handshake_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498
  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "fmt"
  10. "io"
  11. "net"
  12. "reflect"
  13. "runtime"
  14. "strings"
  15. "sync"
  16. "testing"
  17. )
  18. type testChecker struct {
  19. calls []string
  20. }
  21. func (t *testChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  22. if dialAddr == "bad" {
  23. return fmt.Errorf("dialAddr is bad")
  24. }
  25. if tcpAddr, ok := addr.(*net.TCPAddr); !ok || tcpAddr == nil {
  26. return fmt.Errorf("testChecker: got %T want *net.TCPAddr", addr)
  27. }
  28. t.calls = append(t.calls, fmt.Sprintf("%s %v %s %x", dialAddr, addr, key.Type(), key.Marshal()))
  29. return nil
  30. }
  31. // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and
  32. // therefore is buffered (net.Pipe deadlocks if both sides start with
  33. // a write.)
  34. func netPipe() (net.Conn, net.Conn, error) {
  35. listener, err := net.Listen("tcp", "127.0.0.1:0")
  36. if err != nil {
  37. return nil, nil, err
  38. }
  39. defer listener.Close()
  40. c1, err := net.Dial("tcp", listener.Addr().String())
  41. if err != nil {
  42. return nil, nil, err
  43. }
  44. c2, err := listener.Accept()
  45. if err != nil {
  46. c1.Close()
  47. return nil, nil, err
  48. }
  49. return c1, c2, nil
  50. }
  51. // noiseTransport inserts ignore messages to check that the read loop
  52. // and the key exchange filters out these messages.
  53. type noiseTransport struct {
  54. keyingTransport
  55. }
  56. func (t *noiseTransport) writePacket(p []byte) error {
  57. ignore := []byte{msgIgnore}
  58. if err := t.keyingTransport.writePacket(ignore); err != nil {
  59. return err
  60. }
  61. debug := []byte{msgDebug, 1, 2, 3}
  62. if err := t.keyingTransport.writePacket(debug); err != nil {
  63. return err
  64. }
  65. return t.keyingTransport.writePacket(p)
  66. }
  67. func addNoiseTransport(t keyingTransport) keyingTransport {
  68. return &noiseTransport{t}
  69. }
  70. // handshakePair creates two handshakeTransports connected with each
  71. // other. If the noise argument is true, both transports will try to
  72. // confuse the other side by sending ignore and debug messages.
  73. func handshakePair(clientConf *ClientConfig, addr string, noise bool) (client *handshakeTransport, server *handshakeTransport, err error) {
  74. a, b, err := netPipe()
  75. if err != nil {
  76. return nil, nil, err
  77. }
  78. var trC, trS keyingTransport
  79. trC = newTransport(a, rand.Reader, true)
  80. trS = newTransport(b, rand.Reader, false)
  81. if noise {
  82. trC = addNoiseTransport(trC)
  83. trS = addNoiseTransport(trS)
  84. }
  85. clientConf.SetDefaults()
  86. v := []byte("version")
  87. client = newClientTransport(trC, v, v, clientConf, addr, a.RemoteAddr())
  88. serverConf := &ServerConfig{}
  89. serverConf.AddHostKey(testSigners["ecdsa"])
  90. serverConf.AddHostKey(testSigners["rsa"])
  91. serverConf.SetDefaults()
  92. server = newServerTransport(trS, v, v, serverConf)
  93. if err := server.waitSession(); err != nil {
  94. return nil, nil, fmt.Errorf("server.waitSession: %v", err)
  95. }
  96. if err := client.waitSession(); err != nil {
  97. return nil, nil, fmt.Errorf("client.waitSession: %v", err)
  98. }
  99. return client, server, nil
  100. }
  101. func TestHandshakeBasic(t *testing.T) {
  102. if runtime.GOOS == "plan9" {
  103. t.Skip("see golang.org/issue/7237")
  104. }
  105. checker := &syncChecker{make(chan int, 10)}
  106. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", false)
  107. if err != nil {
  108. t.Fatalf("handshakePair: %v", err)
  109. }
  110. defer trC.Close()
  111. defer trS.Close()
  112. <-checker.called
  113. clientDone := make(chan int, 0)
  114. gotHalf := make(chan int, 0)
  115. go func() {
  116. defer close(clientDone)
  117. // Client writes a bunch of stuff, and does a key
  118. // change in the middle. This should not confuse the
  119. // handshake in progress
  120. for i := 0; i < 10; i++ {
  121. p := []byte{msgRequestSuccess, byte(i)}
  122. if err := trC.writePacket(p); err != nil {
  123. t.Fatalf("sendPacket: %v", err)
  124. }
  125. if i == 5 {
  126. <-gotHalf
  127. // halfway through, we request a key change.
  128. trC.requestKeyExchange()
  129. // Wait until we can be sure the key
  130. // change has really started before we
  131. // write more.
  132. <-checker.called
  133. }
  134. }
  135. }()
  136. // Server checks that client messages come in cleanly
  137. i := 0
  138. err = nil
  139. for ; i < 10; i++ {
  140. var p []byte
  141. p, err = trS.readPacket()
  142. if err != nil {
  143. break
  144. }
  145. if i == 5 {
  146. gotHalf <- 1
  147. }
  148. want := []byte{msgRequestSuccess, byte(i)}
  149. if bytes.Compare(p, want) != 0 {
  150. t.Errorf("message %d: got %q, want %q", i, p, want)
  151. }
  152. }
  153. <-clientDone
  154. if err != nil && err != io.EOF {
  155. t.Fatalf("server error: %v", err)
  156. }
  157. if i != 10 {
  158. t.Errorf("received %d messages, want 10.", i)
  159. }
  160. close(checker.called)
  161. if _, ok := <-checker.called; ok {
  162. // If all went well, we registered exactly 2 key changes: one
  163. // that establishes the session, and one that we requested
  164. // additionally.
  165. t.Fatalf("got another host key checks after 2 handshakes")
  166. }
  167. }
  168. func TestForceFirstKex(t *testing.T) {
  169. // like handshakePair, but must access the keyingTransport.
  170. checker := &testChecker{}
  171. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  172. a, b, err := netPipe()
  173. if err != nil {
  174. t.Fatalf("netPipe: %v", err)
  175. }
  176. var trC, trS keyingTransport
  177. trC = newTransport(a, rand.Reader, true)
  178. // This is the disallowed packet:
  179. trC.writePacket(Marshal(&serviceRequestMsg{serviceUserAuth}))
  180. // Rest of the setup.
  181. trS = newTransport(b, rand.Reader, false)
  182. clientConf.SetDefaults()
  183. v := []byte("version")
  184. client := newClientTransport(trC, v, v, clientConf, "addr", a.RemoteAddr())
  185. serverConf := &ServerConfig{}
  186. serverConf.AddHostKey(testSigners["ecdsa"])
  187. serverConf.AddHostKey(testSigners["rsa"])
  188. serverConf.SetDefaults()
  189. server := newServerTransport(trS, v, v, serverConf)
  190. defer client.Close()
  191. defer server.Close()
  192. // We setup the initial key exchange, but the remote side
  193. // tries to send serviceRequestMsg in cleartext, which is
  194. // disallowed.
  195. if err := server.waitSession(); err == nil {
  196. t.Errorf("server first kex init should reject unexpected packet")
  197. }
  198. }
  199. func TestHandshakeAutoRekeyWrite(t *testing.T) {
  200. checker := &syncChecker{make(chan int, 10)}
  201. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  202. clientConf.RekeyThreshold = 500
  203. trC, trS, err := handshakePair(clientConf, "addr", false)
  204. if err != nil {
  205. t.Fatalf("handshakePair: %v", err)
  206. }
  207. defer trC.Close()
  208. defer trS.Close()
  209. done := make(chan int, 1)
  210. const numPacket = 5
  211. go func() {
  212. defer close(done)
  213. j := 0
  214. for ; j < numPacket; j++ {
  215. if _, err := trS.readPacket(); err != nil {
  216. break
  217. }
  218. }
  219. if j != numPacket {
  220. t.Errorf("got %d, want 5 messages", j)
  221. }
  222. }()
  223. <-checker.called
  224. for i := 0; i < numPacket; i++ {
  225. packet := make([]byte, 251)
  226. packet[0] = msgRequestSuccess
  227. if err := trC.writePacket(packet); err != nil {
  228. t.Errorf("writePacket: %v", err)
  229. }
  230. if i == 2 {
  231. // Make sure the kex is in progress.
  232. <-checker.called
  233. }
  234. }
  235. <-done
  236. }
  237. type syncChecker struct {
  238. called chan int
  239. }
  240. func (c *syncChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  241. c.called <- 1
  242. return nil
  243. }
  244. func TestHandshakeAutoRekeyRead(t *testing.T) {
  245. sync := &syncChecker{make(chan int, 2)}
  246. clientConf := &ClientConfig{
  247. HostKeyCallback: sync.Check,
  248. }
  249. clientConf.RekeyThreshold = 500
  250. trC, trS, err := handshakePair(clientConf, "addr", false)
  251. if err != nil {
  252. t.Fatalf("handshakePair: %v", err)
  253. }
  254. defer trC.Close()
  255. defer trS.Close()
  256. packet := make([]byte, 501)
  257. packet[0] = msgRequestSuccess
  258. if err := trS.writePacket(packet); err != nil {
  259. t.Fatalf("writePacket: %v", err)
  260. }
  261. // While we read out the packet, a key change will be
  262. // initiated.
  263. done := make(chan int, 1)
  264. go func() {
  265. defer close(done)
  266. if _, err := trC.readPacket(); err != nil {
  267. t.Fatalf("readPacket(client): %v", err)
  268. }
  269. }()
  270. <-done
  271. <-sync.called
  272. }
  273. // errorKeyingTransport generates errors after a given number of
  274. // read/write operations.
  275. type errorKeyingTransport struct {
  276. packetConn
  277. readLeft, writeLeft int
  278. }
  279. func (n *errorKeyingTransport) prepareKeyChange(*algorithms, *kexResult) error {
  280. return nil
  281. }
  282. func (n *errorKeyingTransport) getSessionID() []byte {
  283. return nil
  284. }
  285. func (n *errorKeyingTransport) writePacket(packet []byte) error {
  286. if n.writeLeft == 0 {
  287. n.Close()
  288. return errors.New("barf")
  289. }
  290. n.writeLeft--
  291. return n.packetConn.writePacket(packet)
  292. }
  293. func (n *errorKeyingTransport) readPacket() ([]byte, error) {
  294. if n.readLeft == 0 {
  295. n.Close()
  296. return nil, errors.New("barf")
  297. }
  298. n.readLeft--
  299. return n.packetConn.readPacket()
  300. }
  301. func TestHandshakeErrorHandlingRead(t *testing.T) {
  302. for i := 0; i < 20; i++ {
  303. testHandshakeErrorHandlingN(t, i, -1, false)
  304. }
  305. }
  306. func TestHandshakeErrorHandlingWrite(t *testing.T) {
  307. for i := 0; i < 20; i++ {
  308. testHandshakeErrorHandlingN(t, -1, i, false)
  309. }
  310. }
  311. func TestHandshakeErrorHandlingReadCoupled(t *testing.T) {
  312. for i := 0; i < 20; i++ {
  313. testHandshakeErrorHandlingN(t, i, -1, true)
  314. }
  315. }
  316. func TestHandshakeErrorHandlingWriteCoupled(t *testing.T) {
  317. for i := 0; i < 20; i++ {
  318. testHandshakeErrorHandlingN(t, -1, i, true)
  319. }
  320. }
  321. // testHandshakeErrorHandlingN runs handshakes, injecting errors. If
  322. // handshakeTransport deadlocks, the go runtime will detect it and
  323. // panic.
  324. func testHandshakeErrorHandlingN(t *testing.T, readLimit, writeLimit int, coupled bool) {
  325. msg := Marshal(&serviceRequestMsg{strings.Repeat("x", int(minRekeyThreshold)/4)})
  326. a, b := memPipe()
  327. defer a.Close()
  328. defer b.Close()
  329. key := testSigners["ecdsa"]
  330. serverConf := Config{RekeyThreshold: minRekeyThreshold}
  331. serverConf.SetDefaults()
  332. serverConn := newHandshakeTransport(&errorKeyingTransport{a, readLimit, writeLimit}, &serverConf, []byte{'a'}, []byte{'b'})
  333. serverConn.hostKeys = []Signer{key}
  334. go serverConn.readLoop()
  335. go serverConn.kexLoop()
  336. clientConf := Config{RekeyThreshold: 10 * minRekeyThreshold}
  337. clientConf.SetDefaults()
  338. clientConn := newHandshakeTransport(&errorKeyingTransport{b, -1, -1}, &clientConf, []byte{'a'}, []byte{'b'})
  339. clientConn.hostKeyAlgorithms = []string{key.PublicKey().Type()}
  340. go clientConn.readLoop()
  341. go clientConn.kexLoop()
  342. var wg sync.WaitGroup
  343. for _, hs := range []packetConn{serverConn, clientConn} {
  344. if !coupled {
  345. wg.Add(2)
  346. go func(c packetConn) {
  347. for i := 0; ; i++ {
  348. str := fmt.Sprintf("%08x", i) + strings.Repeat("x", int(minRekeyThreshold)/4-8)
  349. err := c.writePacket(Marshal(&serviceRequestMsg{str}))
  350. if err != nil {
  351. break
  352. }
  353. }
  354. wg.Done()
  355. c.Close()
  356. }(hs)
  357. go func(c packetConn) {
  358. for {
  359. _, err := c.readPacket()
  360. if err != nil {
  361. break
  362. }
  363. }
  364. wg.Done()
  365. }(hs)
  366. } else {
  367. wg.Add(1)
  368. go func(c packetConn) {
  369. for {
  370. _, err := c.readPacket()
  371. if err != nil {
  372. break
  373. }
  374. if err := c.writePacket(msg); err != nil {
  375. break
  376. }
  377. }
  378. wg.Done()
  379. }(hs)
  380. }
  381. }
  382. wg.Wait()
  383. }
  384. func TestDisconnect(t *testing.T) {
  385. if runtime.GOOS == "plan9" {
  386. t.Skip("see golang.org/issue/7237")
  387. }
  388. checker := &testChecker{}
  389. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", false)
  390. if err != nil {
  391. t.Fatalf("handshakePair: %v", err)
  392. }
  393. defer trC.Close()
  394. defer trS.Close()
  395. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  396. errMsg := &disconnectMsg{
  397. Reason: 42,
  398. Message: "such is life",
  399. }
  400. trC.writePacket(Marshal(errMsg))
  401. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  402. packet, err := trS.readPacket()
  403. if err != nil {
  404. t.Fatalf("readPacket 1: %v", err)
  405. }
  406. if packet[0] != msgRequestSuccess {
  407. t.Errorf("got packet %v, want packet type %d", packet, msgRequestSuccess)
  408. }
  409. _, err = trS.readPacket()
  410. if err == nil {
  411. t.Errorf("readPacket 2 succeeded")
  412. } else if !reflect.DeepEqual(err, errMsg) {
  413. t.Errorf("got error %#v, want %#v", err, errMsg)
  414. }
  415. _, err = trS.readPacket()
  416. if err == nil {
  417. t.Errorf("readPacket 3 succeeded")
  418. }
  419. }