github.com/Psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/common/refraction/refraction.go (about) 1 //go:build PSIPHON_ENABLE_REFRACTION_NETWORKING 2 // +build PSIPHON_ENABLE_REFRACTION_NETWORKING 3 4 /* 5 * Copyright (c) 2018, Psiphon Inc. 6 * All rights reserved. 7 * 8 * This program is free software: you can redistribute it and/or modify 9 * it under the terms of the GNU General Public License as published by 10 * the Free Software Foundation, either version 3 of the License, or 11 * (at your option) any later version. 12 * 13 * This program is distributed in the hope that it will be useful, 14 * but WITHOUT ANY WARRANTY; without even the implied warranty of 15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16 * GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with this program. If not, see <http://www.gnu.org/licenses/>. 20 * 21 */ 22 23 /* 24 25 Package refraction wraps github.com/refraction-networking/gotapdance with 26 net.Listener and net.Conn types that provide drop-in integration with Psiphon. 27 28 */ 29 package refraction 30 31 import ( 32 "context" 33 "crypto/sha256" 34 "fmt" 35 "io/ioutil" 36 "net" 37 "os" 38 "path/filepath" 39 "sync" 40 "sync/atomic" 41 "time" 42 43 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common" 44 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors" 45 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol" 46 "github.com/armon/go-proxyproto" 47 lrucache "github.com/cognusion/go-cache-lru" 48 refraction_networking_proto "github.com/refraction-networking/gotapdance/protobuf" 49 refraction_networking_client "github.com/refraction-networking/gotapdance/tapdance" 50 ) 51 52 const ( 53 READ_PROXY_PROTOCOL_HEADER_TIMEOUT = 5 * time.Second 54 REGISTRATION_CACHE_MAX_ENTRIES = 256 55 ) 56 57 // Enabled indicates if Refraction Networking functionality is enabled. 58 func Enabled() bool { 59 return true 60 } 61 62 // Listener is a net.Listener. 63 type Listener struct { 64 net.Listener 65 } 66 67 // Listen creates a new Refraction Networking listener. 68 // 69 // The Refraction Networking station (TapDance or Conjure) will send the 70 // original client address via the HAProxy proxy protocol v1, 71 // https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt. The original 72 // client address is read and returned by accepted conns' RemoteAddr. 73 // RemoteAddr _must_ be called non-concurrently before calling Read on 74 // accepted conns as the HAProxy proxy protocol header reading logic sets 75 // SetReadDeadline and performs a Read. 76 // 77 // Psiphon server hosts should be configured to accept tunnel connections only 78 // from Refraction Networking stations. 79 func Listen(address string) (net.Listener, error) { 80 81 tcpListener, err := net.Listen("tcp", address) 82 if err != nil { 83 return nil, errors.Trace(err) 84 } 85 86 // Setting a timeout ensures that reading the proxy protocol 87 // header completes or times out and RemoteAddr will not block. See: 88 // https://godoc.org/github.com/armon/go-proxyproto#Conn.RemoteAddr 89 90 proxyListener := &proxyproto.Listener{ 91 Listener: tcpListener, 92 ProxyHeaderTimeout: READ_PROXY_PROTOCOL_HEADER_TIMEOUT} 93 94 stationListener := &stationListener{ 95 proxyListener: proxyListener, 96 } 97 98 return &Listener{Listener: stationListener}, nil 99 } 100 101 // stationListener uses the proxyproto.Listener SourceCheck callback to 102 // capture and record the direct remote address, the station address, and 103 // wraps accepted conns to provide station address metrics via GetMetrics. 104 // These metrics enable identifying which station fronted a connection, which 105 // is useful for network operations and troubleshooting. 106 // 107 // go-proxyproto.Conn.RemoteAddr reports the originating client IP address, 108 // which is geolocated and recorded for metrics. The underlying conn's remote 109 // address, the station address, is not accessible via the go-proxyproto API. 110 // 111 // stationListener is not safe for concurrent access. 112 type stationListener struct { 113 proxyListener *proxyproto.Listener 114 } 115 116 func (l *stationListener) Accept() (net.Conn, error) { 117 var stationRemoteAddr net.Addr 118 l.proxyListener.SourceCheck = func(addr net.Addr) (bool, error) { 119 stationRemoteAddr = addr 120 return true, nil 121 } 122 conn, err := l.proxyListener.Accept() 123 if err != nil { 124 return nil, err 125 } 126 if stationRemoteAddr == nil { 127 return nil, errors.TraceNew("missing station address") 128 } 129 return &stationConn{ 130 Conn: conn, 131 stationIPAddress: common.IPAddressFromAddr(stationRemoteAddr), 132 }, nil 133 } 134 135 func (l *stationListener) Close() error { 136 return l.proxyListener.Close() 137 } 138 139 func (l *stationListener) Addr() net.Addr { 140 return l.proxyListener.Addr() 141 } 142 143 type stationConn struct { 144 net.Conn 145 stationIPAddress string 146 } 147 148 // IrregularTunnelError implements the common.IrregularIndicator interface. 149 func (c *stationConn) IrregularTunnelError() error { 150 151 // We expect a PROXY protocol header, but go-proxyproto does not produce an 152 // error if the "PROXY " prefix is absent; instead the connection will 153 // proceed. To detect this case, check if the go-proxyproto RemoteAddr IP 154 // address matches the underlying connection IP address. When these values 155 // match, there was no PROXY protocol header. 156 // 157 // Limitation: the values will match if there is a PROXY protocol header 158 // containing the same IP address as the underlying connection. This is not 159 // an expected case. 160 161 if common.IPAddressFromAddr(c.RemoteAddr()) == c.stationIPAddress { 162 return errors.TraceNew("unexpected station IP address") 163 } 164 return nil 165 } 166 167 // GetMetrics implements the common.MetricsSource interface. 168 func (c *stationConn) GetMetrics() common.LogFields { 169 170 logFields := make(common.LogFields) 171 172 // Ensure we don't log a potential non-station IP address. 173 if c.IrregularTunnelError() == nil { 174 logFields["station_ip_address"] = c.stationIPAddress 175 } 176 177 return logFields 178 } 179 180 // DialTapDance establishes a new TapDance connection to a TapDance station 181 // specified in the config assets and forwarding through to the Psiphon server 182 // specified by address. 183 // 184 // The TapDance station config assets (which are also the Conjure station 185 // assets) are read from dataDirectory/"refraction-networking". When no config 186 // is found, default assets are paved. 187 // 188 // dialer specifies the custom dialer for underlying TCP dials. 189 // 190 // The input ctx is expected to have a timeout for the dial. 191 // 192 // Limitation: the parameters emitLogs and dataDirectory are used for one-time 193 // initialization and are ignored after the first DialTapDance/Conjure call. 194 func DialTapDance( 195 ctx context.Context, 196 emitLogs bool, 197 dataDirectory string, 198 dialer common.NetDialer, 199 address string) (net.Conn, error) { 200 201 return dial( 202 ctx, 203 emitLogs, 204 dataDirectory, 205 dialer, 206 address, 207 nil) 208 } 209 210 // DialConjure establishes a new Conjure connection to a Conjure station. 211 // 212 // dialer specifies the custom dialer to use for phantom dials. Additional 213 // Conjure-specific parameters are specified in conjureConfig. 214 // 215 // See DialTapdance comment. 216 func DialConjure( 217 ctx context.Context, 218 emitLogs bool, 219 dataDirectory string, 220 dialer common.NetDialer, 221 address string, 222 conjureConfig *ConjureConfig) (net.Conn, error) { 223 224 return dial( 225 ctx, 226 emitLogs, 227 dataDirectory, 228 dialer, 229 address, 230 conjureConfig) 231 } 232 233 func dial( 234 ctx context.Context, 235 emitLogs bool, 236 dataDirectory string, 237 dialer common.NetDialer, 238 address string, 239 conjureConfig *ConjureConfig) (net.Conn, error) { 240 241 err := initRefractionNetworking(emitLogs, dataDirectory) 242 if err != nil { 243 return nil, errors.Trace(err) 244 } 245 246 if _, ok := ctx.Deadline(); !ok { 247 return nil, errors.TraceNew("dial context has no timeout") 248 } 249 250 useConjure := conjureConfig != nil 251 252 manager := newDialManager() 253 254 refractionDialer := &refraction_networking_client.Dialer{ 255 TcpDialer: manager.makeManagedDialer(dialer.DialContext), 256 UseProxyHeader: true, 257 } 258 259 conjureCached := false 260 conjureDelay := time.Duration(0) 261 262 var conjureCachedRegistration *refraction_networking_client.ConjureReg 263 var conjureRecordRegistrar *recordRegistrar 264 265 if useConjure { 266 267 // Our strategy is to try one registration per dial attempt: a cached 268 // registration, if it exists, or API or decoy registration, as configured. 269 // This assumes Psiphon establishment will try/retry many candidates as 270 // required, and that the desired mix of API/decoy registrations will be 271 // configured and generated. In good network conditions, internal gotapdance 272 // retries (via APIRegistrar.MaxRetries or APIRegistrar.SecondaryRegistrar) 273 // are unlikely to start before the Conjure dial is canceled. 274 275 // Caching registrations reduces average Conjure dial time by often 276 // eliminating the registration phase. This is especially impactful for 277 // short duration tunnels, such as on mobile. Caching also reduces domain 278 // fronted traffic and load on the API registrar and decoys. 279 // 280 // We implement a simple in-memory registration cache with the following 281 // behavior: 282 // 283 // - If a new registration succeeds, but the overall Conjure dial is 284 // _canceled_, the registration is optimistically cached. 285 // - If the Conjure phantom dial fails, any associated cached registration 286 // is discarded. 287 // - A cached registration's TTL is extended upon phantom dial success. 288 // - If the configured TTL changes, the cache is cleared. 289 // 290 // Limitations: 291 // - The cache is not persistent. 292 // - There is no TTL extension during a long connection. 293 // - Caching a successful registration when the phantom dial is canceled may 294 // skip the necessary "delay" step (however, an immediate re-establishment 295 // to the same candidate is unlikely in this case). 296 // 297 // TODO: 298 // - Revisit when gotapdance adds its own caching. 299 // - Consider "pre-registering" Conjure when already connected with a 300 // different protocol, so a Conjure registration is available on the next 301 // establishment; in this scenario, a tunneled API registration would not 302 // require domain fronting. 303 304 refractionDialer.DarkDecoy = true 305 306 // The pop operation removes the registration from the cache. This 307 // eliminates the possibility of concurrent candidates (with the same cache 308 // key) using and modifying the same registration, a potential race 309 // condition. The popped cached registration must be reinserted in the cache 310 // after canceling or success, but not on phantom dial failure. 311 312 conjureCachedRegistration = conjureRegistrationCache.pop(conjureConfig) 313 314 if conjureCachedRegistration != nil { 315 316 refractionDialer.DarkDecoyRegistrar = &cachedRegistrar{ 317 registration: conjureCachedRegistration, 318 } 319 320 conjureCached = true 321 conjureDelay = 0 // report no delay 322 323 } else if conjureConfig.APIRegistrarBidirectionalURL != "" { 324 325 if conjureConfig.APIRegistrarHTTPClient == nil { 326 // While not a guaranteed check, if the APIRegistrarHTTPClient isn't set 327 // then the API registration would certainly be unfronted, resulting in a 328 // fingerprintable connection leak. 329 return nil, errors.TraceNew("missing APIRegistrarHTTPClient") 330 } 331 332 refractionDialer.DarkDecoyRegistrar = &refraction_networking_client.APIRegistrarBidirectional{ 333 Endpoint: conjureConfig.APIRegistrarBidirectionalURL, 334 ConnectionDelay: conjureConfig.APIRegistrarDelay, 335 MaxRetries: 0, 336 Client: conjureConfig.APIRegistrarHTTPClient, 337 } 338 339 conjureDelay = conjureConfig.APIRegistrarDelay 340 341 } else if conjureConfig.DecoyRegistrarDialer != nil { 342 343 refractionDialer.DarkDecoyRegistrar = &refraction_networking_client.DecoyRegistrar{ 344 TcpDialer: manager.makeManagedDialer( 345 conjureConfig.DecoyRegistrarDialer.DialContext), 346 } 347 348 refractionDialer.Width = conjureConfig.DecoyRegistrarWidth 349 350 // Limitation: the decoy regsitration delay is not currently exposed in the 351 // gotapdance API. 352 conjureDelay = -1 // don't report delay 353 354 } else { 355 356 return nil, errors.TraceNew("no conjure registrar specified") 357 } 358 359 if conjureCachedRegistration == nil && conjureConfig.RegistrationCacheTTL != 0 { 360 361 // Record the registration result in order to cache it. 362 conjureRecordRegistrar = &recordRegistrar{ 363 registrar: refractionDialer.DarkDecoyRegistrar, 364 } 365 refractionDialer.DarkDecoyRegistrar = conjureRecordRegistrar 366 } 367 368 switch conjureConfig.Transport { 369 case protocol.CONJURE_TRANSPORT_MIN_OSSH: 370 refractionDialer.Transport = refraction_networking_proto.TransportType_Min 371 refractionDialer.TcpDialer = newMinTransportDialer(refractionDialer.TcpDialer) 372 case protocol.CONJURE_TRANSPORT_OBFS4_OSSH: 373 refractionDialer.Transport = refraction_networking_proto.TransportType_Obfs4 374 default: 375 return nil, errors.Tracef("invalid Conjure transport: %s", conjureConfig.Transport) 376 } 377 378 if conjureCachedRegistration != nil { 379 380 // When using a cached registration, patch its TcpDialer to use the custom 381 // dialer for this dial. In the non-cached code path, gotapdance will set 382 // refractionDialer.TcpDialer into a new registration. 383 conjureCachedRegistration.TcpDialer = refractionDialer.TcpDialer 384 } 385 } 386 387 // If the dial context is cancelled, use dialManager to interrupt 388 // refractionDialer.DialContext. See dialManager comment explaining why 389 // refractionDialer.DialContext may block even when the input context is 390 // cancelled. 391 dialComplete := make(chan struct{}) 392 go func() { 393 select { 394 case <-ctx.Done(): 395 case <-dialComplete: 396 } 397 select { 398 // Prioritize the dialComplete case. 399 case <-dialComplete: 400 return 401 default: 402 } 403 manager.close() 404 }() 405 406 conn, err := refractionDialer.DialContext(ctx, "tcp", address) 407 close(dialComplete) 408 409 if err != nil { 410 // Call manager.close before updating cache, to synchronously shutdown dials 411 // and ensure there are no further concurrent reads/writes to the recorded 412 // registration before referencing it. 413 manager.close() 414 } 415 416 // Cache (or put back) a successful registration. Also put back in the 417 // specific error case where the phantom dial was canceled, as the 418 // registration may still be valid. This operation implicitly extends the TTL 419 // of a reused cached registration; we assume the Conjure station is also 420 // extending the TTL by the same amount. 421 // 422 // Limitation: the cancel case shouldn't extend the TTL. 423 424 if useConjure && (conjureCachedRegistration != nil || conjureRecordRegistrar != nil) { 425 426 isCanceled := (err != nil && ctx.Err() == context.Canceled) 427 428 if err == nil || isCanceled { 429 430 registration := conjureCachedRegistration 431 if registration == nil { 432 // We assume gotapdance is no longer accessing the Registrar. 433 registration = conjureRecordRegistrar.registration 434 } 435 436 // conjureRecordRegistrar.registration will be nil if there was no cached 437 // registration _and_ registration didn't succeed before a cancel. 438 if registration != nil { 439 440 // Do not retain a reference to the custom dialer, as its context will not 441 // be valid for future dials using this cached registration. Assumes that 442 // gotapdance will no longer reference the TcpDialer now that the 443 // connection is established. 444 registration.TcpDialer = nil 445 446 conjureRegistrationCache.put(conjureConfig, registration, isCanceled) 447 } 448 449 } else if conjureCachedRegistration != nil { 450 451 conjureConfig.Logger.WithTraceFields( 452 common.LogFields{ 453 "diagnosticID": conjureConfig.DiagnosticID, 454 "reason": "phantom dial failed", 455 }).Info( 456 "drop cached registration") 457 } 458 } 459 460 if err != nil { 461 return nil, errors.Trace(err) 462 } 463 464 manager.startUsingRunCtx() 465 466 refractionConn := &refractionConn{ 467 Conn: conn, 468 manager: manager, 469 } 470 471 if useConjure { 472 // Retain these values for logging metrics. 473 refractionConn.isConjure = true 474 refractionConn.conjureCached = conjureCached 475 refractionConn.conjureDelay = conjureDelay 476 refractionConn.conjureTransport = conjureConfig.Transport 477 } 478 479 return refractionConn, nil 480 } 481 482 func DeleteCachedConjureRegistration(config *ConjureConfig) { 483 conjureRegistrationCache.delete(config) 484 } 485 486 type registrationCache struct { 487 mutex sync.Mutex 488 TTL time.Duration 489 cache *lrucache.Cache 490 } 491 492 func newRegistrationCache() *registrationCache { 493 return ®istrationCache{ 494 cache: lrucache.NewWithLRU( 495 lrucache.NoExpiration, 496 1*time.Minute, 497 REGISTRATION_CACHE_MAX_ENTRIES), 498 } 499 } 500 501 func (c *registrationCache) put( 502 config *ConjureConfig, 503 registration *refraction_networking_client.ConjureReg, 504 isCanceled bool) { 505 506 c.mutex.Lock() 507 defer c.mutex.Unlock() 508 509 // Clear the entire cache if the configured TTL changes to avoid retaining 510 // items for too long. This is expected to be an infrequent event. The 511 // go-cache-lru API does not offer a mechanism to inspect and adjust the TTL 512 // of all existing items. 513 if c.TTL != config.RegistrationCacheTTL { 514 c.cache.Flush() 515 c.TTL = config.RegistrationCacheTTL 516 } 517 518 // Drop the cached registration if another entry is found under the same key. 519 // Since the dial pops its entry out of the cache, finding an existing entry 520 // implies that another tunnel establishment candidate with the same key has 521 // successfully registered and connected (or canceled) in the meantime. 522 // Prefer that newer cached registration. 523 // 524 // For Psiphon, one scenario resulting in this condition is that the first 525 // dial to a given server, using a cached registration, is delayed long 526 // enough that a new candidate for the same server has been started and 527 // outpaced the first candidate. 