handshake_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528
  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "fmt"
  10. "io"
  11. "net"
  12. "reflect"
  13. "runtime"
  14. "strings"
  15. "sync"
  16. "testing"
  17. )
  18. type testChecker struct {
  19. calls []string
  20. }
  21. func (t *testChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  22. if dialAddr == "bad" {
  23. return fmt.Errorf("dialAddr is bad")
  24. }
  25. if tcpAddr, ok := addr.(*net.TCPAddr); !ok || tcpAddr == nil {
  26. return fmt.Errorf("testChecker: got %T want *net.TCPAddr", addr)
  27. }
  28. t.calls = append(t.calls, fmt.Sprintf("%s %v %s %x", dialAddr, addr, key.Type(), key.Marshal()))
  29. return nil
  30. }
  31. // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and
  32. // therefore is buffered (net.Pipe deadlocks if both sides start with
  33. // a write.)
  34. func netPipe() (net.Conn, net.Conn, error) {
  35. listener, err := net.Listen("tcp", "127.0.0.1:0")
  36. if err != nil {
  37. return nil, nil, err
  38. }
  39. defer listener.Close()
  40. c1, err := net.Dial("tcp", listener.Addr().String())
  41. if err != nil {
  42. return nil, nil, err
  43. }
  44. c2, err := listener.Accept()
  45. if err != nil {
  46. c1.Close()
  47. return nil, nil, err
  48. }
  49. return c1, c2, nil
  50. }
  51. // noiseTransport inserts ignore messages to check that the read loop
  52. // and the key exchange filters out these messages.
  53. type noiseTransport struct {
  54. keyingTransport
  55. }
  56. func (t *noiseTransport) writePacket(p []byte) error {
  57. ignore := []byte{msgIgnore}
  58. if err := t.keyingTransport.writePacket(ignore); err != nil {
  59. return err
  60. }
  61. debug := []byte{msgDebug, 1, 2, 3}
  62. if err := t.keyingTransport.writePacket(debug); err != nil {
  63. return err
  64. }
  65. return t.keyingTransport.writePacket(p)
  66. }
  67. func addNoiseTransport(t keyingTransport) keyingTransport {
  68. return &noiseTransport{t}
  69. }
  70. // handshakePair creates two handshakeTransports connected with each
  71. // other. If the noise argument is true, both transports will try to
  72. // confuse the other side by sending ignore and debug messages.
  73. func handshakePair(clientConf *ClientConfig, addr string, noise bool) (client *handshakeTransport, server *handshakeTransport, err error) {
  74. a, b, err := netPipe()
  75. if err != nil {
  76. return nil, nil, err
  77. }
  78. var trC, trS keyingTransport
  79. trC = newTransport(a, rand.Reader, true)
  80. trS = newTransport(b, rand.Reader, false)
  81. if noise {
  82. trC = addNoiseTransport(trC)
  83. trS = addNoiseTransport(trS)
  84. }
  85. clientConf.SetDefaults()
  86. v := []byte("version")
  87. client = newClientTransport(trC, v, v, clientConf, addr, a.RemoteAddr())
  88. serverConf := &ServerConfig{}
  89. serverConf.AddHostKey(testSigners["ecdsa"])
  90. serverConf.AddHostKey(testSigners["rsa"])
  91. serverConf.SetDefaults()
  92. server = newServerTransport(trS, v, v, serverConf)
  93. return client, server, nil
  94. }
  95. func TestHandshakeBasic(t *testing.T) {
  96. if runtime.GOOS == "plan9" {
  97. t.Skip("see golang.org/issue/7237")
  98. }
  99. checker := &testChecker{}
  100. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", true)
  101. if err != nil {
  102. t.Fatalf("handshakePair: %v", err)
  103. }
  104. defer trC.Close()
  105. defer trS.Close()
  106. clientDone := make(chan int, 0)
  107. go func() {
  108. defer close(clientDone)
  109. // Client writes a bunch of stuff, and does a key
  110. // change in the middle. This should not confuse the
  111. // handshake in progress
  112. for i := 0; i < 10; i++ {
  113. p := []byte{msgRequestSuccess, byte(i)}
  114. if err := trC.writePacket(p); err != nil {
  115. t.Fatalf("sendPacket: %v", err)
  116. }
  117. if i == 5 {
  118. // halfway through, we request a key change.
  119. err := trC.sendKexInit(subsequentKeyExchange)
  120. if err != nil {
  121. t.Fatalf("sendKexInit: %v", err)
  122. }
  123. }
  124. }
  125. trC.Close()
  126. }()
  127. // Server checks that client messages come in cleanly
  128. i := 0
  129. err = nil
  130. for {
  131. var p []byte
  132. p, err = trS.readPacket()
  133. if err != nil {
  134. break
  135. }
  136. if p[0] == msgNewKeys {
  137. continue
  138. }
  139. want := []byte{msgRequestSuccess, byte(i)}
  140. if bytes.Compare(p, want) != 0 {
  141. t.Errorf("message %d: got %q, want %q", i, p, want)
  142. }
  143. i++
  144. }
  145. <-clientDone
  146. if err != nil && err != io.EOF {
  147. t.Fatalf("server error: %v", err)
  148. }
  149. if i != 10 {
  150. t.Errorf("received %d messages, want 10.", i)
  151. }
  152. // If all went well, we registered exactly 1 key change.
  153. if len(checker.calls) != 1 {
  154. t.Fatalf("got %d host key checks, want 1", len(checker.calls))
  155. }
  156. pub := testSigners["ecdsa"].PublicKey()
  157. want := fmt.Sprintf("%s %v %s %x", "addr", trC.remoteAddr, pub.Type(), pub.Marshal())
  158. if want != checker.calls[0] {
  159. t.Errorf("got %q want %q for host key check", checker.calls[0], want)
  160. }
  161. }
  162. func TestHandshakeError(t *testing.T) {
  163. checker := &testChecker{}
  164. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "bad", false)
  165. if err != nil {
  166. t.Fatalf("handshakePair: %v", err)
  167. }
  168. defer trC.Close()
  169. defer trS.Close()
  170. // send a packet
  171. packet := []byte{msgRequestSuccess, 42}
  172. if err := trC.writePacket(packet); err != nil {
  173. t.Errorf("writePacket: %v", err)
  174. }
  175. // Now request a key change.
  176. err = trC.sendKexInit(subsequentKeyExchange)
  177. if err != nil {
  178. t.Errorf("sendKexInit: %v", err)
  179. }
  180. // the key change will fail, and afterwards we can't write.
  181. if err := trC.writePacket([]byte{msgRequestSuccess, 43}); err == nil {
  182. t.Errorf("writePacket after botched rekey succeeded.")
  183. }
  184. readback, err := trS.readPacket()
  185. if err != nil {
  186. t.Fatalf("server closed too soon: %v", err)
  187. }
  188. if bytes.Compare(readback, packet) != 0 {
  189. t.Errorf("got %q want %q", readback, packet)
  190. }
  191. readback, err = trS.readPacket()
  192. if err == nil {
  193. t.Errorf("got a message %q after failed key change", readback)
  194. }
  195. }
  196. func TestForceFirstKex(t *testing.T) {
  197. checker := &testChecker{}
  198. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", false)
  199. if err != nil {
  200. t.Fatalf("handshakePair: %v", err)
  201. }
  202. defer trC.Close()
  203. defer trS.Close()
  204. trC.writePacket(Marshal(&serviceRequestMsg{serviceUserAuth}))
  205. // We setup the initial key exchange, but the remote side
  206. // tries to send serviceRequestMsg in cleartext, which is
  207. // disallowed.
  208. err = trS.sendKexInit(firstKeyExchange)
  209. if err == nil {
  210. t.Errorf("server first kex init should reject unexpected packet")
  211. }
  212. }
  213. func TestHandshakeTwice(t *testing.T) {
  214. checker := &testChecker{}
  215. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", false)
  216. if err != nil {
  217. t.Fatalf("handshakePair: %v", err)
  218. }
  219. defer trC.Close()
  220. defer trS.Close()
  221. // Both sides should ask for the first key exchange first.
  222. err = trS.sendKexInit(firstKeyExchange)
  223. if err != nil {
  224. t.Errorf("server sendKexInit: %v", err)
  225. }
  226. err = trC.sendKexInit(firstKeyExchange)
  227. if err != nil {
  228. t.Errorf("client sendKexInit: %v", err)
  229. }
  230. sent := 0
  231. // send a packet
  232. packet := make([]byte, 5)
  233. packet[0] = msgRequestSuccess
  234. if err := trC.writePacket(packet); err != nil {
  235. t.Errorf("writePacket: %v", err)
  236. }
  237. sent++
  238. // Send another packet. Use a fresh one, since writePacket destroys.
  239. packet = make([]byte, 5)
  240. packet[0] = msgRequestSuccess
  241. if err := trC.writePacket(packet); err != nil {
  242. t.Errorf("writePacket: %v", err)
  243. }
  244. sent++
  245. // 2nd key change.
  246. err = trC.sendKexInit(subsequentKeyExchange)
  247. if err != nil {
  248. t.Errorf("sendKexInit: %v", err)
  249. }
  250. packet = make([]byte, 5)
  251. packet[0] = msgRequestSuccess
  252. if err := trC.writePacket(packet); err != nil {
  253. t.Errorf("writePacket: %v", err)
  254. }
  255. sent++
  256. packet = make([]byte, 5)
  257. packet[0] = msgRequestSuccess
  258. for i := 0; i < sent; i++ {
  259. msg, err := trS.readPacket()
  260. if err != nil {
  261. t.Fatalf("server closed too soon: %v", err)
  262. }
  263. if bytes.Compare(msg, packet) != 0 {
  264. t.Errorf("packet %d: got %q want %q", i, msg, packet)
  265. }
  266. }
  267. if len(checker.calls) != 2 {
  268. t.Errorf("got %d key changes, want 2", len(checker.calls))
  269. }
  270. }
  271. func TestHandshakeAutoRekeyWrite(t *testing.T) {
  272. checker := &testChecker{}
  273. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  274. clientConf.RekeyThreshold = 500
  275. trC, trS, err := handshakePair(clientConf, "addr", false)
  276. if err != nil {
  277. t.Fatalf("handshakePair: %v", err)
  278. }
  279. defer trC.Close()
  280. defer trS.Close()
  281. for i := 0; i < 5; i++ {
  282. packet := make([]byte, 251)
  283. packet[0] = msgRequestSuccess
  284. if err := trC.writePacket(packet); err != nil {
  285. t.Errorf("writePacket: %v", err)
  286. }
  287. }
  288. j := 0
  289. for ; j < 5; j++ {
  290. _, err := trS.readPacket()
  291. if err != nil {
  292. break
  293. }
  294. }
  295. if j != 5 {
  296. t.Errorf("got %d, want 5 messages", j)
  297. }
  298. if len(checker.calls) != 2 {
  299. t.Errorf("got %d key changes, wanted 2", len(checker.calls))
  300. }
  301. }
  302. type syncChecker struct {
  303. called chan int
  304. }
  305. func (t *syncChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  306. t.called <- 1
  307. return nil
  308. }
  309. func TestHandshakeAutoRekeyRead(t *testing.T) {
  310. sync := &syncChecker{make(chan int, 2)}
  311. clientConf := &ClientConfig{
  312. HostKeyCallback: sync.Check,
  313. }
  314. clientConf.RekeyThreshold = 500
  315. trC, trS, err := handshakePair(clientConf, "addr", false)
  316. if err != nil {
  317. t.Fatalf("handshakePair: %v", err)
  318. }
  319. defer trC.Close()
  320. defer trS.Close()
  321. packet := make([]byte, 501)
  322. packet[0] = msgRequestSuccess
  323. if err := trS.writePacket(packet); err != nil {
  324. t.Fatalf("writePacket: %v", err)
  325. }
  326. // While we read out the packet, a key change will be
  327. // initiated.
  328. if _, err := trC.readPacket(); err != nil {
  329. t.Fatalf("readPacket(client): %v", err)
  330. }
  331. <-sync.called
  332. }
  333. // errorKeyingTransport generates errors after a given number of
  334. // read/write operations.
  335. type errorKeyingTransport struct {
  336. packetConn
  337. readLeft, writeLeft int
  338. }
  339. func (n *errorKeyingTransport) prepareKeyChange(*algorithms, *kexResult) error {
  340. return nil
  341. }
  342. func (n *errorKeyingTransport) getSessionID() []byte {
  343. return nil
  344. }
  345. func (n *errorKeyingTransport) writePacket(packet []byte) error {
  346. if n.writeLeft == 0 {
  347. n.Close()
  348. return errors.New("barf")
  349. }
  350. n.writeLeft--
  351. return n.packetConn.writePacket(packet)
  352. }
  353. func (n *errorKeyingTransport) readPacket() ([]byte, error) {
  354. if n.readLeft == 0 {
  355. n.Close()
  356. return nil, errors.New("barf")
  357. }
  358. n.readLeft--
  359. return n.packetConn.readPacket()
  360. }
  361. func TestHandshakeErrorHandlingRead(t *testing.T) {
  362. for i := 0; i < 20; i++ {
  363. testHandshakeErrorHandlingN(t, i, -1)
  364. }
  365. }
  366. func TestHandshakeErrorHandlingWrite(t *testing.T) {
  367. for i := 0; i < 20; i++ {
  368. testHandshakeErrorHandlingN(t, -1, i)
  369. }
  370. }
  371. // testHandshakeErrorHandlingN runs handshakes, injecting errors. If
  372. // handshakeTransport deadlocks, the go runtime will detect it and
  373. // panic.
  374. func testHandshakeErrorHandlingN(t *testing.T, readLimit, writeLimit int) {
  375. msg := Marshal(&serviceRequestMsg{strings.Repeat("x", int(minRekeyThreshold)/4)})
  376. a, b := memPipe()
  377. defer a.Close()
  378. defer b.Close()
  379. key := testSigners["ecdsa"]
  380. serverConf := Config{RekeyThreshold: minRekeyThreshold}
  381. serverConf.SetDefaults()
  382. serverConn := newHandshakeTransport(&errorKeyingTransport{a, readLimit, writeLimit}, &serverConf, []byte{'a'}, []byte{'b'})
  383. serverConn.hostKeys = []Signer{key}
  384. go serverConn.readLoop()
  385. clientConf := Config{RekeyThreshold: 10 * minRekeyThreshold}
  386. clientConf.SetDefaults()
  387. clientConn := newHandshakeTransport(&errorKeyingTransport{b, -1, -1}, &clientConf, []byte{'a'}, []byte{'b'})
  388. clientConn.hostKeyAlgorithms = []string{key.PublicKey().Type()}
  389. go clientConn.readLoop()
  390. var wg sync.WaitGroup
  391. wg.Add(4)
  392. for _, hs := range []packetConn{serverConn, clientConn} {
  393. go func(c packetConn) {
  394. for {
  395. err := c.writePacket(msg)
  396. if err != nil {
  397. break
  398. }
  399. }
  400. wg.Done()
  401. }(hs)
  402. go func(c packetConn) {
  403. for {
  404. _, err := c.readPacket()
  405. if err != nil {
  406. break
  407. }
  408. }
  409. wg.Done()
  410. }(hs)
  411. }
  412. wg.Wait()
  413. }
  414. func TestDisconnect(t *testing.T) {
  415. if runtime.GOOS == "plan9" {
  416. t.Skip("see golang.org/issue/7237")
  417. }
  418. checker := &testChecker{}
  419. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", false)
  420. if err != nil {
  421. t.Fatalf("handshakePair: %v", err)
  422. }
  423. defer trC.Close()
  424. defer trS.Close()
  425. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  426. errMsg := &disconnectMsg{
  427. Reason: 42,
  428. Message: "such is life",
  429. }
  430. trC.writePacket(Marshal(errMsg))
  431. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  432. packet, err := trS.readPacket()
  433. if err != nil {
  434. t.Fatalf("readPacket 1: %v", err)
  435. }
  436. if packet[0] != msgRequestSuccess {
  437. t.Errorf("got packet %v, want packet type %d", packet, msgRequestSuccess)
  438. }
  439. _, err = trS.readPacket()
  440. if err == nil {
  441. t.Errorf("readPacket 2 succeeded")
  442. } else if !reflect.DeepEqual(err, errMsg) {
  443. t.Errorf("got error %#v, want %#v", err, errMsg)
  444. }
  445. _, err = trS.readPacket()
  446. if err == nil {
  447. t.Errorf("readPacket 3 succeeded")
  448. }
  449. }