mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 12:47:36 +03:00
drop support for version 36
This commit is contained in:
parent
2e9bc93b0c
commit
e729701a94
13 changed files with 48 additions and 78 deletions
|
@ -2,7 +2,7 @@
|
||||||
|
|
||||||
## v0.6.0 (unreleased)
|
## v0.6.0 (unreleased)
|
||||||
|
|
||||||
- Add support for QUIC 38 and 39, drop support for QUIC 35
|
- Add support for QUIC 38 and 39, drop support for QUIC 35 and 36
|
||||||
- Added `quic.Config` options for maximal flow control windows
|
- Added `quic.Config` options for maximal flow control windows
|
||||||
- Add a `quic.Config` option for QUIC versions
|
- Add a `quic.Config` option for QUIC versions
|
||||||
- Add a `quic.Config` option to request truncation of the connection ID from a server
|
- Add a `quic.Config` option to request truncation of the connection ID from a server
|
||||||
|
|
|
@ -508,7 +508,7 @@ var _ = Describe("Client", func() {
|
||||||
ConnectionID: 0x1337,
|
ConnectionID: 0x1337,
|
||||||
}
|
}
|
||||||
b := &bytes.Buffer{}
|
b := &bytes.Buffer{}
|
||||||
err := ph.Write(b, protocol.Version36, protocol.PerspectiveServer)
|
err := ph.Write(b, cl.version, protocol.PerspectiveServer)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
packetConn.dataToRead = b.Bytes()
|
packetConn.dataToRead = b.Bytes()
|
||||||
|
|
||||||
|
|
|
@ -7,8 +7,5 @@ func NewNullAEAD(p protocol.Perspective, v protocol.VersionNumber) AEAD {
|
||||||
if v.UsesTLS() {
|
if v.UsesTLS() {
|
||||||
return &nullAEADFNV64a{}
|
return &nullAEADFNV64a{}
|
||||||
}
|
}
|
||||||
return &nullAEADFNV128a{
|
return &nullAEADFNV128a{perspective: p}
|
||||||
perspective: p,
|
|
||||||
version: v,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -11,7 +11,6 @@ import (
|
||||||
// nullAEAD handles not-yet encrypted packets
|
// nullAEAD handles not-yet encrypted packets
|
||||||
type nullAEADFNV128a struct {
|
type nullAEADFNV128a struct {
|
||||||
perspective protocol.Perspective
|
perspective protocol.Perspective
|
||||||
version protocol.VersionNumber
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ AEAD = &nullAEADFNV128a{}
|
var _ AEAD = &nullAEADFNV128a{}
|
||||||
|
@ -25,12 +24,10 @@ func (n *nullAEADFNV128a) Open(dst, src []byte, packetNumber protocol.PacketNumb
|
||||||
hash := fnv128a.New()
|
hash := fnv128a.New()
|
||||||
hash.Write(associatedData)
|
hash.Write(associatedData)
|
||||||
hash.Write(src[12:])
|
hash.Write(src[12:])
|
||||||
if n.version >= protocol.Version37 {
|
if n.perspective == protocol.PerspectiveServer {
|
||||||
if n.perspective == protocol.PerspectiveServer {
|
hash.Write([]byte("Client"))
|
||||||
hash.Write([]byte("Client"))
|
} else {
|
||||||
} else {
|
hash.Write([]byte("Server"))
|
||||||
hash.Write([]byte("Server"))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
testHigh, testLow := hash.Sum128()
|
testHigh, testLow := hash.Sum128()
|
||||||
|
|
||||||
|
@ -55,12 +52,10 @@ func (n *nullAEADFNV128a) Seal(dst, src []byte, packetNumber protocol.PacketNumb
|
||||||
hash.Write(associatedData)
|
hash.Write(associatedData)
|
||||||
hash.Write(src)
|
hash.Write(src)
|
||||||
|
|
||||||
if n.version >= protocol.Version37 {
|
if n.perspective == protocol.PerspectiveServer {
|
||||||
if n.perspective == protocol.PerspectiveServer {
|
hash.Write([]byte("Server"))
|
||||||
hash.Write([]byte("Server"))
|
} else {
|
||||||
} else {
|
hash.Write([]byte("Client"))
|
||||||
hash.Write([]byte("Client"))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
high, low := hash.Sum128()
|
high, low := hash.Sum128()
|
||||||
|
|
|
@ -11,32 +11,37 @@ var _ = Describe("NullAEAD using FNV128a", func() {
|
||||||
plainText := []byte("They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood.")
|
plainText := []byte("They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood.")
|
||||||
hash36 := []byte{0x98, 0x9b, 0x33, 0x3f, 0xe8, 0xde, 0x32, 0x5c, 0xa6, 0x7f, 0x9c, 0xf7}
|
hash36 := []byte{0x98, 0x9b, 0x33, 0x3f, 0xe8, 0xde, 0x32, 0x5c, 0xa6, 0x7f, 0x9c, 0xf7}
|
||||||
|
|
||||||
It("opens", func() {
|
var aeadServer AEAD
|
||||||
cipherText := append(hash36, plainText...)
|
var aeadClient AEAD
|
||||||
aead := NewNullAEAD(protocol.PerspectiveServer, protocol.Version36)
|
|
||||||
res, err := aead.Open(nil, cipherText, 0, aad)
|
BeforeEach(func() {
|
||||||
Expect(err).ToNot(HaveOccurred())
|
aeadServer = NewNullAEAD(protocol.PerspectiveServer, protocol.Version37)
|
||||||
Expect(res).To(Equal(plainText))
|
aeadClient = NewNullAEAD(protocol.PerspectiveClient, protocol.Version37)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("seals", func() {
|
It("seals and opens, client => server", func() {
|
||||||
aead := NewNullAEAD(protocol.PerspectiveServer, protocol.Version36)
|
cipherText := aeadClient.Seal(nil, plainText, 0, aad)
|
||||||
sealed := aead.Seal(nil, plainText, 0, aad)
|
res, err := aeadServer.Open(nil, cipherText, 0, aad)
|
||||||
Expect(sealed).To(Equal(append(hash36, plainText...)))
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(sealed).To(HaveLen(len(plainText) + aead.Overhead()))
|
Expect(res).To(Equal([]byte("They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood.")))
|
||||||
|
})
|
||||||
|
|
||||||
|
It("seals and opens, server => client", func() {
|
||||||
|
cipherText := aeadServer.Seal(nil, plainText, 0, aad)
|
||||||
|
res, err := aeadClient.Open(nil, cipherText, 0, aad)
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
Expect(res).To(Equal([]byte("They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood.")))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("rejects short ciphertexts", func() {
|
It("rejects short ciphertexts", func() {
|
||||||
aead := NewNullAEAD(protocol.PerspectiveServer, protocol.Version36)
|
_, err := aeadServer.Open(nil, nil, 0, nil)
|
||||||
_, err := aead.Open(nil, nil, 0, nil)
|
|
||||||
Expect(err).To(MatchError("NullAEAD: ciphertext cannot be less than 12 bytes long"))
|
Expect(err).To(MatchError("NullAEAD: ciphertext cannot be less than 12 bytes long"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("seals in-place", func() {
|
It("seals in-place", func() {
|
||||||
aead := NewNullAEAD(protocol.PerspectiveServer, protocol.Version36)
|
|
||||||
buf := make([]byte, 6, 12+6)
|
buf := make([]byte, 6, 12+6)
|
||||||
copy(buf, []byte("foobar"))
|
copy(buf, []byte("foobar"))
|
||||||
res := aead.Seal(buf[0:0], buf, 0, nil)
|
res := aeadServer.Seal(buf[0:0], buf, 0, nil)
|
||||||
buf = buf[:12+6]
|
buf = buf[:12+6]
|
||||||
Expect(buf[12:]).To(Equal([]byte("foobar")))
|
Expect(buf[12:]).To(Equal([]byte("foobar")))
|
||||||
Expect(res[12:]).To(Equal([]byte("foobar")))
|
Expect(res[12:]).To(Equal([]byte("foobar")))
|
||||||
|
@ -44,32 +49,7 @@ var _ = Describe("NullAEAD using FNV128a", func() {
|
||||||
|
|
||||||
It("fails", func() {
|
It("fails", func() {
|
||||||
cipherText := append(append(hash36, plainText...), byte(0x42))
|
cipherText := append(append(hash36, plainText...), byte(0x42))
|
||||||
aead := NewNullAEAD(protocol.PerspectiveServer, protocol.Version36)
|
_, err := aeadClient.Open(nil, cipherText, 0, aad)
|
||||||
_, err := aead.Open(nil, cipherText, 0, aad)
|
|
||||||
Expect(err).To(HaveOccurred())
|
Expect(err).To(HaveOccurred())
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("including the perspective, for QUIC >= 37", func() {
|
|
||||||
var aeadServer AEAD
|
|
||||||
var aeadClient AEAD
|
|
||||||
|
|
||||||
BeforeEach(func() {
|
|
||||||
aeadServer = NewNullAEAD(protocol.PerspectiveServer, protocol.Version37)
|
|
||||||
aeadClient = NewNullAEAD(protocol.PerspectiveClient, protocol.Version37)
|
|
||||||
})
|
|
||||||
|
|
||||||
It("opens, for QUIC version >= 37, as a server", func() {
|
|
||||||
cipherText := aeadClient.Seal(nil, plainText, 0, aad)
|
|
||||||
res, err := aeadServer.Open(nil, cipherText, 0, aad)
|
|
||||||
Expect(err).ToNot(HaveOccurred())
|
|
||||||
Expect(res).To(Equal([]byte("They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood.")))
|
|
||||||
})
|
|
||||||
|
|
||||||
It("opens, for QUIC version >= 37, as a client", func() {
|
|
||||||
cipherText := aeadServer.Seal(nil, plainText, 0, aad)
|
|
||||||
res, err := aeadClient.Open(nil, cipherText, 0, aad)
|
|
||||||
Expect(err).ToNot(HaveOccurred())
|
|
||||||
Expect(res).To(Equal([]byte("They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood.")))
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
})
|
||||||
|
|
|
@ -10,7 +10,6 @@ var _ = Describe("NullAEAD", func() {
|
||||||
It("selects the right FVN variant", func() {
|
It("selects the right FVN variant", func() {
|
||||||
Expect(NewNullAEAD(protocol.PerspectiveClient, protocol.Version39)).To(Equal(&nullAEADFNV128a{
|
Expect(NewNullAEAD(protocol.PerspectiveClient, protocol.Version39)).To(Equal(&nullAEADFNV128a{
|
||||||
perspective: protocol.PerspectiveClient,
|
perspective: protocol.PerspectiveClient,
|
||||||
version: protocol.Version39,
|
|
||||||
}))
|
}))
|
||||||
Expect(NewNullAEAD(protocol.PerspectiveClient, protocol.VersionTLS)).To(Equal(&nullAEADFNV64a{}))
|
Expect(NewNullAEAD(protocol.PerspectiveClient, protocol.VersionTLS)).To(Equal(&nullAEADFNV64a{}))
|
||||||
})
|
})
|
||||||
|
|
|
@ -22,14 +22,14 @@ var _ = Describe("ConnectionsParameterManager", func() {
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
cpm = NewConnectionParamatersManager(
|
cpm = NewConnectionParamatersManager(
|
||||||
protocol.PerspectiveServer,
|
protocol.PerspectiveServer,
|
||||||
protocol.Version36,
|
protocol.VersionWhatever,
|
||||||
maxReceiveStreamFlowControlWindowServer,
|
maxReceiveStreamFlowControlWindowServer,
|
||||||
maxReceiveConnectionFlowControlWindowServer,
|
maxReceiveConnectionFlowControlWindowServer,
|
||||||
idleTimeout,
|
idleTimeout,
|
||||||
).(*connectionParametersManager)
|
).(*connectionParametersManager)
|
||||||
cpmClient = NewConnectionParamatersManager(
|
cpmClient = NewConnectionParamatersManager(
|
||||||
protocol.PerspectiveClient,
|
protocol.PerspectiveClient,
|
||||||
protocol.Version36,
|
protocol.VersionWhatever,
|
||||||
maxReceiveStreamFlowControlWindowClient,
|
maxReceiveStreamFlowControlWindowClient,
|
||||||
maxReceiveConnectionFlowControlWindowClient,
|
maxReceiveConnectionFlowControlWindowClient,
|
||||||
idleTimeout,
|
idleTimeout,
|
||||||
|
|
|
@ -107,7 +107,7 @@ var _ = Describe("Client Crypto Setup", func() {
|
||||||
|
|
||||||
stream = newMockStream()
|
stream = newMockStream()
|
||||||
certManager = &mockCertManager{}
|
certManager = &mockCertManager{}
|
||||||
version := protocol.Version36
|
version := protocol.Version37
|
||||||
aeadChanged = make(chan protocol.EncryptionLevel, 2)
|
aeadChanged = make(chan protocol.EncryptionLevel, 2)
|
||||||
csInt, err := NewCryptoSetupClient(
|
csInt, err := NewCryptoSetupClient(
|
||||||
"hostname",
|
"hostname",
|
||||||
|
@ -216,10 +216,11 @@ var _ = Describe("Client Crypto Setup", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
It("doesn't care about unsupported versions", func() {
|
It("doesn't care about unsupported versions", func() {
|
||||||
cs.negotiatedVersions = []protocol.VersionNumber{protocol.VersionUnsupported, protocol.Version36, protocol.VersionUnsupported}
|
ver := protocol.SupportedVersions[0]
|
||||||
|
cs.negotiatedVersions = []protocol.VersionNumber{protocol.VersionUnsupported, ver, protocol.VersionUnsupported}
|
||||||
b := &bytes.Buffer{}
