session.go 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131
  1. package quic
  2. import (
  3. "bytes"
  4. "context"
  5. "crypto/tls"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "net"
  10. "sync"
  11. "time"
  12. "github.com/lucas-clemente/quic-go/internal/ackhandler"
  13. "github.com/lucas-clemente/quic-go/internal/congestion"
  14. "github.com/lucas-clemente/quic-go/internal/flowcontrol"
  15. "github.com/lucas-clemente/quic-go/internal/handshake"
  16. "github.com/lucas-clemente/quic-go/internal/protocol"
  17. "github.com/lucas-clemente/quic-go/internal/qerr"
  18. "github.com/lucas-clemente/quic-go/internal/utils"
  19. "github.com/lucas-clemente/quic-go/internal/wire"
  20. )
  21. type unpacker interface {
  22. Unpack(headerBinary []byte, hdr *wire.ExtendedHeader, data []byte) (*unpackedPacket, error)
  23. }
  24. type streamGetter interface {
  25. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  26. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  27. }
  28. type streamManager interface {
  29. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  30. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  31. OpenStream() (Stream, error)
  32. OpenUniStream() (SendStream, error)
  33. OpenStreamSync() (Stream, error)
  34. OpenUniStreamSync() (SendStream, error)
  35. AcceptStream() (Stream, error)
  36. AcceptUniStream() (ReceiveStream, error)
  37. DeleteStream(protocol.StreamID) error
  38. UpdateLimits(*handshake.TransportParameters)
  39. HandleMaxStreamsFrame(*wire.MaxStreamsFrame) error
  40. CloseWithError(error)
  41. }
  42. type cryptoStreamHandler interface {
  43. RunHandshake() error
  44. io.Closer
  45. ConnectionState() handshake.ConnectionState
  46. }
  47. type receivedPacket struct {
  48. remoteAddr net.Addr
  49. hdr *wire.Header
  50. data []byte
  51. rcvTime time.Time
  52. }
  53. type closeError struct {
  54. err error
  55. remote bool
  56. sendClose bool
  57. }
  58. // A Session is a QUIC session
  59. type session struct {
  60. sessionRunner sessionRunner
  61. destConnID protocol.ConnectionID
  62. srcConnID protocol.ConnectionID
  63. perspective protocol.Perspective
  64. version protocol.VersionNumber
  65. config *Config
  66. conn connection
  67. streamsMap streamManager
  68. rttStats *congestion.RTTStats
  69. cryptoStreamManager *cryptoStreamManager
  70. sentPacketHandler ackhandler.SentPacketHandler
  71. receivedPacketHandler ackhandler.ReceivedPacketHandler
  72. framer framer
  73. windowUpdateQueue *windowUpdateQueue
  74. connFlowController flowcontrol.ConnectionFlowController
  75. unpacker unpacker
  76. packer packer
  77. cryptoStreamHandler cryptoStreamHandler
  78. receivedPackets chan *receivedPacket
  79. sendingScheduled chan struct{}
  80. closeOnce sync.Once
  81. closed utils.AtomicBool
  82. // closeChan is used to notify the run loop that it should terminate
  83. closeChan chan closeError
  84. connectionClosePacket *packedPacket
  85. packetsReceivedAfterClose int
  86. ctx context.Context
  87. ctxCancel context.CancelFunc
  88. undecryptablePackets []*receivedPacket
  89. clientHelloWritten <-chan struct{}
  90. handshakeCompleteChan chan struct{} // is closed when the handshake completes
  91. handshakeComplete bool
  92. receivedFirstPacket bool // since packet numbers start at 0, we can't use largestRcvdPacketNumber != 0 for this
  93. receivedFirstForwardSecurePacket bool
  94. largestRcvdPacketNumber protocol.PacketNumber // used to calculate the next packet number
  95. sessionCreationTime time.Time
  96. lastNetworkActivityTime time.Time
  97. // pacingDeadline is the time when the next packet should be sent
  98. pacingDeadline time.Time
  99. peerParams *handshake.TransportParameters
  100. timer *utils.Timer
  101. // keepAlivePingSent stores whether a Ping frame was sent to the peer or not
  102. // it is reset as soon as we receive a packet from the peer
  103. keepAlivePingSent bool
  104. logger utils.Logger
  105. }
  106. var _ Session = &session{}
  107. var _ streamSender = &session{}
  108. var newSession = func(
  109. conn connection,
  110. runner sessionRunner,
  111. clientDestConnID protocol.ConnectionID,
  112. destConnID protocol.ConnectionID,
  113. srcConnID protocol.ConnectionID,
  114. conf *Config,
  115. tlsConf *tls.Config,
  116. params *handshake.TransportParameters,
  117. logger utils.Logger,
  118. v protocol.VersionNumber,
  119. ) (quicSession, error) {
  120. s := &session{
  121. conn: conn,
  122. sessionRunner: runner,
  123. config: conf,
  124. srcConnID: srcConnID,
  125. destConnID: destConnID,
  126. perspective: protocol.PerspectiveServer,
  127. handshakeCompleteChan: make(chan struct{}),
  128. logger: logger,
  129. version: v,
  130. }
  131. s.preSetup()
  132. initialStream := newCryptoStream()
  133. handshakeStream := newCryptoStream()
  134. s.streamsMap = newStreamsMap(
  135. s,
  136. s.newFlowController,
  137. uint64(s.config.MaxIncomingStreams),
  138. uint64(s.config.MaxIncomingUniStreams),
  139. s.perspective,
  140. s.version,
  141. )
  142. s.framer = newFramer(s.streamsMap, s.version)
  143. cs, err := handshake.NewCryptoSetupServer(
  144. initialStream,
  145. handshakeStream,
  146. clientDestConnID,
  147. params,
  148. s.processTransportParameters,
  149. tlsConf,
  150. conf.Versions,
  151. v,
  152. logger,
  153. protocol.PerspectiveServer,
  154. )
  155. if err != nil {
  156. return nil, err
  157. }
  158. s.cryptoStreamHandler = cs
  159. s.framer = newFramer(s.streamsMap, s.version)
  160. s.packer = newPacketPacker(
  161. s.destConnID,
  162. s.srcConnID,
  163. initialStream,
  164. handshakeStream,
  165. s.sentPacketHandler,
  166. s.RemoteAddr(),
  167. nil, // no token
  168. cs,
  169. s.framer,
  170. s.receivedPacketHandler,
  171. s.perspective,
  172. s.version,
  173. )
  174. s.cryptoStreamManager = newCryptoStreamManager(cs, initialStream, handshakeStream)
  175. if err := s.postSetup(); err != nil {
  176. return nil, err
  177. }
  178. s.unpacker = newPacketUnpacker(cs, s.version)
  179. return s, nil
  180. }
  181. // declare this as a variable, such that we can it mock it in the tests
  182. var newClientSession = func(
  183. conn connection,
  184. runner sessionRunner,
  185. token []byte,
  186. origDestConnID protocol.ConnectionID,
  187. destConnID protocol.ConnectionID,
  188. srcConnID protocol.ConnectionID,
  189. conf *Config,
  190. tlsConf *tls.Config,
  191. params *handshake.TransportParameters,
  192. initialVersion protocol.VersionNumber,
  193. logger utils.Logger,
  194. v protocol.VersionNumber,
  195. ) (quicSession, error) {
  196. s := &session{
  197. conn: conn,
  198. sessionRunner: runner,
  199. config: conf,
  200. srcConnID: srcConnID,
  201. destConnID: destConnID,
  202. perspective: protocol.PerspectiveClient,
  203. handshakeCompleteChan: make(chan struct{}),
  204. logger: logger,
  205. version: v,
  206. }
  207. s.preSetup()
  208. initialStream := newCryptoStream()
  209. handshakeStream := newCryptoStream()
  210. cs, clientHelloWritten, err := handshake.NewCryptoSetupClient(
  211. initialStream,
  212. handshakeStream,
  213. origDestConnID,
  214. s.destConnID,
  215. params,
  216. s.processTransportParameters,
  217. tlsConf,
  218. initialVersion,
  219. conf.Versions,
  220. v,
  221. logger,
  222. protocol.PerspectiveClient,
  223. )
  224. if err != nil {
  225. return nil, err
  226. }
  227. s.clientHelloWritten = clientHelloWritten
  228. s.cryptoStreamHandler = cs
  229. s.cryptoStreamManager = newCryptoStreamManager(cs, initialStream, handshakeStream)
  230. s.unpacker = newPacketUnpacker(cs, s.version)
  231. s.streamsMap = newStreamsMap(
  232. s,
  233. s.newFlowController,
  234. uint64(s.config.MaxIncomingStreams),
  235. uint64(s.config.MaxIncomingUniStreams),
  236. s.perspective,
  237. s.version,
  238. )
  239. s.framer = newFramer(s.streamsMap, s.version)
  240. s.packer = newPacketPacker(
  241. s.destConnID,
  242. s.srcConnID,
  243. initialStream,
  244. handshakeStream,
  245. s.sentPacketHandler,
  246. s.RemoteAddr(),
  247. token,
  248. cs,
  249. s.framer,
  250. s.receivedPacketHandler,
  251. s.perspective,
  252. s.version,
  253. )
  254. return s, s.postSetup()
  255. }
  256. func (s *session) preSetup() {
  257. s.rttStats = &congestion.RTTStats{}
  258. s.sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats, s.logger)
  259. s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.rttStats, s.logger, s.version)
  260. s.connFlowController = flowcontrol.NewConnectionFlowController(
  261. protocol.InitialMaxData,
  262. protocol.ByteCount(s.config.MaxReceiveConnectionFlowControlWindow),
  263. s.onHasConnectionWindowUpdate,
  264. s.rttStats,
  265. s.logger,
  266. )
  267. }
  268. func (s *session) postSetup() error {
  269. s.receivedPackets = make(chan *receivedPacket, protocol.MaxSessionUnprocessedPackets)
  270. s.closeChan = make(chan closeError, 1)
  271. s.sendingScheduled = make(chan struct{}, 1)
  272. s.undecryptablePackets = make([]*receivedPacket, 0, protocol.MaxUndecryptablePackets)
  273. s.ctx, s.ctxCancel = context.WithCancel(context.Background())
  274. s.timer = utils.NewTimer()
  275. now := time.Now()
  276. s.lastNetworkActivityTime = now
  277. s.sessionCreationTime = now
  278. s.windowUpdateQueue = newWindowUpdateQueue(s.streamsMap, s.connFlowController, s.framer.QueueControlFrame)
  279. return nil
  280. }
  281. // run the session main loop
  282. func (s *session) run() error {
  283. defer s.ctxCancel()
  284. go func() {
  285. if err := s.cryptoStreamHandler.RunHandshake(); err != nil {
  286. s.closeLocal(err)
  287. return
  288. }
  289. close(s.handshakeCompleteChan)
  290. }()
  291. if s.perspective == protocol.PerspectiveClient {
  292. select {
  293. case <-s.clientHelloWritten:
  294. s.scheduleSending()
  295. case closeErr := <-s.closeChan:
  296. // put the close error back into the channel, so that the run loop can receive it
  297. s.closeChan <- closeErr
  298. }
  299. }
  300. var closeErr closeError
  301. runLoop:
  302. for {
  303. // Close immediately if requested
  304. select {
  305. case closeErr = <-s.closeChan:
  306. break runLoop
  307. case <-s.handshakeCompleteChan:
  308. s.handleHandshakeComplete()
  309. default:
  310. }
  311. s.maybeResetTimer()
  312. select {
  313. case closeErr = <-s.closeChan:
  314. break runLoop
  315. case <-s.timer.Chan():
  316. s.timer.SetRead()
  317. // We do all the interesting stuff after the switch statement, so
  318. // nothing to see here.
  319. case <-s.sendingScheduled:
  320. // We do all the interesting stuff after the switch statement, so
  321. // nothing to see here.
  322. case p := <-s.receivedPackets:
  323. err := s.handlePacketImpl(p)
  324. if err != nil {
  325. if qErr, ok := err.(*qerr.QuicError); ok && qErr.ErrorCode == qerr.DecryptionFailure {
  326. s.tryQueueingUndecryptablePacket(p)
  327. continue
  328. }
  329. s.closeLocal(err)
  330. continue
  331. }
  332. // This is a bit unclean, but works properly, since the packet always
  333. // begins with the public header and we never copy it.
  334. // TODO: putPacketBuffer(&p.extHdr.Raw)
  335. case <-s.handshakeCompleteChan:
  336. s.handleHandshakeComplete()
  337. }
  338. now := time.Now()
  339. if timeout := s.sentPacketHandler.GetAlarmTimeout(); !timeout.IsZero() && timeout.Before(now) {
  340. // This could cause packets to be retransmitted.
  341. // Check it before trying to send packets.
  342. if err := s.sentPacketHandler.OnAlarm(); err != nil {
  343. s.closeLocal(err)
  344. }
  345. }
  346. var pacingDeadline time.Time
  347. if s.pacingDeadline.IsZero() { // the timer didn't have a pacing deadline set
  348. pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  349. }
  350. if s.config.KeepAlive && !s.keepAlivePingSent && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.peerParams.IdleTimeout/2 {
  351. // send a PING frame since there is no activity in the session
  352. s.logger.Debugf("Sending a keep-alive ping to keep the connection alive.")
  353. s.framer.QueueControlFrame(&wire.PingFrame{})
  354. s.keepAlivePingSent = true
  355. } else if !pacingDeadline.IsZero() && now.Before(pacingDeadline) {
  356. // If we get to this point before the pacing deadline, we should wait until that deadline.
  357. // This can happen when scheduleSending is called, or a packet is received.
  358. // Set the timer and restart the run loop.
  359. s.pacingDeadline = pacingDeadline
  360. continue
  361. }
  362. if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
  363. s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time."))
  364. continue
  365. }
  366. if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.config.IdleTimeout {
  367. s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
  368. continue
  369. }
  370. if err := s.sendPackets(); err != nil {
  371. s.closeLocal(err)
  372. }
  373. }
  374. if err := s.handleCloseError(closeErr); err != nil {
  375. s.logger.Infof("Handling close error failed: %s", err)
  376. }
  377. s.closed.Set(true)
  378. s.logger.Infof("Connection %s closed.", s.srcConnID)
  379. s.cryptoStreamHandler.Close()
  380. return closeErr.err
  381. }
  382. func (s *session) Context() context.Context {
  383. return s.ctx
  384. }
  385. func (s *session) ConnectionState() ConnectionState {
  386. return s.cryptoStreamHandler.ConnectionState()
  387. }
  388. func (s *session) maybeResetTimer() {
  389. var deadline time.Time
  390. if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
  391. deadline = s.lastNetworkActivityTime.Add(s.peerParams.IdleTimeout / 2)
  392. } else {
  393. deadline = s.lastNetworkActivityTime.Add(s.config.IdleTimeout)
  394. }
  395. if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() {
  396. deadline = utils.MinTime(deadline, ackAlarm)
  397. }
  398. if lossTime := s.sentPacketHandler.GetAlarmTimeout(); !lossTime.IsZero() {
  399. deadline = utils.MinTime(deadline, lossTime)
  400. }
  401. if !s.handshakeComplete {
  402. handshakeDeadline := s.sessionCreationTime.Add(s.config.HandshakeTimeout)
  403. deadline = utils.MinTime(deadline, handshakeDeadline)
  404. }
  405. if !s.pacingDeadline.IsZero() {
  406. deadline = utils.MinTime(deadline, s.pacingDeadline)
  407. }
  408. s.timer.Reset(deadline)
  409. }
  410. func (s *session) handleHandshakeComplete() {
  411. s.handshakeComplete = true
  412. s.handshakeCompleteChan = nil // prevent this case from ever being selected again
  413. s.sessionRunner.onHandshakeComplete(s)
  414. // The client completes the handshake first (after sending the CFIN).
  415. // We need to make sure they learn about the peer completing the handshake,
  416. // in order to stop retransmitting handshake packets.
  417. // They will stop retransmitting handshake packets when receiving the first forward-secure packet.
  418. // We need to make sure that a retransmittable forward-secure packet is sent,
  419. // independent from the application protocol.
  420. if s.perspective == protocol.PerspectiveServer {
  421. s.queueControlFrame(&wire.PingFrame{})
  422. s.sentPacketHandler.SetHandshakeComplete()
  423. }
  424. }
  425. func (s *session) handlePacketImpl(p *receivedPacket) error {
  426. // The server can change the source connection ID with the first Handshake packet.
  427. // After this, all packets with a different source connection have to be ignored.
  428. if s.receivedFirstPacket && p.hdr.IsLongHeader && !p.hdr.SrcConnectionID.Equal(s.destConnID) {
  429. s.logger.Debugf("Dropping packet with unexpected source connection ID: %s (expected %s)", p.hdr.SrcConnectionID, s.destConnID)
  430. return nil
  431. }
  432. data := p.data
  433. r := bytes.NewReader(data)
  434. hdr, err := p.hdr.ParseExtended(r, s.version)
  435. if err != nil {
  436. return fmt.Errorf("error parsing extended header: %s", err)
  437. }
  438. hdr.Raw = data[:len(data)-r.Len()]
  439. data = data[len(data)-r.Len():]
  440. if hdr.IsLongHeader {
  441. if hdr.Length < protocol.ByteCount(hdr.PacketNumberLen) {
  442. return fmt.Errorf("packet length (%d bytes) shorter than packet number (%d bytes)", hdr.Length, hdr.PacketNumberLen)
  443. }
  444. if protocol.ByteCount(len(data))+protocol.ByteCount(hdr.PacketNumberLen) < hdr.Length {
  445. return fmt.Errorf("packet length (%d bytes) is smaller than the expected length (%d bytes)", len(data)+int(hdr.PacketNumberLen), hdr.Length)
  446. }
  447. data = data[:int(hdr.Length)-int(hdr.PacketNumberLen)]
  448. // TODO(#1312): implement parsing of compound packets
  449. }
  450. // Calculate packet number
  451. hdr.PacketNumber = protocol.InferPacketNumber(
  452. hdr.PacketNumberLen,
  453. s.largestRcvdPacketNumber,
  454. hdr.PacketNumber,
  455. )
  456. packet, err := s.unpacker.Unpack(hdr.Raw, hdr, data)
  457. if s.logger.Debug() {
  458. if err != nil {
  459. s.logger.Debugf("<- Reading packet 0x%x (%d bytes) for connection %s", hdr.PacketNumber, len(p.data)+len(hdr.Raw), hdr.DestConnectionID)
  460. } else {
  461. s.logger.Debugf("<- Reading packet 0x%x (%d bytes) for connection %s, %s", hdr.PacketNumber, len(p.data)+len(hdr.Raw), hdr.DestConnectionID, packet.encryptionLevel)
  462. }
  463. hdr.Log(s.logger)
  464. }
  465. // if the decryption failed, this might be a packet sent by an attacker
  466. if err != nil {
  467. return err
  468. }
  469. // The server can change the source connection ID with the first Handshake packet.
  470. if s.perspective == protocol.PerspectiveClient && !s.receivedFirstPacket && hdr.IsLongHeader && !hdr.SrcConnectionID.Equal(s.destConnID) {
  471. s.logger.Debugf("Received first packet. Switching destination connection ID to: %s", hdr.SrcConnectionID)
  472. s.destConnID = hdr.SrcConnectionID
  473. s.packer.ChangeDestConnectionID(s.destConnID)
  474. }
  475. s.receivedFirstPacket = true
  476. s.lastNetworkActivityTime = p.rcvTime
  477. s.keepAlivePingSent = false
  478. // The client completes the handshake first (after sending the CFIN).
  479. // We know that the server completed the handshake as soon as we receive a forward-secure packet.
  480. if s.perspective == protocol.PerspectiveClient {
  481. if !s.receivedFirstForwardSecurePacket && packet.encryptionLevel == protocol.Encryption1RTT {
  482. s.receivedFirstForwardSecurePacket = true
  483. s.sentPacketHandler.SetHandshakeComplete()
  484. }
  485. }
  486. // Only do this after decrypting, so we are sure the packet is not attacker-controlled
  487. s.largestRcvdPacketNumber = utils.MaxPacketNumber(s.largestRcvdPacketNumber, hdr.PacketNumber)
  488. // If this is a Retry packet, there's no need to send an ACK.
  489. // The session will be closed and recreated as soon as the crypto setup processed the HRR.
