OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/core/crypto/quic_crypto_client_config.h" | 5 #include "net/quic/core/crypto/quic_crypto_client_config.h" |
6 | 6 |
7 #include <memory> | 7 #include <memory> |
8 | 8 |
9 #include "base/metrics/histogram_macros.h" | 9 #include "base/metrics/histogram_macros.h" |
10 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
59 : proof_verifier_(std::move(proof_verifier)) { | 59 : proof_verifier_(std::move(proof_verifier)) { |
60 DCHECK(proof_verifier_.get()); | 60 DCHECK(proof_verifier_.get()); |
61 SetDefaults(); | 61 SetDefaults(); |
62 } | 62 } |
63 | 63 |
64 QuicCryptoClientConfig::~QuicCryptoClientConfig() { | 64 QuicCryptoClientConfig::~QuicCryptoClientConfig() { |
65 base::STLDeleteValues(&cached_states_); | 65 base::STLDeleteValues(&cached_states_); |
66 } | 66 } |
67 | 67 |
68 QuicCryptoClientConfig::CachedState::CachedState() | 68 QuicCryptoClientConfig::CachedState::CachedState() |
69 : server_config_valid_(false), generation_counter_(0) {} | 69 : server_config_valid_(false), |
| 70 expiration_time_(QuicWallTime::Zero()), |
| 71 generation_counter_(0) {} |
70 | 72 |
71 QuicCryptoClientConfig::CachedState::~CachedState() {} | 73 QuicCryptoClientConfig::CachedState::~CachedState() {} |
72 | 74 |
73 bool QuicCryptoClientConfig::CachedState::IsComplete(QuicWallTime now) const { | 75 bool QuicCryptoClientConfig::CachedState::IsComplete(QuicWallTime now) const { |
74 if (server_config_.empty()) { | 76 if (server_config_.empty()) { |
75 RecordInchoateClientHelloReason(SERVER_CONFIG_EMPTY); | 77 RecordInchoateClientHelloReason(SERVER_CONFIG_EMPTY); |
76 return false; | 78 return false; |
77 } | 79 } |
78 | 80 |
79 if (!server_config_valid_) { | 81 if (!server_config_valid_) { |
80 RecordInchoateClientHelloReason(SERVER_CONFIG_INVALID); | 82 RecordInchoateClientHelloReason(SERVER_CONFIG_INVALID); |
81 return false; | 83 return false; |
82 } | 84 } |
83 | 85 |
84 const CryptoHandshakeMessage* scfg = GetServerConfig(); | 86 const CryptoHandshakeMessage* scfg = GetServerConfig(); |
85 if (!scfg) { | 87 if (!scfg) { |
86 // Should be impossible short of cache corruption. | 88 // Should be impossible short of cache corruption. |
87 DCHECK(false); | 89 DCHECK(false); |
88 RecordInchoateClientHelloReason(SERVER_CONFIG_CORRUPTED); | 90 RecordInchoateClientHelloReason(SERVER_CONFIG_CORRUPTED); |
89 return false; | 91 return false; |
90 } | 92 } |
91 | 93 |
92 uint64_t expiry_seconds; | 94 if (now.IsAfter(expiration_time_)) { |
93 if (scfg->GetUint64(kEXPY, &expiry_seconds) != QUIC_NO_ERROR) { | |
94 RecordInchoateClientHelloReason(SERVER_CONFIG_INVALID_EXPIRY); | |
95 return false; | |
96 } | |
97 if (now.ToUNIXSeconds() >= expiry_seconds) { | |
98 UMA_HISTOGRAM_CUSTOM_TIMES( | 95 UMA_HISTOGRAM_CUSTOM_TIMES( |
99 "Net.QuicClientHelloServerConfig.InvalidDuration", | 96 "Net.QuicClientHelloServerConfig.InvalidDuration", |
100 base::TimeDelta::FromSeconds(now.ToUNIXSeconds() - expiry_seconds), | 97 base::TimeDelta::FromSeconds(now.ToUNIXSeconds() - |
| 98 expiration_time_.ToUNIXSeconds()), |
101 base::TimeDelta::FromMinutes(1), base::TimeDelta::FromDays(20), 50); | 99 base::TimeDelta::FromMinutes(1), base::TimeDelta::FromDays(20), 50); |
102 RecordInchoateClientHelloReason(SERVER_CONFIG_EXPIRED); | 100 RecordInchoateClientHelloReason(SERVER_CONFIG_EXPIRED); |
103 return false; | 101 return false; |
104 } | 102 } |
105 | 103 |
106 return true; | 104 return true; |
107 } | 105 } |
108 | 106 |
109 bool QuicCryptoClientConfig::CachedState::IsEmpty() const { | 107 bool QuicCryptoClientConfig::CachedState::IsEmpty() const { |
110 return server_config_.empty(); | 108 return server_config_.empty(); |
(...skipping 27 matching lines...) Expand all Loading... |
138 server_nonces_.push(server_nonce); | 136 server_nonces_.push(server_nonce); |
139 } | 137 } |
140 | 138 |
141 bool QuicCryptoClientConfig::CachedState::has_server_nonce() const { | 139 bool QuicCryptoClientConfig::CachedState::has_server_nonce() const { |
142 return !server_nonces_.empty(); | 140 return !server_nonces_.empty(); |
143 } | 141 } |
144 | 142 |
145 QuicCryptoClientConfig::CachedState::ServerConfigState | 143 QuicCryptoClientConfig::CachedState::ServerConfigState |
146 QuicCryptoClientConfig::CachedState::SetServerConfig(StringPiece server_config, | 144 QuicCryptoClientConfig::CachedState::SetServerConfig(StringPiece server_config, |
147 QuicWallTime now, | 145 QuicWallTime now, |
| 146 QuicWallTime expiry_time, |
148 string* error_details) { | 147 string* error_details) { |
149 const bool matches_existing = server_config == server_config_; | 148 const bool matches_existing = server_config == server_config_; |
150 | 149 |
151 // Even if the new server config matches the existing one, we still wish to | 150 // Even if the new server config matches the existing one, we still wish to |
152 // reject it if it has expired. | 151 // reject it if it has expired. |
153 std::unique_ptr<CryptoHandshakeMessage> new_scfg_storage; | 152 std::unique_ptr<CryptoHandshakeMessage> new_scfg_storage; |
154 const CryptoHandshakeMessage* new_scfg; | 153 const CryptoHandshakeMessage* new_scfg; |
155 | 154 |
156 if (!matches_existing) { | 155 if (!matches_existing) { |
157 new_scfg_storage.reset(CryptoFramer::ParseMessage(server_config)); | 156 new_scfg_storage.reset(CryptoFramer::ParseMessage(server_config)); |
158 new_scfg = new_scfg_storage.get(); | 157 new_scfg = new_scfg_storage.get(); |
159 } else { | 158 } else { |
160 new_scfg = GetServerConfig(); | 159 new_scfg = GetServerConfig(); |
161 } | 160 } |
162 | 161 |
163 if (!new_scfg) { | 162 if (!new_scfg) { |
164 *error_details = "SCFG invalid"; | 163 *error_details = "SCFG invalid"; |
165 return SERVER_CONFIG_INVALID; | 164 return SERVER_CONFIG_INVALID; |
166 } | 165 } |
167 | 166 |
168 uint64_t expiry_seconds; | 167 if (expiry_time.IsZero()) { |
169 if (new_scfg->GetUint64(kEXPY, &expiry_seconds) != QUIC_NO_ERROR) { | 168 uint64_t expiry_seconds; |
170 *error_details = "SCFG missing EXPY"; | 169 if (new_scfg->GetUint64(kEXPY, &expiry_seconds) != QUIC_NO_ERROR) { |
171 return SERVER_CONFIG_INVALID_EXPIRY; | 170 *error_details = "SCFG missing EXPY"; |
| 171 return SERVER_CONFIG_INVALID_EXPIRY; |
| 172 } |
| 173 expiration_time_ = QuicWallTime::FromUNIXSeconds(expiry_seconds); |
| 174 } else { |
| 175 expiration_time_ = expiry_time; |
172 } | 176 } |
173 | 177 |
174 if (now.ToUNIXSeconds() >= expiry_seconds) { | 178 if (now.IsAfter(expiration_time_)) { |
175 *error_details = "SCFG has expired"; | 179 *error_details = "SCFG has expired"; |
176 return SERVER_CONFIG_EXPIRED; | 180 return SERVER_CONFIG_EXPIRED; |
177 } | 181 } |
178 | 182 |
179 if (!matches_existing) { | 183 if (!matches_existing) { |
180 server_config_ = server_config.as_string(); | 184 server_config_ = server_config.as_string(); |
181 SetProofInvalid(); | 185 SetProofInvalid(); |
182 scfg_.reset(new_scfg_storage.release()); | 186 scfg_.reset(new_scfg_storage.release()); |
183 } | 187 } |
184 return SERVER_CONFIG_VALID; | 188 return SERVER_CONFIG_VALID; |
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
252 ++generation_counter_; | 256 ++generation_counter_; |
253 } | 257 } |
254 | 258 |
255 bool QuicCryptoClientConfig::CachedState::Initialize( | 259 bool QuicCryptoClientConfig::CachedState::Initialize( |
256 StringPiece server_config, | 260 StringPiece server_config, |
257 StringPiece source_address_token, | 261 StringPiece source_address_token, |
258 const vector<string>& certs, | 262 const vector<string>& certs, |
259 StringPiece cert_sct, | 263 StringPiece cert_sct, |
260 StringPiece chlo_hash, | 264 StringPiece chlo_hash, |
261 StringPiece signature, | 265 StringPiece signature, |
262 QuicWallTime now) { | 266 QuicWallTime now, |
| 267 QuicWallTime expiration_time) { |
263 DCHECK(server_config_.empty()); | 268 DCHECK(server_config_.empty()); |
264 | 269 |
265 if (server_config.empty()) { | 270 if (server_config.empty()) { |
266 RecordDiskCacheServerConfigState(SERVER_CONFIG_EMPTY); | 271 RecordDiskCacheServerConfigState(SERVER_CONFIG_EMPTY); |
267 return false; | 272 return false; |
268 } | 273 } |
269 | 274 |
270 string error_details; | 275 string error_details; |
271 ServerConfigState state = SetServerConfig(server_config, now, &error_details); | 276 ServerConfigState state = |
| 277 SetServerConfig(server_config, now, expiration_time, &error_details); |
272 RecordDiskCacheServerConfigState(state); | 278 RecordDiskCacheServerConfigState(state); |
273 if (state != SERVER_CONFIG_VALID) { | 279 if (state != SERVER_CONFIG_VALID) { |
274 DVLOG(1) << "SetServerConfig failed with " << error_details; | 280 DVLOG(1) << "SetServerConfig failed with " << error_details; |
275 return false; | 281 return false; |
276 } | 282 } |
277 | 283 |
278 signature.CopyToString(&server_config_sig_); | 284 signature.CopyToString(&server_config_sig_); |
279 source_address_token.CopyToString(&source_address_token_); | 285 source_address_token.CopyToString(&source_address_token_); |
280 cert_sct.CopyToString(&cert_sct_); | 286 cert_sct.CopyToString(&cert_sct_); |
281 chlo_hash.CopyToString(&chlo_hash_); | 287 chlo_hash.CopyToString(&chlo_hash_); |
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
340 DCHECK(server_config_.empty()); | 346 DCHECK(server_config_.empty()); |
341 DCHECK(!server_config_valid_); | 347 DCHECK(!server_config_valid_); |
342 server_config_ = other.server_config_; | 348 server_config_ = other.server_config_; |
343 source_address_token_ = other.source_address_token_; | 349 source_address_token_ = other.source_address_token_; |
344 certs_ = other.certs_; | 350 certs_ = other.certs_; |
345 cert_sct_ = other.cert_sct_; | 351 cert_sct_ = other.cert_sct_; |
346 chlo_hash_ = other.chlo_hash_; | 352 chlo_hash_ = other.chlo_hash_; |
347 server_config_sig_ = other.server_config_sig_; | 353 server_config_sig_ = other.server_config_sig_; |
348 server_config_valid_ = other.server_config_valid_; | 354 server_config_valid_ = other.server_config_valid_; |
