handshake_test.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316
  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "fmt"
  9. "net"
  10. "runtime"
  11. "testing"
  12. )
  13. type testChecker struct {
  14. calls []string
  15. }
  16. func (t *testChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  17. if dialAddr == "bad" {
  18. return fmt.Errorf("dialAddr is bad")
  19. }
  20. if tcpAddr, ok := addr.(*net.TCPAddr); !ok || tcpAddr == nil {
  21. return fmt.Errorf("testChecker: got %T want *net.TCPAddr", addr)
  22. }
  23. t.calls = append(t.calls, fmt.Sprintf("%s %v %s %x", dialAddr, addr, key.Type(), key.Marshal()))
  24. return nil
  25. }
  26. // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and
  27. // therefore is buffered (net.Pipe deadlocks if both sides start with
  28. // a write.)
  29. func netPipe() (net.Conn, net.Conn, error) {
  30. listener, err := net.Listen("tcp", "127.0.0.1:0")
  31. if err != nil {
  32. return nil, nil, err
  33. }
  34. defer listener.Close()
  35. c1, err := net.Dial("tcp", listener.Addr().String())
  36. if err != nil {
  37. return nil, nil, err
  38. }
  39. c2, err := listener.Accept()
  40. if err != nil {
  41. c1.Close()
  42. return nil, nil, err
  43. }
  44. return c1, c2, nil
  45. }
  46. func handshakePair(clientConf *ClientConfig, addr string) (client *handshakeTransport, server *handshakeTransport, err error) {
  47. a, b, err := netPipe()
  48. if err != nil {
  49. return nil, nil, err
  50. }
  51. trC := newTransport(a, rand.Reader, true)
  52. trS := newTransport(b, rand.Reader, false)
  53. clientConf.SetDefaults()
  54. v := []byte("version")
  55. client = newClientTransport(trC, v, v, clientConf, addr, a.RemoteAddr())
  56. serverConf := &ServerConfig{}
  57. serverConf.AddHostKey(testSigners["ecdsa"])
  58. serverConf.AddHostKey(testSigners["rsa"])
  59. serverConf.SetDefaults()
  60. server = newServerTransport(trS, v, v, serverConf)
  61. return client, server, nil
  62. }
  63. func TestHandshakeBasic(t *testing.T) {
  64. if runtime.GOOS == "plan9" {
  65. t.Skip("see golang.org/issue/7237")
  66. }
  67. checker := &testChecker{}
  68. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  69. if err != nil {
  70. t.Fatalf("handshakePair: %v", err)
  71. }
  72. defer trC.Close()
  73. defer trS.Close()
  74. go func() {
  75. // Client writes a bunch of stuff, and does a key
  76. // change in the middle. This should not confuse the
  77. // handshake in progress
  78. for i := 0; i < 10; i++ {
  79. p := []byte{msgRequestSuccess, byte(i)}
  80. if err := trC.writePacket(p); err != nil {
  81. t.Fatalf("sendPacket: %v", err)
  82. }
  83. if i == 5 {
  84. // halfway through, we request a key change.
  85. _, _, err := trC.sendKexInit()
  86. if err != nil {
  87. t.Fatalf("sendKexInit: %v", err)
  88. }
  89. }
  90. }
  91. trC.Close()
  92. }()
  93. // Server checks that client messages come in cleanly
  94. i := 0
  95. for {
  96. p, err := trS.readPacket()
  97. if err != nil {
  98. break
  99. }
  100. if p[0] == msgNewKeys {
  101. continue
  102. }
  103. want := []byte{msgRequestSuccess, byte(i)}
  104. if bytes.Compare(p, want) != 0 {
  105. t.Errorf("message %d: got %q, want %q", i, p, want)
  106. }
  107. i++
  108. }
  109. if i != 10 {
  110. t.Errorf("received %d messages, want 10.", i)
  111. }
  112. // If all went well, we registered exactly 1 key change.
  113. if len(checker.calls) != 1 {
  114. t.Fatalf("got %d host key checks, want 1", len(checker.calls))
  115. }
  116. pub := testSigners["ecdsa"].PublicKey()
  117. want := fmt.Sprintf("%s %v %s %x", "addr", trC.remoteAddr, pub.Type(), pub.Marshal())
  118. if want != checker.calls[0] {
  119. t.Errorf("got %q want %q for host key check", checker.calls[0], want)
  120. }
  121. }
  122. func TestHandshakeError(t *testing.T) {
  123. checker := &testChecker{}
  124. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "bad")
  125. if err != nil {
  126. t.Fatalf("handshakePair: %v", err)
  127. }
  128. defer trC.Close()
  129. defer trS.Close()
  130. // send a packet
  131. packet := []byte{msgRequestSuccess, 42}
  132. if err := trC.writePacket(packet); err != nil {
  133. t.Errorf("writePacket: %v", err)
  134. }
  135. // Now request a key change.
