send connection parameters in CHLO

This commit is contained in:
Marten Seemann 2016-12-09 17:42:26 +07:00
parent 1ad3a85f5c
commit f72fbc57a9
No known key found for this signature in database
GPG key ID: 3603F40B121FCDEA
9 changed files with 150 additions and 35 deletions

View file

@ -20,7 +20,10 @@ type mockConnectionParametersManager struct {
func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error { func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error {
panic("not implemented") panic("not implemented")
} }
func (m *mockConnectionParametersManager) GetSHLOMap() map[handshake.Tag][]byte { func (m *mockConnectionParametersManager) GetSHLOMap() (map[handshake.Tag][]byte, error) {
panic("not implemented")
}
func (m *mockConnectionParametersManager) GetCHLOMap() (map[handshake.Tag][]byte, error) {
panic("not implemented") panic("not implemented")
} }
func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount { func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount {

View file

@ -14,7 +14,8 @@ import (
// ConnectionParametersManager negotiates and stores the connection parameters // ConnectionParametersManager negotiates and stores the connection parameters
type ConnectionParametersManager interface { type ConnectionParametersManager interface {
SetFromMap(map[Tag][]byte) error SetFromMap(map[Tag][]byte) error
GetSHLOMap() map[Tag][]byte GetSHLOMap() (map[Tag][]byte, error)
GetCHLOMap() (map[Tag][]byte, error)
GetSendStreamFlowControlWindow() protocol.ByteCount GetSendStreamFlowControlWindow() protocol.ByteCount
GetSendConnectionFlowControlWindow() protocol.ByteCount GetSendConnectionFlowControlWindow() protocol.ByteCount
@ -29,7 +30,8 @@ type ConnectionParametersManager interface {
type connectionParametersManager struct { type connectionParametersManager struct {
mutex sync.RWMutex mutex sync.RWMutex
version protocol.VersionNumber version protocol.VersionNumber
perspective protocol.Perspective
flowControlNegotiated bool flowControlNegotiated bool
hasReceivedMaxIncomingDynamicStreams bool hasReceivedMaxIncomingDynamicStreams bool
@ -55,8 +57,9 @@ var (
) )
// NewConnectionParamatersManager creates a new connection parameters manager // NewConnectionParamatersManager creates a new connection parameters manager
func NewConnectionParamatersManager(v protocol.VersionNumber) ConnectionParametersManager { func NewConnectionParamatersManager(pers protocol.Perspective, v protocol.VersionNumber) ConnectionParametersManager {
return &connectionParametersManager{ return &connectionParametersManager{
perspective: pers,
version: v, version: v,
idleConnectionStateLifetime: protocol.DefaultIdleTimeout, idleConnectionStateLifetime: protocol.DefaultIdleTimeout,
sendStreamFlowControlWindow: protocol.InitialStreamFlowControlWindow, // can only be changed by the client sendStreamFlowControlWindow: protocol.InitialStreamFlowControlWindow, // can only be changed by the client
@ -142,8 +145,13 @@ func (h *connectionParametersManager) negotiateIdleConnectionStateLifetime(clien
return utils.MinDuration(clientValue, protocol.MaxIdleTimeout) return utils.MinDuration(clientValue, protocol.MaxIdleTimeout)
} }
// GetSHLOMap gets all values (except crypto values) needed for the SHLO // GetSHLOMap gets all parameters needed for the SHLO
func (h *connectionParametersManager) GetSHLOMap() map[Tag][]byte { // if the client sent us parameters earlier, these are the negotiated values
func (h *connectionParametersManager) GetSHLOMap() (map[Tag][]byte, error) {
if h.perspective != protocol.PerspectiveServer {
return nil, errors.New("ConnectionParametersManager BUG: GetSHLOMap should only be called for a server")
}
sfcw := bytes.NewBuffer([]byte{}) sfcw := bytes.NewBuffer([]byte{})
utils.WriteUint32(sfcw, uint32(h.GetReceiveStreamFlowControlWindow())) utils.WriteUint32(sfcw, uint32(h.GetReceiveStreamFlowControlWindow()))
cfcw := bytes.NewBuffer([]byte{}) cfcw := bytes.NewBuffer([]byte{})
@ -166,7 +174,39 @@ func (h *connectionParametersManager) GetSHLOMap() map[Tag][]byte {
tags[TagMIDS] = mids.Bytes() tags[TagMIDS] = mids.Bytes()
} }
return tags return tags, nil
}
// GetCHLOMap gets all parameters needed for the CHLO
// these are the values the client is suggesting to the server. The negotiation is done by the server
func (h *connectionParametersManager) GetCHLOMap() (map[Tag][]byte, error) {
if h.perspective != protocol.PerspectiveClient {
return nil, errors.New("ConnectionParametersManager BUG: GetCHLOMap should only be called for a client")
}
sfcw := bytes.NewBuffer([]byte{})
utils.WriteUint32(sfcw, uint32(protocol.InitialStreamFlowControlWindow))
cfcw := bytes.NewBuffer([]byte{})
utils.WriteUint32(cfcw, uint32(protocol.InitialConnectionFlowControlWindow))
mspc := bytes.NewBuffer([]byte{})
utils.WriteUint32(mspc, protocol.MaxStreamsPerConnection)
icsl := bytes.NewBuffer([]byte{})
utils.WriteUint32(icsl, uint32(protocol.DefaultIdleTimeout/time.Second))
tags := map[Tag][]byte{
TagICSL: icsl.Bytes(),
TagMSPC: mspc.Bytes(),
TagCFCW: cfcw.Bytes(),
TagSFCW: sfcw.Bytes(),
}
if h.version > protocol.Version34 {
mids := bytes.NewBuffer([]byte{})
utils.WriteUint32(mids, protocol.MaxIncomingDynamicStreamsPerConnection)
tags[TagMIDS] = mids.Bytes()
}
return tags, nil
} }
// GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data // GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data

View file

@ -1,6 +1,7 @@
package handshake package handshake
import ( import (
"encoding/binary"
"time" "time"
"github.com/lucas-clemente/quic-go/protocol" "github.com/lucas-clemente/quic-go/protocol"
@ -11,12 +12,13 @@ import (
var _ = Describe("ConnectionsParameterManager", func() { var _ = Describe("ConnectionsParameterManager", func() {
var cpm *connectionParametersManager var cpm *connectionParametersManager
BeforeEach(func() { BeforeEach(func() {
cpm = NewConnectionParamatersManager(protocol.Version36).(*connectionParametersManager) cpm = NewConnectionParamatersManager(protocol.PerspectiveServer, protocol.Version36).(*connectionParametersManager)
}) })
Context("SHLO", func() { Context("SHLO", func() {
It("returns all parameters necessary for the SHLO", func() { It("returns all parameters necessary for the SHLO", func() {
entryMap := cpm.GetSHLOMap() entryMap, err := cpm.GetSHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap).To(HaveKey(TagICSL)) Expect(entryMap).To(HaveKey(TagICSL))
Expect(entryMap).To(HaveKey(TagMSPC)) Expect(entryMap).To(HaveKey(TagMSPC))
Expect(entryMap).To(HaveKey(TagMIDS)) Expect(entryMap).To(HaveKey(TagMIDS))
@ -24,27 +26,31 @@ var _ = Describe("ConnectionsParameterManager", func() {
It("doesn't add the MaximumIncomingDynamicStreams tag for QUIC 34", func() { It("doesn't add the MaximumIncomingDynamicStreams tag for QUIC 34", func() {
cpm.version = protocol.Version34 cpm.version = protocol.Version34
entryMap := cpm.GetSHLOMap() entryMap, err := cpm.GetSHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap).ToNot(HaveKey(TagMIDS)) Expect(entryMap).ToNot(HaveKey(TagMIDS))
}) })
It("sets the stream-level flow control windows in SHLO", func() { It("sets the stream-level flow control windows in SHLO", func() {
cpm.receiveStreamFlowControlWindow = 0xDEADBEEF cpm.receiveStreamFlowControlWindow = 0xDEADBEEF
entryMap := cpm.GetSHLOMap() entryMap, err := cpm.GetSHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap).To(HaveKey(TagSFCW)) Expect(entryMap).To(HaveKey(TagSFCW))
Expect(entryMap[TagSFCW]).To(Equal([]byte{0xEF, 0xBE, 0xAD, 0xDE})) Expect(entryMap[TagSFCW]).To(Equal([]byte{0xEF, 0xBE, 0xAD, 0xDE}))
}) })
It("sets the connection-level flow control windows in SHLO", func() { It("sets the connection-level flow control windows in SHLO", func() {
cpm.receiveConnectionFlowControlWindow = 0xDECAFBAD cpm.receiveConnectionFlowControlWindow = 0xDECAFBAD
entryMap := cpm.GetSHLOMap() entryMap, err := cpm.GetSHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap).To(HaveKey(TagCFCW)) Expect(entryMap).To(HaveKey(TagCFCW))
Expect(entryMap[TagCFCW]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE})) Expect(entryMap[TagCFCW]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE}))
}) })
It("sets the connection-level flow control windows in SHLO", func() { It("sets the connection-level flow control windows in SHLO", func() {
cpm.idleConnectionStateLifetime = 0xDECAFBAD * time.Second cpm.idleConnectionStateLifetime = 0xDECAFBAD * time.Second
entryMap := cpm.GetSHLOMap() entryMap, err := cpm.GetSHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap).To(HaveKey(TagICSL)) Expect(entryMap).To(HaveKey(TagICSL))
Expect(entryMap[TagICSL]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE})) Expect(entryMap[TagICSL]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE}))
}) })
@ -54,16 +60,58 @@ var _ = Describe("ConnectionsParameterManager", func() {
Expect(val).To(BeNumerically("<", protocol.MaxStreamsPerConnection)) Expect(val).To(BeNumerically("<", protocol.MaxStreamsPerConnection))
err := cpm.SetFromMap(map[Tag][]byte{TagMSPC: []byte{byte(val), 0, 0, 0}}) err := cpm.SetFromMap(map[Tag][]byte{TagMSPC: []byte{byte(val), 0, 0, 0}})
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
entryMap := cpm.GetSHLOMap() entryMap, err := cpm.GetSHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap[TagMSPC]).To(Equal([]byte{byte(val), 0, 0, 0})) Expect(entryMap[TagMSPC]).To(Equal([]byte{byte(val), 0, 0, 0}))
}) })
It("always sends its own value for the maximum incoming dynamic streams in the SHLO", func() { It("always sends its own value for the maximum incoming dynamic streams in the SHLO", func() {
err := cpm.SetFromMap(map[Tag][]byte{TagMIDS: []byte{5, 0, 0, 0}}) err := cpm.SetFromMap(map[Tag][]byte{TagMIDS: []byte{5, 0, 0, 0}})
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
entryMap := cpm.GetSHLOMap() entryMap, err := cpm.GetSHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap[TagMIDS]).To(Equal([]byte{byte(protocol.MaxIncomingDynamicStreamsPerConnection), 0, 0, 0})) Expect(entryMap[TagMIDS]).To(Equal([]byte{byte(protocol.MaxIncomingDynamicStreamsPerConnection), 0, 0, 0}))
}) })
It("errors if called from a client", func() {
cpm.perspective = protocol.PerspectiveClient
_, err := cpm.GetSHLOMap()
Expect(err).To(HaveOccurred())
})
})
Context("CHLO", func() {
BeforeEach(func() {
cpm.perspective = protocol.PerspectiveClient
})
It("has the right values", func() {
entryMap, err := cpm.GetCHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap).To(HaveKey(TagICSL))
Expect(binary.LittleEndian.Uint32(entryMap[TagICSL])).To(Equal(uint32(protocol.DefaultIdleTimeout / time.Second)))
Expect(entryMap).To(HaveKey(TagMSPC))
Expect(binary.LittleEndian.Uint32(entryMap[TagMSPC])).To(Equal(uint32(protocol.MaxStreamsPerConnection)))
Expect(entryMap).To(HaveKey(TagMIDS))
Expect(binary.LittleEndian.Uint32(entryMap[TagMIDS])).To(Equal(uint32(protocol.MaxIncomingDynamicStreamsPerConnection)))
Expect(entryMap).To(HaveKey(TagSFCW))
Expect(binary.LittleEndian.Uint32(entryMap[TagSFCW])).To(Equal(uint32(protocol.InitialStreamFlowControlWindow)))
Expect(entryMap).To(HaveKey(TagCFCW))
Expect(binary.LittleEndian.Uint32(entryMap[TagCFCW])).To(Equal(uint32(protocol.InitialConnectionFlowControlWindow)))
})
It("doesn't add the MIDS tag for QUIC 34", func() {
cpm.version = protocol.Version34
entryMap, err := cpm.GetCHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(entryMap).ToNot(HaveKey(TagMIDS))
})
It("errors if called from a server", func() {
cpm.perspective = protocol.PerspectiveServer
_, err := cpm.GetCHLOMap()
Expect(err).To(HaveOccurred())
})
}) })
Context("Truncated connection IDs", func() { Context("Truncated connection IDs", func() {

View file

@ -40,6 +40,8 @@ type cryptoSetupClient struct {
receivedSecurePacket bool receivedSecurePacket bool
secureAEAD crypto.AEAD secureAEAD crypto.AEAD
forwardSecureAEAD crypto.AEAD forwardSecureAEAD crypto.AEAD
connectionParameters ConnectionParametersManager
} }
var _ crypto.AEAD = &cryptoSetupClient{} var _ crypto.AEAD = &cryptoSetupClient{}
@ -57,15 +59,16 @@ func NewCryptoSetupClient(
connID protocol.ConnectionID, connID protocol.ConnectionID,
version protocol.VersionNumber, version protocol.VersionNumber,
cryptoStream utils.Stream, cryptoStream utils.Stream,
connectionParameters ConnectionParametersManager,
) (CryptoSetup, error) { ) (CryptoSetup, error) {
return &cryptoSetupClient{ return &cryptoSetupClient{
hostname: hostname, hostname: hostname,
connID: connID, connID: connID,
version: version, version: version,
cryptoStream: cryptoStream, cryptoStream: cryptoStream,
certManager: crypto.NewCertManager(), certManager: crypto.NewCertManager(),
connectionParameters: connectionParameters,
keyDerivation: crypto.DeriveKeysAESGCM, keyDerivation: crypto.DeriveKeysAESGCM,
}, nil }, nil
} }
@ -310,7 +313,10 @@ func (h *cryptoSetupClient) sendCHLO() error {
} }
func (h *cryptoSetupClient) getTags() (map[Tag][]byte, error) { func (h *cryptoSetupClient) getTags() (map[Tag][]byte, error) {
tags := make(map[Tag][]byte) tags, err := h.connectionParameters.GetCHLOMap()
if err != nil {
return nil, err
}
tags[TagSNI] = []byte(h.hostname) tags[TagSNI] = []byte(h.hostname)
tags[TagPDMD] = []byte("X509") tags[TagPDMD] = []byte("X509")

View file

@ -120,7 +120,8 @@ var _ = Describe("Crypto setup", func() {
stream = &mockStream{} stream = &mockStream{}
certManager = &mockCertManager{} certManager = &mockCertManager{}
csInt, err := NewCryptoSetupClient("hostname", 0, protocol.Version36, stream) version := protocol.Version36
csInt, err := NewCryptoSetupClient("hostname", 0, version, stream, NewConnectionParamatersManager(protocol.PerspectiveClient, version))
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
cs = csInt.(*cryptoSetupClient) cs = csInt.(*cryptoSetupClient)
cs.certManager = certManager cs.certManager = certManager
@ -420,6 +421,17 @@ var _ = Describe("Crypto setup", func() {
Expect(tags[TagCCS]).To(Equal(certManager.commonCertificateHashes)) Expect(tags[TagCCS]).To(Equal(certManager.commonCertificateHashes))
}) })
It("adds the tags returned from the connectionParametersManager to the CHLO", func() {
cpmTags, err := cs.connectionParameters.GetCHLOMap()
Expect(err).ToNot(HaveOccurred())
Expect(cpmTags).ToNot(BeEmpty())
tags, err := cs.getTags()
Expect(err).ToNot(HaveOccurred())
for t := range cpmTags {
Expect(tags).To(HaveKey(t))
}
})
It("doesn't send a CCS if there are no common certificate sets available", func() { It("doesn't send a CCS if there are no common certificate sets available", func() {
certManager.commonCertificateHashes = nil certManager.commonCertificateHashes = nil
tags, err := cs.getTags() tags, err := cs.getTags()

View file

@ -340,7 +340,10 @@ func (h *cryptoSetupServer) handleCHLO(sni string, data []byte, cryptoData map[T
return nil, err return nil, err
} }
replyMap := h.connectionParameters.GetSHLOMap() replyMap, err := h.connectionParameters.GetSHLOMap()
if err != nil {
return nil, err
}
// add crypto parameters // add crypto parameters
replyMap[TagPUBS] = ephermalKex.PublicKey() replyMap[TagPUBS] = ephermalKex.PublicKey()
replyMap[TagSNO] = serverNonce replyMap[TagSNO] = serverNonce