349 server_designated_connection_ids_ = other.server_designated_connection_ids_; | 355 server_designated_connection_ids_ = other.server_designated_connection_ids_; |
| 356 expiration_time_ = other.expiration_time_; |
350 if (other.proof_verify_details_.get() != nullptr) { | 357 if (other.proof_verify_details_.get() != nullptr) { |
351 proof_verify_details_.reset(other.proof_verify_details_->Clone()); | 358 proof_verify_details_.reset(other.proof_verify_details_->Clone()); |
352 } | 359 } |
353 ++generation_counter_; | 360 ++generation_counter_; |
354 } | 361 } |
355 | 362 |
356 QuicConnectionId | 363 QuicConnectionId |
357 QuicCryptoClientConfig::CachedState::GetNextServerDesignatedConnectionId() { | 364 QuicCryptoClientConfig::CachedState::GetNextServerDesignatedConnectionId() { |
358 if (server_designated_connection_ids_.empty()) { | 365 if (server_designated_connection_ids_.empty()) { |
359 QUIC_BUG | 366 QUIC_BUG |
(...skipping 363 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
723 CachedState* cached, | 730 CachedState* cached, |
724 string* error_details) { | 731 string* error_details) { |
725 DCHECK(error_details != nullptr); | 732 DCHECK(error_details != nullptr); |
726 | 733 |
727 StringPiece scfg; | 734 StringPiece scfg; |
728 if (!message.GetStringPiece(kSCFG, &scfg)) { | 735 if (!message.GetStringPiece(kSCFG, &scfg)) { |
729 *error_details = "Missing SCFG"; | 736 *error_details = "Missing SCFG"; |
730 return QUIC_CRYPTO_MESSAGE_PARAMETER_NOT_FOUND; | 737 return QUIC_CRYPTO_MESSAGE_PARAMETER_NOT_FOUND; |
731 } | 738 } |
732 | 739 |
| 740 QuicWallTime expiration_time = QuicWallTime::Zero(); |
| 741 uint64_t expiry_seconds; |
| 742 if (message.GetUint64(kSTTL, &expiry_seconds) == QUIC_NO_ERROR) { |
| 743 expiration_time = now.Add(QuicTime::Delta::FromSeconds(expiry_seconds)); |
| 744 } |
| 745 |
733 CachedState::ServerConfigState state = | 746 CachedState::ServerConfigState state = |
734 cached->SetServerConfig(scfg, now, error_details); | 747 cached->SetServerConfig(scfg, now, expiration_time, error_details); |
735 if (state == CachedState::SERVER_CONFIG_EXPIRED) { | 748 if (state == CachedState::SERVER_CONFIG_EXPIRED) { |
736 return QUIC_CRYPTO_SERVER_CONFIG_EXPIRED; | 749 return QUIC_CRYPTO_SERVER_CONFIG_EXPIRED; |
737 } | 750 } |
738 // TODO(rtenneti): Return more specific error code than returning | 751 // TODO(rtenneti): Return more specific error code than returning |
739 // QUIC_INVALID_CRYPTO_MESSAGE_PARAMETER. | 752 // QUIC_INVALID_CRYPTO_MESSAGE_PARAMETER. |
740 if (state != CachedState::SERVER_CONFIG_VALID) { | 753 if (state != CachedState::SERVER_CONFIG_VALID) { |
741 return QUIC_INVALID_CRYPTO_MESSAGE_PARAMETER; | 754 return QUIC_INVALID_CRYPTO_MESSAGE_PARAMETER; |
742 } | 755 } |
743 | 756 |
744 StringPiece token; | 757 StringPiece token; |
(...skipping 234 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
979 } | 992 } |
980 | 993 |
981 // Update canonical version to point at the "most recent" entry. | 994 // Update canonical version to point at the "most recent" entry. |
982 canonical_server_map_[suffix_server_id] = server_id; | 995 canonical_server_map_[suffix_server_id] = server_id; |
983 | 996 |
984 server_state->InitializeFrom(*canonical_state); | 997 server_state->InitializeFrom(*canonical_state); |
985 return true; | 998 return true; |
986 } | 999 } |
987 | 1000 |
988 } // namespace net | 1001 } // namespace net |
OLD | NEW |