Skip to content

Commit

Permalink
Remove local LAN address ICE candidates
Browse files Browse the repository at this point in the history
Unfortunately, the "public" RTCIceTransportPolicy was removed.

https://developer.mozilla.org/en-US/docs/Web/API/RTCConfiguration#RTCIceTransportPolicy_enum

Trac: 19026
  • Loading branch information
arlolra committed Jan 31, 2020
1 parent 564d1c8 commit 71934f1
Show file tree
Hide file tree
Showing 4 changed files with 81 additions and 13 deletions.
26 changes: 19 additions & 7 deletions client/lib/lib_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -288,15 +288,15 @@ func TestSnowflakeClient(t *testing.T) {
fakeOffer := deserializeSessionDescription(`{"type":"offer","sdp":"test"}`)

Convey("Construct BrokerChannel with no front domain", func() {
b, err := NewBrokerChannel("test.broker", "", transport)
b, err := NewBrokerChannel("test.broker", "", transport, false)
So(b.url, ShouldNotBeNil)
So(err, ShouldBeNil)
So(b.url.Path, ShouldResemble, "test.broker")
So(b.transport, ShouldNotBeNil)
})

Convey("Construct BrokerChannel *with* front domain", func() {
b, err := NewBrokerChannel("test.broker", "front", transport)
b, err := NewBrokerChannel("test.broker", "front", transport, false)
So(b.url, ShouldNotBeNil)
So(err, ShouldBeNil)
So(b.url.Path, ShouldResemble, "test.broker")
Expand All @@ -305,7 +305,7 @@ func TestSnowflakeClient(t *testing.T) {
})

Convey("BrokerChannel.Negotiate responds with answer", func() {
b, err := NewBrokerChannel("test.broker", "", transport)
b, err := NewBrokerChannel("test.broker", "", transport, false)
So(err, ShouldBeNil)
answer, err := b.Negotiate(fakeOffer)
So(err, ShouldBeNil)
Expand All @@ -315,7 +315,8 @@ func TestSnowflakeClient(t *testing.T) {

Convey("BrokerChannel.Negotiate fails with 503", func() {
b, err := NewBrokerChannel("test.broker", "",
&MockTransport{http.StatusServiceUnavailable, []byte("\n")})
&MockTransport{http.StatusServiceUnavailable, []byte("\n")},
false)
So(err, ShouldBeNil)
answer, err := b.Negotiate(fakeOffer)
So(err, ShouldNotBeNil)
Expand All @@ -325,7 +326,8 @@ func TestSnowflakeClient(t *testing.T) {

Convey("BrokerChannel.Negotiate fails with 400", func() {
b, err := NewBrokerChannel("test.broker", "",
&MockTransport{http.StatusBadRequest, []byte("\n")})
&MockTransport{http.StatusBadRequest, []byte("\n")},
false)
So(err, ShouldBeNil)
answer, err := b.Negotiate(fakeOffer)
So(err, ShouldNotBeNil)
Expand All @@ -335,7 +337,8 @@ func TestSnowflakeClient(t *testing.T) {

Convey("BrokerChannel.Negotiate fails with large read", func() {
b, err := NewBrokerChannel("test.broker", "",
&MockTransport{http.StatusOK, make([]byte, 100001, 100001)})
&MockTransport{http.StatusOK, make([]byte, 100001, 100001)},
false)
So(err, ShouldBeNil)
answer, err := b.Negotiate(fakeOffer)
So(err, ShouldNotBeNil)
Expand All @@ -345,12 +348,21 @@ func TestSnowflakeClient(t *testing.T) {

Convey("BrokerChannel.Negotiate fails with unexpected error", func() {
b, err := NewBrokerChannel("test.broker", "",
&MockTransport{123, []byte("")})
&MockTransport{123, []byte("")}, false)
So(err, ShouldBeNil)
answer, err := b.Negotiate(fakeOffer)
So(err, ShouldNotBeNil)
So(answer, ShouldBeNil)
So(err.Error(), ShouldResemble, BrokerErrorUnexpected)
})
})

Convey("Strip", t, func() {
const sampleSDP2 = `"v=0\r\no=- 4358805017720277108 2 IN IP4 8.8.8.8\r\ns=-\r\nt=0 0\r\na=group:BUNDLE data\r\na=msid-semantic: WMS\r\nm=application 56688 DTLS/SCTP 5000\r\nc=IN IP4 8.8.8.8\r\na=candidate:3769337065 1 udp 2122260223 192.168.0.100 56688 typ host generation 0 network-id 1 network-cost 50\r\na=ice-ufrag:aMAZ\r\na=ice-pwd:jcHb08Jjgrazp2dzjdrvPPvV\r\na=ice-options:trickle\r\na=fingerprint:sha-256 C8:88:EE:B9:E7:02:2E:21:37:ED:7A:D1:EB:2B:A3:15:A2:3B:5B:1C:3D:D4:D5:1F:06:CF:52:40:03:F8:DD:66\r\na=setup:actpass\r\na=mid:data\r\na=sctpmap:5000 webrtc-datachannel 1024\r\n"`
const sampleOffer = `{"type":"offer","sdp":` + sampleSDP2 + `}`
const strippedSDP2 = `"v=0\r\no=- 4358805017720277108 2 IN IP4 8.8.8.8\r\ns=-\r\nt=0 0\r\na=group:BUNDLE data\r\na=msid-semantic: WMS\r\nm=application 56688 DTLS/SCTP 5000\r\nc=IN IP4 8.8.8.8\r\na=ice-ufrag:aMAZ\r\na=ice-pwd:jcHb08Jjgrazp2dzjdrvPPvV\r\na=ice-options:trickle\r\na=fingerprint:sha-256 C8:88:EE:B9:E7:02:2E:21:37:ED:7A:D1:EB:2B:A3:15:A2:3B:5B:1C:3D:D4:D5:1F:06:CF:52:40:03:F8:DD:66\r\na=setup:actpass\r\na=mid:data\r\na=sctpmap:5000 webrtc-datachannel 1024\r\n"`
const strippedOffer = `{"type":"offer","sdp":` + strippedSDP2 + `}`
So(stripLocalAddresses(sampleOffer), ShouldEqual, strippedOffer)
})

}
64 changes: 59 additions & 5 deletions client/lib/rendezvous.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,9 +14,12 @@ import (
"io"
"io/ioutil"
"log"
"net"
"net/http"
"net/url"
"regexp"

"github.com/pion/sdp"
"github.com/pion/webrtc"
)

Expand All @@ -31,9 +34,10 @@ const (
type BrokerChannel struct {
// The Host header to put in the HTTP request (optional and may be
// different from the host name in URL).
Host string
url *url.URL
transport http.RoundTripper // Used to make all requests.
Host string
url *url.URL
transport http.RoundTripper // Used to make all requests.
keepLocalAddresses bool
}

// We make a copy of DefaultTransport because we want the default Dial
Expand All @@ -48,7 +52,7 @@ func CreateBrokerTransport() http.RoundTripper {
// Construct a new BrokerChannel, where:
// |broker| is the full URL of the facilitating program which assigns proxies
// to clients, and |front| is the option fronting domain.
func NewBrokerChannel(broker string, front string, transport http.RoundTripper) (*BrokerChannel, error) {
func NewBrokerChannel(broker string, front string, transport http.RoundTripper, keepLocalAddresses bool) (*BrokerChannel, error) {
targetURL, err := url.Parse(broker)
if err != nil {
return nil, err
Expand All @@ -63,6 +67,7 @@ func NewBrokerChannel(broker string, front string, transport http.RoundTripper)
}

bc.transport = transport
bc.keepLocalAddresses = keepLocalAddresses
return bc, nil
}

Expand All @@ -76,6 +81,42 @@ func limitedRead(r io.Reader, limit int64) ([]byte, error) {
return p, err
}

// Stolen from https://github.com/golang/go/pull/30278
func IsLocal(ip net.IP) bool {
if ip4 := ip.To4(); ip4 != nil {
// Local IPv4 addresses are defined in https://tools.ietf.org/html/rfc1918
return ip4[0] == 10 ||
(ip4[0] == 172 && ip4[1]&0xf0 == 16) ||
(ip4[0] == 192 && ip4[1] == 168)
}
// Local IPv6 addresses are defined in https://tools.ietf.org/html/rfc4193
return len(ip) == net.IPv6len && ip[0]&0xfe == 0xfc
}

// Removes local LAN address ICE candidates
func stripLocalAddresses(str string) string {
re := regexp.MustCompile(`a=candidate:.*?\\r\\n`)
return re.ReplaceAllStringFunc(str, func(s string) string {
t := s[len("a=candidate:") : len(s)-len("\\r\\n")]
var ice sdp.ICECandidate
err := ice.Unmarshal(t)
if err != nil {
return s
}
if ice.Typ == "host" {
ip := net.ParseIP(ice.Address)
if ip == nil {
return s
}
// FIXME: Should this check ip.IsLoopback() and others?
if IsLocal(ip) {
return ""
}
}
return s
})
}

// Roundtrip HTTP POST using WebRTC SessionDescriptions.
//
// Send an SDP offer to the broker, which assigns a proxy and responds
Expand All @@ -84,7 +125,20 @@ func (bc *BrokerChannel) Negotiate(offer *webrtc.SessionDescription) (
*webrtc.SessionDescription, error) {
log.Println("Negotiating via BrokerChannel...\nTarget URL: ",
bc.Host, "\nFront URL: ", bc.url.Host)
data := bytes.NewReader([]byte(serializeSessionDescription(offer)))
str := serializeSessionDescription(offer)
// Ideally, we could specify an `RTCIceTransportPolicy` that would handle
// this for us. However, "public" was removed from the draft spec.
// See https://developer.mozilla.org/en-US/docs/Web/API/RTCConfiguration#RTCIceTransportPolicy_enum
//
// FIXME: We are stripping local addresses from the JSON serialized string,
// which is expedient but unsatisfying. We could advocate upstream to
// implement a non-standard ICE transport policy, or to somehow alter
// APIs to avoid adding the undesirable candidates or a method to filter
// them from the marshalled session description.
if !bc.keepLocalAddresses {
str = stripLocalAddresses(str)
}
data := bytes.NewReader([]byte(str))
// Suffix with broker's client registration handler.
clientURL := bc.url.ResolveReference(&url.URL{Path: "client"})
request, err := http.NewRequest("POST", clientURL.String(), data)
Expand Down
3 changes: 2 additions & 1 deletion client/snowflake.go
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,7 @@ func main() {
frontDomain := flag.String("front", "", "front domain")
logFilename := flag.String("log", "", "name of log file")
logToStateDir := flag.Bool("logToStateDir", false, "resolve the log file relative to tor's pt state dir")
keepLocalAddresses := flag.Bool("keepLocalAddresses", false, "keep local LAN address ICE candidates")
max := flag.Int("max", DefaultSnowflakeCapacity,
"capacity for number of multiplexed WebRTC peers")
flag.Parse()
Expand Down Expand Up @@ -133,7 +134,7 @@ func main() {
snowflakes := sf.NewPeers(*max)

// Use potentially domain-fronting broker to rendezvous.
broker, err := sf.NewBrokerChannel(*brokerURL, *frontDomain, sf.CreateBrokerTransport())
broker, err := sf.NewBrokerChannel(*brokerURL, *frontDomain, sf.CreateBrokerTransport(), *keepLocalAddresses)
if err != nil {
log.Fatalf("parsing broker URL: %v", err)
}
Expand Down
1 change: 1 addition & 0 deletions client/torrc-localhost
Original file line number Diff line number Diff line change
Expand Up @@ -3,5 +3,6 @@ DataDirectory datadir

ClientTransportPlugin snowflake exec ./client \
-url http://localhost:8080/ \
-keepLocalAddresses

Bridge snowflake 0.0.3.0:1

0 comments on commit 71934f1

Please sign in to comment.