2024-04-24 23:12:46 +08:00
|
|
|
//! This example demonstrates how to make a QUIC connection that ignores the server certificate.
|
|
|
|
|
//!
|
|
|
|
|
//! Checkout the `README.md` for guidance.
|
|
|
|
|
|
|
|
|
|
use std::{error::Error, net::SocketAddr, sync::Arc};
|
|
|
|
|
|
|
|
|
|
use crate::{
|
|
|
|
|
rpc::TunnelInfo,
|
2024-04-27 19:03:07 +08:00
|
|
|
tunnel::{
|
|
|
|
|
check_scheme_and_get_socket_addr_ext,
|
|
|
|
|
common::{FramedReader, FramedWriter, TunnelWrapper},
|
|
|
|
|
},
|
2024-04-24 23:12:46 +08:00
|
|
|
};
|
|
|
|
|
use anyhow::Context;
|
|
|
|
|
use quinn::{ClientConfig, Connection, Endpoint, ServerConfig};
|
|
|
|
|
|
|
|
|
|
use super::{
|
2024-04-27 19:03:07 +08:00
|
|
|
check_scheme_and_get_socket_addr, IpVersion, Tunnel, TunnelConnector, TunnelError,
|
|
|
|
|
TunnelListener,
|
2024-04-24 23:12:46 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
/// Dummy certificate verifier that treats any certificate as valid.
|
|
|
|
|
/// NOTE, such verification is vulnerable to MITM attacks, but convenient for testing.
|
|
|
|
|
struct SkipServerVerification;
|
|
|
|
|
|
|
|
|
|
impl SkipServerVerification {
|
|
|
|
|
fn new() -> Arc<Self> {
|
|
|
|
|
Arc::new(Self)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl rustls::client::ServerCertVerifier for SkipServerVerification {
|
|
|
|
|
fn verify_server_cert(
|
|
|
|
|
&self,
|
|
|
|
|
_end_entity: &rustls::Certificate,
|
|
|
|
|
_intermediates: &[rustls::Certificate],
|
|
|
|
|
_server_name: &rustls::ServerName,
|
|
|
|
|
_scts: &mut dyn Iterator<Item = &[u8]>,
|
|
|
|
|
_ocsp_response: &[u8],
|
|
|
|
|
_now: std::time::SystemTime,
|
|
|
|
|
) -> Result<rustls::client::ServerCertVerified, rustls::Error> {
|
|
|
|
|
Ok(rustls::client::ServerCertVerified::assertion())
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn configure_client() -> ClientConfig {
|
|
|
|
|
let crypto = rustls::ClientConfig::builder()
|
|
|
|
|
.with_safe_defaults()
|
|
|
|
|
.with_custom_certificate_verifier(SkipServerVerification::new())
|
|
|
|
|
.with_no_client_auth();
|
|
|
|
|
|
|
|
|
|
ClientConfig::new(Arc::new(crypto))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Constructs a QUIC endpoint configured to listen for incoming connections on a certain address
|
|
|
|
|
/// and port.
|
|
|
|
|
///
|
|
|
|
|
/// ## Returns
|
|
|
|
|
///
|
|
|
|
|
/// - a stream of incoming QUIC connections
|
|
|
|
|
/// - server certificate serialized into DER format
|
|
|
|
|
#[allow(unused)]
|
|
|
|
|
pub fn make_server_endpoint(bind_addr: SocketAddr) -> Result<(Endpoint, Vec<u8>), Box<dyn Error>> {
|
|
|
|
|
let (server_config, server_cert) = configure_server()?;
|
|
|
|
|
let endpoint = Endpoint::server(server_config, bind_addr)?;
|
|
|
|
|
Ok((endpoint, server_cert))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Returns default server configuration along with its certificate.
|
|
|
|
|
fn configure_server() -> Result<(ServerConfig, Vec<u8>), Box<dyn Error>> {
|
|
|
|
|
let cert = rcgen::generate_simple_self_signed(vec!["localhost".into()]).unwrap();
|
|
|
|
|
let cert_der = cert.serialize_der().unwrap();
|
|
|
|
|
let priv_key = cert.serialize_private_key_der();
|
|
|
|
|
let priv_key = rustls::PrivateKey(priv_key);
|
|
|
|
|
let cert_chain = vec![rustls::Certificate(cert_der.clone())];
|
|
|
|
|
|
|
|
|
|
let mut server_config = ServerConfig::with_single_cert(cert_chain, priv_key)?;
|
|
|
|
|
let transport_config = Arc::get_mut(&mut server_config.transport).unwrap();
|
|
|
|
|
transport_config.max_concurrent_uni_streams(10_u8.into());
|
|
|
|
|
transport_config.max_concurrent_bidi_streams(10_u8.into());
|
|
|
|
|
|
|
|
|
|
Ok((server_config, cert_der))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[allow(unused)]
|
|
|
|
|
pub const ALPN_QUIC_HTTP: &[&[u8]] = &[b"hq-29"];
|
|
|
|
|
|
|
|
|
|
/// Runs a QUIC server bound to given address.
