @@ func (*mockExtensionHandler) TransportParameters() <-chan []byte { panic("not im
|
||||||
var _ = Describe("qtls.Config generation", func() {
|
var _ = Describe("qtls.Config generation", func() {
|
||||||
It("sets MinVersion and MaxVersion", func() {
|
It("sets MinVersion and MaxVersion", func() {
|
||||||
tlsConf := &tls.Config{MinVersion: tls.VersionTLS11, MaxVersion: tls.VersionTLS12}
|
tlsConf := &tls.Config{MinVersion: tls.VersionTLS11, MaxVersion: tls.VersionTLS12}
|
||||||
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf.MinVersion).To(BeEquivalentTo(tls.VersionTLS13))
|
Expect(qtlsConf.MinVersion).To(BeEquivalentTo(tls.VersionTLS13))
|
||||||
Expect(qtlsConf.MaxVersion).To(BeEquivalentTo(tls.VersionTLS13))
|
Expect(qtlsConf.MaxVersion).To(BeEquivalentTo(tls.VersionTLS13))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("works when called with a nil config", func() {
|
It("works when called with a nil config", func() {
|
||||||
qtlsConf := tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf).ToNot(BeNil())
|
Expect(qtlsConf).ToNot(BeNil())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sets the setter and getter function for TLS extensions", func() {
|
It("sets the setter and getter function for TLS extensions", func() {
|
||||||
extHandler := &mockExtensionHandler{}
|
extHandler := &mockExtensionHandler{}
|
||||||
qtlsConf := tlsConfigToQtlsConfig(&tls.Config{}, nil, extHandler, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(&tls.Config{}, nil, extHandler, nil, nil, nil, nil, false)
|
||||||
Expect(extHandler.get).To(BeFalse())
|
Expect(extHandler.get).To(BeFalse())
|
||||||
qtlsConf.GetExtensions(10)
|
qtlsConf.GetExtensions(10)
|
||||||
Expect(extHandler.get).To(BeTrue())
|
Expect(extHandler.get).To(BeTrue())
|
||||||
|
@ -51,31 +51,40 @@ var _ = Describe("qtls.Config generation", func() {
|
||||||
|
|
||||||
It("sets the Accept0RTT callback", func() {
|
It("sets the Accept0RTT callback", func() {
|
||||||
accept0RTT := func([]byte) bool { return true }
|
accept0RTT := func([]byte) bool { return true }
|
||||||
qtlsConf := tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, accept0RTT, false)
|
qtlsConf := tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, accept0RTT, nil, false)
|
||||||
Expect(qtlsConf.Accept0RTT).ToNot(BeNil())
|
Expect(qtlsConf.Accept0RTT).ToNot(BeNil())
|
||||||
Expect(qtlsConf.Accept0RTT(nil)).To(BeTrue())
|
Expect(qtlsConf.Accept0RTT(nil)).To(BeTrue())
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("sets the Accept0RTT callback", func() {
|
||||||
|
var called bool
|
||||||
|
rejected0RTT := func() { called = true }
|
||||||
|
qtlsConf := tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, nil, rejected0RTT, false)
|
||||||
|
Expect(qtlsConf.Rejected0RTT).ToNot(BeNil())
|
||||||
|
qtlsConf.Rejected0RTT()
|
||||||
|
Expect(called).To(BeTrue())
|
||||||
|
})
|
||||||
|
|
||||||
It("enables 0-RTT", func() {
|
It("enables 0-RTT", func() {
|
||||||
qtlsConf := tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf.Enable0RTT).To(BeFalse())
|
Expect(qtlsConf.Enable0RTT).To(BeFalse())
|
||||||
Expect(qtlsConf.MaxEarlyData).To(BeZero())
|
Expect(qtlsConf.MaxEarlyData).To(BeZero())
|
||||||
qtlsConf = tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, nil, true)
|
qtlsConf = tlsConfigToQtlsConfig(nil, nil, &mockExtensionHandler{}, nil, nil, nil, nil, true)
|
||||||
Expect(qtlsConf.Enable0RTT).To(BeTrue())
|
Expect(qtlsConf.Enable0RTT).To(BeTrue())
|
||||||
Expect(qtlsConf.MaxEarlyData).To(Equal(uint32(0xffffffff)))
|
Expect(qtlsConf.MaxEarlyData).To(Equal(uint32(0xffffffff)))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("initializes such that the session ticket key remains constant", func() {
|
It("initializes such that the session ticket key remains constant", func() {
|
||||||
tlsConf := &tls.Config{}
|
tlsConf := &tls.Config{}
|
||||||
qtlsConf1 := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf1 := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