|
b := &bytes.Buffer{}
|
||||||
b.Write([]byte{0, 0, 0, 0})
|
b.Write([]byte{0, 0, 0, 0})
|
||||||
utils.LittleEndian.WriteUint32(b, protocol.VersionNumberToTag(protocol.Version36))
|
utils.LittleEndian.WriteUint32(b, protocol.VersionNumberToTag(ver))
|
||||||
b.Write([]byte{0x13, 0x37, 0x13, 0x37})
|
b.Write([]byte{0x13, 0x37, 0x13, 0x37})
|
||||||
Expect(cs.validateVersionList(b.Bytes())).To(BeTrue())
|
Expect(cs.validateVersionList(b.Bytes())).To(BeTrue())
|
||||||
})
|
})
|
||||||
|
@ -411,10 +412,11 @@ var _ = Describe("Client Crypto Setup", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
It("accepts a SHLO after a version negotiation", func() {
|
It("accepts a SHLO after a version negotiation", func() {
|
||||||
cs.negotiatedVersions = []protocol.VersionNumber{protocol.Version36}
|
ver := protocol.SupportedVersions[0]
|
||||||
|
cs.negotiatedVersions = []protocol.VersionNumber{ver}
|
||||||
cs.receivedSecurePacket = true
|
cs.receivedSecurePacket = true
|
||||||
b := &bytes.Buffer{}
|
b := &bytes.Buffer{}
|
||||||
utils.LittleEndian.WriteUint32(b, protocol.VersionNumberToTag(protocol.Version36))
|
utils.LittleEndian.WriteUint32(b, protocol.VersionNumberToTag(ver))
|
||||||
shloMap[TagVER] = b.Bytes()
|
shloMap[TagVER] = b.Bytes()
|
||||||
err := cs.handleSHLOMessage(shloMap)
|
err := cs.handleSHLOMessage(shloMap)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
@ -486,7 +488,7 @@ var _ = Describe("Client Crypto Setup", func() {
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(string(tags[TagSNI])).To(Equal(cs.hostname))
|
Expect(string(tags[TagSNI])).To(Equal(cs.hostname))
|
||||||
Expect(tags[TagPDMD]).To(Equal([]byte("X509")))
|
Expect(tags[TagPDMD]).To(Equal([]byte("X509")))
|
||||||
Expect(tags[TagVER]).To(Equal([]byte("Q036")))
|
Expect(tags[TagVER]).To(Equal([]byte("Q037")))
|
||||||
Expect(tags[TagCCS]).To(Equal(certManager.commonCertificateHashes))
|
Expect(tags[TagCCS]).To(Equal(certManager.commonCertificateHashes))
|
||||||
Expect(tags).ToNot(HaveKey(TagTCID))
|
Expect(tags).ToNot(HaveKey(TagTCID))
|
||||||
})
|
})
|
||||||
|
|
|
@ -5,8 +5,7 @@ type VersionNumber int
|
||||||
|
|
||||||
// The version numbers, making grepping easier
|
// The version numbers, making grepping easier
|
||||||
const (
|
const (
|
||||||
Version36 VersionNumber = 36 + iota
|
Version37 VersionNumber = 37 + iota
|
||||||
Version37
|
|
||||||
Version38
|
Version38
|
||||||
Version39
|
Version39
|
||||||
VersionTLS VersionNumber = 101
|
VersionTLS VersionNumber = 101
|
||||||
|
@ -21,7 +20,6 @@ var SupportedVersions = []VersionNumber{
|
||||||
Version39,
|
Version39,
|
||||||
Version38,
|
Version38,
|
||||||
Version37,
|
Version37,
|
||||||
Version36,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// UsesTLS says if this QUIC version uses TLS 1.3 for the handshake
|
// UsesTLS says if this QUIC version uses TLS 1.3 for the handshake
|
||||||
|
|
|
@ -7,7 +7,6 @@ import (
|
||||||
|
|
||||||
var _ = Describe("Version", func() {
|
var _ = Describe("Version", func() {
|
||||||
It("says if a version supports TLS", func() {
|
It("says if a version supports TLS", func() {
|
||||||
Expect(Version36.UsesTLS()).To(BeFalse())
|
|
||||||
Expect(Version37.UsesTLS()).To(BeFalse())
|
Expect(Version37.UsesTLS()).To(BeFalse())
|
||||||
Expect(Version38.UsesTLS()).To(BeFalse())
|
Expect(Version38.UsesTLS()).To(BeFalse())
|
||||||
