handshake_test.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311
  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "fmt"
  9. "net"
  10. "testing"
  11. )
  12. type testChecker struct {
  13. calls []string
  14. }
  15. func (t *testChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  16. if dialAddr == "bad" {
  17. return fmt.Errorf("dialAddr is bad")
  18. }
  19. if tcpAddr, ok := addr.(*net.TCPAddr); !ok || tcpAddr == nil {
  20. return fmt.Errorf("testChecker: got %T want *net.TCPAddr", addr)
  21. }
  22. t.calls = append(t.calls, fmt.Sprintf("%s %v %s %x", dialAddr, addr, key.Type(), key.Marshal()))
  23. return nil
  24. }
  25. // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and
  26. // therefore is buffered (net.Pipe deadlocks if both sides start with
  27. // a write.)
  28. func netPipe() (net.Conn, net.Conn, error) {
  29. listener, err := net.Listen("tcp", "127.0.0.1:0")
  30. if err != nil {
  31. return nil, nil, err
  32. }
  33. defer listener.Close()
  34. c1, err := net.Dial("tcp", listener.Addr().String())
  35. if err != nil {
  36. return nil, nil, err
  37. }
  38. c2, err := listener.Accept()
  39. if err != nil {
  40. c1.Close()
  41. return nil, nil, err
  42. }
  43. return c1, c2, nil
  44. }
  45. func handshakePair(clientConf *ClientConfig, addr string) (client *handshakeTransport, server *handshakeTransport, err error) {
  46. a, b, err := netPipe()
  47. if err != nil {
  48. return nil, nil, err
  49. }
  50. trC := newTransport(a, rand.Reader, true)
  51. trS := newTransport(b, rand.Reader, false)
  52. clientConf.SetDefaults()
  53. v := []byte("version")
  54. client = newClientTransport(trC, v, v, clientConf, addr, a.RemoteAddr())
  55. serverConf := &ServerConfig{}
  56. serverConf.AddHostKey(testSigners["ecdsa"])
  57. serverConf.SetDefaults()
  58. server = newServerTransport(trS, v, v, serverConf)
  59. return client, server, nil
  60. }
  61. func TestHandshakeBasic(t *testing.T) {
  62. checker := &testChecker{}
  63. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  64. if err != nil {
  65. t.Fatalf("handshakePair: %v", err)
  66. }
  67. defer trC.Close()
  68. defer trS.Close()
  69. go func() {
  70. // Client writes a bunch of stuff, and does a key
  71. // change in the middle. This should not confuse the
  72. // handshake in progress
  73. for i := 0; i < 10; i++ {
  74. p := []byte{msgRequestSuccess, byte(i)}
  75. if err := trC.writePacket(p); err != nil {
  76. t.Fatalf("sendPacket: %v", err)
  77. }
  78. if i == 5 {
  79. // halfway through, we request a key change.
  80. _, _, err := trC.sendKexInit()
  81. if err != nil {
  82. t.Fatalf("sendKexInit: %v", err)
  83. }
  84. }
  85. }
  86. trC.Close()
  87. }()
  88. // Server checks that client messages come in cleanly
  89. i := 0
  90. for {
  91. p, err := trS.readPacket()
  92. if err != nil {
  93. break
  94. }
  95. if p[0] == msgNewKeys {
  96. continue
  97. }
  98. want := []byte{msgRequestSuccess, byte(i)}
  99. if bytes.Compare(p, want) != 0 {
  100. t.Errorf("message %d: got %q, want %q", i, p, want)
  101. }
  102. i++
  103. }
  104. if i != 10 {
  105. t.Errorf("received %d messages, want 10.", i)
  106. }
  107. // If all went well, we registered exactly 1 key change.
  108. if len(checker.calls) != 1 {
  109. t.Fatalf("got %d host key checks, want 1", len(checker.calls))
  110. }
  111. pub := testSigners["ecdsa"].PublicKey()
  112. want := fmt.Sprintf("%s %v %s %x", "addr", trC.remoteAddr, pub.Type(), pub.Marshal())
  113. if want != checker.calls[0] {
  114. t.Errorf("got %q want %q for host key check", checker.calls[0], want)
  115. }
  116. }
  117. func TestHandshakeError(t *testing.T) {
  118. checker := &testChecker{}
  119. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "bad")
  120. if err != nil {
  121. t.Fatalf("handshakePair: %v", err)
  122. }
  123. defer trC.Close()
  124. defer trS.Close()
  125. // send a packet
  126. packet := []byte{msgRequestSuccess, 42}
  127. if err := trC.writePacket(packet); err != nil {
  128. t.Errorf("writePacket: %v", err)
  129. }
  130. // Now request a key change.
  131. _, _, err = trC.sendKexInit()
  132. if err != nil {
  133. t.Errorf("sendKexInit: %v", err)
  134. }
  135. // the key change will fail, and afterwards we can't write.
  136. if err := trC.writePacket([]byte{msgRequestSuccess, 43}); err == nil {
  137. t.Errorf("writePacket after botched rekey succeeded.")
  138. }
  139. readback, err := trS.readPacket()
  140. if err != nil {
  141. t.Fatalf("server closed too soon: %v", err)
  142. }
  143. if bytes.Compare(readback, packet) != 0 {
  144. t.Errorf("got %q want %q", readback, packet)
  145. }
  146. readback, err = trS.readPacket()
  147. if err == nil {
  148. t.Errorf("got a message %q after failed key change", readback)
  149. }
  150. }
  151. func TestHandshakeTwice(t *testing.T) {
  152. checker := &testChecker{}
  153. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr")
  154. if err != nil {
  155. t.Fatalf("handshakePair: %v", err)
  156. }
  157. defer trC.Close()
  158. defer trS.Close()
  159. // send a packet
  160. packet := make([]byte, 5)
  161. packet[0] = msgRequestSuccess
  162. if err := trC.writePacket(packet); err != nil {
  163. t.Errorf("writePacket: %v", err)
  164. }
  165. // Now request a key change.
  166. _, _, err = trC.sendKexInit()
  167. if err != nil {
  168. t.Errorf("sendKexInit: %v", err)
  169. }
  170. // Send another packet. Use a fresh one, since writePacket destroys.
  171. packet = make([]byte, 5)
  172. packet[0] = msgRequestSuccess
  173. if err := trC.writePacket(packet); err != nil {
  174. t.Errorf("writePacket: %v", err)
  175. }
  176. // 2nd key change.
  177. _, _, err = trC.sendKexInit()
  178. if err != nil {
  179. t.Errorf("sendKexInit: %v", err)
  180. }
  181. packet = make([]byte, 5)
  182. packet[0] = msgRequestSuccess
  183. if err := trC.writePacket(packet); err != nil {
  184. t.Errorf("writePacket: %v", err)
  185. }
  186. packet = make([]byte, 5)
  187. packet[0] = msgRequestSuccess
  188. for i := 0; i < 5; i++ {
  189. msg, err := trS.readPacket()
  190. if err != nil {
  191. t.Fatalf("server closed too soon: %v", err)
  192. }
  193. if msg[0] == msgNewKeys {
  194. continue
  195. }
  196. if bytes.Compare(msg, packet) != 0 {
  197. t.Errorf("packet %d: got %q want %q", i, msg, packet)
  198. }
  199. }
  200. if len(checker.calls) != 2 {
  201. t.Errorf("got %d key changes, want 2", len(checker.calls))
  202. }
  203. }
  204. func TestHandshakeAutoRekeyWrite(t *testing.T) {
  205. checker := &testChecker{}
  206. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  207. clientConf.RekeyThreshold = 500
  208. trC, trS, err := handshakePair(clientConf, "addr")
  209. if err != nil {
  210. t.Fatalf("handshakePair: %v", err)
  211. }
  212. defer trC.Close()
  213. defer trS.Close()
  214. for i := 0; i < 5; i++ {
  215. packet := make([]byte, 251)
  216. packet[0] = msgRequestSuccess
  217. if err := trC.writePacket(packet); err != nil {
  218. t.Errorf("writePacket: %v", err)
  219. }
  220. }
  221. j := 0
  222. for ; j < 5; j++ {
  223. _, err := trS.readPacket()
  224. if err != nil {
  225. break
  226. }
  227. }
  228. if j != 5 {
  229. t.Errorf("got %d, want 5 messages", j)
  230. }
  231. if len(checker.calls) != 2 {
  232. t.Errorf("got %d key changes, wanted 2", len(checker.calls))
  233. }
  234. }
  235. type syncChecker struct {
  236. called chan int
  237. }
  238. func (t *syncChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  239. t.called <- 1
  240. return nil
  241. }
  242. func TestHandshakeAutoRekeyRead(t *testing.T) {
  243. sync := &syncChecker{make(chan int, 2)}
  244. clientConf := &ClientConfig{
  245. HostKeyCallback: sync.Check,
  246. }
  247. clientConf.RekeyThreshold = 500
  248. trC, trS, err := handshakePair(clientConf, "addr")
  249. if err != nil {
  250. t.Fatalf("handshakePair: %v", err)
  251. }
  252. defer trC.Close()
  253. defer trS.Close()
  254. packet := make([]byte, 501)
  255. packet[0] = msgRequestSuccess
  256. if err := trS.writePacket(packet); err != nil {
  257. t.Fatalf("writePacket: %v", err)
  258. }
  259. // While we read out the packet, a key change will be
  260. // initiated.
  261. if _, err := trC.readPacket(); err != nil {
  262. t.Fatalf("readPacket(client): %v", err)
  263. }
  264. <-sync.called
  265. }