qtlsConf2 := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf2 := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf1.SessionTicketKey).ToNot(BeZero()) // should now contain a random value
|
Expect(qtlsConf1.SessionTicketKey).ToNot(BeZero()) // should now contain a random value
|
||||||
Expect(qtlsConf1.SessionTicketKey).To(Equal(qtlsConf2.SessionTicketKey))
|
Expect(qtlsConf1.SessionTicketKey).To(Equal(qtlsConf2.SessionTicketKey))
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("GetConfigForClient callback", func() {
|
Context("GetConfigForClient callback", func() {
|
||||||
It("doesn't set it if absent", func() {
|
It("doesn't set it if absent", func() {
|
||||||
qtlsConf := tlsConfigToQtlsConfig(&tls.Config{}, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(&tls.Config{}, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf.GetConfigForClient).To(BeNil())
|
Expect(qtlsConf.GetConfigForClient).To(BeNil())
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -86,7 +95,7 @@ var _ = Describe("qtls.Config generation", func() {
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
extHandler := &mockExtensionHandler{}
|
extHandler := &mockExtensionHandler{}
|
||||||
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, extHandler, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, extHandler, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf.GetConfigForClient).ToNot(BeNil())
|
Expect(qtlsConf.GetConfigForClient).ToNot(BeNil())
|
||||||
confForClient, err := qtlsConf.GetConfigForClient(nil)
|
confForClient, err := qtlsConf.GetConfigForClient(nil)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
@ -106,7 +115,7 @@ var _ = Describe("qtls.Config generation", func() {
|
||||||
return nil, testErr
|
return nil, testErr
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
_, err := qtlsConf.GetConfigForClient(nil)
|
_, err := qtlsConf.GetConfigForClient(nil)
|
||||||
Expect(err).To(MatchError(testErr))
|
Expect(err).To(MatchError(testErr))
|
||||||
})
|
})
|
||||||
|
@ -117,14 +126,14 @@ var _ = Describe("qtls.Config generation", func() {
|
||||||
return nil, nil
|
return nil, nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf.GetConfigForClient(nil)).To(BeNil())
|
Expect(qtlsConf.GetConfigForClient(nil)).To(BeNil())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("ClientSessionCache", func() {
|
Context("ClientSessionCache", func() {
|
||||||
It("doesn't set if absent", func() {
|
It("doesn't set if absent", func() {
|
||||||
qtlsConf := tlsConfigToQtlsConfig(&tls.Config{}, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(&tls.Config{}, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
Expect(qtlsConf.ClientSessionCache).To(BeNil())
|
Expect(qtlsConf.ClientSessionCache).To(BeNil())
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -139,6 +148,7 @@ var _ = Describe("qtls.Config generation", func() {
|
||||||
func() []byte { return []byte("foobar") },
|
func() []byte { return []byte("foobar") },
|
||||||
func(p []byte) { appData = p },
|
func(p []byte) { appData = p },
|
||||||
nil,
|
nil,
|
||||||
|
nil,
|
||||||
false,
|
false,
|
||||||
)
|
)
|
||||||
Expect(qtlsConf.ClientSessionCache).ToNot(BeNil())
|
Expect(qtlsConf.ClientSessionCache).ToNot(BeNil())
|
||||||
|
@ -159,7 +169,7 @@ var _ = Describe("qtls.Config generation", func() {
|
||||||
It("puts a nil session state", func() {
|
It("puts a nil session state", func() {
|
||||||
csc := NewMockClientSessionCache(mockCtrl)
|
csc := NewMockClientSessionCache(mockCtrl)
|
||||||
tlsConf := &tls.Config{ClientSessionCache: csc}
|
tlsConf := &tls.Config{ClientSessionCache: csc}
|
||||||
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, false)
|
qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, nil, nil, nil, nil, false)
|
||||||
// put something
|
// put something
|
||||||
csc.EXPECT().Put("foobar", nil)
|
csc.EXPECT().Put("foobar", nil)
|
||||||
qtlsConf.ClientSessionCache.Put("foobar", nil)
|
qtlsConf.ClientSessionCache.Put("foobar", nil)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue