proxyproto: add UDP session tracking for Spectrum PPv2 (#7967)

This commit is contained in:
Minghang Chen
2026-03-28 15:06:36 -07:00
committed by GitHub
parent 12d9457e71
commit 34acf8353f
10 changed files with 398 additions and 19 deletions

View File

@@ -10,6 +10,7 @@ import (
clog "github.com/coredns/coredns/plugin/pkg/log"
"github.com/hashicorp/golang-lru/v2/expirable"
"github.com/pires/go-proxyproto"
)
@@ -18,11 +19,49 @@ var (
_ net.Addr = (*Addr)(nil)
)
// errHeaderOnly is a sentinel used internally to signal that the datagram
// contained only a PROXY Protocol header with no DNS payload. It is never
// returned to callers of ReadFrom.
var errHeaderOnly = errors.New("header-only datagram; no payload")
// PacketConn wraps a net.PacketConn and strips PROXY Protocol v2 headers from
// incoming UDP datagrams.
//
// When UDPSessionTrackingTTL is greater than zero the connection implements
// Cloudflare Spectrum's PPv2-over-UDP behavior: the PROXY header arrives in
// the very first datagram of a session (which may carries an empty payload)
// while all subsequent datagrams carry real DNS payload without any header.
// The real source address parsed from the first datagram is cached keyed by
// the Spectrum-side remote address and applied to every headerless datagram
// that arrives from the same remote address within UDPSessionTrackingTTL.
//
// The session cache is a fixed-capacity LRU (capped at udpSessionMaxEntries)
// so that memory usage is bounded regardless of the number of distinct remote
// addresses seen.
type PacketConn struct {
net.PacketConn
ConnPolicy proxyproto.ConnPolicyFunc
ValidateHeader proxyproto.Validator
ReadHeaderTimeout time.Duration
// UDPSessionTrackingTTL enables per-remote-address session state for UDP
// when set to a positive duration. A header-only datagram (valid PPv2
// header with or without payload) causes the parsed source address to be
// cached for this duration. Subsequent datagrams from the same remote
// address that carry no PPv2 header are assigned the cached source
// address. The TTL is refreshed on every matching packet. A zero or
// negative value disables session tracking entirely.
UDPSessionTrackingTTL time.Duration
// UDPSessionTrackingMaxSessions is the maximum number of concurrent UDP
// sessions held in the LRU cache. Zero or negative means use the default
// (udpSessionMaxEntries). Has no effect unless UDPSessionTrackingTTL is
// positive.
UDPSessionTrackingMaxSessions int
// sessionCache is a thread-safe expirable LRU; lazily initialized on
// first use when UDPSessionTrackingTTL > 0.
sessionCache *expirable.LRU[string, *proxyproto.Header]
}
func (c *PacketConn) ReadFrom(p []byte) (n int, addr net.Addr, err error) {
@@ -33,6 +72,12 @@ func (c *PacketConn) ReadFrom(p []byte) (n int, addr net.Addr, err error) {
}
n, addr, err = c.readFrom(p[:n], addr)
if err != nil {
if errors.Is(err, errHeaderOnly) {
// Header-only datagram with no DNS payload (Spectrum PPv2 UDP
// session establishment). Silently discard and wait for the
// next datagram.
continue
}
// drop invalid packet as returning error would cause the ReadFrom caller to exit
// which could result in DoS if an attacker sends intentional invalid packets
clog.Warningf("dropping invalid Proxy Protocol packet from %s: %v", addr.String(), err)
@@ -84,8 +129,26 @@ func (c *PacketConn) readFrom(p []byte, addr net.Addr) (_ int, _ net.Addr, err e
fallthrough
case proxyproto.USE:
if header != nil {
srcAddr, _, _ := header.UDPAddrs()
addr = &Addr{u: addr, r: srcAddr}
addr = &Addr{u: addr, r: header.SourceAddr}
if c.UDPSessionTrackingTTL > 0 {
// Cache the real source address for subsequent headerless datagrams.
// Spectrum sends the header in a standalone datagram with no DNS
// payload; refresh or insert the entry either way so that the TTL
// resets on every header packet.
c.storeSession(addr.(*Addr).u, header)
if len(payload) == 0 {
// Header-only datagram: no DNS payload to return; loop back
// to read the next datagram.
return 0, nil, errHeaderOnly
}
}
} else if c.UDPSessionTrackingTTL > 0 {
// No header present look for a cached header for this remote.
if cachedHeader, ok := c.lookupSession(addr); ok {
addr = &Addr{u: addr, r: cachedHeader.SourceAddr}
}
}
default:
}

View File

@@ -0,0 +1,63 @@
package proxyproto
import (
"net"
"sync"
"github.com/hashicorp/golang-lru/v2/expirable"
"github.com/pires/go-proxyproto"
)
// udpSessionMaxEntries is the default maximum number of concurrent UDP
// sessions that the LRU cache will track. When the cache is full the
// least-recently-used entry is evicted.
const udpSessionMaxEntries = 10_240
// sessionInitMu serializes lazy initialization of PacketConn.sessionCache.
var sessionInitMu sync.Mutex
// ensureSessionCache lazily creates the expirable LRU if it hasn't been
// created yet. The expirable.LRU itself is thread-safe once constructed.
func (c *PacketConn) ensureSessionCache() {
if c.sessionCache != nil {
return
}
sessionInitMu.Lock()
defer sessionInitMu.Unlock()
if c.sessionCache != nil {
return // double-check after acquiring lock
}
cap := c.UDPSessionTrackingMaxSessions
if cap <= 0 {
cap = udpSessionMaxEntries
}
c.sessionCache = expirable.NewLRU[string, *proxyproto.Header](cap, nil, c.UDPSessionTrackingTTL)
}
// storeSession inserts or refreshes the session entry for remoteAddr.
// Calling Add on an existing key resets its TTL.
func (c *PacketConn) storeSession(remoteAddr net.Addr, header *proxyproto.Header) {
c.ensureSessionCache()
c.sessionCache.Add(sessionKey(remoteAddr), header)
}
// lookupSession returns the cached source address for remoteAddr, if one
// exists and has not expired. Looking up a key refreshes its TTL by
// re-adding it.
func (c *PacketConn) lookupSession(remoteAddr net.Addr) (*proxyproto.Header, bool) {
if c.sessionCache == nil {
return nil, false
}
key := sessionKey(remoteAddr)
header, ok := c.sessionCache.Get(key)
if !ok {
return nil, false
}
// Refresh TTL by re-adding.
c.sessionCache.Add(key, header)
return header, true
}
func sessionKey(addr net.Addr) string {
return addr.Network() + "://" + addr.String()
}

View File

@@ -0,0 +1,134 @@
package proxyproto
import (
"net"
"testing"
"time"
proxyproto "github.com/pires/go-proxyproto"
)
func udpAddr(host string, port int) *net.UDPAddr {
return &net.UDPAddr{IP: net.ParseIP(host), Port: port}
}
// testHeader builds a minimal PPv2 header with the given source address.
func testHeader(src *net.UDPAddr) *proxyproto.Header {
return &proxyproto.Header{
Version: 2,
SourceAddr: src,
}
}
func TestSessionKey(t *testing.T) {
addr := &net.UDPAddr{IP: net.ParseIP("10.0.0.1"), Port: 5000}
got := sessionKey(addr)
want := "udp://10.0.0.1:5000"
if got != want {
t.Fatalf("sessionKey = %q, want %q", got, want)
}
}
func newTestPacketConn(ttl time.Duration, maxSessions int) *PacketConn {
return &PacketConn{
UDPSessionTrackingTTL: ttl,
UDPSessionTrackingMaxSessions: maxSessions,
}
}
func TestStoreAndLookupSession(t *testing.T) {
pc := newTestPacketConn(time.Second, 0)
remote := udpAddr("10.0.0.1", 5000)
src := udpAddr("192.168.1.1", 12345)
pc.storeSession(remote, testHeader(src))
got, ok := pc.lookupSession(remote)
if !ok {
t.Fatal("expected session to be found")
}
if got.SourceAddr.String() != src.String() {
t.Fatalf("expected SourceAddr %s, got %s", src, got.SourceAddr)
}
}
func TestLookupSessionMiss(t *testing.T) {
pc := newTestPacketConn(time.Second, 0)
_, ok := pc.lookupSession(udpAddr("10.0.0.1", 5000))
if ok {
t.Fatal("expected miss on empty cache")
}
}
func TestLookupSessionExpired(t *testing.T) {
pc := newTestPacketConn(50*time.Millisecond, 0)
remote := udpAddr("10.0.0.1", 5000)
src := udpAddr("192.168.1.1", 12345)
pc.storeSession(remote, testHeader(src))
time.Sleep(100 * time.Millisecond)
_, ok := pc.lookupSession(remote)
if ok {
t.Fatal("expected expired entry to be missing")
}
}
func TestLookupSessionRefreshesTTL(t *testing.T) {
ttl := 50 * time.Millisecond
pc := newTestPacketConn(ttl, 0)
remote := udpAddr("10.0.0.1", 5000)
src := udpAddr("192.168.1.1", 12345)
pc.storeSession(remote, testHeader(src))
// Wait past half the TTL, then look up (which should refresh).
time.Sleep(30 * time.Millisecond)
_, ok := pc.lookupSession(remote)
if !ok {
t.Fatal("expected session to be found before TTL")
}
// Wait another 30ms. Original TTL would have expired (60ms > 50ms),
// but the refresh from lookupSession should keep it alive.
time.Sleep(30 * time.Millisecond)
_, ok = pc.lookupSession(remote)
if !ok {
t.Fatal("expected session to survive after TTL refresh")
}
}
func TestStoreSessionCustomMaxSessions(t *testing.T) {
pc := newTestPacketConn(time.Second, 5)
// Fill beyond custom cap.
for i := range 10 {
pc.storeSession(udpAddr("10.0.0.1", i), testHeader(udpAddr("1.1.1.1", i)))
}
if pc.sessionCache.Len() != 5 {
t.Fatalf("expected cache capped at 5, got %d", pc.sessionCache.Len())
}
}
func TestStoreSessionEvictsOldest(t *testing.T) {
pc := newTestPacketConn(time.Minute, 2)
r1 := udpAddr("10.0.0.1", 1)
r2 := udpAddr("10.0.0.2", 2)
r3 := udpAddr("10.0.0.3", 3)
pc.storeSession(r1, testHeader(udpAddr("1.1.1.1", 1)))
pc.storeSession(r2, testHeader(udpAddr("2.2.2.2", 2)))
// Cache is full (cap=2). Storing r3 evicts r1.
pc.storeSession(r3, testHeader(udpAddr("3.3.3.3", 3)))
if _, ok := pc.lookupSession(r1); ok {
t.Fatal("expected r1 to be evicted")
}
if _, ok := pc.lookupSession(r2); !ok {
t.Fatal("expected r2 to be present")
}
if _, ok := pc.lookupSession(r3); !ok {
t.Fatal("expected r3 to be present")
}
}

View File

@@ -16,6 +16,7 @@ client's IP address and port information.
proxyproto {
allow <CIDR...>
default <use|ignore|reject|skip>
udp_session_tracking <duration> [max_sessions]
}
~~~
@@ -23,15 +24,26 @@ If `allow` is unspecified, PROXY protocol headers are accepted from all IP addre
The `default` option controls how connections from sources not listed in `allow` are handled.
If `default` is unspecified, it defaults to `ignore`.
The possible values are:
- `use`: accept and use PROXY protocol headers from these sources
- `ignore`: accept and ignore PROXY protocol headers from other sources
- `reject`: reject connections with PROXY protocol headers from other sources
- `skip`: skip PROXY protocol processing for connections from other sources, treating them as normal connections preserving the PROXY protocol headers.
The `udp_session_tracking <duration> [max_sessions]` option enables UDP session state tracking
for Cloudflare Spectrum's PROXY Protocol v2 over UDP. Spectrum sends the PPv2 header as a
standalone first datagram (with no DNS payload). Subsequent datagrams from the same client arrive
without any header. When this option is set to a positive duration, the real client address from
the header-only datagram is cached (keyed by the Spectrum-side remote address) for that duration
and automatically applied to all subsequent headerless datagrams within that window. The TTL is
refreshed on each matching packet. The optional `max_sessions` argument caps the number of
concurrent sessions in the LRU cache (default: 10240). This option has no effect for TCP
connections.
## Examples
In this configuration, we allow PROXY protocol connections from all IP addresses:
~~~ corefile
. {
proxyproto
@@ -41,6 +53,7 @@ In this configuration, we allow PROXY protocol connections from all IP addresses
In this configuration, we only allow PROXY protocol connections from the specified CIDR ranges
and ignore proxy protocol headers from other sources:
~~~ corefile
. {
proxyproto {
@@ -52,6 +65,7 @@ and ignore proxy protocol headers from other sources:
In this configuration, we only allow PROXY protocol headers from the specified CIDR ranges and reject
connections without valid PROXY protocol headers from those sources:
~~~ corefile
. {
proxyproto {
@@ -61,3 +75,29 @@ connections without valid PROXY protocol headers from those sources:
forward . /etc/resolv.conf
}
~~~
In this configuration, we enable UDP session tracking for Cloudflare Spectrum's PPv2-over-UDP
with a 28-second TTL (slightly shorter than Spectrum's 30-second UDP idle timeout) and the
default session cap of 10240:
~~~ corefile
. {
proxyproto {
allow 192.168.1.1/32
udp_session_tracking 28s
}
forward . /etc/resolv.conf
}
~~~
In this configuration, the session cap is raised to 20480:
~~~ corefile
. {
proxyproto {
allow 192.168.1.1/32
udp_session_tracking 28s 20000
}
forward . /etc/resolv.conf
}
~~~

View File

@@ -4,7 +4,9 @@ import (
"errors"
"fmt"
"net"
"strconv"
"strings"
"time"
"github.com/coredns/caddy"
"github.com/coredns/coredns/core/dnsserver"
@@ -21,8 +23,10 @@ func setup(c *caddy.Controller) error {
return plugin.Error("proxyproto", errors.New("proxy protocol already configured for this server instance"))
}
var (
allowedIPNets []*net.IPNet
policy = proxyproto.IGNORE
allowedIPNets []*net.IPNet
policy = proxyproto.IGNORE
sessionTrackingTTL time.Duration
sessionTrackingMaxSessions int
)
for c.Next() {
args := c.RemainingArgs()
@@ -56,6 +60,23 @@ func setup(c *caddy.Controller) error {
default:
return plugin.Error("proxyproto", c.ArgErr())
}
case "udp_session_tracking":
v := c.RemainingArgs()
if len(v) < 1 || len(v) > 2 {
return plugin.Error("proxyproto", c.ArgErr())
}
d, err := time.ParseDuration(v[0])
if err != nil {
return plugin.Error("proxyproto", fmt.Errorf("udp_session_tracking: invalid duration %q: %w", v[0], err))
}
sessionTrackingTTL = d
if len(v) == 2 {
n, err := strconv.Atoi(v[1])
if err != nil || n <= 0 {
return plugin.Error("proxyproto", fmt.Errorf("udp_session_tracking: invalid max sessions %q: must be a positive integer", v[1]))
}
sessionTrackingMaxSessions = n
}
default:
return c.Errf("unknown option '%s'", c.Val())
}
@@ -77,5 +98,7 @@ func setup(c *caddy.Controller) error {
}
return policy, nil
}
config.ProxyProtoUDPSessionTrackingTTL = sessionTrackingTTL
config.ProxyProtoUDPSessionTrackingMaxSessions = sessionTrackingMaxSessions
return nil
}

View File

@@ -3,6 +3,7 @@ package proxyproto
import (
"strings"
"testing"
"time"
"github.com/coredns/caddy"
"github.com/coredns/coredns/core/dnsserver"
@@ -10,23 +11,41 @@ import (
func TestSetup(t *testing.T) {
tests := []struct {
input string
shouldErr bool
expectedRoot string // expected root, set to the controller. Empty for negative cases.
expectedErrContent string // substring from the expected error. Empty for positive cases.
config bool
input string
shouldErr bool
expectedRoot string // expected root, set to the controller. Empty for negative cases.
expectedErrContent string // substring from the expected error. Empty for positive cases.
config bool
sessionTrackingTTL time.Duration
sessionTrackingMaxSessions int
}{
// positive
{"proxyproto", false, "", "", true},
{"proxyproto {\nallow 127.0.0.1/8 ::1/128\n}", false, "", "", true},
{"proxyproto {\nallow 127.0.0.1/8 ::1/128\ndefault ignore\n}", false, "", "", true},
{"proxyproto", false, "", "", true, 0, 0},
{"proxyproto {\nallow 127.0.0.1/8 ::1/128\n}", false, "", "", true, 0, 0},
{"proxyproto {\nallow 127.0.0.1/8 ::1/128\ndefault ignore\n}", false, "", "", true, 0, 0},
// Allow without any IPs is also valid
{"proxyproto {\nallow\n}", false, "", "", true},
{"proxyproto {\nallow\n}", false, "", "", true, 0, 0},
// udp_session_tracking with TTL only (max sessions gonna use package default)
{"proxyproto {\nudp_session_tracking 28s\n}", false, "", "", true, 28 * time.Second, 0},
{"proxyproto {\nallow 10.0.0.0/8\nudp_session_tracking 1m\n}", false, "", "", true, time.Minute, 0},
// udp_session_tracking with explicit max sessions
{"proxyproto {\nudp_session_tracking 28s 20000\n}", false, "", "", true, 28 * time.Second, 20000},
{"proxyproto {\nallow 10.0.0.0/8\nudp_session_tracking 1m 500\n}", false, "", "", true, time.Minute, 500},
// negative
{"proxyproto {\nunknown\n}", true, "", "unknown option", false},
{"proxyproto extra_arg", true, "", "Wrong argument", false},
{"proxyproto {\nallow invalid_ip\n}", true, "", "invalid CIDR address", false},
{"proxyproto {\nallow 127.0.0.1/8\ndefault invalid_policy\n}", true, "", "Wrong argument", false},
{"proxyproto {\nunknown\n}", true, "", "unknown option", false, 0, 0},
{"proxyproto extra_arg", true, "", "Wrong argument", false, 0, 0},
{"proxyproto {\nallow invalid_ip\n}", true, "", "invalid CIDR address", false, 0, 0},
{"proxyproto {\nallow 127.0.0.1/8\ndefault invalid_policy\n}", true, "", "Wrong argument", false, 0, 0},
// udp_session_tracking: missing TTL
{"proxyproto {\nudp_session_tracking\n}", true, "", "Wrong argument", false, 0, 0},
// udp_session_tracking: too many arguments
{"proxyproto {\nudp_session_tracking 28s 100 extra\n}", true, "", "Wrong argument", false, 0, 0},
// udp_session_tracking: bad TTL
{"proxyproto {\nudp_session_tracking notaduration\n}", true, "", "invalid duration", false, 0, 0},
// udp_session_tracking: bad max sessions
{"proxyproto {\nudp_session_tracking 28s notanumber\n}", true, "", "invalid max sessions", false, 0, 0},
{"proxyproto {\nudp_session_tracking 28s 0\n}", true, "", "invalid max sessions", false, 0, 0},
{"proxyproto {\nudp_session_tracking 28s -1\n}", true, "", "invalid max sessions", false, 0, 0},
}
for i, test := range tests {
c := caddy.NewTestController("dns", test.input)
@@ -40,6 +59,16 @@ func TestSetup(t *testing.T) {
t.Errorf("Test %d: Expected ProxyProtoConnPolicy to NOT be configured for input %s", i, test.input)
}
if cfg.ProxyProtoUDPSessionTrackingTTL != test.sessionTrackingTTL {
t.Errorf("Test %d: Expected ProxyProtoUDPSessionTrackingTTL %v, got %v for input %s",
i, test.sessionTrackingTTL, cfg.ProxyProtoUDPSessionTrackingTTL, test.input)
}
if cfg.ProxyProtoUDPSessionTrackingMaxSessions != test.sessionTrackingMaxSessions {
t.Errorf("Test %d: Expected ProxyProtoUDPSessionTrackingMaxSessions %d, got %d for input %s",
i, test.sessionTrackingMaxSessions, cfg.ProxyProtoUDPSessionTrackingMaxSessions, test.input)
}
if test.shouldErr && err == nil {
t.Errorf("Test %d: Expected error but found %s for input %s", i, err, test.input)
}