1 /* 2 * libjingle 3 * Copyright 2004--2005, Google Inc. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright notice, 9 * this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright notice, 11 * this list of conditions and the following disclaimer in the documentation 12 * and/or other materials provided with the distribution. 13 * 3. The name of the author may not be used to endorse or promote products 14 * derived from this software without specific prior written permission. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED 17 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 18 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO 19 * EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 20 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 21 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; 22 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 23 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 24 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF 25 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 26 */ 27 28 #ifndef TALK_P2P_BASE_PORT_H_ 29 #define TALK_P2P_BASE_PORT_H_ 30 31 #include <string> 32 #include <vector> 33 #include <map> 34 35 #include "talk/base/asyncpacketsocket.h" 36 #include "talk/base/network.h" 37 #include "talk/base/proxyinfo.h" 38 #include "talk/base/ratetracker.h" 39 #include "talk/base/sigslot.h" 40 #include "talk/base/socketaddress.h" 41 #include "talk/base/thread.h" 42 #include "talk/p2p/base/candidate.h" 43 #include "talk/p2p/base/packetsocketfactory.h" 44 #include "talk/p2p/base/portinterface.h" 45 #include "talk/p2p/base/stun.h" 46 #include "talk/p2p/base/stunrequest.h" 47 #include "talk/p2p/base/transport.h" 48 49 namespace cricket { 50 51 class Connection; 52 class ConnectionRequest; 53 54 extern const char LOCAL_PORT_TYPE[]; 55 extern const char STUN_PORT_TYPE[]; 56 extern const char PRFLX_PORT_TYPE[]; 57 extern const char RELAY_PORT_TYPE[]; 58 59 extern const char UDP_PROTOCOL_NAME[]; 60 extern const char TCP_PROTOCOL_NAME[]; 61 extern const char SSLTCP_PROTOCOL_NAME[]; 62 63 // The length of time we wait before timing out readability on a connection. 64 const uint32 CONNECTION_READ_TIMEOUT = 30 * 1000; // 30 seconds 65 66 // The length of time we wait before timing out writability on a connection. 67 const uint32 CONNECTION_WRITE_TIMEOUT = 15 * 1000; // 15 seconds 68 69 // The length of time we wait before we become unwritable. 70 const uint32 CONNECTION_WRITE_CONNECT_TIMEOUT = 5 * 1000; // 5 seconds 71 72 // The number of pings that must fail to respond before we become unwritable. 73 const uint32 CONNECTION_WRITE_CONNECT_FAILURES = 5; 74 75 // This is the length of time that we wait for a ping response to come back. 76 const int CONNECTION_RESPONSE_TIMEOUT = 5 * 1000; // 5 seconds 77 78 enum RelayType { 79 RELAY_GTURN, // Legacy google relay service. 80 RELAY_TURN // Standard (TURN) relay service. 81 }; 82 83 enum IcePriorityValue { 84 // The reason we are choosing Relay preference 2 is because, we can run 85 // Relay from client to server on UDP/TCP/TLS. To distinguish the transport 86 // protocol, we prefer UDP over TCP over TLS. 87 // For UDP ICE_TYPE_PREFERENCE_RELAY will be 2. 88 // For TCP ICE_TYPE_PREFERENCE_RELAY will be 1. 89 // For TLS ICE_TYPE_PREFERENCE_RELAY will be 0. 90 // Check turnport.cc for setting these values. 91 ICE_TYPE_PREFERENCE_RELAY = 2, 92 ICE_TYPE_PREFERENCE_HOST_TCP = 90, 93 ICE_TYPE_PREFERENCE_SRFLX = 100, 94 ICE_TYPE_PREFERENCE_PRFLX = 110, 95 ICE_TYPE_PREFERENCE_HOST = 126 96 }; 97 98 const char* ProtoToString(ProtocolType proto); 99 bool StringToProto(const char* value, ProtocolType* proto); 100 101 struct ProtocolAddress { 102 talk_base::SocketAddress address; 103 ProtocolType proto; 104 bool secure; 105 106 ProtocolAddress(const talk_base::SocketAddress& a, ProtocolType p) 107 : address(a), proto(p), secure(false) { } 108 ProtocolAddress(const talk_base::SocketAddress& a, ProtocolType p, bool sec) 109 : address(a), proto(p), secure(sec) { } 110 }; 111 112 // Represents a local communication mechanism that can be used to create 113 // connections to similar mechanisms of the other client. Subclasses of this 114 // one add support for specific mechanisms like local UDP ports. 115 class Port : public PortInterface, public talk_base::MessageHandler, 116 public sigslot::has_slots<> { 117 public: 118 Port(talk_base::Thread* thread, talk_base::PacketSocketFactory* factory, 119 talk_base::Network* network, const talk_base::IPAddress& ip, 120 const std::string& username_fragment, const std::string& password); 121 Port(talk_base::Thread* thread, const std::string& type, 122 talk_base::PacketSocketFactory* factory, 123 talk_base::Network* network, const talk_base::IPAddress& ip, 124 int min_port, int max_port, const std::string& username_fragment, 125 const std::string& password); 126 virtual ~Port(); 127 128 virtual const std::string& Type() const { return type_; } 129 virtual talk_base::Network* Network() const { return network_; } 130 131 // This method will set the flag which enables standard ICE/STUN procedures 132 // in STUN connectivity checks. Currently this method does 133 // 1. Add / Verify MI attribute in STUN binding requests. 134 // 2. Username attribute in STUN binding request will be RFRAF:LFRAG, 135 // as opposed to RFRAGLFRAG. 136 virtual void SetIceProtocolType(IceProtocolType protocol) { 137 ice_protocol_ = protocol; 138 } 139 virtual IceProtocolType IceProtocol() const { return ice_protocol_; } 140 141 // Methods to set/get ICE role and tiebreaker values. 142 IceRole GetIceRole() const { return ice_role_; } 143 void SetIceRole(IceRole role) { ice_role_ = role; } 144 145 void SetIceTiebreaker(uint64 tiebreaker) { tiebreaker_ = tiebreaker; } 146 uint64 IceTiebreaker() const { return tiebreaker_; } 147 148 virtual bool SharedSocket() const { return shared_socket_; } 149 150 // The thread on which this port performs its I/O. 151 talk_base::Thread* thread() { return thread_; } 152 153 // The factory used to create the sockets of this port. 154 talk_base::PacketSocketFactory* socket_factory() const { return factory_; } 155 void set_socket_factory(talk_base::PacketSocketFactory* factory) { 156 factory_ = factory; 157 } 158 159 // For debugging purposes. 160 const std::string& content_name() const { return content_name_; } 161 void set_content_name(const std::string& content_name) { 162 content_name_ = content_name; 163 } 164 165 int component() const { return component_; } 166 void set_component(int component) { component_ = component; } 167 168 bool send_retransmit_count_attribute() const { 169 return send_retransmit_count_attribute_; 170 } 171 void set_send_retransmit_count_attribute(bool enable) { 172 send_retransmit_count_attribute_ = enable; 173 } 174 175 const talk_base::SocketAddress& related_address() const { 176 return related_address_; 177 } 178 void set_related_address(const talk_base::SocketAddress& address) { 179 related_address_ = address; 180 } 181 182 // Identifies the generation that this port was created in. 183 uint32 generation() { return generation_; } 184 void set_generation(uint32 generation) { generation_ = generation; } 185 186 // ICE requires a single username/password per content/media line. So the 187 // |ice_username_fragment_| of the ports that belongs to the same content will 188 // be the same. However this causes a small complication with our relay 189 // server, which expects different username for RTP and RTCP. 190 // 191 // To resolve this problem, we implemented the username_fragment(), 192 // which returns a different username (calculated from 193 // |ice_username_fragment_|) for RTCP in the case of ICEPROTO_GOOGLE. And the 194 // username_fragment() simply returns |ice_username_fragment_| when running 195 // in ICEPROTO_RFC5245. 196 // 197 // As a result the ICEPROTO_GOOGLE will use different usernames for RTP and 198 // RTCP. And the ICEPROTO_RFC5245 will use same username for both RTP and 199 // RTCP. 200 const std::string username_fragment() const; 201 const std::string& password() const { return password_; } 202 203 // Fired when candidates are discovered by the port. When all candidates 204 // are discovered that belong to port SignalAddressReady is fired. 205 sigslot::signal2<Port*, const Candidate&> SignalCandidateReady; 206 207 // Provides all of the above information in one handy object. 208 virtual const std::vector<Candidate>& Candidates() const { 209 return candidates_; 210 } 211 212 // SignalPortComplete is sent when port completes the task of candidates 213 // allocation. 214 sigslot::signal1<Port*> SignalPortComplete; 215 // This signal sent when port fails to allocate candidates and this port 216 // can't be used in establishing the connections. When port is in shared mode 217 // and port fails to allocate one of the candidates, port shouldn't send 218 // this signal as other candidates might be usefull in establishing the 219 // connection. 220 sigslot::signal1<Port*> SignalPortError; 221 222 // Returns a map containing all of the connections of this port, keyed by the 223 // remote address. 224 typedef std::map<talk_base::SocketAddress, Connection*> AddressMap; 225 const AddressMap& connections() { return connections_; } 226 227 // Returns the connection to the given address or NULL if none exists. 228 virtual Connection* GetConnection( 229 const talk_base::SocketAddress& remote_addr); 230 231 // Called each time a connection is created. 232 sigslot::signal2<Port*, Connection*> SignalConnectionCreated; 233 234 // In a shared socket mode each port which shares the socket will decide 235 // to accept the packet based on the |remote_addr|. Currently only UDP 236 // port implemented this method. 237 // TODO(mallinath) - Make it pure virtual. 238 virtual bool HandleIncomingPacket( 239 talk_base::AsyncPacketSocket* socket, const char* data, size_t size, 240 const talk_base::SocketAddress& remote_addr, 241 const talk_base::PacketTime& packet_time) { 242 ASSERT(false); 243 return false; 244 } 245 246 // Sends a response message (normal or error) to the given request. One of 247 // these methods should be called as a response to SignalUnknownAddress. 248 // NOTE: You MUST call CreateConnection BEFORE SendBindingResponse. 249 virtual void SendBindingResponse(StunMessage* request, 250 const talk_base::SocketAddress& addr); 251 virtual void SendBindingErrorResponse( 252 StunMessage* request, const talk_base::SocketAddress& addr, 253 int error_code, const std::string& reason); 254 255 void set_proxy(const std::string& user_agent, 256 const talk_base::ProxyInfo& proxy) { 257 user_agent_ = user_agent; 258 proxy_ = proxy; 259 } 260 const std::string& user_agent() { return user_agent_; } 261 const talk_base::ProxyInfo& proxy() { return proxy_; } 262 263 virtual void EnablePortPackets(); 264 265 // Indicates to the port that its official use has now begun. This will 266 // start the timer that checks to see if the port is being used. 267 void Start(); 268 269 // Called if the port has no connections and is no longer useful. 270 void Destroy(); 271 272 virtual void OnMessage(talk_base::Message *pmsg); 273 274 // Debugging description of this port 275 virtual std::string ToString() const; 276 talk_base::IPAddress& ip() { return ip_; } 277 int min_port() { return min_port_; } 278 int max_port() { return max_port_; } 279 280 // This method will return local and remote username fragements from the 281 // stun username attribute if present. 282 bool ParseStunUsername(const StunMessage* stun_msg, 283 std::string* local_username, 284 std::string* remote_username) const; 285 void CreateStunUsername(const std::string& remote_username, 286 std::string* stun_username_attr_str) const; 287 288 bool MaybeIceRoleConflict(const talk_base::SocketAddress& addr, 289 IceMessage* stun_msg, 290 const std::string& remote_ufrag); 291 292 // Called when the socket is currently able to send. 293 void OnReadyToSend(); 294 295 // Called when the Connection discovers a local peer reflexive candidate. 296 // Returns the index of the new local candidate. 297 size_t AddPrflxCandidate(const Candidate& local); 298 299 // Returns if RFC 5245 ICE protocol is used. 300 bool IsStandardIce() const; 301 302 // Returns if Google ICE protocol is used. 303 bool IsGoogleIce() const; 304 305 // Returns default DSCP value. 306 talk_base::DiffServCodePoint DefaultDscpValue() const { 307 return default_dscp_; 308 } 309 310 protected: 311 enum { 312 MSG_CHECKTIMEOUT = 0, 313 MSG_FIRST_AVAILABLE 314 }; 315 316 void set_type(const std::string& type) { type_ = type; } 317 // Fills in the local address of the port. 318 void AddAddress(const talk_base::SocketAddress& address, 319 const talk_base::SocketAddress& base_address, 320 const std::string& protocol, const std::string& type, 321 uint32 type_preference, bool final); 322 323 // Adds the given connection to the list. (Deleting removes them.) 324 void AddConnection(Connection* conn); 325 326 // Called when a packet is received from an unknown address that is not 327 // currently a connection. If this is an authenticated STUN binding request, 328 // then we will signal the client. 329 void OnReadPacket(const char* data, size_t size, 330 const talk_base::SocketAddress& addr, 331 ProtocolType proto); 332 333 // If the given data comprises a complete and correct STUN message then the 334 // return value is true, otherwise false. If the message username corresponds 335 // with this port's username fragment, msg will contain the parsed STUN 336 // message. Otherwise, the function may send a STUN response internally. 337 // remote_username contains the remote fragment of the STUN username. 338 bool GetStunMessage(const char* data, size_t size, 339 const talk_base::SocketAddress& addr, 340 IceMessage** out_msg, std::string* out_username); 341 342 // Checks if the address in addr is compatible with the port's ip. 343 bool IsCompatibleAddress(const talk_base::SocketAddress& addr); 344 345 // Default DSCP value for this port. Set by TransportChannel. 346 void SetDefaultDscpValue(talk_base::DiffServCodePoint dscp) { 347 default_dscp_ = dscp; 348 } 349 350 private: 351 void Construct(); 352 // Called when one of our connections deletes itself. 353 void OnConnectionDestroyed(Connection* conn); 354 355 // Checks if this port is useless, and hence, should be destroyed. 356 void CheckTimeout(); 357 358 talk_base::Thread* thread_; 359 talk_base::PacketSocketFactory* factory_; 360 std::string type_; 361 bool send_retransmit_count_attribute_; 362 talk_base::Network* network_; 363 talk_base::IPAddress ip_; 364 int min_port_; 365 int max_port_; 366 std::string content_name_; 367 int component_; 368 uint32 generation_; 369 talk_base::SocketAddress related_address_; 370 // In order to establish a connection to this Port (so that real data can be 371 // sent through), the other side must send us a STUN binding request that is 372 // authenticated with this username_fragment and password. 373 // PortAllocatorSession will provide these username_fragment and password. 374 // 375 // Note: we should always use username_fragment() instead of using 376 // |ice_username_fragment_| directly. For the details see the comment on 377 // username_fragment(). 378 std::string ice_username_fragment_; 379 std::string password_; 380 std::vector<Candidate> candidates_; 381 AddressMap connections_; 382 enum Lifetime { LT_PRESTART, LT_PRETIMEOUT, LT_POSTTIMEOUT } lifetime_; 383 bool enable_port_packets_; 384 IceProtocolType ice_protocol_; 385 IceRole ice_role_; 386 uint64 tiebreaker_; 387 bool shared_socket_; 388 // DSCP value for ICE/STUN messages. Set by the P2PTransportChannel after 389 // port becomes ready. 390 talk_base::DiffServCodePoint default_dscp_; 391 // Information to use when going through a proxy. 392 std::string user_agent_; 393 talk_base::ProxyInfo proxy_; 394 395 friend class Connection; 396 }; 397 398 // Represents a communication link between a port on the local client and a 399 // port on the remote client. 400 class Connection : public talk_base::MessageHandler, 401 public sigslot::has_slots<> { 402 public: 403 // States are from RFC 5245. http://tools.ietf.org/html/rfc5245#section-5.7.4 404 enum State { 405 STATE_WAITING = 0, // Check has not been performed, Waiting pair on CL. 406 STATE_INPROGRESS, // Check has been sent, transaction is in progress. 407 STATE_SUCCEEDED, // Check already done, produced a successful result. 408 STATE_FAILED // Check for this connection failed. 409 }; 410 411 virtual ~Connection(); 412 413 // The local port where this connection sends and receives packets. 414 Port* port() { return port_; } 415 const Port* port() const { return port_; } 416 417 // Returns the description of the local port 418 virtual const Candidate& local_candidate() const; 419 420 // Returns the description of the remote port to which we communicate. 421 const Candidate& remote_candidate() const { return remote_candidate_; } 422 423 // Returns the pair priority. 424 uint64 priority() const; 425 426 enum ReadState { 427 STATE_READ_INIT = 0, // we have yet to receive a ping 428 STATE_READABLE = 1, // we have received pings recently 429 STATE_READ_TIMEOUT = 2, // we haven't received pings in a while 430 }; 431 432 ReadState read_state() const { return read_state_; } 433 bool readable() const { return read_state_ == STATE_READABLE; } 434 435 enum WriteState { 436 STATE_WRITABLE = 0, // we have received ping responses recently 437 STATE_WRITE_UNRELIABLE = 1, // we have had a few ping failures 438 STATE_WRITE_INIT = 2, // we have yet to receive a ping response 439 STATE_WRITE_TIMEOUT = 3, // we have had a large number of ping failures 440 }; 441 442 WriteState write_state() const { return write_state_; } 443 bool writable() const { return write_state_ == STATE_WRITABLE; } 444 445 // Determines whether the connection has finished connecting. This can only 446 // be false for TCP connections. 447 bool connected() const { return connected_; } 448 449 // Estimate of the round-trip time over this connection. 450 uint32 rtt() const { return rtt_; } 451 452 size_t sent_total_bytes(); 453 size_t sent_bytes_second(); 454 size_t recv_total_bytes(); 455 size_t recv_bytes_second(); 456 sigslot::signal1<Connection*> SignalStateChange; 457 458 // Sent when the connection has decided that it is no longer of value. It 459 // will delete itself immediately after this call. 460 sigslot::signal1<Connection*> SignalDestroyed; 461 462 // The connection can send and receive packets asynchronously. This matches 463 // the interface of AsyncPacketSocket, which may use UDP or TCP under the 464 // covers. 465 virtual int Send(const void* data, size_t size, 466 talk_base::DiffServCodePoint dscp) = 0; 467 468 // Error if Send() returns < 0 469 virtual int GetError() = 0; 470 471 sigslot::signal4<Connection*, const char*, size_t, 472 const talk_base::PacketTime&> SignalReadPacket; 473 474 sigslot::signal1<Connection*> SignalReadyToSend; 475 476 // Called when a packet is received on this connection. 477 void OnReadPacket(const char* data, size_t size, 478 const talk_base::PacketTime& packet_time); 479 480 // Called when the socket is currently able to send. 481 void OnReadyToSend(); 482 483 // Called when a connection is determined to be no longer useful to us. We 484 // still keep it around in case the other side wants to use it. But we can 485 // safely stop pinging on it and we can allow it to time out if the other 486 // side stops using it as well. 487 bool pruned() const { return pruned_; } 488 void Prune(); 489 490 bool use_candidate_attr() const { return use_candidate_attr_; } 491 void set_use_candidate_attr(bool enable); 492 493 void set_remote_ice_mode(IceMode mode) { 494 remote_ice_mode_ = mode; 495 } 496 497 // Makes the connection go away. 498 void Destroy(); 499 500 // Checks that the state of this connection is up-to-date. The argument is 501 // the current time, which is compared against various timeouts. 502 void UpdateState(uint32 now); 503 504 // Called when this connection should try checking writability again. 505 uint32 last_ping_sent() const { return last_ping_sent_; } 506 void Ping(uint32 now); 507 508 // Called whenever a valid ping is received on this connection. This is 509 // public because the connection intercepts the first ping for us. 510 uint32 last_ping_received() const { return last_ping_received_; } 511 void ReceivedPing(); 512 513 // Debugging description of this connection 514 std::string ToString() const; 515 std::string ToSensitiveString() const; 516 517 bool reported() const { return reported_; } 518 void set_reported(bool reported) { reported_ = reported;} 519 520 // This flag will be set if this connection is the chosen one for media 521 // transmission. This connection will send STUN ping with USE-CANDIDATE 522 // attribute. 523 sigslot::signal1<Connection*> SignalUseCandidate; 524 // Invoked when Connection receives STUN error response with 487 code. 525 void HandleRoleConflictFromPeer(); 526 527 State state() const { return state_; } 528 529 IceMode remote_ice_mode() const { return remote_ice_mode_; } 530 531 protected: 532 // Constructs a new connection to the given remote port. 533 Connection(Port* port, size_t index, const Candidate& candidate); 534 535 // Called back when StunRequestManager has a stun packet to send 536 void OnSendStunPacket(const void* data, size_t size, StunRequest* req); 537 538 // Callbacks from ConnectionRequest 539 void OnConnectionRequestResponse(ConnectionRequest* req, 540 StunMessage* response); 541 void OnConnectionRequestErrorResponse(ConnectionRequest* req, 542 StunMessage* response); 543 void OnConnectionRequestTimeout(ConnectionRequest* req); 544 545 // Changes the state and signals if necessary. 546 void set_read_state(ReadState value); 547 void set_write_state(WriteState value); 548 void set_state(State state); 549 void set_connected(bool value); 550 551 // Checks if this connection is useless, and hence, should be destroyed. 552 void CheckTimeout(); 553 554 void OnMessage(talk_base::Message *pmsg); 555 556 Port* port_; 557 size_t local_candidate_index_; 558 Candidate remote_candidate_; 559 ReadState read_state_; 560 WriteState write_state_; 561 bool connected_; 562 bool pruned_; 563 // By default |use_candidate_attr_| flag will be true, 564 // as we will be using agrressive nomination. 565 // But when peer is ice-lite, this flag "must" be initialized to false and 566 // turn on when connection becomes "best connection". 567 bool use_candidate_attr_; 568 IceMode remote_ice_mode_; 569 StunRequestManager requests_; 570 uint32 rtt_; 571 uint32 last_ping_sent_; // last time we sent a ping to the other side 572 uint32 last_ping_received_; // last time we received a ping from the other 573 // side 574 uint32 last_data_received_; 575 uint32 last_ping_response_received_; 576 std::vector<uint32> pings_since_last_response_; 577 578 talk_base::RateTracker recv_rate_tracker_; 579 talk_base::RateTracker send_rate_tracker_; 580 581 private: 582 void MaybeAddPrflxCandidate(ConnectionRequest* request, 583 StunMessage* response); 584 585 bool reported_; 586 State state_; 587 588 friend class Port; 589 friend class ConnectionRequest; 590 }; 591 592 // ProxyConnection defers all the interesting work to the port 593 class ProxyConnection : public Connection { 594 public: 595 ProxyConnection(Port* port, size_t index, const Candidate& candidate); 596 597 virtual int Send(const void* data, size_t size, 598 talk_base::DiffServCodePoint dscp); 599 virtual int GetError() { return error_; } 600 601 private: 602 int error_; 603 }; 604 605 } // namespace cricket 606 607 #endif // TALK_P2P_BASE_PORT_H_ 608