528 _, found := c.cache.Get(config.RegistrationCacheKey) 529 if found { 530 config.Logger.WithTraceFields( 531 common.LogFields{ 532 "diagnosticID": config.DiagnosticID, 533 "reason": "existing entry found", 534 }).Info( 535 "drop cached registration") 536 return 537 } 538 539 reason := "connected" 540 if isCanceled { 541 reason = "canceled" 542 } 543 544 config.Logger.WithTraceFields( 545 common.LogFields{ 546 "diagnosticID": config.DiagnosticID, 547 "cacheSize": c.cache.ItemCount(), 548 "reason": reason, 549 }).Info( 550 "put cached registration") 551 552 c.cache.Set( 553 config.RegistrationCacheKey, 554 registration, 555 c.TTL) 556 } 557 558 func (c *registrationCache) pop( 559 config *ConjureConfig) *refraction_networking_client.ConjureReg { 560 561 c.mutex.Lock() 562 defer c.mutex.Unlock() 563 564 // See TTL/Flush comment in put. 565 if c.TTL != config.RegistrationCacheTTL { 566 c.cache.Flush() 567 c.TTL = config.RegistrationCacheTTL 568 } 569 570 entry, found := c.cache.Get(config.RegistrationCacheKey) 571 572 config.Logger.WithTraceFields( 573 common.LogFields{ 574 "diagnosticID": config.DiagnosticID, 575 "cacheSize": c.cache.ItemCount(), 576 "found": found, 577 }).Info( 578 "pop cached registration") 579 580 if found { 581 c.cache.Delete(config.RegistrationCacheKey) 582 return entry.(*refraction_networking_client.ConjureReg) 583 } 584 585 return nil 586 } 587 588 func (c *registrationCache) delete(config *ConjureConfig) { 589 590 c.mutex.Lock() 591 defer c.mutex.Unlock() 592 593 _, found := c.cache.Get(config.RegistrationCacheKey) 594 595 config.Logger.WithTraceFields( 596 common.LogFields{ 597 "diagnosticID": config.DiagnosticID, 598 "found": found, 599 }).Info( 600 "delete cached registration") 601 602 if found { 603 c.cache.Delete(config.RegistrationCacheKey) 604 } 605 } 606 607 var conjureRegistrationCache = newRegistrationCache() 608 609 type cachedRegistrar struct { 610 registration *refraction_networking_client.ConjureReg 611 } 612 613 func (r *cachedRegistrar) Register( 614 _ *refraction_networking_client.ConjureSession, 615 _ context.Context) (*refraction_networking_client.ConjureReg, error) { 616 617 return r.registration, nil 618 } 619 620 type recordRegistrar struct { 621 registrar refraction_networking_client.Registrar 622 registration *refraction_networking_client.ConjureReg 623 } 624 625 func (r *recordRegistrar) Register( 626 session *refraction_networking_client.ConjureSession, 627 ctx context.Context) (*refraction_networking_client.ConjureReg, error) { 628 629 registration, err := r.registrar.Register(session, ctx) 630 if err != nil { 631 return nil, errors.Trace(err) 632 } 633 r.registration = registration 634 return registration, nil 635 } 636 637 // minTransportConn buffers the first 32-byte random HMAC write performed by 638 // Conjure TransportType_Min, and prepends it to the subsequent first write 639 // made by OSSH. The purpose is to avoid a distinct fingerprint consisting of 640 // the initial TCP data packet always containing exactly 32 bytes of payload. 641 // The first write by OSSH will be a variable length multi-packet-sized 642 // sequence of random bytes. 643 type minTransportConn struct { 644 net.Conn 645 646 mutex sync.Mutex 647 state int 648 buffer []byte 649 err error 650 } 651 652 const ( 653 stateMinTransportInit = iota 654 stateMinTransportBufferedHMAC 655 stateMinTransportWroteHMAC 656 stateMinTransportFailed 657 ) 658 659 func newMinTransportConn(conn net.Conn) *minTransportConn { 660 return &minTransportConn{ 661 Conn: conn, 662 state: stateMinTransportInit, 663 } 664 } 665 666 func (conn *minTransportConn) Write(p []byte) (int, error) { 667 conn.mutex.Lock() 668 defer conn.mutex.Unlock() 669 670 switch conn.state { 671 case stateMinTransportInit: 672 if len(p) != sha256.Size { 673 conn.state = stateMinTransportFailed 674 conn.err = errors.TraceNew("unexpected HMAC write size") 675 return 0, conn.err 676 } 677 conn.buffer = make([]byte, sha256.Size) 678 copy(conn.buffer, p) 679 conn.state = stateMinTransportBufferedHMAC 680 return sha256.Size, nil 681 case stateMinTransportBufferedHMAC: 682 conn.buffer = append(conn.buffer, p...) 683 n, err := conn.Conn.Write(conn.buffer) 684 if n < sha256.Size { 685 conn.state = stateMinTransportFailed 686 conn.err = errors.TraceNew("failed to write HMAC") 687 if err == nil { 688 // As Write must return an error when failing to write the entire buffer, 689 // we don't expect to hit this case. 690 err = conn.err 691 } 692 } else { 693 conn.state = stateMinTransportWroteHMAC 694 } 695 n -= sha256.Size 696 // Do not wrap Conn.Write errors, and do not return conn.err here. 697 return n, err 698 case stateMinTransportWroteHMAC: 699 return conn.Conn.Write(p) 700 case stateMinTransportFailed: 701 return 0, conn.err 702 default: 703 return 0, errors.TraceNew("unexpected state") 704 } 705 } 706 707 func newMinTransportDialer(dialer common.Dialer) common.Dialer { 708 return func(ctx context.Context, network, address string) (net.Conn, error) { 709 conn, err := dialer(ctx, network, address) 710 if err != nil { 711 return nil, errors.Trace(err) 712 } 713 return newMinTransportConn(conn), nil 714 } 715 } 716 717 // dialManager tracks all dials performed by and dialed conns used by a 718 // refraction_networking_client conn. dialManager.close interrupts/closes 719 // all pending dials and established conns immediately. This ensures that 720 // blocking calls within refraction_networking_client, such as tls.Handhake, 721 // are interrupted: 722 // E.g., https://github.com/refraction-networking/gotapdance/blob/4d84655dad2e242b0af0459c31f687b12085dcca/tapdance/conn_raw.go#L307 723 // (...preceeding SetDeadline is insufficient for immediate cancellation.) 724 type dialManager struct { 725 ctxMutex sync.Mutex 726 useRunCtx bool 727 initialDialCtx context.Context 728 runCtx context.Context 729 stopRunning context.CancelFunc 730 731 conns *common.Conns 732 } 733 734 func newDialManager() *dialManager { 735 runCtx, stopRunning := context.WithCancel(context.Background()) 736 return &dialManager{ 737 runCtx: runCtx, 738 stopRunning: stopRunning, 739 conns: common.NewConns(), 740 } 741 } 742 743 func (manager *dialManager) makeManagedDialer(dialer common.Dialer) common.Dialer { 744 745 return func(ctx context.Context, network, address string) (net.Conn, error) { 746 return manager.dialWithDialer(dialer, ctx, network, address) 747 } 748 } 749 750 func (manager *dialManager) dialWithDialer( 751 dialer common.Dialer, 752 ctx context.Context, 753 network string, 754 address string) (net.Conn, error) { 755 756 if network != "tcp" { 757 return nil, errors.Tracef("unsupported network: %s", network) 758 } 759 760 // The context for this dial is either: 761 // - ctx, during the initial refraction_networking_client.DialContext, when 762 // this is Psiphon tunnel establishment. 763 // - manager.runCtx after the initial refraction_networking_client.Dial 764 // completes, in which case this is a TapDance protocol reconnection that 765 // occurs periodically for already established tunnels. 766 767 manager.ctxMutex.Lock() 768 if manager.useRunCtx { 769 770 // Preserve the random timeout configured by the TapDance client: 771 // https://github.com/refraction-networking/gotapdance/blob/4d84655dad2e242b0af0459c31f687b12085dcca/tapdance/conn_raw.go#L263 772 deadline, ok := ctx.Deadline() 773 if !ok { 774 return nil, errors.Tracef("unexpected nil deadline") 775 } 776 var cancelFunc context.CancelFunc 777 ctx, cancelFunc = context.WithDeadline(manager.runCtx, deadline) 778 defer cancelFunc() 779 } 780 manager.ctxMutex.Unlock() 781 782 conn, err := dialer(ctx, network, address) 783 if err != nil { 784 return nil, errors.Trace(err) 785 } 786 787 // Fail immediately if CloseWrite isn't available in the underlying dialed 788 // conn. The equivalent check in managedConn.CloseWrite isn't fatal and 789 // TapDance will run in a degraded state. 790 // Limitation: if the underlying conn _also_ passes through CloseWrite, this 791 // check may be insufficient. 792 if _, ok := conn.(common.CloseWriter); !ok { 793 return nil, errors.TraceNew("underlying conn is not a CloseWriter") 794 } 795 796 conn = &managedConn{ 797 Conn: conn, 798 manager: manager, 799 } 800 801 if !manager.conns.Add(conn) { 802 conn.Close() 803 return nil, errors.TraceNew("already closed") 804 } 805 806 return conn, nil 807 } 808 809 func (manager *dialManager) startUsingRunCtx() { 810 manager.ctxMutex.Lock() 811 manager.initialDialCtx = nil 812 manager.useRunCtx = true 813 manager.ctxMutex.Unlock() 814 } 815 816 func (manager *dialManager) close() { 817 manager.conns.CloseAll() 818 manager.stopRunning() 819 } 820 821 type managedConn struct { 822 net.Conn 823 manager *dialManager 824 } 825 826 // CloseWrite exposes the net.TCPConn.CloseWrite() functionality 827 // required by TapDance. 828 func (conn *managedConn) CloseWrite() error { 829 if closeWriter, ok := conn.Conn.(common.CloseWriter); ok { 830 return closeWriter.CloseWrite() 831 } 832 return errors.TraceNew("underlying conn is not a CloseWriter") 833 } 834 835 func (conn *managedConn) Close() error { 836 // Remove must be invoked asynchronously, as this Close may be called by 837 // conns.CloseAll, leading to a reentrant lock situation. 838 go conn.manager.conns.Remove(conn) 839 return conn.Conn.Close() 840 } 841 842 type refractionConn struct { 843 net.Conn 844 manager *dialManager 845 isClosed int32 846 847 isConjure bool 848 conjureCached bool 849 conjureDelay time.Duration 850 conjureTransport string 851 } 852 853 func (conn *refractionConn) Close() error { 854 conn.manager.close() 855 err := conn.Conn.Close() 856 atomic.StoreInt32(&conn.isClosed, 1) 857 return err 858 } 859 860 func (conn *refractionConn) IsClosed() bool { 861 return atomic.LoadInt32(&conn.isClosed) == 1 862 } 863 864 // GetMetrics implements the common.MetricsSource interface. 865 func (conn *refractionConn) GetMetrics() common.LogFields { 866 logFields := make(common.LogFields) 867 if conn.isConjure { 868 869 cached := "0" 870 if conn.conjureCached { 871 cached = "1" 872 } 873 logFields["conjure_cached"] = cached 874 875 if conn.conjureDelay != -1 { 876 logFields["conjure_delay"] = fmt.Sprintf("%d", conn.conjureDelay/time.Millisecond) 877 } 878 879 logFields["conjure_transport"] = conn.conjureTransport 880 } 881 return logFields 882 } 883 884 var initRefractionNetworkingOnce sync.Once 885 886 func initRefractionNetworking(emitLogs bool, dataDirectory string) error { 887 888 var initErr error 889 initRefractionNetworkingOnce.Do(func() { 890 891 if !emitLogs { 892 refraction_networking_client.Logger().Out = ioutil.Discard 893 } 894 895 assetsDir := filepath.Join(dataDirectory, "refraction-networking") 896 897 err := os.MkdirAll(assetsDir, 0700) 898 if err != nil { 899 initErr = errors.Trace(err) 900 return 901 } 902 903 clientConfFileName := filepath.Join(assetsDir, "ClientConf") 904 _, err = os.Stat(clientConfFileName) 905 if err != nil && os.IsNotExist(err) { 906 err = ioutil.WriteFile(clientConfFileName, getEmbeddedClientConf(), 0644) 907 } 908 if err != nil { 909 initErr = errors.Trace(err) 910 return 911 } 912 913 refraction_networking_client.AssetsSetDir(assetsDir) 914 }) 915 916 return initErr 917 }