mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
fix: UConn Read does not trigger correct Handshake
Copy `(*Conn).Read` to `(*UConn).Read` and force it use `(*UConn).Handshake`. Same for `handleRenegotiation` and `handlePostHandshakeMessage`. Signed-off-by: Gaukas Wang <i@gaukas.wang>
This commit is contained in:
parent
e2bc5b12e9
commit
2a6df0af89
1 changed files with 131 additions and 0 deletions
131
u_conn.go
131
u_conn.go
|
@ -889,3 +889,134 @@ type utlsConnExtraFields struct {
|
|||
|
||||
sessionController *sessionController
|
||||
}
|
||||
|
||||
// Read reads data from the connection.
|
||||
//
|
||||
// As Read calls [Conn.Handshake], in order to prevent indefinite blocking a deadline
|
||||
// must be set for both Read and [Conn.Write] before Read is called when the handshake
|
||||
// has not yet completed. See [Conn.SetDeadline], [Conn.SetReadDeadline], and
|
||||
// [Conn.SetWriteDeadline].
|
||||
func (c *UConn) Read(b []byte) (int, error) {
|
||||
if err := c.Handshake(); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
if len(b) == 0 {
|
||||
// Put this after Handshake, in case people were calling
|
||||
// Read(nil) for the side effect of the Handshake.
|
||||
return 0, nil
|
||||
}
|
||||
|
||||
c.in.Lock()
|
||||
defer c.in.Unlock()
|
||||
|
||||
for c.input.Len() == 0 {
|
||||
if err := c.readRecord(); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
for c.hand.Len() > 0 {
|
||||
if err := c.handlePostHandshakeMessage(); err != nil {
|
||||
return 0, err
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
n, _ := c.input.Read(b)
|
||||
|
||||
// If a close-notify alert is waiting, read it so that we can return (n,
|
||||
// EOF) instead of (n, nil), to signal to the HTTP response reading
|
||||
// goroutine that the connection is now closed. This eliminates a race
|
||||
// where the HTTP response reading goroutine would otherwise not observe
|
||||
// the EOF until its next read, by which time a client goroutine might
|
||||
// have already tried to reuse the HTTP connection for a new request.
|
||||
// See https://golang.org/cl/76400046 and https://golang.org/issue/3514
|
||||
if n != 0 && c.input.Len() == 0 && c.rawInput.Len() > 0 &&
|
||||
recordType(c.rawInput.Bytes()[0]) == recordTypeAlert {
|
||||
if err := c.readRecord(); err != nil {
|
||||
return n, err // will be io.EOF on closeNotify
|
||||
}
|
||||
}
|
||||
|
||||
return n, nil
|
||||
}
|
||||
|
||||
// handleRenegotiation processes a HelloRequest handshake message.
|
||||
func (c *UConn) handleRenegotiation() error {
|
||||
if c.vers == VersionTLS13 {
|
||||
return errors.New("tls: internal error: unexpected renegotiation")
|
||||
}
|
||||
|
||||
msg, err := c.readHandshake(nil)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
helloReq, ok := msg.(*helloRequestMsg)
|
||||
if !ok {
|
||||
c.sendAlert(alertUnexpectedMessage)
|
||||
return unexpectedMessageError(helloReq, msg)
|
||||
}
|
||||
|
||||
if !c.isClient {
|
||||
return c.sendAlert(alertNoRenegotiation)
|
||||
}
|
||||
|
||||
switch c.config.Renegotiation {
|
||||
case RenegotiateNever:
|
||||
return c.sendAlert(alertNoRenegotiation)
|
||||
case RenegotiateOnceAsClient:
|
||||
if c.handshakes > 1 {
|
||||
return c.sendAlert(alertNoRenegotiation)
|
||||
}
|
||||
case RenegotiateFreelyAsClient:
|
||||
// Ok.
|
||||
default:
|
||||
c.sendAlert(alertInternalError)
|
||||
return errors.New("tls: unknown Renegotiation value")
|
||||
}
|
||||
|
||||
c.handshakeMutex.Lock()
|
||||
defer c.handshakeMutex.Unlock()
|
||||
|
||||
c.isHandshakeComplete.Store(false)
|
||||
|
||||
// [uTLS section begins]
|
||||
if err = c.BuildHandshakeState(); err != nil {
|
||||
return err
|
||||
}
|
||||
// [uTLS section ends]
|
||||
if c.handshakeErr = c.clientHandshake(context.Background()); c.handshakeErr == nil {
|
||||
c.handshakes++
|
||||
}
|
||||
return c.handshakeErr
|
||||
}
|
||||
|
||||
// handlePostHandshakeMessage processes a handshake message arrived after the
|
||||
// handshake is complete. Up to TLS 1.2, it indicates the start of a renegotiation.
|
||||
func (c *UConn) handlePostHandshakeMessage() error {
|
||||
if c.vers != VersionTLS13 {
|
||||
return c.handleRenegotiation()
|
||||
}
|
||||
|
||||
msg, err := c.readHandshake(nil)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
c.retryCount++
|
||||
if c.retryCount > maxUselessRecords {
|
||||
c.sendAlert(alertUnexpectedMessage)
|
||||
return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
|
||||
}
|
||||
|
||||
switch msg := msg.(type) {
|
||||
case *newSessionTicketMsgTLS13:
|
||||
return c.handleNewSessionTicket(msg)
|
||||
case *keyUpdateMsg:
|
||||
return c.handleKeyUpdate(msg)
|
||||
}
|
||||
// The QUIC layer is supposed to treat an unexpected post-handshake CertificateRequest
|
||||
// as a QUIC-level PROTOCOL_VIOLATION error (RFC 9001, Section 4.4). Returning an
|
||||
// unexpected_message alert here doesn't provide it with enough information to distinguish
|
||||
// this condition from other unexpected messages. This is probably fine.
|
||||
c.sendAlert(alertUnexpectedMessage)
|
||||
return fmt.Errorf("tls: received unexpected handshake message of type %T", msg)
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue