2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-29 13:38:26 +00:00

[CVE-2024-12705] sec: usr: DNS-over-HTTP(s) flooding fixes

Fix DNS-over-HTTP(S) implementation issues that arise under heavy
query load. Optimize resource usage for :iscman:`named` instances
that accept queries over DNS-over-HTTP(S).

Previously, :iscman:`named` would process all incoming HTTP/2 data
at once, which could overwhelm the server, especially when dealing
with clients that send requests but don't wait for responses. That
has been fixed. Now, :iscman:`named` handles HTTP/2 data in smaller
chunks and throttles reading until the remote side reads the
response data. It also throttles clients that send too many requests
at once.

Additionally, :iscman:`named` now carefully processes data sent by
some clients, which can be considered "flooding." It logs these
clients and drops connections from them.
:gl:`#4795`

In some cases, :iscman:`named` could leave DNS-over-HTTP(S)
connections in the `CLOSE_WAIT` state indefinitely. That also has
been fixed. ISC would like to thank JF Billaud for thoroughly
investigating the issue and verifying the fix.
:gl:`#5083`

See https://gitlab.isc.org/isc-projects/bind9/-/issues/4795

Closes https://gitlab.isc.org/isc-projects/bind9/-/issues/5083

Merge branch 'artem-improve-doh-resource-usage' into 'v9.21.4-release'

See merge request isc-private/bind9!732
This commit is contained in:
Andoni Duarte 2025-01-15 14:42:44 +00:00
commit bddaff3210
6 changed files with 435 additions and 37 deletions

View File

@ -85,6 +85,37 @@
#define INITIAL_DNS_MESSAGE_BUFFER_SIZE (512) #define INITIAL_DNS_MESSAGE_BUFFER_SIZE (512)
/*
* The value should be small enough to not allow a server to open too
* many streams at once. It should not be too small either because
* the incoming data will be split into too many chunks with each of
* them processed asynchronously.
*/
#define INCOMING_DATA_CHUNK_SIZE (256)
/*
* Often processing a chunk does not change the number of streams. In
* that case we can process more than once, but we still should have a
* hard limit on that.
*/
#define INCOMING_DATA_MAX_CHUNKS_AT_ONCE (4)
/*
* These constants define the grace period to help detect flooding clients.
*
* The first one defines how much data can be processed before opening
* a first stream and received at least some useful (=DNS) data.
*
* The second one defines how much data from a client we read before
* trying to drop a clients who sends not enough useful data.
*
* The third constant defines how many streams we agree to process
* before checking if there was at least one DNS request received.
*/
#define INCOMING_DATA_INITIAL_STREAM_SIZE (1536)
#define INCOMING_DATA_GRACE_SIZE (MAX_ALLOWED_DATA_IN_HEADERS)
#define MAX_STREAMS_BEFORE_FIRST_REQUEST (50)
typedef struct isc_nm_http_response_status { typedef struct isc_nm_http_response_status {
size_t code; size_t code;
size_t content_length; size_t content_length;
@ -143,6 +174,7 @@ struct isc_nm_http_session {
ISC_LIST(http_cstream_t) cstreams; ISC_LIST(http_cstream_t) cstreams;
ISC_LIST(isc_nmsocket_h2_t) sstreams; ISC_LIST(isc_nmsocket_h2_t) sstreams;
size_t nsstreams; size_t nsstreams;
uint64_t total_opened_sstreams;
isc_nmhandle_t *handle; isc_nmhandle_t *handle;
isc_nmhandle_t *client_httphandle; isc_nmhandle_t *client_httphandle;
@ -155,6 +187,18 @@ struct isc_nm_http_session {
isc__nm_http_pending_callbacks_t pending_write_callbacks; isc__nm_http_pending_callbacks_t pending_write_callbacks;
isc_buffer_t *pending_write_data; isc_buffer_t *pending_write_data;
/*
* The statistical values below are for usage on server-side
* only. They are meant to detect clients that are taking too many
* resources from the server.
*/
uint64_t received; /* How many requests have been received. */
uint64_t submitted; /* How many responses were submitted to send */
uint64_t processed; /* How many responses were processed. */
uint64_t processed_incoming_data;
uint64_t processed_useful_data; /* DNS data */
}; };
typedef enum isc_http_error_responses { typedef enum isc_http_error_responses {
@ -177,6 +221,7 @@ typedef struct isc_http_send_req {
void *cbarg; void *cbarg;
isc_buffer_t *pending_write_data; isc_buffer_t *pending_write_data;
isc__nm_http_pending_callbacks_t pending_write_callbacks; isc__nm_http_pending_callbacks_t pending_write_callbacks;
uint64_t submitted;
} isc_http_send_req_t; } isc_http_send_req_t;
#define HTTP_ENDPOINTS_MAGIC ISC_MAGIC('H', 'T', 'E', 'P') #define HTTP_ENDPOINTS_MAGIC ISC_MAGIC('H', 'T', 'E', 'P')
@ -189,10 +234,26 @@ static bool
http_send_outgoing(isc_nm_http_session_t *session, isc_nmhandle_t *httphandle, http_send_outgoing(isc_nm_http_session_t *session, isc_nmhandle_t *httphandle,
isc_nm_cb_t cb, void *cbarg); isc_nm_cb_t cb, void *cbarg);
static void
http_log_flooding_peer(isc_nm_http_session_t *session);
static bool
http_is_flooding_peer(isc_nm_http_session_t *session);
static ssize_t
http_process_input_data(isc_nm_http_session_t *session,
isc_buffer_t *input_data);
static inline bool
http_too_many_active_streams(isc_nm_http_session_t *session);
static void static void
http_do_bio(isc_nm_http_session_t *session, isc_nmhandle_t *send_httphandle, http_do_bio(isc_nm_http_session_t *session, isc_nmhandle_t *send_httphandle,
isc_nm_cb_t send_cb, void *send_cbarg); isc_nm_cb_t send_cb, void *send_cbarg);
static void
http_do_bio_async(isc_nm_http_session_t *session);
static void static void
failed_httpstream_read_cb(isc_nmsocket_t *sock, isc_result_t result, failed_httpstream_read_cb(isc_nmsocket_t *sock, isc_result_t result,
isc_nm_http_session_t *session); isc_nm_http_session_t *session);
@ -499,9 +560,20 @@ finish_http_session(isc_nm_http_session_t *session) {
if (!session->closed) { if (!session->closed) {
session->closed = true; session->closed = true;
session->reading = false; session->reading = false;
isc_nm_read_stop(session->handle);
isc__nmsocket_timer_stop(session->handle->sock);
isc_nmhandle_close(session->handle); isc_nmhandle_close(session->handle);
} }
/*
* Free any unprocessed incoming data in order to not process
* it during indirect calls to http_do_bio() that might happen
* when calling the failed callbacks.
*/
if (session->buf != NULL) {
isc_buffer_free(&session->buf);
}
if (session->client) { if (session->client) {
client_call_failed_read_cb(ISC_R_UNEXPECTED, session); client_call_failed_read_cb(ISC_R_UNEXPECTED, session);
} else { } else {
@ -575,6 +647,7 @@ on_server_data_chunk_recv_callback(int32_t stream_id, const uint8_t *data,
if (new_bufsize <= MAX_DNS_MESSAGE_SIZE && if (new_bufsize <= MAX_DNS_MESSAGE_SIZE &&
new_bufsize <= h2->content_length) new_bufsize <= h2->content_length)
{ {
session->processed_useful_data += len;
isc_buffer_putmem(&h2->rbuf, data, len); isc_buffer_putmem(&h2->rbuf, data, len);
break; break;
} }
@ -623,6 +696,9 @@ call_unlink_cstream_readcb(http_cstream_t *cstream,
isc_buffer_usedregion(cstream->rbuf, &read_data); isc_buffer_usedregion(cstream->rbuf, &read_data);
cstream->read_cb(session->client_httphandle, result, &read_data, cstream->read_cb(session->client_httphandle, result, &read_data,
cstream->read_cbarg); cstream->read_cbarg);
if (result == ISC_R_SUCCESS) {
isc__nmsocket_timer_restart(session->handle->sock);
}
put_http_cstream(session->mctx, cstream); put_http_cstream(session->mctx, cstream);
} }
@ -664,6 +740,9 @@ on_server_stream_close_callback(int32_t stream_id,
ISC_LIST_UNLINK(session->sstreams, sock->h2, link); ISC_LIST_UNLINK(session->sstreams, sock->h2, link);
session->nsstreams--; session->nsstreams--;
if (sock->h2->request_received) {
session->submitted++;
}
/* /*
* By making a call to isc__nmsocket_prep_destroy(), we ensure that * By making a call to isc__nmsocket_prep_destroy(), we ensure that
@ -975,6 +1054,181 @@ client_submit_request(isc_nm_http_session_t *session, http_cstream_t *stream) {
return ISC_R_SUCCESS; return ISC_R_SUCCESS;
} }
static ssize_t
http_process_input_data(isc_nm_http_session_t *session,
isc_buffer_t *input_data) {
ssize_t readlen = 0;
ssize_t processed = 0;
isc_region_t chunk = { 0 };
size_t before, after;
size_t i;
REQUIRE(VALID_HTTP2_SESSION(session));
REQUIRE(input_data != NULL);
if (!http_session_active(session)) {
return 0;
}
/*
* For clients that initiate request themselves just process
* everything.
*/
if (session->client) {
isc_buffer_remainingregion(input_data, &chunk);
if (chunk.length == 0) {
return 0;
}
readlen = nghttp2_session_mem_recv(session->ngsession,
chunk.base, chunk.length);
if (readlen >= 0) {
isc_buffer_forward(input_data, readlen);
session->processed_incoming_data += readlen;
}
return readlen;
}
/*
* If no streams are created during processing, we might process
* more than one chunk at a time. Still we should not overdo that
* to avoid processing too much data at once as such behaviour is
* known for trashing the memory allocator at times.
*/
for (before = after = session->nsstreams, i = 0;
after <= before && i < INCOMING_DATA_MAX_CHUNKS_AT_ONCE;
after = session->nsstreams, i++)
{
const uint64_t active_streams =
(session->received - session->processed);
/*
* If there are non completed send requests in flight -let's
* not process any incoming data, as it could lead to piling
* up too much send data in send buffers. With many clients
* connected it can lead to excessive memory consumption on
* the server instance.
*/
if (session->sending > 0) {
break;
}
/*
* If we have reached the maximum number of streams used, we
* might stop processing for now, as nghttp2 will happily
* consume as much data as possible.
*/
if (session->nsstreams >= session->max_concurrent_streams &&
active_streams > 0)
{
break;
}
if (http_too_many_active_streams(session)) {
break;
}
isc_buffer_remainingregion(input_data, &chunk);
if (chunk.length == 0) {
break;
}
chunk.length = ISC_MIN(chunk.length, INCOMING_DATA_CHUNK_SIZE);
readlen = nghttp2_session_mem_recv(session->ngsession,
chunk.base, chunk.length);
if (readlen >= 0) {
isc_buffer_forward(input_data, readlen);
session->processed_incoming_data += readlen;
processed += readlen;
} else {
isc_buffer_clear(input_data);
return readlen;
}
}
return processed;
}
static void
http_log_flooding_peer(isc_nm_http_session_t *session) {
const int log_level = ISC_LOG_DEBUG(1);
if (session->handle != NULL && isc_log_wouldlog(log_level)) {
char client_sabuf[ISC_SOCKADDR_FORMATSIZE];
char local_sabuf[ISC_SOCKADDR_FORMATSIZE];
isc_sockaddr_format(&session->handle->sock->peer, client_sabuf,
sizeof(client_sabuf));
isc_sockaddr_format(&session->handle->sock->iface, local_sabuf,
sizeof(local_sabuf));
isc__nmsocket_log(session->handle->sock, log_level,
"Dropping a flooding HTTP/2 peer "
"%s (on %s) - processed: %" PRIu64
" bytes, of them useful: %" PRIu64 "",
client_sabuf, local_sabuf,
session->processed_incoming_data,
session->processed_useful_data);
}
}
static bool
http_is_flooding_peer(isc_nm_http_session_t *session) {
if (session->client) {
return false;
}
/*
* A flooding client can try to open a lot of streams before
* submitting a request. Let's drop such clients.
*/
if (session->received == 0 &&
session->total_opened_sstreams > MAX_STREAMS_BEFORE_FIRST_REQUEST)
{
return true;
}
/*
* We have processed enough data to open at least one stream and
* get some useful data.
*/
if (session->processed_incoming_data >
INCOMING_DATA_INITIAL_STREAM_SIZE &&
(session->total_opened_sstreams == 0 ||
session->processed_useful_data == 0))
{
return true;
}
if (session->processed_incoming_data < INCOMING_DATA_GRACE_SIZE) {
return false;
}
/*
* The overhead of DoH per DNS message can be minimum 160-180
* bytes. We should allow more for extra information that can be
* included in headers, so let's use 256 bytes. Minimum DNS
* message size is 12 bytes. So, (256+12)/12=22. Even that can be
* too restricting for some edge cases, but should be good enough
* for any practical purposes. Not to mention that HTTP/2 may
* include legitimate data that is completely useless for DNS
* purposes...
*
* Anyway, at that point we should have processed enough requests
* for such clients (if any).
*/
if (session->processed_useful_data == 0 ||
(session->processed_incoming_data /
session->processed_useful_data) > 22)
{
return true;
}
return false;
}
/* /*
* Read callback from TLS socket. * Read callback from TLS socket.
*/ */
@ -984,6 +1238,7 @@ http_readcb(isc_nmhandle_t *handle ISC_ATTR_UNUSED, isc_result_t result,
isc_nm_http_session_t *session = (isc_nm_http_session_t *)data; isc_nm_http_session_t *session = (isc_nm_http_session_t *)data;
isc_nm_http_session_t *tmpsess = NULL; isc_nm_http_session_t *tmpsess = NULL;
ssize_t readlen; ssize_t readlen;
isc_buffer_t input;
REQUIRE(VALID_HTTP2_SESSION(session)); REQUIRE(VALID_HTTP2_SESSION(session));
@ -1001,11 +1256,17 @@ http_readcb(isc_nmhandle_t *handle ISC_ATTR_UNUSED, isc_result_t result,
goto done; goto done;
} }
readlen = nghttp2_session_mem_recv(session->ngsession, region->base, isc_buffer_init(&input, region->base, region->length);
region->length); isc_buffer_add(&input, region->length);
readlen = http_process_input_data(session, &input);
if (readlen < 0) { if (readlen < 0) {
failed_read_cb(ISC_R_UNEXPECTED, session); failed_read_cb(ISC_R_UNEXPECTED, session);
goto done; goto done;
} else if (http_is_flooding_peer(session)) {
http_log_flooding_peer(session);
failed_read_cb(ISC_R_RANGE, session);
goto done;
} }
if ((size_t)readlen < region->length) { if ((size_t)readlen < region->length) {
@ -1017,10 +1278,11 @@ http_readcb(isc_nmhandle_t *handle ISC_ATTR_UNUSED, isc_result_t result,
isc_buffer_putmem(session->buf, region->base + readlen, isc_buffer_putmem(session->buf, region->base + readlen,
unread_size); unread_size);
isc_nm_read_stop(session->handle); isc_nm_read_stop(session->handle);
} http_do_bio_async(session);
} else {
/* We might have something to receive or send, do IO */ /* We might have something to receive or send, do IO */
http_do_bio(session, NULL, NULL, NULL); http_do_bio(session, NULL, NULL, NULL);
}
done: done:
isc__nm_httpsession_detach(&tmpsess); isc__nm_httpsession_detach(&tmpsess);
@ -1059,14 +1321,18 @@ http_writecb(isc_nmhandle_t *handle, isc_result_t result, void *arg) {
} }
isc_buffer_free(&req->pending_write_data); isc_buffer_free(&req->pending_write_data);
session->processed += req->submitted;
isc_mem_put(session->mctx, req, sizeof(*req)); isc_mem_put(session->mctx, req, sizeof(*req));
session->sending--; session->sending--;
if (result == ISC_R_SUCCESS) {
http_do_bio(session, NULL, NULL, NULL); http_do_bio(session, NULL, NULL, NULL);
isc_nmhandle_detach(&transphandle); } else {
if (result != ISC_R_SUCCESS && session->sending == 0) {
finish_http_session(session); finish_http_session(session);
} }
isc_nmhandle_detach(&transphandle);
isc__nm_httpsession_detach(&session); isc__nm_httpsession_detach(&session);
} }
@ -1227,7 +1493,9 @@ http_send_outgoing(isc_nm_http_session_t *session, isc_nmhandle_t *httphandle,
*send = (isc_http_send_req_t){ .pending_write_data = *send = (isc_http_send_req_t){ .pending_write_data =
session->pending_write_data, session->pending_write_data,
.cb = cb, .cb = cb,
.cbarg = cbarg }; .cbarg = cbarg,
.submitted = session->submitted };
session->submitted = 0;
session->pending_write_data = NULL; session->pending_write_data = NULL;
move_pending_send_callbacks(session, send); move_pending_send_callbacks(session, send);
@ -1249,6 +1517,28 @@ nothing_to_send:
return false; return false;
} }
static inline bool
http_too_many_active_streams(isc_nm_http_session_t *session) {
const uint64_t active_streams = session->received - session->processed;
const uint64_t max_active_streams =
ISC_MIN(ISC_NETMGR_MAX_STREAM_CLIENTS_PER_CONN,
session->max_concurrent_streams);
if (session->client) {
return false;
}
/*
* Do not process incoming data if there are too many active DNS
* clients (streams) per connection.
*/
if (active_streams >= max_active_streams) {
return true;
}
return false;
}
static void static void
http_do_bio(isc_nm_http_session_t *session, isc_nmhandle_t *send_httphandle, http_do_bio(isc_nm_http_session_t *session, isc_nmhandle_t *send_httphandle,
isc_nm_cb_t send_cb, void *send_cbarg) { isc_nm_cb_t send_cb, void *send_cbarg) {
@ -1264,42 +1554,86 @@ http_do_bio(isc_nm_http_session_t *session, isc_nmhandle_t *send_httphandle,
finish_http_session(session); finish_http_session(session);
} }
return; return;
} else if (nghttp2_session_want_read(session->ngsession) == 0 && }
nghttp2_session_want_write(session->ngsession) == 0 &&
session->pending_write_data == NULL) if (send_cb != NULL) {
{ INSIST(VALID_NMHANDLE(send_httphandle));
session->closing = true; (void)http_send_outgoing(session, send_httphandle, send_cb,
send_cbarg);
return;
}
INSIST(send_httphandle == NULL);
INSIST(send_cb == NULL);
INSIST(send_cbarg == NULL);
if (session->pending_write_data != NULL && session->sending == 0) {
(void)http_send_outgoing(session, NULL, NULL, NULL);
return; return;
} }
if (nghttp2_session_want_read(session->ngsession) != 0) { if (nghttp2_session_want_read(session->ngsession) != 0) {
if (!session->reading) { if (!session->reading) {
/* We have not yet started /* We have not yet started reading from this handle */
* reading from this handle */ isc__nmsocket_timer_start(session->handle->sock);
isc_nm_read(session->handle, http_readcb, session); isc_nm_read(session->handle, http_readcb, session);
session->reading = true; session->reading = true;
} else if (session->buf != NULL) { } else if (session->buf != NULL) {
size_t remaining = size_t remaining =
isc_buffer_remaininglength(session->buf); isc_buffer_remaininglength(session->buf);
/* Leftover data in the /* Leftover data in the buffer, use it */
* buffer, use it */ size_t remaining_after = 0;
size_t readlen = nghttp2_session_mem_recv( ssize_t readlen = 0;
session->ngsession, isc_nm_http_session_t *tmpsess = NULL;
isc_buffer_current(session->buf), remaining);
if (readlen == remaining) { /*
* Let's ensure that HTTP/2 session and its associated
* data will not go "out of scope" too early.
*/
isc__nm_httpsession_attach(session, &tmpsess);
readlen = http_process_input_data(session,
session->buf);
remaining_after =
isc_buffer_remaininglength(session->buf);
if (readlen < 0) {
failed_read_cb(ISC_R_UNEXPECTED, session);
} else if (http_is_flooding_peer(session)) {
http_log_flooding_peer(session);
failed_read_cb(ISC_R_RANGE, session);
} else if ((size_t)readlen == remaining) {
isc_buffer_free(&session->buf); isc_buffer_free(&session->buf);
http_do_bio(session, NULL, NULL, NULL);
} else if (remaining_after > 0 &&
remaining_after < remaining)
{
/*
* We have processed a part of the data, now
* let's delay processing of whatever is left
* here. We want it to be an async operation so
* that we will:
*
* a) let other things run;
* b) have finer grained control over how much
* data is processed at once, because nghttp2
* would happily consume as much data we pass to
* it and that could overwhelm the server.
*/
http_do_bio_async(session);
} else { } else {
isc_buffer_forward(session->buf, readlen); (void)http_send_outgoing(session, NULL, NULL,
NULL);
} }
http_do_bio(session, send_httphandle, send_cb, isc__nm_httpsession_detach(&tmpsess);
send_cbarg);
return; return;
} else { } else {
/* Resume reading, it's /*
* idempotent, wait for more * Resume reading, it's idempotent, wait for more
*/ */
isc__nmsocket_timer_start(session->handle->sock);
isc_nm_read(session->handle, http_readcb, session); isc_nm_read(session->handle, http_readcb, session);
} }
} else { } else {
@ -1307,20 +1641,54 @@ http_do_bio(isc_nm_http_session_t *session, isc_nmhandle_t *send_httphandle,
isc_nm_read_stop(session->handle); isc_nm_read_stop(session->handle);
} }
if (send_cb != NULL) { /* we might have some data to send after processing */
INSIST(VALID_NMHANDLE(send_httphandle));
(void)http_send_outgoing(session, send_httphandle, send_cb,
send_cbarg);
} else {
INSIST(send_httphandle == NULL);
INSIST(send_cb == NULL);
INSIST(send_cbarg == NULL);
(void)http_send_outgoing(session, NULL, NULL, NULL); (void)http_send_outgoing(session, NULL, NULL, NULL);
if (nghttp2_session_want_read(session->ngsession) == 0 &&
nghttp2_session_want_write(session->ngsession) == 0 &&
session->pending_write_data == NULL)
{
session->closing = true;
isc_nm_read_stop(session->handle);
if (session->sending == 0) {
finish_http_session(session);
}
} }
return; return;
} }
static void
http_do_bio_async_cb(void *arg) {
isc_nm_http_session_t *session = arg;
REQUIRE(VALID_HTTP2_SESSION(session));
if (session->handle != NULL &&
!isc__nmsocket_closing(session->handle->sock))
{
http_do_bio(session, NULL, NULL, NULL);
}
isc__nm_httpsession_detach(&session);
}
static void
http_do_bio_async(isc_nm_http_session_t *session) {
isc_nm_http_session_t *tmpsess = NULL;
REQUIRE(VALID_HTTP2_SESSION(session));
if (session->handle == NULL ||
isc__nmsocket_closing(session->handle->sock))
{
return;
}
isc__nm_httpsession_attach(session, &tmpsess);
isc_async_run(session->handle->sock->worker->loop, http_do_bio_async_cb,
tmpsess);
}
static isc_result_t static isc_result_t
get_http_cstream(isc_nmsocket_t *sock, http_cstream_t **streamp) { get_http_cstream(isc_nmsocket_t *sock, http_cstream_t **streamp) {
http_cstream_t *cstream = sock->h2->connect.cstream; http_cstream_t *cstream = sock->h2->connect.cstream;
@ -1442,6 +1810,7 @@ transport_connect_cb(isc_nmhandle_t *handle, isc_result_t result, void *cbarg) {
} }
http_transpost_tcp_nodelay(handle); http_transpost_tcp_nodelay(handle);
isc__nmhandle_set_manual_timer(session->handle, true);
http_call_connect_cb(http_sock, session, result); http_call_connect_cb(http_sock, session, result);
@ -1723,6 +2092,7 @@ server_on_begin_headers_callback(nghttp2_session *ngsession,
session->nsstreams++; session->nsstreams++;
isc__nm_httpsession_attach(session, &socket->h2->session); isc__nm_httpsession_attach(session, &socket->h2->session);
ISC_LIST_APPEND(session->sstreams, socket->h2, link); ISC_LIST_APPEND(session->sstreams, socket->h2, link);
session->total_opened_sstreams++;
nghttp2_session_set_stream_user_data(ngsession, frame->hd.stream_id, nghttp2_session_set_stream_user_data(ngsession, frame->hd.stream_id,
socket); socket);
@ -1782,6 +2152,8 @@ server_handle_path_header(isc_nmsocket_t *socket, const uint8_t *value,
socket->worker->mctx, dns_value, socket->worker->mctx, dns_value,
dns_value_len, dns_value_len,
&socket->h2->query_data_len); &socket->h2->query_data_len);
socket->h2->session->processed_useful_data +=
dns_value_len;
} else { } else {
socket->h2->query_too_large = true; socket->h2->query_too_large = true;
return ISC_HTTP_ERROR_PAYLOAD_TOO_LARGE; return ISC_HTTP_ERROR_PAYLOAD_TOO_LARGE;
@ -2090,6 +2462,12 @@ server_call_cb(isc_nmsocket_t *socket, const isc_result_t result,
handle = isc__nmhandle_get(socket, NULL, NULL); handle = isc__nmhandle_get(socket, NULL, NULL);
if (result != ISC_R_SUCCESS) { if (result != ISC_R_SUCCESS) {
data = NULL; data = NULL;
} else if (socket->h2->session->handle != NULL) {
isc__nmsocket_timer_restart(socket->h2->session->handle->sock);
}
if (result == ISC_R_SUCCESS) {
socket->h2->request_received = true;
socket->h2->session->received++;
} }
socket->h2->cb(handle, result, data, socket->h2->cbarg); socket->h2->cb(handle, result, data, socket->h2->cbarg);
isc_nmhandle_detach(&handle); isc_nmhandle_detach(&handle);
@ -2106,6 +2484,12 @@ isc__nm_http_bad_request(isc_nmhandle_t *handle) {
REQUIRE(!sock->client); REQUIRE(!sock->client);
REQUIRE(VALID_HTTP2_SESSION(sock->h2->session)); REQUIRE(VALID_HTTP2_SESSION(sock->h2->session));
if (sock->h2->response_submitted ||
!http_session_active(sock->h2->session))
{
return;
}
(void)server_send_error_response(ISC_HTTP_ERROR_BAD_REQUEST, (void)server_send_error_response(ISC_HTTP_ERROR_BAD_REQUEST,
sock->h2->session->ngsession, sock); sock->h2->session->ngsession, sock);
} }
@ -2492,6 +2876,8 @@ httplisten_acceptcb(isc_nmhandle_t *handle, isc_result_t result, void *cbarg) {
isc__nmsocket_attach(httpserver, &session->serversocket); isc__nmsocket_attach(httpserver, &session->serversocket);
server_send_connection_header(session); server_send_connection_header(session);
isc__nmhandle_set_manual_timer(session->handle, true);
/* TODO H2 */ /* TODO H2 */
http_do_bio(session, NULL, NULL, NULL); http_do_bio(session, NULL, NULL, NULL);
return ISC_R_SUCCESS; return ISC_R_SUCCESS;

View File

@ -474,6 +474,7 @@ typedef struct isc_nmsocket_h2 {
isc_nm_http_endpoints_t *peer_endpoints; isc_nm_http_endpoints_t *peer_endpoints;
bool request_received;
bool response_submitted; bool response_submitted;
struct { struct {
char *uri; char *uri;

View File

@ -121,6 +121,7 @@ proxystream_on_header_data_cb(const isc_result_t result,
* the case of TCP it is disabled by default * the case of TCP it is disabled by default
*/ */
proxystream_read_stop(sock); proxystream_read_stop(sock);
isc__nmsocket_timer_stop(sock);
isc__nmhandle_set_manual_timer(sock->outerhandle, false); isc__nmhandle_set_manual_timer(sock->outerhandle, false);
sock->proxy.header_processed = true; sock->proxy.header_processed = true;
@ -775,6 +776,7 @@ isc__nm_proxystream_close(isc_nmsocket_t *sock) {
* external references, we can close everything. * external references, we can close everything.
*/ */
proxystream_read_stop(sock); proxystream_read_stop(sock);
isc__nmsocket_timer_stop(sock);
if (sock->outerhandle != NULL) { if (sock->outerhandle != NULL) {
sock->reading = false; sock->reading = false;
isc_nm_read_stop(sock->outerhandle); isc_nm_read_stop(sock->outerhandle);

View File

@ -1009,6 +1009,7 @@ streamdns_close_direct(isc_nmsocket_t *sock) {
if (sock->outerhandle != NULL) { if (sock->outerhandle != NULL) {
sock->streamdns.reading = false; sock->streamdns.reading = false;
isc__nmsocket_timer_stop(sock);
isc_nm_read_stop(sock->outerhandle); isc_nm_read_stop(sock->outerhandle);
isc_nmhandle_close(sock->outerhandle); isc_nmhandle_close(sock->outerhandle);
isc_nmhandle_detach(&sock->outerhandle); isc_nmhandle_detach(&sock->outerhandle);

View File

@ -759,7 +759,9 @@ isc__nm_tcp_read_stop(isc_nmhandle_t *handle) {
isc_nmsocket_t *sock = handle->sock; isc_nmsocket_t *sock = handle->sock;
if (!sock->manual_read_timer) {
isc__nmsocket_timer_stop(sock); isc__nmsocket_timer_stop(sock);
}
isc__nm_stop_reading(sock); isc__nm_stop_reading(sock);
sock->reading = false; sock->reading = false;

View File

@ -465,6 +465,7 @@ tls_try_handshake(isc_nmsocket_t *sock, isc_result_t *presult) {
isc__nmsocket_log_tls_session_reuse(sock, sock->tlsstream.tls); isc__nmsocket_log_tls_session_reuse(sock, sock->tlsstream.tls);
tlshandle = isc__nmhandle_get(sock, &sock->peer, &sock->iface); tlshandle = isc__nmhandle_get(sock, &sock->peer, &sock->iface);
isc__nmsocket_timer_stop(sock);
tls_read_stop(sock); tls_read_stop(sock);
if (isc__nm_closing(sock->worker)) { if (isc__nm_closing(sock->worker)) {
@ -1154,6 +1155,10 @@ isc__nm_tls_read_stop(isc_nmhandle_t *handle) {
handle->sock->reading = false; handle->sock->reading = false;
if (!handle->sock->manual_read_timer) {
isc__nmsocket_timer_stop(handle->sock);
}
tls_read_stop(handle->sock); tls_read_stop(handle->sock);
} }
@ -1174,6 +1179,7 @@ isc__nm_tls_close(isc_nmsocket_t *sock) {
*/ */
tls_read_stop(sock); tls_read_stop(sock);
if (sock->outerhandle != NULL) { if (sock->outerhandle != NULL) {
isc__nmsocket_timer_stop(sock);
isc_nm_read_stop(sock->outerhandle); isc_nm_read_stop(sock->outerhandle);
isc_nmhandle_close(sock->outerhandle); isc_nmhandle_close(sock->outerhandle);
isc_nmhandle_detach(&sock->outerhandle); isc_nmhandle_detach(&sock->outerhandle);