session.go 34 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138
  1. package quic
  2. import (
  3. "bytes"
  4. "context"
  5. "crypto/tls"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "net"
  10. "sync"
  11. "time"
  12. "github.com/lucas-clemente/quic-go/internal/ackhandler"
  13. "github.com/lucas-clemente/quic-go/internal/congestion"
  14. "github.com/lucas-clemente/quic-go/internal/flowcontrol"
  15. "github.com/lucas-clemente/quic-go/internal/handshake"
  16. "github.com/lucas-clemente/quic-go/internal/protocol"
  17. "github.com/lucas-clemente/quic-go/internal/qerr"
  18. "github.com/lucas-clemente/quic-go/internal/utils"
  19. "github.com/lucas-clemente/quic-go/internal/wire"
  20. )
  21. type unpacker interface {
  22. Unpack(headerBinary []byte, hdr *wire.ExtendedHeader, data []byte) (*unpackedPacket, error)
  23. }
  24. type streamGetter interface {
  25. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  26. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  27. }
  28. type streamManager interface {
  29. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  30. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  31. OpenStream() (Stream, error)
  32. OpenUniStream() (SendStream, error)
  33. OpenStreamSync() (Stream, error)
  34. OpenUniStreamSync() (SendStream, error)
  35. AcceptStream() (Stream, error)
  36. AcceptUniStream() (ReceiveStream, error)
  37. DeleteStream(protocol.StreamID) error
  38. UpdateLimits(*handshake.TransportParameters)
  39. HandleMaxStreamsFrame(*wire.MaxStreamsFrame) error
  40. CloseWithError(error)
  41. }
  42. type cryptoStreamHandler interface {
  43. RunHandshake() error
  44. io.Closer
  45. ConnectionState() handshake.ConnectionState
  46. }
  47. type receivedPacket struct {
  48. remoteAddr net.Addr
  49. hdr *wire.Header
  50. data []byte
  51. rcvTime time.Time
  52. }
  53. type closeError struct {
  54. err error
  55. remote bool
  56. sendClose bool
  57. }
  58. // A Session is a QUIC session
  59. type session struct {
  60. sessionRunner sessionRunner
  61. destConnID protocol.ConnectionID
  62. srcConnID protocol.ConnectionID
  63. perspective protocol.Perspective
  64. version protocol.VersionNumber
  65. config *Config
  66. conn connection
  67. streamsMap streamManager
  68. rttStats *congestion.RTTStats
  69. cryptoStreamManager *cryptoStreamManager
  70. sentPacketHandler ackhandler.SentPacketHandler
  71. receivedPacketHandler ackhandler.ReceivedPacketHandler
  72. framer framer
  73. windowUpdateQueue *windowUpdateQueue
  74. connFlowController flowcontrol.ConnectionFlowController
  75. unpacker unpacker
  76. packer packer
  77. cryptoStreamHandler cryptoStreamHandler
  78. receivedPackets chan *receivedPacket
  79. sendingScheduled chan struct{}
  80. closeOnce sync.Once
  81. closed utils.AtomicBool
  82. // closeChan is used to notify the run loop that it should terminate
  83. closeChan chan closeError
  84. connectionClosePacket *packedPacket
  85. packetsReceivedAfterClose int
  86. ctx context.Context
  87. ctxCancel context.CancelFunc
  88. undecryptablePackets []*receivedPacket
  89. clientHelloWritten <-chan struct{}
  90. handshakeCompleteChan chan struct{} // is closed when the handshake completes
  91. handshakeComplete bool
  92. receivedFirstPacket bool // since packet numbers start at 0, we can't use largestRcvdPacketNumber != 0 for this
  93. receivedFirstForwardSecurePacket bool
  94. // Used to calculate the next packet number from the truncated wire
  95. // representation, and sent back in public reset packets
  96. largestRcvdPacketNumber protocol.PacketNumber
  97. sessionCreationTime time.Time
  98. lastNetworkActivityTime time.Time
  99. // pacingDeadline is the time when the next packet should be sent
  100. pacingDeadline time.Time
  101. peerParams *handshake.TransportParameters
  102. timer *utils.Timer
  103. // keepAlivePingSent stores whether a Ping frame was sent to the peer or not
  104. // it is reset as soon as we receive a packet from the peer
  105. keepAlivePingSent bool
  106. logger utils.Logger
  107. }
  108. var _ Session = &session{}
  109. var _ streamSender = &session{}
  110. var newSession = func(
  111. conn connection,
  112. runner sessionRunner,
  113. clientDestConnID protocol.ConnectionID,
  114. destConnID protocol.ConnectionID,
  115. srcConnID protocol.ConnectionID,
  116. conf *Config,
  117. tlsConf *tls.Config,
  118. params *handshake.TransportParameters,
  119. logger utils.Logger,
  120. v protocol.VersionNumber,
  121. ) (quicSession, error) {
  122. s := &session{
  123. conn: conn,
  124. sessionRunner: runner,
  125. config: conf,
  126. srcConnID: srcConnID,
  127. destConnID: destConnID,
  128. perspective: protocol.PerspectiveServer,
  129. handshakeCompleteChan: make(chan struct{}),
  130. logger: logger,
  131. version: v,
  132. }
  133. s.preSetup()
  134. initialStream := newCryptoStream()
  135. handshakeStream := newCryptoStream()
  136. s.streamsMap = newStreamsMap(
  137. s,
  138. s.newFlowController,
  139. uint64(s.config.MaxIncomingStreams),
  140. uint64(s.config.MaxIncomingUniStreams),
  141. s.perspective,
  142. s.version,
  143. )
  144. s.framer = newFramer(s.streamsMap, s.version)
  145. cs, err := handshake.NewCryptoSetupServer(
  146. initialStream,
  147. handshakeStream,
  148. clientDestConnID,
  149. params,
  150. s.processTransportParameters,
  151. tlsConf,
  152. conf.Versions,
  153. v,
  154. logger,
  155. protocol.PerspectiveServer,
  156. )
  157. if err != nil {
  158. return nil, err
  159. }
  160. s.cryptoStreamHandler = cs
  161. s.framer = newFramer(s.streamsMap, s.version)
  162. s.packer = newPacketPacker(
  163. s.destConnID,
  164. s.srcConnID,
  165. initialStream,
  166. handshakeStream,
  167. s.sentPacketHandler,
  168. s.RemoteAddr(),
  169. nil, // no token
  170. cs,
  171. s.framer,
  172. s.receivedPacketHandler,
  173. s.perspective,
  174. s.version,
  175. )
  176. s.cryptoStreamManager = newCryptoStreamManager(cs, initialStream, handshakeStream)
  177. if err := s.postSetup(); err != nil {
  178. return nil, err
  179. }
  180. s.unpacker = newPacketUnpacker(cs, s.version)
  181. return s, nil
  182. }
  183. // declare this as a variable, such that we can it mock it in the tests
  184. var newClientSession = func(
  185. conn connection,
  186. runner sessionRunner,
  187. token []byte,
  188. origDestConnID protocol.ConnectionID,
  189. destConnID protocol.ConnectionID,
  190. srcConnID protocol.ConnectionID,
  191. conf *Config,
  192. tlsConf *tls.Config,
  193. params *handshake.TransportParameters,
  194. initialVersion protocol.VersionNumber,
  195. logger utils.Logger,
  196. v protocol.VersionNumber,
  197. ) (quicSession, error) {
  198. s := &session{
  199. conn: conn,
  200. sessionRunner: runner,
  201. config: conf,
  202. srcConnID: srcConnID,
  203. destConnID: destConnID,
  204. perspective: protocol.PerspectiveClient,
  205. handshakeCompleteChan: make(chan struct{}),
  206. logger: logger,
  207. version: v,
  208. }
  209. s.preSetup()
  210. initialStream := newCryptoStream()
  211. handshakeStream := newCryptoStream()
  212. cs, clientHelloWritten, err := handshake.NewCryptoSetupClient(
  213. initialStream,
  214. handshakeStream,
  215. origDestConnID,
  216. s.destConnID,
  217. params,
  218. s.processTransportParameters,
  219. tlsConf,
  220. initialVersion,
  221. conf.Versions,
  222. v,
  223. logger,
  224. protocol.PerspectiveClient,
  225. )
  226. if err != nil {
  227. return nil, err
  228. }
  229. s.clientHelloWritten = clientHelloWritten
  230. s.cryptoStreamHandler = cs
  231. s.cryptoStreamManager = newCryptoStreamManager(cs, initialStream, handshakeStream)
  232. s.unpacker = newPacketUnpacker(cs, s.version)
  233. s.streamsMap = newStreamsMap(
  234. s,
  235. s.newFlowController,
  236. uint64(s.config.MaxIncomingStreams),
  237. uint64(s.config.MaxIncomingUniStreams),
  238. s.perspective,
  239. s.version,
  240. )
  241. s.framer = newFramer(s.streamsMap, s.version)
  242. s.packer = newPacketPacker(
  243. s.destConnID,
  244. s.srcConnID,
  245. initialStream,
  246. handshakeStream,
  247. s.sentPacketHandler,
  248. s.RemoteAddr(),
  249. token,
  250. cs,
  251. s.framer,
  252. s.receivedPacketHandler,
  253. s.perspective,
  254. s.version,
  255. )
  256. return s, s.postSetup()
  257. }
  258. func (s *session) preSetup() {
  259. s.rttStats = &congestion.RTTStats{}
  260. s.sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats, s.logger)
  261. s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.rttStats, s.logger, s.version)
  262. s.connFlowController = flowcontrol.NewConnectionFlowController(
  263. protocol.InitialMaxData,
  264. protocol.ByteCount(s.config.MaxReceiveConnectionFlowControlWindow),
  265. s.onHasConnectionWindowUpdate,
  266. s.rttStats,
  267. s.logger,
  268. )
  269. }
  270. func (s *session) postSetup() error {
  271. s.receivedPackets = make(chan *receivedPacket, protocol.MaxSessionUnprocessedPackets)
  272. s.closeChan = make(chan closeError, 1)
  273. s.sendingScheduled = make(chan struct{}, 1)
  274. s.undecryptablePackets = make([]*receivedPacket, 0, protocol.MaxUndecryptablePackets)
  275. s.ctx, s.ctxCancel = context.WithCancel(context.Background())
  276. s.timer = utils.NewTimer()
  277. now := time.Now()
  278. s.lastNetworkActivityTime = now
  279. s.sessionCreationTime = now
  280. s.windowUpdateQueue = newWindowUpdateQueue(s.streamsMap, s.connFlowController, s.framer.QueueControlFrame)
  281. return nil
  282. }
  283. // run the session main loop
  284. func (s *session) run() error {
  285. defer s.ctxCancel()
  286. go func() {
  287. if err := s.cryptoStreamHandler.RunHandshake(); err != nil {
  288. s.closeLocal(err)
  289. return
  290. }
  291. close(s.handshakeCompleteChan)
  292. }()
  293. if s.perspective == protocol.PerspectiveClient {
  294. select {
  295. case <-s.clientHelloWritten:
  296. s.scheduleSending()
  297. case closeErr := <-s.closeChan:
  298. // put the close error back into the channel, so that the run loop can receive it
  299. s.closeChan <- closeErr
  300. }
  301. }
  302. var closeErr closeError
  303. runLoop:
  304. for {
  305. // Close immediately if requested
  306. select {
  307. case closeErr = <-s.closeChan:
  308. break runLoop
  309. case <-s.handshakeCompleteChan:
  310. s.handleHandshakeComplete()
  311. default:
  312. }
  313. s.maybeResetTimer()
  314. select {
  315. case closeErr = <-s.closeChan:
  316. break runLoop
  317. case <-s.timer.Chan():
  318. s.timer.SetRead()
  319. // We do all the interesting stuff after the switch statement, so
  320. // nothing to see here.
  321. case <-s.sendingScheduled:
  322. // We do all the interesting stuff after the switch statement, so
  323. // nothing to see here.
  324. case p := <-s.receivedPackets:
  325. err := s.handlePacketImpl(p)
  326. if err != nil {
  327. if qErr, ok := err.(*qerr.QuicError); ok && qErr.ErrorCode == qerr.DecryptionFailure {
  328. s.tryQueueingUndecryptablePacket(p)
  329. continue
  330. }
  331. s.closeLocal(err)
  332. continue
  333. }
  334. // This is a bit unclean, but works properly, since the packet always
  335. // begins with the public header and we never copy it.
  336. // TODO: putPacketBuffer(&p.extHdr.Raw)
  337. case <-s.handshakeCompleteChan:
  338. s.handleHandshakeComplete()
  339. }
  340. now := time.Now()
  341. if timeout := s.sentPacketHandler.GetAlarmTimeout(); !timeout.IsZero() && timeout.Before(now) {
  342. // This could cause packets to be retransmitted.
  343. // Check it before trying to send packets.
  344. if err := s.sentPacketHandler.OnAlarm(); err != nil {
  345. s.closeLocal(err)
  346. }
  347. }
  348. var pacingDeadline time.Time
  349. if s.pacingDeadline.IsZero() { // the timer didn't have a pacing deadline set
  350. pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  351. }
  352. if s.config.KeepAlive && !s.keepAlivePingSent && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.peerParams.IdleTimeout/2 {
  353. // send a PING frame since there is no activity in the session
  354. s.logger.Debugf("Sending a keep-alive ping to keep the connection alive.")
  355. s.framer.QueueControlFrame(&wire.PingFrame{})
  356. s.keepAlivePingSent = true
  357. } else if !pacingDeadline.IsZero() && now.Before(pacingDeadline) {
  358. // If we get to this point before the pacing deadline, we should wait until that deadline.
  359. // This can happen when scheduleSending is called, or a packet is received.
  360. // Set the timer and restart the run loop.
  361. s.pacingDeadline = pacingDeadline
  362. continue
  363. }
  364. if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
  365. s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time."))
  366. continue
  367. }
  368. if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.config.IdleTimeout {
  369. s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
  370. continue
  371. }
  372. if err := s.sendPackets(); err != nil {
  373. s.closeLocal(err)
  374. }
  375. }
  376. if err := s.handleCloseError(closeErr); err != nil {
  377. s.logger.Infof("Handling close error failed: %s", err)
  378. }
  379. s.closed.Set(true)
  380. s.logger.Infof("Connection %s closed.", s.srcConnID)
  381. s.cryptoStreamHandler.Close()
  382. return closeErr.err
  383. }
  384. func (s *session) Context() context.Context {
  385. return s.ctx
  386. }
  387. func (s *session) ConnectionState() ConnectionState {
  388. return s.cryptoStreamHandler.ConnectionState()
  389. }
  390. func (s *session) maybeResetTimer() {
  391. var deadline time.Time
  392. if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
  393. deadline = s.lastNetworkActivityTime.Add(s.peerParams.IdleTimeout / 2)
  394. } else {
  395. deadline = s.lastNetworkActivityTime.Add(s.config.IdleTimeout)
  396. }
  397. if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() {
  398. deadline = utils.MinTime(deadline, ackAlarm)
  399. }
  400. if lossTime := s.sentPacketHandler.GetAlarmTimeout(); !lossTime.IsZero() {
  401. deadline = utils.MinTime(deadline, lossTime)
  402. }
  403. if !s.handshakeComplete {
  404. handshakeDeadline := s.sessionCreationTime.Add(s.config.HandshakeTimeout)
  405. deadline = utils.MinTime(deadline, handshakeDeadline)
  406. }
  407. if !s.pacingDeadline.IsZero() {
  408. deadline = utils.MinTime(deadline, s.pacingDeadline)
  409. }
  410. s.timer.Reset(deadline)
  411. }
  412. func (s *session) handleHandshakeComplete() {
  413. s.handshakeComplete = true
  414. s.handshakeCompleteChan = nil // prevent this case from ever being selected again
  415. s.sessionRunner.onHandshakeComplete(s)
  416. // The client completes the handshake first (after sending the CFIN).
  417. // We need to make sure they learn about the peer completing the handshake,
  418. // in order to stop retransmitting handshake packets.
  419. // They will stop retransmitting handshake packets when receiving the first forward-secure packet.
  420. // We need to make sure that a retransmittable forward-secure packet is sent,
  421. // independent from the application protocol.
  422. if s.perspective == protocol.PerspectiveServer {
  423. s.queueControlFrame(&wire.PingFrame{})
  424. s.sentPacketHandler.SetHandshakeComplete()
  425. }
  426. }
  427. func (s *session) handlePacketImpl(p *receivedPacket) error {
  428. // The server can change the source connection ID with the first Handshake packet.
  429. // After this, all packets with a different source connection have to be ignored.
  430. if s.receivedFirstPacket && p.hdr.IsLongHeader && !p.hdr.SrcConnectionID.Equal(s.destConnID) {
  431. s.logger.Debugf("Dropping packet with unexpected source connection ID: %s (expected %s)", p.hdr.SrcConnectionID, s.destConnID)
  432. return nil
  433. }
  434. data := p.data
  435. r := bytes.NewReader(data)
  436. hdr, err := p.hdr.ParseExtended(r, s.version)
  437. if err != nil {
  438. return fmt.Errorf("error parsing extended header: %s", err)
  439. }
  440. hdr.Raw = data[:len(data)-r.Len()]
  441. data = data[len(data)-r.Len():]
  442. if hdr.IsLongHeader {
  443. if hdr.Length < protocol.ByteCount(hdr.PacketNumberLen) {
  444. return fmt.Errorf("packet length (%d bytes) shorter than packet number (%d bytes)", hdr.Length, hdr.PacketNumberLen)
  445. }
  446. if protocol.ByteCount(len(data))+protocol.ByteCount(hdr.PacketNumberLen) < hdr.Length {
  447. return fmt.Errorf("packet length (%d bytes) is smaller than the expected length (%d bytes)", len(data)+int(hdr.PacketNumberLen), hdr.Length)
  448. }
  449. data = data[:int(hdr.Length)-int(hdr.PacketNumberLen)]
  450. // TODO(#1312): implement parsing of compound packets
  451. }
  452. // Calculate packet number
  453. hdr.PacketNumber = protocol.InferPacketNumber(
  454. hdr.PacketNumberLen,
  455. s.largestRcvdPacketNumber,
  456. hdr.PacketNumber,
  457. )
  458. packet, err := s.unpacker.Unpack(hdr.Raw, hdr, data)
  459. if s.logger.Debug() {
  460. if err != nil {
  461. s.logger.Debugf("<- Reading packet 0x%x (%d bytes) for connection %s", hdr.PacketNumber, len(p.data)+len(hdr.Raw), hdr.DestConnectionID)
  462. } else {
  463. s.logger.Debugf("<- Reading packet 0x%x (%d bytes) for connection %s, %s", hdr.PacketNumber, len(p.data)+len(hdr.Raw), hdr.DestConnectionID, packet.encryptionLevel)
  464. }
  465. hdr.Log(s.logger)
  466. }
  467. // if the decryption failed, this might be a packet sent by an attacker
  468. if err != nil {
  469. return err
  470. }
  471. // The server can change the source connection ID with the first Handshake packet.
  472. if s.perspective == protocol.PerspectiveClient && !s.receivedFirstPacket && hdr.IsLongHeader && !hdr.SrcConnectionID.Equal(s.destConnID) {
  473. s.logger.Debugf("Received first packet. Switching destination connection ID to: %s", hdr.SrcConnectionID)
  474. s.destConnID = hdr.SrcConnectionID
  475. s.packer.ChangeDestConnectionID(s.destConnID)
  476. }
  477. s.receivedFirstPacket = true
  478. s.lastNetworkActivityTime = p.rcvTime
  479. s.keepAlivePingSent = false
  480. // The client completes the handshake first (after sending the CFIN).
  481. // We know that the server completed the handshake as soon as we receive a forward-secure packet.
  482. if s.perspective == protocol.PerspectiveClient {
  483. if !s.receivedFirstForwardSecurePacket && packet.encryptionLevel == protocol.Encryption1RTT {
  484. s.receivedFirstForwardSecurePacket = true
  485. s.sentPacketHandler.SetHandshakeComplete()
  486. }
  487. }
  488. // Only do this after decrypting, so we are sure the packet is not attacker-controlled
  489. s.largestRcvdPacketNumber = utils.MaxPacketNumber(s.largestRcvdPacketNumber, hdr.PacketNumber)
  490. // If this is a Retry packet, there's no need to send an ACK.
  491. // The session will be closed and recreated as soon as the crypto setup processed the HRR.
  492. if hdr.Type != protocol.PacketTypeRetry {
  493. isRetransmittable := ackhandler.HasRetransmittableFrames(packet.frames)
  494. if err := s.receivedPacketHandler.ReceivedPacket(hdr.PacketNumber, p.rcvTime, isRetransmittable); err != nil {
  495. return err
  496. }
  497. }
  498. return s.handleFrames(packet.frames, hdr.PacketNumber, packet.encryptionLevel)
  499. }
  500. func (s *session) handleFrames(fs []wire.Frame, pn protocol.PacketNumber, encLevel protocol.EncryptionLevel) error {
  501. for _, ff := range fs {
  502. var err error
  503. wire.LogFrame(s.logger, ff, false)
  504. switch frame := ff.(type) {
  505. case *wire.CryptoFrame:
  506. err = s.handleCryptoFrame(frame, encLevel)
  507. case *wire.StreamFrame:
  508. err = s.handleStreamFrame(frame, encLevel)
  509. case *wire.AckFrame:
  510. err = s.handleAckFrame(frame, pn, encLevel)
  511. case *wire.ConnectionCloseFrame:
  512. s.closeRemote(qerr.Error(frame.ErrorCode, frame.ReasonPhrase))
  513. case *wire.ResetStreamFrame:
  514. err = s.handleResetStreamFrame(frame)
  515. case *wire.MaxDataFrame:
  516. s.handleMaxDataFrame(frame)
  517. case *wire.MaxStreamDataFrame:
  518. err = s.handleMaxStreamDataFrame(frame)
  519. case *wire.MaxStreamsFrame:
  520. err = s.handleMaxStreamsFrame(frame)
  521. case *wire.DataBlockedFrame:
  522. case *wire.StreamDataBlockedFrame:
  523. case *wire.StreamsBlockedFrame:
  524. case *wire.StopSendingFrame:
  525. err = s.handleStopSendingFrame(frame)
  526. case *wire.PingFrame:
  527. case *wire.PathChallengeFrame:
  528. s.handlePathChallengeFrame(frame)
  529. case *wire.PathResponseFrame:
  530. // since we don't send PATH_CHALLENGEs, we don't expect PATH_RESPONSEs
  531. err = errors.New("unexpected PATH_RESPONSE frame")
  532. case *wire.NewTokenFrame:
  533. case *wire.NewConnectionIDFrame:
  534. case *wire.RetireConnectionIDFrame:
  535. // since we don't send new connection IDs, we don't expect retirements
  536. err = errors.New("unexpected RETIRE_CONNECTION_ID frame")
  537. default:
  538. return errors.New("Session BUG: unexpected frame type")
  539. }
  540. if err != nil {
  541. return err
  542. }
  543. }
  544. return nil
  545. }
  546. // handlePacket is called by the server with a new packet
  547. func (s *session) handlePacket(p *receivedPacket) {
  548. if s.closed.Get() {
  549. s.handlePacketAfterClosed(p)
  550. }
  551. // Discard packets once the amount of queued packets is larger than
  552. // the channel size, protocol.MaxSessionUnprocessedPackets
  553. select {
  554. case s.receivedPackets <- p:
  555. default:
  556. }
  557. }
  558. func (s *session) handlePacketAfterClosed(p *receivedPacket) {
  559. s.packetsReceivedAfterClose++
  560. if s.connectionClosePacket == nil {
  561. return
  562. }
  563. // exponential backoff
  564. // only send a CONNECTION_CLOSE for the 1st, 2nd, 4th, 8th, 16th, ... packet arriving
  565. for n := s.packetsReceivedAfterClose; n > 1; n = n / 2 {
  566. if n%2 != 0 {
  567. return
  568. }
  569. }
  570. s.logger.Debugf("Received %d packets after sending CONNECTION_CLOSE. Retransmitting.", s.packetsReceivedAfterClose)
  571. if err := s.conn.Write(s.connectionClosePacket.raw); err != nil {
  572. s.logger.Debugf("Error retransmitting CONNECTION_CLOSE: %s", err)
  573. }
  574. }
  575. func (s *session) handleCryptoFrame(frame *wire.CryptoFrame, encLevel protocol.EncryptionLevel) error {
  576. encLevelChanged, err := s.cryptoStreamManager.HandleCryptoFrame(frame, encLevel)
  577. if err != nil {
  578. return err
  579. }
  580. if encLevelChanged {
  581. s.tryDecryptingQueuedPackets()
  582. }
  583. return nil
  584. }
  585. func (s *session) handleStreamFrame(frame *wire.StreamFrame, encLevel protocol.EncryptionLevel) error {
  586. if encLevel < protocol.Encryption1RTT {
  587. return qerr.Error(qerr.UnencryptedStreamData, fmt.Sprintf("received unencrypted stream data on stream %d", frame.StreamID))
  588. }
  589. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  590. if err != nil {
  591. return err
  592. }
  593. if str == nil {
  594. // Stream is closed and already garbage collected
  595. // ignore this StreamFrame
  596. return nil
  597. }
  598. return str.handleStreamFrame(frame)
  599. }
  600. func (s *session) handleMaxDataFrame(frame *wire.MaxDataFrame) {
  601. s.connFlowController.UpdateSendWindow(frame.ByteOffset)
  602. }
  603. func (s *session) handleMaxStreamDataFrame(frame *wire.MaxStreamDataFrame) error {
  604. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  605. if err != nil {
  606. return err
  607. }
  608. if str == nil {
  609. // stream is closed and already garbage collected
  610. return nil
  611. }
  612. str.handleMaxStreamDataFrame(frame)
  613. return nil
  614. }
  615. func (s *session) handleMaxStreamsFrame(frame *wire.MaxStreamsFrame) error {
  616. return s.streamsMap.HandleMaxStreamsFrame(frame)
  617. }
  618. func (s *session) handleResetStreamFrame(frame *wire.ResetStreamFrame) error {
  619. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  620. if err != nil {
  621. return err
  622. }
  623. if str == nil {
  624. // stream is closed and already garbage collected