  490. if hdr.Type != protocol.PacketTypeRetry {
  491. isRetransmittable := ackhandler.HasRetransmittableFrames(packet.frames)
  492. if err := s.receivedPacketHandler.ReceivedPacket(hdr.PacketNumber, p.rcvTime, isRetransmittable); err != nil {
  493. return err
  494. }
  495. }
  496. return s.handleFrames(packet.frames, hdr.PacketNumber, packet.encryptionLevel)
  497. }
  498. func (s *session) handleFrames(fs []wire.Frame, pn protocol.PacketNumber, encLevel protocol.EncryptionLevel) error {
  499. for _, ff := range fs {
  500. var err error
  501. wire.LogFrame(s.logger, ff, false)
  502. switch frame := ff.(type) {
  503. case *wire.CryptoFrame:
  504. err = s.handleCryptoFrame(frame, encLevel)
  505. case *wire.StreamFrame:
  506. err = s.handleStreamFrame(frame, encLevel)
  507. case *wire.AckFrame:
  508. err = s.handleAckFrame(frame, pn, encLevel)
  509. case *wire.ConnectionCloseFrame:
  510. s.closeRemote(qerr.Error(frame.ErrorCode, frame.ReasonPhrase))
  511. case *wire.ResetStreamFrame:
  512. err = s.handleResetStreamFrame(frame)
  513. case *wire.MaxDataFrame:
  514. s.handleMaxDataFrame(frame)
  515. case *wire.MaxStreamDataFrame:
  516. err = s.handleMaxStreamDataFrame(frame)
  517. case *wire.MaxStreamsFrame:
  518. err = s.handleMaxStreamsFrame(frame)
  519. case *wire.DataBlockedFrame:
  520. case *wire.StreamDataBlockedFrame:
  521. case *wire.StreamsBlockedFrame:
  522. case *wire.StopSendingFrame:
  523. err = s.handleStopSendingFrame(frame)
  524. case *wire.PingFrame:
  525. case *wire.PathChallengeFrame:
  526. s.handlePathChallengeFrame(frame)
  527. case *wire.PathResponseFrame:
  528. // since we don't send PATH_CHALLENGEs, we don't expect PATH_RESPONSEs
  529. err = errors.New("unexpected PATH_RESPONSE frame")
  530. case *wire.NewTokenFrame:
  531. case *wire.NewConnectionIDFrame:
  532. case *wire.RetireConnectionIDFrame:
  533. // since we don't send new connection IDs, we don't expect retirements
  534. err = errors.New("unexpected RETIRE_CONNECTION_ID frame")
  535. default:
  536. return errors.New("Session BUG: unexpected frame type")
  537. }
  538. if err != nil {
  539. return err
  540. }
  541. }
  542. return nil
  543. }
  544. // handlePacket is called by the server with a new packet
  545. func (s *session) handlePacket(p *receivedPacket) {
  546. if s.closed.Get() {
  547. s.handlePacketAfterClosed(p)
  548. }
  549. // Discard packets once the amount of queued packets is larger than
  550. // the channel size, protocol.MaxSessionUnprocessedPackets
  551. select {
  552. case s.receivedPackets <- p:
  553. default:
  554. }
  555. }
  556. func (s *session) handlePacketAfterClosed(p *receivedPacket) {
  557. s.packetsReceivedAfterClose++
  558. if s.connectionClosePacket == nil {
  559. return
  560. }
  561. // exponential backoff
  562. // only send a CONNECTION_CLOSE for the 1st, 2nd, 4th, 8th, 16th, ... packet arriving
  563. for n := s.packetsReceivedAfterClose; n > 1; n = n / 2 {
  564. if n%2 != 0 {
  565. return
  566. }
  567. }
  568. s.logger.Debugf("Received %d packets after sending CONNECTION_CLOSE. Retransmitting.", s.packetsReceivedAfterClose)
  569. if err := s.conn.Write(s.connectionClosePacket.raw); err != nil {
  570. s.logger.Debugf("Error retransmitting CONNECTION_CLOSE: %s", err)
  571. }
  572. }
  573. func (s *session) handleCryptoFrame(frame *wire.CryptoFrame, encLevel protocol.EncryptionLevel) error {
  574. encLevelChanged, err := s.cryptoStreamManager.HandleCryptoFrame(frame, encLevel)
  575. if err != nil {
  576. return err
  577. }
  578. if encLevelChanged {
  579. s.tryDecryptingQueuedPackets()
  580. }
  581. return nil
  582. }
  583. func (s *session) handleStreamFrame(frame *wire.StreamFrame, encLevel protocol.EncryptionLevel) error {
  584. if encLevel < protocol.Encryption1RTT {
  585. return qerr.Error(qerr.UnencryptedStreamData, fmt.Sprintf("received unencrypted stream data on stream %d", frame.StreamID))
  586. }
  587. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  588. if err != nil {
  589. return err
  590. }
  591. if str == nil {
  592. // Stream is closed and already garbage collected
  593. // ignore this StreamFrame
  594. return nil
  595. }
  596. return str.handleStreamFrame(frame)
  597. }
  598. func (s *session) handleMaxDataFrame(frame *wire.MaxDataFrame) {
  599. s.connFlowController.UpdateSendWindow(frame.ByteOffset)
  600. }
  601. func (s *session) handleMaxStreamDataFrame(frame *wire.MaxStreamDataFrame) error {
  602. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  603. if err != nil {
  604. return err
  605. }
  606. if str == nil {
  607. // stream is closed and already garbage collected
  608. return nil
  609. }
  610. str.handleMaxStreamDataFrame(frame)
  611. return nil
  612. }
  613. func (s *session) handleMaxStreamsFrame(frame *wire.MaxStreamsFrame) error {
  614. return s.streamsMap.HandleMaxStreamsFrame(frame)
  615. }
  616. func (s *session) handleResetStreamFrame(frame *wire.ResetStreamFrame) error {
  617. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  618. if err != nil {
  619. return err
  620. }
  621. if str == nil {
  622. // stream is closed and already garbage collected
