您最多选择25个主题 主题必须以字母或数字开头,可以包含连字符 (-),并且长度不得超过35个字符
 
 
 

528 行
12 KiB

  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "errors"
  9. "fmt"
  10. "io"
  11. "net"
  12. "reflect"
  13. "runtime"
  14. "strings"
  15. "sync"
  16. "testing"
  17. )
  18. type testChecker struct {
  19. calls []string
  20. }
  21. func (t *testChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  22. if dialAddr == "bad" {
  23. return fmt.Errorf("dialAddr is bad")
  24. }
  25. if tcpAddr, ok := addr.(*net.TCPAddr); !ok || tcpAddr == nil {
  26. return fmt.Errorf("testChecker: got %T want *net.TCPAddr", addr)
  27. }
  28. t.calls = append(t.calls, fmt.Sprintf("%s %v %s %x", dialAddr, addr, key.Type(), key.Marshal()))
  29. return nil
  30. }
  31. // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and
  32. // therefore is buffered (net.Pipe deadlocks if both sides start with
  33. // a write.)
  34. func netPipe() (net.Conn, net.Conn, error) {
  35. listener, err := net.Listen("tcp", ":0")
  36. if err != nil {
  37. return nil, nil, err
  38. }
  39. defer listener.Close()
  40. c1, err := net.Dial("tcp", listener.Addr().String())
  41. if err != nil {
  42. return nil, nil, err
  43. }
  44. c2, err := listener.Accept()
  45. if err != nil {
  46. c1.Close()
  47. return nil, nil, err
  48. }
  49. return c1, c2, nil
  50. }
  51. // noiseTransport inserts ignore messages to check that the read loop
  52. // and the key exchange filters out these messages.
  53. type noiseTransport struct {
  54. keyingTransport
  55. }
  56. func (t *noiseTransport) writePacket(p []byte) error {
  57. ignore := []byte{msgIgnore}
  58. if err := t.keyingTransport.writePacket(ignore); err != nil {
  59. return err
  60. }
  61. debug := []byte{msgDebug, 1, 2, 3}
  62. if err := t.keyingTransport.writePacket(debug); err != nil {
  63. return err
  64. }
  65. return t.keyingTransport.writePacket(p)
  66. }
  67. func addNoiseTransport(t keyingTransport) keyingTransport {
  68. return &noiseTransport{t}
  69. }
  70. // handshakePair creates two handshakeTransports connected with each
  71. // other. If the noise argument is true, both transports will try to
  72. // confuse the other side by sending ignore and debug messages.
  73. func handshakePair(clientConf *ClientConfig, addr string, noise bool) (client *handshakeTransport, server *handshakeTransport, err error) {
  74. a, b, err := netPipe()
  75. if err != nil {
  76. return nil, nil, err
  77. }
  78. var trC, trS keyingTransport
  79. trC = newTransport(a, rand.Reader, true)
  80. trS = newTransport(b, rand.Reader, false)
  81. if noise {
  82. trC = addNoiseTransport(trC)
  83. trS = addNoiseTransport(trS)
  84. }
  85. clientConf.SetDefaults()
  86. v := []byte("version")
  87. client = newClientTransport(trC, v, v, clientConf, addr, a.RemoteAddr())
  88. serverConf := &ServerConfig{}
  89. serverConf.AddHostKey(testSigners["ecdsa"])
  90. serverConf.AddHostKey(testSigners["rsa"])
  91. serverConf.SetDefaults()
  92. server = newServerTransport(trS, v, v, serverConf)
  93. if err := server.waitSession(); err != nil {
  94. return nil, nil, fmt.Errorf("server.waitSession: %v", err)
  95. }
  96. if err := client.waitSession(); err != nil {
  97. return nil, nil, fmt.Errorf("client.waitSession: %v", err)
  98. }
  99. return client, server, nil
  100. }
  101. func TestHandshakeBasic(t *testing.T) {
  102. if runtime.GOOS == "plan9" {
  103. t.Skip("see golang.org/issue/7237")
  104. }
  105. checker := &syncChecker{
  106. waitCall: make(chan int, 10),
  107. called: make(chan int, 10),
  108. }
  109. checker.waitCall <- 1
  110. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", false)
  111. if err != nil {
  112. t.Fatalf("handshakePair: %v", err)
  113. }
  114. defer trC.Close()
  115. defer trS.Close()
  116. // Let first kex complete normally.
  117. <-checker.called
  118. clientDone := make(chan int, 0)
  119. gotHalf := make(chan int, 0)
  120. const N = 20
  121. go func() {
  122. defer close(clientDone)
  123. // Client writes a bunch of stuff, and does a key
  124. // change in the middle. This should not confuse the
  125. // handshake in progress. We do this twice, so we test
  126. // that the packet buffer is reset correctly.
  127. for i := 0; i < N; i++ {
  128. p := []byte{msgRequestSuccess, byte(i)}
  129. if err := trC.writePacket(p); err != nil {
  130. t.Fatalf("sendPacket: %v", err)
  131. }
  132. if (i % 10) == 5 {
  133. <-gotHalf
  134. // halfway through, we request a key change.
  135. trC.requestKeyExchange()
  136. // Wait until we can be sure the key
  137. // change has really started before we
  138. // write more.
  139. <-checker.called
  140. }
  141. if (i % 10) == 7 {
  142. // write some packets until the kex
  143. // completes, to test buffering of
  144. // packets.
  145. checker.waitCall <- 1
  146. }
  147. }
  148. }()
  149. // Server checks that client messages come in cleanly
  150. i := 0
  151. err = nil
  152. for ; i < N; i++ {
  153. var p []byte
  154. p, err = trS.readPacket()
  155. if err != nil {
  156. break
  157. }
  158. if (i % 10) == 5 {
  159. gotHalf <- 1
  160. }
  161. want := []byte{msgRequestSuccess, byte(i)}
  162. if bytes.Compare(p, want) != 0 {
  163. t.Errorf("message %d: got %v, want %v", i, p, want)
  164. }
  165. }
  166. <-clientDone
  167. if err != nil && err != io.EOF {
  168. t.Fatalf("server error: %v", err)
  169. }
  170. if i != N {
  171. t.Errorf("received %d messages, want 10.", i)
  172. }
  173. close(checker.called)
  174. if _, ok := <-checker.called; ok {
  175. // If all went well, we registered exactly 2 key changes: one
  176. // that establishes the session, and one that we requested
  177. // additionally.
  178. t.Fatalf("got another host key checks after 2 handshakes")
  179. }
  180. }
  181. func TestForceFirstKex(t *testing.T) {
  182. // like handshakePair, but must access the keyingTransport.
  183. checker := &testChecker{}
  184. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  185. a, b, err := netPipe()
  186. if err != nil {
  187. t.Fatalf("netPipe: %v", err)
  188. }
  189. var trC, trS keyingTransport
  190. trC = newTransport(a, rand.Reader, true)
  191. // This is the disallowed packet:
  192. trC.writePacket(Marshal(&serviceRequestMsg{serviceUserAuth}))
  193. // Rest of the setup.
  194. trS = newTransport(b, rand.Reader, false)
  195. clientConf.SetDefaults()
  196. v := []byte("version")
  197. client := newClientTransport(trC, v, v, clientConf, "addr", a.RemoteAddr())
  198. serverConf := &ServerConfig{}
  199. serverConf.AddHostKey(testSigners["ecdsa"])
  200. serverConf.AddHostKey(testSigners["rsa"])
  201. serverConf.SetDefaults()
  202. server := newServerTransport(trS, v, v, serverConf)
  203. defer client.Close()
  204. defer server.Close()
  205. // We setup the initial key exchange, but the remote side
  206. // tries to send serviceRequestMsg in cleartext, which is
  207. // disallowed.
  208. if err := server.waitSession(); err == nil {
  209. t.Errorf("server first kex init should reject unexpected packet")
  210. }
  211. }
  212. func TestHandshakeAutoRekeyWrite(t *testing.T) {
  213. checker := &syncChecker{
  214. called: make(chan int, 10),
  215. waitCall: nil,
  216. }
  217. clientConf := &ClientConfig{HostKeyCallback: checker.Check}
  218. clientConf.RekeyThreshold = 500
  219. trC, trS, err := handshakePair(clientConf, "addr", false)
  220. if err != nil {
  221. t.Fatalf("handshakePair: %v", err)
  222. }
  223. defer trC.Close()
  224. defer trS.Close()
  225. input := make([]byte, 251)
  226. input[0] = msgRequestSuccess
  227. done := make(chan int, 1)
  228. const numPacket = 5
  229. go func() {
  230. defer close(done)
  231. j := 0
  232. for ; j < numPacket; j++ {
  233. if p, err := trS.readPacket(); err != nil {
  234. break
  235. } else if !bytes.Equal(input, p) {
  236. t.Errorf("got packet type %d, want %d", p[0], input[0])
  237. }
  238. }
  239. if j != numPacket {
  240. t.Errorf("got %d, want 5 messages", j)
  241. }
  242. }()
  243. <-checker.called
  244. for i := 0; i < numPacket; i++ {
  245. p := make([]byte, len(input))
  246. copy(p, input)
  247. if err := trC.writePacket(p); err != nil {
  248. t.Errorf("writePacket: %v", err)
  249. }
  250. if i == 2 {
  251. // Make sure the kex is in progress.
  252. <-checker.called
  253. }
  254. }
  255. <-done
  256. }
  257. type syncChecker struct {
  258. waitCall chan int
  259. called chan int
  260. }
  261. func (c *syncChecker) Check(dialAddr string, addr net.Addr, key PublicKey) error {
  262. c.called <- 1
  263. if c.waitCall != nil {
  264. <-c.waitCall
  265. }
  266. return nil
  267. }
  268. func TestHandshakeAutoRekeyRead(t *testing.T) {
  269. sync := &syncChecker{
  270. called: make(chan int, 2),
  271. waitCall: nil,
  272. }
  273. clientConf := &ClientConfig{
  274. HostKeyCallback: sync.Check,
  275. }
  276. clientConf.RekeyThreshold = 500
  277. trC, trS, err := handshakePair(clientConf, "addr", false)
  278. if err != nil {
  279. t.Fatalf("handshakePair: %v", err)
  280. }
  281. defer trC.Close()
  282. defer trS.Close()
  283. packet := make([]byte, 501)
  284. packet[0] = msgRequestSuccess
  285. if err := trS.writePacket(packet); err != nil {
  286. t.Fatalf("writePacket: %v", err)
  287. }
  288. // While we read out the packet, a key change will be
  289. // initiated.
  290. done := make(chan int, 1)
  291. go func() {
  292. defer close(done)
  293. if _, err := trC.readPacket(); err != nil {
  294. t.Fatalf("readPacket(client): %v", err)
  295. }
  296. }()
  297. <-done
  298. <-sync.called
  299. }
  300. // errorKeyingTransport generates errors after a given number of
  301. // read/write operations.
  302. type errorKeyingTransport struct {
  303. packetConn
  304. readLeft, writeLeft int
  305. }
  306. func (n *errorKeyingTransport) prepareKeyChange(*algorithms, *kexResult) error {
  307. return nil
  308. }
  309. func (n *errorKeyingTransport) getSessionID() []byte {
  310. return nil
  311. }
  312. func (n *errorKeyingTransport) writePacket(packet []byte) error {
  313. if n.writeLeft == 0 {
  314. n.Close()
  315. return errors.New("barf")
  316. }
  317. n.writeLeft--
  318. return n.packetConn.writePacket(packet)
  319. }
  320. func (n *errorKeyingTransport) readPacket() ([]byte, error) {
  321. if n.readLeft == 0 {
  322. n.Close()
  323. return nil, errors.New("barf")
  324. }
  325. n.readLeft--
  326. return n.packetConn.readPacket()
  327. }
  328. func TestHandshakeErrorHandlingRead(t *testing.T) {
  329. for i := 0; i < 20; i++ {
  330. testHandshakeErrorHandlingN(t, i, -1, false)
  331. }
  332. }
  333. func TestHandshakeErrorHandlingWrite(t *testing.T) {
  334. for i := 0; i < 20; i++ {
  335. testHandshakeErrorHandlingN(t, -1, i, false)
  336. }
  337. }
  338. func TestHandshakeErrorHandlingReadCoupled(t *testing.T) {
  339. for i := 0; i < 20; i++ {
  340. testHandshakeErrorHandlingN(t, i, -1, true)
  341. }
  342. }
  343. func TestHandshakeErrorHandlingWriteCoupled(t *testing.T) {
  344. for i := 0; i < 20; i++ {
  345. testHandshakeErrorHandlingN(t, -1, i, true)
  346. }
  347. }
  348. // testHandshakeErrorHandlingN runs handshakes, injecting errors. If
  349. // handshakeTransport deadlocks, the go runtime will detect it and
  350. // panic.
  351. func testHandshakeErrorHandlingN(t *testing.T, readLimit, writeLimit int, coupled bool) {
  352. msg := Marshal(&serviceRequestMsg{strings.Repeat("x", int(minRekeyThreshold)/4)})
  353. a, b := memPipe()
  354. defer a.Close()
  355. defer b.Close()
  356. key := testSigners["ecdsa"]
  357. serverConf := Config{RekeyThreshold: minRekeyThreshold}
  358. serverConf.SetDefaults()
  359. serverConn := newHandshakeTransport(&errorKeyingTransport{a, readLimit, writeLimit}, &serverConf, []byte{'a'}, []byte{'b'})
  360. serverConn.hostKeys = []Signer{key}
  361. go serverConn.readLoop()
  362. go serverConn.kexLoop()
  363. clientConf := Config{RekeyThreshold: 10 * minRekeyThreshold}
  364. clientConf.SetDefaults()
  365. clientConn := newHandshakeTransport(&errorKeyingTransport{b, -1, -1}, &clientConf, []byte{'a'}, []byte{'b'})
  366. clientConn.hostKeyAlgorithms = []string{key.PublicKey().Type()}
  367. go clientConn.readLoop()
  368. go clientConn.kexLoop()
  369. var wg sync.WaitGroup
  370. for _, hs := range []packetConn{serverConn, clientConn} {
  371. if !coupled {
  372. wg.Add(2)
  373. go func(c packetConn) {
  374. for i := 0; ; i++ {
  375. str := fmt.Sprintf("%08x", i) + strings.Repeat("x", int(minRekeyThreshold)/4-8)
  376. err := c.writePacket(Marshal(&serviceRequestMsg{str}))
  377. if err != nil {
  378. break
  379. }
  380. }
  381. wg.Done()
  382. c.Close()
  383. }(hs)
  384. go func(c packetConn) {
  385. for {
  386. _, err := c.readPacket()
  387. if err != nil {
  388. break
  389. }
  390. }
  391. wg.Done()
  392. }(hs)
  393. } else {
  394. wg.Add(1)
  395. go func(c packetConn) {
  396. for {
  397. _, err := c.readPacket()
  398. if err != nil {
  399. break
  400. }
  401. if err := c.writePacket(msg); err != nil {
  402. break
  403. }
  404. }
  405. wg.Done()
  406. }(hs)
  407. }
  408. }
  409. wg.Wait()
  410. }
  411. func TestDisconnect(t *testing.T) {
  412. if runtime.GOOS == "plan9" {
  413. t.Skip("see golang.org/issue/7237")
  414. }
  415. checker := &testChecker{}
  416. trC, trS, err := handshakePair(&ClientConfig{HostKeyCallback: checker.Check}, "addr", false)
  417. if err != nil {
  418. t.Fatalf("handshakePair: %v", err)
  419. }
  420. defer trC.Close()
  421. defer trS.Close()
  422. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  423. errMsg := &disconnectMsg{
  424. Reason: 42,
  425. Message: "such is life",
  426. }
  427. trC.writePacket(Marshal(errMsg))
  428. trC.writePacket([]byte{msgRequestSuccess, 0, 0})
  429. packet, err := trS.readPacket()
  430. if err != nil {
  431. t.Fatalf("readPacket 1: %v", err)
  432. }
  433. if packet[0] != msgRequestSuccess {
  434. t.Errorf("got packet %v, want packet type %d", packet, msgRequestSuccess)
  435. }
  436. _, err = trS.readPacket()
  437. if err == nil {
  438. t.Errorf("readPacket 2 succeeded")
  439. } else if !reflect.DeepEqual(err, errMsg) {
  440. t.Errorf("got error %#v, want %#v", err, errMsg)
  441. }
  442. _, err = trS.readPacket()
  443. if err == nil {
  444. t.Errorf("readPacket 3 succeeded")
  445. }
  446. }