  625. return nil
  626. }
  627. return str.handleResetStreamFrame(frame)
  628. }
  629. func (s *session) handleStopSendingFrame(frame *wire.StopSendingFrame) error {
  630. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  631. if err != nil {
  632. return err
  633. }
  634. if str == nil {
  635. // stream is closed and already garbage collected
  636. return nil
  637. }
  638. str.handleStopSendingFrame(frame)
  639. return nil
  640. }
  641. func (s *session) handlePathChallengeFrame(frame *wire.PathChallengeFrame) {
  642. s.queueControlFrame(&wire.PathResponseFrame{Data: frame.Data})
  643. }
  644. func (s *session) handleAckFrame(frame *wire.AckFrame, pn protocol.PacketNumber, encLevel protocol.EncryptionLevel) error {
  645. if err := s.sentPacketHandler.ReceivedAck(frame, pn, encLevel, s.lastNetworkActivityTime); err != nil {
  646. return err
  647. }
  648. s.receivedPacketHandler.IgnoreBelow(s.sentPacketHandler.GetLowestPacketNotConfirmedAcked())
  649. return nil
  650. }
  651. // closeLocal closes the session and send a CONNECTION_CLOSE containing the error
  652. func (s *session) closeLocal(e error) {
  653. s.closeOnce.Do(func() {
  654. s.sessionRunner.retireConnectionID(s.srcConnID)
  655. s.closeChan <- closeError{err: e, sendClose: true, remote: false}
  656. })
  657. }
  658. // destroy closes the session without sending the error on the wire
  659. func (s *session) destroy(e error) {
  660. s.closeOnce.Do(func() {
  661. s.sessionRunner.removeConnectionID(s.srcConnID)
  662. s.closeChan <- closeError{err: e, sendClose: false, remote: false}
  663. })
  664. }
  665. func (s *session) closeRemote(e error) {
  666. s.closeOnce.Do(func() {
  667. s.sessionRunner.removeConnectionID(s.srcConnID)
  668. s.closeChan <- closeError{err: e, remote: true}
  669. })
  670. }
  671. // Close the connection. It sends a qerr.PeerGoingAway.
  672. // It waits until the run loop has stopped before returning
  673. func (s *session) Close() error {
  674. s.closeLocal(nil)
  675. <-s.ctx.Done()
  676. return nil
  677. }
  678. func (s *session) CloseWithError(code protocol.ApplicationErrorCode, e error) error {
  679. s.closeLocal(qerr.Error(qerr.ErrorCode(code), e.Error()))
  680. <-s.ctx.Done()
  681. return nil
  682. }
  683. func (s *session) handleCloseError(closeErr closeError) error {
  684. if closeErr.err == nil {
  685. closeErr.err = qerr.PeerGoingAway
  686. }
  687. var quicErr *qerr.QuicError
  688. var ok bool
  689. if quicErr, ok = closeErr.err.(*qerr.QuicError); !ok {
  690. quicErr = qerr.ToQuicError(closeErr.err)
  691. }
  692. // Don't log 'normal' reasons
  693. if quicErr.ErrorCode == qerr.PeerGoingAway || quicErr.ErrorCode == qerr.NetworkIdleTimeout {
  694. s.logger.Infof("Closing connection %s.", s.srcConnID)
  695. } else {
  696. s.logger.Errorf("Closing session with error: %s", closeErr.err.Error())
  697. }
  698. s.streamsMap.CloseWithError(quicErr)
  699. if !closeErr.sendClose {
  700. return nil
  701. }
  702. // If this is a remote close we're done here
  703. if closeErr.remote {
  704. return nil
  705. }
  706. if quicErr.ErrorCode == qerr.DecryptionFailure {
  707. // TODO(#943): send a stateless reset
  708. return nil
  709. }
  710. return s.sendConnectionClose(quicErr)
  711. }
  712. func (s *session) processTransportParameters(params *handshake.TransportParameters) {
  713. s.peerParams = params
  714. s.streamsMap.UpdateLimits(params)
  715. s.packer.HandleTransportParameters(params)
  716. s.connFlowController.UpdateSendWindow(params.InitialMaxData)
  717. // the crypto stream is the only open stream at this moment
  718. // so we don't need to update stream flow control windows
  719. }
  720. func (s *session) sendPackets() error {
  721. s.pacingDeadline = time.Time{}
  722. sendMode := s.sentPacketHandler.SendMode()
  723. if sendMode == ackhandler.SendNone { // shortcut: return immediately if there's nothing to send
  724. return nil
  725. }
  726. numPackets := s.sentPacketHandler.ShouldSendNumPackets()
  727. var numPacketsSent int
  728. sendLoop:
  729. for {
  730. switch sendMode {
  731. case ackhandler.SendNone:
  732. break sendLoop
  733. case ackhandler.SendAck:
  734. // If we already sent packets, and the send mode switches to SendAck,
  735. // we've just become congestion limited.
  736. // There's no need to try to send an ACK at this moment.
  737. if numPacketsSent > 0 {
  738. return nil
  739. }
  740. // We can at most send a single ACK only packet.
  741. // There will only be a new ACK after receiving new packets.
  742. // SendAck is only returned when we're congestion limited, so we don't need to set the pacingt timer.
  743. return s.maybeSendAckOnlyPacket()
  744. case ackhandler.SendTLP, ackhandler.SendRTO:
  745. if err := s.sendProbePacket(); err != nil {
  746. return err
  747. }
  748. numPacketsSent++
  749. case ackhandler.SendRetransmission:
  750. sentPacket, err := s.maybeSendRetransmission()
  751. if err != nil {
  752. return err
  753. }
  754. if sentPacket {
  755. numPacketsSent++
  756. // This can happen if a retransmission queued, but it wasn't necessary to send it.
