Skip to content

Commit

Permalink
Merge branch 'master' into staging-server
Browse files Browse the repository at this point in the history
  • Loading branch information
rod-hynes committed Nov 13, 2024
2 parents 46a2c2b + 00aad9d commit 216c6b2
Show file tree
Hide file tree
Showing 12 changed files with 126 additions and 27 deletions.
2 changes: 1 addition & 1 deletion psiphon/common/inproxy/brokerClient.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ type BrokerClient struct {
func NewBrokerClient(coordinator BrokerDialCoordinator) (*BrokerClient, error) {

// A client is expected to use an ephemeral key, and can return a
// zero-value private key. Each proxy should use a peristent key, as the
// zero-value private key. Each proxy should use a persistent key, as the
// corresponding public key is the proxy ID, which is used to credit the
// proxy for its service.

Expand Down
1 change: 1 addition & 0 deletions psiphon/common/inproxy/coordinator.go
Original file line number Diff line number Diff line change
Expand Up @@ -182,6 +182,7 @@ type BrokerDialCoordinator interface {
SessionHandshakeRoundTripTimeout() time.Duration
AnnounceRequestTimeout() time.Duration
AnnounceDelay() time.Duration
AnnounceMaxBackoffDelay() time.Duration
AnnounceDelayJitter() float64
AnswerRequestTimeout() time.Duration
OfferRequestTimeout() time.Duration
Expand Down
7 changes: 7 additions & 0 deletions psiphon/common/inproxy/coordinator_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,7 @@ type testBrokerDialCoordinator struct {
sessionHandshakeRoundTripTimeout time.Duration
announceRequestTimeout time.Duration
announceDelay time.Duration
announceMaxBackoffDelay time.Duration
announceDelayJitter float64
answerRequestTimeout time.Duration
offerRequestTimeout time.Duration
Expand Down Expand Up @@ -149,6 +150,12 @@ func (t *testBrokerDialCoordinator) AnnounceDelay() time.Duration {
return t.announceDelay
}

func (t *testBrokerDialCoordinator) AnnounceMaxBackoffDelay() time.Duration {
t.mutex.Lock()
defer t.mutex.Unlock()
return t.announceMaxBackoffDelay
}

func (t *testBrokerDialCoordinator) AnnounceDelayJitter() float64 {
t.mutex.Lock()
defer t.mutex.Unlock()
Expand Down
24 changes: 12 additions & 12 deletions psiphon/common/inproxy/proxy.go
Original file line number Diff line number Diff line change
Expand Up @@ -272,13 +272,14 @@ loop:
// proxyOneClient fails. As having no broker clients is a possible
// proxyOneClient failure case, GetBrokerClient errors are ignored here and
// defaults used in that case.
func (p *Proxy) getAnnounceDelayParameters() (time.Duration, float64) {
func (p *Proxy) getAnnounceDelayParameters() (time.Duration, time.Duration, float64) {
brokerClient, err := p.config.GetBrokerClient()
if err != nil {
return proxyAnnounceDelay, proxyAnnounceDelayJitter
return proxyAnnounceDelay, proxyAnnounceMaxBackoffDelay, proxyAnnounceDelayJitter
}
brokerCoordinator := brokerClient.GetBrokerDialCoordinator()
return common.ValueOrDefault(brokerCoordinator.AnnounceDelay(), proxyAnnounceDelay),
common.ValueOrDefault(brokerCoordinator.AnnounceMaxBackoffDelay(), proxyAnnounceMaxBackoffDelay),
common.ValueOrDefault(brokerCoordinator.AnnounceDelayJitter(), proxyAnnounceDelayJitter)

}
Expand Down Expand Up @@ -384,6 +385,10 @@ func (p *Proxy) proxyClients(
backOff, err := p.proxyOneClient(
ctx, logAnnounce, signalAnnounceDone)

if !backOff || err == nil {
failureDelayFactor = 1
}

if err != nil && ctx.Err() == nil {

// Apply a simple exponential backoff based on whether
Expand All @@ -396,17 +401,12 @@ func (p *Proxy) proxyClients(
// prevents both excess local logging and churning in the former
// case and excessive bad service to clients or unintentionally
// overloading the broker in the latter case.
//
// TODO: specific tactics parameters to control this logic.

delay, jitter := p.getAnnounceDelayParameters()
delay, maxBackoffDelay, jitter := p.getAnnounceDelayParameters()

if !backOff {
failureDelayFactor = 1
}
delay = delay * failureDelayFactor
if delay > proxyAnnounceMaxBackoffDelay {
delay = proxyAnnounceMaxBackoffDelay
if delay > maxBackoffDelay {
delay = maxBackoffDelay
}
if failureDelayFactor < 1<<20 {
failureDelayFactor *= 2
Expand All @@ -428,7 +428,7 @@ func (p *Proxy) proxyClients(
p.config.Logger.WithTraceFields(
common.LogFields{
"error": errMsg,
"delay": delay,
"delay": delay.String(),
"jitter": jitter,
}).Error("proxy client failed")
logErrorsCount -= 1
Expand Down Expand Up @@ -608,7 +608,7 @@ func (p *Proxy) proxyOneClient(
// any deliberate delay.

requestDelay := time.Duration(0)
announceDelay, announceDelayJitter := p.getAnnounceDelayParameters()
announceDelay, _, announceDelayJitter := p.getAnnounceDelayParameters()
p.nextAnnounceMutex.Lock()
nextDelay := prng.JitterDuration(announceDelay, announceDelayJitter)
if p.nextAnnounceBrokerClient != brokerClient {
Expand Down
2 changes: 2 additions & 0 deletions psiphon/common/parameters/parameters.go
Original file line number Diff line number Diff line change
Expand Up @@ -411,6 +411,7 @@ const (
InproxyProxyAnnounceRequestTimeout = "InproxyProxyAnnounceRequestTimeout"
InproxyProxyAnnounceDelay = "InproxyProxyAnnounceDelay"
InproxyProxyAnnounceDelayJitter = "InproxyProxyAnnounceDelayJitter"
InproxyProxyAnnounceMaxBackoffDelay = "InproxyProxyAnnounceMaxBackoffDelay"
InproxyProxyAnswerRequestTimeout = "InproxyProxyAnswerRequestTimeout"
InproxyClientOfferRequestTimeout = "InproxyClientOfferRequestTimeout"
InproxyClientOfferRequestPersonalTimeout = "InproxyClientOfferRequestPersonalTimeout"
Expand Down Expand Up @@ -930,6 +931,7 @@ var defaultParameters = map[string]struct {
InproxyProxyAnnounceRequestTimeout: {value: 2*time.Minute + 10*time.Second, minimum: time.Duration(0)},
InproxyProxyAnnounceDelay: {value: 100 * time.Millisecond, minimum: time.Duration(0)},
InproxyProxyAnnounceDelayJitter: {value: 0.5, minimum: 0.0},
InproxyProxyAnnounceMaxBackoffDelay: {value: 1 * time.Minute, minimum: time.Duration(0)},
InproxyProxyAnswerRequestTimeout: {value: 10*time.Second + 10*time.Second, minimum: time.Duration(0)},
InproxyClientOfferRequestTimeout: {value: 10*time.Second + 10*time.Second, minimum: time.Duration(0)},
InproxyClientOfferRequestPersonalTimeout: {value: 5*time.Second + 10*time.Second, minimum: time.Duration(0)},
Expand Down
28 changes: 18 additions & 10 deletions psiphon/common/regen/internal_generator.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,21 +122,21 @@ func newGenerator(regexp *syntax.Regexp, args *GeneratorArgs) (generator *intern

// Generator that does nothing.
func noop(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator, error) {
return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, args.Debug), func() ([]byte, error) {
return []byte{}, nil
}}, nil
}

func opEmptyMatch(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator, error) {
enforceOp(regexp, syntax.OpEmptyMatch)
return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, args.Debug), func() ([]byte, error) {
return []byte{}, nil
}}, nil
}

func opLiteral(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator, error) {
enforceOp(regexp, syntax.OpLiteral)
return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, args.Debug), func() ([]byte, error) {
if args.ByteMode {
return runesToBytes(regexp.Rune...)
} else {
Expand All @@ -147,7 +147,7 @@ func opLiteral(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator,

func opAnyChar(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator, error) {
enforceOp(regexp, syntax.OpAnyChar)
return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, args.Debug), func() ([]byte, error) {
if args.ByteMode {
return runesToBytes(rune(args.rng.Intn(math.MaxUint8 + 1)))
} else {
Expand All @@ -164,7 +164,7 @@ func opAnyCharNotNl(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenera
} else {
charClass = newCharClass(1, rune(math.MaxInt32))
}
return createCharClassGenerator(regexp.String(), charClass, args)
return createCharClassGenerator(regexpName(regexp, args.Debug), charClass, args)
}

func opQuest(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator, error) {
Expand Down Expand Up @@ -200,7 +200,7 @@ func opCharClass(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator
} else {
charClass = parseCharClass(regexp.Rune)
}
return createCharClassGenerator(regexp.String(), charClass, args)
return createCharClassGenerator(regexpName(regexp, args.Debug), charClass, args)
}

func opConcat(regexp *syntax.Regexp, genArgs *GeneratorArgs) (*internalGenerator, error) {
Expand All @@ -211,7 +211,7 @@ func opConcat(regexp *syntax.Regexp, genArgs *GeneratorArgs) (*internalGenerator
return nil, generatorError(err, "error creating generators for concat pattern /%s/", regexp)
}

return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, genArgs.Debug), func() ([]byte, error) {
var result bytes.Buffer
for _, generator := range generators {
gen, err := generator.Generate()
Expand All @@ -234,7 +234,7 @@ func opAlternate(regexp *syntax.Regexp, genArgs *GeneratorArgs) (*internalGenera

numGens := len(generators)

return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, genArgs.Debug), func() ([]byte, error) {
i := genArgs.rng.Intn(numGens)
generator := generators[i]
return generator.Generate()
Expand All @@ -257,7 +257,7 @@ func opCapture(regexp *syntax.Regexp, args *GeneratorArgs) (*internalGenerator,
// Group indices are 0-based, but index 0 is the whole expression.
index := regexp.Cap - 1

return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, args.Debug), func() ([]byte, error) {
return args.CaptureGroupHandler(index, regexp.Name, groupRegexp, generator, args)
}}, nil
}
Expand Down Expand Up @@ -312,7 +312,7 @@ func createRepeatingGenerator(regexp *syntax.Regexp, genArgs *GeneratorArgs, min
max = int(genArgs.MaxUnboundedRepeatCount)
}

return &internalGenerator{regexp.String(), func() ([]byte, error) {
return &internalGenerator{regexpName(regexp, genArgs.Debug), func() ([]byte, error) {
n := min + genArgs.rng.Intn(max-min+1)

var result bytes.Buffer
Expand All @@ -326,3 +326,11 @@ func createRepeatingGenerator(regexp *syntax.Regexp, genArgs *GeneratorArgs, min
return result.Bytes(), nil
}}, nil
}

// regexpName returns `regexp.String()` only if `debug` is true.
func regexpName(regexp *syntax.Regexp, debug bool) string {
if debug {
return regexp.String()
}
return ""
}
6 changes: 6 additions & 0 deletions psiphon/common/regen/regen.go
Original file line number Diff line number Diff line change
Expand Up @@ -162,6 +162,9 @@ type GeneratorArgs struct {
// ByteMode is not compatible with negated character classes (e.g. "[^a]").
ByteMode bool

// Debug is to used by the generator to log extra information.
Debug bool

// Used by generators.
rng *rand.Rand
}
Expand Down Expand Up @@ -209,6 +212,9 @@ func (a *GeneratorArgs) Rng() (*rand.Rand, error) {
// Generator generates random bytes or strings.
type Generator interface {
Generate() ([]byte, error)

// String returns a string representation of the generator for debugging.
// Value is empty string if Debug is false.
String() string
}

Expand Down
5 changes: 5 additions & 0 deletions psiphon/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -996,6 +996,7 @@ type Config struct {
InproxyMaxCompartmentIDListLength *int
InproxyProxyAnnounceRequestTimeoutMilliseconds *int
InproxyProxyAnnounceDelayMilliseconds *int
InproxyProxyAnnounceMaxBackoffDelayMilliseconds *int
InproxyProxyAnnounceDelayJitter *float64
InproxyProxyAnswerRequestTimeoutMilliseconds *int
InproxyClientOfferRequestTimeoutMilliseconds *int
Expand Down Expand Up @@ -2529,6 +2530,10 @@ func (config *Config) makeConfigParameters() map[string]interface{} {
applyParameters[parameters.InproxyProxyAnnounceDelay] = fmt.Sprintf("%dms", *config.InproxyProxyAnnounceDelayMilliseconds)
}

if config.InproxyProxyAnnounceMaxBackoffDelayMilliseconds != nil {
applyParameters[parameters.InproxyProxyAnnounceMaxBackoffDelay] = fmt.Sprintf("%dms", *config.InproxyProxyAnnounceMaxBackoffDelayMilliseconds)
}

if config.InproxyProxyAnnounceDelayJitter != nil {
applyParameters[parameters.InproxyProxyAnnounceDelayJitter] = *config.InproxyProxyAnnounceDelayJitter
}
Expand Down
7 changes: 7 additions & 0 deletions psiphon/inproxy.go
Original file line number Diff line number Diff line change
Expand Up @@ -275,6 +275,7 @@ type InproxyBrokerClientInstance struct {
sessionHandshakeTimeout time.Duration
announceRequestTimeout time.Duration
announceDelay time.Duration
announceMaxBackoffDelay time.Duration
announceDelayJitter float64
answerRequestTimeout time.Duration
offerRequestTimeout time.Duration
Expand Down Expand Up @@ -520,6 +521,7 @@ func NewInproxyBrokerClientInstance(
sessionHandshakeTimeout: p.Duration(parameters.InproxySessionHandshakeRoundTripTimeout),
announceRequestTimeout: p.Duration(parameters.InproxyProxyAnnounceRequestTimeout),
announceDelay: p.Duration(parameters.InproxyProxyAnnounceDelay),
announceMaxBackoffDelay: p.Duration(parameters.InproxyProxyAnnounceMaxBackoffDelay),
announceDelayJitter: p.Float(parameters.InproxyProxyAnnounceDelayJitter),
answerRequestTimeout: p.Duration(parameters.InproxyProxyAnswerRequestTimeout),
offerRequestTimeout: p.Duration(parameters.InproxyClientOfferRequestTimeout),
Expand Down Expand Up @@ -1007,6 +1009,11 @@ func (b *InproxyBrokerClientInstance) AnnounceDelay() time.Duration {
return b.announceDelay
}

// Implements the inproxy.BrokerDialCoordinator interface.
func (b *InproxyBrokerClientInstance) AnnounceMaxBackoffDelay() time.Duration {
return b.announceMaxBackoffDelay
}

// Implements the inproxy.BrokerDialCoordinator interface.
func (b *InproxyBrokerClientInstance) AnnounceDelayJitter() float64 {
return b.announceDelayJitter
Expand Down
17 changes: 13 additions & 4 deletions psiphon/net.go
Original file line number Diff line number Diff line change
Expand Up @@ -156,20 +156,29 @@ type HasIPv6RouteGetter interface {
// provider, which returns an identifier for the host's current active
// network.
//
// The identifier is a string that should indicate the network type and
// The identifier is a string that indicates the network type and
// identity; for example "WIFI-<BSSID>" or "MOBILE-<MCC/MNC>". As this network
// ID is personally identifying, it is only used locally in the client to
// determine network context and is not sent to the Psiphon server. The
// identifer will be logged in diagnostics messages; in this case only the
// substring before the first "-" is logged, so all PII must appear after the
// first "-".
//
// NetworkIDGetter.GetNetworkID should always return an identifier value, as
// NetworkIDGetter.GetNetworkID must always return an identifier value, as
// logic that uses GetNetworkID, including tactics, is intended to proceed
// regardless of whether an accurate network identifier can be obtained. By
// convention, the provider should return "UNKNOWN" when an accurate network
// regardless of whether an accurate network identifier can be obtained. The
// the provider shall return "UNKNOWN" when an accurate network
// identifier cannot be obtained. Best-effort is acceptable: e.g., return just
// "WIFI" when only the type of the network but no details can be determined.
//
// The network type is sent to Psiphon servers and logged as
// server_tunnel.network_type. To ensure consistency in stats, all providers
// must use the same network type string values, currently consisting of:
// - "WIFI" for a Wi-Fi network
// - "MOBILE" for a mobile/cellular network
// - "WIRED" for a wired network
// - "VPN" for a VPN network
// - "UNKNOWN" for when the network type cannot be determined
type NetworkIDGetter interface {
GetNetworkID() string
}
Expand Down
27 changes: 27 additions & 0 deletions replace/dtls/flight1handler.go
Original file line number Diff line number Diff line change
Expand Up @@ -160,6 +160,33 @@ func flight1Generate(ctx context.Context, c flightConn, state *State, _ *handsha
})
cipherSuites = cipherSuites[:cut(len(cipherSuites))]

// At least one ECC cipher suite needs to be retained for compatibilty
// with the server's ECC certificate. Select from the ECC cipher suites
// currently returned by defaultCipherSuites.

eccCipherSuites := []uint16{
uint16(TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256),
uint16(TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA),
uint16(TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384),
}
hasECC := false
checkECCLoop:
for _, cipherSuite := range cipherSuites {
for _, eccCipherSuite := range eccCipherSuites {
if cipherSuite == eccCipherSuite {
hasECC = true
break checkECCLoop
}
}
}
if !hasECC {
eccCipherSuite := eccCipherSuites[PRNG.Intn(len(eccCipherSuites))]
cipherSuites = append(cipherSuites, eccCipherSuite)
PRNG.Shuffle(len(cipherSuites), func(i, j int) {
cipherSuites[i], cipherSuites[j] = cipherSuites[j], cipherSuites[i]
})
}

for _, ext := range extensions {
switch e := ext.(type) {
case *extension.SupportedSignatureAlgorithms:
Expand Down
27 changes: 27 additions & 0 deletions vendor/github.com/pion/dtls/v2/flight1handler.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 216c6b2

Please sign in to comment.