Skip to content

Commit

Permalink
feat(oohelperd): follow (and record) TH and probe endpoints (#890)
Browse files Browse the repository at this point in the history
This diff introduces the following `oohelperd` enhancements:

1. measure both IP addresses resolved by the TH and IP addresses resolved by the probe;

2. when the URL scheme is http and there's no explicit port, measure both 80 and 443 (which will pay off big once we introduce support for optionally performing TLS handshakes);

3. include information about the probe and TH IP addresses into the results: who resolved each IP address, whether an address is a bogon, the ASN associated to an address.

This diff is part of ooni/probe#2237
  • Loading branch information
bassosimone authored Aug 28, 2022
1 parent 867a243 commit df0e099
Show file tree
Hide file tree
Showing 7 changed files with 401 additions and 21 deletions.
2 changes: 1 addition & 1 deletion internal/cmd/oohelperd/handler_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ const requestWithoutDomainName = `{
]
}`

func TestWorkingAsIntended(t *testing.T) {
func TestHandlerWorkingAsIntended(t *testing.T) {
handler := &handler{
MaxAcceptableBody: 1 << 24,
NewClient: func() model.HTTPClient {
Expand Down
98 changes: 98 additions & 0 deletions internal/cmd/oohelperd/ipinfo.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,98 @@
package main

//
// Generates IP and endpoint information.
//

import (
"net"
"net/url"
"sort"
"strings"

"github.com/ooni/probe-cli/v3/internal/engine/experiment/webconnectivity"
"github.com/ooni/probe-cli/v3/internal/engine/geolocate"
"github.com/ooni/probe-cli/v3/internal/netxlite"
)

// newIPInfo creates an IP to IPInfo mapping from addresses resolved
// by the probe (inside [creq]) or the TH (inside [addrs]).
func newIPInfo(creq *ctrlRequest, addrs []string) map[string]*webconnectivity.ControlIPInfo {
discoveredby := make(map[string]int64)
for _, epnt := range creq.TCPConnect {
addr, _, err := net.SplitHostPort(epnt)
if err != nil || net.ParseIP(addr) == nil {
continue
}
discoveredby[addr] |= webconnectivity.ControlIPInfoFlagResolvedByProbe
}
for _, addr := range addrs {
if net.ParseIP(addr) != nil {
discoveredby[addr] |= webconnectivity.ControlIPInfoFlagResolvedByTH
}
}
ipinfo := make(map[string]*webconnectivity.ControlIPInfo)
for addr, flags := range discoveredby {
if netxlite.IsBogon(addr) { // note: we already excluded non-IP addrs above
flags |= webconnectivity.ControlIPInfoFlagIsBogon
}
asn, _, _ := geolocate.LookupASN(addr) // AS0 on failure
ipinfo[addr] = &webconnectivity.ControlIPInfo{
ASN: int64(asn),
Flags: flags,
}
}
return ipinfo
}

// endpointInfo contains info about an endpoint to measure
type endpointInfo struct {
// Addr is the address to measure
Addr string

// Epnt is the endpoint to measure
Epnt string
}

// ipInfoToEndpoints takes in input the [ipinfo] returned by newIPInfo
// and the [URL] provided by the probe to generate the list of endpoints
// to measure. We choose ports as follows:
//
// 1. if the input URL contains a port, we use such a port;
//
// 2. if the input URL scheme is "https", we choose port 443;
//
// 3. if the input URL scheme is "http", we use both 443 and 80, which
// allows us to include in the measurement information useful to determine
// whether an IP address is valid for a domain;
//
// 4. otherwise, we don't generate any endpoint to measure.
func ipInfoToEndpoints(URL *url.URL, ipinfo map[string]*webconnectivity.ControlIPInfo) []endpointInfo {
var ports []string
if port := URL.Port(); port != "" {
ports = []string{port} // as documented
} else if URL.Scheme == "https" {
ports = []string{"443"} // as documented
} else if URL.Scheme == "http" {
ports = []string{"80", "443"} // as documented
}
out := []endpointInfo{}
for addr, info := range ipinfo {
if (info.Flags & webconnectivity.ControlIPInfoFlagIsBogon) != 0 {
continue // as documented
}
for _, port := range ports {
epnt := net.JoinHostPort(addr, port)
out = append(out, endpointInfo{
Addr: addr,
Epnt: epnt,
})
}
}
// sort the output to make testing work deterministically since iterating
// a map in golang isn't guaranteed to return ordered keys
sort.SliceStable(out, func(i, j int) bool {
return strings.Compare(out[i].Epnt, out[j].Epnt) < 0
})
return out
}
240 changes: 240 additions & 0 deletions internal/cmd/oohelperd/ipinfo_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,240 @@
package main

import (
"net/url"
"testing"

"github.com/google/go-cmp/cmp"
"github.com/ooni/probe-cli/v3/internal/engine/experiment/webconnectivity"
)

func Test_newIPInfo(t *testing.T) {
type args struct {
creq *ctrlRequest
addrs []string
}
tests := []struct {
name string
args args
want map[string]*webconnectivity.ControlIPInfo
}{{
name: "with empty input",
args: args{
creq: &webconnectivity.ControlRequest{
HTTPRequest: "",
HTTPRequestHeaders: map[string][]string{},
TCPConnect: []string{},
},
addrs: []string{},
},
want: map[string]*webconnectivity.ControlIPInfo{},
}, {
name: "typical case with also bogons",
args: args{
creq: &webconnectivity.ControlRequest{
HTTPRequest: "",
HTTPRequestHeaders: map[string][]string{},
TCPConnect: []string{
"10.0.0.1:443",
"8.8.8.8:443",
},
},
addrs: []string{
"8.8.8.8",
"8.8.4.4",
},
},
want: map[string]*webconnectivity.ControlIPInfo{
"10.0.0.1": {
ASN: 0,
Flags: webconnectivity.ControlIPInfoFlagIsBogon | webconnectivity.ControlIPInfoFlagResolvedByProbe,
},
"8.8.8.8": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByProbe | webconnectivity.ControlIPInfoFlagResolvedByTH,
},
"8.8.4.4": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByTH,
},
},
}, {
name: "with invalid endpoint",
args: args{
creq: &webconnectivity.ControlRequest{
HTTPRequest: "",
HTTPRequestHeaders: map[string][]string{},
TCPConnect: []string{
"1.2.3.4",
},
},
addrs: []string{},
},
want: map[string]*webconnectivity.ControlIPInfo{},
}, {
name: "with invalid IP addr",
args: args{
creq: &webconnectivity.ControlRequest{
HTTPRequest: "",
HTTPRequestHeaders: map[string][]string{},
TCPConnect: []string{
"dns.google:443",
},
},
addrs: []string{},
},
want: map[string]*webconnectivity.ControlIPInfo{},
}}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got := newIPInfo(tt.args.creq, tt.args.addrs)
if diff := cmp.Diff(tt.want, got); diff != "" {
t.Fatal(diff)
}
})
}
}

func Test_ipInfoToEndpoints(t *testing.T) {
type args struct {
URL *url.URL
ipinfo map[string]*webconnectivity.ControlIPInfo
}
tests := []struct {
name string
args args
want []endpointInfo
}{{
name: "with nil map and empty URL",
args: args{
URL: &url.URL{},
ipinfo: nil,
},
want: []endpointInfo{},
}, {
name: "with empty map and empty URL",
args: args{
URL: &url.URL{},
ipinfo: map[string]*webconnectivity.ControlIPInfo{},
},
want: []endpointInfo{},
}, {
name: "with http scheme, bogons, and and no port",
args: args{
URL: &url.URL{
Scheme: "http",
},
ipinfo: map[string]*webconnectivity.ControlIPInfo{
"10.0.0.1": {
ASN: 0,
Flags: webconnectivity.ControlIPInfoFlagIsBogon | webconnectivity.ControlIPInfoFlagResolvedByProbe,
},
"8.8.8.8": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByProbe | webconnectivity.ControlIPInfoFlagResolvedByTH,
},
"8.8.4.4": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByTH,
},
},
},
want: []endpointInfo{{
Addr: "8.8.4.4",
Epnt: "8.8.4.4:443",
}, {
Addr: "8.8.4.4",
Epnt: "8.8.4.4:80",
}, {
Addr: "8.8.8.8",
Epnt: "8.8.8.8:443",
}, {
Addr: "8.8.8.8",
Epnt: "8.8.8.8:80",
}},
}, {
name: "with bogons and explicit port",
args: args{
URL: &url.URL{
Host: "dns.google:5432",
},
ipinfo: map[string]*webconnectivity.ControlIPInfo{
"10.0.0.1": {
ASN: 0,
Flags: webconnectivity.ControlIPInfoFlagIsBogon | webconnectivity.ControlIPInfoFlagResolvedByProbe,
},
"8.8.8.8": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByProbe | webconnectivity.ControlIPInfoFlagResolvedByTH,
},
"8.8.4.4": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByTH,
},
},
},
want: []endpointInfo{{
Addr: "8.8.4.4",
Epnt: "8.8.4.4:5432",
}, {
Addr: "8.8.8.8",
Epnt: "8.8.8.8:5432",
}},
}, {
name: "with addresses and some bogons, no port, and unknown scheme",
args: args{
URL: &url.URL{},
ipinfo: map[string]*webconnectivity.ControlIPInfo{
"10.0.0.1": {
ASN: 0,
Flags: webconnectivity.ControlIPInfoFlagIsBogon | webconnectivity.ControlIPInfoFlagResolvedByProbe,
},
"8.8.8.8": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByProbe | webconnectivity.ControlIPInfoFlagResolvedByTH,
},
"8.8.4.4": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByTH,
},
},
},
want: []endpointInfo{},
}, {
name: "with addresses and some bogons, no port, and https scheme",
args: args{
URL: &url.URL{
Scheme: "https",
},
ipinfo: map[string]*webconnectivity.ControlIPInfo{
"10.0.0.1": {
ASN: 0,
Flags: webconnectivity.ControlIPInfoFlagIsBogon | webconnectivity.ControlIPInfoFlagResolvedByProbe,
},
"8.8.8.8": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByProbe | webconnectivity.ControlIPInfoFlagResolvedByTH,
},
"8.8.4.4": {
ASN: 15169,
Flags: webconnectivity.ControlIPInfoFlagResolvedByTH,
},
},
},
want: []endpointInfo{{
Addr: "8.8.4.4",
Epnt: "8.8.4.4:443",
}, {
Addr: "8.8.8.8",
Epnt: "8.8.8.8:443",
}},
}}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got := ipInfoToEndpoints(tt.args.URL, tt.args.ipinfo)
if diff := cmp.Diff(tt.want, got); diff != "" {
t.Fatal(diff)
}
})
}
}
2 changes: 1 addition & 1 deletion internal/cmd/oohelperd/main_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ import (
"github.com/ooni/probe-cli/v3/internal/runtimex"
)

func TestWorkAsIntended(t *testing.T) {
func TestMainWorkingAsIntended(t *testing.T) {
// let the kernel pick a random free port
*endpoint = "127.0.0.1:0"

Expand Down
17 changes: 11 additions & 6 deletions internal/cmd/oohelperd/measure.go
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ func measure(ctx context.Context, config *handler, creq *ctrlRequest) (*ctrlResp
wg.Wait()

// start assembling the response
cresp := new(ctrlResponse)
cresp := &ctrlResponse{}
select {
case cresp.DNS = <-dnsch:
default:
Expand All @@ -59,12 +59,17 @@ func measure(ctx context.Context, config *handler, creq *ctrlRequest) (*ctrlResp
}
}

// tcpconnect: start
tcpconnch := make(chan tcpResultPair, len(creq.TCPConnect))
for _, endpoint := range creq.TCPConnect {
// obtain IP info and figure out the endpoints measurement plan
cresp.IPInfo = newIPInfo(creq, cresp.DNS.Addrs)
endpoints := ipInfoToEndpoints(URL, cresp.IPInfo)

// tcpconnect: start over all the endpoints
tcpconnch := make(chan *tcpResultPair, len(endpoints))
for _, endpoint := range endpoints {
wg.Add(1)
go tcpDo(ctx, &tcpConfig{
Endpoint: endpoint,
Address: endpoint.Addr,
Endpoint: endpoint.Epnt,
NewDialer: config.NewDialer,
Out: tcpconnch,
Wg: wg,
Expand Down Expand Up @@ -93,7 +98,7 @@ Loop:
for {
select {
case tcpconn := <-tcpconnch:
cresp.TCPConnect[tcpconn.Endpoint] = tcpconn.Result
cresp.TCPConnect[tcpconn.Endpoint] = tcpconn.TCP
default:
break Loop
}
Expand Down
Loading

0 comments on commit df0e099

Please sign in to comment.