  757. // e.g. when an Initial is queued, but we already received a packet from the server.
  758. }
  759. case ackhandler.SendAny:
  760. sentPacket, err := s.sendPacket()
  761. if err != nil {
  762. return err
  763. }
  764. if !sentPacket {
  765. break sendLoop
  766. }
  767. numPacketsSent++
  768. default:
  769. return fmt.Errorf("BUG: invalid send mode %d", sendMode)
  770. }
  771. if numPacketsSent >= numPackets {
  772. break
  773. }
  774. sendMode = s.sentPacketHandler.SendMode()
  775. }
  776. // Only start the pacing timer if we sent as many packets as we were allowed.
  777. // There will probably be more to send when calling sendPacket again.
  778. if numPacketsSent == numPackets {
  779. s.pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  780. }
  781. return nil
  782. }
  783. func (s *session) maybeSendAckOnlyPacket() error {
  784. packet, err := s.packer.MaybePackAckPacket()
  785. if err != nil {
  786. return err
  787. }
  788. if packet == nil {
  789. return nil
  790. }
  791. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  792. return s.sendPackedPacket(packet)
  793. }
  794. // maybeSendRetransmission sends retransmissions for at most one packet.
  795. // It takes care that Initials aren't retransmitted, if a packet from the server was already received.
  796. func (s *session) maybeSendRetransmission() (bool, error) {
  797. var retransmitPacket *ackhandler.Packet
  798. for {
  799. retransmitPacket = s.sentPacketHandler.DequeuePacketForRetransmission()
  800. if retransmitPacket == nil {
  801. return false, nil
  802. }
  803. // Don't retransmit Initial packets if we already received a response.
  804. // An Initial might have been retransmitted multiple times before we receive a response.
  805. // As soon as we receive one response, we don't need to send any more Initials.
  806. if s.perspective == protocol.PerspectiveClient && s.receivedFirstPacket && retransmitPacket.PacketType == protocol.PacketTypeInitial {
  807. s.logger.Debugf("Skipping retransmission of packet %d. Already received a response to an Initial.", retransmitPacket.PacketNumber)
  808. continue
  809. }
  810. break
  811. }
  812. if retransmitPacket.EncryptionLevel != protocol.Encryption1RTT {
  813. s.logger.Debugf("Dequeueing handshake retransmission for packet 0x%x", retransmitPacket.PacketNumber)
  814. } else {
  815. s.logger.Debugf("Dequeueing retransmission for packet 0x%x", retransmitPacket.PacketNumber)
  816. }
  817. packets, err := s.packer.PackRetransmission(retransmitPacket)
  818. if err != nil {
  819. return false, err
  820. }
  821. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  822. for i, packet := range packets {
  823. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  824. }
  825. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, retransmitPacket.PacketNumber)
  826. for _, packet := range packets {
  827. if err := s.sendPackedPacket(packet); err != nil {
  828. return false, err
  829. }
  830. }
  831. return true, nil
  832. }
  833. func (s *session) sendProbePacket() error {
  834. p, err := s.sentPacketHandler.DequeueProbePacket()
  835. if err != nil {
  836. return err
  837. }
  838. s.logger.Debugf("Sending a retransmission for %#x as a probe packet.", p.PacketNumber)
  839. packets, err := s.packer.PackRetransmission(p)
  840. if err != nil {
  841. return err
  842. }
  843. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  844. for i, packet := range packets {
  845. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  846. }
  847. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, p.PacketNumber)
  848. for _, packet := range packets {
  849. if err := s.sendPackedPacket(packet); err != nil {
  850. return err
  851. }
  852. }
  853. return nil
  854. }
  855. func (s *session) sendPacket() (bool, error) {
  856. if isBlocked, offset := s.connFlowController.IsNewlyBlocked(); isBlocked {
  857. s.framer.QueueControlFrame(&wire.DataBlockedFrame{DataLimit: offset})
  858. }
  859. s.windowUpdateQueue.QueueAll()
  860. packet, err := s.packer.PackPacket()
  861. if err != nil || packet == nil {
  862. return false, err
  863. }
  864. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  865. if err := s.sendPackedPacket(packet); err != nil {
  866. return false, err
  867. }
  868. return true, nil
  869. }
  870. func (s *session) sendPackedPacket(packet *packedPacket) error {
  871. defer putPacketBuffer(&packet.raw)
  872. s.logPacket(packet)
  873. return s.conn.Write(packet.raw)
  874. }
  875. func (s *session) sendConnectionClose(quicErr *qerr.QuicError) error {
  876. packet, err := s.packer.PackConnectionClose(&wire.ConnectionCloseFrame{
  877. ErrorCode: quicErr.ErrorCode,
  878. ReasonPhrase: quicErr.ErrorMessage,
  879. })
  880. if err != nil {
  881. return err
  882. }
  883. s.connectionClosePacket = packet
  884. s.logPacket(packet)
  885. return s.conn.Write(packet.raw)
  886. }
  887. func (s *session) logPacket(packet *packedPacket) {
  888. if !s.logger.Debug() {
  889. // We don't need to allocate the slices for calling the format functions
  890. return
  891. }
  892. s.logger.Debugf("-> Sending packet 0x%x (%d bytes) for connection %s, %s", packet.header.PacketNumber, len(packet.raw), s.srcConnID, packet.encryptionLevel)
  893. packet.header.Log(s.logger)
  894. for _, frame := range packet.frames {
  895. wire.LogFrame(s.logger, frame, true)
  896. }
  897. }
  898. // GetOrOpenStream either returns an existing stream, a newly opened stream, or nil if a stream with the provided ID is already closed.
