dialParameters_test.go 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "encoding/json"
  23. "fmt"
  24. "io/ioutil"
  25. "os"
  26. "reflect"
  27. "testing"
  28. "time"
  29. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  35. )
  36. func TestDialParametersAndReplay(t *testing.T) {
  37. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  38. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  39. runDialParametersAndReplay(t, tunnelProtocol)
  40. }
  41. }
  42. }
  43. var testNetworkID = prng.HexString(8)
  44. type testNetworkGetter struct {
  45. }
  46. func (t *testNetworkGetter) GetNetworkID() string {
  47. return testNetworkID
  48. }
  49. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  50. t.Logf("Test %s...", tunnelProtocol)
  51. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  52. if err != nil {
  53. t.Fatalf("TempDir failed: %s", err)
  54. }
  55. defer os.RemoveAll(testDataDirName)
  56. SetNoticeWriter(ioutil.Discard)
  57. clientConfig := &Config{
  58. PropagationChannelId: "0",
  59. SponsorId: "0",
  60. DataRootDirectory: testDataDirName,
  61. NetworkIDGetter: new(testNetworkGetter),
  62. }
  63. err = clientConfig.Commit(false)
  64. if err != nil {
  65. t.Fatalf("error committing configuration file: %s", err)
  66. }
  67. holdOffTunnelProtocols := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  68. frontingProviderID := prng.HexString(8)
  69. applyParameters := make(map[string]interface{})
  70. applyParameters[parameters.TransformHostNameProbability] = 1.0
  71. applyParameters[parameters.PickUserAgentProbability] = 1.0
  72. applyParameters[parameters.HoldOffTunnelMinDuration] = "1ms"
  73. applyParameters[parameters.HoldOffTunnelMaxDuration] = "10ms"
  74. applyParameters[parameters.HoldOffTunnelProtocols] = holdOffTunnelProtocols
  75. applyParameters[parameters.HoldOffTunnelFrontingProviderIDs] = []string{frontingProviderID}
  76. applyParameters[parameters.HoldOffTunnelProbability] = 1.0
  77. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  78. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  79. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  80. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  81. applyParameters[parameters.OSSHObfuscatorSeedTransformProbability] = 1.0
  82. applyParameters[parameters.OSSHObfuscatorSeedTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  83. applyParameters[parameters.OSSHObfuscatorSeedTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  84. applyParameters[parameters.ObfuscatedQUICNonceTransformProbability] = 1.0
  85. applyParameters[parameters.ObfuscatedQUICNonceTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  86. applyParameters[parameters.ObfuscatedQUICNonceTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  87. err = clientConfig.SetParameters("tag1", false, applyParameters)
  88. if err != nil {
  89. t.Fatalf("SetParameters failed: %s", err)
  90. }
  91. resolver := NewResolver(clientConfig, true)
  92. defer resolver.Stop()
  93. clientConfig.SetResolver(resolver)
  94. err = OpenDataStore(clientConfig)
  95. if err != nil {
  96. t.Fatalf("error initializing client datastore: %s", err)
  97. }
  98. defer CloseDataStore()
  99. serverEntries := makeMockServerEntries(tunnelProtocol, frontingProviderID, 100)
  100. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  101. return replayProtocol == tunnelProtocol
  102. }
  103. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  104. return tunnelProtocol, true
  105. }
  106. values.SetSSHClientVersionsSpec(
  107. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  108. values.SetUserAgentsSpec(
  109. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  110. // Test: expected dial parameter fields set
  111. upstreamProxyErrorCallback := func(_ error) {}
  112. dialParams, err := MakeDialParameters(
  113. clientConfig, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  114. if err != nil {
  115. t.Fatalf("MakeDialParameters failed: %s", err)
  116. }
  117. if dialParams.ServerEntry != serverEntries[0] {
  118. t.Fatalf("unexpected server entry")
  119. }
  120. if dialParams.NetworkID != testNetworkID {
  121. t.Fatalf("unexpected network ID")
  122. }
  123. if dialParams.IsReplay {
  124. t.Fatalf("unexpected replay")
  125. }
  126. if dialParams.TunnelProtocol != tunnelProtocol {
  127. t.Fatalf("unexpected tunnel protocol")
  128. }
  129. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  130. dialParams.DirectDialAddress == "" {
  131. t.Fatalf("missing direct dial fields")
  132. }
  133. if dialParams.DialPortNumber == "" {
  134. t.Fatalf("missing port number fields")
  135. }
  136. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  137. t.Fatalf("missing SSH fields")
  138. }
  139. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  140. dialParams.ObfuscatorPaddingSeed == nil {
  141. t.Fatalf("missing obfuscator fields")
  142. }
  143. if dialParams.FragmentorSeed == nil {
  144. t.Fatalf("missing fragmentor field")
  145. }
  146. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  147. (dialParams.MeekDialAddress == "" ||
  148. dialParams.MeekHostHeader == "" ||
  149. dialParams.MeekObfuscatorPaddingSeed == nil) {
  150. t.Fatalf("missing meek fields")
  151. }
  152. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  153. (dialParams.MeekFrontingDialAddress == "" ||
  154. dialParams.MeekFrontingHost == "" ||
  155. dialParams.ResolveParameters == nil) {
  156. t.Fatalf("missing meek fronting fields")
  157. }
  158. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  159. dialParams.UserAgent == "" {
  160. t.Fatalf("missing meek HTTP fields")
  161. }
  162. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  163. (dialParams.MeekSNIServerName == "" ||
  164. !dialParams.SelectedTLSProfile ||
  165. dialParams.TLSProfile == "") {
  166. t.Fatalf("missing meek HTTPS fields")
  167. }
  168. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  169. if dialParams.QUICVersion == "" {
  170. t.Fatalf("missing QUIC version field")
  171. }
  172. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  173. if dialParams.MeekFrontingDialAddress == "" ||
  174. dialParams.MeekFrontingHost == "" ||
  175. dialParams.MeekSNIServerName == "" {
  176. t.Fatalf("missing fronted QUIC fields")
  177. }
  178. } else {
  179. if dialParams.QUICDialSNIAddress == "" {
  180. t.Fatalf("missing QUIC SNI field")
  181. }
  182. }
  183. }
  184. if dialParams.LivenessTestSeed == nil {
  185. t.Fatalf("missing liveness test fields")
  186. }
  187. if dialParams.APIRequestPaddingSeed == nil {
  188. t.Fatalf("missing API request fields")
  189. }
  190. if common.Contains(holdOffTunnelProtocols, tunnelProtocol) ||
  191. protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  192. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  193. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  194. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  195. }
  196. } else {
  197. if dialParams.HoldOffTunnelDuration != 0 {
  198. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  199. }
  200. }
  201. dialConfig := dialParams.GetDialConfig()
  202. if dialConfig.UpstreamProxyErrorCallback == nil {
  203. t.Fatalf("missing upstreamProxyErrorCallback")
  204. }
  205. // Test: no replay after dial reported to fail
  206. dialParams.Failed(clientConfig)
  207. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  208. if err != nil {
  209. t.Fatalf("MakeDialParameters failed: %s", err)
  210. }
  211. if dialParams.IsReplay {
  212. t.Fatalf("unexpected replay")
  213. }
  214. // Test: no replay after network ID changes
  215. dialParams.Succeeded()
  216. testNetworkID = prng.HexString(8)
  217. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  218. if err != nil {
  219. t.Fatalf("MakeDialParameters failed: %s", err)
  220. }
  221. if dialParams.NetworkID != testNetworkID {
  222. t.Fatalf("unexpected network ID")
  223. }
  224. if dialParams.IsReplay {
  225. t.Fatalf("unexpected replay")
  226. }
  227. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  228. dialParams.Succeeded()
  229. replayDialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  230. if err != nil {
  231. t.Fatalf("MakeDialParameters failed: %s", err)
  232. }
  233. if !replayDialParams.IsReplay {
  234. t.Fatalf("unexpected non-replay")
  235. }
  236. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  237. t.Fatalf("unexpected non-updated timestamp")
  238. }
  239. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  240. t.Fatalf("mismatching tunnel protocol")
  241. }
  242. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  243. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  244. t.Fatalf("mismatching dial fields")
  245. }
  246. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  247. if seed1 == nil {
  248. return seed2 == nil
  249. }
  250. return bytes.Equal(seed1[:], seed2[:])
  251. }
  252. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  253. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  254. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  255. t.Fatalf("mismatching SSH fields")
  256. }
  257. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  258. t.Fatalf("mismatching obfuscator fields")
  259. }
  260. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  261. t.Fatalf("mismatching fragmentor fields")
  262. }
  263. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  264. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  265. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  266. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  267. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  268. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  269. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  270. t.Fatalf("mismatching meek fields")
  271. }
  272. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  273. replayDialParams.UserAgent != dialParams.UserAgent {
  274. t.Fatalf("mismatching user agent fields")
  275. }
  276. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  277. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  278. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  279. t.Fatalf("mismatching TLS fields")
  280. }
  281. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  282. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  283. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  284. t.Fatalf("mismatching QUIC fields")
  285. }
  286. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  287. t.Fatalf("mismatching liveness test fields")
  288. }
  289. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  290. t.Fatalf("mismatching API request fields")
  291. }
  292. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  293. (replayDialParams.ResolveParameters != nil &&
  294. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  295. t.Fatalf("mismatching ResolveParameters fields")
  296. }
  297. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  298. (replayDialParams.HTTPTransformerParameters != nil &&
  299. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  300. t.Fatalf("mismatching HTTPTransformerParameters fields")
  301. }
  302. if (replayDialParams.OSSHObfuscatorSeedTransformerParameters == nil) != (dialParams.OSSHObfuscatorSeedTransformerParameters == nil) ||
  303. (replayDialParams.OSSHObfuscatorSeedTransformerParameters != nil &&
  304. !reflect.DeepEqual(replayDialParams.OSSHObfuscatorSeedTransformerParameters, dialParams.OSSHObfuscatorSeedTransformerParameters)) {
  305. t.Fatalf("mismatching ObfuscatorSeedTransformerParameters fields")
  306. }
  307. if (replayDialParams.ObfuscatedQUICNonceTransformerParameters == nil) != (dialParams.ObfuscatedQUICNonceTransformerParameters == nil) ||
  308. (replayDialParams.ObfuscatedQUICNonceTransformerParameters != nil &&
  309. !reflect.DeepEqual(replayDialParams.ObfuscatedQUICNonceTransformerParameters, dialParams.ObfuscatedQUICNonceTransformerParameters)) {
  310. t.Fatalf("mismatching ObfuscatedQUICNonceTransformerParameters fields")
  311. }
  312. // Test: replay after change tactics, with ReplayIgnoreChangedClientState = true
  313. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  314. applyParameters[parameters.ReplayIgnoreChangedConfigState] = true
  315. err = clientConfig.SetParameters("tag2a", false, applyParameters)
  316. if err != nil {
  317. t.Fatalf("SetParameters failed: %s", err)
  318. }
  319. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  320. if err != nil {
  321. t.Fatalf("MakeDialParameters failed: %s", err)
  322. }
  323. if !replayDialParams.IsReplay {
  324. t.Fatalf("unexpected non-replay")
  325. }
  326. // Test: no replay after change tactics
  327. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  328. applyParameters[parameters.ReplayIgnoreChangedConfigState] = false
  329. err = clientConfig.SetParameters("tag2", false, applyParameters)
  330. if err != nil {
  331. t.Fatalf("SetParameters failed: %s", err)
  332. }
  333. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  334. if err != nil {
  335. t.Fatalf("MakeDialParameters failed: %s", err)
  336. }
  337. if dialParams.IsReplay {
  338. t.Fatalf("unexpected replay")
  339. }
  340. // Test: no replay after dial parameters expired
  341. dialParams.Succeeded()
  342. time.Sleep(1 * time.Second)
  343. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  344. if err != nil {
  345. t.Fatalf("MakeDialParameters failed: %s", err)
  346. }
  347. if dialParams.IsReplay {
  348. t.Fatalf("unexpected replay")
  349. }
  350. // Test: no replay after server entry changes
  351. dialParams.Succeeded()
  352. serverEntries[0].ConfigurationVersion += 1
  353. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  354. if err != nil {
  355. t.Fatalf("MakeDialParameters failed: %s", err)
  356. }
  357. if dialParams.IsReplay {
  358. t.Fatalf("unexpected replay")
  359. }
  360. // Test: disable replay elements (partial coverage)
  361. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  362. applyParameters[parameters.ReplaySSH] = false
  363. applyParameters[parameters.ReplayObfuscatorPadding] = false
  364. applyParameters[parameters.ReplayFragmentor] = false
  365. applyParameters[parameters.ReplayRandomizedTLSProfile] = false
  366. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  367. applyParameters[parameters.ReplayLivenessTest] = false
  368. applyParameters[parameters.ReplayAPIRequestPadding] = false
  369. err = clientConfig.SetParameters("tag3", false, applyParameters)
  370. if err != nil {
  371. t.Fatalf("SetParameters failed: %s", err)
  372. }
  373. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  374. if err != nil {
  375. t.Fatalf("MakeDialParameters failed: %s", err)
  376. }
  377. dialParams.Succeeded()
  378. replayDialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  379. if err != nil {
  380. t.Fatalf("MakeDialParameters failed: %s", err)
  381. }
  382. if !replayDialParams.IsReplay {
  383. t.Fatalf("unexpected non-replay")
  384. }
  385. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  386. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  387. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  388. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  389. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  390. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  391. (protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  392. identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) &&
  393. replayDialParams.RandomizedTLSProfileSeed != nil) ||
  394. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  395. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  396. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  397. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  398. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  399. t.Fatalf("unexpected replayed fields")
  400. }
  401. // Test: client-side restrict fronting provider ID
  402. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  403. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  404. err = clientConfig.SetParameters("tag4", false, applyParameters)
  405. if err != nil {
  406. t.Fatalf("SetParameters failed: %s", err)
  407. }
  408. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  409. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  410. if err == nil {
  411. if dialParams != nil {
  412. t.Fatalf("unexpected MakeDialParameters success")
  413. }
  414. }
  415. } else {
  416. if err != nil {
  417. t.Fatalf("MakeDialParameters failed: %s", err)
  418. }
  419. }
  420. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  421. err = clientConfig.SetParameters("tag5", false, applyParameters)
  422. if err != nil {
  423. t.Fatalf("SetParameters failed: %s", err)
  424. }
  425. // Test: iterator shuffles
  426. for i, serverEntry := range serverEntries {
  427. data, err := json.Marshal(serverEntry)
  428. if err != nil {
  429. t.Fatalf("json.Marshal failed: %s", err)
  430. }
  431. var serverEntryFields protocol.ServerEntryFields
  432. err = json.Unmarshal(data, &serverEntryFields)
  433. if err != nil {
  434. t.Fatalf("json.Unmarshal failed: %s", err)
  435. }
  436. err = StoreServerEntry(serverEntryFields, false)
  437. if err != nil {
  438. t.Fatalf("StoreServerEntry failed: %s", err)
  439. }
  440. if i%10 == 0 {
  441. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  442. if err != nil {
  443. t.Fatalf("MakeDialParameters failed: %s", err)
  444. }
  445. dialParams.Succeeded()
  446. }
  447. }
  448. for i := 0; i < 5; i++ {
  449. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  450. if err != nil {
  451. t.Fatalf("NewServerEntryIterator failed: %s", err)
  452. }
  453. if hasAffinity {
  454. t.Fatalf("unexpected affinity server")
  455. }
  456. // Test: the first shuffle should move the replay candidates to the front
  457. for j := 0; j < 10; j++ {
  458. serverEntry, err := iterator.Next()
  459. if err != nil {
  460. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  461. }
  462. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  463. if err != nil {
  464. t.Fatalf("MakeDialParameters failed: %s", err)
  465. }
  466. if !dialParams.IsReplay {
  467. t.Fatalf("unexpected non-replay")
  468. }
  469. }
  470. iterator.Reset()
  471. // Test: subsequent shuffles should not move the replay candidates
  472. allReplay := true
  473. for j := 0; j < 10; j++ {
  474. serverEntry, err := iterator.Next()
  475. if err != nil {
  476. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  477. }
  478. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  479. if err != nil {
  480. t.Fatalf("MakeDialParameters failed: %s", err)
  481. }
  482. if !dialParams.IsReplay {
  483. allReplay = false
  484. }
  485. }
  486. if allReplay {
  487. t.Fatalf("unexpected all replay")
  488. }
  489. iterator.Close()
  490. }
  491. }
  492. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  493. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  494. if err != nil {
  495. t.Fatalf("TempDir failed: %s", err)
  496. }
  497. defer os.RemoveAll(testDataDirName)
  498. SetNoticeWriter(ioutil.Discard)
  499. clientConfig := &Config{
  500. PropagationChannelId: "0",
  501. SponsorId: "0",
  502. DataRootDirectory: testDataDirName,
  503. NetworkIDGetter: new(testNetworkGetter),
  504. }
  505. err = clientConfig.Commit(false)
  506. if err != nil {
  507. t.Fatalf("error committing configuration file: %s", err)
  508. }
  509. jsonLimitDialPortNumbers := `
  510. {
  511. "SSH" : [[10,11]],
  512. "OSSH" : [[20,21]],
  513. "QUIC-OSSH" : [[30,31]],
  514. "TAPDANCE-OSSH" : [[40,41]],
  515. "CONJURE-OSSH" : [[50,51]],
  516. "All" : [[60,61],80,443]
  517. }
  518. `
  519. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  520. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  521. if err != nil {
  522. t.Fatalf("Unmarshal failed: %s", err)
  523. }
  524. applyParameters := make(map[string]interface{})
  525. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  526. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  527. err = clientConfig.SetParameters("tag1", false, applyParameters)
  528. if err != nil {
  529. t.Fatalf("SetParameters failed: %s", err)
  530. }
  531. constraints := &protocolSelectionConstraints{
  532. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  533. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  534. }
  535. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  536. return constraints.selectProtocol(0, false, serverEntry)
  537. }
  538. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  539. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  540. continue
  541. }
  542. serverEntries := makeMockServerEntries(tunnelProtocol, "", 100)
  543. selected := false
  544. skipped := false
  545. for _, serverEntry := range serverEntries {
  546. selectedProtocol, ok := selectProtocol(serverEntry)
  547. if ok {
  548. if selectedProtocol != tunnelProtocol {
  549. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  550. }
  551. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  552. if err != nil {
  553. t.Fatalf("GetDialPortNumber failed: %s", err)
  554. }
  555. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  556. t.Fatalf("unexpected dial port number: %d", port)
  557. }
  558. selected = true
  559. } else {
  560. skipped = true
  561. }
  562. }
  563. if !selected {
  564. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  565. }
  566. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  567. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  568. }
  569. }
  570. }
  571. func makeMockServerEntries(
  572. tunnelProtocol string,
  573. frontingProviderID string,
  574. count int) []*protocol.ServerEntry {
  575. serverEntries := make([]*protocol.ServerEntry, count)
  576. for i := 0; i < count; i++ {
  577. serverEntries[i] = &protocol.ServerEntry{
  578. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  579. SshPort: prng.Range(10, 19),
  580. SshObfuscatedPort: prng.Range(20, 29),
  581. SshObfuscatedQUICPort: prng.Range(30, 39),
  582. SshObfuscatedTapDancePort: prng.Range(40, 49),
  583. SshObfuscatedConjurePort: prng.Range(50, 59),
  584. MeekServerPort: prng.Range(60, 69),
  585. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  586. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  587. FrontingProviderID: frontingProviderID,
  588. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  589. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  590. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  591. }
  592. }
  593. return serverEntries
  594. }
  595. func TestMakeHTTPTransformerParameters(t *testing.T) {
  596. type test struct {
  597. name string
  598. frontingProviderID string
  599. isFronted bool
  600. paramValues map[string]interface{}
  601. expectedTransformName string
  602. expectedTransformSpec transforms.Spec
  603. }
  604. tests := []test{
  605. {
  606. name: "unfronted",
  607. frontingProviderID: "",
  608. isFronted: false,
  609. paramValues: map[string]interface{}{
  610. "DirectHTTPProtocolTransformProbability": 1,
  611. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  612. "spec1": {{"A", "B"}},
  613. },
  614. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  615. "": {"spec1"},
  616. },
  617. },
  618. expectedTransformName: "spec1",
  619. expectedTransformSpec: [][2]string{{"A", "B"}},
  620. },
  621. {
  622. name: "fronted",
  623. frontingProviderID: "frontingProvider",
  624. isFronted: true,
  625. paramValues: map[string]interface{}{
  626. "FrontedHTTPProtocolTransformProbability": 1,
  627. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  628. "spec1": {{"A", "B"}},
  629. },
  630. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  631. "frontingProvider": {"spec1"},
  632. },
  633. },
  634. expectedTransformName: "spec1",
  635. expectedTransformSpec: [][2]string{{"A", "B"}},
  636. },
  637. {
  638. name: "no transform, coinflip false",
  639. frontingProviderID: "frontingProvider",
  640. isFronted: false,
  641. paramValues: map[string]interface{}{
  642. "DirectHTTPProtocolTransformProbability": 0,
  643. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  644. "spec1": {{"A", "B"}},
  645. },
  646. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  647. "frontingProvider": {"spec1"},
  648. },
  649. },
  650. expectedTransformName: "",
  651. expectedTransformSpec: nil,
  652. },
  653. }
  654. for _, tt := range tests {
  655. t.Run(tt.name, func(t *testing.T) {
  656. params, err := parameters.NewParameters(nil)
  657. if err != nil {
  658. t.Fatalf("parameters.NewParameters failed %v", err)
  659. }
  660. _, err = params.Set("", false, tt.paramValues)
  661. if err != nil {
  662. t.Fatalf("params.Set failed %v", err)
  663. }
  664. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  665. if err != nil {
  666. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  667. }
  668. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  669. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  670. }
  671. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  672. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  673. }
  674. if httpTransformerParams.ProtocolTransformSpec != nil {
  675. if httpTransformerParams.ProtocolTransformSeed == nil {
  676. t.Fatalf("expected non-nil seed")
  677. }
  678. }
  679. })
  680. }
  681. }
  682. func TestMakeOSSHObfuscatorSeedTranformerParameters(t *testing.T) {
  683. type test struct {
  684. name string
  685. paramValues map[string]interface{}
  686. expectedTransformName string
  687. expectedTransformSpec transforms.Spec
  688. }
  689. tests := []test{
  690. {
  691. name: "transform",
  692. paramValues: map[string]interface{}{
  693. "OSSHObfuscatorSeedTransformProbability": 1,
  694. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  695. "spec1": {{"A", "B"}},
  696. },
  697. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  698. "": {"spec1"},
  699. },
  700. },
  701. expectedTransformName: "spec1",
  702. expectedTransformSpec: [][2]string{{"A", "B"}},
  703. },
  704. {
  705. name: "no transform, coinflip false",
  706. paramValues: map[string]interface{}{
  707. "OSSHObfuscatorSeedTransformProbability": 0,
  708. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  709. "spec1": {{"A", "B"}},
  710. },
  711. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  712. "": {"spec1"},
  713. },
  714. },
  715. expectedTransformName: "",
  716. expectedTransformSpec: nil,
  717. },
  718. }
  719. for _, tt := range tests {
  720. t.Run(tt.name, func(t *testing.T) {
  721. params, err := parameters.NewParameters(nil)
  722. if err != nil {
  723. t.Fatalf("parameters.NewParameters failed: %v", err)
  724. }
  725. _, err = params.Set("", false, tt.paramValues)
  726. if err != nil {
  727. t.Fatalf("params.Set failed: %v", err)
  728. }
  729. transformerParams, err := makeSeedTransformerParameters(
  730. params.Get(),
  731. parameters.OSSHObfuscatorSeedTransformProbability,
  732. parameters.OSSHObfuscatorSeedTransformSpecs,
  733. parameters.OSSHObfuscatorSeedTransformScopedSpecNames)
  734. if err != nil {
  735. t.Fatalf("makeSeedTransformerParameters failed: %v", err)
  736. }
  737. if transformerParams.TransformName != tt.expectedTransformName {
  738. t.Fatalf("expected TransformName \"%s\" but got \"%s\"", tt.expectedTransformName, transformerParams.TransformName)
  739. }
  740. if !reflect.DeepEqual(transformerParams.TransformSpec, tt.expectedTransformSpec) {
  741. t.Fatalf("expected TransformSpec %v but got %v", tt.expectedTransformSpec, transformerParams.TransformSpec)
  742. }
  743. if transformerParams.TransformSpec != nil {
  744. if transformerParams.TransformSeed == nil {
  745. t.Fatalf("expected non-nil seed")
  746. }
  747. }
  748. })
  749. }
  750. }