|
|
|
|
|
|
|
|
|
|
struct ConnWrapper {
|
|
|
|
|
conn: Connection,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl Drop for ConnWrapper {
|
|
|
|
|
fn drop(&mut self) {
|
|
|
|
|
self.conn.close(0u32.into(), b"done");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pub struct QUICTunnelListener {
|
|
|
|
|
addr: url::Url,
|
|
|
|
|
endpoint: Option<Endpoint>,
|
|
|
|
|
server_cert: Option<Vec<u8>>,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl QUICTunnelListener {
|
|
|
|
|
pub fn new(addr: url::Url) -> Self {
|
|
|
|
|
QUICTunnelListener {
|
|
|
|
|
addr,
|
|
|
|
|
endpoint: None,
|
|
|
|
|
server_cert: None,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[async_trait::async_trait]
|
|
|
|
|
impl TunnelListener for QUICTunnelListener {
|
|
|
|
|
async fn listen(&mut self) -> Result<(), TunnelError> {
|
|
|
|
|
let addr = check_scheme_and_get_socket_addr::<SocketAddr>(&self.addr, "quic")?;
|
|
|
|
|
let (endpoint, server_cert) = make_server_endpoint(addr).unwrap();
|
|
|
|
|
self.endpoint = Some(endpoint);
|
|
|
|
|
self.server_cert = Some(server_cert);
|
2024-04-27 21:20:23 +08:00
|
|
|
|
|
|
|
|
self.addr
|
|
|
|
|
.set_port(Some(self.endpoint.as_ref().unwrap().local_addr()?.port()))
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
2024-04-24 23:12:46 +08:00
|
|
|
Ok(())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async fn accept(&mut self) -> Result<Box<dyn Tunnel>, super::TunnelError> {
|
|
|
|
|
// accept a single connection
|
|
|
|
|
let incoming_conn = self.endpoint.as_ref().unwrap().accept().await.unwrap();
|
|
|
|
|
let conn = incoming_conn.await.unwrap();
|
|
|
|
|
println!(
|
|
|
|
|
"[server] connection accepted: addr={}",
|
|
|
|
|
conn.remote_address()
|
|
|
|
|
);
|
|
|
|
|
let remote_addr = conn.remote_address();
|
|
|
|
|
let (w, r) = conn.accept_bi().await.with_context(|| "accept_bi failed")?;
|
|
|
|
|
|
|
|
|
|
let arc_conn = Arc::new(ConnWrapper { conn });
|
|
|
|
|
|
|
|
|
|
let info = TunnelInfo {
|
|
|
|
|
tunnel_type: "quic".to_owned(),
|
|
|
|
|
local_addr: self.local_url().into(),
|
|
|
|
|
remote_addr: super::build_url_from_socket_addr(&remote_addr.to_string(), "quic").into(),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
Ok(Box::new(TunnelWrapper::new(
|
|
|
|
|
FramedReader::new_with_associate_data(r, 4500, Some(Box::new(arc_conn.clone()))),
|
|
|
|
|
FramedWriter::new_with_associate_data(w, Some(Box::new(arc_conn))),
|
|
|
|
|
Some(info),
|
|
|
|
|
)))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn local_url(&self) -> url::Url {
|
|
|
|
|
self.addr.clone()
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pub struct QUICTunnelConnector {
|
|
|
|
|
addr: url::Url,
|
|
|
|
|
endpoint: Option<Endpoint>,
|
2024-04-27 19:03:07 +08:00
|
|
|
ip_version: IpVersion,
|
2024-04-24 23:12:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl QUICTunnelConnector {
|
|
|
|
|
pub fn new(addr: url::Url) -> Self {
|
|
|
|
|
QUICTunnelConnector {
|
|
|
|
|
addr,
|
|
|
|
|
endpoint: None,
|
2024-04-27 19:03:07 +08:00
|
|
|
ip_version: IpVersion::Both,
|
2024-04-24 23:12:46 +08:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[async_trait::async_trait]
|
|
|
|
|
impl TunnelConnector for QUICTunnelConnector {
|
|
|
|
|
async fn connect(&mut self) -> Result<Box<dyn Tunnel>, super::TunnelError> {
|
2024-04-27 19:03:07 +08:00
|
|
|
let addr = check_scheme_and_get_socket_addr_ext::<SocketAddr>(
|
|
|
|
|
&self.addr,
|
|
|
|
|
"quic",
|
|
|
|
|
self.ip_version,
|
|
|
|
|
)?;
|
|
|
|
|
let local_addr = if addr.is_ipv4() {
|
|
|
|
|
"0.0.0.0:0"
|
|
|
|
|
} else {
|
|
|
|
|
"[::]:0"
|
|
|
|
|
};
|
2024-04-24 23:12:46 +08:00
|
|
|
|
2024-04-27 19:03:07 +08:00
|
|
|
let mut endpoint = Endpoint::client(local_addr.parse().unwrap())?;
|
2024-04-24 23:12:46 +08:00
|
|
|
endpoint.set_default_client_config(configure_client());
|
|
|
|
|
|
|
|
|
|
// connect to server
|
|
|
|
|