  899. // It is *only* needed for gQUIC's H2.
  900. // It will be removed as soon as gQUIC moves towards the IETF H2/QUIC stream mapping.
  901. func (s *session) GetOrOpenStream(id protocol.StreamID) (Stream, error) {
  902. str, err := s.streamsMap.GetOrOpenSendStream(id)
  903. if str != nil {
  904. if bstr, ok := str.(Stream); ok {
  905. return bstr, err
  906. }
  907. return nil, fmt.Errorf("Stream %d is not a bidirectional stream", id)
  908. }
  909. // make sure to return an actual nil value here, not an Stream with value nil
  910. return nil, err
  911. }
  912. // AcceptStream returns the next stream openend by the peer
  913. func (s *session) AcceptStream() (Stream, error) {
  914. return s.streamsMap.AcceptStream()
  915. }
  916. func (s *session) AcceptUniStream() (ReceiveStream, error) {
  917. return s.streamsMap.AcceptUniStream()
  918. }
  919. // OpenStream opens a stream
  920. func (s *session) OpenStream() (Stream, error) {
  921. return s.streamsMap.OpenStream()
  922. }
  923. func (s *session) OpenStreamSync() (Stream, error) {
  924. return s.streamsMap.OpenStreamSync()
  925. }
  926. func (s *session) OpenUniStream() (SendStream, error) {
  927. return s.streamsMap.OpenUniStream()
  928. }
  929. func (s *session) OpenUniStreamSync() (SendStream, error) {
  930. return s.streamsMap.OpenUniStreamSync()
  931. }
  932. func (s *session) newStream(id protocol.StreamID) streamI {
  933. flowController := s.newFlowController(id)
  934. return newStream(id, s, flowController, s.version)
  935. }
  936. func (s *session) newFlowController(id protocol.StreamID) flowcontrol.StreamFlowController {
  937. var initialSendWindow protocol.ByteCount
  938. if s.peerParams != nil {
  939. if id.Type() == protocol.StreamTypeUni {
  940. initialSendWindow = s.peerParams.InitialMaxStreamDataUni
  941. } else {
  942. if id.InitiatedBy() == s.perspective {
  943. initialSendWindow = s.peerParams.InitialMaxStreamDataBidiLocal
  944. } else {
  945. initialSendWindow = s.peerParams.InitialMaxStreamDataBidiRemote
  946. }
  947. }
  948. }
  949. return flowcontrol.NewStreamFlowController(
  950. id,
  951. s.connFlowController,
  952. protocol.InitialMaxStreamData,
  953. protocol.ByteCount(s.config.MaxReceiveStreamFlowControlWindow),
  954. initialSendWindow,
  955. s.onHasStreamWindowUpdate,
  956. s.rttStats,
  957. s.logger,
  958. )
  959. }
  960. // scheduleSending signals that we have data for sending
  961. func (s *session) scheduleSending() {
  962. select {
  963. case s.sendingScheduled <- struct{}{}:
  964. default:
  965. }
  966. }
  967. func (s *session) tryQueueingUndecryptablePacket(p *receivedPacket) {
  968. if s.handshakeComplete {
  969. s.logger.Debugf("Received undecryptable packet from %s after the handshake (%d bytes)", p.remoteAddr.String(), len(p.data))
  970. return
  971. }
  972. if len(s.undecryptablePackets)+1 > protocol.MaxUndecryptablePackets {
  973. s.logger.Infof("Dropping undecrytable packet (%d bytes). Undecryptable packet queue full.", len(p.data))
  974. return
  975. }
  976. s.logger.Infof("Queueing packet (%d bytes) for later decryption", len(p.data))
  977. s.undecryptablePackets = append(s.undecryptablePackets, p)
  978. }
  979. func (s *session) tryDecryptingQueuedPackets() {
  980. for _, p := range s.undecryptablePackets {
  981. s.handlePacket(p)
  982. }
  983. s.undecryptablePackets = s.undecryptablePackets[:0]
  984. }
  985. func (s *session) queueControlFrame(f wire.Frame) {
  986. s.framer.QueueControlFrame(f)
  987. s.scheduleSending()
  988. }
  989. func (s *session) onHasStreamWindowUpdate(id protocol.StreamID) {
  990. s.windowUpdateQueue.AddStream(id)
  991. s.scheduleSending()
  992. }
  993. func (s *session) onHasConnectionWindowUpdate() {
  994. s.windowUpdateQueue.AddConnection()
  995. s.scheduleSending()
  996. }
  997. func (s *session) onHasStreamData(id protocol.StreamID) {
  998. s.framer.AddActiveStream(id)
  999. s.scheduleSending()
  1000. }
  1001. func (s *session) onStreamCompleted(id protocol.StreamID) {
  1002. if err := s.streamsMap.DeleteStream(id); err != nil {
  1003. s.closeLocal(err)
  1004. }
  1005. }
  1006. func (s *session) LocalAddr() net.Addr {
  1007. return s.conn.LocalAddr()
  1008. }
  1009. func (s *session) RemoteAddr() net.Addr {
  1010. return s.conn.RemoteAddr()
  1011. }
  1012. func (s *session) GetVersion() protocol.VersionNumber {
  1013. return s.version
  1014. }