ipc.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. package main
  2. import (
  3. "container/heap"
  4. "encoding/hex"
  5. "fmt"
  6. "log"
  7. "time"
  8. "gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/v2/common/bridgefingerprint"
  9. "gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/v2/common/constants"
  10. "github.com/prometheus/client_golang/prometheus"
  11. "gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/v2/common/messages"
  12. )
  13. const (
  14. ClientTimeout = constants.BrokerClientTimeout
  15. ProxyTimeout = 10
  16. NATUnknown = "unknown"
  17. NATRestricted = "restricted"
  18. NATUnrestricted = "unrestricted"
  19. )
  20. type IPC struct {
  21. ctx *BrokerContext
  22. }
  23. func (i *IPC) Debug(_ interface{}, response *string) error {
  24. var unknowns int
  25. var natRestricted, natUnrestricted, natUnknown int
  26. proxyTypes := make(map[string]int)
  27. i.ctx.snowflakeLock.Lock()
  28. s := fmt.Sprintf("current snowflakes available: %d\n", len(i.ctx.idToSnowflake))
  29. for _, snowflake := range i.ctx.idToSnowflake {
  30. if messages.KnownProxyTypes[snowflake.proxyType] {
  31. proxyTypes[snowflake.proxyType]++
  32. } else {
  33. unknowns++
  34. }
  35. switch snowflake.natType {
  36. case NATRestricted:
  37. natRestricted++
  38. case NATUnrestricted:
  39. natUnrestricted++
  40. default:
  41. natUnknown++
  42. }
  43. }
  44. i.ctx.snowflakeLock.Unlock()
  45. for pType, num := range proxyTypes {
  46. s += fmt.Sprintf("\t%s proxies: %d\n", pType, num)
  47. }
  48. s += fmt.Sprintf("\tunknown proxies: %d", unknowns)
  49. s += fmt.Sprintf("\nNAT Types available:")
  50. s += fmt.Sprintf("\n\trestricted: %d", natRestricted)
  51. s += fmt.Sprintf("\n\tunrestricted: %d", natUnrestricted)
  52. s += fmt.Sprintf("\n\tunknown: %d", natUnknown)
  53. *response = s
  54. return nil
  55. }
  56. func (i *IPC) ProxyPolls(arg messages.Arg, response *[]byte) error {
  57. sid, proxyType, natType, clients, relayPattern, relayPatternSupported, err := messages.DecodeProxyPollRequestWithRelayPrefix(arg.Body)
  58. if err != nil {
  59. return messages.ErrBadRequest
  60. }
  61. if !relayPatternSupported {
  62. i.ctx.metrics.lock.Lock()
  63. i.ctx.metrics.proxyPollWithoutRelayURLExtension++
  64. i.ctx.metrics.promMetrics.ProxyPollWithoutRelayURLExtensionTotal.With(prometheus.Labels{"nat": natType, "type": proxyType}).Inc()
  65. i.ctx.metrics.lock.Unlock()
  66. } else {
  67. i.ctx.metrics.lock.Lock()
  68. i.ctx.metrics.proxyPollWithRelayURLExtension++
  69. i.ctx.metrics.promMetrics.ProxyPollWithRelayURLExtensionTotal.With(prometheus.Labels{"nat": natType, "type": proxyType}).Inc()
  70. i.ctx.metrics.lock.Unlock()
  71. }
  72. if !i.ctx.CheckProxyRelayPattern(relayPattern, !relayPatternSupported) {
  73. i.ctx.metrics.lock.Lock()
  74. i.ctx.metrics.proxyPollRejectedWithRelayURLExtension++
  75. i.ctx.metrics.promMetrics.ProxyPollRejectedForRelayURLExtensionTotal.With(prometheus.Labels{"nat": natType, "type": proxyType}).Inc()
  76. i.ctx.metrics.lock.Unlock()
  77. log.Printf("bad request: rejected relay pattern from proxy = %v", messages.ErrBadRequest)
  78. b, err := messages.EncodePollResponseWithRelayURL("", false, "", "", "incorrect relay pattern")
  79. *response = b
  80. if err != nil {
  81. return messages.ErrInternal
  82. }
  83. return nil
  84. }
  85. // Log geoip stats
  86. remoteIP := arg.RemoteAddr
  87. if err != nil {
  88. log.Println("Warning: cannot process proxy IP: ", err.Error())
  89. } else {
  90. i.ctx.metrics.lock.Lock()
  91. i.ctx.metrics.UpdateCountryStats(remoteIP, proxyType, natType)
  92. i.ctx.metrics.lock.Unlock()
  93. }
  94. var b []byte
  95. // Wait for a client to avail an offer to the snowflake, or timeout if nil.
  96. offer := i.ctx.RequestOffer(sid, proxyType, natType, clients)
  97. if offer == nil {
  98. i.ctx.metrics.lock.Lock()
  99. i.ctx.metrics.proxyIdleCount++
  100. i.ctx.metrics.promMetrics.ProxyPollTotal.With(prometheus.Labels{"nat": natType, "status": "idle"}).Inc()
  101. i.ctx.metrics.lock.Unlock()
  102. b, err = messages.EncodePollResponse("", false, "")
  103. if err != nil {
  104. return messages.ErrInternal
  105. }
  106. *response = b
  107. return nil
  108. }
  109. i.ctx.metrics.promMetrics.ProxyPollTotal.With(prometheus.Labels{"nat": natType, "status": "matched"}).Inc()
  110. var relayURL string
  111. bridgeFingerprint, err := bridgefingerprint.FingerprintFromBytes(offer.fingerprint)
  112. if err != nil {
  113. return messages.ErrBadRequest
  114. }
  115. if info, err := i.ctx.bridgeList.GetBridgeInfo(bridgeFingerprint); err != nil {
  116. return err
  117. } else {
  118. relayURL = info.WebSocketAddress
  119. }
  120. b, err = messages.EncodePollResponseWithRelayURL(string(offer.sdp), true, offer.natType, relayURL, "")
  121. if err != nil {
  122. return messages.ErrInternal
  123. }
  124. *response = b
  125. return nil
  126. }
  127. func sendClientResponse(resp *messages.ClientPollResponse, response *[]byte) error {
  128. data, err := resp.EncodePollResponse()
  129. if err != nil {
  130. log.Printf("error encoding answer")
  131. return messages.ErrInternal
  132. } else {
  133. *response = []byte(data)
  134. return nil
  135. }
  136. }
  137. func (i *IPC) ClientOffers(arg messages.Arg, response *[]byte) error {
  138. startTime := time.Now()
  139. req, err := messages.DecodeClientPollRequest(arg.Body)
  140. if err != nil {
  141. return sendClientResponse(&messages.ClientPollResponse{Error: err.Error()}, response)
  142. }
  143. offer := &ClientOffer{
  144. natType: req.NAT,
  145. sdp: []byte(req.Offer),
  146. }
  147. fingerprint, err := hex.DecodeString(req.Fingerprint)
  148. if err != nil {
  149. return sendClientResponse(&messages.ClientPollResponse{Error: err.Error()}, response)
  150. }
  151. BridgeFingerprint, err := bridgefingerprint.FingerprintFromBytes(fingerprint)
  152. if err != nil {
  153. return sendClientResponse(&messages.ClientPollResponse{Error: err.Error()}, response)
  154. }
  155. if _, err := i.ctx.GetBridgeInfo(BridgeFingerprint); err != nil {
  156. return sendClientResponse(
  157. &messages.ClientPollResponse{Error: err.Error()},
  158. response,
  159. )
  160. }
  161. offer.fingerprint = BridgeFingerprint.ToBytes()
  162. snowflake := i.matchSnowflake(offer.natType)
  163. if snowflake != nil {
  164. snowflake.offerChannel <- offer
  165. } else {
  166. i.ctx.metrics.lock.Lock()
  167. i.ctx.metrics.UpdateRendezvousStats(arg.RemoteAddr, arg.RendezvousMethod, offer.natType, false)
  168. i.ctx.metrics.lock.Unlock()
  169. resp := &messages.ClientPollResponse{Error: messages.StrNoProxies}
  170. return sendClientResponse(resp, response)
  171. }
  172. // Wait for the answer to be returned on the channel or timeout.
  173. select {
  174. case answer := <-snowflake.answerChannel:
  175. i.ctx.metrics.lock.Lock()
  176. i.ctx.metrics.UpdateRendezvousStats(arg.RemoteAddr, arg.RendezvousMethod, offer.natType, true)
  177. i.ctx.metrics.lock.Unlock()
  178. resp := &messages.ClientPollResponse{Answer: answer}
  179. err = sendClientResponse(resp, response)
  180. // Initial tracking of elapsed time.
  181. i.ctx.metrics.clientRoundtripEstimate = time.Since(startTime) / time.Millisecond
  182. case <-time.After(time.Second * ClientTimeout):
  183. log.Println("Client: Timed out.")
  184. resp := &messages.ClientPollResponse{Error: messages.StrTimedOut}
  185. err = sendClientResponse(resp, response)
  186. }
  187. i.ctx.snowflakeLock.Lock()
  188. i.ctx.metrics.promMetrics.AvailableProxies.With(prometheus.Labels{"nat": snowflake.natType, "type": snowflake.proxyType}).Dec()
  189. delete(i.ctx.idToSnowflake, snowflake.id)
  190. i.ctx.snowflakeLock.Unlock()
  191. return err
  192. }
  193. func (i *IPC) matchSnowflake(natType string) *Snowflake {
  194. i.ctx.snowflakeLock.Lock()
  195. defer i.ctx.snowflakeLock.Unlock()
  196. // Proiritize known restricted snowflakes for unrestricted clients
  197. if natType == NATUnrestricted && i.ctx.restrictedSnowflakes.Len() > 0 {
  198. return heap.Pop(i.ctx.restrictedSnowflakes).(*Snowflake)
  199. }
  200. if i.ctx.snowflakes.Len() > 0 {
  201. return heap.Pop(i.ctx.snowflakes).(*Snowflake)
  202. }
  203. return nil
  204. }
  205. func (i *IPC) ProxyAnswers(arg messages.Arg, response *[]byte) error {
  206. answer, id, err := messages.DecodeAnswerRequest(arg.Body)
  207. if err != nil || answer == "" {
  208. return messages.ErrBadRequest
  209. }
  210. var success = true
  211. i.ctx.snowflakeLock.Lock()
  212. snowflake, ok := i.ctx.idToSnowflake[id]
  213. i.ctx.snowflakeLock.Unlock()
  214. if !ok || snowflake == nil {
  215. // The snowflake took too long to respond with an answer, so its client
  216. // disappeared / the snowflake is no longer recognized by the Broker.
  217. success = false
  218. log.Printf("Warning: matching with snowflake client failed")
  219. }
  220. b, err := messages.EncodeAnswerResponse(success)
  221. if err != nil {
  222. log.Printf("Error encoding answer: %s", err.Error())
  223. return messages.ErrInternal
  224. }
  225. *response = b
  226. if success {
  227. snowflake.answerChannel <- answer
  228. }
  229. return nil
  230. }