  136. _, _, err = trC.sendKexInit()
  137. if err != nil {
  138. t.Errorf("sendKexInit: %v", err)
  139. }
  140. // the key change will fail, and afterwards we can't write.
  141. if err := trC.writePacket([]byte{msgRequestSuccess, 43}); err == nil {
  142. t.Errorf("writePacket after botched rekey succeeded.")
  143. }
  144. readback, err := trS.readPacket()
  145. if err != nil {
  146. t.Fatalf("server closed too soon: %v", err)
  147. }
  148. if bytes.Compare(readback, packet) != 0 {
  149. t.Errorf("got %q want %q", readback, packet)
  150. }
  151. readback, err = trS.readPacket()
  152. if err == nil {
  153. t.Errorf("got a message %q after failed key change", readback)
  154. }
  155. }
  156. func TestHandshakeTwice(t *testing.T) {
  157. checker := &testChecker{}
  158. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  159. if err != nil {
  160. t.Fatalf("handshakePair: %v", err)
  161. }
  162. defer trC.Close()
  163. defer trS.Close()
  164. // send a packet
  165. packet := make([]byte, 5)
  166. packet[0] = msgRequestSuccess
  167. if err := trC.writePacket(packet); err != nil {
  168. t.Errorf("writePacket: %v", err)
  169. }
  170. // Now request a key change.
  171. _, _, err = trC.sendKexInit()
  172. if err != nil {
  173. t.Errorf("sendKexInit: %v", err)
  174. }
  175. // Send another packet. Use a fresh one, since writePacket destroys.
  176. packet = make([]byte, 5)
  177. packet[0] = msgRequestSuccess
  178. if err := trC.writePacket(packet); err != nil {
  179. t.Errorf("writePacket: %v", err)
  180. }
  181. // 2nd key change.
  182. _, _, err = trC.sendKexInit()
  183. if err != nil {
  184. t.Errorf("sendKexInit: %v", err)
  185. }
  186. packet = make([]byte, 5)
  187. packet[0] = msgRequestSuccess
  188. if err := trC.writePacket(packet); err != nil {
  189. t.Errorf("writePacket: %v", err)
  190. }
  191. packet = make([]byte, 5)
  192. packet[0] = msgRequestSuccess
  193. for i := 0; i < 5; i++ {
  194. msg, err := trS.readPacket()
  195. if err != nil {
  196. t.Fatalf("server closed too soon: %v", err)
  197. }
  198. if msg[0] == msgNewKeys {
  199. continue
  200. }
  201. if bytes.Compare(msg, packet) != 0 {
  202. t.Errorf("packet %d: got %q want %q", i, msg, packet)
  203. }
  204. }
  205. if len(checker.calls) != 2 {
  206. t.Errorf("got %d key changes, want 2", len(checker.calls))
  207. }
  208. }
  209. func TestHandshakeAutoRekeyWrite(t *testing.T) {
  210. checker := &testChecker{}
  211. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  212. clientConf.RekeyThreshold = 500
  213. trC, trS, err := handshakePair(clientConf, "addr")
  214. if err != nil {
  215. t.Fatalf("handshakePair: %v", err)
  216. }
  217. defer trC.Close()
  218. defer trS.Close()
  219. for i := 0; i < 5; i++ {
  220. packet := make([]byte, 251)
  221. packet[0] = msgRequestSuccess
  222. if err := trC.writePacket(packet); err != nil {
  223. t.Errorf("writePacket: %v", err)
  224. }
  225. }
  226. j := 0
  227. for ; j < 5; j++ {
  228. _, err := trS.readPacket()
  229. if err != nil {
  230. break
  231. }
  232. }
  233. if j != 5 {
  234. t.Errorf("got %d, want 5 messages", j)
  235. }
  236. if len(checker.calls) != 2 {
  237. t.Errorf("got %d key changes, wanted 2", len(checker.calls))
  238. }
  239. }
  240. type syncChecker struct {
  241. called chan int
  242. }
  243. func (t *syncChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  244. t.called <- 1
  245. return nil
  246. }
  247. func TestHandshakeAutoRekeyRead(t *testing.T) {
  248. sync := &syncChecker{make(chan int, 2)}
  249. clientConf := &ClientConfig{
  250. HostKeyCallback: sync.Check,
  251. }
  252. clientConf.RekeyThreshold = 500
  253. trC, trS, err := handshakePair(clientConf, "addr")
  254. if err != nil {
  255. t.Fatalf("handshakePair: %v", err)
  256. }
  257. defer trC.Close()
  258. defer trS.Close()
  259. packet := make([]byte, 501)
  260. packet[0] = msgRequestSuccess
  261. if err := trS.writePacket(packet); err != nil {
  262. t.Fatalf("writePacket: %v", err)
  263. }
  264. // While we read out the packet, a key change will be
  265. // initiated.
  266. if _, err := trC.readPacket(); err != nil {
  267. t.Fatalf("readPacket(client): %v", err)
  268. }
  269. <-sync.called
  270. }