View file

@ -171,7 +171,7 @@ var _ = Describe("Crypto setup", func() {
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
scfg.stkSource = &mockStkSource{} scfg.stkSource = &mockStkSource{}
v := protocol.SupportedVersions[len(protocol.SupportedVersions)-1] v := protocol.SupportedVersions[len(protocol.SupportedVersions)-1]
cpm = NewConnectionParamatersManager(protocol.VersionWhatever) cpm = NewConnectionParamatersManager(protocol.PerspectiveServer, protocol.VersionWhatever)
csInt, err := NewCryptoSetup(protocol.ConnectionID(42), ip, v, scfg, stream, cpm, aeadChanged) csInt, err := NewCryptoSetup(protocol.ConnectionID(42), ip, v, scfg, stream, cpm, aeadChanged)
Expect(err).NotTo(HaveOccurred()) Expect(err).NotTo(HaveOccurred())
cs = csInt.(*cryptoSetupServer) cs = csInt.(*cryptoSetupServer)

View file

@ -102,8 +102,9 @@ func newSession(conn connection, v protocol.VersionNumber, connectionID protocol
perspective: protocol.PerspectiveServer, perspective: protocol.PerspectiveServer,
version: v, version: v,
streamCallback: streamCallback, streamCallback: streamCallback,
closeCallback: closeCallback, closeCallback: closeCallback,
connectionParameters: handshake.NewConnectionParamatersManager(protocol.PerspectiveServer, v),
} }
session.setup() session.setup()
@ -127,8 +128,9 @@ func newClientSession(conn *net.UDPConn, addr *net.UDPAddr, hostname string, v p
perspective: protocol.PerspectiveClient, perspective: protocol.PerspectiveClient,
version: v, version: v,
streamCallback: streamCallback, streamCallback: streamCallback,
closeCallback: closeCallback, closeCallback: closeCallback,
connectionParameters: handshake.NewConnectionParamatersManager(protocol.PerspectiveClient, v),
} }
session.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(session.ackAlarmChanged) session.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(session.ackAlarmChanged)
@ -136,7 +138,7 @@ func newClientSession(conn *net.UDPConn, addr *net.UDPAddr, hostname string, v p
cryptoStream, _ := session.GetOrOpenStream(1) cryptoStream, _ := session.GetOrOpenStream(1)
var err error var err error
session.cryptoSetup, err = handshake.NewCryptoSetupClient(hostname, connectionID, v, cryptoStream) session.cryptoSetup, err = handshake.NewCryptoSetupClient(hostname, connectionID, v, cryptoStream, session.connectionParameters)
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -150,15 +152,13 @@ func newClientSession(conn *net.UDPConn, addr *net.UDPAddr, hostname string, v p
// setup is called from newSession and newClientSession and initializes values that are independent of the perspective // setup is called from newSession and newClientSession and initializes values that are independent of the perspective
func (s *Session) setup() { func (s *Session) setup() {
s.rttStats = &congestion.RTTStats{} s.rttStats = &congestion.RTTStats{}
connectionParameters := handshake.NewConnectionParamatersManager(s.version) flowControlManager := flowcontrol.NewFlowControlManager(s.connectionParameters, s.rttStats)
flowControlManager := flowcontrol.NewFlowControlManager(connectionParameters, s.rttStats)
var sentPacketHandler ackhandler.SentPacketHandler var sentPacketHandler ackhandler.SentPacketHandler
sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats) sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats)
now := time.Now() now := time.Now()
s.connectionParameters = connectionParameters
s.sentPacketHandler = sentPacketHandler s.sentPacketHandler = sentPacketHandler
s.flowControlManager = flowControlManager s.flowControlManager = flowControlManager
s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.ackAlarmChanged) s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.ackAlarmChanged)

View file

@ -21,7 +21,10 @@ type mockConnectionParametersManager struct {
func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error { func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error {
panic("not implemented") panic("not implemented")
} }
func (m *mockConnectionParametersManager) GetSHLOMap() map[handshake.Tag][]byte { func (m *mockConnectionParametersManager) GetSHLOMap() (map[handshake.Tag][]byte, error) {
panic("not implemented")
}
func (m *mockConnectionParametersManager) GetCHLOMap() (map[handshake.Tag][]byte, error) {
panic("not implemented") panic("not implemented")
} }
func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount { func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount {