blob: 953e5854447b05c8249ae1d356aa0ee818689509 [file] [log] [blame]
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#include "webrtc/p2p/base/stunport.h"
12
13#include "webrtc/p2p/base/common.h"
14#include "webrtc/p2p/base/portallocator.h"
15#include "webrtc/p2p/base/stun.h"
16#include "webrtc/base/common.h"
17#include "webrtc/base/helpers.h"
18#include "webrtc/base/logging.h"
19#include "webrtc/base/nethelpers.h"
20
21namespace cricket {
22
23// TODO: Move these to a common place (used in relayport too)
24const int KEEPALIVE_DELAY = 10 * 1000; // 10 seconds - sort timeouts
25const int RETRY_DELAY = 50; // 50ms, from ICE spec
26const int RETRY_TIMEOUT = 50 * 1000; // ICE says 50 secs
27
28// Handles a binding request sent to the STUN server.
29class StunBindingRequest : public StunRequest {
30 public:
31 StunBindingRequest(UDPPort* port, bool keep_alive,
32 const rtc::SocketAddress& addr)
33 : port_(port), keep_alive_(keep_alive), server_addr_(addr) {
34 start_time_ = rtc::Time();
35 }
36
37 virtual ~StunBindingRequest() {
38 }
39
40 const rtc::SocketAddress& server_addr() const { return server_addr_; }
41
Peter Thatcher1cf6f812015-05-15 10:40:45 -070042 virtual void Prepare(StunMessage* request) override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000043 request->SetType(STUN_BINDING_REQUEST);
44 }
45
Peter Thatcher1cf6f812015-05-15 10:40:45 -070046 virtual void OnResponse(StunMessage* response) override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000047 const StunAddressAttribute* addr_attr =
48 response->GetAddress(STUN_ATTR_MAPPED_ADDRESS);
49 if (!addr_attr) {
50 LOG(LS_ERROR) << "Binding response missing mapped address.";
51 } else if (addr_attr->family() != STUN_ADDRESS_IPV4 &&
52 addr_attr->family() != STUN_ADDRESS_IPV6) {
53 LOG(LS_ERROR) << "Binding address has bad family";
54 } else {
55 rtc::SocketAddress addr(addr_attr->ipaddr(), addr_attr->port());
56 port_->OnStunBindingRequestSucceeded(server_addr_, addr);
57 }
58
59 // We will do a keep-alive regardless of whether this request succeeds.
60 // This should have almost no impact on network usage.
61 if (keep_alive_) {
62 port_->requests_.SendDelayed(
63 new StunBindingRequest(port_, true, server_addr_),
64 port_->stun_keepalive_delay());
65 }
66 }
67
Peter Thatcher1cf6f812015-05-15 10:40:45 -070068 virtual void OnErrorResponse(StunMessage* response) override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000069 const StunErrorCodeAttribute* attr = response->GetErrorCode();
70 if (!attr) {
71 LOG(LS_ERROR) << "Bad allocate response error code";
72 } else {
73 LOG(LS_ERROR) << "Binding error response:"
74 << " class=" << attr->eclass()
75 << " number=" << attr->number()
76 << " reason='" << attr->reason() << "'";
77 }
78
79 port_->OnStunBindingOrResolveRequestFailed(server_addr_);
80
81 if (keep_alive_
82 && (rtc::TimeSince(start_time_) <= RETRY_TIMEOUT)) {
83 port_->requests_.SendDelayed(
84 new StunBindingRequest(port_, true, server_addr_),
85 port_->stun_keepalive_delay());
86 }
87 }
88
Peter Thatcher1cf6f812015-05-15 10:40:45 -070089 virtual void OnTimeout() override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000090 LOG(LS_ERROR) << "Binding request timed out from "
91 << port_->GetLocalAddress().ToSensitiveString()
92 << " (" << port_->Network()->name() << ")";
93
94 port_->OnStunBindingOrResolveRequestFailed(server_addr_);
95
96 if (keep_alive_
97 && (rtc::TimeSince(start_time_) <= RETRY_TIMEOUT)) {
98 port_->requests_.SendDelayed(
99 new StunBindingRequest(port_, true, server_addr_),
100 RETRY_DELAY);
101 }
102 }
103
104 private:
105 UDPPort* port_;
106 bool keep_alive_;
107 const rtc::SocketAddress server_addr_;
108 uint32 start_time_;
109};
110
111UDPPort::AddressResolver::AddressResolver(
112 rtc::PacketSocketFactory* factory)
113 : socket_factory_(factory) {}
114
115UDPPort::AddressResolver::~AddressResolver() {
116 for (ResolverMap::iterator it = resolvers_.begin();
117 it != resolvers_.end(); ++it) {
118 it->second->Destroy(true);
119 }
120}
121
122void UDPPort::AddressResolver::Resolve(
123 const rtc::SocketAddress& address) {
124 if (resolvers_.find(address) != resolvers_.end())
125 return;
126
127 rtc::AsyncResolverInterface* resolver =
128 socket_factory_->CreateAsyncResolver();
129 resolvers_.insert(
130 std::pair<rtc::SocketAddress, rtc::AsyncResolverInterface*>(
131 address, resolver));
132
133 resolver->SignalDone.connect(this,
134 &UDPPort::AddressResolver::OnResolveResult);
135
136 resolver->Start(address);
137}
138
139bool UDPPort::AddressResolver::GetResolvedAddress(
140 const rtc::SocketAddress& input,
141 int family,
142 rtc::SocketAddress* output) const {
143 ResolverMap::const_iterator it = resolvers_.find(input);
144 if (it == resolvers_.end())
145 return false;
146
147 return it->second->GetResolvedAddress(family, output);
148}
149
150void UDPPort::AddressResolver::OnResolveResult(
151 rtc::AsyncResolverInterface* resolver) {
152 for (ResolverMap::iterator it = resolvers_.begin();
153 it != resolvers_.end(); ++it) {
154 if (it->second == resolver) {
155 SignalDone(it->first, resolver->GetError());
156 return;
157 }
158 }
159}
160
161UDPPort::UDPPort(rtc::Thread* thread,
162 rtc::PacketSocketFactory* factory,
163 rtc::Network* network,
164 rtc::AsyncPacketSocket* socket,
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000165 const std::string& username,
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000166 const std::string& password,
167 const std::string& origin)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000168 : Port(thread, factory, network, socket->GetLocalAddress().ipaddr(),
169 username, password),
170 requests_(thread),
171 socket_(socket),
172 error_(0),
173 ready_(false),
174 stun_keepalive_delay_(KEEPALIVE_DELAY) {
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000175 requests_.set_origin(origin);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000176}
177
178UDPPort::UDPPort(rtc::Thread* thread,
179 rtc::PacketSocketFactory* factory,
180 rtc::Network* network,
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000181 const rtc::IPAddress& ip,
182 uint16 min_port,
183 uint16 max_port,
184 const std::string& username,
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000185 const std::string& password,
186 const std::string& origin)
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000187 : Port(thread, LOCAL_PORT_TYPE, factory, network, ip, min_port, max_port,
188 username, password),
189 requests_(thread),
190 socket_(NULL),
191 error_(0),
192 ready_(false),
193 stun_keepalive_delay_(KEEPALIVE_DELAY) {
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000194 requests_.set_origin(origin);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000195}
196
197bool UDPPort::Init() {
198 if (!SharedSocket()) {
199 ASSERT(socket_ == NULL);
200 socket_ = socket_factory()->CreateUdpSocket(
201 rtc::SocketAddress(ip(), 0), min_port(), max_port());
202 if (!socket_) {
203 LOG_J(LS_WARNING, this) << "UDP socket creation failed";
204 return false;
205 }
206 socket_->SignalReadPacket.connect(this, &UDPPort::OnReadPacket);
207 }
208 socket_->SignalReadyToSend.connect(this, &UDPPort::OnReadyToSend);
209 socket_->SignalAddressReady.connect(this, &UDPPort::OnLocalAddressReady);
210 requests_.SignalSendPacket.connect(this, &UDPPort::OnSendPacket);
211 return true;
212}
213
214UDPPort::~UDPPort() {
215 if (!SharedSocket())
216 delete socket_;
217}
218
219void UDPPort::PrepareAddress() {
220 ASSERT(requests_.empty());
221 if (socket_->GetState() == rtc::AsyncPacketSocket::STATE_BOUND) {
222 OnLocalAddressReady(socket_, socket_->GetLocalAddress());
223 }
224}
225
226void UDPPort::MaybePrepareStunCandidate() {
227 // Sending binding request to the STUN server if address is available to
228 // prepare STUN candidate.
