dialParameters_test.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "encoding/json"
  23. "fmt"
  24. "io/ioutil"
  25. "os"
  26. "testing"
  27. "time"
  28. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  29. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  33. )
  34. func TestDialParametersAndReplay(t *testing.T) {
  35. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  36. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  37. runDialParametersAndReplay(t, tunnelProtocol)
  38. }
  39. }
  40. }
  41. var testNetworkID = prng.HexString(8)
  42. type testNetworkGetter struct {
  43. }
  44. func (t *testNetworkGetter) GetNetworkID() string {
  45. return testNetworkID
  46. }
  47. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  48. t.Logf("Test %s...", tunnelProtocol)
  49. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  50. if err != nil {
  51. t.Fatalf("TempDir failed: %s", err)
  52. }
  53. defer os.RemoveAll(testDataDirName)
  54. SetNoticeWriter(ioutil.Discard)
  55. clientConfig := &Config{
  56. PropagationChannelId: "0",
  57. SponsorId: "0",
  58. DataRootDirectory: testDataDirName,
  59. NetworkIDGetter: new(testNetworkGetter),
  60. }
  61. err = clientConfig.Commit(false)
  62. if err != nil {
  63. t.Fatalf("error committing configuration file: %s", err)
  64. }
  65. applyParameters := make(map[string]interface{})
  66. applyParameters[parameters.TransformHostNameProbability] = 1.0
  67. applyParameters[parameters.PickUserAgentProbability] = 1.0
  68. err = clientConfig.SetParameters("tag1", true, applyParameters)
  69. if err != nil {
  70. t.Fatalf("SetParameters failed: %s", err)
  71. }
  72. err = OpenDataStore(clientConfig)
  73. if err != nil {
  74. t.Fatalf("error initializing client datastore: %s", err)
  75. }
  76. defer CloseDataStore()
  77. serverEntries := makeMockServerEntries(tunnelProtocol, 100)
  78. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  79. return replayProtocol == tunnelProtocol
  80. }
  81. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  82. return tunnelProtocol, true
  83. }
  84. values.SetSSHClientVersionsSpec(
  85. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  86. values.SetUserAgentsSpec(
  87. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  88. // Test: expected dial parameter fields set
  89. upstreamProxyErrorCallback := func(_ error) {}
  90. dialParams, err := MakeDialParameters(
  91. clientConfig, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  92. if err != nil {
  93. t.Fatalf("MakeDialParameters failed: %s", err)
  94. }
  95. if dialParams.ServerEntry != serverEntries[0] {
  96. t.Fatalf("unexpected server entry")
  97. }
  98. if dialParams.NetworkID != testNetworkID {
  99. t.Fatalf("unexpected network ID")
  100. }
  101. if dialParams.IsReplay {
  102. t.Fatalf("unexpected replay")
  103. }
  104. if dialParams.TunnelProtocol != tunnelProtocol {
  105. t.Fatalf("unexpected tunnel protocol")
  106. }
  107. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  108. dialParams.DirectDialAddress == "" {
  109. t.Fatalf("missing direct dial fields")
  110. }
  111. if dialParams.DialPortNumber == "" {
  112. t.Fatalf("missing port number fields")
  113. }
  114. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  115. t.Fatalf("missing SSH fields")
  116. }
  117. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  118. dialParams.ObfuscatorPaddingSeed == nil {
  119. t.Fatalf("missing obfuscator fields")
  120. }
  121. if dialParams.FragmentorSeed == nil {
  122. t.Fatalf("missing fragmentor field")
  123. }
  124. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  125. (dialParams.MeekDialAddress == "" ||
  126. dialParams.MeekHostHeader == "" ||
  127. dialParams.MeekObfuscatorPaddingSeed == nil) {
  128. t.Fatalf("missing meek fields")
  129. }
  130. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  131. (dialParams.MeekFrontingDialAddress == "" ||
  132. dialParams.MeekFrontingHost == "") {
  133. t.Fatalf("missing meek fronting fields")
  134. }
  135. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  136. dialParams.UserAgent == "" {
  137. t.Fatalf("missing meek HTTP fields")
  138. }
  139. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  140. (dialParams.MeekSNIServerName == "" ||
  141. !dialParams.SelectedTLSProfile ||
  142. dialParams.TLSProfile == "") {
  143. t.Fatalf("missing meek HTTPS fields")
  144. }
  145. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  146. if dialParams.QUICVersion == "" {
  147. t.Fatalf("missing QUIC version field")
  148. }
  149. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  150. if dialParams.MeekFrontingDialAddress == "" ||
  151. dialParams.MeekFrontingHost == "" ||
  152. dialParams.MeekSNIServerName == "" {
  153. t.Fatalf("missing fronted QUIC fields")
  154. }
  155. } else {
  156. if dialParams.QUICDialSNIAddress == "" {
  157. t.Fatalf("missing QUIC SNI field")
  158. }
  159. }
  160. }
  161. if dialParams.LivenessTestSeed == nil {
  162. t.Fatalf("missing liveness test fields")
  163. }
  164. if dialParams.APIRequestPaddingSeed == nil {
  165. t.Fatalf("missing API request fields")
  166. }
  167. dialConfig := dialParams.GetDialConfig()
  168. if dialConfig.UpstreamProxyErrorCallback == nil {
  169. t.Fatalf("missing upstreamProxyErrorCallback")
  170. }
  171. // Test: no replay after dial reported to fail
  172. dialParams.Failed(clientConfig)
  173. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  174. if err != nil {
  175. t.Fatalf("MakeDialParameters failed: %s", err)
  176. }
  177. if dialParams.IsReplay {
  178. t.Fatalf("unexpected replay")
  179. }
  180. // Test: no replay after network ID changes
  181. dialParams.Succeeded()
  182. testNetworkID = prng.HexString(8)
  183. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  184. if err != nil {
  185. t.Fatalf("MakeDialParameters failed: %s", err)
  186. }
  187. if dialParams.NetworkID != testNetworkID {
  188. t.Fatalf("unexpected network ID")
  189. }
  190. if dialParams.IsReplay {
  191. t.Fatalf("unexpected replay")
  192. }
  193. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  194. dialParams.Succeeded()
  195. replayDialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  196. if err != nil {
  197. t.Fatalf("MakeDialParameters failed: %s", err)
  198. }
  199. if !replayDialParams.IsReplay {
  200. t.Fatalf("unexpected non-replay")
  201. }
  202. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  203. t.Fatalf("unexpected non-updated timestamp")
  204. }
  205. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  206. t.Fatalf("mismatching tunnel protocol")
  207. }
  208. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  209. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  210. t.Fatalf("mismatching dial fields")
  211. }
  212. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  213. if seed1 == nil {
  214. return seed2 == nil
  215. }
  216. return bytes.Equal(seed1[:], seed2[:])
  217. }
  218. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  219. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  220. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  221. t.Fatalf("mismatching SSH fields")
  222. }
  223. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  224. t.Fatalf("mismatching obfuscator fields")
  225. }
  226. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  227. t.Fatalf("mismatching fragmentor fields")
  228. }
  229. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  230. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  231. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  232. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  233. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  234. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  235. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  236. t.Fatalf("mismatching meek fields")
  237. }
  238. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  239. replayDialParams.UserAgent != dialParams.UserAgent {
  240. t.Fatalf("mismatching user agent fields")
  241. }
  242. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  243. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  244. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  245. t.Fatalf("mismatching TLS fields")
  246. }
  247. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  248. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  249. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  250. t.Fatalf("mismatching QUIC fields")
  251. }
  252. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  253. t.Fatalf("mismatching liveness test fields")
  254. }
  255. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  256. t.Fatalf("mismatching API request fields")
  257. }
  258. // Test: no replay after change tactics
  259. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  260. err = clientConfig.SetParameters("tag2", true, applyParameters)
  261. if err != nil {
  262. t.Fatalf("SetParameters failed: %s", err)
  263. }
  264. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  265. if err != nil {
  266. t.Fatalf("MakeDialParameters failed: %s", err)
  267. }
  268. if dialParams.IsReplay {
  269. t.Fatalf("unexpected replay")
  270. }
  271. // Test: no replay after dial parameters expired
  272. dialParams.Succeeded()
  273. time.Sleep(1 * time.Second)
  274. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  275. if err != nil {
  276. t.Fatalf("MakeDialParameters failed: %s", err)
  277. }
  278. if dialParams.IsReplay {
  279. t.Fatalf("unexpected replay")
  280. }
  281. // Test: no replay after server entry changes
  282. dialParams.Succeeded()
  283. serverEntries[0].ConfigurationVersion += 1
  284. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  285. if err != nil {
  286. t.Fatalf("MakeDialParameters failed: %s", err)
  287. }
  288. if dialParams.IsReplay {
  289. t.Fatalf("unexpected replay")
  290. }
  291. // Test: disable replay elements (partial coverage)
  292. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  293. applyParameters[parameters.ReplaySSH] = false
  294. applyParameters[parameters.ReplayObfuscatorPadding] = false
  295. applyParameters[parameters.ReplayFragmentor] = false
  296. applyParameters[parameters.ReplayRandomizedTLSProfile] = false
  297. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  298. applyParameters[parameters.ReplayLivenessTest] = false
  299. applyParameters[parameters.ReplayAPIRequestPadding] = false
  300. err = clientConfig.SetParameters("tag3", true, applyParameters)
  301. if err != nil {
  302. t.Fatalf("SetParameters failed: %s", err)
  303. }
  304. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  305. if err != nil {
  306. t.Fatalf("MakeDialParameters failed: %s", err)
  307. }
  308. dialParams.Succeeded()
  309. replayDialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  310. if err != nil {
  311. t.Fatalf("MakeDialParameters failed: %s", err)
  312. }
  313. if !replayDialParams.IsReplay {
  314. t.Fatalf("unexpected non-replay")
  315. }
  316. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  317. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  318. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  319. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  320. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  321. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  322. (protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  323. identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) &&
  324. replayDialParams.RandomizedTLSProfileSeed != nil) ||
  325. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  326. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  327. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  328. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  329. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  330. t.Fatalf("unexpected replayed fields")
  331. }
  332. // Test: iterator shuffles
  333. for i, serverEntry := range serverEntries {
  334. data, err := json.Marshal(serverEntry)
  335. if err != nil {
  336. t.Fatalf("json.Marshal failed: %s", err)
  337. }
  338. var serverEntryFields protocol.ServerEntryFields
  339. err = json.Unmarshal(data, &serverEntryFields)
  340. if err != nil {
  341. t.Fatalf("json.Unmarshal failed: %s", err)
  342. }
  343. err = StoreServerEntry(serverEntryFields, false)
  344. if err != nil {
  345. t.Fatalf("StoreServerEntry failed: %s", err)
  346. }
  347. if i%10 == 0 {
  348. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  349. if err != nil {
  350. t.Fatalf("MakeDialParameters failed: %s", err)
  351. }
  352. dialParams.Succeeded()
  353. }
  354. }
  355. for i := 0; i < 5; i++ {
  356. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  357. if err != nil {
  358. t.Fatalf("NewServerEntryIterator failed: %s", err)
  359. }
  360. if hasAffinity {
  361. t.Fatalf("unexpected affinity server")
  362. }
  363. // Test: the first shuffle should move the replay candidates to the front
  364. for j := 0; j < 10; j++ {
  365. serverEntry, err := iterator.Next()
  366. if err != nil {
  367. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  368. }
  369. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  370. if err != nil {
  371. t.Fatalf("MakeDialParameters failed: %s", err)
  372. }
  373. if !dialParams.IsReplay {
  374. t.Fatalf("unexpected non-replay")
  375. }
  376. }
  377. iterator.Reset()
  378. // Test: subsequent shuffles should not move the replay candidates
  379. allReplay := true
  380. for j := 0; j < 10; j++ {
  381. serverEntry, err := iterator.Next()
  382. if err != nil {
  383. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  384. }
  385. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  386. if err != nil {
  387. t.Fatalf("MakeDialParameters failed: %s", err)
  388. }
  389. if !dialParams.IsReplay {
  390. allReplay = false
  391. }
  392. }
  393. if allReplay {
  394. t.Fatalf("unexpected all replay")
  395. }
  396. iterator.Close()
  397. }
  398. }
  399. func makeMockServerEntries(tunnelProtocol string, count int) []*protocol.ServerEntry {
  400. serverEntries := make([]*protocol.ServerEntry, count)
  401. for i := 0; i < count; i++ {
  402. serverEntries[i] = &protocol.ServerEntry{
  403. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  404. SshPort: 1,
  405. SshObfuscatedPort: 2,
  406. SshObfuscatedQUICPort: 3,
  407. SshObfuscatedTapDancePort: 4,
  408. SshObfuscatedConjurePort: 5,
  409. MeekServerPort: 6,
  410. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  411. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  412. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  413. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  414. }
  415. }
  416. return serverEntries
  417. }