handshake_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486
  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "fmt"
  10. "net"
  11. "reflect"
  12. "runtime"
  13. "strings"
  14. "sync"
  15. "testing"
  16. )
  17. type testChecker struct {
  18. calls []string
  19. }
  20. func (t *testChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  21. if dialAddr == "bad" {
  22. return fmt.Errorf("dialAddr is bad")
  23. }
  24. if tcpAddr, ok := addr.(*net.TCPAddr); !ok || tcpAddr == nil {
  25. return fmt.Errorf("testChecker: got %T want *net.TCPAddr", addr)
  26. }
  27. t.calls = append(t.calls, fmt.Sprintf("%s %v %s %x", dialAddr, addr, key.Type(), key.Marshal()))
  28. return nil
  29. }
  30. // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and
  31. // therefore is buffered (net.Pipe deadlocks if both sides start with
  32. // a write.)
  33. func netPipe() (net.Conn, net.Conn, error) {
  34. listener, err := net.Listen("tcp", "127.0.0.1:0")
  35. if err != nil {
  36. return nil, nil, err
  37. }
  38. defer listener.Close()
  39. c1, err := net.Dial("tcp", listener.Addr().String())
  40. if err != nil {
  41. return nil, nil, err
  42. }
  43. c2, err := listener.Accept()
  44. if err != nil {
  45. c1.Close()
  46. return nil, nil, err
  47. }
  48. return c1, c2, nil
  49. }
  50. func handshakePair(clientConf *ClientConfig, addr string) (client *handshakeTransport, server *handshakeTransport, err error) {
  51. a, b, err := netPipe()
  52. if err != nil {
  53. return nil, nil, err
  54. }
  55. trC := newTransport(a, rand.Reader, true)
  56. trS := newTransport(b, rand.Reader, false)
  57. clientConf.SetDefaults()
  58. v := []byte("version")
  59. client = newClientTransport(trC, v, v, clientConf, addr, a.RemoteAddr())
  60. serverConf := &ServerConfig{}
  61. serverConf.AddHostKey(testSigners["ecdsa"])
  62. serverConf.AddHostKey(testSigners["rsa"])
  63. serverConf.SetDefaults()
  64. server = newServerTransport(trS, v, v, serverConf)
  65. return client, server, nil
  66. }
  67. func TestHandshakeBasic(t *testing.T) {
  68. if runtime.GOOS == "plan9" {
  69. t.Skip("see golang.org/issue/7237")
  70. }
  71. checker := &testChecker{}
  72. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  73. if err != nil {
  74. t.Fatalf("handshakePair: %v", err)
  75. }
  76. defer trC.Close()
  77. defer trS.Close()
  78. go func() {
  79. // Client writes a bunch of stuff, and does a key
  80. // change in the middle. This should not confuse the
  81. // handshake in progress
  82. for i := 0; i < 10; i++ {
  83. p := []byte{msgRequestSuccess, byte(i)}
  84. if err := trC.writePacket(p); err != nil {
  85. t.Fatalf("sendPacket: %v", err)
  86. }
  87. if i == 5 {
  88. // halfway through, we request a key change.
  89. err := trC.sendKexInit(subsequentKeyExchange)
  90. if err != nil {
  91. t.Fatalf("sendKexInit: %v", err)
  92. }
  93. }
  94. }
  95. trC.Close()
  96. }()
  97. // Server checks that client messages come in cleanly
  98. i := 0
  99. for {
  100. p, err := trS.readPacket()
  101. if err != nil {
  102. break
  103. }
  104. if p[0] == msgNewKeys {
  105. continue
  106. }
  107. want := []byte{msgRequestSuccess, byte(i)}
  108. if bytes.Compare(p, want) != 0 {
  109. t.Errorf("message %d: got %q, want %q", i, p, want)
  110. }
  111. i++
  112. }
  113. if i != 10 {
  114. t.Errorf("received %d messages, want 10.", i)
  115. }
  116. // If all went well, we registered exactly 1 key change.
  117. if len(checker.calls) != 1 {
  118. t.Fatalf("got %d host key checks, want 1", len(checker.calls))
  119. }
  120. pub := testSigners["ecdsa"].PublicKey()
  121. want := fmt.Sprintf("%s %v %s %x", "addr", trC.remoteAddr, pub.Type(), pub.Marshal())
  122. if want != checker.calls[0] {
  123. t.Errorf("got %q want %q for host key check", checker.calls[0], want)
  124. }
  125. }
  126. func TestHandshakeError(t *testing.T) {
  127. checker := &testChecker{}
  128. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "bad")
  129. if err != nil {
  130. t.Fatalf("handshakePair: %v", err)
  131. }
  132. defer trC.Close()
  133. defer trS.Close()
  134. // send a packet
  135. packet := []byte{msgRequestSuccess, 42}
  136. if err := trC.writePacket(packet); err != nil {
  137. t.Errorf("writePacket: %v", err)
  138. }
  139. // Now request a key change.
  140. err = trC.sendKexInit(subsequentKeyExchange)
  141. if err != nil {
  142. t.Errorf("sendKexInit: %v", err)
  143. }
  144. // the key change will fail, and afterwards we can't write.
  145. if err := trC.writePacket([]byte{msgRequestSuccess, 43}); err == nil {
  146. t.Errorf("writePacket after botched rekey succeeded.")
  147. }
  148. readback, err := trS.readPacket()
  149. if err != nil {
  150. t.Fatalf("server closed too soon: %v", err)
  151. }
  152. if bytes.Compare(readback, packet) != 0 {
  153. t.Errorf("got %q want %q", readback, packet)
  154. }
  155. readback, err = trS.readPacket()
  156. if err == nil {
  157. t.Errorf("got a message %q after failed key change", readback)
  158. }
  159. }
  160. func TestForceFirstKex(t *testing.T) {
  161. checker := &testChecker{}
  162. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  163. if err != nil {
  164. t.Fatalf("handshakePair: %v", err)
  165. }
  166. defer trC.Close()
  167. defer trS.Close()
  168. trC.writePacket(Marshal(&serviceRequestMsg{serviceUserAuth}))
  169. // We setup the initial key exchange, but the remote side
  170. // tries to send serviceRequestMsg in cleartext, which is
  171. // disallowed.
  172. err = trS.sendKexInit(firstKeyExchange)
  173. if err == nil {
  174. t.Errorf("server first kex init should reject unexpected packet")
  175. }
  176. }
  177. func TestHandshakeTwice(t *testing.T) {
  178. checker := &testChecker{}
  179. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  180. if err != nil {
  181. t.Fatalf("handshakePair: %v", err)
  182. }
  183. defer trC.Close()
  184. defer trS.Close()
  185. // Both sides should ask for the first key exchange first.
  186. err = trS.sendKexInit(firstKeyExchange)
  187. if err != nil {
  188. t.Errorf("server sendKexInit: %v", err)
  189. }
  190. err = trC.sendKexInit(firstKeyExchange)
  191. if err != nil {
  192. t.Errorf("client sendKexInit: %v", err)
  193. }
  194. sent := 0
  195. // send a packet
  196. packet := make([]byte, 5)
  197. packet[0] = msgRequestSuccess
  198. if err := trC.writePacket(packet); err != nil {
  199. t.Errorf("writePacket: %v", err)
  200. }
  201. sent++
  202. // Send another packet. Use a fresh one, since writePacket destroys.
  203. packet = make([]byte, 5)
  204. packet[0] = msgRequestSuccess
  205. if err := trC.writePacket(packet); err != nil {
  206. t.Errorf("writePacket: %v", err)
  207. }
  208. sent++
  209. // 2nd key change.
  210. err = trC.sendKexInit(subsequentKeyExchange)
  211. if err != nil {
  212. t.Errorf("sendKexInit: %v", err)
  213. }
  214. packet = make([]byte, 5)
  215. packet[0] = msgRequestSuccess
  216. if err := trC.writePacket(packet); err != nil {
  217. t.Errorf("writePacket: %v", err)
  218. }
  219. sent++
  220. packet = make([]byte, 5)
  221. packet[0] = msgRequestSuccess
  222. for i := 0; i < sent; i++ {
  223. msg, err := trS.readPacket()
  224. if err != nil {
  225. t.Fatalf("server closed too soon: %v", err)
  226. }
  227. if bytes.Compare(msg, packet) != 0 {
  228. t.Errorf("packet %d: got %q want %q", i, msg, packet)
  229. }
  230. }
  231. if len(checker.calls) != 2 {
  232. t.Errorf("got %d key changes, want 2", len(checker.calls))
  233. }
  234. }
  235. func TestHandshakeAutoRekeyWrite(t *testing.T) {
  236. checker := &testChecker{}
  237. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  238. clientConf.RekeyThreshold = 500
  239. trC, trS, err := handshakePair(clientConf, "addr")
  240. if err != nil {
  241. t.Fatalf("handshakePair: %v", err)
  242. }
  243. defer trC.Close()
  244. defer trS.Close()
  245. for i := 0; i < 5; i++ {
  246. packet := make([]byte, 251)
  247. packet[0] = msgRequestSuccess
  248. if err := trC.writePacket(packet); err != nil {
  249. t.Errorf("writePacket: %v", err)
  250. }
  251. }
  252. j := 0
  253. for ; j < 5; j++ {
  254. _, err := trS.readPacket()
  255. if err != nil {
  256. break
  257. }
  258. }
  259. if j != 5 {
  260. t.Errorf("got %d, want 5 messages", j)
  261. }
  262. if len(checker.calls) != 2 {
  263. t.Errorf("got %d key changes, wanted 2", len(checker.calls))
  264. }
  265. }
  266. type syncChecker struct {
  267. called chan int
  268. }
  269. func (t *syncChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  270. t.called <- 1
  271. return nil
  272. }
  273. func TestHandshakeAutoRekeyRead(t *testing.T) {
  274. sync := &syncChecker{make(chan int, 2)}
  275. clientConf := &ClientConfig{
  276. HostKeyCallback: sync.Check,
  277. }
  278. clientConf.RekeyThreshold = 500
  279. trC, trS, err := handshakePair(clientConf, "addr")
  280. if err != nil {
  281. t.Fatalf("handshakePair: %v", err)
  282. }
  283. defer trC.Close()
  284. defer trS.Close()
  285. packet := make([]byte, 501)
  286. packet[0] = msgRequestSuccess
  287. if err := trS.writePacket(packet); err != nil {
  288. t.Fatalf("writePacket: %v", err)
  289. }
  290. // While we read out the packet, a key change will be
  291. // initiated.
  292. if _, err := trC.readPacket(); err != nil {
  293. t.Fatalf("readPacket(client): %v", err)
  294. }
  295. <-sync.called
  296. }
  297. // errorKeyingTransport generates errors after a given number of
  298. // read/write operations.
  299. type errorKeyingTransport struct {
  300. packetConn
  301. readLeft, writeLeft int
  302. }
  303. func (n *errorKeyingTransport) prepareKeyChange(*algorithms, *kexResult) error {
  304. return nil
  305. }
  306. func (n *errorKeyingTransport) getSessionID() []byte {
  307. return nil
  308. }
  309. func (n *errorKeyingTransport) writePacket(packet []byte) error {
  310. if n.writeLeft == 0 {
  311. n.Close()
  312. return errors.New("barf")
  313. }
  314. n.writeLeft--
  315. return n.packetConn.writePacket(packet)
  316. }
  317. func (n *errorKeyingTransport) readPacket() ([]byte, error) {
  318. if n.readLeft == 0 {
  319. n.Close()
  320. return nil, errors.New("barf")
  321. }
  322. n.readLeft--
  323. return n.packetConn.readPacket()
  324. }
  325. func TestHandshakeErrorHandlingRead(t *testing.T) {
  326. for i := 0; i < 20; i++ {
  327. testHandshakeErrorHandlingN(t, i, -1)
  328. }
  329. }
  330. func TestHandshakeErrorHandlingWrite(t *testing.T) {
  331. for i := 0; i < 20; i++ {
  332. testHandshakeErrorHandlingN(t, -1, i)
  333. }
  334. }
  335. // testHandshakeErrorHandlingN runs handshakes, injecting errors. If
  336. // handshakeTransport deadlocks, the go runtime will detect it and
  337. // panic.
  338. func testHandshakeErrorHandlingN(t *testing.T, readLimit, writeLimit int) {
  339. msg := Marshal(&serviceRequestMsg{strings.Repeat("x", int(minRekeyThreshold)/4)})
  340. a, b := memPipe()
  341. defer a.Close()
  342. defer b.Close()
  343. key := testSigners["ecdsa"]
  344. serverConf := Config{RekeyThreshold: minRekeyThreshold}
  345. serverConf.SetDefaults()
  346. serverConn := newHandshakeTransport(&errorKeyingTransport{a, readLimit, writeLimit}, &serverConf, []byte{'a'}, []byte{'b'})
  347. serverConn.hostKeys = []Signer{key}
  348. go serverConn.readLoop()
  349. clientConf := Config{RekeyThreshold: 10 * minRekeyThreshold}
  350. clientConf.SetDefaults()
  351. clientConn := newHandshakeTransport(&errorKeyingTransport{b, -1, -1}, &clientConf, []byte{'a'}, []byte{'b'})
  352. clientConn.hostKeyAlgorithms = []string{key.PublicKey().Type()}
  353. go clientConn.readLoop()
  354. var wg sync.WaitGroup
  355. wg.Add(4)
  356. for _, hs := range []packetConn{serverConn, clientConn} {
  357. go func(c packetConn) {
  358. for {
  359. err := c.writePacket(msg)
  360. if err != nil {
  361. break
  362. }
  363. }
  364. wg.Done()
  365. }(hs)
  366. go func(c packetConn) {
  367. for {
  368. _, err := c.readPacket()
  369. if err != nil {
  370. break
  371. }
  372. }
  373. wg.Done()
  374. }(hs)
  375. }
  376. wg.Wait()
  377. }
  378. func TestDisconnect(t *testing.T) {
  379. if runtime.GOOS == "plan9" {
  380. t.Skip("see golang.org/issue/7237")
  381. }
  382. checker := &testChecker{}
  383. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  384. if err != nil {
  385. t.Fatalf("handshakePair: %v", err)
  386. }
  387. defer trC.Close()
  388. defer trS.Close()
  389. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  390. errMsg := &disconnectMsg{
  391. Reason: 42,
  392. Message: "such is life",
  393. }
  394. trC.writePacket(Marshal(errMsg))
  395. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  396. packet, err := trS.readPacket()
  397. if err != nil {
  398. t.Fatalf("readPacket 1: %v", err)
  399. }
  400. if packet[0] != msgRequestSuccess {
  401. t.Errorf("got packet %v, want packet type %d", packet, msgRequestSuccess)
  402. }
  403. _, err = trS.readPacket()
  404. if err == nil {
  405. t.Errorf("readPacket 2 succeeded")
  406. } else if !reflect.DeepEqual(err, errMsg) {
  407. t.Errorf("got error %#v, want %#v", err, errMsg)
  408. }
  409. _, err = trS.readPacket()
  410. if err == nil {
  411. t.Errorf("readPacket 3 succeeded")
  412. }
  413. }