229 if (!server_addresses_.empty()) {
230 SendStunBindingRequests();
231 } else {
232 // Port is done allocating candidates.
233 MaybeSetPortCompleteOrError();
234 }
235}
236
237Connection* UDPPort::CreateConnection(const Candidate& address,
238 CandidateOrigin origin) {
239 if (address.protocol() != "udp")
240 return NULL;
241
242 if (!IsCompatibleAddress(address.address())) {
243 return NULL;
244 }
245
246 if (SharedSocket() && Candidates()[0].type() != LOCAL_PORT_TYPE) {
247 ASSERT(false);
248 return NULL;
249 }
250
251 Connection* conn = new ProxyConnection(this, 0, address);
252 AddConnection(conn);
253 return conn;
254}
255
256int UDPPort::SendTo(const void* data, size_t size,
257 const rtc::SocketAddress& addr,
258 const rtc::PacketOptions& options,
259 bool payload) {
260 int sent = socket_->SendTo(data, size, addr, options);
261 if (sent < 0) {
262 error_ = socket_->GetError();
263 LOG_J(LS_ERROR, this) << "UDP send of " << size
264 << " bytes failed with error " << error_;
265 }
266 return sent;
267}
268
269int UDPPort::SetOption(rtc::Socket::Option opt, int value) {
270 return socket_->SetOption(opt, value);
271}
272
273int UDPPort::GetOption(rtc::Socket::Option opt, int* value) {
274 return socket_->GetOption(opt, value);
275}
276
277int UDPPort::GetError() {
278 return error_;
279}
280
281void UDPPort::OnLocalAddressReady(rtc::AsyncPacketSocket* socket,
282 const rtc::SocketAddress& address) {
283 AddAddress(address, address, rtc::SocketAddress(),
284 UDP_PROTOCOL_NAME, "", LOCAL_PORT_TYPE,
285 ICE_TYPE_PREFERENCE_HOST, 0, false);
286 MaybePrepareStunCandidate();
287}
288
289void UDPPort::OnReadPacket(
290 rtc::AsyncPacketSocket* socket, const char* data, size_t size,
291 const rtc::SocketAddress& remote_addr,
292 const rtc::PacketTime& packet_time) {
293 ASSERT(socket == socket_);
294 ASSERT(!remote_addr.IsUnresolved());
295
296 // Look for a response from the STUN server.
297 // Even if the response doesn't match one of our outstanding requests, we
298 // will eat it because it might be a response to a retransmitted packet, and
299 // we already cleared the request when we got the first response.
300 if (server_addresses_.find(remote_addr) != server_addresses_.end()) {
301 requests_.CheckResponse(data, size);
302 return;
303 }
304
305 if (Connection* conn = GetConnection(remote_addr)) {
306 conn->OnReadPacket(data, size, packet_time);
307 } else {
308 Port::OnReadPacket(data, size, remote_addr, PROTO_UDP);
309 }
310}
311
312void UDPPort::OnReadyToSend(rtc::AsyncPacketSocket* socket) {
313 Port::OnReadyToSend();
314}
315
316void UDPPort::SendStunBindingRequests() {
317 // We will keep pinging the stun server to make sure our NAT pin-hole stays
318 // open during the call.
319 ASSERT(requests_.empty());
320
321 for (ServerAddresses::const_iterator it = server_addresses_.begin();
322 it != server_addresses_.end(); ++it) {
323 SendStunBindingRequest(*it);
324 }
325}
326
327void UDPPort::ResolveStunAddress(const rtc::SocketAddress& stun_addr) {
328 if (!resolver_) {
329 resolver_.reset(new AddressResolver(socket_factory()));
330 resolver_->SignalDone.connect(this, &UDPPort::OnResolveResult);
331 }
332
333 resolver_->Resolve(stun_addr);
334}
335
336void UDPPort::OnResolveResult(const rtc::SocketAddress& input,
337 int error) {
338 ASSERT(resolver_.get() != NULL);
339
340 rtc::SocketAddress resolved;
341 if (error != 0 ||
342 !resolver_->GetResolvedAddress(input, ip().family(), &resolved)) {
343 LOG_J(LS_WARNING, this) << "StunPort: stun host lookup received error "
344 << error;
345 OnStunBindingOrResolveRequestFailed(input);
346 return;
347 }
348
349 server_addresses_.erase(input);
350
351 if (server_addresses_.find(resolved) == server_addresses_.end()) {
352 server_addresses_.insert(resolved);
353 SendStunBindingRequest(resolved);
354 }
355}
356
357void UDPPort::SendStunBindingRequest(
358 const rtc::SocketAddress& stun_addr) {
359 if (stun_addr.IsUnresolved()) {
360 ResolveStunAddress(stun_addr);
361
362 } else if (socket_->GetState() == rtc::AsyncPacketSocket::STATE_BOUND) {
363 // Check if |server_addr_| is compatible with the port's ip.
364 if (IsCompatibleAddress(stun_addr)) {
365 requests_.Send(new StunBindingRequest(this, true, stun_addr));
366 } else {
367 // Since we can't send stun messages to the server, we should mark this
368 // port ready.
369 LOG(LS_WARNING) << "STUN server address is incompatible.";
370 OnStunBindingOrResolveRequestFailed(stun_addr);
371 }
372 }
373}
374
375void UDPPort::OnStunBindingRequestSucceeded(
376 const rtc::SocketAddress& stun_server_addr,
377 const rtc::SocketAddress& stun_reflected_addr) {
378 if (bind_request_succeeded_servers_.find(stun_server_addr) !=
379 bind_request_succeeded_servers_.end()) {
380 return;
381 }
382 bind_request_succeeded_servers_.insert(stun_server_addr);
383
384 // If socket is shared and |stun_reflected_addr| is equal to local socket
385 // address, or if the same address has been added by another STUN server,
386 // then discarding the stun address.
387 // For STUN, related address is the local socket address.
388 if ((!SharedSocket() || stun_reflected_addr != socket_->GetLocalAddress()) &&
389 !HasCandidateWithAddress(stun_reflected_addr)) {
390
391 rtc::SocketAddress related_address = socket_->GetLocalAddress();
392 if (!(candidate_filter() & CF_HOST)) {
393 // If candidate filter doesn't have CF_HOST specified, empty raddr to
394 // avoid local address leakage.
395 related_address = rtc::EmptySocketAddressWithFamily(
396 related_address.family());
397 }
398
399 AddAddress(stun_reflected_addr, socket_->GetLocalAddress(),
400 related_address, UDP_PROTOCOL_NAME, "",
401 STUN_PORT_TYPE, ICE_TYPE_PREFERENCE_SRFLX, 0, false);
402 }
403 MaybeSetPortCompleteOrError();
404}
405
406void UDPPort::OnStunBindingOrResolveRequestFailed(
407 const rtc::SocketAddress& stun_server_addr) {
408 if (bind_request_failed_servers_.find(stun_server_addr) !=
409 bind_request_failed_servers_.end()) {
410 return;
411 }
412 bind_request_failed_servers_.insert(stun_server_addr);
413 MaybeSetPortCompleteOrError();
414}
415
416void UDPPort::MaybeSetPortCompleteOrError() {
417 if (ready_)
418 return;
419
420 // Do not set port ready if we are still waiting for bind responses.
421 const size_t servers_done_bind_request = bind_request_failed_servers_.size() +
422 bind_request_succeeded_servers_.size();
423 if (server_addresses_.size() != servers_done_bind_request) {
424 return;
425 }
426
427 // Setting ready status.
428 ready_ = true;
429
430 // The port is "completed" if there is no stun server provided, or the bind
431 // request succeeded for any stun server, or the socket is shared.
432 if (server_addresses_.empty() ||
433 bind_request_succeeded_servers_.size() > 0 ||
434 SharedSocket()) {
435 SignalPortComplete(this);
436 } else {
437 SignalPortError(this);
438 }
439}
440
441// TODO: merge this with SendTo above.
442void UDPPort::OnSendPacket(const void* data, size_t size, StunRequest* req) {
443 StunBindingRequest* sreq = static_cast<StunBindingRequest*>(req);
444 rtc::PacketOptions options(DefaultDscpValue());
445 if (socket_->SendTo(data, size, sreq->server_addr(), options) < 0)
446 PLOG(LERROR, socket_->GetError()) << "sendto";
447}
448
449bool UDPPort::HasCandidateWithAddress(const rtc::SocketAddress& addr) const {
450 const std::vector<Candidate>& existing_candidates = Candidates();
451 std::vector<Candidate>::const_iterator it = existing_candidates.begin();
452 for (; it != existing_candidates.end(); ++it) {
453 if (it->address() == addr)
454 return true;
455 }
456 return false;
457}
458
459} // namespace cricket