package main import ( "fmt" "net" "strings" "time" tls "github.com/refraction-networking/utls" ) type ClientSessionCache struct { sessionKeyMap map[string]*tls.ClientSessionState } func NewClientSessionCache() tls.ClientSessionCache { return &ClientSessionCache{ sessionKeyMap: make(map[string]*tls.ClientSessionState), } } func (csc *ClientSessionCache) Get(sessionKey string) (session *tls.ClientSessionState, ok bool) { if session, ok = csc.sessionKeyMap[sessionKey]; ok { fmt.Printf("Getting session for %s\n", sessionKey) return session, true } fmt.Printf("Missing session for %s\n", sessionKey) return nil, false } func (csc *ClientSessionCache) Put(sessionKey string, cs *tls.ClientSessionState) { if csc.sessionKeyMap == nil { fmt.Printf("Deleting session for %s\n", sessionKey) delete(csc.sessionKeyMap, sessionKey) } else { fmt.Printf("Putting session for %s\n", sessionKey) csc.sessionKeyMap[sessionKey] = cs } } func runResumptionCheck(helloID tls.ClientHelloID, serverAddr string, retry int, verbose bool) { csc := NewClientSessionCache() tcpConn, err := net.Dial("tcp", serverAddr) if err != nil { panic(err) } // Everything below this line is brought to you by uTLS API, enjoy! // use chs tlsConn := tls.UClient(tcpConn, &tls.Config{ ServerName: strings.Split(serverAddr, ":")[0], // NextProtos: []string{"h2", "http/1.1"}, ClientSessionCache: csc, // set this so session tickets will be saved OmitEmptyPsk: true, }, helloID) // HS err = tlsConn.Handshake() if err != nil { panic(err) } var tlsVer uint16 if tlsConn.ConnectionState().HandshakeComplete { tlsVer = tlsConn.ConnectionState().Version if verbose { fmt.Println("Handshake complete") fmt.Printf("TLS Version: %04x\n", tlsVer) } if tlsVer == tls.VersionTLS13 { if verbose { fmt.Printf("Expecting PSK resumption\n") } } else if tlsVer == tls.VersionTLS12 { if verbose { fmt.Printf("Expecting session ticket resumption\n") } } else { panic("Don't try resumption on old TLS versions") } if tlsConn.HandshakeState.State13.UsingPSK { panic("unintended using of PSK happened...") } else if tlsConn.DidTls12Resume() { panic("unintended using of session ticket happened...") } else { if verbose { fmt.Println("First connection, no PSK/session ticket to use.") } } tlsConn.SetReadDeadline(time.Now().Add(1 * time.Second)) tlsConn.Read(make([]byte, 1024)) // trigger a read so NewSessionTicket gets handled } tlsConn.Close() for i := 0; i < retry; i++ { tcpConnPSK, err := net.Dial("tcp", serverAddr) if err != nil { panic(err) } tlsConnPSK := tls.UClient(tcpConnPSK, &tls.Config{ ServerName: strings.Split(serverAddr, ":")[0], ClientSessionCache: csc, OmitEmptyPsk: true, }, helloID) // HS err = tlsConnPSK.Handshake() if verbose { fmt.Printf("tlsConnPSK.HandshakeState.Hello.Raw %v\n", tlsConnPSK.HandshakeState.Hello.Raw) fmt.Printf("tlsConnPSK.HandshakeState.Hello.PskIdentities: %v\n", tlsConnPSK.HandshakeState.Hello.PskIdentities) } if err != nil { panic(err) } if tlsConnPSK.ConnectionState().HandshakeComplete { if verbose { fmt.Println("Handshake complete") } newVer := tlsConnPSK.ConnectionState().Version if verbose { fmt.Printf("TLS Version: %04x\n", newVer) } if newVer != tlsVer { panic("Tls version changed unexpectedly on the second connection") } if tlsVer == tls.VersionTLS13 && tlsConnPSK.HandshakeState.State13.UsingPSK { fmt.Println("[PSK used]") return } else if tlsVer == tls.VersionTLS12 && tlsConnPSK.DidTls12Resume() { fmt.Println("[session ticket used]") return } } time.Sleep(700 * time.Millisecond) } panic(fmt.Sprintf("PSK or session ticket not used for a resumption session, server %s, helloID: %s", serverAddr, helloID.Client)) } func main() { tls13Url := "www.microsoft.com:443" tls12Url1 := "spocs.getpocket.com:443" tls12Url2 := "marketplace.visualstudio.com:443" runResumptionCheck(tls.HelloChrome_100_PSK, tls13Url, 1, false) // psk + utls runResumptionCheck(tls.HelloGolang, tls13Url, 1, false) // psk + crypto/tls runResumptionCheck(tls.HelloChrome_100_PSK, tls12Url1, 10, false) // session ticket + utls runResumptionCheck(tls.HelloGolang, tls12Url1, 10, false) // session ticket + crypto/tls runResumptionCheck(tls.HelloChrome_100_PSK, tls12Url2, 10, false) // session ticket + utls runResumptionCheck(tls.HelloGolang, tls12Url2, 10, false) // session ticket + crypto/tls }