1 /* 2 * Copyright (C) 2014 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package com.android.server.connectivity; 18 19 import static android.net.CaptivePortal.APP_RETURN_DISMISSED; 20 import static android.net.CaptivePortal.APP_RETURN_UNWANTED; 21 import static android.net.CaptivePortal.APP_RETURN_WANTED_AS_IS; 22 import static android.net.ConnectivityManager.EXTRA_CAPTIVE_PORTAL_PROBE_SPEC; 23 import static android.net.ConnectivityManager.EXTRA_CAPTIVE_PORTAL_URL; 24 import static android.net.DnsResolver.FLAG_EMPTY; 25 import static android.net.INetworkMonitor.NETWORK_TEST_RESULT_INVALID; 26 import static android.net.INetworkMonitor.NETWORK_TEST_RESULT_PARTIAL_CONNECTIVITY; 27 import static android.net.INetworkMonitor.NETWORK_TEST_RESULT_VALID; 28 import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_DNS; 29 import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_FALLBACK; 30 import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_HTTP; 31 import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_HTTPS; 32 import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_PRIVDNS; 33 import static android.net.INetworkMonitor.NETWORK_VALIDATION_RESULT_PARTIAL; 34 import static android.net.INetworkMonitor.NETWORK_VALIDATION_RESULT_VALID; 35 import static android.net.NetworkCapabilities.NET_CAPABILITY_NOT_METERED; 36 import static android.net.captiveportal.CaptivePortalProbeSpec.parseCaptivePortalProbeSpecs; 37 import static android.net.metrics.ValidationProbeEvent.DNS_FAILURE; 38 import static android.net.metrics.ValidationProbeEvent.DNS_SUCCESS; 39 import static android.net.metrics.ValidationProbeEvent.PROBE_FALLBACK; 40 import static android.net.metrics.ValidationProbeEvent.PROBE_PRIVDNS; 41 import static android.net.util.DataStallUtils.CONFIG_DATA_STALL_CONSECUTIVE_DNS_TIMEOUT_THRESHOLD; 42 import static android.net.util.DataStallUtils.CONFIG_DATA_STALL_EVALUATION_TYPE; 43 import static android.net.util.DataStallUtils.CONFIG_DATA_STALL_MIN_EVALUATE_INTERVAL; 44 import static android.net.util.DataStallUtils.CONFIG_DATA_STALL_TCP_POLLING_INTERVAL; 45 import static android.net.util.DataStallUtils.CONFIG_DATA_STALL_VALID_DNS_TIME_THRESHOLD; 46 import static android.net.util.DataStallUtils.DATA_STALL_EVALUATION_TYPE_DNS; 47 import static android.net.util.DataStallUtils.DATA_STALL_EVALUATION_TYPE_NONE; 48 import static android.net.util.DataStallUtils.DATA_STALL_EVALUATION_TYPE_TCP; 49 import static android.net.util.DataStallUtils.DEFAULT_CONSECUTIVE_DNS_TIMEOUT_THRESHOLD; 50 import static android.net.util.DataStallUtils.DEFAULT_DATA_STALL_EVALUATION_TYPES; 51 import static android.net.util.DataStallUtils.DEFAULT_DATA_STALL_MIN_EVALUATE_TIME_MS; 52 import static android.net.util.DataStallUtils.DEFAULT_DATA_STALL_VALID_DNS_TIME_THRESHOLD_MS; 53 import static android.net.util.DataStallUtils.DEFAULT_DNS_LOG_SIZE; 54 import static android.net.util.DataStallUtils.DEFAULT_TCP_POLLING_INTERVAL_MS; 55 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_FALLBACK_PROBE_SPECS; 56 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_FALLBACK_URL; 57 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_HTTPS_URL; 58 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_HTTP_URL; 59 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_MODE; 60 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_MODE_IGNORE; 61 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_MODE_PROMPT; 62 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_OTHER_FALLBACK_URLS; 63 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_OTHER_HTTPS_URLS; 64 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_OTHER_HTTP_URLS; 65 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_USER_AGENT; 66 import static android.net.util.NetworkStackUtils.CAPTIVE_PORTAL_USE_HTTPS; 67 import static android.net.util.NetworkStackUtils.DEFAULT_CAPTIVE_PORTAL_DNS_PROBE_TIMEOUT; 68 import static android.net.util.NetworkStackUtils.DEFAULT_CAPTIVE_PORTAL_FALLBACK_PROBE_SPECS; 69 import static android.net.util.NetworkStackUtils.DEFAULT_CAPTIVE_PORTAL_HTTPS_URLS; 70 import static android.net.util.NetworkStackUtils.DEFAULT_CAPTIVE_PORTAL_HTTP_URLS; 71 import static android.net.util.NetworkStackUtils.DISMISS_PORTAL_IN_VALIDATED_NETWORK; 72 import static android.net.util.NetworkStackUtils.DNS_PROBE_PRIVATE_IP_NO_INTERNET_VERSION; 73 import static android.net.util.NetworkStackUtils.TEST_CAPTIVE_PORTAL_HTTPS_URL; 74 import static android.net.util.NetworkStackUtils.TEST_CAPTIVE_PORTAL_HTTP_URL; 75 import static android.net.util.NetworkStackUtils.TEST_URL_EXPIRATION_TIME; 76 import static android.net.util.NetworkStackUtils.isEmpty; 77 import static android.net.util.NetworkStackUtils.isIPv6ULA; 78 import static android.provider.DeviceConfig.NAMESPACE_CONNECTIVITY; 79 80 import static com.android.networkstack.apishim.ConstantsShim.DETECTION_METHOD_DNS_EVENTS; 81 import static com.android.networkstack.apishim.ConstantsShim.DETECTION_METHOD_TCP_METRICS; 82 import static com.android.networkstack.apishim.ConstantsShim.TRANSPORT_TEST; 83 import static com.android.networkstack.util.DnsUtils.PRIVATE_DNS_PROBE_HOST_SUFFIX; 84 import static com.android.networkstack.util.DnsUtils.TYPE_ADDRCONFIG; 85 86 import android.app.PendingIntent; 87 import android.content.BroadcastReceiver; 88 import android.content.Context; 89 import android.content.Intent; 90 import android.content.IntentFilter; 91 import android.content.pm.PackageManager; 92 import android.content.res.Configuration; 93 import android.content.res.Resources; 94 import android.net.ConnectivityManager; 95 import android.net.DataStallReportParcelable; 96 import android.net.DnsResolver; 97 import android.net.INetworkMonitorCallbacks; 98 import android.net.LinkProperties; 99 import android.net.Network; 100 import android.net.NetworkCapabilities; 101 import android.net.NetworkTestResultParcelable; 102 import android.net.ProxyInfo; 103 import android.net.TrafficStats; 104 import android.net.Uri; 105 import android.net.captiveportal.CapportApiProbeResult; 106 import android.net.captiveportal.CaptivePortalProbeResult; 107 import android.net.captiveportal.CaptivePortalProbeSpec; 108 import android.net.metrics.IpConnectivityLog; 109 import android.net.metrics.NetworkEvent; 110 import android.net.metrics.ValidationProbeEvent; 111 import android.net.shared.NetworkMonitorUtils; 112 import android.net.shared.PrivateDnsConfig; 113 import android.net.util.DataStallUtils.EvaluationType; 114 import android.net.util.NetworkStackUtils; 115 import android.net.util.SharedLog; 116 import android.net.util.Stopwatch; 117 import android.net.wifi.WifiInfo; 118 import android.net.wifi.WifiManager; 119 import android.os.Build; 120 import android.os.Bundle; 121 import android.os.Message; 122 import android.os.Process; 123 import android.os.RemoteException; 124 import android.os.SystemClock; 125 import android.provider.DeviceConfig; 126 import android.provider.Settings; 127 import android.stats.connectivity.ProbeResult; 128 import android.stats.connectivity.ProbeType; 129 import android.telephony.CellIdentityNr; 130 import android.telephony.CellInfo; 131 import android.telephony.CellInfoGsm; 132 import android.telephony.CellInfoLte; 133 import android.telephony.CellInfoNr; 134 import android.telephony.CellInfoTdscdma; 135 import android.telephony.CellInfoWcdma; 136 import android.telephony.CellSignalStrength; 137 import android.telephony.SignalStrength; 138 import android.telephony.TelephonyManager; 139 import android.text.TextUtils; 140 import android.util.Log; 141 import android.util.Pair; 142 import android.util.SparseArray; 143 144 import androidx.annotation.ArrayRes; 145 import androidx.annotation.BoolRes; 146 import androidx.annotation.IntegerRes; 147 import androidx.annotation.NonNull; 148 import androidx.annotation.Nullable; 149 import androidx.annotation.StringRes; 150 import androidx.annotation.VisibleForTesting; 151 152 import com.android.internal.annotations.GuardedBy; 153 import com.android.internal.util.RingBufferIndices; 154 import com.android.internal.util.State; 155 import com.android.internal.util.StateMachine; 156 import com.android.internal.util.TrafficStatsConstants; 157 import com.android.networkstack.NetworkStackNotifier; 158 import com.android.networkstack.R; 159 import com.android.networkstack.apishim.CaptivePortalDataShimImpl; 160 import com.android.networkstack.apishim.NetworkInformationShimImpl; 161 import com.android.networkstack.apishim.common.CaptivePortalDataShim; 162 import com.android.networkstack.apishim.common.ShimUtils; 163 import com.android.networkstack.apishim.common.UnsupportedApiLevelException; 164 import com.android.networkstack.metrics.DataStallDetectionStats; 165 import com.android.networkstack.metrics.DataStallStatsUtils; 166 import com.android.networkstack.metrics.NetworkValidationMetrics; 167 import com.android.networkstack.netlink.TcpSocketTracker; 168 import com.android.networkstack.util.DnsUtils; 169 import com.android.server.NetworkStackService.NetworkStackServiceManager; 170 171 import org.json.JSONException; 172 import org.json.JSONObject; 173 174 import java.io.BufferedInputStream; 175 import java.io.IOException; 176 import java.io.InputStream; 177 import java.io.InputStreamReader; 178 import java.io.InterruptedIOException; 179 import java.net.HttpURLConnection; 180 import java.net.InetAddress; 181 import java.net.MalformedURLException; 182 import java.net.URL; 183 import java.net.UnknownHostException; 184 import java.nio.charset.Charset; 185 import java.nio.charset.StandardCharsets; 186 import java.util.ArrayList; 187 import java.util.Arrays; 188 import java.util.Collections; 189 import java.util.HashMap; 190 import java.util.LinkedHashMap; 191 import java.util.List; 192 import java.util.Map; 193 import java.util.Objects; 194 import java.util.Random; 195 import java.util.StringJoiner; 196 import java.util.UUID; 197 import java.util.concurrent.CompletionService; 198 import java.util.concurrent.CountDownLatch; 199 import java.util.concurrent.ExecutionException; 200 import java.util.concurrent.ExecutorCompletionService; 201 import java.util.concurrent.ExecutorService; 202 import java.util.concurrent.Executors; 203 import java.util.concurrent.Future; 204 import java.util.concurrent.TimeUnit; 205 import java.util.concurrent.atomic.AtomicInteger; 206 import java.util.function.Function; 207 import java.util.regex.Matcher; 208 import java.util.regex.Pattern; 209 import java.util.regex.PatternSyntaxException; 210 211 /** 212 * {@hide} 213 */ 214 public class NetworkMonitor extends StateMachine { 215 private static final String TAG = NetworkMonitor.class.getSimpleName(); 216 private static final boolean DBG = true; 217 private static final boolean VDBG = false; 218 private static final boolean VDBG_STALL = Log.isLoggable(TAG, Log.DEBUG); 219 private static final String DEFAULT_USER_AGENT = "Mozilla/5.0 (X11; Linux x86_64) " 220 + "AppleWebKit/537.36 (KHTML, like Gecko) " 221 + "Chrome/60.0.3112.32 Safari/537.36"; 222 223 @VisibleForTesting 224 static final String CONFIG_CAPTIVE_PORTAL_DNS_PROBE_TIMEOUT = 225 "captive_portal_dns_probe_timeout"; 226 227 private static final int SOCKET_TIMEOUT_MS = 10000; 228 private static final int PROBE_TIMEOUT_MS = 3000; 229 private static final long TEST_URL_EXPIRATION_MS = TimeUnit.MINUTES.toMillis(10); 230 231 private static final int UNSET_MCC_OR_MNC = -1; 232 233 private static final int CAPPORT_API_MAX_JSON_LENGTH = 4096; 234 private static final String ACCEPT_HEADER = "Accept"; 235 private static final String CONTENT_TYPE_HEADER = "Content-Type"; 236 private static final String CAPPORT_API_CONTENT_TYPE = "application/captive+json"; 237 238 enum EvaluationResult { 239 VALIDATED(true), 240 CAPTIVE_PORTAL(false); 241 final boolean mIsValidated; EvaluationResult(boolean isValidated)242 EvaluationResult(boolean isValidated) { 243 this.mIsValidated = isValidated; 244 } 245 } 246 247 enum ValidationStage { 248 FIRST_VALIDATION(true), 249 REVALIDATION(false); 250 final boolean mIsFirstValidation; ValidationStage(boolean isFirstValidation)251 ValidationStage(boolean isFirstValidation) { 252 this.mIsFirstValidation = isFirstValidation; 253 } 254 } 255 256 @VisibleForTesting 257 protected static final class MccMncOverrideInfo { 258 public final int mcc; 259 public final int mnc; MccMncOverrideInfo(int mcc, int mnc)260 MccMncOverrideInfo(int mcc, int mnc) { 261 this.mcc = mcc; 262 this.mnc = mnc; 263 } 264 } 265 266 @VisibleForTesting 267 protected static final SparseArray<MccMncOverrideInfo> sCarrierIdToMccMnc = new SparseArray<>(); 268 269 static { 270 // CTC 271 sCarrierIdToMccMnc.put(1854, new MccMncOverrideInfo(460, 03)); 272 } 273 274 /** 275 * ConnectivityService has sent a notification to indicate that network has connected. 276 * Initiates Network Validation. 277 */ 278 private static final int CMD_NETWORK_CONNECTED = 1; 279 280 /** 281 * Message to self indicating it's time to evaluate a network's connectivity. 282 * arg1 = Token to ignore old messages. 283 */ 284 private static final int CMD_REEVALUATE = 6; 285 286 /** 287 * ConnectivityService has sent a notification to indicate that network has disconnected. 288 */ 289 private static final int CMD_NETWORK_DISCONNECTED = 7; 290 291 /** 292 * Force evaluation even if it has succeeded in the past. 293 * arg1 = UID responsible for requesting this reeval. Will be billed for data. 294 */ 295 private static final int CMD_FORCE_REEVALUATION = 8; 296 297 /** 298 * Message to self indicating captive portal app finished. 299 * arg1 = one of: APP_RETURN_DISMISSED, 300 * APP_RETURN_UNWANTED, 301 * APP_RETURN_WANTED_AS_IS 302 * obj = mCaptivePortalLoggedInResponseToken as String 303 */ 304 private static final int CMD_CAPTIVE_PORTAL_APP_FINISHED = 9; 305 306 /** 307 * Message indicating sign-in app should be launched. 308 * Sent by mLaunchCaptivePortalAppBroadcastReceiver when the 309 * user touches the sign in notification, or sent by 310 * ConnectivityService when the user touches the "sign into 311 * network" button in the wifi access point detail page. 312 */ 313 private static final int CMD_LAUNCH_CAPTIVE_PORTAL_APP = 11; 314 315 /** 316 * Retest network to see if captive portal is still in place. 317 * arg1 = UID responsible for requesting this reeval. Will be billed for data. 318 * 0 indicates self-initiated, so nobody to blame. 319 */ 320 private static final int CMD_CAPTIVE_PORTAL_RECHECK = 12; 321 322 /** 323 * ConnectivityService notifies NetworkMonitor of settings changes to 324 * Private DNS. If a DNS resolution is required, e.g. for DNS-over-TLS in 325 * strict mode, then an event is sent back to ConnectivityService with the 326 * result of the resolution attempt. 327 * 328 * A separate message is used to trigger (re)evaluation of the Private DNS 329 * configuration, so that the message can be handled as needed in different 330 * states, including being ignored until after an ongoing captive portal 331 * validation phase is completed. 332 */ 333 private static final int CMD_PRIVATE_DNS_SETTINGS_CHANGED = 13; 334 private static final int CMD_EVALUATE_PRIVATE_DNS = 15; 335 336 /** 337 * Message to self indicating captive portal detection is completed. 338 * obj = CaptivePortalProbeResult for detection result; 339 */ 340 private static final int CMD_PROBE_COMPLETE = 16; 341 342 /** 343 * ConnectivityService notifies NetworkMonitor of DNS query responses event. 344 * arg1 = returncode in OnDnsEvent which indicates the response code for the DNS query. 345 */ 346 private static final int EVENT_DNS_NOTIFICATION = 17; 347 348 /** 349 * ConnectivityService notifies NetworkMonitor that the user accepts partial connectivity and 350 * NetworkMonitor should ignore the https probe. 351 */ 352 private static final int EVENT_ACCEPT_PARTIAL_CONNECTIVITY = 18; 353 354 /** 355 * ConnectivityService notifies NetworkMonitor of changed LinkProperties. 356 * obj = new LinkProperties. 357 */ 358 private static final int EVENT_LINK_PROPERTIES_CHANGED = 19; 359 360 /** 361 * ConnectivityService notifies NetworkMonitor of changed NetworkCapabilities. 362 * obj = new NetworkCapabilities. 363 */ 364 private static final int EVENT_NETWORK_CAPABILITIES_CHANGED = 20; 365 366 /** 367 * Message to self to poll current tcp status from kernel. 368 */ 369 private static final int EVENT_POLL_TCPINFO = 21; 370 371 /** 372 * Message to self to do the bandwidth check in EvaluatingBandwidthState. 373 */ 374 private static final int CMD_EVALUATE_BANDWIDTH = 22; 375 376 /** 377 * Message to self to know the bandwidth check is completed. 378 */ 379 private static final int CMD_BANDWIDTH_CHECK_COMPLETE = 23; 380 381 /** 382 * Message to self to know the bandwidth check is timeouted. 383 */ 384 private static final int CMD_BANDWIDTH_CHECK_TIMEOUT = 24; 385 386 // Start mReevaluateDelayMs at this value and double. 387 @VisibleForTesting 388 static final int INITIAL_REEVALUATE_DELAY_MS = 1000; 389 private static final int MAX_REEVALUATE_DELAY_MS = 10 * 60 * 1000; 390 // Default timeout of evaluating network bandwidth. 391 private static final int DEFAULT_EVALUATING_BANDWIDTH_TIMEOUT_MS = 10_000; 392 // Before network has been evaluated this many times, ignore repeated reevaluate requests. 393 private static final int IGNORE_REEVALUATE_ATTEMPTS = 5; 394 private int mReevaluateToken = 0; 395 private static final int NO_UID = 0; 396 private static final int INVALID_UID = -1; 397 private int mUidResponsibleForReeval = INVALID_UID; 398 // Stop blaming UID that requested re-evaluation after this many attempts. 399 private static final int BLAME_FOR_EVALUATION_ATTEMPTS = 5; 400 // Delay between reevaluations once a captive portal has been found. 401 private static final int CAPTIVE_PORTAL_REEVALUATE_DELAY_MS = 10 * 60 * 1000; 402 private static final int NETWORK_VALIDATION_RESULT_INVALID = 0; 403 // Max thread pool size for parallel probing. Fixed thread pool size to control the thread 404 // number used for either HTTP or HTTPS probing. 405 @VisibleForTesting 406 static final int MAX_PROBE_THREAD_POOL_SIZE = 5; 407 private String mPrivateDnsProviderHostname = ""; 408 409 private final Context mContext; 410 private final INetworkMonitorCallbacks mCallback; 411 private final int mCallbackVersion; 412 private final Network mCleartextDnsNetwork; 413 private final Network mNetwork; 414 private final TelephonyManager mTelephonyManager; 415 private final WifiManager mWifiManager; 416 private final ConnectivityManager mCm; 417 @Nullable 418 private final NetworkStackNotifier mNotifier; 419 private final IpConnectivityLog mMetricsLog; 420 private final Dependencies mDependencies; 421 private final TcpSocketTracker mTcpTracker; 422 // Configuration values for captive portal detection probes. 423 private final String mCaptivePortalUserAgent; 424 private final URL[] mCaptivePortalFallbackUrls; 425 @NonNull 426 private final URL[] mCaptivePortalHttpUrls; 427 @NonNull 428 private final URL[] mCaptivePortalHttpsUrls; 429 @Nullable 430 private final CaptivePortalProbeSpec[] mCaptivePortalFallbackSpecs; 431 // Configuration values for network bandwidth check. 432 @Nullable 433 private final String mEvaluatingBandwidthUrl; 434 private final int mMaxRetryTimerMs; 435 private final int mEvaluatingBandwidthTimeoutMs; 436 private final AtomicInteger mNextEvaluatingBandwidthThreadId = new AtomicInteger(1); 437 438 private NetworkCapabilities mNetworkCapabilities; 439 private LinkProperties mLinkProperties; 440 441 @VisibleForTesting 442 protected boolean mIsCaptivePortalCheckEnabled; 443 444 private boolean mUseHttps; 445 /** 446 * The total number of completed validation attempts (network validated or a captive portal was 447 * detected) for this NetworkMonitor instance. 448 * This does not include attempts that were interrupted, retried or finished with a result that 449 * is not success or portal. See {@code mValidationIndex} in {@link NetworkValidationMetrics} 450 * for a count of all attempts. 451 * TODO: remove when removing legacy metrics. 452 */ 453 private int mValidations = 0; 454 455 // Set if the user explicitly selected "Do not use this network" in captive portal sign-in app. 456 private boolean mUserDoesNotWant = false; 457 // Avoids surfacing "Sign in to network" notification. 458 private boolean mDontDisplaySigninNotification = false; 459 // Set to true once the evaluating network bandwidth is passed or the captive portal respond 460 // APP_RETURN_WANTED_AS_IS which means the user wants to use this network anyway. 461 @VisibleForTesting 462 protected boolean mIsBandwidthCheckPassedOrIgnored = false; 463 464 private final State mDefaultState = new DefaultState(); 465 private final State mValidatedState = new ValidatedState(); 466 private final State mMaybeNotifyState = new MaybeNotifyState(); 467 private final State mEvaluatingState = new EvaluatingState(); 468 private final State mCaptivePortalState = new CaptivePortalState(); 469 private final State mEvaluatingPrivateDnsState = new EvaluatingPrivateDnsState(); 470 private final State mProbingState = new ProbingState(); 471 private final State mWaitingForNextProbeState = new WaitingForNextProbeState(); 472 private final State mEvaluatingBandwidthState = new EvaluatingBandwidthState(); 473 474 private CustomIntentReceiver mLaunchCaptivePortalAppBroadcastReceiver = null; 475 476 private final SharedLog mValidationLogs; 477 478 private final Stopwatch mEvaluationTimer = new Stopwatch(); 479 480 // This variable is set before transitioning to the mCaptivePortalState. 481 private CaptivePortalProbeResult mLastPortalProbeResult = 482 CaptivePortalProbeResult.failed(CaptivePortalProbeResult.PROBE_UNKNOWN); 483 484 // Random generator to select fallback URL index 485 private final Random mRandom; 486 private int mNextFallbackUrlIndex = 0; 487 488 489 private int mReevaluateDelayMs = INITIAL_REEVALUATE_DELAY_MS; 490 private int mEvaluateAttempts = 0; 491 private volatile int mProbeToken = 0; 492 private final int mConsecutiveDnsTimeoutThreshold; 493 private final int mDataStallMinEvaluateTime; 494 private final int mDataStallValidDnsTimeThreshold; 495 private final int mDataStallEvaluationType; 496 @Nullable 497 private final DnsStallDetector mDnsStallDetector; 498 private long mLastProbeTime; 499 // The signal causing a data stall to be suspected. Reset to 0 after metrics are sent to statsd. 500 private @EvaluationType int mDataStallTypeToCollect; 501 private boolean mAcceptPartialConnectivity = false; 502 private final EvaluationState mEvaluationState = new EvaluationState(); 503 504 private final boolean mPrivateIpNoInternetEnabled; 505 506 private final boolean mMetricsEnabled; 507 508 // The validation metrics are accessed by individual probe threads, and by the StateMachine 509 // thread. All accesses must be synchronized to make sure the StateMachine thread can see 510 // reports from all probes. 511 // TODO: as that most usage is in the StateMachine thread and probes only add their probe 512 // events, consider having probes return their stats to the StateMachine, and only access this 513 // member on the StateMachine thread without synchronization. 514 @GuardedBy("mNetworkValidationMetrics") 515 private final NetworkValidationMetrics mNetworkValidationMetrics = 516 new NetworkValidationMetrics(); 517 getCallbackVersion(INetworkMonitorCallbacks cb)518 private int getCallbackVersion(INetworkMonitorCallbacks cb) { 519 int version; 520 try { 521 version = cb.getInterfaceVersion(); 522 } catch (RemoteException e) { 523 version = 0; 524 } 525 // The AIDL was freezed from Q beta 5 but it's unfreezing from R before releasing. In order 526 // to distinguish the behavior between R and Q beta 5 and before Q beta 5, add SDK and 527 // CODENAME check here. Basically, it's only expected to return 0 for Q beta 4 and below 528 // because the test result has changed. 529 if (Build.VERSION.SDK_INT == Build.VERSION_CODES.Q 530 && Build.VERSION.CODENAME.equals("REL") 531 && version == Build.VERSION_CODES.CUR_DEVELOPMENT) version = 0; 532 return version; 533 } 534 NetworkMonitor(Context context, INetworkMonitorCallbacks cb, Network network, SharedLog validationLog, @NonNull NetworkStackServiceManager serviceManager)535 public NetworkMonitor(Context context, INetworkMonitorCallbacks cb, Network network, 536 SharedLog validationLog, @NonNull NetworkStackServiceManager serviceManager) { 537 this(context, cb, network, new IpConnectivityLog(), validationLog, serviceManager, 538 Dependencies.DEFAULT, getTcpSocketTrackerOrNull(context, network)); 539 } 540 541 @VisibleForTesting NetworkMonitor(Context context, INetworkMonitorCallbacks cb, Network network, IpConnectivityLog logger, SharedLog validationLogs, @NonNull NetworkStackServiceManager serviceManager, Dependencies deps, @Nullable TcpSocketTracker tst)542 public NetworkMonitor(Context context, INetworkMonitorCallbacks cb, Network network, 543 IpConnectivityLog logger, SharedLog validationLogs, 544 @NonNull NetworkStackServiceManager serviceManager, Dependencies deps, 545 @Nullable TcpSocketTracker tst) { 546 // Add suffix indicating which NetworkMonitor we're talking about. 547 super(TAG + "/" + network.toString()); 548 549 // Logs with a tag of the form given just above, e.g. 550 // <timestamp> 862 2402 D NetworkMonitor/NetworkAgentInfo [WIFI () - 100]: ... 551 setDbg(VDBG); 552 553 mContext = context; 554 mMetricsLog = logger; 555 mValidationLogs = validationLogs; 556 mCallback = cb; 557 mCallbackVersion = getCallbackVersion(cb); 558 mDependencies = deps; 559 mNetwork = network; 560 mCleartextDnsNetwork = deps.getPrivateDnsBypassNetwork(network); 561 mTelephonyManager = (TelephonyManager) context.getSystemService(Context.TELEPHONY_SERVICE); 562 mWifiManager = (WifiManager) context.getSystemService(Context.WIFI_SERVICE); 563 mCm = (ConnectivityManager) context.getSystemService(Context.CONNECTIVITY_SERVICE); 564 mNotifier = serviceManager.getNotifier(); 565 566 // CHECKSTYLE:OFF IndentationCheck 567 addState(mDefaultState); 568 addState(mMaybeNotifyState, mDefaultState); 569 addState(mEvaluatingState, mMaybeNotifyState); 570 addState(mProbingState, mEvaluatingState); 571 addState(mWaitingForNextProbeState, mEvaluatingState); 572 addState(mCaptivePortalState, mMaybeNotifyState); 573 addState(mEvaluatingPrivateDnsState, mDefaultState); 574 addState(mEvaluatingBandwidthState, mDefaultState); 575 addState(mValidatedState, mDefaultState); 576 setInitialState(mDefaultState); 577 // CHECKSTYLE:ON IndentationCheck 578 579 mIsCaptivePortalCheckEnabled = getIsCaptivePortalCheckEnabled(); 580 mPrivateIpNoInternetEnabled = getIsPrivateIpNoInternetEnabled(); 581 mMetricsEnabled = deps.isFeatureEnabled(context, NAMESPACE_CONNECTIVITY, 582 NetworkStackUtils.VALIDATION_METRICS_VERSION, true /* defaultEnabled */); 583 mUseHttps = getUseHttpsValidation(); 584 mCaptivePortalUserAgent = getCaptivePortalUserAgent(); 585 mCaptivePortalHttpsUrls = makeCaptivePortalHttpsUrls(); 586 mCaptivePortalHttpUrls = makeCaptivePortalHttpUrls(); 587 mCaptivePortalFallbackUrls = makeCaptivePortalFallbackUrls(); 588 mCaptivePortalFallbackSpecs = makeCaptivePortalFallbackProbeSpecs(); 589 mRandom = deps.getRandom(); 590 // TODO: Evaluate to move data stall configuration to a specific class. 591 mConsecutiveDnsTimeoutThreshold = getConsecutiveDnsTimeoutThreshold(); 592 mDataStallMinEvaluateTime = getDataStallMinEvaluateTime(); 593 mDataStallValidDnsTimeThreshold = getDataStallValidDnsTimeThreshold(); 594 mDataStallEvaluationType = getDataStallEvaluationType(); 595 mDnsStallDetector = initDnsStallDetectorIfRequired(mDataStallEvaluationType, 596 mConsecutiveDnsTimeoutThreshold); 597 mTcpTracker = tst; 598 // Read the configurations of evaluating network bandwidth. 599 mEvaluatingBandwidthUrl = getResStringConfig(mContext, 600 R.string.config_evaluating_bandwidth_url, null); 601 mMaxRetryTimerMs = getResIntConfig(mContext, 602 R.integer.config_evaluating_bandwidth_max_retry_timer_ms, 603 MAX_REEVALUATE_DELAY_MS); 604 mEvaluatingBandwidthTimeoutMs = getResIntConfig(mContext, 605 R.integer.config_evaluating_bandwidth_timeout_ms, 606 DEFAULT_EVALUATING_BANDWIDTH_TIMEOUT_MS); 607 608 // Provide empty LinkProperties and NetworkCapabilities to make sure they are never null, 609 // even before notifyNetworkConnected. 610 mLinkProperties = new LinkProperties(); 611 mNetworkCapabilities = new NetworkCapabilities(null); 612 } 613 614 /** 615 * ConnectivityService notifies NetworkMonitor that the user already accepted partial 616 * connectivity previously, so NetworkMonitor can validate the network even if it has partial 617 * connectivity. 618 */ setAcceptPartialConnectivity()619 public void setAcceptPartialConnectivity() { 620 sendMessage(EVENT_ACCEPT_PARTIAL_CONNECTIVITY); 621 } 622 623 /** 624 * Request the NetworkMonitor to reevaluate the network. 625 */ forceReevaluation(int responsibleUid)626 public void forceReevaluation(int responsibleUid) { 627 sendMessage(CMD_FORCE_REEVALUATION, responsibleUid, 0); 628 } 629 630 /** 631 * Send a notification to NetworkMonitor indicating that there was a DNS query response event. 632 * @param returnCode the DNS return code of the response. 633 */ notifyDnsResponse(int returnCode)634 public void notifyDnsResponse(int returnCode) { 635 sendMessage(EVENT_DNS_NOTIFICATION, returnCode); 636 } 637 638 /** 639 * Send a notification to NetworkMonitor indicating that private DNS settings have changed. 640 * @param newCfg The new private DNS configuration. 641 */ notifyPrivateDnsSettingsChanged(PrivateDnsConfig newCfg)642 public void notifyPrivateDnsSettingsChanged(PrivateDnsConfig newCfg) { 643 // Cancel any outstanding resolutions. 644 removeMessages(CMD_PRIVATE_DNS_SETTINGS_CHANGED); 645 // Send the update to the proper thread. 646 sendMessage(CMD_PRIVATE_DNS_SETTINGS_CHANGED, newCfg); 647 } 648 649 /** 650 * Send a notification to NetworkMonitor indicating that the network is now connected. 651 */ notifyNetworkConnected(LinkProperties lp, NetworkCapabilities nc)652 public void notifyNetworkConnected(LinkProperties lp, NetworkCapabilities nc) { 653 sendMessage(CMD_NETWORK_CONNECTED, new Pair<>( 654 new LinkProperties(lp), new NetworkCapabilities(nc))); 655 } 656 updateConnectedNetworkAttributes(Message connectedMsg)657 private void updateConnectedNetworkAttributes(Message connectedMsg) { 658 final Pair<LinkProperties, NetworkCapabilities> attrs = 659 (Pair<LinkProperties, NetworkCapabilities>) connectedMsg.obj; 660 mLinkProperties = attrs.first; 661 mNetworkCapabilities = attrs.second; 662 } 663 664 /** 665 * Send a notification to NetworkMonitor indicating that the network is now disconnected. 666 */ notifyNetworkDisconnected()667 public void notifyNetworkDisconnected() { 668 sendMessage(CMD_NETWORK_DISCONNECTED); 669 } 670 671 /** 672 * Send a notification to NetworkMonitor indicating that link properties have changed. 673 */ notifyLinkPropertiesChanged(final LinkProperties lp)674 public void notifyLinkPropertiesChanged(final LinkProperties lp) { 675 sendMessage(EVENT_LINK_PROPERTIES_CHANGED, new LinkProperties(lp)); 676 } 677 678 /** 679 * Send a notification to NetworkMonitor indicating that network capabilities have changed. 680 */ notifyNetworkCapabilitiesChanged(final NetworkCapabilities nc)681 public void notifyNetworkCapabilitiesChanged(final NetworkCapabilities nc) { 682 sendMessage(EVENT_NETWORK_CAPABILITIES_CHANGED, new NetworkCapabilities(nc)); 683 } 684 685 /** 686 * Request the captive portal application to be launched. 687 */ launchCaptivePortalApp()688 public void launchCaptivePortalApp() { 689 sendMessage(CMD_LAUNCH_CAPTIVE_PORTAL_APP); 690 } 691 692 /** 693 * Notify that the captive portal app was closed with the provided response code. 694 */ notifyCaptivePortalAppFinished(int response)695 public void notifyCaptivePortalAppFinished(int response) { 696 sendMessage(CMD_CAPTIVE_PORTAL_APP_FINISHED, response); 697 } 698 699 @Override log(String s)700 protected void log(String s) { 701 if (DBG) Log.d(TAG + "/" + mCleartextDnsNetwork.toString(), s); 702 } 703 validationLog(int probeType, Object url, String msg)704 private void validationLog(int probeType, Object url, String msg) { 705 String probeName = ValidationProbeEvent.getProbeName(probeType); 706 validationLog(String.format("%s %s %s", probeName, url, msg)); 707 } 708 validationLog(String s)709 private void validationLog(String s) { 710 if (DBG) log(s); 711 mValidationLogs.log(s); 712 } 713 validationStage()714 private ValidationStage validationStage() { 715 return 0 == mValidations ? ValidationStage.FIRST_VALIDATION : ValidationStage.REVALIDATION; 716 } 717 isValidationRequired()718 private boolean isValidationRequired() { 719 return NetworkMonitorUtils.isValidationRequired(mNetworkCapabilities); 720 } 721 isPrivateDnsValidationRequired()722 private boolean isPrivateDnsValidationRequired() { 723 return NetworkMonitorUtils.isPrivateDnsValidationRequired(mNetworkCapabilities); 724 } 725 notifyNetworkTested(NetworkTestResultParcelable result)726 private void notifyNetworkTested(NetworkTestResultParcelable result) { 727 try { 728 if (mCallbackVersion <= 5) { 729 mCallback.notifyNetworkTested( 730 getLegacyTestResult(result.result, result.probesSucceeded), 731 result.redirectUrl); 732 } else { 733 mCallback.notifyNetworkTestedWithExtras(result); 734 } 735 } catch (RemoteException e) { 736 Log.e(TAG, "Error sending network test result", e); 737 } 738 } 739 740 /** 741 * Get the test result that was used as an int up to interface version 5. 742 * 743 * <p>For callback version < 3 (only used in Q beta preview builds), the int represented one of 744 * the NETWORK_TEST_RESULT_* constants. 745 * 746 * <p>Q released with version 3, which used a single int for both the evaluation result bitmask, 747 * and the probesSucceeded bitmask. 748 */ getLegacyTestResult(int evaluationResult, int probesSucceeded)749 protected int getLegacyTestResult(int evaluationResult, int probesSucceeded) { 750 if (mCallbackVersion < 3) { 751 if ((evaluationResult & NETWORK_VALIDATION_RESULT_VALID) != 0) { 752 return NETWORK_TEST_RESULT_VALID; 753 } 754 if ((evaluationResult & NETWORK_VALIDATION_RESULT_PARTIAL) != 0) { 755 return NETWORK_TEST_RESULT_PARTIAL_CONNECTIVITY; 756 } 757 return NETWORK_TEST_RESULT_INVALID; 758 } 759 760 return evaluationResult | probesSucceeded; 761 } 762 notifyProbeStatusChanged(int probesCompleted, int probesSucceeded)763 private void notifyProbeStatusChanged(int probesCompleted, int probesSucceeded) { 764 try { 765 mCallback.notifyProbeStatusChanged(probesCompleted, probesSucceeded); 766 } catch (RemoteException e) { 767 Log.e(TAG, "Error sending probe status", e); 768 } 769 } 770 showProvisioningNotification(String action)771 private void showProvisioningNotification(String action) { 772 try { 773 mCallback.showProvisioningNotification(action, mContext.getPackageName()); 774 } catch (RemoteException e) { 775 Log.e(TAG, "Error showing provisioning notification", e); 776 } 777 } 778 hideProvisioningNotification()779 private void hideProvisioningNotification() { 780 try { 781 mCallback.hideProvisioningNotification(); 782 } catch (RemoteException e) { 783 Log.e(TAG, "Error hiding provisioning notification", e); 784 } 785 } 786 notifyDataStallSuspected(@onNull DataStallReportParcelable p)787 private void notifyDataStallSuspected(@NonNull DataStallReportParcelable p) { 788 try { 789 mCallback.notifyDataStallSuspected(p); 790 } catch (RemoteException e) { 791 Log.e(TAG, "Error sending notification for suspected data stall", e); 792 } 793 } 794 startMetricsCollection()795 private void startMetricsCollection() { 796 if (!mMetricsEnabled) return; 797 try { 798 synchronized (mNetworkValidationMetrics) { 799 mNetworkValidationMetrics.startCollection(mNetworkCapabilities); 800 } 801 } catch (Exception e) { 802 Log.wtf(TAG, "Error resetting validation metrics", e); 803 } 804 } 805 recordProbeEventMetrics(ProbeType type, long latencyMicros, ProbeResult result, CaptivePortalDataShim capportData)806 private void recordProbeEventMetrics(ProbeType type, long latencyMicros, ProbeResult result, 807 CaptivePortalDataShim capportData) { 808 if (!mMetricsEnabled) return; 809 try { 810 synchronized (mNetworkValidationMetrics) { 811 mNetworkValidationMetrics.addProbeEvent(type, latencyMicros, result, capportData); 812 } 813 } catch (Exception e) { 814 Log.wtf(TAG, "Error recording probe event", e); 815 } 816 } 817 recordValidationResult(int result, String redirectUrl)818 private void recordValidationResult(int result, String redirectUrl) { 819 if (!mMetricsEnabled) return; 820 try { 821 synchronized (mNetworkValidationMetrics) { 822 mNetworkValidationMetrics.setValidationResult(result, redirectUrl); 823 } 824 } catch (Exception e) { 825 Log.wtf(TAG, "Error recording validation result", e); 826 } 827 } 828 maybeStopCollectionAndSendMetrics()829 private void maybeStopCollectionAndSendMetrics() { 830 if (!mMetricsEnabled) return; 831 try { 832 synchronized (mNetworkValidationMetrics) { 833 mNetworkValidationMetrics.maybeStopCollectionAndSend(); 834 } 835 } catch (Exception e) { 836 Log.wtf(TAG, "Error sending validation stats", e); 837 } 838 } 839 840 // DefaultState is the parent of all States. It exists only to handle CMD_* messages but 841 // does not entail any real state (hence no enter() or exit() routines). 842 private class DefaultState extends State { 843 @Override processMessage(Message message)844 public boolean processMessage(Message message) { 845 switch (message.what) { 846 case CMD_NETWORK_CONNECTED: 847 updateConnectedNetworkAttributes(message); 848 logNetworkEvent(NetworkEvent.NETWORK_CONNECTED); 849 transitionTo(mEvaluatingState); 850 return HANDLED; 851 case CMD_NETWORK_DISCONNECTED: 852 maybeStopCollectionAndSendMetrics(); 853 logNetworkEvent(NetworkEvent.NETWORK_DISCONNECTED); 854 quit(); 855 return HANDLED; 856 case CMD_FORCE_REEVALUATION: 857 case CMD_CAPTIVE_PORTAL_RECHECK: 858 if (getCurrentState() == mDefaultState) { 859 // Before receiving CMD_NETWORK_CONNECTED (when still in mDefaultState), 860 // requests to reevaluate are not valid: drop them. 861 return HANDLED; 862 } 863 String msg = "Forcing reevaluation for UID " + message.arg1; 864 final DnsStallDetector dsd = getDnsStallDetector(); 865 if (dsd != null) { 866 msg += ". Dns signal count: " + dsd.getConsecutiveTimeoutCount(); 867 } 868 validationLog(msg); 869 mUidResponsibleForReeval = message.arg1; 870 transitionTo(mEvaluatingState); 871 return HANDLED; 872 case CMD_CAPTIVE_PORTAL_APP_FINISHED: 873 log("CaptivePortal App responded with " + message.arg1); 874 875 // If the user has seen and acted on a captive portal notification, and the 876 // captive portal app is now closed, disable HTTPS probes. This avoids the 877 // following pathological situation: 878 // 879 // 1. HTTP probe returns a captive portal, HTTPS probe fails or times out. 880 // 2. User opens the app and logs into the captive portal. 881 // 3. HTTP starts working, but HTTPS still doesn't work for some other reason - 882 // perhaps due to the network blocking HTTPS? 883 // 884 // In this case, we'll fail to validate the network even after the app is 885 // dismissed. There is now no way to use this network, because the app is now 886 // gone, so the user cannot select "Use this network as is". 887 mUseHttps = false; 888 889 switch (message.arg1) { 890 case APP_RETURN_DISMISSED: 891 sendMessage(CMD_FORCE_REEVALUATION, NO_UID, 0); 892 break; 893 case APP_RETURN_WANTED_AS_IS: 894 mDontDisplaySigninNotification = true; 895 // If the user wants to use this network anyway, there is no need to 896 // perform the bandwidth check even if configured. 897 mIsBandwidthCheckPassedOrIgnored = true; 898 // TODO: Distinguish this from a network that actually validates. 899 // Displaying the "x" on the system UI icon may still be a good idea. 900 transitionTo(mEvaluatingPrivateDnsState); 901 break; 902 case APP_RETURN_UNWANTED: 903 mDontDisplaySigninNotification = true; 904 mUserDoesNotWant = true; 905 mEvaluationState.reportEvaluationResult( 906 NETWORK_VALIDATION_RESULT_INVALID, null); 907 // TODO: Should teardown network. 908 mUidResponsibleForReeval = 0; 909 transitionTo(mEvaluatingState); 910 break; 911 } 912 return HANDLED; 913 case CMD_PRIVATE_DNS_SETTINGS_CHANGED: { 914 final PrivateDnsConfig cfg = (PrivateDnsConfig) message.obj; 915 if (!isPrivateDnsValidationRequired() || cfg == null || !cfg.inStrictMode()) { 916 // No DNS resolution required. 917 // 918 // We don't force any validation in opportunistic mode 919 // here. Opportunistic mode nameservers are validated 920 // separately within netd. 921 // 922 // Reset Private DNS settings state. 923 mPrivateDnsProviderHostname = ""; 924 break; 925 } 926 927 mPrivateDnsProviderHostname = cfg.hostname; 928 929 // DNS resolutions via Private DNS strict mode block for a 930 // few seconds (~4.2) checking for any IP addresses to 931 // arrive and validate. Initiating a (re)evaluation now 932 // should not significantly alter the validation outcome. 933 // 934 // No matter what: enqueue a validation request; one of 935 // three things can happen with this request: 936 // [1] ignored (EvaluatingState or CaptivePortalState) 937 // [2] transition to EvaluatingPrivateDnsState 938 // (DefaultState and ValidatedState) 939 // [3] handled (EvaluatingPrivateDnsState) 940 // 941 // The Private DNS configuration to be evaluated will: 942 // [1] be skipped (not in strict mode), or 943 // [2] validate (huzzah), or 944 // [3] encounter some problem (invalid hostname, 945 // no resolved IP addresses, IPs unreachable, 946 // port 853 unreachable, port 853 is not running a 947 // DNS-over-TLS server, et cetera). 948 // Cancel any outstanding CMD_EVALUATE_PRIVATE_DNS. 949 removeMessages(CMD_EVALUATE_PRIVATE_DNS); 950 sendMessage(CMD_EVALUATE_PRIVATE_DNS); 951 break; 952 } 953 case EVENT_DNS_NOTIFICATION: 954 final DnsStallDetector detector = getDnsStallDetector(); 955 if (detector != null) { 956 detector.accumulateConsecutiveDnsTimeoutCount(message.arg1); 957 } 958 break; 959 // Set mAcceptPartialConnectivity to true and if network start evaluating or 960 // re-evaluating and get the result of partial connectivity, ProbingState will 961 // disable HTTPS probe and transition to EvaluatingPrivateDnsState. 962 case EVENT_ACCEPT_PARTIAL_CONNECTIVITY: 963 maybeDisableHttpsProbing(true /* acceptPartial */); 964 break; 965 case EVENT_LINK_PROPERTIES_CHANGED: 966 final Uri oldCapportUrl = getCaptivePortalApiUrl(mLinkProperties); 967 mLinkProperties = (LinkProperties) message.obj; 968 final Uri newCapportUrl = getCaptivePortalApiUrl(mLinkProperties); 969 if (!Objects.equals(oldCapportUrl, newCapportUrl)) { 970 sendMessage(CMD_FORCE_REEVALUATION, NO_UID, 0); 971 } 972 break; 973 case EVENT_NETWORK_CAPABILITIES_CHANGED: 974 mNetworkCapabilities = (NetworkCapabilities) message.obj; 975 break; 976 default: 977 break; 978 } 979 return HANDLED; 980 } 981 } 982 983 // Being in the ValidatedState State indicates a Network is: 984 // - Successfully validated, or 985 // - Wanted "as is" by the user, or 986 // - Does not satisfy the default NetworkRequest and so validation has been skipped. 987 private class ValidatedState extends State { 988 @Override enter()989 public void enter() { 990 maybeLogEvaluationResult( 991 networkEventType(validationStage(), EvaluationResult.VALIDATED)); 992 // If the user has accepted partial connectivity and HTTPS probing is disabled, then 993 // mark the network as validated and partial so that settings can keep informing the 994 // user that the connection is limited. 995 int result = NETWORK_VALIDATION_RESULT_VALID; 996 if (!mUseHttps && mAcceptPartialConnectivity) { 997 result |= NETWORK_VALIDATION_RESULT_PARTIAL; 998 } 999 mEvaluationState.reportEvaluationResult(result, null /* redirectUrl */); 1000 mValidations++; 1001 initSocketTrackingIfRequired(); 1002 // start periodical polling. 1003 sendTcpPollingEvent(); 1004 maybeStopCollectionAndSendMetrics(); 1005 } 1006 initSocketTrackingIfRequired()1007 private void initSocketTrackingIfRequired() { 1008 if (!isValidationRequired()) return; 1009 1010 final TcpSocketTracker tst = getTcpSocketTracker(); 1011 if (tst != null) { 1012 tst.pollSocketsInfo(); 1013 } 1014 } 1015 1016 @Override processMessage(Message message)1017 public boolean processMessage(Message message) { 1018 switch (message.what) { 1019 case CMD_NETWORK_CONNECTED: 1020 updateConnectedNetworkAttributes(message); 1021 transitionTo(mValidatedState); 1022 break; 1023 case CMD_EVALUATE_PRIVATE_DNS: 1024 // TODO: this causes reevaluation of a single probe that is not counted in 1025 // metrics. Add support for such reevaluation probes in metrics, and log them 1026 // separately. 1027 transitionTo(mEvaluatingPrivateDnsState); 1028 break; 1029 case EVENT_DNS_NOTIFICATION: 1030 final DnsStallDetector dsd = getDnsStallDetector(); 1031 if (dsd == null) break; 1032 1033 dsd.accumulateConsecutiveDnsTimeoutCount(message.arg1); 1034 if (evaluateDataStall()) { 1035 transitionTo(mEvaluatingState); 1036 } 1037 break; 1038 case EVENT_POLL_TCPINFO: 1039 final TcpSocketTracker tst = getTcpSocketTracker(); 1040 if (tst == null) break; 1041 // Transit if retrieve socket info is succeeded and suspected as a stall. 1042 if (tst.pollSocketsInfo() && evaluateDataStall()) { 1043 transitionTo(mEvaluatingState); 1044 } else { 1045 sendTcpPollingEvent(); 1046 } 1047 break; 1048 default: 1049 return NOT_HANDLED; 1050 } 1051 return HANDLED; 1052 } 1053 evaluateDataStall()1054 boolean evaluateDataStall() { 1055 if (isDataStall()) { 1056 validationLog("Suspecting data stall, reevaluate"); 1057 return true; 1058 } 1059 return false; 1060 } 1061 1062 @Override exit()1063 public void exit() { 1064 // Not useful for non-ValidatedState. 1065 removeMessages(EVENT_POLL_TCPINFO); 1066 } 1067 } 1068 1069 @VisibleForTesting sendTcpPollingEvent()1070 void sendTcpPollingEvent() { 1071 if (isValidationRequired()) { 1072 sendMessageDelayed(EVENT_POLL_TCPINFO, getTcpPollingInterval()); 1073 } 1074 } 1075 maybeWriteDataStallStats(@onNull final CaptivePortalProbeResult result)1076 private void maybeWriteDataStallStats(@NonNull final CaptivePortalProbeResult result) { 1077 if (mDataStallTypeToCollect == DATA_STALL_EVALUATION_TYPE_NONE) return; 1078 /* 1079 * Collect data stall detection level information for each transport type. Collect type 1080 * specific information for cellular and wifi only currently. Generate 1081 * DataStallDetectionStats for each transport type. E.g., if a network supports both 1082 * TRANSPORT_WIFI and TRANSPORT_VPN, two DataStallDetectionStats will be generated. 1083 */ 1084 final int[] transports = mNetworkCapabilities.getTransportTypes(); 1085 for (int i = 0; i < transports.length; i++) { 1086 final DataStallDetectionStats stats = 1087 buildDataStallDetectionStats(transports[i], mDataStallTypeToCollect); 1088 mDependencies.writeDataStallDetectionStats(stats, result); 1089 } 1090 mDataStallTypeToCollect = DATA_STALL_EVALUATION_TYPE_NONE; 1091 } 1092 1093 @VisibleForTesting buildDataStallDetectionStats(int transport, @EvaluationType int evaluationType)1094 protected DataStallDetectionStats buildDataStallDetectionStats(int transport, 1095 @EvaluationType int evaluationType) { 1096 final DataStallDetectionStats.Builder stats = new DataStallDetectionStats.Builder(); 1097 if (VDBG_STALL) { 1098 log("collectDataStallMetrics: type=" + transport + ", evaluation=" + evaluationType); 1099 } 1100 stats.setEvaluationType(evaluationType); 1101 stats.setNetworkType(transport); 1102 switch (transport) { 1103 case NetworkCapabilities.TRANSPORT_WIFI: 1104 // TODO: Update it if status query in dual wifi is supported. 1105 final WifiInfo wifiInfo = mWifiManager.getConnectionInfo(); 1106 stats.setWiFiData(wifiInfo); 1107 break; 1108 case NetworkCapabilities.TRANSPORT_CELLULAR: 1109 final boolean isRoaming = !mNetworkCapabilities.hasCapability( 1110 NetworkCapabilities.NET_CAPABILITY_NOT_ROAMING); 1111 final SignalStrength ss = mTelephonyManager.getSignalStrength(); 1112 // TODO(b/120452078): Support multi-sim. 1113 stats.setCellData( 1114 mTelephonyManager.getDataNetworkType(), 1115 isRoaming, 1116 mTelephonyManager.getNetworkOperator(), 1117 mTelephonyManager.getSimOperator(), 1118 (ss != null) 1119 ? ss.getLevel() : CellSignalStrength.SIGNAL_STRENGTH_NONE_OR_UNKNOWN); 1120 break; 1121 default: 1122 // No transport type specific information for the other types. 1123 break; 1124 } 1125 1126 addDnsEvents(stats); 1127 addTcpStats(stats); 1128 1129 return stats.build(); 1130 } 1131 addTcpStats(@onNull final DataStallDetectionStats.Builder stats)1132 private void addTcpStats(@NonNull final DataStallDetectionStats.Builder stats) { 1133 final TcpSocketTracker tst = getTcpSocketTracker(); 1134 if (tst == null) return; 1135 1136 stats.setTcpSentSinceLastRecv(tst.getSentSinceLastRecv()); 1137 stats.setTcpFailRate(tst.getLatestPacketFailPercentage()); 1138 } 1139 1140 @VisibleForTesting addDnsEvents(@onNull final DataStallDetectionStats.Builder stats)1141 protected void addDnsEvents(@NonNull final DataStallDetectionStats.Builder stats) { 1142 final DnsStallDetector dsd = getDnsStallDetector(); 1143 if (dsd == null) return; 1144 1145 final int size = dsd.mResultIndices.size(); 1146 for (int i = 1; i <= DEFAULT_DNS_LOG_SIZE && i <= size; i++) { 1147 final int index = dsd.mResultIndices.indexOf(size - i); 1148 stats.addDnsEvent(dsd.mDnsEvents[index].mReturnCode, dsd.mDnsEvents[index].mTimeStamp); 1149 } 1150 } 1151 1152 1153 // Being in the MaybeNotifyState State indicates the user may have been notified that sign-in 1154 // is required. This State takes care to clear the notification upon exit from the State. 1155 private class MaybeNotifyState extends State { 1156 @Override processMessage(Message message)1157 public boolean processMessage(Message message) { 1158 switch (message.what) { 1159 case CMD_LAUNCH_CAPTIVE_PORTAL_APP: 1160 final Bundle appExtras = new Bundle(); 1161 // OneAddressPerFamilyNetwork is not parcelable across processes. 1162 final Network network = new Network(mCleartextDnsNetwork); 1163 appExtras.putParcelable(ConnectivityManager.EXTRA_NETWORK, network); 1164 final CaptivePortalProbeResult probeRes = mLastPortalProbeResult; 1165 // Use redirect URL from AP if exists. 1166 final String portalUrl = 1167 (useRedirectUrlForPortal() && makeURL(probeRes.redirectUrl) != null) 1168 ? probeRes.redirectUrl : probeRes.detectUrl; 1169 appExtras.putString(EXTRA_CAPTIVE_PORTAL_URL, portalUrl); 1170 if (probeRes.probeSpec != null) { 1171 final String encodedSpec = probeRes.probeSpec.getEncodedSpec(); 1172 appExtras.putString(EXTRA_CAPTIVE_PORTAL_PROBE_SPEC, encodedSpec); 1173 } 1174 appExtras.putString(ConnectivityManager.EXTRA_CAPTIVE_PORTAL_USER_AGENT, 1175 mCaptivePortalUserAgent); 1176 if (mNotifier != null) { 1177 mNotifier.notifyCaptivePortalValidationPending(network); 1178 } 1179 mCm.startCaptivePortalApp(network, appExtras); 1180 return HANDLED; 1181 default: 1182 return NOT_HANDLED; 1183 } 1184 } 1185 useRedirectUrlForPortal()1186 private boolean useRedirectUrlForPortal() { 1187 // It must match the conditions in CaptivePortalLogin in which the redirect URL is not 1188 // used to validate that the portal is gone. 1189 final boolean aboveQ = 1190 ShimUtils.isReleaseOrDevelopmentApiAbove(Build.VERSION_CODES.Q); 1191 return aboveQ && mDependencies.isFeatureEnabled(mContext, NAMESPACE_CONNECTIVITY, 1192 DISMISS_PORTAL_IN_VALIDATED_NETWORK, aboveQ /* defaultEnabled */); 1193 } 1194 1195 @Override exit()1196 public void exit() { 1197 if (mLaunchCaptivePortalAppBroadcastReceiver != null) { 1198 mContext.unregisterReceiver(mLaunchCaptivePortalAppBroadcastReceiver); 1199 mLaunchCaptivePortalAppBroadcastReceiver = null; 1200 } 1201 hideProvisioningNotification(); 1202 } 1203 } 1204 1205 // Being in the EvaluatingState State indicates the Network is being evaluated for internet 1206 // connectivity, or that the user has indicated that this network is unwanted. 1207 private class EvaluatingState extends State { 1208 private Uri mEvaluatingCapportUrl; 1209 1210 @Override enter()1211 public void enter() { 1212 // If we have already started to track time spent in EvaluatingState 1213 // don't reset the timer due simply to, say, commands or events that 1214 // cause us to exit and re-enter EvaluatingState. 1215 if (!mEvaluationTimer.isStarted()) { 1216 mEvaluationTimer.start(); 1217 } 1218 sendMessage(CMD_REEVALUATE, ++mReevaluateToken, 0); 1219 if (mUidResponsibleForReeval != INVALID_UID) { 1220 TrafficStats.setThreadStatsUid(mUidResponsibleForReeval); 1221 mUidResponsibleForReeval = INVALID_UID; 1222 } 1223 mReevaluateDelayMs = INITIAL_REEVALUATE_DELAY_MS; 1224 mEvaluateAttempts = 0; 1225 mEvaluatingCapportUrl = getCaptivePortalApiUrl(mLinkProperties); 1226 // Reset all current probe results to zero, but retain current validation state until 1227 // validation succeeds or fails. 1228 mEvaluationState.clearProbeResults(); 1229 } 1230 1231 @Override processMessage(Message message)1232 public boolean processMessage(Message message) { 1233 switch (message.what) { 1234 case CMD_REEVALUATE: 1235 if (message.arg1 != mReevaluateToken || mUserDoesNotWant) { 1236 return HANDLED; 1237 } 1238 // Don't bother validating networks that don't satisfy the default request. 1239 // This includes: 1240 // - VPNs which can be considered explicitly desired by the user and the 1241 // user's desire trumps whether the network validates. 1242 // - Networks that don't provide Internet access. It's unclear how to 1243 // validate such networks. 1244 // - Untrusted networks. It's unsafe to prompt the user to sign-in to 1245 // such networks and the user didn't express interest in connecting to 1246 // such networks (an app did) so the user may be unhappily surprised when 1247 // asked to sign-in to a network they didn't want to connect to in the 1248 // first place. Validation could be done to adjust the network scores 1249 // however these networks are app-requested and may not be intended for 1250 // general usage, in which case general validation may not be an accurate 1251 // measure of the network's quality. Only the app knows how to evaluate 1252 // the network so don't bother validating here. Furthermore sending HTTP 1253 // packets over the network may be undesirable, for example an extremely 1254 // expensive metered network, or unwanted leaking of the User Agent string. 1255 // 1256 // On networks that need to support private DNS in strict mode (e.g., VPNs, but 1257 // not networks that don't provide Internet access), we still need to perform 1258 // private DNS server resolution. 1259 if (!isValidationRequired()) { 1260 if (isPrivateDnsValidationRequired()) { 1261 validationLog("Network would not satisfy default request, " 1262 + "resolving private DNS"); 1263 transitionTo(mEvaluatingPrivateDnsState); 1264 } else { 1265 validationLog("Network would not satisfy default request, " 1266 + "not validating"); 1267 transitionTo(mValidatedState); 1268 } 1269 return HANDLED; 1270 } 1271 mEvaluateAttempts++; 1272 1273 transitionTo(mProbingState); 1274 return HANDLED; 1275 case CMD_FORCE_REEVALUATION: 1276 // The evaluation process restarts via EvaluatingState#enter. 1277 return shouldAcceptForceRevalidation() ? NOT_HANDLED : HANDLED; 1278 // Disable HTTPS probe and transition to EvaluatingPrivateDnsState because: 1279 // 1. Network is connected and finish the network validation. 1280 // 2. NetworkMonitor detects network is partial connectivity and user accepts it. 1281 case EVENT_ACCEPT_PARTIAL_CONNECTIVITY: 1282 maybeDisableHttpsProbing(true /* acceptPartial */); 1283 transitionTo(mEvaluatingPrivateDnsState); 1284 return HANDLED; 1285 default: 1286 return NOT_HANDLED; 1287 } 1288 } 1289 shouldAcceptForceRevalidation()1290 private boolean shouldAcceptForceRevalidation() { 1291 // If the captive portal URL has changed since the last evaluation attempt, always 1292 // revalidate. Otherwise, ignore any re-evaluation requests before 1293 // IGNORE_REEVALUATE_ATTEMPTS are made. 1294 return mEvaluateAttempts >= IGNORE_REEVALUATE_ATTEMPTS 1295 || !Objects.equals( 1296 mEvaluatingCapportUrl, getCaptivePortalApiUrl(mLinkProperties)); 1297 } 1298 1299 @Override exit()1300 public void exit() { 1301 TrafficStats.clearThreadStatsUid(); 1302 } 1303 } 1304 1305 // BroadcastReceiver that waits for a particular Intent and then posts a message. 1306 private class CustomIntentReceiver extends BroadcastReceiver { 1307 private final int mToken; 1308 private final int mWhat; 1309 private final String mAction; CustomIntentReceiver(String action, int token, int what)1310 CustomIntentReceiver(String action, int token, int what) { 1311 mToken = token; 1312 mWhat = what; 1313 mAction = action + "_" + mCleartextDnsNetwork.getNetworkHandle() + "_" + token; 1314 mContext.registerReceiver(this, new IntentFilter(mAction)); 1315 } getPendingIntent()1316 public PendingIntent getPendingIntent() { 1317 final Intent intent = new Intent(mAction); 1318 intent.setPackage(mContext.getPackageName()); 1319 return PendingIntent.getBroadcast(mContext, 0, intent, 0); 1320 } 1321 @Override onReceive(Context context, Intent intent)1322 public void onReceive(Context context, Intent intent) { 1323 if (intent.getAction().equals(mAction)) sendMessage(obtainMessage(mWhat, mToken)); 1324 } 1325 } 1326 1327 // Being in the CaptivePortalState State indicates a captive portal was detected and the user 1328 // has been shown a notification to sign-in. 1329 private class CaptivePortalState extends State { 1330 private static final String ACTION_LAUNCH_CAPTIVE_PORTAL_APP = 1331 "android.net.netmon.launchCaptivePortalApp"; 1332 1333 @Override enter()1334 public void enter() { 1335 maybeLogEvaluationResult( 1336 networkEventType(validationStage(), EvaluationResult.CAPTIVE_PORTAL)); 1337 // Don't annoy user with sign-in notifications. 1338 if (mDontDisplaySigninNotification) return; 1339 // Create a CustomIntentReceiver that sends us a 1340 // CMD_LAUNCH_CAPTIVE_PORTAL_APP message when the user 1341 // touches the notification. 1342 if (mLaunchCaptivePortalAppBroadcastReceiver == null) { 1343 // Wait for result. 1344 mLaunchCaptivePortalAppBroadcastReceiver = new CustomIntentReceiver( 1345 ACTION_LAUNCH_CAPTIVE_PORTAL_APP, new Random().nextInt(), 1346 CMD_LAUNCH_CAPTIVE_PORTAL_APP); 1347 // Display the sign in notification. 1348 // Only do this once for every time we enter MaybeNotifyState. b/122164725 1349 showProvisioningNotification(mLaunchCaptivePortalAppBroadcastReceiver.mAction); 1350 } 1351 // Retest for captive portal occasionally. 1352 sendMessageDelayed(CMD_CAPTIVE_PORTAL_RECHECK, 0 /* no UID */, 1353 CAPTIVE_PORTAL_REEVALUATE_DELAY_MS); 1354 mValidations++; 1355 maybeStopCollectionAndSendMetrics(); 1356 } 1357 1358 @Override exit()1359 public void exit() { 1360 removeMessages(CMD_CAPTIVE_PORTAL_RECHECK); 1361 } 1362 } 1363 1364 private class EvaluatingPrivateDnsState extends State { 1365 private int mPrivateDnsReevalDelayMs; 1366 private PrivateDnsConfig mPrivateDnsConfig; 1367 1368 @Override enter()1369 public void enter() { 1370 mPrivateDnsReevalDelayMs = INITIAL_REEVALUATE_DELAY_MS; 1371 mPrivateDnsConfig = null; 1372 sendMessage(CMD_EVALUATE_PRIVATE_DNS); 1373 } 1374 1375 @Override processMessage(Message msg)1376 public boolean processMessage(Message msg) { 1377 switch (msg.what) { 1378 case CMD_EVALUATE_PRIVATE_DNS: 1379 if (inStrictMode()) { 1380 if (!isStrictModeHostnameResolved()) { 1381 resolveStrictModeHostname(); 1382 1383 if (isStrictModeHostnameResolved()) { 1384 notifyPrivateDnsConfigResolved(); 1385 } else { 1386 handlePrivateDnsEvaluationFailure(); 1387 // The private DNS probe fails-fast if the server hostname cannot 1388 // be resolved. Record it as a failure with zero latency. 1389 // TODO: refactor this together with the probe recorded in 1390 // sendPrivateDnsProbe, so logging is symmetric / easier to follow. 1391 recordProbeEventMetrics(ProbeType.PT_PRIVDNS, 0 /* latency */, 1392 ProbeResult.PR_FAILURE, null /* capportData */); 1393 break; 1394 } 1395 } 1396 1397 // Look up a one-time hostname, to bypass caching. 1398 // 1399 // Note that this will race with ConnectivityService 1400 // code programming the DNS-over-TLS server IP addresses 1401 // into netd (if invoked, above). If netd doesn't know 1402 // the IP addresses yet, or if the connections to the IP 1403 // addresses haven't yet been validated, netd will block 1404 // for up to a few seconds before failing the lookup. 1405 if (!sendPrivateDnsProbe()) { 1406 handlePrivateDnsEvaluationFailure(); 1407 break; 1408 } 1409 handlePrivateDnsEvaluationSuccess(); 1410 } else { 1411 mEvaluationState.removeProbeResult(NETWORK_VALIDATION_PROBE_PRIVDNS); 1412 } 1413 1414 if (needEvaluatingBandwidth()) { 1415 transitionTo(mEvaluatingBandwidthState); 1416 } else { 1417 // All good! 1418 transitionTo(mValidatedState); 1419 } 1420 break; 1421 case CMD_PRIVATE_DNS_SETTINGS_CHANGED: 1422 // When settings change the reevaluation timer must be reset. 1423 mPrivateDnsReevalDelayMs = INITIAL_REEVALUATE_DELAY_MS; 1424 // Let the message bubble up and be handled by parent states as usual. 1425 return NOT_HANDLED; 1426 default: 1427 return NOT_HANDLED; 1428 } 1429 return HANDLED; 1430 } 1431 inStrictMode()1432 private boolean inStrictMode() { 1433 return !TextUtils.isEmpty(mPrivateDnsProviderHostname); 1434 } 1435 isStrictModeHostnameResolved()1436 private boolean isStrictModeHostnameResolved() { 1437 return (mPrivateDnsConfig != null) 1438 && mPrivateDnsConfig.hostname.equals(mPrivateDnsProviderHostname) 1439 && (mPrivateDnsConfig.ips.length > 0); 1440 } 1441 resolveStrictModeHostname()1442 private void resolveStrictModeHostname() { 1443 try { 1444 // Do a blocking DNS resolution using the network-assigned nameservers. 1445 final InetAddress[] ips = DnsUtils.getAllByName(mDependencies.getDnsResolver(), 1446 mCleartextDnsNetwork, mPrivateDnsProviderHostname, getDnsProbeTimeout(), 1447 str -> validationLog("Strict mode hostname resolution " + str)); 1448 mPrivateDnsConfig = new PrivateDnsConfig(mPrivateDnsProviderHostname, ips); 1449 } catch (UnknownHostException uhe) { 1450 mPrivateDnsConfig = null; 1451 } 1452 } 1453 notifyPrivateDnsConfigResolved()1454 private void notifyPrivateDnsConfigResolved() { 1455 try { 1456 mCallback.notifyPrivateDnsConfigResolved(mPrivateDnsConfig.toParcel()); 1457 } catch (RemoteException e) { 1458 Log.e(TAG, "Error sending private DNS config resolved notification", e); 1459 } 1460 } 1461 handlePrivateDnsEvaluationSuccess()1462 private void handlePrivateDnsEvaluationSuccess() { 1463 mEvaluationState.noteProbeResult(NETWORK_VALIDATION_PROBE_PRIVDNS, 1464 true /* succeeded */); 1465 } 1466 handlePrivateDnsEvaluationFailure()1467 private void handlePrivateDnsEvaluationFailure() { 1468 mEvaluationState.noteProbeResult(NETWORK_VALIDATION_PROBE_PRIVDNS, 1469 false /* succeeded */); 1470 mEvaluationState.reportEvaluationResult(NETWORK_VALIDATION_RESULT_INVALID, 1471 null /* redirectUrl */); 1472 // Queue up a re-evaluation with backoff. 1473 // 1474 // TODO: Consider abandoning this state after a few attempts and 1475 // transitioning back to EvaluatingState, to perhaps give ourselves 1476 // the opportunity to (re)detect a captive portal or something. 1477 // 1478 sendMessageDelayed(CMD_EVALUATE_PRIVATE_DNS, mPrivateDnsReevalDelayMs); 1479 mPrivateDnsReevalDelayMs *= 2; 1480 if (mPrivateDnsReevalDelayMs > MAX_REEVALUATE_DELAY_MS) { 1481 mPrivateDnsReevalDelayMs = MAX_REEVALUATE_DELAY_MS; 1482 } 1483 } 1484 sendPrivateDnsProbe()1485 private boolean sendPrivateDnsProbe() { 1486 final String host = UUID.randomUUID().toString().substring(0, 8) 1487 + PRIVATE_DNS_PROBE_HOST_SUFFIX; 1488 final Stopwatch watch = new Stopwatch().start(); 1489 boolean success = false; 1490 long time; 1491 try { 1492 final InetAddress[] ips = mNetwork.getAllByName(host); 1493 time = watch.stop(); 1494 final String strIps = Arrays.toString(ips); 1495 success = (ips != null && ips.length > 0); 1496 validationLog(PROBE_PRIVDNS, host, String.format("%dus: %s", time, strIps)); 1497 } catch (UnknownHostException uhe) { 1498 time = watch.stop(); 1499 validationLog(PROBE_PRIVDNS, host, 1500 String.format("%dus - Error: %s", time, uhe.getMessage())); 1501 } 1502 recordProbeEventMetrics(ProbeType.PT_PRIVDNS, time, success ? ProbeResult.PR_SUCCESS : 1503 ProbeResult.PR_FAILURE, null /* capportData */); 1504 logValidationProbe(time, PROBE_PRIVDNS, success ? DNS_SUCCESS : DNS_FAILURE); 1505 return success; 1506 } 1507 } 1508 1509 private class ProbingState extends State { 1510 private Thread mThread; 1511 1512 @Override enter()1513 public void enter() { 1514 // When starting a full probe cycle here, record any pending stats (for example if 1515 // CMD_FORCE_REEVALUATE was called before evaluation finished, as can happen in 1516 // EvaluatingPrivateDnsState). 1517 maybeStopCollectionAndSendMetrics(); 1518 // Restart the metrics collection timers. Metrics will be stopped and sent when the 1519 // validation attempt finishes (as success, failure or portal), or if it is interrupted 1520 // (by being restarted or if NetworkMonitor stops). 1521 startMetricsCollection(); 1522 if (mEvaluateAttempts >= BLAME_FOR_EVALUATION_ATTEMPTS) { 1523 //Don't continue to blame UID forever. 1524 TrafficStats.clearThreadStatsUid(); 1525 } 1526 1527 final int token = ++mProbeToken; 1528 final EvaluationThreadDeps deps = new EvaluationThreadDeps(mNetworkCapabilities); 1529 mThread = new Thread(() -> sendMessage(obtainMessage(CMD_PROBE_COMPLETE, token, 0, 1530 isCaptivePortal(deps)))); 1531 mThread.start(); 1532 } 1533 1534 @Override processMessage(Message message)1535 public boolean processMessage(Message message) { 1536 switch (message.what) { 1537 case CMD_PROBE_COMPLETE: 1538 // Ensure that CMD_PROBE_COMPLETE from stale threads are ignored. 1539 if (message.arg1 != mProbeToken) { 1540 return HANDLED; 1541 } 1542 1543 final CaptivePortalProbeResult probeResult = 1544 (CaptivePortalProbeResult) message.obj; 1545 mLastProbeTime = SystemClock.elapsedRealtime(); 1546 1547 maybeWriteDataStallStats(probeResult); 1548 1549 if (probeResult.isSuccessful()) { 1550 // Transit EvaluatingPrivateDnsState to get to Validated 1551 // state (even if no Private DNS validation required). 1552 transitionTo(mEvaluatingPrivateDnsState); 1553 } else if (probeResult.isPortal()) { 1554 mEvaluationState.reportEvaluationResult(NETWORK_VALIDATION_RESULT_INVALID, 1555 probeResult.redirectUrl); 1556 mLastPortalProbeResult = probeResult; 1557 transitionTo(mCaptivePortalState); 1558 } else if (probeResult.isPartialConnectivity()) { 1559 mEvaluationState.reportEvaluationResult(NETWORK_VALIDATION_RESULT_PARTIAL, 1560 null /* redirectUrl */); 1561 maybeDisableHttpsProbing(mAcceptPartialConnectivity); 1562 if (mAcceptPartialConnectivity) { 1563 transitionTo(mEvaluatingPrivateDnsState); 1564 } else { 1565 transitionTo(mWaitingForNextProbeState); 1566 } 1567 } else { 1568 logNetworkEvent(NetworkEvent.NETWORK_VALIDATION_FAILED); 1569 mEvaluationState.reportEvaluationResult(NETWORK_VALIDATION_RESULT_INVALID, 1570 null /* redirectUrl */); 1571 transitionTo(mWaitingForNextProbeState); 1572 } 1573 return HANDLED; 1574 case EVENT_DNS_NOTIFICATION: 1575 case EVENT_ACCEPT_PARTIAL_CONNECTIVITY: 1576 // Leave the event to DefaultState. 1577 return NOT_HANDLED; 1578 default: 1579 // Wait for probe result and defer events to next state by default. 1580 deferMessage(message); 1581 return HANDLED; 1582 } 1583 } 1584 1585 @Override exit()1586 public void exit() { 1587 if (mThread.isAlive()) { 1588 mThread.interrupt(); 1589 } 1590 mThread = null; 1591 } 1592 } 1593 1594 // Being in the WaitingForNextProbeState indicates that evaluating probes failed and state is 1595 // transited from ProbingState. This ensures that the state machine is only in ProbingState 1596 // while a probe is in progress, not while waiting to perform the next probe. That allows 1597 // ProbingState to defer most messages until the probe is complete, which keeps the code simple 1598 // and matches the pre-Q behaviour where probes were a blocking operation performed on the state 1599 // machine thread. 1600 private class WaitingForNextProbeState extends State { 1601 @Override enter()1602 public void enter() { 1603 // Send metrics for this evaluation attempt. Metrics collection (and its timers) will be 1604 // restarted when the next probe starts. 1605 maybeStopCollectionAndSendMetrics(); 1606 scheduleNextProbe(); 1607 } 1608 scheduleNextProbe()1609 private void scheduleNextProbe() { 1610 final Message msg = obtainMessage(CMD_REEVALUATE, ++mReevaluateToken, 0); 1611 sendMessageDelayed(msg, mReevaluateDelayMs); 1612 mReevaluateDelayMs *= 2; 1613 if (mReevaluateDelayMs > MAX_REEVALUATE_DELAY_MS) { 1614 mReevaluateDelayMs = MAX_REEVALUATE_DELAY_MS; 1615 } 1616 } 1617 1618 @Override processMessage(Message message)1619 public boolean processMessage(Message message) { 1620 return NOT_HANDLED; 1621 } 1622 } 1623 1624 private final class EvaluatingBandwidthThread extends Thread { 1625 final int mThreadId; 1626 EvaluatingBandwidthThread(int id)1627 EvaluatingBandwidthThread(int id) { 1628 mThreadId = id; 1629 } 1630 1631 @Override run()1632 public void run() { 1633 HttpURLConnection urlConnection = null; 1634 try { 1635 final URL url = makeURL(mEvaluatingBandwidthUrl); 1636 urlConnection = makeProbeConnection(url, true /* followRedirects */); 1637 // In order to exclude the time of DNS lookup, send the delay message of timeout 1638 // here. 1639 sendMessageDelayed(CMD_BANDWIDTH_CHECK_TIMEOUT, mEvaluatingBandwidthTimeoutMs); 1640 readContentFromDownloadUrl(urlConnection); 1641 } catch (InterruptedIOException e) { 1642 // There is a timing issue that someone triggers the forcing reevaluation when 1643 // executing the getInputStream(). The InterruptedIOException is thrown by 1644 // Timeout#throwIfReached, it will reset the interrupt flag of Thread. So just 1645 // return and wait for the bandwidth reevaluation, otherwise the 1646 // CMD_BANDWIDTH_CHECK_COMPLETE will be sent. 1647 validationLog("The thread is interrupted when executing the getInputStream()," 1648 + " return and wait for the bandwidth reevaluation"); 1649 return; 1650 } catch (IOException e) { 1651 validationLog("Evaluating bandwidth failed: " + e + ", if the thread is not" 1652 + " interrupted, transition to validated state directly to make sure user" 1653 + " can use wifi normally."); 1654 } finally { 1655 if (urlConnection != null) { 1656 urlConnection.disconnect(); 1657 } 1658 } 1659 // Don't send CMD_BANDWIDTH_CHECK_COMPLETE if the IO is interrupted or timeout. 1660 // Only send CMD_BANDWIDTH_CHECK_COMPLETE when the download is finished normally. 1661 // Add a serial number for CMD_BANDWIDTH_CHECK_COMPLETE to prevent handling the obsolete 1662 // CMD_BANDWIDTH_CHECK_COMPLETE. 1663 if (!isInterrupted()) sendMessage(CMD_BANDWIDTH_CHECK_COMPLETE, mThreadId); 1664 } 1665 readContentFromDownloadUrl(@onNull final HttpURLConnection conn)1666 private void readContentFromDownloadUrl(@NonNull final HttpURLConnection conn) 1667 throws IOException { 1668 final byte[] buffer = new byte[1000]; 1669 final InputStream is = conn.getInputStream(); 1670 while (!isInterrupted() && is.read(buffer) > 0) { /* read again */ } 1671 } 1672 } 1673 1674 private class EvaluatingBandwidthState extends State { 1675 private EvaluatingBandwidthThread mEvaluatingBandwidthThread; 1676 private int mRetryBandwidthDelayMs; 1677 private int mCurrentThreadId; 1678 1679 @Override enter()1680 public void enter() { 1681 mRetryBandwidthDelayMs = getResIntConfig(mContext, 1682 R.integer.config_evaluating_bandwidth_min_retry_timer_ms, 1683 INITIAL_REEVALUATE_DELAY_MS); 1684 sendMessage(CMD_EVALUATE_BANDWIDTH); 1685 } 1686 1687 @Override processMessage(Message msg)1688 public boolean processMessage(Message msg) { 1689 switch (msg.what) { 1690 case CMD_EVALUATE_BANDWIDTH: 1691 mCurrentThreadId = mNextEvaluatingBandwidthThreadId.getAndIncrement(); 1692 mEvaluatingBandwidthThread = new EvaluatingBandwidthThread(mCurrentThreadId); 1693 mEvaluatingBandwidthThread.start(); 1694 break; 1695 case CMD_BANDWIDTH_CHECK_COMPLETE: 1696 // Only handle the CMD_BANDWIDTH_CHECK_COMPLETE which is sent by the newest 1697 // EvaluatingBandwidthThread. 1698 if (mCurrentThreadId == msg.arg1) { 1699 mIsBandwidthCheckPassedOrIgnored = true; 1700 transitionTo(mValidatedState); 1701 } 1702 break; 1703 case CMD_BANDWIDTH_CHECK_TIMEOUT: 1704 validationLog("Evaluating bandwidth timeout!"); 1705 mEvaluatingBandwidthThread.interrupt(); 1706 scheduleReevaluatingBandwidth(); 1707 break; 1708 default: 1709 return NOT_HANDLED; 1710 } 1711 return HANDLED; 1712 } 1713 scheduleReevaluatingBandwidth()1714 private void scheduleReevaluatingBandwidth() { 1715 sendMessageDelayed(obtainMessage(CMD_EVALUATE_BANDWIDTH), mRetryBandwidthDelayMs); 1716 mRetryBandwidthDelayMs *= 2; 1717 if (mRetryBandwidthDelayMs > mMaxRetryTimerMs) { 1718 mRetryBandwidthDelayMs = mMaxRetryTimerMs; 1719 } 1720 } 1721 1722 @Override exit()1723 public void exit() { 1724 mEvaluatingBandwidthThread.interrupt(); 1725 removeMessages(CMD_EVALUATE_BANDWIDTH); 1726 removeMessages(CMD_BANDWIDTH_CHECK_TIMEOUT); 1727 } 1728 } 1729 1730 // Limits the list of IP addresses returned by getAllByName or tried by openConnection to at 1731 // most one per address family. This ensures we only wait up to 20 seconds for TCP connections 1732 // to complete, regardless of how many IP addresses a host has. 1733 private static class OneAddressPerFamilyNetwork extends Network { OneAddressPerFamilyNetwork(Network network)1734 OneAddressPerFamilyNetwork(Network network) { 1735 // Always bypass Private DNS. 1736 super(network.getPrivateDnsBypassingCopy()); 1737 } 1738 1739 @Override getAllByName(String host)1740 public InetAddress[] getAllByName(String host) throws UnknownHostException { 1741 final List<InetAddress> addrs = Arrays.asList(super.getAllByName(host)); 1742 1743 // Ensure the address family of the first address is tried first. 1744 LinkedHashMap<Class, InetAddress> addressByFamily = new LinkedHashMap<>(); 1745 addressByFamily.put(addrs.get(0).getClass(), addrs.get(0)); 1746 Collections.shuffle(addrs); 1747 1748 for (InetAddress addr : addrs) { 1749 addressByFamily.put(addr.getClass(), addr); 1750 } 1751 1752 return addressByFamily.values().toArray(new InetAddress[addressByFamily.size()]); 1753 } 1754 } 1755 1756 @VisibleForTesting onlyWifiTransport()1757 boolean onlyWifiTransport() { 1758 int[] transportTypes = mNetworkCapabilities.getTransportTypes(); 1759 return transportTypes.length == 1 1760 && transportTypes[0] == NetworkCapabilities.TRANSPORT_WIFI; 1761 } 1762 1763 @VisibleForTesting needEvaluatingBandwidth()1764 boolean needEvaluatingBandwidth() { 1765 if (mIsBandwidthCheckPassedOrIgnored 1766 || TextUtils.isEmpty(mEvaluatingBandwidthUrl) 1767 || !mNetworkCapabilities.hasCapability(NET_CAPABILITY_NOT_METERED) 1768 || !onlyWifiTransport()) { 1769 return false; 1770 } 1771 1772 return true; 1773 } 1774 getIsCaptivePortalCheckEnabled()1775 private boolean getIsCaptivePortalCheckEnabled() { 1776 String symbol = CAPTIVE_PORTAL_MODE; 1777 int defaultValue = CAPTIVE_PORTAL_MODE_PROMPT; 1778 int mode = mDependencies.getSetting(mContext, symbol, defaultValue); 1779 return mode != CAPTIVE_PORTAL_MODE_IGNORE; 1780 } 1781 getIsPrivateIpNoInternetEnabled()1782 private boolean getIsPrivateIpNoInternetEnabled() { 1783 return mDependencies.isFeatureEnabled(mContext, DNS_PROBE_PRIVATE_IP_NO_INTERNET_VERSION) 1784 || mContext.getResources().getBoolean( 1785 R.bool.config_force_dns_probe_private_ip_no_internet); 1786 } 1787 getUseHttpsValidation()1788 private boolean getUseHttpsValidation() { 1789 return mDependencies.getDeviceConfigPropertyInt(NAMESPACE_CONNECTIVITY, 1790 CAPTIVE_PORTAL_USE_HTTPS, 1) == 1; 1791 } 1792 1793 @Nullable getMccFromCellInfo(final CellInfo cell)1794 private String getMccFromCellInfo(final CellInfo cell) { 1795 if (cell instanceof CellInfoGsm) { 1796 return ((CellInfoGsm) cell).getCellIdentity().getMccString(); 1797 } else if (cell instanceof CellInfoLte) { 1798 return ((CellInfoLte) cell).getCellIdentity().getMccString(); 1799 } else if (cell instanceof CellInfoWcdma) { 1800 return ((CellInfoWcdma) cell).getCellIdentity().getMccString(); 1801 } else if (cell instanceof CellInfoTdscdma) { 1802 return ((CellInfoTdscdma) cell).getCellIdentity().getMccString(); 1803 } else if (cell instanceof CellInfoNr) { 1804 return ((CellIdentityNr) ((CellInfoNr) cell).getCellIdentity()).getMccString(); 1805 } else { 1806 return null; 1807 } 1808 } 1809 1810 /** 1811 * Return location mcc. 1812 */ 1813 @VisibleForTesting 1814 @Nullable getLocationMcc()1815 protected String getLocationMcc() { 1816 // Adding this check is because the new permission won't be granted by mainline update, 1817 // the new permission only be granted by OTA for current design. Tracking: b/145774617. 1818 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION, 1819 Process.myPid(), Process.myUid()) 1820 == PackageManager.PERMISSION_DENIED) { 1821 log("getLocationMcc : NetworkStack does not hold ACCESS_FINE_LOCATION"); 1822 return null; 1823 } 1824 try { 1825 final List<CellInfo> cells = mTelephonyManager.getAllCellInfo(); 1826 if (cells == null) return null; 1827 final Map<String, Integer> countryCodeMap = new HashMap<>(); 1828 int maxCount = 0; 1829 for (final CellInfo cell : cells) { 1830 final String mcc = getMccFromCellInfo(cell); 1831 if (mcc != null) { 1832 final int count = countryCodeMap.getOrDefault(mcc, 0) + 1; 1833 countryCodeMap.put(mcc, count); 1834 } 1835 } 1836 // Return the MCC which occurs most. 1837 if (countryCodeMap.size() <= 0) return null; 1838 return Collections.max(countryCodeMap.entrySet(), 1839 (e1, e2) -> e1.getValue().compareTo(e2.getValue())).getKey(); 1840 } catch (SecurityException e) { 1841 log("Permission is not granted:" + e); 1842 return null; 1843 } 1844 } 1845 1846 /** 1847 * Return a matched MccMncOverrideInfo if carrier id and sim mccmnc are matching a record in 1848 * sCarrierIdToMccMnc. 1849 */ 1850 @VisibleForTesting 1851 @Nullable getMccMncOverrideInfo()1852 MccMncOverrideInfo getMccMncOverrideInfo() { 1853 final int carrierId = mTelephonyManager.getSimCarrierId(); 1854 return sCarrierIdToMccMnc.get(carrierId); 1855 } 1856 getContextByMccMnc(final int mcc, final int mnc)1857 private Context getContextByMccMnc(final int mcc, final int mnc) { 1858 final Configuration config = mContext.getResources().getConfiguration(); 1859 if (mcc != UNSET_MCC_OR_MNC) config.mcc = mcc; 1860 if (mnc != UNSET_MCC_OR_MNC) config.mnc = mnc; 1861 return mContext.createConfigurationContext(config); 1862 } 1863 1864 @VisibleForTesting getCustomizedContextOrDefault()1865 protected Context getCustomizedContextOrDefault() { 1866 // Return customized context if carrier id can match a record in sCarrierIdToMccMnc. 1867 final MccMncOverrideInfo overrideInfo = getMccMncOverrideInfo(); 1868 if (overrideInfo != null) { 1869 return getContextByMccMnc(overrideInfo.mcc, overrideInfo.mnc); 1870 } 1871 1872 // Use neighbor mcc feature only works when the config_no_sim_card_uses_neighbor_mcc is 1873 // true and there is no sim card inserted. 1874 final boolean useNeighborResource = 1875 getResBooleanConfig(mContext, R.bool.config_no_sim_card_uses_neighbor_mcc, false); 1876 if (!useNeighborResource 1877 || TelephonyManager.SIM_STATE_READY == mTelephonyManager.getSimState()) { 1878 return mContext; 1879 } 1880 1881 final String mcc = getLocationMcc(); 1882 if (TextUtils.isEmpty(mcc)) { 1883 return mContext; 1884 } 1885 1886 return getContextByMccMnc(Integer.parseInt(mcc), UNSET_MCC_OR_MNC); 1887 } 1888 1889 @Nullable getTestUrl(@onNull String key)1890 private String getTestUrl(@NonNull String key) { 1891 final String strExpiration = mDependencies.getDeviceConfigProperty(NAMESPACE_CONNECTIVITY, 1892 TEST_URL_EXPIRATION_TIME, null); 1893 if (strExpiration == null) return null; 1894 1895 final long expTime; 1896 try { 1897 expTime = Long.parseUnsignedLong(strExpiration); 1898 } catch (NumberFormatException e) { 1899 loge("Invalid test URL expiration time format", e); 1900 return null; 1901 } 1902 1903 final long now = System.currentTimeMillis(); 1904 if (expTime < now || (expTime - now) > TEST_URL_EXPIRATION_MS) return null; 1905 1906 return mDependencies.getDeviceConfigProperty(NAMESPACE_CONNECTIVITY, 1907 key, null /* defaultValue */); 1908 } 1909 getCaptivePortalServerHttpsUrl()1910 private String getCaptivePortalServerHttpsUrl() { 1911 final String testUrl = getTestUrl(TEST_CAPTIVE_PORTAL_HTTPS_URL); 1912 if (isValidTestUrl(testUrl)) return testUrl; 1913 final Context targetContext = getCustomizedContextOrDefault(); 1914 return getSettingFromResource(targetContext, 1915 R.string.config_captive_portal_https_url, CAPTIVE_PORTAL_HTTPS_URL, 1916 targetContext.getResources().getString(R.string.default_captive_portal_https_url)); 1917 } 1918 isValidTestUrl(@ullable String url)1919 private static boolean isValidTestUrl(@Nullable String url) { 1920 if (TextUtils.isEmpty(url)) return false; 1921 1922 try { 1923 // Only accept test URLs on localhost 1924 return Uri.parse(url).getHost().equals("localhost"); 1925 } catch (Throwable e) { 1926 Log.wtf(TAG, "Error parsing test URL", e); 1927 return false; 1928 } 1929 } 1930 getDnsProbeTimeout()1931 private int getDnsProbeTimeout() { 1932 return getIntSetting(mContext, R.integer.config_captive_portal_dns_probe_timeout, 1933 CONFIG_CAPTIVE_PORTAL_DNS_PROBE_TIMEOUT, DEFAULT_CAPTIVE_PORTAL_DNS_PROBE_TIMEOUT); 1934 } 1935 1936 /** 1937 * Gets an integer setting from resources or device config 1938 * 1939 * configResource is used if set, followed by device config if set, followed by defaultValue. 1940 * If none of these are set then an exception is thrown. 1941 * 1942 * TODO: move to a common location such as a ConfigUtils class. 1943 * TODO(b/130324939): test that the resources can be overlayed by an RRO package. 1944 */ 1945 @VisibleForTesting getIntSetting(@onNull final Context context, @StringRes int configResource, @NonNull String symbol, int defaultValue)1946 int getIntSetting(@NonNull final Context context, @StringRes int configResource, 1947 @NonNull String symbol, int defaultValue) { 1948 final Resources res = context.getResources(); 1949 try { 1950 return res.getInteger(configResource); 1951 } catch (Resources.NotFoundException e) { 1952 return mDependencies.getDeviceConfigPropertyInt(NAMESPACE_CONNECTIVITY, 1953 symbol, defaultValue); 1954 } 1955 } 1956 1957 @VisibleForTesting getResBooleanConfig(@onNull final Context context, @BoolRes int configResource, final boolean defaultValue)1958 boolean getResBooleanConfig(@NonNull final Context context, 1959 @BoolRes int configResource, final boolean defaultValue) { 1960 final Resources res = context.getResources(); 1961 try { 1962 return res.getBoolean(configResource); 1963 } catch (Resources.NotFoundException e) { 1964 return defaultValue; 1965 } 1966 } 1967 1968 /** 1969 * Gets integer config from resources. 1970 */ 1971 @VisibleForTesting getResIntConfig(@onNull final Context context, @IntegerRes final int configResource, final int defaultValue)1972 int getResIntConfig(@NonNull final Context context, 1973 @IntegerRes final int configResource, final int defaultValue) { 1974 final Resources res = context.getResources(); 1975 try { 1976 return res.getInteger(configResource); 1977 } catch (Resources.NotFoundException e) { 1978 return defaultValue; 1979 } 1980 } 1981 1982 /** 1983 * Gets string config from resources. 1984 */ 1985 @VisibleForTesting getResStringConfig(@onNull final Context context, @StringRes final int configResource, @Nullable final String defaultValue)1986 String getResStringConfig(@NonNull final Context context, 1987 @StringRes final int configResource, @Nullable final String defaultValue) { 1988 final Resources res = context.getResources(); 1989 try { 1990 return res.getString(configResource); 1991 } catch (Resources.NotFoundException e) { 1992 return defaultValue; 1993 } 1994 } 1995 1996 /** 1997 * Get the captive portal server HTTP URL that is configured on the device. 1998 * 1999 * NetworkMonitor does not use {@link ConnectivityManager#getCaptivePortalServerUrl()} as 2000 * it has its own updatable strategies to detect captive portals. The framework only advises 2001 * on one URL that can be used, while NetworkMonitor may implement more complex logic. 2002 */ getCaptivePortalServerHttpUrl()2003 public String getCaptivePortalServerHttpUrl() { 2004 final String testUrl = getTestUrl(TEST_CAPTIVE_PORTAL_HTTP_URL); 2005 if (isValidTestUrl(testUrl)) return testUrl; 2006 final Context targetContext = getCustomizedContextOrDefault(); 2007 return getSettingFromResource(targetContext, 2008 R.string.config_captive_portal_http_url, CAPTIVE_PORTAL_HTTP_URL, 2009 targetContext.getResources().getString(R.string.default_captive_portal_http_url)); 2010 } 2011 getConsecutiveDnsTimeoutThreshold()2012 private int getConsecutiveDnsTimeoutThreshold() { 2013 return mDependencies.getDeviceConfigPropertyInt(NAMESPACE_CONNECTIVITY, 2014 CONFIG_DATA_STALL_CONSECUTIVE_DNS_TIMEOUT_THRESHOLD, 2015 DEFAULT_CONSECUTIVE_DNS_TIMEOUT_THRESHOLD); 2016 } 2017 getDataStallMinEvaluateTime()2018 private int getDataStallMinEvaluateTime() { 2019 return mDependencies.getDeviceConfigPropertyInt(NAMESPACE_CONNECTIVITY, 2020 CONFIG_DATA_STALL_MIN_EVALUATE_INTERVAL, 2021 DEFAULT_DATA_STALL_MIN_EVALUATE_TIME_MS); 2022 } 2023 getDataStallValidDnsTimeThreshold()2024 private int getDataStallValidDnsTimeThreshold() { 2025 return mDependencies.getDeviceConfigPropertyInt(NAMESPACE_CONNECTIVITY, 2026 CONFIG_DATA_STALL_VALID_DNS_TIME_THRESHOLD, 2027 DEFAULT_DATA_STALL_VALID_DNS_TIME_THRESHOLD_MS); 2028 } 2029 2030 @VisibleForTesting getDataStallEvaluationType()2031 int getDataStallEvaluationType() { 2032 return mDependencies.getDeviceConfigPropertyInt(NAMESPACE_CONNECTIVITY, 2033 CONFIG_DATA_STALL_EVALUATION_TYPE, 2034 DEFAULT_DATA_STALL_EVALUATION_TYPES); 2035 } 2036 getTcpPollingInterval()2037 private int getTcpPollingInterval() { 2038 return mDependencies.getDeviceConfigPropertyInt(NAMESPACE_CONNECTIVITY, 2039 CONFIG_DATA_STALL_TCP_POLLING_INTERVAL, 2040 DEFAULT_TCP_POLLING_INTERVAL_MS); 2041 } 2042 2043 @VisibleForTesting makeCaptivePortalFallbackUrls()2044 URL[] makeCaptivePortalFallbackUrls() { 2045 try { 2046 final String firstUrl = mDependencies.getSetting(mContext, CAPTIVE_PORTAL_FALLBACK_URL, 2047 null); 2048 final URL[] settingProviderUrls = 2049 combineCaptivePortalUrls(firstUrl, CAPTIVE_PORTAL_OTHER_FALLBACK_URLS); 2050 return getProbeUrlArrayConfig(settingProviderUrls, 2051 R.array.config_captive_portal_fallback_urls, 2052 R.array.default_captive_portal_fallback_urls, 2053 this::makeURL); 2054 } catch (Exception e) { 2055 // Don't let a misconfiguration bootloop the system. 2056 Log.e(TAG, "Error parsing configured fallback URLs", e); 2057 return new URL[0]; 2058 } 2059 } 2060 makeCaptivePortalFallbackProbeSpecs()2061 private CaptivePortalProbeSpec[] makeCaptivePortalFallbackProbeSpecs() { 2062 try { 2063 final String settingsValue = mDependencies.getDeviceConfigProperty( 2064 NAMESPACE_CONNECTIVITY, CAPTIVE_PORTAL_FALLBACK_PROBE_SPECS, null); 2065 2066 final CaptivePortalProbeSpec[] emptySpecs = new CaptivePortalProbeSpec[0]; 2067 final CaptivePortalProbeSpec[] providerValue = TextUtils.isEmpty(settingsValue) 2068 ? emptySpecs 2069 : parseCaptivePortalProbeSpecs(settingsValue).toArray(emptySpecs); 2070 2071 return getProbeUrlArrayConfig(providerValue, 2072 R.array.config_captive_portal_fallback_probe_specs, 2073 DEFAULT_CAPTIVE_PORTAL_FALLBACK_PROBE_SPECS, 2074 CaptivePortalProbeSpec::parseSpecOrNull); 2075 } catch (Exception e) { 2076 // Don't let a misconfiguration bootloop the system. 2077 Log.e(TAG, "Error parsing configured fallback probe specs", e); 2078 return null; 2079 } 2080 } 2081 makeCaptivePortalHttpsUrls()2082 private URL[] makeCaptivePortalHttpsUrls() { 2083 final String firstUrl = getCaptivePortalServerHttpsUrl(); 2084 try { 2085 final URL[] settingProviderUrls = 2086 combineCaptivePortalUrls(firstUrl, CAPTIVE_PORTAL_OTHER_HTTPS_URLS); 2087 // firstUrl will at least be default configuration, so default value in 2088 // getProbeUrlArrayConfig is actually never used. 2089 return getProbeUrlArrayConfig(settingProviderUrls, 2090 R.array.config_captive_portal_https_urls, 2091 DEFAULT_CAPTIVE_PORTAL_HTTPS_URLS, this::makeURL); 2092 } catch (Exception e) { 2093 // Don't let a misconfiguration bootloop the system. 2094 Log.e(TAG, "Error parsing configured https URLs", e); 2095 // Ensure URL aligned with legacy configuration. 2096 return new URL[]{makeURL(firstUrl)}; 2097 } 2098 } 2099 makeCaptivePortalHttpUrls()2100 private URL[] makeCaptivePortalHttpUrls() { 2101 final String firstUrl = getCaptivePortalServerHttpUrl(); 2102 try { 2103 final URL[] settingProviderUrls = 2104 combineCaptivePortalUrls(firstUrl, CAPTIVE_PORTAL_OTHER_HTTP_URLS); 2105 // firstUrl will at least be default configuration, so default value in 2106 // getProbeUrlArrayConfig is actually never used. 2107 return getProbeUrlArrayConfig(settingProviderUrls, 2108 R.array.config_captive_portal_http_urls, 2109 DEFAULT_CAPTIVE_PORTAL_HTTP_URLS, this::makeURL); 2110 } catch (Exception e) { 2111 // Don't let a misconfiguration bootloop the system. 2112 Log.e(TAG, "Error parsing configured http URLs", e); 2113 // Ensure URL aligned with legacy configuration. 2114 return new URL[]{makeURL(firstUrl)}; 2115 } 2116 } 2117 combineCaptivePortalUrls(final String firstUrl, final String propertyName)2118 private URL[] combineCaptivePortalUrls(final String firstUrl, final String propertyName) { 2119 if (TextUtils.isEmpty(firstUrl)) return new URL[0]; 2120 2121 final String otherUrls = mDependencies.getDeviceConfigProperty( 2122 NAMESPACE_CONNECTIVITY, propertyName, ""); 2123 // otherUrls may be empty, but .split() ignores trailing empty strings 2124 final String separator = ","; 2125 final String[] urls = (firstUrl + separator + otherUrls).split(separator); 2126 return convertStrings(urls, this::makeURL, new URL[0]); 2127 } 2128 2129 /** 2130 * Read a setting from a resource or the settings provider. 2131 * 2132 * <p>The configuration resource is prioritized, then the provider value. 2133 * @param context The context 2134 * @param configResource The resource id for the configuration parameter 2135 * @param symbol The symbol in the settings provider 2136 * @param defaultValue The default value 2137 * @return The best available value 2138 */ 2139 @Nullable getSettingFromResource(@onNull final Context context, @StringRes int configResource, @NonNull String symbol, @NonNull String defaultValue)2140 private String getSettingFromResource(@NonNull final Context context, 2141 @StringRes int configResource, @NonNull String symbol, @NonNull String defaultValue) { 2142 final Resources res = context.getResources(); 2143 String setting = res.getString(configResource); 2144 2145 if (!TextUtils.isEmpty(setting)) return setting; 2146 2147 setting = mDependencies.getSetting(context, symbol, null); 2148 2149 if (!TextUtils.isEmpty(setting)) return setting; 2150 2151 return defaultValue; 2152 } 2153 2154 /** 2155 * Get an array configuration from resources or the settings provider. 2156 * 2157 * <p>The configuration resource is prioritized, then the provider values, then the default 2158 * resource values. 2159 * @param providerValue Values obtained from the setting provider. 2160 * @param configResId ID of the configuration resource. 2161 * @param defaultResId ID of the default resource. 2162 * @param resourceConverter Converter from the resource strings to stored setting class. Null 2163 * return values are ignored. 2164 */ getProbeUrlArrayConfig(@onNull T[] providerValue, @ArrayRes int configResId, @ArrayRes int defaultResId, @NonNull Function<String, T> resourceConverter)2165 private <T> T[] getProbeUrlArrayConfig(@NonNull T[] providerValue, @ArrayRes int configResId, 2166 @ArrayRes int defaultResId, @NonNull Function<String, T> resourceConverter) { 2167 final Resources res = getCustomizedContextOrDefault().getResources(); 2168 return getProbeUrlArrayConfig(providerValue, configResId, res.getStringArray(defaultResId), 2169 resourceConverter); 2170 } 2171 2172 /** 2173 * Get an array configuration from resources or the settings provider. 2174 * 2175 * <p>The configuration resource is prioritized, then the provider values, then the default 2176 * resource values. 2177 * @param providerValue Values obtained from the setting provider. 2178 * @param configResId ID of the configuration resource. 2179 * @param defaultConfig Values of default configuration. 2180 * @param resourceConverter Converter from the resource strings to stored setting class. Null 2181 * return values are ignored. 2182 */ getProbeUrlArrayConfig(@onNull T[] providerValue, @ArrayRes int configResId, String[] defaultConfig, @NonNull Function<String, T> resourceConverter)2183 private <T> T[] getProbeUrlArrayConfig(@NonNull T[] providerValue, @ArrayRes int configResId, 2184 String[] defaultConfig, @NonNull Function<String, T> resourceConverter) { 2185 final Resources res = getCustomizedContextOrDefault().getResources(); 2186 String[] configValue = res.getStringArray(configResId); 2187 2188 if (configValue.length == 0) { 2189 if (providerValue.length > 0) { 2190 return providerValue; 2191 } 2192 2193 configValue = defaultConfig; 2194 } 2195 2196 return convertStrings(configValue, resourceConverter, Arrays.copyOf(providerValue, 0)); 2197 } 2198 2199 /** 2200 * Convert a String array to an array of some other type using the specified converter. 2201 * 2202 * <p>Any null value, or value for which the converter throws a {@link RuntimeException}, will 2203 * not be added to the output array, so the output array may be smaller than the input. 2204 */ convertStrings( @onNull String[] strings, Function<String, T> converter, T[] emptyArray)2205 private <T> T[] convertStrings( 2206 @NonNull String[] strings, Function<String, T> converter, T[] emptyArray) { 2207 final ArrayList<T> convertedValues = new ArrayList<>(strings.length); 2208 for (String configString : strings) { 2209 T convertedValue = null; 2210 try { 2211 convertedValue = converter.apply(configString); 2212 } catch (Exception e) { 2213 Log.e(TAG, "Error parsing configuration", e); 2214 // Fall through 2215 } 2216 if (convertedValue != null) { 2217 convertedValues.add(convertedValue); 2218 } 2219 } 2220 return convertedValues.toArray(emptyArray); 2221 } 2222 getCaptivePortalUserAgent()2223 private String getCaptivePortalUserAgent() { 2224 return mDependencies.getDeviceConfigProperty(NAMESPACE_CONNECTIVITY, 2225 CAPTIVE_PORTAL_USER_AGENT, DEFAULT_USER_AGENT); 2226 } 2227 nextFallbackUrl()2228 private URL nextFallbackUrl() { 2229 if (mCaptivePortalFallbackUrls.length == 0) { 2230 return null; 2231 } 2232 int idx = Math.abs(mNextFallbackUrlIndex) % mCaptivePortalFallbackUrls.length; 2233 mNextFallbackUrlIndex += mRandom.nextInt(); // randomly change url without memory. 2234 return mCaptivePortalFallbackUrls[idx]; 2235 } 2236 nextFallbackSpec()2237 private CaptivePortalProbeSpec nextFallbackSpec() { 2238 if (isEmpty(mCaptivePortalFallbackSpecs)) { 2239 return null; 2240 } 2241 // Randomly change spec without memory. Also randomize the first attempt. 2242 final int idx = Math.abs(mRandom.nextInt()) % mCaptivePortalFallbackSpecs.length; 2243 return mCaptivePortalFallbackSpecs[idx]; 2244 } 2245 2246 /** 2247 * Parameters that can be accessed by the evaluation thread in a thread-safe way. 2248 * 2249 * Parameters such as LinkProperties and NetworkCapabilities cannot be accessed by the 2250 * evaluation thread directly, as they are managed in the state machine thread and not 2251 * synchronized. This class provides a copy of the required data that is not modified and can be 2252 * used safely by the evaluation thread. 2253 */ 2254 private static class EvaluationThreadDeps { 2255 // TODO: add parameters that are accessed in a non-thread-safe way from the evaluation 2256 // thread (read from LinkProperties, NetworkCapabilities, useHttps, validationStage) 2257 private final boolean mIsTestNetwork; 2258 EvaluationThreadDeps(NetworkCapabilities nc)2259 EvaluationThreadDeps(NetworkCapabilities nc) { 2260 this.mIsTestNetwork = nc.hasTransport(TRANSPORT_TEST); 2261 } 2262 } 2263 isCaptivePortal(EvaluationThreadDeps deps)2264 private CaptivePortalProbeResult isCaptivePortal(EvaluationThreadDeps deps) { 2265 if (!mIsCaptivePortalCheckEnabled) { 2266 validationLog("Validation disabled."); 2267 return CaptivePortalProbeResult.success(CaptivePortalProbeResult.PROBE_UNKNOWN); 2268 } 2269 2270 URL pacUrl = null; 2271 final URL[] httpsUrls = mCaptivePortalHttpsUrls; 2272 final URL[] httpUrls = mCaptivePortalHttpUrls; 2273 2274 // On networks with a PAC instead of fetching a URL that should result in a 204 2275 // response, we instead simply fetch the PAC script. This is done for a few reasons: 2276 // 1. At present our PAC code does not yet handle multiple PACs on multiple networks 2277 // until something like https://android-review.googlesource.com/#/c/115180/ lands. 2278 // Network.openConnection() will ignore network-specific PACs and instead fetch 2279 // using NO_PROXY. If a PAC is in place, the only fetch we know will succeed with 2280 // NO_PROXY is the fetch of the PAC itself. 2281 // 2. To proxy the generate_204 fetch through a PAC would require a number of things 2282 // happen before the fetch can commence, namely: 2283 // a) the PAC script be fetched 2284 // b) a PAC script resolver service be fired up and resolve the captive portal 2285 // server. 2286 // Network validation could be delayed until these prerequisities are satisifed or 2287 // could simply be left to race them. Neither is an optimal solution. 2288 // 3. PAC scripts are sometimes used to block or restrict Internet access and may in 2289 // fact block fetching of the generate_204 URL which would lead to false negative 2290 // results for network validation. 2291 final ProxyInfo proxyInfo = mLinkProperties.getHttpProxy(); 2292 if (proxyInfo != null && !Uri.EMPTY.equals(proxyInfo.getPacFileUrl())) { 2293 pacUrl = makeURL(proxyInfo.getPacFileUrl().toString()); 2294 if (pacUrl == null) { 2295 return CaptivePortalProbeResult.failed(CaptivePortalProbeResult.PROBE_UNKNOWN); 2296 } 2297 } 2298 2299 if ((pacUrl == null) && (httpUrls.length == 0 || httpsUrls.length == 0 2300 || httpUrls[0] == null || httpsUrls[0] == null)) { 2301 return CaptivePortalProbeResult.failed(CaptivePortalProbeResult.PROBE_UNKNOWN); 2302 } 2303 2304 long startTime = SystemClock.elapsedRealtime(); 2305 2306 final CaptivePortalProbeResult result; 2307 if (pacUrl != null) { 2308 result = sendDnsAndHttpProbes(null, pacUrl, ValidationProbeEvent.PROBE_PAC); 2309 reportHttpProbeResult(NETWORK_VALIDATION_PROBE_HTTP, result); 2310 } else if (mUseHttps && httpsUrls.length == 1 && httpUrls.length == 1) { 2311 // Probe results are reported inside sendHttpAndHttpsParallelWithFallbackProbes. 2312 result = sendHttpAndHttpsParallelWithFallbackProbes(deps, proxyInfo, 2313 httpsUrls[0], httpUrls[0]); 2314 } else if (mUseHttps) { 2315 // Support result aggregation from multiple Urls. 2316 result = sendMultiParallelHttpAndHttpsProbes(deps, proxyInfo, httpsUrls, httpUrls); 2317 } else { 2318 result = sendDnsAndHttpProbes(proxyInfo, httpUrls[0], ValidationProbeEvent.PROBE_HTTP); 2319 reportHttpProbeResult(NETWORK_VALIDATION_PROBE_HTTP, result); 2320 } 2321 2322 long endTime = SystemClock.elapsedRealtime(); 2323 2324 log("isCaptivePortal: isSuccessful()=" + result.isSuccessful() 2325 + " isPortal()=" + result.isPortal() 2326 + " RedirectUrl=" + result.redirectUrl 2327 + " isPartialConnectivity()=" + result.isPartialConnectivity() 2328 + " Time=" + (endTime - startTime) + "ms"); 2329 2330 return result; 2331 } 2332 2333 /** 2334 * Do a DNS resolution and URL fetch on a known web server to see if we get the data we expect. 2335 * @return a CaptivePortalProbeResult inferred from the HTTP response. 2336 */ sendDnsAndHttpProbes(ProxyInfo proxy, URL url, int probeType)2337 private CaptivePortalProbeResult sendDnsAndHttpProbes(ProxyInfo proxy, URL url, int probeType) { 2338 // Pre-resolve the captive portal server host so we can log it. 2339 // Only do this if HttpURLConnection is about to, to avoid any potentially 2340 // unnecessary resolution. 2341 final String host = (proxy != null) ? proxy.getHost() : url.getHost(); 2342 // This method cannot safely report probe results because it might not be running on the 2343 // state machine thread. Reporting results here would cause races and potentially send 2344 // information to callers that does not make sense because the state machine has already 2345 // changed state. 2346 final InetAddress[] resolvedAddr = sendDnsProbe(host); 2347 // The private IP logic only applies to captive portal detection (the HTTP probe), not 2348 // network validation (the HTTPS probe, which would likely fail anyway) or the PAC probe. 2349 if (mPrivateIpNoInternetEnabled && probeType == ValidationProbeEvent.PROBE_HTTP 2350 && (proxy == null) && hasPrivateIpAddress(resolvedAddr)) { 2351 recordProbeEventMetrics(NetworkValidationMetrics.probeTypeToEnum(probeType), 2352 0 /* latency */, ProbeResult.PR_PRIVATE_IP_DNS, null /* capportData */); 2353 return CaptivePortalProbeResult.PRIVATE_IP; 2354 } 2355 return sendHttpProbe(url, probeType, null); 2356 } 2357 2358 /** Do a DNS lookup for the given server, or throw UnknownHostException after timeoutMs */ 2359 @VisibleForTesting sendDnsProbeWithTimeout(String host, int timeoutMs)2360 protected InetAddress[] sendDnsProbeWithTimeout(String host, int timeoutMs) 2361 throws UnknownHostException { 2362 return DnsUtils.getAllByName(mDependencies.getDnsResolver(), mCleartextDnsNetwork, host, 2363 TYPE_ADDRCONFIG, FLAG_EMPTY, timeoutMs, 2364 str -> validationLog(ValidationProbeEvent.PROBE_DNS, host, str)); 2365 } 2366 2367 /** Do a DNS resolution of the given server. */ sendDnsProbe(String host)2368 private InetAddress[] sendDnsProbe(String host) { 2369 if (TextUtils.isEmpty(host)) { 2370 return null; 2371 } 2372 2373 final Stopwatch watch = new Stopwatch().start(); 2374 int result; 2375 InetAddress[] addresses; 2376 try { 2377 addresses = sendDnsProbeWithTimeout(host, getDnsProbeTimeout()); 2378 result = ValidationProbeEvent.DNS_SUCCESS; 2379 } catch (UnknownHostException e) { 2380 addresses = null; 2381 result = ValidationProbeEvent.DNS_FAILURE; 2382 } 2383 final long latency = watch.stop(); 2384 recordProbeEventMetrics(ProbeType.PT_DNS, latency, 2385 (result == ValidationProbeEvent.DNS_SUCCESS) ? ProbeResult.PR_SUCCESS : 2386 ProbeResult.PR_FAILURE, null /* capportData */); 2387 logValidationProbe(latency, ValidationProbeEvent.PROBE_DNS, result); 2388 return addresses; 2389 } 2390 2391 /** 2392 * Check if any of the provided IP addresses include a private IP. 2393 * @return true if an IP address is private. 2394 */ hasPrivateIpAddress(@ullable InetAddress[] addresses)2395 private static boolean hasPrivateIpAddress(@Nullable InetAddress[] addresses) { 2396 if (addresses == null) { 2397 return false; 2398 } 2399 for (InetAddress address : addresses) { 2400 if (address.isLinkLocalAddress() || address.isSiteLocalAddress() 2401 || isIPv6ULA(address)) { 2402 return true; 2403 } 2404 } 2405 return false; 2406 } 2407 2408 /** 2409 * Do a URL fetch on a known web server to see if we get the data we expect. 2410 * @return a CaptivePortalProbeResult inferred from the HTTP response. 2411 */ 2412 @VisibleForTesting sendHttpProbe(URL url, int probeType, @Nullable CaptivePortalProbeSpec probeSpec)2413 protected CaptivePortalProbeResult sendHttpProbe(URL url, int probeType, 2414 @Nullable CaptivePortalProbeSpec probeSpec) { 2415 HttpURLConnection urlConnection = null; 2416 int httpResponseCode = CaptivePortalProbeResult.FAILED_CODE; 2417 String redirectUrl = null; 2418 final Stopwatch probeTimer = new Stopwatch().start(); 2419 final int oldTag = TrafficStats.getAndSetThreadStatsTag( 2420 TrafficStatsConstants.TAG_SYSTEM_PROBE); 2421 try { 2422 // Follow redirects for PAC probes as such probes verify connectivity by fetching the 2423 // PAC proxy file, which may be configured behind a redirect. 2424 final boolean followRedirect = probeType == ValidationProbeEvent.PROBE_PAC; 2425 urlConnection = makeProbeConnection(url, followRedirect); 2426 // cannot read request header after connection 2427 String requestHeader = urlConnection.getRequestProperties().toString(); 2428 2429 // Time how long it takes to get a response to our request 2430 long requestTimestamp = SystemClock.elapsedRealtime(); 2431 2432 httpResponseCode = urlConnection.getResponseCode(); 2433 redirectUrl = urlConnection.getHeaderField("location"); 2434 2435 // Time how long it takes to get a response to our request 2436 long responseTimestamp = SystemClock.elapsedRealtime(); 2437 2438 validationLog(probeType, url, "time=" + (responseTimestamp - requestTimestamp) + "ms" 2439 + " ret=" + httpResponseCode 2440 + " request=" + requestHeader 2441 + " headers=" + urlConnection.getHeaderFields()); 2442 // NOTE: We may want to consider an "HTTP/1.0 204" response to be a captive 2443 // portal. The only example of this seen so far was a captive portal. For 2444 // the time being go with prior behavior of assuming it's not a captive 2445 // portal. If it is considered a captive portal, a different sign-in URL 2446 // is needed (i.e. can't browse a 204). This could be the result of an HTTP 2447 // proxy server. 2448 if (httpResponseCode == 200) { 2449 long contentLength = urlConnection.getContentLengthLong(); 2450 if (probeType == ValidationProbeEvent.PROBE_PAC) { 2451 validationLog( 2452 probeType, url, "PAC fetch 200 response interpreted as 204 response."); 2453 httpResponseCode = CaptivePortalProbeResult.SUCCESS_CODE; 2454 } else if (contentLength == -1) { 2455 // When no Content-length (default value == -1), attempt to read a byte 2456 // from the response. Do not use available() as it is unreliable. 2457 // See http://b/33498325. 2458 if (urlConnection.getInputStream().read() == -1) { 2459 validationLog(probeType, url, 2460 "Empty 200 response interpreted as failed response."); 2461 httpResponseCode = CaptivePortalProbeResult.FAILED_CODE; 2462 } 2463 } else if (matchesHttpContentLength(contentLength)) { 2464 final InputStream is = new BufferedInputStream(urlConnection.getInputStream()); 2465 final String content = readAsString(is, (int) contentLength, 2466 extractCharset(urlConnection.getContentType())); 2467 if (matchesHttpContent(content, 2468 R.string.config_network_validation_failed_content_regexp)) { 2469 httpResponseCode = CaptivePortalProbeResult.FAILED_CODE; 2470 } else if (matchesHttpContent(content, 2471 R.string.config_network_validation_success_content_regexp)) { 2472 httpResponseCode = CaptivePortalProbeResult.SUCCESS_CODE; 2473 } 2474 2475 if (httpResponseCode != 200) { 2476 validationLog(probeType, url, "200 response with Content-length =" 2477 + contentLength + ", content matches custom regexp, interpreted" 2478 + " as " + httpResponseCode 2479 + " response."); 2480 } 2481 } else if (contentLength <= 4) { 2482 // Consider 200 response with "Content-length <= 4" to not be a captive 2483 // portal. There's no point in considering this a captive portal as the 2484 // user cannot sign-in to an empty page. Probably the result of a broken 2485 // transparent proxy. See http://b/9972012 and http://b/122999481. 2486 validationLog(probeType, url, "200 response with Content-length <= 4" 2487 + " interpreted as failed response."); 2488 httpResponseCode = CaptivePortalProbeResult.FAILED_CODE; 2489 } 2490 } 2491 } catch (IOException e) { 2492 validationLog(probeType, url, "Probe failed with exception " + e); 2493 if (httpResponseCode == CaptivePortalProbeResult.FAILED_CODE) { 2494 // TODO: Ping gateway and DNS server and log results. 2495 } 2496 } finally { 2497 if (urlConnection != null) { 2498 urlConnection.disconnect(); 2499 } 2500 TrafficStats.setThreadStatsTag(oldTag); 2501 } 2502 logValidationProbe(probeTimer.stop(), probeType, httpResponseCode); 2503 2504 final CaptivePortalProbeResult probeResult; 2505 if (probeSpec == null) { 2506 probeResult = new CaptivePortalProbeResult(httpResponseCode, redirectUrl, 2507 url.toString(), 1 << probeType); 2508 } else { 2509 probeResult = probeSpec.getResult(httpResponseCode, redirectUrl); 2510 } 2511 recordProbeEventMetrics(NetworkValidationMetrics.probeTypeToEnum(probeType), 2512 probeTimer.stop(), NetworkValidationMetrics.httpProbeResultToEnum(probeResult), 2513 null /* capportData */); 2514 return probeResult; 2515 } 2516 2517 @VisibleForTesting matchesHttpContent(final String content, @StringRes final int configResource)2518 boolean matchesHttpContent(final String content, @StringRes final int configResource) { 2519 final String resString = getResStringConfig(mContext, configResource, ""); 2520 try { 2521 return content.matches(resString); 2522 } catch (PatternSyntaxException e) { 2523 Log.e(TAG, "Pattern syntax exception occurs when matching the resource=" + resString, 2524 e); 2525 return false; 2526 } 2527 } 2528 2529 @VisibleForTesting matchesHttpContentLength(final long contentLength)2530 boolean matchesHttpContentLength(final long contentLength) { 2531 // Consider that the Resources#getInteger() is returning an integer, so if the contentLength 2532 // is lower or equal to 0 or higher than Integer.MAX_VALUE, then it's an invalid value. 2533 if (contentLength <= 0) return false; 2534 if (contentLength > Integer.MAX_VALUE) { 2535 logw("matchesHttpContentLength : Get invalid contentLength = " + contentLength); 2536 return false; 2537 } 2538 return (contentLength > getResIntConfig(mContext, 2539 R.integer.config_min_matches_http_content_length, Integer.MAX_VALUE) 2540 && 2541 contentLength < getResIntConfig(mContext, 2542 R.integer.config_max_matches_http_content_length, 0)); 2543 } 2544 makeProbeConnection(URL url, boolean followRedirects)2545 private HttpURLConnection makeProbeConnection(URL url, boolean followRedirects) 2546 throws IOException { 2547 final HttpURLConnection conn = (HttpURLConnection) mCleartextDnsNetwork.openConnection(url); 2548 conn.setInstanceFollowRedirects(followRedirects); 2549 conn.setConnectTimeout(SOCKET_TIMEOUT_MS); 2550 conn.setReadTimeout(SOCKET_TIMEOUT_MS); 2551 conn.setRequestProperty("Connection", "close"); 2552 conn.setUseCaches(false); 2553 if (mCaptivePortalUserAgent != null) { 2554 conn.setRequestProperty("User-Agent", mCaptivePortalUserAgent); 2555 } 2556 return conn; 2557 } 2558 2559 @VisibleForTesting 2560 @NonNull readAsString(InputStream is, int maxLength, Charset charset)2561 protected static String readAsString(InputStream is, int maxLength, Charset charset) 2562 throws IOException { 2563 final InputStreamReader reader = new InputStreamReader(is, charset); 2564 final char[] buffer = new char[1000]; 2565 final StringBuilder builder = new StringBuilder(); 2566 int totalReadLength = 0; 2567 while (totalReadLength < maxLength) { 2568 final int availableLength = Math.min(maxLength - totalReadLength, buffer.length); 2569 final int currentLength = reader.read(buffer, 0, availableLength); 2570 if (currentLength < 0) break; // EOF 2571 2572 totalReadLength += currentLength; 2573 builder.append(buffer, 0, currentLength); 2574 } 2575 return builder.toString(); 2576 } 2577 2578 /** 2579 * Attempt to extract the {@link Charset} of the response from its Content-Type header. 2580 * 2581 * <p>If the {@link Charset} cannot be extracted, UTF-8 is returned by default. 2582 */ 2583 @VisibleForTesting 2584 @NonNull extractCharset(@ullable String contentTypeHeader)2585 protected static Charset extractCharset(@Nullable String contentTypeHeader) { 2586 if (contentTypeHeader == null) return StandardCharsets.UTF_8; 2587 // See format in https://tools.ietf.org/html/rfc7231#section-3.1.1.1 2588 final Pattern charsetPattern = Pattern.compile("; *charset=\"?([^ ;\"]+)\"?", 2589 Pattern.CASE_INSENSITIVE); 2590 final Matcher matcher = charsetPattern.matcher(contentTypeHeader); 2591 if (!matcher.find()) return StandardCharsets.UTF_8; 2592 2593 try { 2594 return Charset.forName(matcher.group(1)); 2595 } catch (IllegalArgumentException e) { 2596 return StandardCharsets.UTF_8; 2597 } 2598 } 2599 2600 private class ProbeThread extends Thread { 2601 private final CountDownLatch mLatch; 2602 private final Probe mProbe; 2603 ProbeThread(CountDownLatch latch, EvaluationThreadDeps deps, ProxyInfo proxy, URL url, int probeType, Uri captivePortalApiUrl)2604 ProbeThread(CountDownLatch latch, EvaluationThreadDeps deps, ProxyInfo proxy, URL url, 2605 int probeType, Uri captivePortalApiUrl) { 2606 mLatch = latch; 2607 mProbe = (probeType == ValidationProbeEvent.PROBE_HTTPS) 2608 ? new HttpsProbe(deps, proxy, url, captivePortalApiUrl) 2609 : new HttpProbe(deps, proxy, url, captivePortalApiUrl); 2610 mResult = CaptivePortalProbeResult.failed(probeType); 2611 } 2612 2613 private volatile CaptivePortalProbeResult mResult; 2614 result()2615 public CaptivePortalProbeResult result() { 2616 return mResult; 2617 } 2618 2619 @Override run()2620 public void run() { 2621 mResult = mProbe.sendProbe(); 2622 if (isConclusiveResult(mResult, mProbe.mCaptivePortalApiUrl)) { 2623 // Stop waiting immediately if any probe is conclusive. 2624 while (mLatch.getCount() > 0) { 2625 mLatch.countDown(); 2626 } 2627 } 2628 // Signal this probe has completed. 2629 mLatch.countDown(); 2630 } 2631 } 2632 2633 private abstract static class Probe { 2634 protected final EvaluationThreadDeps mDeps; 2635 protected final ProxyInfo mProxy; 2636 protected final URL mUrl; 2637 protected final Uri mCaptivePortalApiUrl; 2638 Probe(EvaluationThreadDeps deps, ProxyInfo proxy, URL url, Uri captivePortalApiUrl)2639 protected Probe(EvaluationThreadDeps deps, ProxyInfo proxy, URL url, 2640 Uri captivePortalApiUrl) { 2641 mDeps = deps; 2642 mProxy = proxy; 2643 mUrl = url; 2644 mCaptivePortalApiUrl = captivePortalApiUrl; 2645 } 2646 // sendProbe() is synchronous and blocks until it has the result. sendProbe()2647 protected abstract CaptivePortalProbeResult sendProbe(); 2648 } 2649 2650 final class HttpsProbe extends Probe { HttpsProbe(EvaluationThreadDeps deps, ProxyInfo proxy, URL url, Uri captivePortalApiUrl)2651 HttpsProbe(EvaluationThreadDeps deps, ProxyInfo proxy, URL url, Uri captivePortalApiUrl) { 2652 super(deps, proxy, url, captivePortalApiUrl); 2653 } 2654 2655 @Override sendProbe()2656 protected CaptivePortalProbeResult sendProbe() { 2657 return sendDnsAndHttpProbes(mProxy, mUrl, ValidationProbeEvent.PROBE_HTTPS); 2658 } 2659 } 2660 2661 final class HttpProbe extends Probe { HttpProbe(EvaluationThreadDeps deps, ProxyInfo proxy, URL url, Uri captivePortalApiUrl)2662 HttpProbe(EvaluationThreadDeps deps, ProxyInfo proxy, URL url, Uri captivePortalApiUrl) { 2663 super(deps, proxy, url, captivePortalApiUrl); 2664 } 2665 sendCapportApiProbe()2666 private CaptivePortalDataShim sendCapportApiProbe() { 2667 // TODO: consider adding metrics counters for each case returning null in this method 2668 // (cases where the API is not implemented properly). 2669 validationLog("Fetching captive portal data from " + mCaptivePortalApiUrl); 2670 2671 final String apiContent; 2672 try { 2673 final URL url = new URL(mCaptivePortalApiUrl.toString()); 2674 // Protocol must be HTTPS 2675 // (as per https://www.ietf.org/id/draft-ietf-capport-api-07.txt, #4). 2676 // Only allow HTTP on localhost, for testing. 2677 final boolean isTestLocalhostHttp = mDeps.mIsTestNetwork 2678 && "localhost".equals(url.getHost()) && "http".equals(url.getProtocol()); 2679 if (!"https".equals(url.getProtocol()) && !isTestLocalhostHttp) { 2680 validationLog("Invalid captive portal API protocol: " + url.getProtocol()); 2681 return null; 2682 } 2683 2684 final HttpURLConnection conn = makeProbeConnection( 2685 url, true /* followRedirects */); 2686 conn.setRequestProperty(ACCEPT_HEADER, CAPPORT_API_CONTENT_TYPE); 2687 final int responseCode = conn.getResponseCode(); 2688 if (responseCode != 200) { 2689 validationLog("Non-200 API response code: " + conn.getResponseCode()); 2690 return null; 2691 } 2692 final Charset charset = extractCharset(conn.getHeaderField(CONTENT_TYPE_HEADER)); 2693 if (charset != StandardCharsets.UTF_8) { 2694 validationLog("Invalid charset for capport API: " + charset); 2695 return null; 2696 } 2697 2698 apiContent = readAsString(conn.getInputStream(), 2699 CAPPORT_API_MAX_JSON_LENGTH, charset); 2700 } catch (IOException e) { 2701 validationLog("I/O error reading capport data: " + e.getMessage()); 2702 return null; 2703 } 2704 2705 try { 2706 final JSONObject info = new JSONObject(apiContent); 2707 final CaptivePortalDataShim capportData = CaptivePortalDataShimImpl.fromJson(info); 2708 if (capportData != null && capportData.isCaptive() 2709 && capportData.getUserPortalUrl() == null) { 2710 validationLog("Missing user-portal-url from capport response"); 2711 return null; 2712 } 2713 return capportData; 2714 } catch (JSONException e) { 2715 validationLog("Could not parse capport API JSON: " + e.getMessage()); 2716 return null; 2717 } catch (UnsupportedApiLevelException e) { 2718 // This should never happen because LinkProperties would not have a capport URL 2719 // before R. 2720 validationLog("Platform API too low to support capport API"); 2721 return null; 2722 } 2723 } 2724 tryCapportApiProbe()2725 private CaptivePortalDataShim tryCapportApiProbe() { 2726 if (mCaptivePortalApiUrl == null) return null; 2727 final Stopwatch capportApiWatch = new Stopwatch().start(); 2728 final CaptivePortalDataShim capportData = sendCapportApiProbe(); 2729 recordProbeEventMetrics(ProbeType.PT_CAPPORT_API, capportApiWatch.stop(), 2730 capportData == null ? ProbeResult.PR_FAILURE : ProbeResult.PR_SUCCESS, 2731 capportData); 2732 return capportData; 2733 } 2734 2735 @Override sendProbe()2736 protected CaptivePortalProbeResult sendProbe() { 2737 final CaptivePortalDataShim capportData = tryCapportApiProbe(); 2738 if (capportData != null && capportData.isCaptive()) { 2739 final String loginUrlString = capportData.getUserPortalUrl().toString(); 2740 // Starting from R (where CaptivePortalData was introduced), the captive portal app 2741 // delegates to NetworkMonitor for verifying when the network validates instead of 2742 // probing the detectUrl. So pass the detectUrl to have the portal open on that, 2743 // page; CaptivePortalLogin will not use it for probing. 2744 return new CapportApiProbeResult( 2745 CaptivePortalProbeResult.PORTAL_CODE, 2746 loginUrlString /* redirectUrl */, 2747 loginUrlString /* detectUrl */, 2748 capportData, 2749 1 << ValidationProbeEvent.PROBE_HTTP); 2750 } 2751 2752 // If the API says it's not captive, still check for HTTP connectivity. This helps 2753 // with partial connectivity detection, and a broken API saying that there is no 2754 // redirect when there is one. 2755 final CaptivePortalProbeResult res = 2756 sendDnsAndHttpProbes(mProxy, mUrl, ValidationProbeEvent.PROBE_HTTP); 2757 return mCaptivePortalApiUrl == null ? res : new CapportApiProbeResult(res, capportData); 2758 } 2759 } 2760 isConclusiveResult(@onNull CaptivePortalProbeResult result, @Nullable Uri captivePortalApiUrl)2761 private static boolean isConclusiveResult(@NonNull CaptivePortalProbeResult result, 2762 @Nullable Uri captivePortalApiUrl) { 2763 // isPortal() is not expected on the HTTPS probe, but treat the network as portal would make 2764 // sense if the probe reports portal. In case the capport API is available, the API is 2765 // authoritative on whether there is a portal, so the HTTPS probe is not enough to conclude 2766 // there is connectivity, and a determination will be made once the capport API probe 2767 // returns. Note that the API can only force the system to detect a portal even if the HTTPS 2768 // probe succeeds. It cannot force the system to detect no portal if the HTTPS probe fails. 2769 return result.isPortal() 2770 || (result.isConcludedFromHttps() && result.isSuccessful() 2771 && captivePortalApiUrl == null); 2772 } 2773 sendMultiParallelHttpAndHttpsProbes( @onNull EvaluationThreadDeps deps, @Nullable ProxyInfo proxy, @NonNull URL[] httpsUrls, @NonNull URL[] httpUrls)2774 private CaptivePortalProbeResult sendMultiParallelHttpAndHttpsProbes( 2775 @NonNull EvaluationThreadDeps deps, @Nullable ProxyInfo proxy, @NonNull URL[] httpsUrls, 2776 @NonNull URL[] httpUrls) { 2777 // If multiple URLs are required to ensure the correctness of validation, send parallel 2778 // probes to explore the result in separate probe threads and aggregate those results into 2779 // one as the final result for either HTTP or HTTPS. 2780 2781 // Number of probes to wait for. 2782 final int num = httpsUrls.length + httpUrls.length; 2783 // Fixed pool to prevent configuring too many urls to exhaust system resource. 2784 final ExecutorService executor = Executors.newFixedThreadPool( 2785 Math.min(num, MAX_PROBE_THREAD_POOL_SIZE)); 2786 final CompletionService<CaptivePortalProbeResult> ecs = 2787 new ExecutorCompletionService<CaptivePortalProbeResult>(executor); 2788 final Uri capportApiUrl = getCaptivePortalApiUrl(mLinkProperties); 2789 final List<Future<CaptivePortalProbeResult>> futures = new ArrayList<>(); 2790 2791 try { 2792 // Queue https and http probe. 2793 2794 // Each of these HTTP probes will start with probing capport API if present. So if 2795 // multiple HTTP URLs are configured, AP will send multiple identical accesses to the 2796 // capport URL. Thus, send capport API probing with one of the HTTP probe is enough. 2797 // Probe capport API with the first HTTP probe. 2798 // TODO: Have the capport probe as a different probe for cleanliness. 2799 final URL urlMaybeWithCapport = httpUrls[0]; 2800 for (final URL url : httpUrls) { 2801 futures.add(ecs.submit(() -> new HttpProbe(deps, proxy, url, 2802 url.equals(urlMaybeWithCapport) ? capportApiUrl : null).sendProbe())); 2803 } 2804 2805 for (final URL url : httpsUrls) { 2806 futures.add(ecs.submit(() -> new HttpsProbe(deps, proxy, url, capportApiUrl) 2807 .sendProbe())); 2808 } 2809 2810 final ArrayList<CaptivePortalProbeResult> completedProbes = new ArrayList<>(); 2811 for (int i = 0; i < num; i++) { 2812 completedProbes.add(ecs.take().get()); 2813 final CaptivePortalProbeResult res = evaluateCapportResult( 2814 completedProbes, httpsUrls.length, capportApiUrl != null /* hasCapport */); 2815 if (res != null) { 2816 reportProbeResult(res); 2817 return res; 2818 } 2819 } 2820 } catch (ExecutionException e) { 2821 Log.e(TAG, "Error sending probes.", e); 2822 } catch (InterruptedException e) { 2823 // Ignore interrupted probe result because result is not important to conclude the 2824 // result. 2825 } finally { 2826 // Interrupt ongoing probes since we have already gotten result from one of them. 2827 futures.forEach(future -> future.cancel(true)); 2828 executor.shutdownNow(); 2829 } 2830 2831 return CaptivePortalProbeResult.failed(ValidationProbeEvent.PROBE_HTTPS); 2832 } 2833 2834 @Nullable evaluateCapportResult( List<CaptivePortalProbeResult> probes, int numHttps, boolean hasCapport)2835 private CaptivePortalProbeResult evaluateCapportResult( 2836 List<CaptivePortalProbeResult> probes, int numHttps, boolean hasCapport) { 2837 CaptivePortalProbeResult capportResult = null; 2838 CaptivePortalProbeResult httpPortalResult = null; 2839 int httpSuccesses = 0; 2840 int httpsSuccesses = 0; 2841 int httpsFailures = 0; 2842 2843 for (CaptivePortalProbeResult probe : probes) { 2844 if (probe instanceof CapportApiProbeResult) { 2845 capportResult = probe; 2846 } else if (probe.isConcludedFromHttps()) { 2847 if (probe.isSuccessful()) httpsSuccesses++; 2848 else httpsFailures++; 2849 } else { // http probes 2850 if (probe.isPortal()) { 2851 // Unlike https probe, http probe may have redirect url information kept in the 2852 // probe result. Thus, the result can not be newly created with response code 2853 // only. If the captive portal behavior will be varied because of different 2854 // probe URLs, this means that if the portal returns different redirect URLs for 2855 // different probes and has a different behavior depending on the URL, then the 2856 // behavior of the login page may differ depending on the order in which the 2857 // probes terminate. However, NetworkMonitor does have to choose one of the 2858 // redirect URLs and right now there is no clue at all which of the probe has 2859 // the better redirect URL, so there is no telling which is best to use. 2860 // Therefore the current code just uses whichever happens to be the last one to 2861 // complete. 2862 httpPortalResult = probe; 2863 } else if (probe.isSuccessful()) { 2864 httpSuccesses++; 2865 } 2866 } 2867 } 2868 // If there is Capport url configured but the result is not available yet, wait for it. 2869 if (hasCapport && capportResult == null) return null; 2870 // Capport API saying it's a portal is authoritative. 2871 if (capportResult != null && capportResult.isPortal()) return capportResult; 2872 // Any HTTP probes saying probe portal is conclusive. 2873 if (httpPortalResult != null) return httpPortalResult; 2874 // Any HTTPS probes works then the network validates. 2875 if (httpsSuccesses > 0) { 2876 return CaptivePortalProbeResult.success(1 << ValidationProbeEvent.PROBE_HTTPS); 2877 } 2878 // All HTTPS failed and at least one HTTP succeeded, then it's partial. 2879 if (httpsFailures == numHttps && httpSuccesses > 0) { 2880 return CaptivePortalProbeResult.PARTIAL; 2881 } 2882 // Otherwise, the result is unknown yet. 2883 return null; 2884 } 2885 reportProbeResult(@onNull CaptivePortalProbeResult res)2886 private void reportProbeResult(@NonNull CaptivePortalProbeResult res) { 2887 if (res instanceof CapportApiProbeResult) { 2888 maybeReportCaptivePortalData(((CapportApiProbeResult) res).getCaptivePortalData()); 2889 } 2890 2891 // This is not a if-else case since partial connectivity will concluded from both HTTP and 2892 // HTTPS probe. Both HTTP and HTTPS result should be reported. 2893 if (res.isConcludedFromHttps()) { 2894 reportHttpProbeResult(NETWORK_VALIDATION_PROBE_HTTPS, res); 2895 } 2896 2897 if (res.isConcludedFromHttp()) { 2898 reportHttpProbeResult(NETWORK_VALIDATION_PROBE_HTTP, res); 2899 } 2900 } 2901 sendHttpAndHttpsParallelWithFallbackProbes( EvaluationThreadDeps deps, ProxyInfo proxy, URL httpsUrl, URL httpUrl)2902 private CaptivePortalProbeResult sendHttpAndHttpsParallelWithFallbackProbes( 2903 EvaluationThreadDeps deps, ProxyInfo proxy, URL httpsUrl, URL httpUrl) { 2904 // Number of probes to wait for. If a probe completes with a conclusive answer 2905 // it shortcuts the latch immediately by forcing the count to 0. 2906 final CountDownLatch latch = new CountDownLatch(2); 2907 2908 final Uri capportApiUrl = getCaptivePortalApiUrl(mLinkProperties); 2909 final ProbeThread httpsProbe = new ProbeThread(latch, deps, proxy, httpsUrl, 2910 ValidationProbeEvent.PROBE_HTTPS, capportApiUrl); 2911 final ProbeThread httpProbe = new ProbeThread(latch, deps, proxy, httpUrl, 2912 ValidationProbeEvent.PROBE_HTTP, capportApiUrl); 2913 2914 try { 2915 httpsProbe.start(); 2916 httpProbe.start(); 2917 latch.await(PROBE_TIMEOUT_MS, TimeUnit.MILLISECONDS); 2918 } catch (InterruptedException e) { 2919 validationLog("Error: probes wait interrupted!"); 2920 return CaptivePortalProbeResult.failed(CaptivePortalProbeResult.PROBE_UNKNOWN); 2921 } 2922 2923 final CaptivePortalProbeResult httpsResult = httpsProbe.result(); 2924 final CaptivePortalProbeResult httpResult = httpProbe.result(); 2925 2926 // Look for a conclusive probe result first. 2927 if (isConclusiveResult(httpResult, capportApiUrl)) { 2928 reportProbeResult(httpProbe.result()); 2929 return httpResult; 2930 } 2931 2932 if (isConclusiveResult(httpsResult, capportApiUrl)) { 2933 reportProbeResult(httpsProbe.result()); 2934 return httpsResult; 2935 } 2936 // Consider a DNS response with a private IP address on the HTTP probe as an indication that 2937 // the network is not connected to the Internet, and have the whole evaluation fail in that 2938 // case, instead of potentially detecting a captive portal. This logic only affects portal 2939 // detection, not network validation. 2940 // This only applies if the DNS probe completed within PROBE_TIMEOUT_MS, as the fallback 2941 // probe should not be delayed by this check. 2942 if (mPrivateIpNoInternetEnabled && (httpResult.isDnsPrivateIpResponse())) { 2943 validationLog("DNS response to the URL is private IP"); 2944 return CaptivePortalProbeResult.failed(1 << ValidationProbeEvent.PROBE_HTTP); 2945 } 2946 // If a fallback method exists, use it to retry portal detection. 2947 // If we have new-style probe specs, use those. Otherwise, use the fallback URLs. 2948 final CaptivePortalProbeSpec probeSpec = nextFallbackSpec(); 2949 final URL fallbackUrl = (probeSpec != null) ? probeSpec.getUrl() : nextFallbackUrl(); 2950 CaptivePortalProbeResult fallbackProbeResult = null; 2951 if (fallbackUrl != null) { 2952 fallbackProbeResult = sendHttpProbe(fallbackUrl, PROBE_FALLBACK, probeSpec); 2953 reportHttpProbeResult(NETWORK_VALIDATION_PROBE_FALLBACK, fallbackProbeResult); 2954 if (fallbackProbeResult.isPortal()) { 2955 return fallbackProbeResult; 2956 } 2957 } 2958 // Otherwise wait until http and https probes completes and use their results. 2959 try { 2960 httpProbe.join(); 2961 reportProbeResult(httpProbe.result()); 2962 2963 if (httpProbe.result().isPortal()) { 2964 return httpProbe.result(); 2965 } 2966 2967 httpsProbe.join(); 2968 reportHttpProbeResult(NETWORK_VALIDATION_PROBE_HTTPS, httpsProbe.result()); 2969 2970 final boolean isHttpSuccessful = 2971 (httpProbe.result().isSuccessful() 2972 || (fallbackProbeResult != null && fallbackProbeResult.isSuccessful())); 2973 if (httpsProbe.result().isFailed() && isHttpSuccessful) { 2974 return CaptivePortalProbeResult.PARTIAL; 2975 } 2976 return httpsProbe.result(); 2977 } catch (InterruptedException e) { 2978 validationLog("Error: http or https probe wait interrupted!"); 2979 return CaptivePortalProbeResult.failed(CaptivePortalProbeResult.PROBE_UNKNOWN); 2980 } 2981 } 2982 makeURL(String url)2983 private URL makeURL(String url) { 2984 if (url != null) { 2985 try { 2986 return new URL(url); 2987 } catch (MalformedURLException e) { 2988 validationLog("Bad URL: " + url); 2989 } 2990 } 2991 return null; 2992 } 2993 logNetworkEvent(int evtype)2994 private void logNetworkEvent(int evtype) { 2995 int[] transports = mNetworkCapabilities.getTransportTypes(); 2996 mMetricsLog.log(mCleartextDnsNetwork, transports, new NetworkEvent(evtype)); 2997 } 2998 networkEventType(ValidationStage s, EvaluationResult r)2999 private int networkEventType(ValidationStage s, EvaluationResult r) { 3000 if (s.mIsFirstValidation) { 3001 if (r.mIsValidated) { 3002 return NetworkEvent.NETWORK_FIRST_VALIDATION_SUCCESS; 3003 } else { 3004 return NetworkEvent.NETWORK_FIRST_VALIDATION_PORTAL_FOUND; 3005 } 3006 } else { 3007 if (r.mIsValidated) { 3008 return NetworkEvent.NETWORK_REVALIDATION_SUCCESS; 3009 } else { 3010 return NetworkEvent.NETWORK_REVALIDATION_PORTAL_FOUND; 3011 } 3012 } 3013 } 3014 maybeLogEvaluationResult(int evtype)3015 private void maybeLogEvaluationResult(int evtype) { 3016 if (mEvaluationTimer.isRunning()) { 3017 int[] transports = mNetworkCapabilities.getTransportTypes(); 3018 mMetricsLog.log(mCleartextDnsNetwork, transports, 3019 new NetworkEvent(evtype, mEvaluationTimer.stop() / 1000)); 3020 mEvaluationTimer.reset(); 3021 } 3022 } 3023 logValidationProbe(long durationUs, int probeType, int probeResult)3024 private void logValidationProbe(long durationUs, int probeType, int probeResult) { 3025 int[] transports = mNetworkCapabilities.getTransportTypes(); 3026 boolean isFirstValidation = validationStage().mIsFirstValidation; 3027 ValidationProbeEvent ev = new ValidationProbeEvent.Builder() 3028 .setProbeType(probeType, isFirstValidation) 3029 .setReturnCode(probeResult) 3030 .setDurationMs(durationUs / 1000) 3031 .build(); 3032 mMetricsLog.log(mCleartextDnsNetwork, transports, ev); 3033 } 3034 3035 @VisibleForTesting 3036 public static class Dependencies { getPrivateDnsBypassNetwork(Network network)3037 public Network getPrivateDnsBypassNetwork(Network network) { 3038 return new OneAddressPerFamilyNetwork(network); 3039 } 3040 getDnsResolver()3041 public DnsResolver getDnsResolver() { 3042 return DnsResolver.getInstance(); 3043 } 3044 getRandom()3045 public Random getRandom() { 3046 return new Random(); 3047 } 3048 3049 /** 3050 * Get the value of a global integer setting. 3051 * @param symbol Name of the setting 3052 * @param defaultValue Value to return if the setting is not defined. 3053 */ getSetting(Context context, String symbol, int defaultValue)3054 public int getSetting(Context context, String symbol, int defaultValue) { 3055 return Settings.Global.getInt(context.getContentResolver(), symbol, defaultValue); 3056 } 3057 3058 /** 3059 * Get the value of a global String setting. 3060 * @param symbol Name of the setting 3061 * @param defaultValue Value to return if the setting is not defined. 3062 */ getSetting(Context context, String symbol, String defaultValue)3063 public String getSetting(Context context, String symbol, String defaultValue) { 3064 final String value = Settings.Global.getString(context.getContentResolver(), symbol); 3065 return value != null ? value : defaultValue; 3066 } 3067 3068 /** 3069 * Look up the value of a property in DeviceConfig. 3070 * @param namespace The namespace containing the property to look up. 3071 * @param name The name of the property to look up. 3072 * @param defaultValue The value to return if the property does not exist or has no non-null 3073 * value. 3074 * @return the corresponding value, or defaultValue if none exists. 3075 */ 3076 @Nullable getDeviceConfigProperty(@onNull String namespace, @NonNull String name, @Nullable String defaultValue)3077 public String getDeviceConfigProperty(@NonNull String namespace, @NonNull String name, 3078 @Nullable String defaultValue) { 3079 return NetworkStackUtils.getDeviceConfigProperty(namespace, name, defaultValue); 3080 } 3081 3082 /** 3083 * Look up the value of a property in DeviceConfig. 3084 * @param namespace The namespace containing the property to look up. 3085 * @param name The name of the property to look up. 3086 * @param defaultValue The value to return if the property does not exist or has no non-null 3087 * value. 3088 * @return the corresponding value, or defaultValue if none exists. 3089 */ getDeviceConfigPropertyInt(@onNull String namespace, @NonNull String name, int defaultValue)3090 public int getDeviceConfigPropertyInt(@NonNull String namespace, @NonNull String name, 3091 int defaultValue) { 3092 return NetworkStackUtils.getDeviceConfigPropertyInt(namespace, name, defaultValue); 3093 } 3094 3095 /** 3096 * Check whether or not one experimental feature in the connectivity namespace is 3097 * enabled. 3098 * @param name Flag name of the experiment in the connectivity namespace. 3099 * @see NetworkStackUtils#isFeatureEnabled(Context, String, String) 3100 */ isFeatureEnabled(@onNull Context context, @NonNull String name)3101 public boolean isFeatureEnabled(@NonNull Context context, @NonNull String name) { 3102 return NetworkStackUtils.isFeatureEnabled(context, NAMESPACE_CONNECTIVITY, name); 3103 } 3104 3105 /** 3106 * Check whether or not one specific experimental feature for a particular namespace from 3107 * {@link DeviceConfig} is enabled by comparing NetworkStack module version 3108 * {@link NetworkStack} with current version of property. If this property version is valid, 3109 * the corresponding experimental feature would be enabled, otherwise disabled. 3110 * @param context The global context information about an app environment. 3111 * @param namespace The namespace containing the property to look up. 3112 * @param name The name of the property to look up. 3113 * @param defaultEnabled The value to return if the property does not exist or its value is 3114 * null. 3115 * @return true if this feature is enabled, or false if disabled. 3116 */ isFeatureEnabled(@onNull Context context, @NonNull String namespace, @NonNull String name, boolean defaultEnabled)3117 public boolean isFeatureEnabled(@NonNull Context context, @NonNull String namespace, 3118 @NonNull String name, boolean defaultEnabled) { 3119 return NetworkStackUtils.isFeatureEnabled(context, namespace, name, defaultEnabled); 3120 } 3121 3122 /** 3123 * Collect data stall detection level information for each transport type. Write metrics 3124 * data to statsd pipeline. 3125 * @param stats a {@link DataStallDetectionStats} that contains the detection level 3126 * information. 3127 * @para result the network reevaluation result. 3128 */ writeDataStallDetectionStats(@onNull final DataStallDetectionStats stats, @NonNull final CaptivePortalProbeResult result)3129 public void writeDataStallDetectionStats(@NonNull final DataStallDetectionStats stats, 3130 @NonNull final CaptivePortalProbeResult result) { 3131 DataStallStatsUtils.write(stats, result); 3132 } 3133 3134 public static final Dependencies DEFAULT = new Dependencies(); 3135 } 3136 3137 /** 3138 * Methods in this class perform no locking because all accesses are performed on the state 3139 * machine's thread. Need to consider the thread safety if it ever could be accessed outside the 3140 * state machine. 3141 */ 3142 @VisibleForTesting 3143 protected class DnsStallDetector { 3144 private int mConsecutiveTimeoutCount = 0; 3145 private int mSize; 3146 final DnsResult[] mDnsEvents; 3147 final RingBufferIndices mResultIndices; 3148 DnsStallDetector(int size)3149 DnsStallDetector(int size) { 3150 mSize = Math.max(DEFAULT_DNS_LOG_SIZE, size); 3151 mDnsEvents = new DnsResult[mSize]; 3152 mResultIndices = new RingBufferIndices(mSize); 3153 } 3154 3155 @VisibleForTesting accumulateConsecutiveDnsTimeoutCount(int code)3156 protected void accumulateConsecutiveDnsTimeoutCount(int code) { 3157 final DnsResult result = new DnsResult(code); 3158 mDnsEvents[mResultIndices.add()] = result; 3159 if (result.isTimeout()) { 3160 mConsecutiveTimeoutCount++; 3161 } else { 3162 // Keep the event in mDnsEvents without clearing it so that there are logs to do the 3163 // simulation and analysis. 3164 mConsecutiveTimeoutCount = 0; 3165 } 3166 } 3167 isDataStallSuspected(int timeoutCountThreshold, int validTime)3168 private boolean isDataStallSuspected(int timeoutCountThreshold, int validTime) { 3169 if (timeoutCountThreshold <= 0) { 3170 Log.wtf(TAG, "Timeout count threshold should be larger than 0."); 3171 return false; 3172 } 3173 3174 // Check if the consecutive timeout count reach the threshold or not. 3175 if (mConsecutiveTimeoutCount < timeoutCountThreshold) { 3176 return false; 3177 } 3178 3179 // Check if the target dns event index is valid or not. 3180 final int firstConsecutiveTimeoutIndex = 3181 mResultIndices.indexOf(mResultIndices.size() - timeoutCountThreshold); 3182 3183 // If the dns timeout events happened long time ago, the events are meaningless for 3184 // data stall evaluation. Thus, check if the first consecutive timeout dns event 3185 // considered in the evaluation happened in defined threshold time. 3186 final long now = SystemClock.elapsedRealtime(); 3187 final long firstTimeoutTime = now - mDnsEvents[firstConsecutiveTimeoutIndex].mTimeStamp; 3188 return (firstTimeoutTime < validTime); 3189 } 3190 getConsecutiveTimeoutCount()3191 int getConsecutiveTimeoutCount() { 3192 return mConsecutiveTimeoutCount; 3193 } 3194 } 3195 3196 private static class DnsResult { 3197 // TODO: Need to move the DNS return code definition to a specific class once unify DNS 3198 // response code is done. 3199 private static final int RETURN_CODE_DNS_TIMEOUT = 255; 3200 3201 private final long mTimeStamp; 3202 private final int mReturnCode; 3203 DnsResult(int code)3204 DnsResult(int code) { 3205 mTimeStamp = SystemClock.elapsedRealtime(); 3206 mReturnCode = code; 3207 } 3208 isTimeout()3209 private boolean isTimeout() { 3210 return mReturnCode == RETURN_CODE_DNS_TIMEOUT; 3211 } 3212 } 3213 3214 @VisibleForTesting 3215 @Nullable getDnsStallDetector()3216 protected DnsStallDetector getDnsStallDetector() { 3217 return mDnsStallDetector; 3218 } 3219 3220 @Nullable getTcpSocketTracker()3221 private TcpSocketTracker getTcpSocketTracker() { 3222 return mTcpTracker; 3223 } 3224 dataStallEvaluateTypeEnabled(int type)3225 private boolean dataStallEvaluateTypeEnabled(int type) { 3226 return (mDataStallEvaluationType & type) != 0; 3227 } 3228 3229 @VisibleForTesting getLastProbeTime()3230 protected long getLastProbeTime() { 3231 return mLastProbeTime; 3232 } 3233 3234 @VisibleForTesting isDataStall()3235 protected boolean isDataStall() { 3236 if (!isValidationRequired()) { 3237 return false; 3238 } 3239 3240 Boolean result = null; 3241 final StringJoiner msg = (DBG || VDBG_STALL) ? new StringJoiner(", ") : null; 3242 // Reevaluation will generate traffic. Thus, set a minimal reevaluation timer to limit the 3243 // possible traffic cost in metered network. 3244 if (!mNetworkCapabilities.hasCapability(NET_CAPABILITY_NOT_METERED) 3245 && (SystemClock.elapsedRealtime() - getLastProbeTime() 3246 < mDataStallMinEvaluateTime)) { 3247 return false; 3248 } 3249 // Check TCP signal. Suspect it may be a data stall if : 3250 // 1. TCP connection fail rate(lost+retrans) is higher than threshold. 3251 // 2. Accumulate enough packets count. 3252 final TcpSocketTracker tst = getTcpSocketTracker(); 3253 if (dataStallEvaluateTypeEnabled(DATA_STALL_EVALUATION_TYPE_TCP) && tst != null) { 3254 if (tst.getLatestReceivedCount() > 0) { 3255 result = false; 3256 } else if (tst.isDataStallSuspected()) { 3257 result = true; 3258 mDataStallTypeToCollect = DATA_STALL_EVALUATION_TYPE_TCP; 3259 3260 final DataStallReportParcelable p = new DataStallReportParcelable(); 3261 p.detectionMethod = DETECTION_METHOD_TCP_METRICS; 3262 p.timestampMillis = SystemClock.elapsedRealtime(); 3263 p.tcpPacketFailRate = tst.getLatestPacketFailPercentage(); 3264 p.tcpMetricsCollectionPeriodMillis = getTcpPollingInterval(); 3265 3266 notifyDataStallSuspected(p); 3267 } 3268 if (DBG || VDBG_STALL) { 3269 msg.add("tcp packets received=" + tst.getLatestReceivedCount()) 3270 .add("latest tcp fail rate=" + tst.getLatestPacketFailPercentage()); 3271 } 3272 } 3273 3274 // Check dns signal. Suspect it may be a data stall if both : 3275 // 1. The number of consecutive DNS query timeouts >= mConsecutiveDnsTimeoutThreshold. 3276 // 2. Those consecutive DNS queries happened in the last mValidDataStallDnsTimeThreshold ms. 3277 final DnsStallDetector dsd = getDnsStallDetector(); 3278 if ((result == null) && (dsd != null) 3279 && dataStallEvaluateTypeEnabled(DATA_STALL_EVALUATION_TYPE_DNS)) { 3280 if (dsd.isDataStallSuspected(mConsecutiveDnsTimeoutThreshold, 3281 mDataStallValidDnsTimeThreshold)) { 3282 result = true; 3283 mDataStallTypeToCollect = DATA_STALL_EVALUATION_TYPE_DNS; 3284 logNetworkEvent(NetworkEvent.NETWORK_CONSECUTIVE_DNS_TIMEOUT_FOUND); 3285 3286 final DataStallReportParcelable p = new DataStallReportParcelable(); 3287 p.detectionMethod = DETECTION_METHOD_DNS_EVENTS; 3288 p.timestampMillis = SystemClock.elapsedRealtime(); 3289 p.dnsConsecutiveTimeouts = mDnsStallDetector.getConsecutiveTimeoutCount(); 3290 notifyDataStallSuspected(p); 3291 } 3292 if (DBG || VDBG_STALL) { 3293 msg.add("consecutive dns timeout count=" + dsd.getConsecutiveTimeoutCount()); 3294 } 3295 } 3296 // log only data stall suspected. 3297 if ((DBG && Boolean.TRUE.equals(result)) || VDBG_STALL) { 3298 log("isDataStall: result=" + result + ", " + msg); 3299 } 3300 3301 return (result == null) ? false : result; 3302 } 3303 3304 // Class to keep state of evaluation results and probe results. 3305 // 3306 // The main purpose was to ensure NetworkMonitor can notify ConnectivityService of probe results 3307 // as soon as they happen, without triggering any other changes. This requires keeping state on 3308 // the most recent evaluation result. Calling noteProbeResult will ensure that the results 3309 // reported to ConnectivityService contain the previous evaluation result, and thus won't 3310 // trigger a validation or partial connectivity state change. 3311 // 3312 // Note that this class is not currently being used for this purpose. The reason is that some 3313 // of the system behaviour triggered by reporting network validation - notably, NetworkAgent 3314 // behaviour - depends not only on the value passed by notifyNetworkTested, but also on the 3315 // fact that notifyNetworkTested was called. For example, telephony triggers network recovery 3316 // any time it is told that validation failed, i.e., if the result does not contain 3317 // NETWORK_VALIDATION_RESULT_VALID. But with this scheme, the first two or three validation 3318 // reports are all failures, because they are "HTTP succeeded but validation not yet passed", 3319 // "HTTP and HTTPS succeeded but validation not yet passed", etc. 3320 @VisibleForTesting 3321 protected class EvaluationState { 3322 // The latest validation result for this network. This is a bitmask of 3323 // INetworkMonitor.NETWORK_VALIDATION_RESULT_* constants. 3324 private int mEvaluationResult = NETWORK_VALIDATION_RESULT_INVALID; 3325 // Indicates which probes have succeeded since clearProbeResults was called. 3326 // This is a bitmask of INetworkMonitor.NETWORK_VALIDATION_PROBE_* constants. 3327 private int mProbeResults = 0; 3328 // A bitmask to record which probes are completed. 3329 private int mProbeCompleted = 0; 3330 // The latest redirect URL. 3331 private String mRedirectUrl; 3332 clearProbeResults()3333 protected void clearProbeResults() { 3334 mProbeResults = 0; 3335 mProbeCompleted = 0; 3336 } 3337 maybeNotifyProbeResults(@onNull final Runnable modif)3338 private void maybeNotifyProbeResults(@NonNull final Runnable modif) { 3339 final int oldCompleted = mProbeCompleted; 3340 final int oldResults = mProbeResults; 3341 modif.run(); 3342 if (oldCompleted != mProbeCompleted || oldResults != mProbeResults) { 3343 notifyProbeStatusChanged(mProbeCompleted, mProbeResults); 3344 } 3345 } 3346 removeProbeResult(final int probeResult)3347 protected void removeProbeResult(final int probeResult) { 3348 maybeNotifyProbeResults(() -> { 3349 mProbeCompleted &= ~probeResult; 3350 mProbeResults &= ~probeResult; 3351 }); 3352 } 3353 noteProbeResult(final int probeResult, final boolean succeeded)3354 protected void noteProbeResult(final int probeResult, final boolean succeeded) { 3355 maybeNotifyProbeResults(() -> { 3356 mProbeCompleted |= probeResult; 3357 if (succeeded) { 3358 mProbeResults |= probeResult; 3359 } else { 3360 mProbeResults &= ~probeResult; 3361 } 3362 }); 3363 } 3364 reportEvaluationResult(int result, @Nullable String redirectUrl)3365 protected void reportEvaluationResult(int result, @Nullable String redirectUrl) { 3366 mEvaluationResult = result; 3367 mRedirectUrl = redirectUrl; 3368 final NetworkTestResultParcelable p = new NetworkTestResultParcelable(); 3369 p.result = result; 3370 p.probesSucceeded = mProbeResults; 3371 p.probesAttempted = mProbeCompleted; 3372 p.redirectUrl = redirectUrl; 3373 p.timestampMillis = SystemClock.elapsedRealtime(); 3374 notifyNetworkTested(p); 3375 recordValidationResult(result, redirectUrl); 3376 } 3377 3378 @VisibleForTesting getEvaluationResult()3379 protected int getEvaluationResult() { 3380 return mEvaluationResult; 3381 } 3382 3383 @VisibleForTesting getProbeResults()3384 protected int getProbeResults() { 3385 return mProbeResults; 3386 } 3387 3388 @VisibleForTesting getProbeCompletedResult()3389 protected int getProbeCompletedResult() { 3390 return mProbeCompleted; 3391 } 3392 } 3393 3394 @VisibleForTesting getEvaluationState()3395 protected EvaluationState getEvaluationState() { 3396 return mEvaluationState; 3397 } 3398 maybeDisableHttpsProbing(boolean acceptPartial)3399 private void maybeDisableHttpsProbing(boolean acceptPartial) { 3400 mAcceptPartialConnectivity = acceptPartial; 3401 // Ignore https probe in next validation if user accept partial connectivity on a partial 3402 // connectivity network. 3403 if (((mEvaluationState.getEvaluationResult() & NETWORK_VALIDATION_RESULT_PARTIAL) != 0) 3404 && mAcceptPartialConnectivity) { 3405 mUseHttps = false; 3406 } 3407 } 3408 3409 // Report HTTP, HTTP or FALLBACK probe result. 3410 @VisibleForTesting reportHttpProbeResult(int probeResult, @NonNull final CaptivePortalProbeResult result)3411 protected void reportHttpProbeResult(int probeResult, 3412 @NonNull final CaptivePortalProbeResult result) { 3413 boolean succeeded = result.isSuccessful(); 3414 // The success of a HTTP probe does not tell us whether the DNS probe succeeded. 3415 // The DNS and HTTP probes run one after the other in sendDnsAndHttpProbes, and that 3416 // method cannot report the result of the DNS probe because that it could be running 3417 // on a different thread which is racing with the main state machine thread. So, if 3418 // an HTTP or HTTPS probe succeeded, assume that the DNS probe succeeded. But if an 3419 // HTTP or HTTPS probe failed, don't assume that DNS is not working. 3420 // TODO: fix this. 3421 if (succeeded) { 3422 probeResult |= NETWORK_VALIDATION_PROBE_DNS; 3423 } 3424 mEvaluationState.noteProbeResult(probeResult, succeeded); 3425 } 3426 maybeReportCaptivePortalData(@ullable CaptivePortalDataShim data)3427 private void maybeReportCaptivePortalData(@Nullable CaptivePortalDataShim data) { 3428 // Do not clear data even if it is null: access points should not stop serving the API, so 3429 // if the API disappears this is treated as a temporary failure, and previous data should 3430 // remain valid. 3431 if (data == null) return; 3432 try { 3433 data.notifyChanged(mCallback); 3434 } catch (RemoteException e) { 3435 Log.e(TAG, "Error notifying ConnectivityService of new capport data", e); 3436 } 3437 } 3438 3439 /** 3440 * Interface for logging dns results. 3441 */ 3442 public interface DnsLogFunc { 3443 /** 3444 * Log function. 3445 */ log(String s)3446 void log(String s); 3447 } 3448 3449 @Nullable getTcpSocketTrackerOrNull(Context context, Network network)3450 private static TcpSocketTracker getTcpSocketTrackerOrNull(Context context, Network network) { 3451 return ((Dependencies.DEFAULT.getDeviceConfigPropertyInt( 3452 NAMESPACE_CONNECTIVITY, 3453 CONFIG_DATA_STALL_EVALUATION_TYPE, 3454 DEFAULT_DATA_STALL_EVALUATION_TYPES) 3455 & DATA_STALL_EVALUATION_TYPE_TCP) != 0) 3456 ? new TcpSocketTracker(new TcpSocketTracker.Dependencies(context), network) 3457 : null; 3458 } 3459 3460 @Nullable initDnsStallDetectorIfRequired(int type, int threshold)3461 private DnsStallDetector initDnsStallDetectorIfRequired(int type, int threshold) { 3462 return ((type & DATA_STALL_EVALUATION_TYPE_DNS) != 0) 3463 ? new DnsStallDetector(threshold) : null; 3464 } 3465 getCaptivePortalApiUrl(LinkProperties lp)3466 private static Uri getCaptivePortalApiUrl(LinkProperties lp) { 3467 return NetworkInformationShimImpl.newInstance().getCaptivePortalApiUrl(lp); 3468 } 3469 } 3470