  623. return nil
  624. }
  625. return str.handleResetStreamFrame(frame)
  626. }
  627. func (s *session) handleStopSendingFrame(frame *wire.StopSendingFrame) error {
  628. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  629. if err != nil {
  630. return err
  631. }
  632. if str == nil {
  633. // stream is closed and already garbage collected
  634. return nil
  635. }
  636. str.handleStopSendingFrame(frame)
  637. return nil
  638. }
  639. func (s *session) handlePathChallengeFrame(frame *wire.PathChallengeFrame) {
  640. s.queueControlFrame(&wire.PathResponseFrame{Data: frame.Data})
  641. }
  642. func (s *session) handleAckFrame(frame *wire.AckFrame, pn protocol.PacketNumber, encLevel protocol.EncryptionLevel) error {
  643. if err := s.sentPacketHandler.ReceivedAck(frame, pn, encLevel, s.lastNetworkActivityTime); err != nil {
  644. return err
  645. }
  646. s.receivedPacketHandler.IgnoreBelow(s.sentPacketHandler.GetLowestPacketNotConfirmedAcked())
  647. return nil
  648. }
  649. // closeLocal closes the session and send a CONNECTION_CLOSE containing the error
  650. func (s *session) closeLocal(e error) {
  651. s.closeOnce.Do(func() {
  652. s.sessionRunner.retireConnectionID(s.srcConnID)
  653. s.closeChan <- closeError{err: e, sendClose: true, remote: false}
  654. })
  655. }
  656. // destroy closes the session without sending the error on the wire
  657. func (s *session) destroy(e error) {
  658. s.closeOnce.Do(func() {
  659. s.sessionRunner.removeConnectionID(s.srcConnID)
  660. s.closeChan <- closeError{err: e, sendClose: false, remote: false}
  661. })
  662. }
  663. func (s *session) closeRemote(e error) {
  664. s.closeOnce.Do(func() {
  665. s.sessionRunner.removeConnectionID(s.srcConnID)
  666. s.closeChan <- closeError{err: e, remote: true}
  667. })
  668. }
  669. // Close the connection. It sends a qerr.PeerGoingAway.
  670. // It waits until the run loop has stopped before returning
  671. func (s *session) Close() error {
  672. s.closeLocal(nil)
  673. <-s.ctx.Done()
  674. return nil
  675. }
  676. func (s *session) CloseWithError(code protocol.ApplicationErrorCode, e error) error {
  677. s.closeLocal(qerr.Error(qerr.ErrorCode(code), e.Error()))
  678. <-s.ctx.Done()
  679. return nil
  680. }
  681. func (s *session) handleCloseError(closeErr closeError) error {
  682. if closeErr.err == nil {
  683. closeErr.err = qerr.PeerGoingAway
  684. }
  685. var quicErr *qerr.QuicError
  686. var ok bool
  687. if quicErr, ok = closeErr.err.(*qerr.QuicError); !ok {
  688. quicErr = qerr.ToQuicError(closeErr.err)
  689. }
  690. // Don't log 'normal' reasons
  691. if quicErr.ErrorCode == qerr.PeerGoingAway || quicErr.ErrorCode == qerr.NetworkIdleTimeout {
  692. s.logger.Infof("Closing connection %s.", s.srcConnID)
  693. } else {
  694. s.logger.Errorf("Closing session with error: %s", closeErr.err.Error())
  695. }
  696. s.streamsMap.CloseWithError(quicErr)
  697. if !closeErr.sendClose {
  698. return nil
  699. }
  700. // If this is a remote close we're done here
  701. if closeErr.remote {
  702. return nil
  703. }
  704. if quicErr.ErrorCode == qerr.DecryptionFailure {
  705. // TODO(#943): send a stateless reset
  706. return nil
  707. }
  708. return s.sendConnectionClose(quicErr)
  709. }
  710. func (s *session) processTransportParameters(params *handshake.TransportParameters) {
  711. s.peerParams = params
  712. s.streamsMap.UpdateLimits(params)
  713. s.packer.HandleTransportParameters(params)
  714. s.connFlowController.UpdateSendWindow(params.InitialMaxData)
  715. // the crypto stream is the only open stream at this moment
  716. // so we don't need to update stream flow control windows
  717. }
  718. func (s *session) sendPackets() error {
  719. s.pacingDeadline = time.Time{}
  720. sendMode := s.sentPacketHandler.SendMode()
  721. if sendMode == ackhandler.SendNone { // shortcut: return immediately if there's nothing to send
  722. return nil
  723. }
  724. numPackets := s.sentPacketHandler.ShouldSendNumPackets()
  725. var numPacketsSent int
  726. sendLoop:
  727. for {
  728. switch sendMode {
  729. case ackhandler.SendNone:
  730. break sendLoop
  731. case ackhandler.SendAck:
  732. // If we already sent packets, and the send mode switches to SendAck,
  733. // we've just become congestion limited.
  734. // There's no need to try to send an ACK at this moment.
  735. if numPacketsSent > 0 {
  736. return nil
  737. }
  738. // We can at most send a single ACK only packet.
  739. // There will only be a new ACK after receiving new packets.
  740. // SendAck is only returned when we're congestion limited, so we don't need to set the pacingt timer.
  741. return s.maybeSendAckOnlyPacket()
  742. case ackhandler.SendTLP, ackhandler.SendRTO:
  743. if err := s.sendProbePacket(); err != nil {
  744. return err
  745. }
  746. numPacketsSent++
  747. case ackhandler.SendRetransmission:
  748. sentPacket, err := s.maybeSendRetransmission()
  749. if err != nil {
  750. return err
  751. }
  752. if sentPacket {
  753. numPacketsSent++
  754. // This can happen if a retransmission queued, but it wasn't necessary to send it.
  755. // e.g. when an Initial is queued, but we already received a packet from the server.
  756. }
  757. case ackhandler.SendAny:
  758. sentPacket, err := s.sendPacket()
  759. if err != nil {
  760. return err
  761. }
  762. if !sentPacket {
  763. break sendLoop
  764. }
  765. numPacketsSent++
  766. default:
  767. return fmt.Errorf("BUG: invalid send mode %d", sendMode)
  768. }
  769. if numPacketsSent >= numPackets {
  770. break
  771. }
  772. sendMode = s.sentPacketHandler.SendMode()
  773. }
  774. // Only start the pacing timer if we sent as many packets as we were allowed.
  775. // There will probably be more to send when calling sendPacket again.
  776. if numPacketsSent == numPackets {
  777. s.pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  778. }
  779. return nil
  780. }
  781. func (s *session) maybeSendAckOnlyPacket() error {
  782. packet, err := s.packer.MaybePackAckPacket()
  783. if err != nil {
  784. return err
  785. }
  786. if packet == nil {
  787. return nil
  788. }
  789. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  790. return s.sendPackedPacket(packet)
  791. }
  792. // maybeSendRetransmission sends retransmissions for at most one packet.
  793. // It takes care that Initials aren't retransmitted, if a packet from the server was already received.
  794. func (s *session) maybeSendRetransmission() (bool, error) {
  795. var retransmitPacket *ackhandler.Packet
  796. for {
  797. retransmitPacket = s.sentPacketHandler.DequeuePacketForRetransmission()
  798. if retransmitPacket == nil {
  799. return false, nil
  800. }
  801. // Don't retransmit Initial packets if we already received a response.
  802. // An Initial might have been retransmitted multiple times before we receive a response.
  803. // As soon as we receive one response, we don't need to send any more Initials.
  804. if s.perspective == protocol.PerspectiveClient && s.receivedFirstPacket && retransmitPacket.PacketType == protocol.PacketTypeInitial {
  805. s.logger.Debugf("Skipping retransmission of packet %d. Already received a response to an Initial.", retransmitPacket.PacketNumber)
  806. continue
  807. }
  808. break
  809. }
  810. s.logger.Debugf("Dequeueing retransmission for packet 0x%x", retransmitPacket.PacketNumber)
  811. packets, err := s.packer.PackRetransmission(retransmitPacket)
  812. if err != nil {
  813. return false, err
  814. }
  815. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  816. for i, packet := range packets {
  817. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  818. }
  819. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, retransmitPacket.PacketNumber)
  820. for _, packet := range packets {
  821. if err := s.sendPackedPacket(packet); err != nil {
  822. return false, err
  823. }
  824. }
  825. return true, nil
  826. }
  827. func (s *session) sendProbePacket() error {
  828. p, err := s.sentPacketHandler.DequeueProbePacket()
  829. if err != nil {
  830. return err
  831. }
  832. s.logger.Debugf("Sending a retransmission for %#x as a probe packet.", p.PacketNumber)
  833. packets, err := s.packer.PackRetransmission(p)
  834. if err != nil {
  835. return err
  836. }
  837. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  838. for i, packet := range packets {
  839. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  840. }
  841. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, p.PacketNumber)
  842. for _, packet := range packets {
  843. if err := s.sendPackedPacket(packet); err != nil {
  844. return err
  845. }
  846. }
  847. return nil
  848. }
  849. func (s *session) sendPacket() (bool, error) {
  850. if isBlocked, offset := s.connFlowController.IsNewlyBlocked(); isBlocked {
  851. s.framer.QueueControlFrame(&wire.DataBlockedFrame{DataLimit: offset})
  852. }
  853. s.windowUpdateQueue.QueueAll()
  854. packet, err := s.packer.PackPacket()
  855. if err != nil || packet == nil {
  856. return false, err
  857. }
  858. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  859. if err := s.sendPackedPacket(packet); err != nil {
  860. return false, err
  861. }
  862. return true, nil
  863. }
  864. func (s *session) sendPackedPacket(packet *packedPacket) error {
  865. defer putPacketBuffer(&packet.raw)
  866. s.logPacket(packet)
  867. return s.conn.Write(packet.raw)
  868. }
  869. func (s *session) sendConnectionClose(quicErr *qerr.QuicError) error {
  870. packet, err := s.packer.PackConnectionClose(&wire.ConnectionCloseFrame{
  871. ErrorCode: quicErr.ErrorCode,
  872. ReasonPhrase: quicErr.ErrorMessage,
  873. })
  874. if err != nil {
  875. return err
  876. }
  877. s.connectionClosePacket = packet
  878. s.logPacket(packet)
  879. return s.conn.Write(packet.raw)
  880. }
  881. func (s *session) logPacket(packet *packedPacket) {
  882. if !s.logger.Debug() {
  883. // We don't need to allocate the slices for calling the format functions
  884. return
  885. }
  886. s.logger.Debugf("-> Sending packet 0x%x (%d bytes) for connection %s, %s", packet.header.PacketNumber, len(packet.raw), s.srcConnID, packet.encryptionLevel)
  887. packet.header.Log(s.logger)
  888. for _, frame := range packet.frames {
  889. wire.LogFrame(s.logger, frame, true)
  890. }
  891. }
  892. // GetOrOpenStream either returns an existing stream, a newly opened stream, or nil if a stream with the provided ID is already closed.
  893. // It is *only* needed for gQUIC's H2.
  894. // It will be removed as soon as gQUIC moves towards the IETF H2/QUIC stream mapping.
  895. func (s *session) GetOrOpenStream(id protocol.StreamID) (Stream, error) {
  896. str, err := s.streamsMap.GetOrOpenSendStream(id)
  897. if str != nil {
  898. if bstr, ok := str.(Stream); ok {
  899. return bstr, err
  900. }
  901. return nil, fmt.Errorf("Stream %d is not a bidirectional stream", id)
  902. }
  903. // make sure to return an actual nil value here, not an Stream with value nil
  904. return nil, err
  905. }
  906. // AcceptStream returns the next stream openend by the peer
  907. func (s *session) AcceptStream() (Stream, error) {
  908. return s.streamsMap.AcceptStream()
  909. }
  910. func (s *session) AcceptUniStream() (ReceiveStream, error) {
  911. return s.streamsMap.AcceptUniStream()
  912. }
  913. // OpenStream opens a stream
  914. func (s *session) OpenStream() (Stream, error) {
  915. return s.streamsMap.OpenStream()
  916. }
  917. func (s *session) OpenStreamSync() (Stream, error) {
  918. return s.streamsMap.OpenStreamSync()
  919. }
  920. func (s *session) OpenUniStream() (SendStream, error) {
  921. return s.streamsMap.OpenUniStream()
  922. }
  923. func (s *session) OpenUniStreamSync() (SendStream, error) {
  924. return s.streamsMap.OpenUniStreamSync()
  925. }
  926. func (s *session) newStream(id protocol.StreamID) streamI {
  927. flowController := s.newFlowController(id)
  928. return newStream(id, s, flowController, s.version)
  929. }
  930. func (s *session) newFlowController(id protocol.StreamID) flowcontrol.StreamFlowController {
  931. var initialSendWindow protocol.ByteCount
  932. if s.peerParams != nil {
  933. if id.Type() == protocol.StreamTypeUni {
  934. initialSendWindow = s.peerParams.InitialMaxStreamDataUni
  935. } else {
  936. if id.InitiatedBy() == s.perspective {
  937. initialSendWindow = s.peerParams.InitialMaxStreamDataBidiLocal
  938. } else {
  939. initialSendWindow = s.peerParams.InitialMaxStreamDataBidiRemote
  940. }
  941. }
  942. }
  943. return flowcontrol.NewStreamFlowController(
  944. id,
  945. s.connFlowController,
  946. protocol.InitialMaxStreamData,
  947. protocol.ByteCount(s.config.MaxReceiveStreamFlowControlWindow),
  948. initialSendWindow,
  949. s.onHasStreamWindowUpdate,
  950. s.rttStats,
  951. s.logger,
  952. )
  953. }
  954. // scheduleSending signals that we have data for sending
  955. func (s *session) scheduleSending() {
  956. select {
  957. case s.sendingScheduled <- struct{}{}:
  958. default:
  959. }
  960. }
  961. func (s *session) tryQueueingUndecryptablePacket(p *receivedPacket) {
  962. if s.handshakeComplete {
  963. s.logger.Debugf("Received undecryptable packet from %s after the handshake (%d bytes)", p.remoteAddr.String(), len(p.data))
  964. return
  965. }
  966. if len(s.undecryptablePackets)+1 > protocol.MaxUndecryptablePackets {
  967. s.logger.Infof("Dropping undecrytable packet (%d bytes). Undecryptable packet queue full.", len(p.data))
  968. return
  969. }
  970. s.logger.Infof("Queueing packet (%d bytes) for later decryption", len(p.data))
  971. s.undecryptablePackets = append(s.undecryptablePackets, p)
  972. }
  973. func (s *session) tryDecryptingQueuedPackets() {
  974. for _, p := range s.undecryptablePackets {
  975. s.handlePacket(p)
  976. }
  977. s.undecryptablePackets = s.undecryptablePackets[:0]
  978. }
  979. func (s *session) queueControlFrame(f wire.Frame) {
  980. s.framer.QueueControlFrame(f)
  981. s.scheduleSending()
  982. }
  983. func (s *session) onHasStreamWindowUpdate(id protocol.StreamID) {
  984. s.windowUpdateQueue.AddStream(id)
  985. s.scheduleSending()
  986. }
  987. func (s *session) onHasConnectionWindowUpdate() {
  988. s.windowUpdateQueue.AddConnection()
  989. s.scheduleSending()
  990. }
  991. func (s *session) onHasStreamData(id protocol.StreamID) {
  992. s.framer.AddActiveStream(id)
  993. s.scheduleSending()
  994. }
  995. func (s *session) onStreamCompleted(id protocol.StreamID) {
  996. if err := s.streamsMap.DeleteStream(id); err != nil {
  997. s.closeLocal(err)
  998. }
  999. }
  1000. func (s *session) LocalAddr() net.Addr {
  1001. return s.conn.LocalAddr()
  1002. }
  1003. func (s *session) RemoteAddr() net.Addr {
  1004. return s.conn.RemoteAddr()
  1005. }
  1006. func (s *session) GetVersion() protocol.VersionNumber {
  1007. return s.version
  1008. }