let connection = endpoint.connect(addr, "localhost").unwrap().await.unwrap();
|
|
|
|
|
println!("[client] connected: addr={}", connection.remote_address());
|
|
|
|
|
|
|
|
|
|
let local_addr = endpoint.local_addr().unwrap();
|
|
|
|
|
|
|
|
|
|
self.endpoint = Some(endpoint);
|
|
|
|
|
|
|
|
|
|
let (w, r) = connection
|
|
|
|
|
.open_bi()
|
|
|
|
|
.await
|
|
|
|
|
.with_context(|| "open_bi failed")?;
|
|
|
|
|
|
|
|
|
|
let info = TunnelInfo {
|
|
|
|
|
tunnel_type: "quic".to_owned(),
|
|
|
|
|
local_addr: super::build_url_from_socket_addr(&local_addr.to_string(), "quic").into(),
|
|
|
|
|
remote_addr: self.addr.to_string(),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let arc_conn = Arc::new(ConnWrapper { conn: connection });
|
|
|
|
|
Ok(Box::new(TunnelWrapper::new(
|
|
|
|
|
FramedReader::new_with_associate_data(r, 4500, Some(Box::new(arc_conn.clone()))),
|
|
|
|
|
FramedWriter::new_with_associate_data(w, Some(Box::new(arc_conn))),
|
|
|
|
|
Some(info),
|
|
|
|
|
)))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn remote_url(&self) -> url::Url {
|
|
|
|
|
self.addr.clone()
|
|
|
|
|
}
|
2024-04-27 19:03:07 +08:00
|
|
|
|
|
|
|
|
fn set_ip_version(&mut self, ip_version: IpVersion) {
|
|
|
|
|
self.ip_version = ip_version;
|
|
|
|
|
}
|
2024-04-24 23:12:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
|
mod tests {
|
2024-04-27 19:03:07 +08:00
|
|
|
use crate::tunnel::{
|
|
|
|
|
common::tests::{_tunnel_bench, _tunnel_pingpong},
|
|
|
|
|
IpVersion,
|
|
|
|
|
};
|
2024-04-24 23:12:46 +08:00
|
|
|
|
|
|
|
|
use super::*;
|
|
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
|
async fn quic_pingpong() {
|
|
|
|
|
let listener = QUICTunnelListener::new("quic://0.0.0.0:21011".parse().unwrap());
|
|
|
|
|
let connector = QUICTunnelConnector::new("quic://127.0.0.1:21011".parse().unwrap());
|
|
|
|
|
_tunnel_pingpong(listener, connector).await
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
|
async fn quic_bench() {
|
|
|
|
|
let listener = QUICTunnelListener::new("quic://0.0.0.0:21012".parse().unwrap());
|
|
|
|
|
let connector = QUICTunnelConnector::new("quic://127.0.0.1:21012".parse().unwrap());
|
|
|
|
|
_tunnel_bench(listener, connector).await
|
|
|
|
|
}
|
2024-04-27 19:03:07 +08:00
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
|
async fn ipv6_pingpong() {
|
|
|
|
|
let listener = QUICTunnelListener::new("quic://[::1]:31015".parse().unwrap());
|
|
|
|
|
let connector = QUICTunnelConnector::new("quic://[::1]:31015".parse().unwrap());
|
|
|
|
|
_tunnel_pingpong(listener, connector).await
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
|
async fn ipv6_domain_pingpong() {
|
|
|
|
|
let listener = QUICTunnelListener::new("quic://[::1]:31016".parse().unwrap());
|
|
|
|
|
let mut connector =
|
|
|
|
|
QUICTunnelConnector::new("quic://test.kkrainbow.top:31016".parse().unwrap());
|
|
|
|
|
connector.set_ip_version(IpVersion::V6);
|
|
|
|
|
_tunnel_pingpong(listener, connector).await;
|
|
|
|
|
|
|
|
|
|
let listener = QUICTunnelListener::new("quic://127.0.0.1:31016".parse().unwrap());
|
|
|
|
|
let mut connector =
|
|
|
|
|
QUICTunnelConnector::new("quic://test.kkrainbow.top:31016".parse().unwrap());
|
|
|
|
|
connector.set_ip_version(IpVersion::V4);
|
|
|
|
|
_tunnel_pingpong(listener, connector).await;
|
|
|
|
|
}
|
2024-04-27 21:20:23 +08:00
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
|
async fn test_alloc_port() {
|
|
|
|
|
// v4
|
|
|
|
|
let mut listener = QUICTunnelListener::new("quic://0.0.0.0:0".parse().unwrap());
|
|
|
|
|
listener.listen().await.unwrap();
|
|
|
|
|
let port = listener.local_url().port().unwrap();
|
|
|
|
|
assert!(port > 0);
|
|
|
|
|
|
|
|
|
|
// v6
|
|
|
|
|
let mut listener = QUICTunnelListener::new("quic://[::]:0".parse().unwrap());
|
|
|
|
|
listener.listen().await.unwrap();
|
|
|
|
|
let port = listener.local_url().port().unwrap();
|
|
|
|
|
assert!(port > 0);
|
|
|
|
|
}
|
2024-04-24 23:12:46 +08:00
|
|
|
}
|