github.com/Psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/server/replay.go (about) 1 /* 2 * Copyright (c) 2020, Psiphon Inc. 3 * All rights reserved. 4 * 5 * This program is free software: you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License as published by 7 * the Free Software Foundation, either version 3 of the License, or 8 * (at your option) any later version. 9 * 10 * This program is distributed in the hope that it will be useful, 11 * but WITHOUT ANY WARRANTY; without even the implied warranty of 12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 * GNU General Public License for more details. 14 * 15 * You should have received a copy of the GNU General Public License 16 * along with this program. If not, see <http://www.gnu.org/licenses/>. 17 * 18 */ 19 20 package server 21 22 import ( 23 "fmt" 24 "sync" 25 "time" 26 27 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors" 28 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters" 29 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng" 30 lrucache "github.com/cognusion/go-cache-lru" 31 ) 32 33 const ( 34 REPLAY_CACHE_MAX_ENTRIES = 100000 35 REPLAY_CACHE_CLEANUP_INTERVAL = 1 * time.Minute 36 ) 37 38 // ReplayCache is a cache of recently used and successful network obfuscation 39 // parameters that may be replayed -- reused -- for subsequent tunnel 40 // connections. 41 // 42 // Server-side replay is analogous to client-side replay, with one key 43 // difference: server-side replay can be applied across multiple clients in 44 // the same GeoIP scope. 45 // 46 // Replay is enabled with tactics, and tactics determine the tunnel quality 47 // targets for establishing and clearing replay parameters. 48 // 49 // ReplayCache has a maximum capacity with an LRU strategy to cap memory 50 // overhead. 51 type ReplayCache struct { 52 support *SupportServices 53 cacheMutex sync.Mutex 54 cache *lrucache.Cache 55 metrics *replayCacheMetrics 56 } 57 58 type replayCacheMetrics struct { 59 MaxCacheEntries int64 60 SetReplayCount int64 61 GetReplayHitCount int64 62 GetReplayMissCount int64 63 FailedReplayCount int64 64 DeleteReplayCount int64 65 } 66 67 type replayParameters struct { 68 replayPacketManipulation bool 69 packetManipulationSpecName string 70 replayFragmentor bool 71 fragmentorSeed *prng.Seed 72 failedCount int 73 } 74 75 // NewReplayCache creates a new ReplayCache. 76 func NewReplayCache(support *SupportServices) *ReplayCache { 77 // Cache TTL may vary based on tactics filtering, so each cache.Add must set 78 // the entry TTL. 79 return &ReplayCache{ 80 support: support, 81 cache: lrucache.NewWithLRU( 82 lrucache.NoExpiration, 83 REPLAY_CACHE_CLEANUP_INTERVAL, 84 REPLAY_CACHE_MAX_ENTRIES), 85 metrics: &replayCacheMetrics{}, 86 } 87 } 88 89 // Flush clears all entries in the ReplayCache. Flush should be called when 90 // tactics hot reload and change to clear any cached replay parameters that 91 // may be based on stale tactics. 92 func (r *ReplayCache) Flush() { 93 94 r.cacheMutex.Lock() 95 defer r.cacheMutex.Unlock() 96 97 r.cache.Flush() 98 } 99 100 // GetMetrics returns a snapshop of current ReplayCache event counters and 101 // resets all counters to zero. 102 func (r *ReplayCache) GetMetrics() LogFields { 103 104 r.cacheMutex.Lock() 105 defer r.cacheMutex.Unlock() 106 107 logFields := LogFields{ 108 "replay_max_cache_entries": r.metrics.MaxCacheEntries, 109 "replay_set_replay_count": r.metrics.SetReplayCount, 110 "replay_get_replay_hit_count": r.metrics.GetReplayHitCount, 111 "replay_get_replay_miss_count": r.metrics.GetReplayMissCount, 112 "replay_failed_replay_count": r.metrics.FailedReplayCount, 113 "replay_delete_replay_count": r.metrics.DeleteReplayCount, 114 } 115 116 r.metrics = &replayCacheMetrics{} 117 118 return logFields 119 } 120 121 // GetReplayTargetDuration returns the tactics replay target tunnel duration 122 // for the specified GeoIP data. Tunnels which are active for the specified 123 // duration are candidates for setting or extending replay parameters. Wait 124 // for the returned wait duration before evaluating the tunnel duration. Once 125 // this target is met, call SetReplayParameters, which will check additional 126 // targets and conditionally set replay parameters. 127 func (r *ReplayCache) GetReplayTargetDuration( 128 geoIPData GeoIPData) (bool, time.Duration, time.Duration) { 129 130 p, err := r.support.ServerTacticsParametersCache.Get(geoIPData) 131 if err != nil { 132 log.WithTraceFields(LogFields{"error": errors.Trace(err)}).Warning( 133 "ServerTacticsParametersCache.Get failed") 134 return false, 0, 0 135 } 136 137 if p.IsNil() { 138 // No tactics are configured; replay is disabled. 139 return false, 0, 0 140 } 141 142 if !p.Bool(parameters.ServerReplayUnknownGeoIP) && 143 geoIPData.Country == GEOIP_UNKNOWN_VALUE && 144 geoIPData.ASN == GEOIP_UNKNOWN_VALUE { 145 // Unless configured otherwise, skip replay for unknown GeoIP, since clients 146 // may not have equivilent network conditions. 147 return false, 0, 0 148 } 149 150 TTL := p.Duration(parameters.ServerReplayTTL) 151 152 if TTL == 0 { 153 // Server replay is disabled when TTL is 0. 154 return false, 0, 0 155 } 156 157 return true, 158 p.Duration(parameters.ServerReplayTargetWaitDuration), 159 p.Duration(parameters.ServerReplayTargetTunnelDuration) 160 } 161 162 // SetReplayParameters sets replay parameters, packetManipulationSpecName and 163 // fragmentorSeed, for the specified tunnel protocol and GeoIP scope. 164 // Once set, replay parameters are active for a tactics-configurable TTL. 165 // 166 // The specified tunneledBytesUp/Down must meet tactics replay bytes 167 // transferred targets. SetReplayParameters should be called only after first 168 // calling ReplayTargetDuration and ensuring the tunnel meets the active 169 // tunnel duration target. When cached replay parameters exist, their TTL is 170 // extended and any failure counts are reset to zero. 171 // 172 // SetReplayParameters must be called only once per tunnel. Extending replay 173 // parameters TTL should only be done only immediately after a successful 174 // tunnel dial and target achievement, as this is the part of a tunnel 175 // lifecycle at highest risk of blocking. 176 // 177 // The value pointed to by fragmentorSeed must not be mutated after calling 178 // SetReplayParameters. 179 func (r *ReplayCache) SetReplayParameters( 180 tunnelProtocol string, 181 geoIPData GeoIPData, 182 packetManipulationSpecName string, 183 fragmentorSeed *prng.Seed, 184 tunneledBytesUp int64, 185 tunneledBytesDown int64) { 186 187 p, err := r.support.ServerTacticsParametersCache.Get(geoIPData) 188 if err != nil { 189 log.WithTraceFields(LogFields{"error": errors.Trace(err)}).Warning( 190 "ServerTacticsParametersCache.Get failed") 191 return 192 } 193 194 if p.IsNil() { 195 // No tactics are configured; replay is disabled. 196 return 197 } 198 199 TTL := p.Duration(parameters.ServerReplayTTL) 200 201 if TTL == 0 { 202 return 203 } 204 205 targetUpstreamBytes := p.Int(parameters.ServerReplayTargetUpstreamBytes) 206 targetDownstreamBytes := p.Int(parameters.ServerReplayTargetDownstreamBytes) 207 208 if tunneledBytesUp < int64(targetUpstreamBytes) { 209 return 210 } 211 if tunneledBytesDown < int64(targetDownstreamBytes) { 212 return 213 } 214 215 key := r.makeKey(tunnelProtocol, geoIPData) 216 217 value := &replayParameters{} 218 219 if p.Bool(parameters.ServerReplayPacketManipulation) { 220 value.replayPacketManipulation = true 221 value.packetManipulationSpecName = packetManipulationSpecName 222 } 223 224 if p.Bool(parameters.ServerReplayFragmentor) { 225 value.replayFragmentor = (fragmentorSeed != nil) 226 value.fragmentorSeed = fragmentorSeed 227 } 228 229 r.cacheMutex.Lock() 230 defer r.cacheMutex.Unlock() 231 232 r.cache.Add(key, value, TTL) 233 234 // go-cache-lru is typically safe for concurrent access but explicit 235 // synchronization is required when accessing Items. Items may include 236 // entries that are expired but not yet purged. 237 cacheSize := int64(len(r.cache.Items())) 238 239 if cacheSize > r.metrics.MaxCacheEntries { 240 r.metrics.MaxCacheEntries = cacheSize 241 } 242 r.metrics.SetReplayCount += 1 243 } 244 245 // GetReplayPacketManipulation returns an active replay packet manipulation 246 // spec for the specified tunnel protocol and GeoIP scope. 247 // 248 // While Flush should be called to clear parameters based on stale tactics, 249 // it's still possible for GetReplayPacketManipulation to return a spec name 250 // that's no longer in the current list of known specs. 251 func (r *ReplayCache) GetReplayPacketManipulation( 252 tunnelProtocol string, 253 geoIPData GeoIPData) (string, bool) { 254 255 r.cacheMutex.Lock() 256 defer r.cacheMutex.Unlock() 257 258 parameters, ok := r.getReplayParameters( 259 tunnelProtocol, geoIPData) 260 if !ok { 261 return "", false 262 } 263 264 if !parameters.replayPacketManipulation { 265 return "", false 266 } 267 268 return parameters.packetManipulationSpecName, true 269 } 270 271 // GetReplayFragmentor returns an active replay fragmentor seed for the 272 // specified tunnel protocol and GeoIP scope. 273 func (r *ReplayCache) GetReplayFragmentor( 274 tunnelProtocol string, 275 geoIPData GeoIPData) (*prng.Seed, bool) { 276 277 r.cacheMutex.Lock() 278 defer r.cacheMutex.Unlock() 279 280 parameters, ok := r.getReplayParameters( 281 tunnelProtocol, geoIPData) 282 if !ok { 283 return nil, false 284 } 285 286 if !parameters.replayFragmentor { 287 return nil, false 288 } 289 290 return parameters.fragmentorSeed, true 291 } 292 293 func (r *ReplayCache) getReplayParameters( 294 tunnelProtocol string, 295 geoIPData GeoIPData) (*replayParameters, bool) { 296 297 key := r.makeKey(tunnelProtocol, geoIPData) 298 299 value, ok := r.cache.Get(key) 300 301 if !ok { 302 r.metrics.GetReplayMissCount += 1 303 return nil, false 304 } 305 306 r.metrics.GetReplayHitCount += 1 307 308 parameters, ok := value.(*replayParameters) 309 310 return parameters, ok 311 } 312 313 // FailedReplayParameters increments the count of tunnels which failed to 314 // complete any liveness test and API handshake after using replay parameters. 315 // Once a failure threshold is reached, cached replay parameters are cleared. 316 // Call this function for tunnels which meet the failure criteria. 317 func (r *ReplayCache) FailedReplayParameters( 318 tunnelProtocol string, 319 geoIPData GeoIPData, 320 packetManipulationSpecName string, 321 fragmentorSeed *prng.Seed) { 322 323 p, err := r.support.ServerTacticsParametersCache.Get(geoIPData) 324 if err != nil { 325 log.WithTraceFields(LogFields{"error": errors.Trace(err)}).Warning( 326 "ServerTacticsParametersCache.Get failed") 327 return 328 } 329 330 thresholdFailedCount := p.Int(parameters.ServerReplayFailedCountThreshold) 331 332 key := r.makeKey(tunnelProtocol, geoIPData) 333 334 r.cacheMutex.Lock() 335 defer r.cacheMutex.Unlock() 336 337 parameters, ok := r.getReplayParameters(tunnelProtocol, geoIPData) 338 if !ok { 339 return 340 } 341 342 // Do not count the failure if the replay values for the tunnel protocol and 343 // GeoIP scope are now different; these parameters now reflect a newer, 344 // successful tunnel. 345 346 if (parameters.replayPacketManipulation && 347 parameters.packetManipulationSpecName != packetManipulationSpecName) || 348 (parameters.replayFragmentor && 349 (fragmentorSeed == nil || 350 *parameters.fragmentorSeed != *fragmentorSeed)) { 351 return 352 } 353 354 parameters.failedCount += 1 355 r.metrics.FailedReplayCount += 1 356 357 if thresholdFailedCount == 0 { 358 // No failure limit; the entry will not be deleted. 359 return 360 } 361 362 if parameters.failedCount >= thresholdFailedCount { 363 r.cache.Delete(key) 364 r.metrics.DeleteReplayCount += 1 365 } 366 } 367 368 func (r *ReplayCache) makeKey( 369 tunnelProtocol string, geoIPData GeoIPData) string { 370 return fmt.Sprintf( 371 "%s-%s-%s", 372 tunnelProtocol, geoIPData.Country, geoIPData.ASN) 373 }