Expect(Version39.UsesTLS()).To(BeFalse())
|
Expect(Version39.UsesTLS()).To(BeFalse())
|
||||||
|
|
|
@ -8,8 +8,8 @@ import (
|
||||||
|
|
||||||
var _ = Describe("Byte Order", func() {
|
var _ = Describe("Byte Order", func() {
|
||||||
It("says little Little Endian before QUIC 39", func() {
|
It("says little Little Endian before QUIC 39", func() {
|
||||||
Expect(GetByteOrder(protocol.Version36)).To(Equal(LittleEndian))
|
|
||||||
Expect(GetByteOrder(protocol.Version37)).To(Equal(LittleEndian))
|
Expect(GetByteOrder(protocol.Version37)).To(Equal(LittleEndian))
|
||||||
|
Expect(GetByteOrder(protocol.Version38)).To(Equal(LittleEndian))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("says little Little Endian for QUIC 39", func() {
|
It("says little Little Endian for QUIC 39", func() {
|
||||||
|
|
|
@ -365,7 +365,7 @@ var _ = Describe("Public Header", func() {
|
||||||
b := &bytes.Buffer{}
|
b := &bytes.Buffer{}
|
||||||
hdr := PublicHeader{
|
hdr := PublicHeader{
|
||||||
VersionFlag: true,
|
VersionFlag: true,
|
||||||
VersionNumber: protocol.Version36,
|
VersionNumber: protocol.Version38,
|
||||||
ConnectionID: 0x4cfa9f9b668619f6,
|
ConnectionID: 0x4cfa9f9b668619f6,
|
||||||
PacketNumber: 0x1337,
|
PacketNumber: 0x1337,
|
||||||
PacketNumberLen: protocol.PacketNumberLen6,
|
PacketNumberLen: protocol.PacketNumberLen6,
|
||||||
|
@ -377,7 +377,7 @@ var _ = Describe("Public Header", func() {
|
||||||
firstByte, _ := b.ReadByte()
|
firstByte, _ := b.ReadByte()
|
||||||
Expect(firstByte & 0x01).To(Equal(uint8(1)))
|
Expect(firstByte & 0x01).To(Equal(uint8(1)))
|
||||||
Expect(firstByte & 0x30).To(Equal(uint8(0x30)))
|
Expect(firstByte & 0x30).To(Equal(uint8(0x30)))
|
||||||
Expect(string(b.Bytes()[8:12])).To(Equal("Q036"))
|
Expect(string(b.Bytes()[8:12])).To(Equal("Q038"))
|
||||||
Expect(b.Bytes()[12:18]).To(Equal([]byte{0x37, 0x13, 0, 0, 0, 0}))
|
Expect(b.Bytes()[12:18]).To(Equal([]byte{0x37, 0x13, 0, 0, 0, 0}))
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
@ -455,7 +455,7 @@ var _ = Describe("Public Header", func() {
|
||||||
PacketNumber: 0xDECAFBAD,
|
PacketNumber: 0xDECAFBAD,
|
||||||
PacketNumberLen: protocol.PacketNumberLen6,
|
PacketNumberLen: protocol.PacketNumberLen6,
|
||||||
VersionFlag: true,
|
VersionFlag: true,
|
||||||
VersionNumber: protocol.Version36,
|
VersionNumber: versionLittleEndian,
|
||||||
}
|
}
|
||||||
length, err := hdr.GetLength(protocol.PerspectiveClient)
|
length, err := hdr.GetLength(protocol.PerspectiveClient)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
|
|
@ -17,7 +17,7 @@ type mockAEAD struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *mockAEAD) Open(dst, src []byte, packetNumber protocol.PacketNumber, associatedData []byte) ([]byte, protocol.EncryptionLevel, error) {
|
func (m *mockAEAD) Open(dst, src []byte, packetNumber protocol.PacketNumber, associatedData []byte) ([]byte, protocol.EncryptionLevel, error) {
|
||||||
nullAEAD := crypto.NewNullAEAD(protocol.PerspectiveServer, protocol.VersionWhatever)
|
nullAEAD := crypto.NewNullAEAD(protocol.PerspectiveClient, protocol.VersionWhatever)
|
||||||
res, err := nullAEAD.Open(dst, src, packetNumber, associatedData)
|
res, err := nullAEAD.Open(dst, src, packetNumber, associatedData)
|
||||||
return res, m.encLevelOpen, err
|
return res, m.encLevelOpen, err
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue